2020-12-14 02:13:09.368 189 INFO tempest [-] Using tempest config file /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/tempest.conf 2020-12-14 02:13:09.390 189 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: heat 2020-12-14 02:13:09.395 189 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cyborg_tempest_plugin 2020-12-14 02:13:09.397 189 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: keystone_tests 2020-12-14 02:13:09.400 189 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: patrole_tests 2020-12-14 02:13:09.404 189 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: telemetry_tests 2020-12-14 02:13:09.407 189 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: barbican_tests 2020-12-14 02:13:09.410 189 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: neutron_tests 2020-12-14 02:13:09.412 189 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: octavia-tempest-plugin 2020-12-14 02:13:09.417 189 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cinder_tests 2020-12-14 02:13:09.420 189 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: heat 2020-12-14 02:13:09.422 189 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cyborg_tempest_plugin 2020-12-14 02:13:09.423 189 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: keystone_tests 2020-12-14 02:13:09.425 189 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: patrole_tests 2020-12-14 02:13:09.426 189 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: telemetry_tests 2020-12-14 02:13:09.427 189 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: barbican_tests 2020-12-14 02:13:09.428 189 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: neutron_tests 2020-12-14 02:13:09.430 189 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: octavia-tempest-plugin 2020-12-14 02:13:09.431 189 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cinder_tests 2020-12-14 02:13:09.427 193 INFO tempest [-] Using tempest config file /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/tempest.conf 2020-12-14 02:13:09.433 189 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2567 2020-12-14 02:13:09.435 189 DEBUG tempest [-] Configuration options gathered from: log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2568 2020-12-14 02:13:09.436 189 DEBUG tempest [-] command line args: [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2569 2020-12-14 02:13:09.439 189 DEBUG tempest [-] config files: ['/root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2570 2020-12-14 02:13:09.440 189 DEBUG tempest [-] ================================================================================ log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2572 2020-12-14 02:13:09.442 189 DEBUG tempest [-] config_dir = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.443 189 DEBUG tempest [-] config_file = ['/root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.445 189 DEBUG tempest [-] config_source = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.446 189 DEBUG tempest [-] debug = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.448 193 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: heat 2020-12-14 02:13:09.450 189 DEBUG tempest [-] default_log_levels = ['amqp=WARN', 'amqplib=WARN', 'boto=WARN', 'qpid=WARN', 'sqlalchemy=WARN', 'suds=INFO', 'oslo.messaging=INFO', 'oslo_messaging=INFO', 'iso8601=WARN', 'requests.packages.urllib3.connectionpool=WARN', 'urllib3.connectionpool=WARN', 'websocket=WARN', 'requests.packages.urllib3.util.retry=WARN', 'urllib3.util.retry=WARN', 'keystonemiddleware=WARN', 'routes.middleware=WARN', 'stevedore=WARN', 'taskflow=WARN', 'keystoneauth=WARN', 'oslo.cache=INFO', 'oslo_policy=INFO', 'dogpile.core.dogpile=INFO'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.452 189 DEBUG tempest [-] instance_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.453 193 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cyborg_tempest_plugin 2020-12-14 02:13:09.454 189 DEBUG tempest [-] instance_uuid_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.455 193 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: keystone_tests 2020-12-14 02:13:09.455 189 DEBUG tempest [-] log_config_append = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.457 189 DEBUG tempest [-] log_date_format = %Y-%m-%d %H:%M:%S log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.458 193 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: patrole_tests 2020-12-14 02:13:09.459 189 DEBUG tempest [-] log_dir = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.462 189 DEBUG tempest [-] log_file = /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/tempest.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.462 193 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: telemetry_tests 2020-12-14 02:13:09.464 189 DEBUG tempest [-] log_rotate_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.466 189 DEBUG tempest [-] log_rotate_interval_type = days log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.465 193 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: barbican_tests 2020-12-14 02:13:09.467 189 DEBUG tempest [-] log_rotation_type = none log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.468 193 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: neutron_tests 2020-12-14 02:13:09.469 189 DEBUG tempest [-] logging_context_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [%(request_id)s %(user_identity)s] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.470 193 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: octavia-tempest-plugin 2020-12-14 02:13:09.471 189 DEBUG tempest [-] logging_debug_format_suffix = %(funcName)s %(pathname)s:%(lineno)d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.472 189 DEBUG tempest [-] logging_default_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [-] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.474 189 DEBUG tempest [-] logging_exception_prefix = %(asctime)s.%(msecs)03d %(process)d ERROR %(name)s %(instance)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.475 193 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cinder_tests 2020-12-14 02:13:09.476 189 DEBUG tempest [-] logging_user_identity_format = %(user)s %(tenant)s %(domain)s %(user_domain)s %(project_domain)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.477 189 DEBUG tempest [-] max_logfile_count = 30 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.478 193 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: heat 2020-12-14 02:13:09.479 189 DEBUG tempest [-] max_logfile_size_mb = 200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.480 193 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cyborg_tempest_plugin 2020-12-14 02:13:09.481 189 DEBUG tempest [-] pause_teardown = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.482 193 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: keystone_tests 2020-12-14 02:13:09.483 189 DEBUG tempest [-] publish_errors = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.483 193 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: patrole_tests 2020-12-14 02:13:09.484 193 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: telemetry_tests 2020-12-14 02:13:09.484 189 DEBUG tempest [-] rate_limit_burst = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.485 193 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: barbican_tests 2020-12-14 02:13:09.486 189 DEBUG tempest [-] rate_limit_except_level = CRITICAL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.487 193 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: neutron_tests 2020-12-14 02:13:09.488 193 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: octavia-tempest-plugin 2020-12-14 02:13:09.488 189 DEBUG tempest [-] rate_limit_interval = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.481 186 INFO tempest [-] Using tempest config file /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/tempest.conf 2020-12-14 02:13:09.489 193 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cinder_tests 2020-12-14 02:13:09.490 189 DEBUG tempest [-] syslog_log_facility = LOG_USER log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.492 189 DEBUG tempest [-] use_eventlog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.492 193 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2567 2020-12-14 02:13:09.494 189 DEBUG tempest [-] use_journal = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.494 193 DEBUG tempest [-] Configuration options gathered from: log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2568 2020-12-14 02:13:09.495 189 DEBUG tempest [-] use_json = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.495 193 DEBUG tempest [-] command line args: [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2569 2020-12-14 02:13:09.497 189 DEBUG tempest [-] use_stderr = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.498 193 DEBUG tempest [-] config files: ['/root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2570 2020-12-14 02:13:09.499 189 DEBUG tempest [-] use_syslog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.500 193 DEBUG tempest [-] ================================================================================ log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2572 2020-12-14 02:13:09.501 189 DEBUG tempest [-] watch_log_file = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.502 193 DEBUG tempest [-] config_dir = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.503 189 DEBUG tempest [-] oslo_concurrency.disable_process_locking = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.503 193 DEBUG tempest [-] config_file = ['/root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.505 193 DEBUG tempest [-] config_source = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.505 189 DEBUG tempest [-] oslo_concurrency.lock_path = /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/lock_files log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.507 193 DEBUG tempest [-] debug = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.507 189 DEBUG tempest [-] auth.admin_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.509 189 DEBUG tempest [-] auth.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.510 193 DEBUG tempest [-] default_log_levels = ['amqp=WARN', 'amqplib=WARN', 'boto=WARN', 'qpid=WARN', 'sqlalchemy=WARN', 'suds=INFO', 'oslo.messaging=INFO', 'oslo_messaging=INFO', 'iso8601=WARN', 'requests.packages.urllib3.connectionpool=WARN', 'urllib3.connectionpool=WARN', 'websocket=WARN', 'requests.packages.urllib3.util.retry=WARN', 'urllib3.util.retry=WARN', 'keystonemiddleware=WARN', 'routes.middleware=WARN', 'stevedore=WARN', 'taskflow=WARN', 'keystoneauth=WARN', 'oslo.cache=INFO', 'oslo_policy=INFO', 'dogpile.core.dogpile=INFO'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.511 189 DEBUG tempest [-] auth.admin_project_name = patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.513 193 DEBUG tempest [-] instance_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.513 189 DEBUG tempest [-] auth.admin_username = patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.515 193 DEBUG tempest [-] instance_uuid_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.515 189 DEBUG tempest [-] auth.create_isolated_networks = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.516 193 DEBUG tempest [-] log_config_append = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.517 186 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: heat 2020-12-14 02:13:09.517 189 DEBUG tempest [-] auth.default_credentials_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.518 193 DEBUG tempest [-] log_date_format = %Y-%m-%d %H:%M:%S log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.519 189 DEBUG tempest [-] auth.tempest_roles = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.520 193 DEBUG tempest [-] log_dir = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.521 189 DEBUG tempest [-] auth.test_accounts_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.522 193 DEBUG tempest [-] log_file = /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/tempest.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.522 186 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cyborg_tempest_plugin 2020-12-14 02:13:09.523 189 DEBUG tempest [-] auth.use_dynamic_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.524 193 DEBUG tempest [-] log_rotate_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.524 186 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: keystone_tests 2020-12-14 02:13:09.525 189 DEBUG tempest [-] compute.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.526 193 DEBUG tempest [-] log_rotate_interval_type = days log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.527 189 DEBUG tempest [-] compute.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.527 186 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: patrole_tests 2020-12-14 02:13:09.528 193 DEBUG tempest [-] log_rotation_type = none log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.529 189 DEBUG tempest [-] compute.catalog_type = compute log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.530 193 DEBUG tempest [-] logging_context_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [%(request_id)s %(user_identity)s] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.531 189 DEBUG tempest [-] compute.certified_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.531 193 DEBUG tempest [-] logging_debug_format_suffix = %(funcName)s %(pathname)s:%(lineno)d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.531 186 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: telemetry_tests 2020-12-14 02:13:09.532 189 DEBUG tempest [-] compute.certified_image_trusted_certs = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.532 193 DEBUG tempest [-] logging_default_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [-] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.534 189 DEBUG tempest [-] compute.compute_volume_common_az = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.534 193 DEBUG tempest [-] logging_exception_prefix = %(asctime)s.%(msecs)03d %(process)d ERROR %(name)s %(instance)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.535 186 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: barbican_tests 2020-12-14 02:13:09.536 189 DEBUG tempest [-] compute.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.536 193 DEBUG tempest [-] logging_user_identity_format = %(user)s %(tenant)s %(domain)s %(user_domain)s %(project_domain)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.537 186 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: neutron_tests 2020-12-14 02:13:09.538 189 DEBUG tempest [-] compute.fixed_network_name = patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.538 193 DEBUG tempest [-] max_logfile_count = 30 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.539 186 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: octavia-tempest-plugin 2020-12-14 02:13:09.540 189 DEBUG tempest [-] compute.flavor_ref = 1311a6a1-b18c-4e52-af0a-b273bda5931b log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.540 193 DEBUG tempest [-] max_logfile_size_mb = 200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.542 189 DEBUG tempest [-] compute.flavor_ref_alt = 8a56823e-8563-423c-896d-50c73f98dd64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.542 193 DEBUG tempest [-] pause_teardown = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.544 189 DEBUG tempest [-] compute.hypervisor_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.544 193 DEBUG tempest [-] publish_errors = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.544 186 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cinder_tests 2020-12-14 02:13:09.545 193 DEBUG tempest [-] rate_limit_burst = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.546 189 DEBUG tempest [-] compute.image_ref = cd332004-33aa-4c81-9e50-54766a6df097 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.547 193 DEBUG tempest [-] rate_limit_except_level = CRITICAL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.547 189 DEBUG tempest [-] compute.image_ref_alt = 458c165e-1594-40fd-a92a-ce6fd4a85db4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.548 186 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: heat 2020-12-14 02:13:09.549 193 DEBUG tempest [-] rate_limit_interval = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.550 189 DEBUG tempest [-] compute.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.550 186 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cyborg_tempest_plugin 2020-12-14 02:13:09.551 186 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: keystone_tests 2020-12-14 02:13:09.551 193 DEBUG tempest [-] syslog_log_facility = LOG_USER log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.551 189 DEBUG tempest [-] compute.min_compute_nodes = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.552 186 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: patrole_tests 2020-12-14 02:13:09.553 193 DEBUG tempest [-] use_eventlog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.553 189 DEBUG tempest [-] compute.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.554 186 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: telemetry_tests 2020-12-14 02:13:09.555 186 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: barbican_tests 2020-12-14 02:13:09.555 193 DEBUG tempest [-] use_journal = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.555 189 DEBUG tempest [-] compute.ready_wait = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.556 186 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: neutron_tests 2020-12-14 02:13:09.557 193 DEBUG tempest [-] use_json = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.557 189 DEBUG tempest [-] compute.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.557 186 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: octavia-tempest-plugin 2020-12-14 02:13:09.559 193 DEBUG tempest [-] use_stderr = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.559 186 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cinder_tests 2020-12-14 02:13:09.559 189 DEBUG tempest [-] compute.shelved_offload_time = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.560 193 DEBUG tempest [-] use_syslog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.561 189 DEBUG tempest [-] compute.volume_device_name = sdb log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.561 186 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2567 2020-12-14 02:13:09.562 193 DEBUG tempest [-] watch_log_file = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.563 186 DEBUG tempest [-] Configuration options gathered from: log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2568 2020-12-14 02:13:09.563 189 DEBUG tempest [-] compute-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.564 193 DEBUG tempest [-] oslo_concurrency.disable_process_locking = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.565 189 DEBUG tempest [-] compute-feature-enabled.attach_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.564 186 DEBUG tempest [-] command line args: [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2569 2020-12-14 02:13:09.566 193 DEBUG tempest [-] oslo_concurrency.lock_path = /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/lock_files log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.567 186 DEBUG tempest [-] config files: ['/root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2570 2020-12-14 02:13:09.567 189 WARNING oslo_config.cfg [-] Deprecated: Option "block_migrate_cinder_iscsi" from group "compute-feature-enabled" is deprecated for removal (This option duplicates the more generic [compute-feature-enabled]/block_migration _for_live_migration now that MIN_LIBVIRT_VERSION is >= 1.2.17 on all branches from stable/rocky and will be removed in a future release.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.568 193 DEBUG tempest [-] auth.admin_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.569 186 DEBUG tempest [-] ================================================================================ log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2572 2020-12-14 02:13:09.569 189 DEBUG tempest [-] compute-feature-enabled.block_migrate_cinder_iscsi = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.570 193 DEBUG tempest [-] auth.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.570 186 DEBUG tempest [-] config_dir = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.572 189 DEBUG tempest [-] compute-feature-enabled.block_migration_for_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.572 186 DEBUG tempest [-] config_file = ['/root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.572 193 DEBUG tempest [-] auth.admin_project_name = patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.574 189 DEBUG tempest [-] compute-feature-enabled.can_migrate_between_any_hosts = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.574 186 DEBUG tempest [-] config_source = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.574 193 DEBUG tempest [-] auth.admin_username = patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.575 186 DEBUG tempest [-] debug = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.575 189 DEBUG tempest [-] compute-feature-enabled.change_password = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.576 193 DEBUG tempest [-] auth.create_isolated_networks = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.577 189 DEBUG tempest [-] compute-feature-enabled.cold_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.578 193 DEBUG tempest [-] auth.default_credentials_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.579 186 DEBUG tempest [-] default_log_levels = ['amqp=WARN', 'amqplib=WARN', 'boto=WARN', 'qpid=WARN', 'sqlalchemy=WARN', 'suds=INFO', 'oslo.messaging=INFO', 'oslo_messaging=INFO', 'iso8601=WARN', 'requests.packages.urllib3.connectionpool=WARN', 'urllib3.connectionpool=WARN', 'websocket=WARN', 'requests.packages.urllib3.util.retry=WARN', 'urllib3.util.retry=WARN', 'keystonemiddleware=WARN', 'routes.middleware=WARN', 'stevedore=WARN', 'taskflow=WARN', 'keystoneauth=WARN', 'oslo.cache=INFO', 'oslo_policy=INFO', 'dogpile.core.dogpile=INFO'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.579 189 DEBUG tempest [-] compute-feature-enabled.config_drive = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.580 193 DEBUG tempest [-] auth.tempest_roles = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.581 186 DEBUG tempest [-] instance_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.581 189 DEBUG tempest [-] compute-feature-enabled.console_output = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.581 193 DEBUG tempest [-] auth.test_accounts_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.582 186 DEBUG tempest [-] instance_uuid_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.583 189 DEBUG tempest [-] compute-feature-enabled.disk_config = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.583 193 DEBUG tempest [-] auth.use_dynamic_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.584 186 DEBUG tempest [-] log_config_append = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.585 189 DEBUG tempest [-] compute-feature-enabled.enable_instance_password = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.585 193 DEBUG tempest [-] compute.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.586 186 DEBUG tempest [-] log_date_format = %Y-%m-%d %H:%M:%S log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.587 189 DEBUG tempest [-] compute-feature-enabled.interface_attach = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.587 193 DEBUG tempest [-] compute.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.588 186 DEBUG tempest [-] log_dir = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.589 189 DEBUG tempest [-] compute-feature-enabled.live_migrate_back_and_forth = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.589 193 DEBUG tempest [-] compute.catalog_type = compute log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.590 186 DEBUG tempest [-] log_file = /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/tempest.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.591 189 DEBUG tempest [-] compute-feature-enabled.live_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.591 193 DEBUG tempest [-] compute.certified_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.591 186 DEBUG tempest [-] log_rotate_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.592 189 DEBUG tempest [-] compute-feature-enabled.metadata_service = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.593 193 DEBUG tempest [-] compute.certified_image_trusted_certs = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.593 186 DEBUG tempest [-] log_rotate_interval_type = days log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.594 189 DEBUG tempest [-] compute-feature-enabled.nova_cert = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.595 193 DEBUG tempest [-] compute.compute_volume_common_az = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.595 186 DEBUG tempest [-] log_rotation_type = none log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.596 189 DEBUG tempest [-] compute-feature-enabled.pause = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.597 193 DEBUG tempest [-] compute.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.597 186 DEBUG tempest [-] logging_context_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [%(request_id)s %(user_identity)s] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.598 189 DEBUG tempest [-] compute-feature-enabled.personality = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.598 186 DEBUG tempest [-] logging_debug_format_suffix = %(funcName)s %(pathname)s:%(lineno)d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.599 193 DEBUG tempest [-] compute.fixed_network_name = patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.600 186 DEBUG tempest [-] logging_default_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [-] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.600 193 DEBUG tempest [-] compute.flavor_ref = 1311a6a1-b18c-4e52-af0a-b273bda5931b log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.601 189 WARNING oslo_config.cfg [-] Deprecated: Option "rdp_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.602 186 DEBUG tempest [-] logging_exception_prefix = %(asctime)s.%(msecs)03d %(process)d ERROR %(name)s %(instance)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.602 193 DEBUG tempest [-] compute.flavor_ref_alt = 8a56823e-8563-423c-896d-50c73f98dd64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.603 189 DEBUG tempest [-] compute-feature-enabled.rdp_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.604 186 DEBUG tempest [-] logging_user_identity_format = %(user)s %(tenant)s %(domain)s %(user_domain)s %(project_domain)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.604 193 DEBUG tempest [-] compute.hypervisor_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.605 189 DEBUG tempest [-] compute-feature-enabled.rescue = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.605 186 DEBUG tempest [-] max_logfile_count = 30 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.606 193 DEBUG tempest [-] compute.image_ref = cd332004-33aa-4c81-9e50-54766a6df097 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.607 186 DEBUG tempest [-] max_logfile_size_mb = 200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.607 189 DEBUG tempest [-] compute-feature-enabled.resize = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.608 193 DEBUG tempest [-] compute.image_ref_alt = 458c165e-1594-40fd-a92a-ce6fd4a85db4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.609 186 DEBUG tempest [-] pause_teardown = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.609 189 WARNING oslo_config.cfg [-] Deprecated: Option "scheduler_available_filters" from group "compute-feature-enabled" is deprecated. Use option "scheduler_enabled_filters" from group "compute-feature-enabled". 2020-12-14 02:13:09.610 193 DEBUG tempest [-] compute.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.611 186 DEBUG tempest [-] publish_errors = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.612 193 DEBUG tempest [-] compute.min_compute_nodes = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.613 186 DEBUG tempest [-] rate_limit_burst = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.612 189 DEBUG tempest [-] compute-feature-enabled.scheduler_enabled_filters = ['AvailabilityZoneFilter', 'ComputeFilter', 'ComputeCapabilitiesFilter', 'ImagePropertiesFilter', 'ServerGroupAntiAffinityFilter', 'ServerGroupAffinityFilter', 'SameHostFilter', 'DifferentHostFilter'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.614 193 DEBUG tempest [-] compute.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.614 186 DEBUG tempest [-] rate_limit_except_level = CRITICAL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.615 189 DEBUG tempest [-] compute-feature-enabled.serial_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.616 193 DEBUG tempest [-] compute.ready_wait = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.616 186 DEBUG tempest [-] rate_limit_interval = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.617 189 DEBUG tempest [-] compute-feature-enabled.shelve = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.618 193 DEBUG tempest [-] compute.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.618 186 DEBUG tempest [-] syslog_log_facility = LOG_USER log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.618 189 DEBUG tempest [-] compute-feature-enabled.shelve_migrate = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.620 193 DEBUG tempest [-] compute.shelved_offload_time = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.620 186 DEBUG tempest [-] use_eventlog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.620 189 DEBUG tempest [-] compute-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.622 186 DEBUG tempest [-] use_journal = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.622 193 DEBUG tempest [-] compute.volume_device_name = sdb log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.623 189 WARNING oslo_config.cfg [-] Deprecated: Option "spice_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.624 186 DEBUG tempest [-] use_json = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.624 193 DEBUG tempest [-] compute-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.625 189 DEBUG tempest [-] compute-feature-enabled.spice_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.626 186 DEBUG tempest [-] use_stderr = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.626 193 DEBUG tempest [-] compute-feature-enabled.attach_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.627 189 DEBUG tempest [-] compute-feature-enabled.stable_rescue = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.627 186 DEBUG tempest [-] use_syslog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.629 193 WARNING oslo_config.cfg [-] Deprecated: Option "block_migrate_cinder_iscsi" from group "compute-feature-enabled" is deprecated for removal (This option duplicates the more generic [compute-feature-enabled]/block_migration _for_live_migration now that MIN_LIBVIRT_VERSION is >= 1.2.17 on all branches from stable/rocky and will be removed in a future release.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.629 186 DEBUG tempest [-] watch_log_file = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:09.629 189 DEBUG tempest [-] compute-feature-enabled.suspend = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.631 193 DEBUG tempest [-] compute-feature-enabled.block_migrate_cinder_iscsi = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.631 186 DEBUG tempest [-] oslo_concurrency.disable_process_locking = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.631 189 DEBUG tempest [-] compute-feature-enabled.swap_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.633 193 DEBUG tempest [-] compute-feature-enabled.block_migration_for_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.633 186 DEBUG tempest [-] oslo_concurrency.lock_path = /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/lock_files log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.633 189 DEBUG tempest [-] compute-feature-enabled.vnc_console = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.635 193 DEBUG tempest [-] compute-feature-enabled.can_migrate_between_any_hosts = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.635 186 DEBUG tempest [-] auth.admin_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.635 189 DEBUG tempest [-] compute-feature-enabled.vnc_server_header = WebSockify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.637 193 DEBUG tempest [-] compute-feature-enabled.change_password = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.637 186 DEBUG tempest [-] auth.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.637 189 DEBUG tempest [-] compute-feature-enabled.volume_backed_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.638 193 DEBUG tempest [-] compute-feature-enabled.cold_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.638 186 DEBUG tempest [-] auth.admin_project_name = patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.639 189 DEBUG tempest [-] compute-feature-enabled.volume_multiattach = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.640 186 DEBUG tempest [-] auth.admin_username = patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.640 193 DEBUG tempest [-] compute-feature-enabled.config_drive = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.640 189 DEBUG tempest [-] compute-feature-enabled.xenapi_apis = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.642 186 DEBUG tempest [-] auth.create_isolated_networks = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.642 193 DEBUG tempest [-] compute-feature-enabled.console_output = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.642 189 DEBUG tempest [-] identity.admin_domain_scope = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.644 186 DEBUG tempest [-] auth.default_credentials_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.644 193 DEBUG tempest [-] compute-feature-enabled.disk_config = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.644 189 DEBUG tempest [-] identity.admin_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.646 186 DEBUG tempest [-] auth.tempest_roles = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.646 193 DEBUG tempest [-] compute-feature-enabled.enable_instance_password = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.646 189 DEBUG tempest [-] identity.auth_version = v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.648 186 DEBUG tempest [-] auth.test_accounts_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.648 193 DEBUG tempest [-] compute-feature-enabled.interface_attach = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.648 189 DEBUG tempest [-] identity.ca_certificates_file = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.650 186 DEBUG tempest [-] auth.use_dynamic_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.650 193 DEBUG tempest [-] compute-feature-enabled.live_migrate_back_and_forth = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.650 189 DEBUG tempest [-] identity.catalog_type = identity log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.652 186 DEBUG tempest [-] compute.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.652 193 DEBUG tempest [-] compute-feature-enabled.live_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.652 189 DEBUG tempest [-] identity.default_domain_id = default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.653 186 DEBUG tempest [-] compute.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.654 193 DEBUG tempest [-] compute-feature-enabled.metadata_service = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.654 189 DEBUG tempest [-] identity.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.655 186 DEBUG tempest [-] compute.catalog_type = compute log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.656 193 DEBUG tempest [-] compute-feature-enabled.nova_cert = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.656 189 DEBUG tempest [-] identity.region = RegionOne log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.657 186 DEBUG tempest [-] compute.certified_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.658 193 DEBUG tempest [-] compute-feature-enabled.pause = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.658 189 DEBUG tempest [-] identity.uri = http://172.30.13.94/identity/v2.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.659 186 DEBUG tempest [-] compute.certified_image_trusted_certs = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.659 193 DEBUG tempest [-] compute-feature-enabled.personality = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.659 189 DEBUG tempest [-] identity.uri_v3 = http://172.30.13.94/identity/v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.660 186 DEBUG tempest [-] compute.compute_volume_common_az = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.661 189 DEBUG tempest [-] identity.user_lockout_duration = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.662 193 WARNING oslo_config.cfg [-] Deprecated: Option "rdp_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.662 186 DEBUG tempest [-] compute.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.663 189 DEBUG tempest [-] identity.user_lockout_failure_attempts = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.664 186 DEBUG tempest [-] compute.fixed_network_name = patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.664 193 DEBUG tempest [-] compute-feature-enabled.rdp_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.665 189 DEBUG tempest [-] identity.user_unique_last_password_count = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.666 186 DEBUG tempest [-] compute.flavor_ref = 1311a6a1-b18c-4e52-af0a-b273bda5931b log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.666 193 DEBUG tempest [-] compute-feature-enabled.rescue = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.667 189 DEBUG tempest [-] identity.v2_admin_endpoint_type = adminURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.668 186 DEBUG tempest [-] compute.flavor_ref_alt = 8a56823e-8563-423c-896d-50c73f98dd64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.668 193 DEBUG tempest [-] compute-feature-enabled.resize = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.669 189 DEBUG tempest [-] identity.v2_public_endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.670 186 DEBUG tempest [-] compute.hypervisor_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.671 193 WARNING oslo_config.cfg [-] Deprecated: Option "scheduler_available_filters" from group "compute-feature-enabled" is deprecated. Use option "scheduler_enabled_filters" from group "compute-feature-enabled". 2020-12-14 02:13:09.671 189 DEBUG tempest [-] identity.v3_endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.672 186 DEBUG tempest [-] compute.image_ref = cd332004-33aa-4c81-9e50-54766a6df097 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.673 189 DEBUG tempest [-] service-clients.http_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.673 193 DEBUG tempest [-] compute-feature-enabled.scheduler_enabled_filters = ['AvailabilityZoneFilter', 'ComputeFilter', 'ComputeCapabilitiesFilter', 'ImagePropertiesFilter', 'ServerGroupAntiAffinityFilter', 'ServerGroupAffinityFilter', 'SameHostFilter', 'DifferentHostFilter'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.673 186 DEBUG tempest [-] compute.image_ref_alt = 458c165e-1594-40fd-a92a-ce6fd4a85db4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.675 189 DEBUG tempest [-] service-clients.proxy_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.675 193 DEBUG tempest [-] compute-feature-enabled.serial_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.675 186 DEBUG tempest [-] compute.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.677 189 DEBUG tempest [-] identity-feature-enabled.access_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.677 193 DEBUG tempest [-] compute-feature-enabled.shelve = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.677 186 DEBUG tempest [-] compute.min_compute_nodes = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.679 189 DEBUG tempest [-] identity-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.679 193 DEBUG tempest [-] compute-feature-enabled.shelve_migrate = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.679 186 DEBUG tempest [-] compute.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.681 186 DEBUG tempest [-] compute.ready_wait = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.681 193 DEBUG tempest [-] compute-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.681 189 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "identity-feature-enabled" is deprecated for removal (The identity v2.0 API was removed in the Queens release. Tests that exercise the v2.0 API will be removed from tempest in the v22.0.0 release. They are kept only to test stable branches.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.683 186 DEBUG tempest [-] compute.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.683 189 DEBUG tempest [-] identity-feature-enabled.api_v2 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.683 193 WARNING oslo_config.cfg [-] Deprecated: Option "spice_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.684 186 DEBUG tempest [-] compute.shelved_offload_time = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.685 189 DEBUG tempest [-] identity-feature-enabled.api_v2_admin = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.685 193 DEBUG tempest [-] compute-feature-enabled.spice_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.686 186 DEBUG tempest [-] compute.volume_device_name = sdb log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.687 189 DEBUG tempest [-] identity-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.687 193 DEBUG tempest [-] compute-feature-enabled.stable_rescue = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.688 186 DEBUG tempest [-] compute-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.689 189 DEBUG tempest [-] identity-feature-enabled.application_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.689 193 DEBUG tempest [-] compute-feature-enabled.suspend = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.690 186 DEBUG tempest [-] compute-feature-enabled.attach_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.691 189 DEBUG tempest [-] identity-feature-enabled.domain_specific_drivers = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.691 193 DEBUG tempest [-] compute-feature-enabled.swap_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.693 189 DEBUG tempest [-] identity-feature-enabled.external_idp = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.693 186 WARNING oslo_config.cfg [-] Deprecated: Option "block_migrate_cinder_iscsi" from group "compute-feature-enabled" is deprecated for removal (This option duplicates the more generic [compute-feature-enabled]/block_migration _for_live_migration now that MIN_LIBVIRT_VERSION is >= 1.2.17 on all branches from stable/rocky and will be removed in a future release.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.693 193 DEBUG tempest [-] compute-feature-enabled.vnc_console = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.695 189 DEBUG tempest [-] identity-feature-enabled.federation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.694 186 DEBUG tempest [-] compute-feature-enabled.block_migrate_cinder_iscsi = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.695 193 DEBUG tempest [-] compute-feature-enabled.vnc_server_header = WebSockify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.697 189 DEBUG tempest [-] identity-feature-enabled.immutable_user_source = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.697 186 DEBUG tempest [-] compute-feature-enabled.block_migration_for_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.697 193 DEBUG tempest [-] compute-feature-enabled.volume_backed_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.698 189 DEBUG tempest [-] identity-feature-enabled.project_tags = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.699 186 DEBUG tempest [-] compute-feature-enabled.can_migrate_between_any_hosts = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.699 193 DEBUG tempest [-] compute-feature-enabled.volume_multiattach = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.700 189 DEBUG tempest [-] identity-feature-enabled.security_compliance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.700 186 DEBUG tempest [-] compute-feature-enabled.change_password = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.701 193 DEBUG tempest [-] compute-feature-enabled.xenapi_apis = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.702 189 DEBUG tempest [-] identity-feature-enabled.trust = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.702 186 DEBUG tempest [-] compute-feature-enabled.cold_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.703 193 DEBUG tempest [-] identity.admin_domain_scope = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.704 189 DEBUG tempest [-] image.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.704 186 DEBUG tempest [-] compute-feature-enabled.config_drive = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.705 193 DEBUG tempest [-] identity.admin_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.706 189 DEBUG tempest [-] image.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.706 186 DEBUG tempest [-] compute-feature-enabled.console_output = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.706 193 DEBUG tempest [-] identity.auth_version = v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.708 186 DEBUG tempest [-] compute-feature-enabled.disk_config = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.708 189 DEBUG tempest [-] image.catalog_type = image log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.708 193 DEBUG tempest [-] identity.ca_certificates_file = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.710 186 DEBUG tempest [-] compute-feature-enabled.enable_instance_password = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.710 189 DEBUG tempest [-] image.container_formats = ['ami', 'ari', 'aki', 'bare', 'ovf', 'ova'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.710 193 DEBUG tempest [-] identity.catalog_type = identity log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.711 186 DEBUG tempest [-] compute-feature-enabled.interface_attach = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.712 193 DEBUG tempest [-] identity.default_domain_id = default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.713 189 DEBUG tempest [-] image.disk_formats = ['ami', 'ari', 'aki', 'vhd', 'vmdk', 'raw', 'qcow2', 'vdi', 'iso', 'vhdx'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.713 186 DEBUG tempest [-] compute-feature-enabled.live_migrate_back_and_forth = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.714 193 DEBUG tempest [-] identity.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.715 189 DEBUG tempest [-] image.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.715 186 DEBUG tempest [-] compute-feature-enabled.live_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.716 193 DEBUG tempest [-] identity.region = RegionOne log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.716 189 DEBUG tempest [-] image.http_image = http://download.cirros-cloud.net/0.3.1/cirros-0.3.1-x86_64-uec.tar.gz log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.717 186 DEBUG tempest [-] compute-feature-enabled.metadata_service = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.718 193 DEBUG tempest [-] identity.uri = http://172.30.13.94/identity/v2.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.718 189 DEBUG tempest [-] image.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.719 186 DEBUG tempest [-] compute-feature-enabled.nova_cert = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.719 193 DEBUG tempest [-] identity.uri_v3 = http://172.30.13.94/identity/v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.720 186 DEBUG tempest [-] compute-feature-enabled.pause = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.721 189 WARNING oslo_config.cfg [-] Deprecated: Option "api_v1" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.721 193 DEBUG tempest [-] identity.user_lockout_duration = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.722 186 DEBUG tempest [-] compute-feature-enabled.personality = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.723 189 DEBUG tempest [-] image-feature-enabled.api_v1 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.723 193 DEBUG tempest [-] identity.user_lockout_failure_attempts = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.725 186 WARNING oslo_config.cfg [-] Deprecated: Option "rdp_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.725 193 DEBUG tempest [-] identity.user_unique_last_password_count = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.726 189 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.726 186 DEBUG tempest [-] compute-feature-enabled.rdp_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.727 193 DEBUG tempest [-] identity.v2_admin_endpoint_type = adminURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.727 189 DEBUG tempest [-] image-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.729 186 DEBUG tempest [-] compute-feature-enabled.rescue = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.729 193 DEBUG tempest [-] identity.v2_public_endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.730 189 DEBUG tempest [-] image-feature-enabled.import_image = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.730 186 DEBUG tempest [-] compute-feature-enabled.resize = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.731 193 DEBUG tempest [-] identity.v3_endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.732 189 DEBUG tempest [-] network.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.733 193 DEBUG tempest [-] service-clients.http_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.733 186 WARNING oslo_config.cfg [-] Deprecated: Option "scheduler_available_filters" from group "compute-feature-enabled" is deprecated. Use option "scheduler_enabled_filters" from group "compute-feature-enabled". 2020-12-14 02:13:09.733 189 DEBUG tempest [-] network.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.735 193 DEBUG tempest [-] service-clients.proxy_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.735 186 DEBUG tempest [-] compute-feature-enabled.scheduler_enabled_filters = ['AvailabilityZoneFilter', 'ComputeFilter', 'ComputeCapabilitiesFilter', 'ImagePropertiesFilter', 'ServerGroupAntiAffinityFilter', 'ServerGroupAffinityFilter', 'SameHostFilter', 'DifferentHostFilter'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.735 189 DEBUG tempest [-] network.catalog_type = network log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.737 193 DEBUG tempest [-] identity-feature-enabled.access_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.737 186 DEBUG tempest [-] compute-feature-enabled.serial_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.737 189 DEBUG tempest [-] network.default_network = ['192.168.120.0/24'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.739 193 DEBUG tempest [-] identity-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.739 186 DEBUG tempest [-] compute-feature-enabled.shelve = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.739 189 DEBUG tempest [-] network.dns_servers = ['8.8.8.8', '8.8.4.4'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.741 186 DEBUG tempest [-] compute-feature-enabled.shelve_migrate = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.741 189 DEBUG tempest [-] network.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.741 193 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "identity-feature-enabled" is deprecated for removal (The identity v2.0 API was removed in the Queens release. Tests that exercise the v2.0 API will be removed from tempest in the v22.0.0 release. They are kept only to test stable branches.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.743 186 DEBUG tempest [-] compute-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.743 189 DEBUG tempest [-] network.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.743 193 DEBUG tempest [-] identity-feature-enabled.api_v2 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.745 189 DEBUG tempest [-] network.port_profile = {} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.745 186 WARNING oslo_config.cfg [-] Deprecated: Option "spice_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.746 193 DEBUG tempest [-] identity-feature-enabled.api_v2_admin = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.747 189 DEBUG tempest [-] network.port_vnic_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.747 186 DEBUG tempest [-] compute-feature-enabled.spice_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.747 193 DEBUG tempest [-] identity-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.749 189 DEBUG tempest [-] network.project_network_cidr = 192.168.120.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.749 186 DEBUG tempest [-] compute-feature-enabled.stable_rescue = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.749 193 DEBUG tempest [-] identity-feature-enabled.application_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.751 189 DEBUG tempest [-] network.project_network_mask_bits = 28 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.751 186 DEBUG tempest [-] compute-feature-enabled.suspend = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.751 193 DEBUG tempest [-] identity-feature-enabled.domain_specific_drivers = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.752 189 DEBUG tempest [-] network.project_network_v6_cidr = 2001:db8::/48 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.752 186 DEBUG tempest [-] compute-feature-enabled.swap_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.753 193 DEBUG tempest [-] identity-feature-enabled.external_idp = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.754 189 DEBUG tempest [-] network.project_network_v6_mask_bits = 64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.754 186 DEBUG tempest [-] compute-feature-enabled.vnc_console = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.755 193 DEBUG tempest [-] identity-feature-enabled.federation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.756 189 DEBUG tempest [-] network.project_networks_reachable = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.756 186 DEBUG tempest [-] compute-feature-enabled.vnc_server_header = WebSockify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.757 193 DEBUG tempest [-] identity-feature-enabled.immutable_user_source = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.758 189 DEBUG tempest [-] network.public_network_id = 3fe4fc32-89a3-4f72-b166-6eb7100e1fea log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.758 186 DEBUG tempest [-] compute-feature-enabled.volume_backed_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.758 193 DEBUG tempest [-] identity-feature-enabled.project_tags = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.760 186 DEBUG tempest [-] compute-feature-enabled.volume_multiattach = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.760 189 DEBUG tempest [-] network.public_router_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.760 193 DEBUG tempest [-] identity-feature-enabled.security_compliance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.762 186 DEBUG tempest [-] compute-feature-enabled.xenapi_apis = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.762 189 DEBUG tempest [-] network.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.762 193 DEBUG tempest [-] identity-feature-enabled.trust = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.763 186 DEBUG tempest [-] identity.admin_domain_scope = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.764 189 DEBUG tempest [-] network.shared_physical_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.764 193 DEBUG tempest [-] image.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.765 186 DEBUG tempest [-] identity.admin_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.766 189 DEBUG tempest [-] network.subnet_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.766 193 DEBUG tempest [-] image.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.767 186 DEBUG tempest [-] identity.auth_version = v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.768 193 DEBUG tempest [-] image.catalog_type = image log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.769 186 DEBUG tempest [-] identity.ca_certificates_file = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.769 189 DEBUG tempest [-] network-feature-enabled.api_extensions = ['address-group', 'address-scope', 'router-admin-state-down-before-update', 'agent', 'agent-resources-synced', 'allowed-address-pairs', 'auto-allocated-topology', 'availability_zone', 'availability_zone_filter', 'default-subnetpools', 'dhcp_agent_scheduler', 'dns-integration', 'dns-domain-ports', 'dvr', 'empty-string-filtering', 'expose-port-forwarding-in-fip', 'external-net', 'extra_dhcp_opt', 'extraroute', 'extraroute-atomic', 'filter-validation', 'floating-ip-port-forwarding-description', 'fip-port-details', 'flavors', 'floating-ip-port-forwarding', 'floatingip-pools', 'ip_allocation', 'ip-substring-filtering', 'l2_adjacency', 'router', 'ext-gw-mode', 'l3-ha', 'l3-flavors', 'l3-port-ip-change-not-allowed', 'l3_agent_scheduler', 'logging', 'multi-provider', 'net-mtu', 'net-mtu-writable', 'network_availability_zone', 'network-ip-availability', 'pagination', 'port-mac-address-regenerate', 'port-resource-request', 'binding', 'binding-extended', 'port-security', 'project-id', 'provider', 'qos', 'qos-bw-limit-direction', 'qos-bw-minimum-ingress', 'qos-default', 'qos-fip', 'qos-gateway-ip', 'qos-port-network-policy', 'qos-rule-type-details', 'qos-rules-alias', 'quotas', 'quota_details', 'rbac-policies', 'rbac-address-scope', 'rbac-security-groups', 'rbac-subnetpool', 'revision-if-match', 'standard-attr-revisions', 'router_availability_zone', 'port-security-groups-filtering', 'security-group', 'segment', 'segments-peer-subnet-host-routes', 'service-type', 'sorting', 'standard-attr-segment', 'standard-attr-description', 'stateful-security-group', 'subnet-dns-publish-fixed-ip', 'subnet_onboard', 'subnet-segmentid-writable', 'subnet-service-types', 'subnet_allocation', 'subnetpool-prefix-ops', 'standard-attr-tag', 'standard-attr-timestamp', 'trunk', 'trunk-details'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.770 193 DEBUG tempest [-] image.container_formats = ['ami', 'ari', 'aki', 'bare', 'ovf', 'ova'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.771 186 DEBUG tempest [-] identity.catalog_type = identity log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.772 189 DEBUG tempest [-] network-feature-enabled.available_features = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.773 186 DEBUG tempest [-] identity.default_domain_id = default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.773 193 DEBUG tempest [-] image.disk_formats = ['ami', 'ari', 'aki', 'vhd', 'vmdk', 'raw', 'qcow2', 'vdi', 'iso', 'vhdx'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.774 189 DEBUG tempest [-] network-feature-enabled.floating_ips = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.775 186 DEBUG tempest [-] identity.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.775 193 DEBUG tempest [-] image.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.776 189 DEBUG tempest [-] network-feature-enabled.ipv6 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.777 186 DEBUG tempest [-] identity.region = RegionOne log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.777 193 DEBUG tempest [-] image.http_image = http://download.cirros-cloud.net/0.3.1/cirros-0.3.1-x86_64-uec.tar.gz log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.778 189 DEBUG tempest [-] network-feature-enabled.ipv6_subnet_attributes = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.779 186 DEBUG tempest [-] identity.uri = http://172.30.13.94/identity/v2.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.779 193 DEBUG tempest [-] image.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.780 189 DEBUG tempest [-] network-feature-enabled.port_admin_state_change = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.780 186 DEBUG tempest [-] identity.uri_v3 = http://172.30.13.94/identity/v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.781 189 DEBUG tempest [-] network-feature-enabled.port_security = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.782 193 WARNING oslo_config.cfg [-] Deprecated: Option "api_v1" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.782 186 DEBUG tempest [-] identity.user_lockout_duration = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.783 189 DEBUG tempest [-] network-feature-enabled.provider_net_base_segmentation_id = 3000 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.784 186 DEBUG tempest [-] identity.user_lockout_failure_attempts = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.784 193 DEBUG tempest [-] image-feature-enabled.api_v1 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.785 189 DEBUG tempest [-] network-feature-enabled.qos_placement_physnet = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.786 186 DEBUG tempest [-] identity.user_unique_last_password_count = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.786 193 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.787 189 DEBUG tempest [-] validation.auth_method = keypair log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.788 186 DEBUG tempest [-] identity.v2_admin_endpoint_type = adminURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.788 193 DEBUG tempest [-] image-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.789 189 DEBUG tempest [-] validation.connect_method = floating log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.790 186 DEBUG tempest [-] identity.v2_public_endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.791 193 DEBUG tempest [-] image-feature-enabled.import_image = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.791 189 DEBUG tempest [-] validation.connect_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.791 186 DEBUG tempest [-] identity.v3_endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.793 193 DEBUG tempest [-] network.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.793 189 DEBUG tempest [-] validation.floating_ip_range = 10.0.0.0/29 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.793 186 DEBUG tempest [-] service-clients.http_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.794 193 DEBUG tempest [-] network.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.794 189 DEBUG tempest [-] validation.image_alt_ssh_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.795 186 DEBUG tempest [-] service-clients.proxy_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.796 193 DEBUG tempest [-] network.catalog_type = network log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.796 189 DEBUG tempest [-] validation.image_alt_ssh_user = root log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.797 186 DEBUG tempest [-] identity-feature-enabled.access_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.798 193 DEBUG tempest [-] network.default_network = ['192.168.120.0/24'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.798 189 DEBUG tempest [-] validation.image_ssh_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.799 186 DEBUG tempest [-] identity-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.800 189 DEBUG tempest [-] validation.image_ssh_user = cirros log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.800 193 DEBUG tempest [-] network.dns_servers = ['8.8.8.8', '8.8.4.4'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.801 186 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "identity-feature-enabled" is deprecated for removal (The identity v2.0 API was removed in the Queens release. Tests that exercise the v2.0 API will be removed from tempest in the v22.0.0 release. They are kept only to test stable branches.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.802 189 DEBUG tempest [-] validation.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.802 193 DEBUG tempest [-] network.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.803 186 DEBUG tempest [-] identity-feature-enabled.api_v2 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.804 189 DEBUG tempest [-] validation.network_for_ssh = patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.804 193 DEBUG tempest [-] network.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.805 186 DEBUG tempest [-] identity-feature-enabled.api_v2_admin = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.806 189 DEBUG tempest [-] validation.ping_count = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.806 193 DEBUG tempest [-] network.port_profile = {} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.807 186 DEBUG tempest [-] identity-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.808 189 DEBUG tempest [-] validation.ping_size = 56 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.808 193 DEBUG tempest [-] network.port_vnic_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.809 186 DEBUG tempest [-] identity-feature-enabled.application_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.809 189 DEBUG tempest [-] validation.ping_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.810 193 DEBUG tempest [-] network.project_network_cidr = 192.168.120.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.811 186 DEBUG tempest [-] identity-feature-enabled.domain_specific_drivers = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.811 189 DEBUG tempest [-] validation.run_validation = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.812 193 DEBUG tempest [-] network.project_network_mask_bits = 28 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.812 186 DEBUG tempest [-] identity-feature-enabled.external_idp = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.813 189 DEBUG tempest [-] validation.security_group = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.814 193 DEBUG tempest [-] network.project_network_v6_cidr = 2001:db8::/48 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.814 186 DEBUG tempest [-] identity-feature-enabled.federation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.815 189 DEBUG tempest [-] validation.security_group_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.815 193 DEBUG tempest [-] network.project_network_v6_mask_bits = 64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.816 186 DEBUG tempest [-] identity-feature-enabled.immutable_user_source = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.817 189 DEBUG tempest [-] validation.ssh_shell_prologue = set -eu -o pipefail; PATH=$PATH:/sbin:/usr/sbin; log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.817 193 DEBUG tempest [-] network.project_networks_reachable = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.818 186 DEBUG tempest [-] identity-feature-enabled.project_tags = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.819 189 DEBUG tempest [-] validation.ssh_timeout = 196 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.819 193 DEBUG tempest [-] network.public_network_id = 3fe4fc32-89a3-4f72-b166-6eb7100e1fea log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.820 186 DEBUG tempest [-] identity-feature-enabled.security_compliance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.821 189 DEBUG tempest [-] volume.backend_names = ['BACKEND_1', 'BACKEND_2'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.821 193 DEBUG tempest [-] network.public_router_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.822 186 DEBUG tempest [-] identity-feature-enabled.trust = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.823 189 DEBUG tempest [-] volume.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.823 193 DEBUG tempest [-] network.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.824 186 DEBUG tempest [-] image.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.825 189 DEBUG tempest [-] volume.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.825 193 DEBUG tempest [-] network.shared_physical_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.826 186 DEBUG tempest [-] image.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.827 189 DEBUG tempest [-] volume.catalog_type = volumev3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.827 193 DEBUG tempest [-] network.subnet_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.827 186 DEBUG tempest [-] image.catalog_type = image log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.829 189 DEBUG tempest [-] volume.disk_format = raw log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.830 186 DEBUG tempest [-] image.container_formats = ['ami', 'ari', 'aki', 'bare', 'ovf', 'ova'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.831 189 DEBUG tempest [-] volume.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.831 193 DEBUG tempest [-] network-feature-enabled.api_extensions = ['address-group', 'address-scope', 'router-admin-state-down-before-update', 'agent', 'agent-resources-synced', 'allowed-address-pairs', 'auto-allocated-topology', 'availability_zone', 'availability_zone_filter', 'default-subnetpools', 'dhcp_agent_scheduler', 'dns-integration', 'dns-domain-ports', 'dvr', 'empty-string-filtering', 'expose-port-forwarding-in-fip', 'external-net', 'extra_dhcp_opt', 'extraroute', 'extraroute-atomic', 'filter-validation', 'floating-ip-port-forwarding-description', 'fip-port-details', 'flavors', 'floating-ip-port-forwarding', 'floatingip-pools', 'ip_allocation', 'ip-substring-filtering', 'l2_adjacency', 'router', 'ext-gw-mode', 'l3-ha', 'l3-flavors', 'l3-port-ip-change-not-allowed', 'l3_agent_scheduler', 'logging', 'multi-provider', 'net-mtu', 'net-mtu-writable', 'network_availability_zone', 'network-ip-availability', 'pagination', 'port-mac-address-regenerate', 'port-resource-request', 'binding', 'binding-extended', 'port-security', 'project-id', 'provider', 'qos', 'qos-bw-limit-direction', 'qos-bw-minimum-ingress', 'qos-default', 'qos-fip', 'qos-gateway-ip', 'qos-port-network-policy', 'qos-rule-type-details', 'qos-rules-alias', 'quotas', 'quota_details', 'rbac-policies', 'rbac-address-scope', 'rbac-security-groups', 'rbac-subnetpool', 'revision-if-match', 'standard-attr-revisions', 'router_availability_zone', 'port-security-groups-filtering', 'security-group', 'segment', 'segments-peer-subnet-host-routes', 'service-type', 'sorting', 'standard-attr-segment', 'standard-attr-description', 'stateful-security-group', 'subnet-dns-publish-fixed-ip', 'subnet_onboard', 'subnet-segmentid-writable', 'subnet-service-types', 'subnet_allocation', 'subnetpool-prefix-ops', 'standard-attr-tag', 'standard-attr-timestamp', 'trunk', 'trunk-details'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.832 186 DEBUG tempest [-] image.disk_formats = ['ami', 'ari', 'aki', 'vhd', 'vmdk', 'raw', 'qcow2', 'vdi', 'iso', 'vhdx'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.833 189 DEBUG tempest [-] volume.manage_snapshot_ref = ['source-name', 'snapshot-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.833 193 DEBUG tempest [-] network-feature-enabled.available_features = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.834 186 DEBUG tempest [-] image.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.835 189 DEBUG tempest [-] volume.manage_volume_ref = ['source-name', 'volume-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.835 193 DEBUG tempest [-] network-feature-enabled.floating_ips = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.836 186 DEBUG tempest [-] image.http_image = http://download.cirros-cloud.net/0.3.1/cirros-0.3.1-x86_64-uec.tar.gz log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.837 189 DEBUG tempest [-] volume.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.837 193 DEBUG tempest [-] network-feature-enabled.ipv6 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.838 186 DEBUG tempest [-] image.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.838 189 DEBUG tempest [-] volume.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.839 193 DEBUG tempest [-] network-feature-enabled.ipv6_subnet_attributes = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.840 189 DEBUG tempest [-] volume.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.840 186 WARNING oslo_config.cfg [-] Deprecated: Option "api_v1" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.841 193 DEBUG tempest [-] network-feature-enabled.port_admin_state_change = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.842 189 DEBUG tempest [-] volume.storage_protocol = ceph log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.842 186 DEBUG tempest [-] image-feature-enabled.api_v1 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.843 193 DEBUG tempest [-] network-feature-enabled.port_security = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.844 189 DEBUG tempest [-] volume.vendor_name = Open Source log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.845 193 DEBUG tempest [-] network-feature-enabled.provider_net_base_segmentation_id = 3000 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.845 186 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-12-14 02:13:09.846 189 DEBUG tempest [-] volume.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.846 193 DEBUG tempest [-] network-feature-enabled.qos_placement_physnet = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.847 186 DEBUG tempest [-] image-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.848 189 DEBUG tempest [-] volume-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.849 193 DEBUG tempest [-] validation.auth_method = keypair log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.849 186 DEBUG tempest [-] image-feature-enabled.import_image = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.850 189 DEBUG tempest [-] volume-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.850 193 DEBUG tempest [-] validation.connect_method = floating log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.851 186 DEBUG tempest [-] network.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.852 189 DEBUG tempest [-] volume-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.852 193 DEBUG tempest [-] validation.connect_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.853 186 DEBUG tempest [-] network.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.854 189 DEBUG tempest [-] volume-feature-enabled.backup = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.854 193 DEBUG tempest [-] validation.floating_ip_range = 10.0.0.0/29 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.855 186 DEBUG tempest [-] network.catalog_type = network log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.856 189 DEBUG tempest [-] volume-feature-enabled.clone = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.856 193 DEBUG tempest [-] validation.image_alt_ssh_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.857 186 DEBUG tempest [-] network.default_network = ['192.168.120.0/24'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.858 189 DEBUG tempest [-] volume-feature-enabled.consistency_group = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.858 193 DEBUG tempest [-] validation.image_alt_ssh_user = root log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.859 186 DEBUG tempest [-] network.dns_servers = ['8.8.8.8', '8.8.4.4'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.860 189 DEBUG tempest [-] volume-feature-enabled.extend_attached_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.860 193 DEBUG tempest [-] validation.image_ssh_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.861 186 DEBUG tempest [-] network.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.862 189 DEBUG tempest [-] volume-feature-enabled.extend_attached_volume = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.862 193 DEBUG tempest [-] validation.image_ssh_user = cirros log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.863 186 DEBUG tempest [-] network.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.864 189 DEBUG tempest [-] volume-feature-enabled.manage_snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.864 193 DEBUG tempest [-] validation.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.865 186 DEBUG tempest [-] network.port_profile = {} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.866 189 DEBUG tempest [-] volume-feature-enabled.manage_volume = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.866 193 DEBUG tempest [-] validation.network_for_ssh = patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.866 186 DEBUG tempest [-] network.port_vnic_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.867 189 DEBUG tempest [-] volume-feature-enabled.multi_backend = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.868 193 DEBUG tempest [-] validation.ping_count = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.868 186 DEBUG tempest [-] network.project_network_cidr = 192.168.120.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.869 189 DEBUG tempest [-] volume-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.870 193 DEBUG tempest [-] validation.ping_size = 56 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.870 186 DEBUG tempest [-] network.project_network_mask_bits = 28 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.871 189 DEBUG tempest [-] volume-feature-enabled.volume_revert = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.872 193 DEBUG tempest [-] validation.ping_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.872 186 DEBUG tempest [-] network.project_network_v6_cidr = 2001:db8::/48 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.873 189 DEBUG tempest [-] object-storage.catalog_type = object-store log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.874 186 DEBUG tempest [-] network.project_network_v6_mask_bits = 64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.874 193 DEBUG tempest [-] validation.run_validation = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.875 189 DEBUG tempest [-] object-storage.cluster_name = name1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.875 186 DEBUG tempest [-] network.project_networks_reachable = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.875 193 DEBUG tempest [-] validation.security_group = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.877 189 DEBUG tempest [-] object-storage.container_sync_interval = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.877 186 DEBUG tempest [-] network.public_network_id = 3fe4fc32-89a3-4f72-b166-6eb7100e1fea log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.877 193 DEBUG tempest [-] validation.security_group_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.879 189 DEBUG tempest [-] object-storage.container_sync_timeout = 600 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.879 186 DEBUG tempest [-] network.public_router_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.879 193 DEBUG tempest [-] validation.ssh_shell_prologue = set -eu -o pipefail; PATH=$PATH:/sbin:/usr/sbin; log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.880 189 DEBUG tempest [-] object-storage.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.881 186 DEBUG tempest [-] network.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.881 193 DEBUG tempest [-] validation.ssh_timeout = 196 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.882 189 DEBUG tempest [-] object-storage.operator_role = member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.883 186 DEBUG tempest [-] network.shared_physical_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.883 193 DEBUG tempest [-] volume.backend_names = ['BACKEND_1', 'BACKEND_2'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.884 189 DEBUG tempest [-] object-storage.realm_name = realm1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.885 186 DEBUG tempest [-] network.subnet_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.885 193 DEBUG tempest [-] volume.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.886 189 DEBUG tempest [-] object-storage.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.887 193 DEBUG tempest [-] volume.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.888 189 DEBUG tempest [-] object-storage.reseller_admin_role = ResellerAdmin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.888 186 DEBUG tempest [-] network-feature-enabled.api_extensions = ['address-group', 'address-scope', 'router-admin-state-down-before-update', 'agent', 'agent-resources-synced', 'allowed-address-pairs', 'auto-allocated-topology', 'availability_zone', 'availability_zone_filter', 'default-subnetpools', 'dhcp_agent_scheduler', 'dns-integration', 'dns-domain-ports', 'dvr', 'empty-string-filtering', 'expose-port-forwarding-in-fip', 'external-net', 'extra_dhcp_opt', 'extraroute', 'extraroute-atomic', 'filter-validation', 'floating-ip-port-forwarding-description', 'fip-port-details', 'flavors', 'floating-ip-port-forwarding', 'floatingip-pools', 'ip_allocation', 'ip-substring-filtering', 'l2_adjacency', 'router', 'ext-gw-mode', 'l3-ha', 'l3-flavors', 'l3-port-ip-change-not-allowed', 'l3_agent_scheduler', 'logging', 'multi-provider', 'net-mtu', 'net-mtu-writable', 'network_availability_zone', 'network-ip-availability', 'pagination', 'port-mac-address-regenerate', 'port-resource-request', 'binding', 'binding-extended', 'port-security', 'project-id', 'provider', 'qos', 'qos-bw-limit-direction', 'qos-bw-minimum-ingress', 'qos-default', 'qos-fip', 'qos-gateway-ip', 'qos-port-network-policy', 'qos-rule-type-details', 'qos-rules-alias', 'quotas', 'quota_details', 'rbac-policies', 'rbac-address-scope', 'rbac-security-groups', 'rbac-subnetpool', 'revision-if-match', 'standard-attr-revisions', 'router_availability_zone', 'port-security-groups-filtering', 'security-group', 'segment', 'segments-peer-subnet-host-routes', 'service-type', 'sorting', 'standard-attr-segment', 'standard-attr-description', 'stateful-security-group', 'subnet-dns-publish-fixed-ip', 'subnet_onboard', 'subnet-segmentid-writable', 'subnet-service-types', 'subnet_allocation', 'subnetpool-prefix-ops', 'standard-attr-tag', 'standard-attr-timestamp', 'trunk', 'trunk-details'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.889 193 DEBUG tempest [-] volume.catalog_type = volumev3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.890 189 DEBUG tempest [-] object-storage-feature-enabled.container_sync = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.891 186 DEBUG tempest [-] network-feature-enabled.available_features = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.891 193 DEBUG tempest [-] volume.disk_format = raw log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.892 189 DEBUG tempest [-] object-storage-feature-enabled.discoverability = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.892 186 DEBUG tempest [-] network-feature-enabled.floating_ips = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.893 193 DEBUG tempest [-] volume.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.894 189 DEBUG tempest [-] object-storage-feature-enabled.discoverable_apis = ['account_quotas', 'formpost', 'bulk_upload', 'bulk_delete', 'tempurl', 'crossdomain', 'container_quotas', 'staticweb', 'account_quotas', 'slo'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.894 186 DEBUG tempest [-] network-feature-enabled.ipv6 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.895 193 DEBUG tempest [-] volume.manage_snapshot_ref = ['source-name', 'snapshot-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.896 186 DEBUG tempest [-] network-feature-enabled.ipv6_subnet_attributes = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.896 189 DEBUG tempest [-] object-storage-feature-enabled.object_versioning = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.897 193 DEBUG tempest [-] volume.manage_volume_ref = ['source-name', 'volume-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.898 186 DEBUG tempest [-] network-feature-enabled.port_admin_state_change = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.899 189 DEBUG tempest [-] scenario.dhcp_client = udhcpc log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.899 193 DEBUG tempest [-] volume.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.900 186 DEBUG tempest [-] network-feature-enabled.port_security = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.901 189 DEBUG tempest [-] scenario.img_container_format = bare log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.901 193 DEBUG tempest [-] volume.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.902 186 DEBUG tempest [-] network-feature-enabled.provider_net_base_segmentation_id = 3000 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.903 193 DEBUG tempest [-] volume.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.903 189 WARNING oslo_config.cfg [-] Deprecated: Option "img_dir" from group "scenario" is deprecated for removal. Its value may be silently ignored in the future. 2020-12-14 02:13:09.904 186 DEBUG tempest [-] network-feature-enabled.qos_placement_physnet = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.905 193 DEBUG tempest [-] volume.storage_protocol = ceph log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.905 189 DEBUG tempest [-] scenario.img_dir = /home/opnfv/functest/images log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.906 186 DEBUG tempest [-] validation.auth_method = keypair log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.907 193 DEBUG tempest [-] volume.vendor_name = Open Source log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.907 189 DEBUG tempest [-] scenario.img_disk_format = qcow2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.908 186 DEBUG tempest [-] validation.connect_method = floating log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.909 193 DEBUG tempest [-] volume.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.909 189 DEBUG tempest [-] scenario.img_file = cirros-0.4.0-x86_64-disk.img log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.910 186 DEBUG tempest [-] validation.connect_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.911 193 DEBUG tempest [-] volume-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.911 186 DEBUG tempest [-] validation.floating_ip_range = 10.0.0.0/29 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.911 189 DEBUG tempest [-] scenario.img_properties = {'hw_scsi_model': 'virtio-scsi', 'hw_disk_bus': 'scsi'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.913 193 DEBUG tempest [-] volume-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.913 186 DEBUG tempest [-] validation.image_alt_ssh_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.914 189 DEBUG tempest [-] scenario.protocol = icmp log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.915 193 DEBUG tempest [-] volume-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.915 186 DEBUG tempest [-] validation.image_alt_ssh_user = root log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.916 189 DEBUG tempest [-] service_available.aodh = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.917 193 DEBUG tempest [-] volume-feature-enabled.backup = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.917 186 DEBUG tempest [-] validation.image_ssh_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.917 189 DEBUG tempest [-] service_available.barbican = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.919 193 DEBUG tempest [-] volume-feature-enabled.clone = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.919 186 DEBUG tempest [-] validation.image_ssh_user = cirros log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.919 189 DEBUG tempest [-] service_available.ceilometer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.921 193 DEBUG tempest [-] volume-feature-enabled.consistency_group = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.921 186 DEBUG tempest [-] validation.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.921 189 DEBUG tempest [-] service_available.cinder = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.922 193 DEBUG tempest [-] volume-feature-enabled.extend_attached_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.923 186 DEBUG tempest [-] validation.network_for_ssh = patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.923 189 DEBUG tempest [-] service_available.cyborg = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.924 193 DEBUG tempest [-] volume-feature-enabled.extend_attached_volume = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.924 186 DEBUG tempest [-] validation.ping_count = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.925 189 DEBUG tempest [-] service_available.glance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.926 186 DEBUG tempest [-] validation.ping_size = 56 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.926 193 DEBUG tempest [-] volume-feature-enabled.manage_snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.927 189 DEBUG tempest [-] service_available.gnocchi = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.928 186 DEBUG tempest [-] validation.ping_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.928 193 DEBUG tempest [-] volume-feature-enabled.manage_volume = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.929 189 DEBUG tempest [-] service_available.heat = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.930 186 DEBUG tempest [-] validation.run_validation = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.930 193 DEBUG tempest [-] volume-feature-enabled.multi_backend = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.930 189 DEBUG tempest [-] service_available.load_balancer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.932 186 DEBUG tempest [-] validation.security_group = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.932 193 DEBUG tempest [-] volume-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.932 189 DEBUG tempest [-] service_available.neutron = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.933 186 DEBUG tempest [-] validation.security_group_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.934 193 DEBUG tempest [-] volume-feature-enabled.volume_revert = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.934 189 DEBUG tempest [-] service_available.nova = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.935 186 DEBUG tempest [-] validation.ssh_shell_prologue = set -eu -o pipefail; PATH=$PATH:/sbin:/usr/sbin; log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.936 193 DEBUG tempest [-] object-storage.catalog_type = object-store log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.936 189 DEBUG tempest [-] service_available.panko = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.937 186 DEBUG tempest [-] validation.ssh_timeout = 196 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.938 193 DEBUG tempest [-] object-storage.cluster_name = name1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.938 189 DEBUG tempest [-] service_available.swift = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.939 186 DEBUG tempest [-] volume.backend_names = ['BACKEND_1', 'BACKEND_2'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.940 193 DEBUG tempest [-] object-storage.container_sync_interval = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.940 189 DEBUG tempest [-] debug.trace_requests = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.941 186 DEBUG tempest [-] volume.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.942 193 DEBUG tempest [-] object-storage.container_sync_timeout = 600 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.942 189 DEBUG tempest [-] placement.catalog_type = placement log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.943 186 DEBUG tempest [-] volume.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.944 193 DEBUG tempest [-] object-storage.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.944 189 DEBUG tempest [-] placement.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.945 186 DEBUG tempest [-] volume.catalog_type = volumev3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.946 193 DEBUG tempest [-] object-storage.operator_role = member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.946 189 DEBUG tempest [-] placement.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.947 186 DEBUG tempest [-] volume.disk_format = raw log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.947 193 DEBUG tempest [-] object-storage.realm_name = realm1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.947 189 DEBUG tempest [-] placement.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.949 186 DEBUG tempest [-] volume.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.949 193 DEBUG tempest [-] object-storage.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.949 189 DEBUG tempest [-] placement.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.951 186 DEBUG tempest [-] volume.manage_snapshot_ref = ['source-name', 'snapshot-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.951 189 DEBUG tempest [-] profiler.key = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.951 193 DEBUG tempest [-] object-storage.reseller_admin_role = ResellerAdmin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.953 186 DEBUG tempest [-] volume.manage_volume_ref = ['source-name', 'volume-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.953 189 DEBUG tempest [-] heat_plugin.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.953 193 DEBUG tempest [-] object-storage-feature-enabled.container_sync = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.954 186 DEBUG tempest [-] volume.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.955 189 DEBUG tempest [-] heat_plugin.admin_project_name = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.955 193 DEBUG tempest [-] object-storage-feature-enabled.discoverability = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.956 186 DEBUG tempest [-] volume.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.957 189 DEBUG tempest [-] heat_plugin.admin_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.957 193 DEBUG tempest [-] object-storage-feature-enabled.discoverable_apis = ['account_quotas', 'formpost', 'bulk_upload', 'bulk_delete', 'tempurl', 'crossdomain', 'container_quotas', 'staticweb', 'account_quotas', 'slo'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.958 186 DEBUG tempest [-] volume.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.959 189 DEBUG tempest [-] heat_plugin.auth_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.959 193 DEBUG tempest [-] object-storage-feature-enabled.object_versioning = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.960 186 DEBUG tempest [-] volume.storage_protocol = ceph log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.961 189 DEBUG tempest [-] heat_plugin.auth_version = 3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.961 193 DEBUG tempest [-] scenario.dhcp_client = udhcpc log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.962 186 DEBUG tempest [-] volume.vendor_name = Open Source log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.963 189 DEBUG tempest [-] heat_plugin.boot_config_env = /usr/lib/python3.8/site-packages/heat_tempest_plugin/tests/scenario/templates/boot_config_none_env.yaml log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.963 193 DEBUG tempest [-] scenario.img_container_format = bare log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.964 186 DEBUG tempest [-] volume.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.964 189 DEBUG tempest [-] heat_plugin.build_interval = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.966 186 DEBUG tempest [-] volume-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.966 193 WARNING oslo_config.cfg [-] Deprecated: Option "img_dir" from group "scenario" is deprecated for removal. Its value may be silently ignored in the future. 2020-12-14 02:13:09.966 189 DEBUG tempest [-] heat_plugin.build_timeout = 1200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.967 186 DEBUG tempest [-] volume-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.968 189 DEBUG tempest [-] heat_plugin.ca_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.968 193 DEBUG tempest [-] scenario.img_dir = /home/opnfv/functest/images log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.969 186 DEBUG tempest [-] volume-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.970 189 DEBUG tempest [-] heat_plugin.catalog_type = orchestration log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.970 193 DEBUG tempest [-] scenario.img_disk_format = qcow2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.971 186 DEBUG tempest [-] volume-feature-enabled.backup = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.972 189 DEBUG tempest [-] heat_plugin.connectivity_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.972 193 DEBUG tempest [-] scenario.img_file = cirros-0.4.0-x86_64-disk.img log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.973 186 DEBUG tempest [-] volume-feature-enabled.clone = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.973 189 DEBUG tempest [-] heat_plugin.convergence_engine_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.974 193 DEBUG tempest [-] scenario.img_properties = {'hw_scsi_model': 'virtio-scsi', 'hw_disk_bus': 'scsi'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.975 186 DEBUG tempest [-] volume-feature-enabled.consistency_group = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.975 189 DEBUG tempest [-] heat_plugin.credential_secret_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.976 193 DEBUG tempest [-] scenario.protocol = icmp log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.976 186 DEBUG tempest [-] volume-feature-enabled.extend_attached_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.977 189 DEBUG tempest [-] heat_plugin.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.978 193 DEBUG tempest [-] service_available.aodh = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.978 186 DEBUG tempest [-] volume-feature-enabled.extend_attached_volume = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.979 189 DEBUG tempest [-] heat_plugin.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.980 193 DEBUG tempest [-] service_available.barbican = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.980 186 DEBUG tempest [-] volume-feature-enabled.manage_snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.981 189 DEBUG tempest [-] heat_plugin.fixed_network_name = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.982 193 DEBUG tempest [-] service_available.ceilometer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.982 186 DEBUG tempest [-] volume-feature-enabled.manage_volume = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.983 189 DEBUG tempest [-] heat_plugin.fixed_subnet_name = heat-subnet log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.984 193 DEBUG tempest [-] service_available.cinder = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.984 186 DEBUG tempest [-] volume-feature-enabled.multi_backend = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.985 189 DEBUG tempest [-] heat_plugin.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.985 193 DEBUG tempest [-] service_available.cyborg = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.986 186 DEBUG tempest [-] volume-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.987 189 DEBUG tempest [-] heat_plugin.heat_config_notify_script = heat-config-notify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.987 193 DEBUG tempest [-] service_available.glance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.988 186 DEBUG tempest [-] volume-feature-enabled.volume_revert = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.989 189 DEBUG tempest [-] heat_plugin.hidden_stack_tag = data-processing-cluster log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.989 193 DEBUG tempest [-] service_available.gnocchi = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.990 186 DEBUG tempest [-] object-storage.catalog_type = object-store log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.991 189 DEBUG tempest [-] heat_plugin.image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.991 193 DEBUG tempest [-] service_available.heat = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.991 186 DEBUG tempest [-] object-storage.cluster_name = name1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.992 189 DEBUG tempest [-] heat_plugin.instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.993 193 DEBUG tempest [-] service_available.load_balancer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.993 186 DEBUG tempest [-] object-storage.container_sync_interval = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.994 189 DEBUG tempest [-] heat_plugin.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.995 193 DEBUG tempest [-] service_available.neutron = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.995 186 DEBUG tempest [-] object-storage.container_sync_timeout = 600 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.996 189 DEBUG tempest [-] heat_plugin.keypair_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.997 193 DEBUG tempest [-] service_available.nova = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.997 186 DEBUG tempest [-] object-storage.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.998 189 DEBUG tempest [-] heat_plugin.minimal_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.999 193 DEBUG tempest [-] service_available.panko = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.999 186 DEBUG tempest [-] object-storage.operator_role = member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.000 189 DEBUG tempest [-] heat_plugin.minimal_instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.001 193 DEBUG tempest [-] service_available.swift = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.001 186 DEBUG tempest [-] object-storage.realm_name = realm1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.002 189 DEBUG tempest [-] heat_plugin.network_for_ssh = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.003 186 DEBUG tempest [-] object-storage.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.003 193 DEBUG tempest [-] debug.trace_requests = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.003 189 DEBUG tempest [-] heat_plugin.password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:09.999 197 INFO tempest [-] Using tempest config file /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/tempest.conf 2020-12-14 02:13:10.004 186 DEBUG tempest [-] object-storage.reseller_admin_role = ResellerAdmin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.005 193 DEBUG tempest [-] placement.catalog_type = placement log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.005 189 DEBUG tempest [-] heat_plugin.project_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.006 186 DEBUG tempest [-] object-storage-feature-enabled.container_sync = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.007 193 DEBUG tempest [-] placement.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.007 189 DEBUG tempest [-] heat_plugin.project_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.008 186 DEBUG tempest [-] object-storage-feature-enabled.discoverability = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.008 193 DEBUG tempest [-] placement.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.009 189 DEBUG tempest [-] heat_plugin.project_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.010 186 DEBUG tempest [-] object-storage-feature-enabled.discoverable_apis = ['account_quotas', 'formpost', 'bulk_upload', 'bulk_delete', 'tempurl', 'crossdomain', 'container_quotas', 'staticweb', 'account_quotas', 'slo'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.010 193 DEBUG tempest [-] placement.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.011 189 DEBUG tempest [-] heat_plugin.region = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.012 186 DEBUG tempest [-] object-storage-feature-enabled.object_versioning = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.012 193 DEBUG tempest [-] placement.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.013 189 DEBUG tempest [-] heat_plugin.skip_functional_test_list = ['EncryptionVolTypeTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.014 186 DEBUG tempest [-] scenario.dhcp_client = udhcpc log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.014 193 DEBUG tempest [-] profiler.key = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.015 189 DEBUG tempest [-] heat_plugin.skip_functional_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.016 186 DEBUG tempest [-] scenario.img_container_format = bare log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.016 193 DEBUG tempest [-] heat_plugin.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.017 189 DEBUG tempest [-] heat_plugin.skip_scenario_test_list = ['AodhAlarmTest', 'SoftwareConfigIntegrationTest', 'VolumeBackupRestoreIntegrationTest', 'CfnInitIntegrationTest', 'LoadBalancerTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.018 193 DEBUG tempest [-] heat_plugin.admin_project_name = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.018 189 DEBUG tempest [-] heat_plugin.skip_scenario_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.018 186 WARNING oslo_config.cfg [-] Deprecated: Option "img_dir" from group "scenario" is deprecated for removal. Its value may be silently ignored in the future. 2020-12-14 02:13:10.020 193 DEBUG tempest [-] heat_plugin.admin_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.020 189 DEBUG tempest [-] heat_plugin.skip_test_stack_action_list = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.020 186 DEBUG tempest [-] scenario.img_dir = /home/opnfv/functest/images log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.022 193 DEBUG tempest [-] heat_plugin.auth_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.023 189 DEBUG tempest [-] heat_plugin.ssh_channel_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.023 186 DEBUG tempest [-] scenario.img_disk_format = qcow2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.022 197 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: heat 2020-12-14 02:13:10.024 193 DEBUG tempest [-] heat_plugin.auth_version = 3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.024 189 DEBUG tempest [-] heat_plugin.ssh_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.025 186 DEBUG tempest [-] scenario.img_file = cirros-0.4.0-x86_64-disk.img log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.026 193 DEBUG tempest [-] heat_plugin.boot_config_env = /usr/lib/python3.8/site-packages/heat_tempest_plugin/tests/scenario/templates/boot_config_none_env.yaml log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.026 189 DEBUG tempest [-] heat_plugin.user_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.027 186 DEBUG tempest [-] scenario.img_properties = {'hw_scsi_model': 'virtio-scsi', 'hw_disk_bus': 'scsi'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.028 193 DEBUG tempest [-] heat_plugin.build_interval = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.028 189 DEBUG tempest [-] heat_plugin.user_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.028 197 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cyborg_tempest_plugin 2020-12-14 02:13:10.029 186 DEBUG tempest [-] scenario.protocol = icmp log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.030 193 DEBUG tempest [-] heat_plugin.build_timeout = 1200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.030 189 DEBUG tempest [-] heat_plugin.username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.030 197 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: keystone_tests 2020-12-14 02:13:10.031 186 DEBUG tempest [-] service_available.aodh = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.031 193 DEBUG tempest [-] heat_plugin.ca_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.032 189 DEBUG tempest [-] heat_plugin.vm_to_heat_api_insecure = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.032 186 DEBUG tempest [-] service_available.barbican = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.033 197 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: patrole_tests 2020-12-14 02:13:10.033 193 DEBUG tempest [-] heat_plugin.catalog_type = orchestration log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.034 189 DEBUG tempest [-] heat_plugin.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.034 186 DEBUG tempest [-] service_available.ceilometer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.035 193 DEBUG tempest [-] heat_plugin.connectivity_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.035 189 DEBUG tempest [-] heat_features_enabled.multi_cloud = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.036 186 DEBUG tempest [-] service_available.cinder = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.037 193 DEBUG tempest [-] heat_plugin.convergence_engine_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.037 189 DEBUG tempest [-] heat_features_enabled.stack_cancel = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.037 197 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: telemetry_tests 2020-12-14 02:13:10.038 186 DEBUG tempest [-] service_available.cyborg = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.039 193 DEBUG tempest [-] heat_plugin.credential_secret_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.039 189 DEBUG tempest [-] fed_scenario.enable_k2k_groups_mapping = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.039 186 DEBUG tempest [-] service_available.glance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.041 193 DEBUG tempest [-] heat_plugin.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.041 189 DEBUG tempest [-] fed_scenario.idp_ecp_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.041 186 DEBUG tempest [-] service_available.gnocchi = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.040 197 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: barbican_tests 2020-12-14 02:13:10.042 193 DEBUG tempest [-] heat_plugin.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.043 189 DEBUG tempest [-] fed_scenario.idp_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.043 186 DEBUG tempest [-] service_available.heat = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.043 197 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: neutron_tests 2020-12-14 02:13:10.044 193 DEBUG tempest [-] heat_plugin.fixed_network_name = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.045 189 DEBUG tempest [-] fed_scenario.idp_password = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.045 186 DEBUG tempest [-] service_available.load_balancer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.045 197 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: octavia-tempest-plugin 2020-12-14 02:13:10.046 193 DEBUG tempest [-] heat_plugin.fixed_subnet_name = heat-subnet log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.046 189 DEBUG tempest [-] fed_scenario.idp_remote_ids = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.047 186 DEBUG tempest [-] service_available.neutron = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.048 189 DEBUG tempest [-] fed_scenario.idp_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.048 193 DEBUG tempest [-] heat_plugin.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.049 186 DEBUG tempest [-] service_available.nova = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.050 189 DEBUG tempest [-] fed_scenario.mapping_group_domain_name = federated_domain log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.050 193 DEBUG tempest [-] heat_plugin.heat_config_notify_script = heat-config-notify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.051 186 DEBUG tempest [-] service_available.panko = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.051 197 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cinder_tests 2020-12-14 02:13:10.052 189 DEBUG tempest [-] fed_scenario.mapping_group_name = federated_users log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.052 193 DEBUG tempest [-] heat_plugin.hidden_stack_tag = data-processing-cluster log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.052 186 DEBUG tempest [-] service_available.swift = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.054 189 DEBUG tempest [-] fed_scenario.mapping_remote_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.054 193 DEBUG tempest [-] heat_plugin.image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.054 186 DEBUG tempest [-] debug.trace_requests = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.054 197 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: heat 2020-12-14 02:13:10.056 189 DEBUG tempest [-] fed_scenario.mapping_user_name = {0} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.056 193 DEBUG tempest [-] heat_plugin.instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.056 197 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cyborg_tempest_plugin 2020-12-14 02:13:10.056 186 DEBUG tempest [-] placement.catalog_type = placement log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.058 197 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: keystone_tests 2020-12-14 02:13:10.058 189 DEBUG tempest [-] fed_scenario.protocol_id = mapped log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.058 193 DEBUG tempest [-] heat_plugin.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.058 186 DEBUG tempest [-] placement.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.059 197 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: patrole_tests 2020-12-14 02:13:10.060 193 DEBUG tempest [-] heat_plugin.keypair_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.060 189 DEBUG tempest [-] patrole.custom_policy_files = ['/etc/%s/policy.json'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.060 186 DEBUG tempest [-] placement.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.060 197 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: telemetry_tests 2020-12-14 02:13:10.062 193 DEBUG tempest [-] heat_plugin.minimal_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.062 197 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: barbican_tests 2020-12-14 02:13:10.062 189 DEBUG tempest [-] patrole.custom_requirements_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.062 186 DEBUG tempest [-] placement.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.063 197 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: neutron_tests 2020-12-14 02:13:10.063 193 DEBUG tempest [-] heat_plugin.minimal_instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.064 186 DEBUG tempest [-] placement.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.064 189 DEBUG tempest [-] patrole.rbac_test_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.064 197 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: octavia-tempest-plugin 2020-12-14 02:13:10.065 193 DEBUG tempest [-] heat_plugin.network_for_ssh = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.065 186 DEBUG tempest [-] profiler.key = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.066 189 DEBUG tempest [-] patrole.rbac_test_roles = ['admin'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.066 197 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cinder_tests 2020-12-14 02:13:10.067 193 DEBUG tempest [-] heat_plugin.password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.067 186 DEBUG tempest [-] heat_plugin.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.067 189 DEBUG tempest [-] patrole.test_custom_requirements = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.068 197 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2567 2020-12-14 02:13:10.069 193 DEBUG tempest [-] heat_plugin.project_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.069 186 DEBUG tempest [-] heat_plugin.admin_project_name = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.069 189 DEBUG tempest [-] patrole.validate_deprecated_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.070 197 DEBUG tempest [-] Configuration options gathered from: log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2568 2020-12-14 02:13:10.071 193 DEBUG tempest [-] heat_plugin.project_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.071 186 DEBUG tempest [-] heat_plugin.admin_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.071 189 DEBUG tempest [-] patrole_log.enable_reporting = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.071 197 DEBUG tempest [-] command line args: [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2569 2020-12-14 02:13:10.072 186 DEBUG tempest [-] heat_plugin.auth_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.072 193 DEBUG tempest [-] heat_plugin.project_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.073 189 DEBUG tempest [-] patrole_log.report_log_name = patrole.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.074 193 DEBUG tempest [-] heat_plugin.region = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.074 186 DEBUG tempest [-] heat_plugin.auth_version = 3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.074 197 DEBUG tempest [-] config files: ['/root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2570 2020-12-14 02:13:10.075 189 DEBUG tempest [-] patrole_log.report_log_path = . log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.076 197 DEBUG tempest [-] ================================================================================ log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2572 2020-12-14 02:13:10.076 186 DEBUG tempest [-] heat_plugin.boot_config_env = /usr/lib/python3.8/site-packages/heat_tempest_plugin/tests/scenario/templates/boot_config_none_env.yaml log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.076 193 DEBUG tempest [-] heat_plugin.skip_functional_test_list = ['EncryptionVolTypeTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.077 189 DEBUG tempest [-] policy-feature-enabled.added_cinder_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.077 197 DEBUG tempest [-] config_dir = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.078 186 DEBUG tempest [-] heat_plugin.build_interval = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.078 193 DEBUG tempest [-] heat_plugin.skip_functional_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.078 189 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_ussuri = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.079 197 DEBUG tempest [-] config_file = ['/root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.080 186 DEBUG tempest [-] heat_plugin.build_timeout = 1200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.080 193 DEBUG tempest [-] heat_plugin.skip_scenario_test_list = ['AodhAlarmTest', 'SoftwareConfigIntegrationTest', 'VolumeBackupRestoreIntegrationTest', 'CfnInitIntegrationTest', 'LoadBalancerTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.080 189 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_victoria = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.081 197 DEBUG tempest [-] config_source = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.081 186 DEBUG tempest [-] heat_plugin.ca_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.082 193 DEBUG tempest [-] heat_plugin.skip_scenario_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.082 189 DEBUG tempest [-] policy-feature-enabled.create_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.082 197 DEBUG tempest [-] debug = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.083 186 DEBUG tempest [-] heat_plugin.catalog_type = orchestration log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.084 193 DEBUG tempest [-] heat_plugin.skip_test_stack_action_list = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.084 189 DEBUG tempest [-] policy-feature-enabled.keystone_policy_enforcement_train = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.085 186 DEBUG tempest [-] heat_plugin.connectivity_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.086 193 DEBUG tempest [-] heat_plugin.ssh_channel_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.086 189 DEBUG tempest [-] policy-feature-enabled.limits_extension_used_limits_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.086 197 DEBUG tempest [-] default_log_levels = ['amqp=WARN', 'amqplib=WARN', 'boto=WARN', 'qpid=WARN', 'sqlalchemy=WARN', 'suds=INFO', 'oslo.messaging=INFO', 'oslo_messaging=INFO', 'iso8601=WARN', 'requests.packages.urllib3.connectionpool=WARN', 'urllib3.connectionpool=WARN', 'websocket=WARN', 'requests.packages.urllib3.util.retry=WARN', 'urllib3.util.retry=WARN', 'keystonemiddleware=WARN', 'routes.middleware=WARN', 'stevedore=WARN', 'taskflow=WARN', 'keystoneauth=WARN', 'oslo.cache=INFO', 'oslo_policy=INFO', 'dogpile.core.dogpile=INFO'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.087 186 DEBUG tempest [-] heat_plugin.convergence_engine_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.088 193 DEBUG tempest [-] heat_plugin.ssh_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.088 189 DEBUG tempest [-] policy-feature-enabled.removed_keystone_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.088 197 DEBUG tempest [-] instance_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.089 186 DEBUG tempest [-] heat_plugin.credential_secret_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.090 189 DEBUG tempest [-] policy-feature-enabled.removed_nova_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.090 197 DEBUG tempest [-] instance_uuid_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.091 186 DEBUG tempest [-] heat_plugin.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.090 193 DEBUG tempest [-] heat_plugin.user_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.092 189 DEBUG tempest [-] policy-feature-enabled.removed_nova_policies_wallaby = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.092 197 DEBUG tempest [-] log_config_append = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.092 186 DEBUG tempest [-] heat_plugin.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.093 193 DEBUG tempest [-] heat_plugin.user_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.094 189 DEBUG tempest [-] policy-feature-enabled.update_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.094 197 DEBUG tempest [-] log_date_format = %Y-%m-%d %H:%M:%S log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.094 186 DEBUG tempest [-] heat_plugin.fixed_network_name = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.095 193 DEBUG tempest [-] heat_plugin.username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.096 189 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_attach_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.096 197 DEBUG tempest [-] log_dir = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.096 186 DEBUG tempest [-] heat_plugin.fixed_subnet_name = heat-subnet log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.097 189 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_reserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.097 193 DEBUG tempest [-] heat_plugin.vm_to_heat_api_insecure = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.098 197 DEBUG tempest [-] log_file = /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/tempest.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.098 186 DEBUG tempest [-] heat_plugin.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.099 189 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_unreserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.100 193 DEBUG tempest [-] heat_plugin.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.100 197 DEBUG tempest [-] log_rotate_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.100 186 DEBUG tempest [-] heat_plugin.heat_config_notify_script = heat-config-notify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.101 189 DEBUG tempest [-] telemetry.alarm_aggregation_method = rate:mean log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.102 197 DEBUG tempest [-] log_rotate_interval_type = days log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.102 186 DEBUG tempest [-] heat_plugin.hidden_stack_tag = data-processing-cluster log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.102 193 DEBUG tempest [-] heat_features_enabled.multi_cloud = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.103 189 DEBUG tempest [-] telemetry.alarm_granularity = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.104 186 DEBUG tempest [-] heat_plugin.image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.104 197 DEBUG tempest [-] log_rotation_type = none log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.104 193 DEBUG tempest [-] heat_features_enabled.stack_cancel = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.105 189 DEBUG tempest [-] telemetry.alarm_metric_name = cpu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.106 186 DEBUG tempest [-] heat_plugin.instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.106 197 DEBUG tempest [-] logging_context_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [%(request_id)s %(user_identity)s] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.107 189 DEBUG tempest [-] telemetry.alarm_threshold = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.107 193 DEBUG tempest [-] fed_scenario.enable_k2k_groups_mapping = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.107 197 DEBUG tempest [-] logging_debug_format_suffix = %(funcName)s %(pathname)s:%(lineno)d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.107 186 DEBUG tempest [-] heat_plugin.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.109 197 DEBUG tempest [-] logging_default_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [-] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.109 189 DEBUG tempest [-] telemetry.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.109 186 DEBUG tempest [-] heat_plugin.keypair_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.109 193 DEBUG tempest [-] fed_scenario.idp_ecp_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.111 197 DEBUG tempest [-] logging_exception_prefix = %(asctime)s.%(msecs)03d %(process)d ERROR %(name)s %(instance)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.111 189 DEBUG tempest [-] telemetry.notification_sleep = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.111 186 DEBUG tempest [-] heat_plugin.minimal_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.111 193 DEBUG tempest [-] fed_scenario.idp_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.113 189 DEBUG tempest [-] telemetry.notification_wait = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.113 197 DEBUG tempest [-] logging_user_identity_format = %(user)s %(tenant)s %(domain)s %(user_domain)s %(project_domain)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.113 186 DEBUG tempest [-] heat_plugin.minimal_instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.114 193 DEBUG tempest [-] fed_scenario.idp_password = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.115 197 DEBUG tempest [-] max_logfile_count = 30 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.115 189 DEBUG tempest [-] event.catalog_type = event log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.115 186 DEBUG tempest [-] heat_plugin.network_for_ssh = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.116 197 DEBUG tempest [-] max_logfile_size_mb = 200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.117 186 DEBUG tempest [-] heat_plugin.password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.117 189 DEBUG tempest [-] event.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.116 193 DEBUG tempest [-] fed_scenario.idp_remote_ids = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.118 186 DEBUG tempest [-] heat_plugin.project_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.118 197 DEBUG tempest [-] pause_teardown = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.119 189 DEBUG tempest [-] alarming_plugin.catalog_type = alarming log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.120 186 DEBUG tempest [-] heat_plugin.project_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.120 197 DEBUG tempest [-] publish_errors = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.121 189 DEBUG tempest [-] alarming_plugin.create_alarms = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.121 193 DEBUG tempest [-] fed_scenario.idp_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.122 186 DEBUG tempest [-] heat_plugin.project_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.122 197 DEBUG tempest [-] rate_limit_burst = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.123 189 DEBUG tempest [-] alarming_plugin.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.124 186 DEBUG tempest [-] heat_plugin.region = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.125 197 DEBUG tempest [-] rate_limit_except_level = CRITICAL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.125 189 DEBUG tempest [-] metric.catalog_type = metric log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.124 193 DEBUG tempest [-] fed_scenario.mapping_group_domain_name = federated_domain log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.127 186 DEBUG tempest [-] heat_plugin.skip_functional_test_list = ['EncryptionVolTypeTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.127 197 DEBUG tempest [-] rate_limit_interval = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.127 189 DEBUG tempest [-] metric.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.129 186 DEBUG tempest [-] heat_plugin.skip_functional_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.129 197 DEBUG tempest [-] syslog_log_facility = LOG_USER log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.130 189 DEBUG tempest [-] ephemeral_storage_encryption.cipher = aes-xts-plain64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.128 193 DEBUG tempest [-] fed_scenario.mapping_group_name = federated_users log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.131 197 DEBUG tempest [-] use_eventlog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.131 186 DEBUG tempest [-] heat_plugin.skip_scenario_test_list = ['AodhAlarmTest', 'SoftwareConfigIntegrationTest', 'VolumeBackupRestoreIntegrationTest', 'CfnInitIntegrationTest', 'LoadBalancerTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.131 189 DEBUG tempest [-] ephemeral_storage_encryption.enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.133 186 DEBUG tempest [-] heat_plugin.skip_scenario_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.133 197 DEBUG tempest [-] use_journal = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.133 189 DEBUG tempest [-] ephemeral_storage_encryption.key_size = 256 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.132 193 DEBUG tempest [-] fed_scenario.mapping_remote_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.135 186 DEBUG tempest [-] heat_plugin.skip_test_stack_action_list = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.135 197 DEBUG tempest [-] use_json = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.135 189 DEBUG tempest [-] image_signature_verification.enforced = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.137 186 DEBUG tempest [-] heat_plugin.ssh_channel_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.137 197 DEBUG tempest [-] use_stderr = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.136 193 DEBUG tempest [-] fed_scenario.mapping_user_name = {0} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.138 189 DEBUG tempest [-] load_balancer.RBAC_test_type = advanced log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.139 186 DEBUG tempest [-] heat_plugin.ssh_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.139 197 DEBUG tempest [-] use_syslog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.140 189 DEBUG tempest [-] load_balancer.admin_role = load-balancer_admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.140 186 DEBUG tempest [-] heat_plugin.user_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.141 197 DEBUG tempest [-] watch_log_file = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-14 02:13:10.140 193 DEBUG tempest [-] fed_scenario.protocol_id = mapped log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.142 189 DEBUG tempest [-] load_balancer.amphora_admin_log_file = /var/log/octavia-amphora.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.142 186 DEBUG tempest [-] heat_plugin.user_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.143 197 DEBUG tempest [-] oslo_concurrency.disable_process_locking = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.144 189 DEBUG tempest [-] load_balancer.amphora_ssh_key = /etc/octavia/.ssh/octavia_ssh_key log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.144 186 DEBUG tempest [-] heat_plugin.username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.145 197 DEBUG tempest [-] oslo_concurrency.lock_path = /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/for-deployment-ad557d5c-ec16-459f-96fc-a0e69c444820/lock_files log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.144 193 DEBUG tempest [-] patrole.custom_policy_files = ['/etc/%s/policy.json'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.146 189 DEBUG tempest [-] load_balancer.amphora_ssh_user = ubuntu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.146 186 DEBUG tempest [-] heat_plugin.vm_to_heat_api_insecure = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.147 197 DEBUG tempest [-] auth.admin_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.147 193 DEBUG tempest [-] patrole.custom_requirements_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.147 189 DEBUG tempest [-] load_balancer.availability_zone = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.148 186 DEBUG tempest [-] heat_plugin.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.149 197 DEBUG tempest [-] auth.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.149 189 DEBUG tempest [-] load_balancer.availability_zone2 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.149 193 DEBUG tempest [-] patrole.rbac_test_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.150 186 DEBUG tempest [-] heat_features_enabled.multi_cloud = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.151 197 DEBUG tempest [-] auth.admin_project_name = patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.151 189 DEBUG tempest [-] load_balancer.availability_zone3 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.151 186 DEBUG tempest [-] heat_features_enabled.stack_cancel = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.153 197 DEBUG tempest [-] auth.admin_username = patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.153 189 DEBUG tempest [-] load_balancer.build_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.152 193 DEBUG tempest [-] patrole.rbac_test_roles = ['admin'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.153 186 DEBUG tempest [-] fed_scenario.enable_k2k_groups_mapping = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.155 197 DEBUG tempest [-] auth.create_isolated_networks = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.155 189 DEBUG tempest [-] load_balancer.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.155 186 DEBUG tempest [-] fed_scenario.idp_ecp_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.157 197 DEBUG tempest [-] auth.default_credentials_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.156 193 DEBUG tempest [-] patrole.test_custom_requirements = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.157 186 DEBUG tempest [-] fed_scenario.idp_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.157 189 DEBUG tempest [-] load_balancer.catalog_type = load-balancer log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.159 186 DEBUG tempest [-] fed_scenario.idp_password = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.159 197 DEBUG tempest [-] auth.tempest_roles = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.159 189 DEBUG tempest [-] load_balancer.check_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.159 193 DEBUG tempest [-] patrole.validate_deprecated_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.160 186 DEBUG tempest [-] fed_scenario.idp_remote_ids = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.161 197 DEBUG tempest [-] auth.test_accounts_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.161 189 DEBUG tempest [-] load_balancer.check_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.162 186 DEBUG tempest [-] fed_scenario.idp_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.163 197 DEBUG tempest [-] auth.use_dynamic_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.163 189 DEBUG tempest [-] load_balancer.disable_boot_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.164 186 DEBUG tempest [-] fed_scenario.mapping_group_domain_name = federated_domain log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.163 193 DEBUG tempest [-] patrole_log.enable_reporting = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.164 189 DEBUG tempest [-] load_balancer.enable_security_groups = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.165 197 DEBUG tempest [-] compute.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.166 186 DEBUG tempest [-] fed_scenario.mapping_group_name = federated_users log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.166 197 DEBUG tempest [-] compute.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.167 189 DEBUG tempest [-] load_balancer.enabled_provider_drivers = {'amphora': 'The Octavia Amphora driver.', 'amphorav2': 'The Octavia Amphora driver that uses taskflow jobboard persistence.', 'octavia': 'Deprecated alias of the Octavia Amphora driver.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.168 186 DEBUG tempest [-] fed_scenario.mapping_remote_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.167 193 DEBUG tempest [-] patrole_log.report_log_name = patrole.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.168 197 DEBUG tempest [-] compute.catalog_type = compute log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.169 189 DEBUG tempest [-] load_balancer.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.170 186 DEBUG tempest [-] fed_scenario.mapping_user_name = {0} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.170 197 DEBUG tempest [-] compute.certified_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.171 189 DEBUG tempest [-] load_balancer.expected_availability_zone_capability = {'compute_zone': 'The compute availability zone.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.172 186 DEBUG tempest [-] fed_scenario.protocol_id = mapped log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.171 193 DEBUG tempest [-] patrole_log.report_log_path = . log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.172 197 DEBUG tempest [-] compute.certified_image_trusted_certs = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.173 189 DEBUG tempest [-] load_balancer.expected_flavor_capability = {'loadbalancer_topology': 'The load balancer topology. One of: SINGLE - One amphora per load balancer. ACTIVE_STANDBY - Two amphora per load balancer.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.174 186 DEBUG tempest [-] patrole.custom_policy_files = ['/etc/%s/policy.json'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.174 197 DEBUG tempest [-] compute.compute_volume_common_az = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.175 189 DEBUG tempest [-] load_balancer.lb_build_interval = 10.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.174 193 DEBUG tempest [-] policy-feature-enabled.added_cinder_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.176 186 DEBUG tempest [-] patrole.custom_requirements_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.176 197 DEBUG tempest [-] compute.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.177 189 DEBUG tempest [-] load_balancer.lb_build_timeout = 900 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.177 186 DEBUG tempest [-] patrole.rbac_test_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.178 197 DEBUG tempest [-] compute.fixed_network_name = patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.179 189 DEBUG tempest [-] load_balancer.loadbalancer_topology = SINGLE log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.178 193 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_ussuri = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.179 186 DEBUG tempest [-] patrole.rbac_test_roles = ['admin'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.180 197 DEBUG tempest [-] compute.flavor_ref = 1311a6a1-b18c-4e52-af0a-b273bda5931b log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.181 189 DEBUG tempest [-] load_balancer.member_1_ipv4_subnet_cidr = 10.2.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.181 186 DEBUG tempest [-] patrole.test_custom_requirements = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.182 197 DEBUG tempest [-] compute.flavor_ref_alt = 8a56823e-8563-423c-896d-50c73f98dd64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.181 193 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_victoria = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.183 189 DEBUG tempest [-] load_balancer.member_1_ipv6_subnet_cidr = fd7b:f9f7:0fff:4eca::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.183 186 DEBUG tempest [-] patrole.validate_deprecated_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.184 197 DEBUG tempest [-] compute.hypervisor_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.185 189 DEBUG tempest [-] load_balancer.member_2_ipv4_subnet_cidr = 10.2.2.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.185 186 DEBUG tempest [-] patrole_log.enable_reporting = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.186 197 DEBUG tempest [-] compute.image_ref = cd332004-33aa-4c81-9e50-54766a6df097 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.185 193 DEBUG tempest [-] policy-feature-enabled.create_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.187 189 DEBUG tempest [-] load_balancer.member_2_ipv6_subnet_cidr = fd77:1457:4cf0:26a8::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.187 186 DEBUG tempest [-] patrole_log.report_log_name = patrole.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.188 197 DEBUG tempest [-] compute.image_ref_alt = 458c165e-1594-40fd-a92a-ce6fd4a85db4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.189 189 DEBUG tempest [-] load_balancer.member_role = load-balancer_member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.189 186 DEBUG tempest [-] patrole_log.report_log_path = . log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.189 193 DEBUG tempest [-] policy-feature-enabled.keystone_policy_enforcement_train = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.190 197 DEBUG tempest [-] compute.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.191 189 DEBUG tempest [-] load_balancer.octavia_svc_username = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.191 186 DEBUG tempest [-] policy-feature-enabled.added_cinder_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.191 193 DEBUG tempest [-] policy-feature-enabled.limits_extension_used_limits_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.192 197 DEBUG tempest [-] compute.min_compute_nodes = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.192 186 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_ussuri = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.193 189 DEBUG tempest [-] load_balancer.provider = octavia log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.193 193 DEBUG tempest [-] policy-feature-enabled.removed_keystone_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.194 197 DEBUG tempest [-] compute.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.194 186 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_victoria = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.194 189 DEBUG tempest [-] load_balancer.random_server_name_length = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.196 197 DEBUG tempest [-] compute.ready_wait = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.196 186 DEBUG tempest [-] policy-feature-enabled.create_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.196 193 DEBUG tempest [-] policy-feature-enabled.removed_nova_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.196 189 DEBUG tempest [-] load_balancer.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.198 197 DEBUG tempest [-] compute.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.198 186 DEBUG tempest [-] policy-feature-enabled.keystone_policy_enforcement_train = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.198 189 DEBUG tempest [-] load_balancer.scp_connection_attempts = 20 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.198 193 DEBUG tempest [-] policy-feature-enabled.removed_nova_policies_wallaby = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.200 186 DEBUG tempest [-] policy-feature-enabled.limits_extension_used_limits_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.200 197 DEBUG tempest [-] compute.shelved_offload_time = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.200 189 DEBUG tempest [-] load_balancer.scp_connection_timeout = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.200 193 DEBUG tempest [-] policy-feature-enabled.update_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.202 186 DEBUG tempest [-] policy-feature-enabled.removed_keystone_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.202 197 DEBUG tempest [-] compute.volume_device_name = sdb log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.202 189 DEBUG tempest [-] load_balancer.tenant_flow_log_file = /var/log/octavia-tenant-traffic.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.203 193 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_attach_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.203 186 DEBUG tempest [-] policy-feature-enabled.removed_nova_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.204 189 DEBUG tempest [-] load_balancer.test_ipv6_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.204 197 DEBUG tempest [-] compute-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.205 186 DEBUG tempest [-] policy-feature-enabled.removed_nova_policies_wallaby = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.205 193 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_reserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.206 189 DEBUG tempest [-] load_balancer.test_network_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.206 197 DEBUG tempest [-] compute-feature-enabled.attach_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.207 186 DEBUG tempest [-] policy-feature-enabled.update_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.207 193 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_unreserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.208 189 DEBUG tempest [-] load_balancer.test_reuse_connection = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.209 186 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_attach_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.208 197 WARNING oslo_config.cfg [-] Deprecated: Option "block_migrate_cinder_iscsi" from group "compute-feature-enabled" is deprecated for removal (This option duplicates the more generic [compute-feature-enabled]/block_migration _for_live_migration now that MIN_LIBVIRT_VERSION is >= 1.2.17 on all branches from stable/rocky and will be removed in a future release.). Its value may be silently ignored in the future. 2020-12-14 02:13:10.209 189 DEBUG tempest [-] load_balancer.test_server_path = /opt/octavia-tempest-plugin/test_server.bin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.210 193 DEBUG tempest [-] telemetry.alarm_aggregation_method = rate:mean log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.211 186 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_reserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.210 197 DEBUG tempest [-] compute-feature-enabled.block_migrate_cinder_iscsi = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.211 189 DEBUG tempest [-] load_balancer.test_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.212 193 DEBUG tempest [-] telemetry.alarm_granularity = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.213 186 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_unreserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.213 197 DEBUG tempest [-] compute-feature-enabled.block_migration_for_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.213 189 DEBUG tempest [-] load_balancer.test_with_ipv6 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.214 186 DEBUG tempest [-] telemetry.alarm_aggregation_method = rate:mean log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.215 193 DEBUG tempest [-] telemetry.alarm_metric_name = cpu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.215 197 DEBUG tempest [-] compute-feature-enabled.can_migrate_between_any_hosts = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.215 189 DEBUG tempest [-] load_balancer.test_with_noop = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.216 186 DEBUG tempest [-] telemetry.alarm_granularity = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.217 197 DEBUG tempest [-] compute-feature-enabled.change_password = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.217 193 DEBUG tempest [-] telemetry.alarm_threshold = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.217 189 DEBUG tempest [-] load_balancer.vip_ipv6_subnet_cidr = fdde:1a92:7523:70a0::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.218 186 DEBUG tempest [-] telemetry.alarm_metric_name = cpu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.219 197 DEBUG tempest [-] compute-feature-enabled.cold_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.219 189 DEBUG tempest [-] load_balancer.vip_subnet_cidr = 10.1.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.219 193 DEBUG tempest [-] telemetry.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.220 186 DEBUG tempest [-] telemetry.alarm_threshold = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.221 197 DEBUG tempest [-] compute-feature-enabled.config_drive = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.221 189 DEBUG tempest [-] loadbalancer-feature-enabled.health_monitor_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.221 193 DEBUG tempest [-] telemetry.notification_sleep = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.222 186 DEBUG tempest [-] telemetry.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.223 197 DEBUG tempest [-] compute-feature-enabled.console_output = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.223 189 DEBUG tempest [-] loadbalancer-feature-enabled.l4_protocol = TCP log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.224 186 DEBUG tempest [-] telemetry.notification_sleep = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.224 193 DEBUG tempest [-] telemetry.notification_wait = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.225 197 DEBUG tempest [-] compute-feature-enabled.disk_config = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.225 189 DEBUG tempest [-] loadbalancer-feature-enabled.l7_protocol_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.226 186 DEBUG tempest [-] telemetry.notification_wait = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.226 193 DEBUG tempest [-] event.catalog_type = event log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.227 197 DEBUG tempest [-] compute-feature-enabled.enable_instance_password = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.227 189 DEBUG tempest [-] loadbalancer-feature-enabled.log_offload_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.228 186 DEBUG tempest [-] event.catalog_type = event log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.229 189 DEBUG tempest [-] loadbalancer-feature-enabled.not_implemented_is_error = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.229 197 DEBUG tempest [-] compute-feature-enabled.interface_attach = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.229 193 DEBUG tempest [-] event.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.230 186 DEBUG tempest [-] event.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.231 189 DEBUG tempest [-] loadbalancer-feature-enabled.pool_algorithms_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.231 197 DEBUG tempest [-] compute-feature-enabled.live_migrate_back_and_forth = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.231 193 DEBUG tempest [-] alarming_plugin.catalog_type = alarming log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.232 186 DEBUG tempest [-] alarming_plugin.catalog_type = alarming log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.233 189 DEBUG tempest [-] loadbalancer-feature-enabled.session_persistence_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.233 197 DEBUG tempest [-] compute-feature-enabled.live_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.234 186 DEBUG tempest [-] alarming_plugin.create_alarms = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.234 193 DEBUG tempest [-] alarming_plugin.create_alarms = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.235 189 DEBUG tempest [-] loadbalancer-feature-enabled.spare_pool_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.235 197 DEBUG tempest [-] compute-feature-enabled.metadata_service = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.235 186 DEBUG tempest [-] alarming_plugin.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.236 193 DEBUG tempest [-] alarming_plugin.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.236 189 DEBUG tempest [-] loadbalancer-feature-enabled.terminated_tls_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.237 197 DEBUG tempest [-] compute-feature-enabled.nova_cert = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.237 186 DEBUG tempest [-] metric.catalog_type = metric log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.238 189 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2591 2020-12-14 02:13:10.238 193 DEBUG tempest [-] metric.catalog_type = metric log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.239 197 DEBUG tempest [-] compute-feature-enabled.pause = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.239 186 DEBUG tempest [-] metric.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.241 197 DEBUG tempest [-] compute-feature-enabled.personality = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.241 193 DEBUG tempest [-] metric.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.241 186 DEBUG tempest [-] ephemeral_storage_encryption.cipher = aes-xts-plain64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.243 186 DEBUG tempest [-] ephemeral_storage_encryption.enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.243 193 DEBUG tempest [-] ephemeral_storage_encryption.cipher = aes-xts-plain64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.243 197 WARNING oslo_config.cfg [-] Deprecated: Option "rdp_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-12-14 02:13:10.245 186 DEBUG tempest [-] ephemeral_storage_encryption.key_size = 256 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.245 197 DEBUG tempest [-] compute-feature-enabled.rdp_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.246 193 DEBUG tempest [-] ephemeral_storage_encryption.enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.247 186 DEBUG tempest [-] image_signature_verification.enforced = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.248 197 DEBUG tempest [-] compute-feature-enabled.rescue = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.249 186 DEBUG tempest [-] load_balancer.RBAC_test_type = advanced log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.249 193 DEBUG tempest [-] ephemeral_storage_encryption.key_size = 256 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.250 197 DEBUG tempest [-] compute-feature-enabled.resize = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.251 186 DEBUG tempest [-] load_balancer.admin_role = load-balancer_admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.251 193 DEBUG tempest [-] image_signature_verification.enforced = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.252 197 WARNING oslo_config.cfg [-] Deprecated: Option "scheduler_available_filters" from group "compute-feature-enabled" is deprecated. Use option "scheduler_enabled_filters" from group "compute-feature-enabled". 2020-12-14 02:13:10.253 186 DEBUG tempest [-] load_balancer.amphora_admin_log_file = /var/log/octavia-amphora.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.254 193 DEBUG tempest [-] load_balancer.RBAC_test_type = advanced log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.255 186 DEBUG tempest [-] load_balancer.amphora_ssh_key = /etc/octavia/.ssh/octavia_ssh_key log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.254 197 DEBUG tempest [-] compute-feature-enabled.scheduler_enabled_filters = ['AvailabilityZoneFilter', 'ComputeFilter', 'ComputeCapabilitiesFilter', 'ImagePropertiesFilter', 'ServerGroupAntiAffinityFilter', 'ServerGroupAffinityFilter', 'SameHostFilter', 'DifferentHostFilter'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.256 186 DEBUG tempest [-] load_balancer.amphora_ssh_user = ubuntu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.256 193 DEBUG tempest [-] load_balancer.admin_role = load-balancer_admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.257 197 DEBUG tempest [-] compute-feature-enabled.serial_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.258 186 DEBUG tempest [-] load_balancer.availability_zone = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.259 197 DEBUG tempest [-] compute-feature-enabled.shelve = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.259 193 DEBUG tempest [-] load_balancer.amphora_admin_log_file = /var/log/octavia-amphora.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.260 186 DEBUG tempest [-] load_balancer.availability_zone2 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.261 197 DEBUG tempest [-] compute-feature-enabled.shelve_migrate = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.261 193 DEBUG tempest [-] load_balancer.amphora_ssh_key = /etc/octavia/.ssh/octavia_ssh_key log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.262 186 DEBUG tempest [-] load_balancer.availability_zone3 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.263 197 DEBUG tempest [-] compute-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.262 189 DEBUG tempest.lib.services.clients [-] Successfully registered plugin __tempest__ in the service client registry with configuration: [{'name': 'compute', 'service_version': 'compute', 'module_path': 'tempest.lib.services.compute', 'client_names': ['AgentsClient', 'AggregatesClient', 'AvailabilityZoneClient', 'BaremetalNodesClient', 'CertificatesClient', 'ExtensionsClient', 'FixedIPsClient', 'FlavorsClient', 'FloatingIPPoolsClient', 'FloatingIPsBulkClient', 'FloatingIPsClient', 'HostsClient', 'HypervisorClient', 'ImagesClient', 'InstanceUsagesAuditLogClient', 'InterfacesClient', 'KeyPairsClient', 'LimitsClient', 'MigrationsClient', 'NetworksClient', 'QuotaClassesClient', 'QuotasClient', 'SecurityGroupDefaultRulesClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'ServerGroupsClient', 'ServersClient', 'ServicesClient', 'SnapshotsClient', 'TenantNetworksClient', 'TenantUsagesClient', 'VersionsClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'compute'}, {'name': 'placement', 'service_version': 'placement', 'module_path': 'tempest.lib.services.placement', 'client_names': ['PlacementClient', 'ResourceProvidersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'placement'}, {'name': 'identity_v2', 'service_version': 'identity.v2', 'module_path': 'tempest.lib.services.identity.v2', 'client_names': ['EndpointsClient', 'IdentityClient', 'RolesClient', 'ServicesClient', 'TenantsClient', 'TokenClient', 'UsersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'identity_v3', 'service_version': 'identity.v3', 'module_path': 'tempest.lib.services.identity.v3', 'client_names': ['AccessRulesClient', 'ApplicationCredentialsClient', 'CatalogClient', 'CredentialsClient', 'DomainsClient', 'DomainConfigurationClient', 'EndPointGroupsClient', 'EndPointsClient', 'EndPointsFilterClient', 'GroupsClient', 'IdentityClient', 'InheritedRolesClient', 'OAUTHConsumerClient', 'OAUTHTokenClient', 'PoliciesClient', 'ProjectsClient', 'ProjectTagsClient', 'RegionsClient', 'RoleAssignmentsClient', 'RolesClient', 'ServicesClient', 'V3TokenClient', 'TrustsClient', 'UsersClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'image_v1', 'service_version': 'image.v1', 'module_path': 'tempest.lib.services.image.v1', 'client_names': ['ImageMembersClient', 'ImagesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'image_v2', 'service_version': 'image.v2', 'module_path': 'tempest.lib.services.image.v2', 'client_names': ['ImageMembersClient', 'ImagesClient', 'NamespaceObjectsClient', 'NamespacePropertiesClient', 'NamespaceTagsClient', 'NamespacesClient', 'ResourceTypesClient', 'SchemasClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'network', 'service_version': 'network', 'module_path': 'tempest.lib.services.network', 'client_names': ['AgentsClient', 'ExtensionsClient', 'FloatingIPsClient', 'MeteringLabelRulesClient', 'MeteringLabelsClient', 'NetworksClient', 'NetworkVersionsClient', 'PortsClient', 'QosClient', 'QosMinimumBandwidthRulesClient', 'QuotasClient', 'RoutersClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'SegmentsClient', 'ServiceProvidersClient', 'SubnetpoolsClient', 'SubnetsClient', 'TagsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'network'}, {'name': 'object_storage', 'service_version': 'object-storage', 'module_path': 'tempest.lib.services.object_storage', 'client_names': ['AccountClient', 'BulkMiddlewareClient', 'CapabilitiesClient', 'ContainerClient', 'ObjectClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'object-store'}, {'name': 'volume_v1', 'service_version': 'volume.v1', 'module_path': 'tempest.lib.services.volume.v1', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v2', 'service_version': 'volume.v2', 'module_path': 'tempest.lib.services.volume.v2', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient', 'CapabilitiesClient', 'SchedulerStatsClient', 'SnapshotManageClient', 'VolumeManageClient', 'TransfersClient', 'QuotaClassesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v3', 'service_version': 'volume.v3', 'module_path': 'tempest.lib.services.volume.v3', 'client_names': ['AttachmentsClient', 'AvailabilityZoneClient', 'BackupsClient', 'BaseClient', 'CapabilitiesClient', 'EncryptionTypesClient', 'ExtensionsClient', 'GroupSnapshotsClient', 'GroupTypesClient', 'GroupsClient', 'HostsClient', 'LimitsClient', 'MessagesClient', 'QosSpecsClient', 'QuotaClassesClient', 'QuotasClient', 'SchedulerStatsClient', 'ServicesClient', 'SnapshotManageClient', 'SnapshotsClient', 'TransfersClient', 'TypesClient', 'VersionsClient', 'VolumeManageClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}] register_service_client /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/services/clients.py:121 2020-12-14 02:13:10.264 193 DEBUG tempest [-] load_balancer.amphora_ssh_user = ubuntu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.264 186 DEBUG tempest [-] load_balancer.build_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.265 189 DEBUG tempest.lib.services.clients [-] Successfully registered plugin barbican_tests in the service client registry with configuration: [{'name': 'secret_v1', 'service_version': 'secret.v1', 'module_path': 'barbican_tempest_plugin.services.key_manager.json', 'client_names': ['ConsumerClient', 'ContainerClient', 'OrderClient', 'QuotaClient', 'SecretClient', 'SecretMetadataClient']}] register_service_client /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/services/clients.py:121 2020-12-14 02:13:10.265 197 WARNING oslo_config.cfg [-] Deprecated: Option "spice_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-12-14 02:13:10.266 186 DEBUG tempest [-] load_balancer.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.266 193 DEBUG tempest [-] load_balancer.availability_zone = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.267 189 DEBUG tempest.lib.services.clients [-] Successfully registered plugin octavia-tempest-plugin in the service client registry with configuration: [{'name': 'load-balancer_v2', 'service_version': 'load-balancer.v2', 'module_path': 'octavia_tempest_plugin.services.load_balancer.v2', 'client_names': ['LoadbalancerClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'publicURL', 'build_timeout': 300, 'build_interval': 5.0, 'region': 'RegionOne', 'service': 'load-balancer'}] register_service_client /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/services/clients.py:121 2020-12-14 02:13:10.268 186 DEBUG tempest [-] load_balancer.catalog_type = load-balancer log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.267 197 DEBUG tempest [-] compute-feature-enabled.spice_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.268 193 DEBUG tempest [-] load_balancer.availability_zone2 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.270 186 DEBUG tempest [-] load_balancer.check_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.270 197 DEBUG tempest [-] compute-feature-enabled.stable_rescue = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.271 193 DEBUG tempest [-] load_balancer.availability_zone3 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.272 186 DEBUG tempest [-] load_balancer.check_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.272 197 DEBUG tempest [-] compute-feature-enabled.suspend = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.273 186 DEBUG tempest [-] load_balancer.disable_boot_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.274 197 DEBUG tempest [-] compute-feature-enabled.swap_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.273 193 DEBUG tempest [-] load_balancer.build_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.275 186 DEBUG tempest [-] load_balancer.enable_security_groups = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.276 197 DEBUG tempest [-] compute-feature-enabled.vnc_console = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.276 193 DEBUG tempest [-] load_balancer.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.277 186 DEBUG tempest [-] load_balancer.enabled_provider_drivers = {'amphora': 'The Octavia Amphora driver.', 'amphorav2': 'The Octavia Amphora driver that uses taskflow jobboard persistence.', 'octavia': 'Deprecated alias of the Octavia Amphora driver.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.278 197 DEBUG tempest [-] compute-feature-enabled.vnc_server_header = WebSockify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.278 193 DEBUG tempest [-] load_balancer.catalog_type = load-balancer log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.279 186 DEBUG tempest [-] load_balancer.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.280 197 DEBUG tempest [-] compute-feature-enabled.volume_backed_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.281 193 DEBUG tempest [-] load_balancer.check_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.281 186 DEBUG tempest [-] load_balancer.expected_availability_zone_capability = {'compute_zone': 'The compute availability zone.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.282 197 DEBUG tempest [-] compute-feature-enabled.volume_multiattach = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.283 193 DEBUG tempest [-] load_balancer.check_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.283 186 DEBUG tempest [-] load_balancer.expected_flavor_capability = {'loadbalancer_topology': 'The load balancer topology. One of: SINGLE - One amphora per load balancer. ACTIVE_STANDBY - Two amphora per load balancer.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.284 197 DEBUG tempest [-] compute-feature-enabled.xenapi_apis = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.285 186 DEBUG tempest [-] load_balancer.lb_build_interval = 10.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.286 197 DEBUG tempest [-] identity.admin_domain_scope = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.285 193 DEBUG tempest [-] load_balancer.disable_boot_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.287 186 DEBUG tempest [-] load_balancer.lb_build_timeout = 900 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.288 197 DEBUG tempest [-] identity.admin_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.288 193 DEBUG tempest [-] load_balancer.enable_security_groups = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.289 186 DEBUG tempest [-] load_balancer.loadbalancer_topology = SINGLE log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.289 197 DEBUG tempest [-] identity.auth_version = v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.291 186 DEBUG tempest [-] load_balancer.member_1_ipv4_subnet_cidr = 10.2.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.291 193 DEBUG tempest [-] load_balancer.enabled_provider_drivers = {'amphora': 'The Octavia Amphora driver.', 'amphorav2': 'The Octavia Amphora driver that uses taskflow jobboard persistence.', 'octavia': 'Deprecated alias of the Octavia Amphora driver.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.291 197 DEBUG tempest [-] identity.ca_certificates_file = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.293 186 DEBUG tempest [-] load_balancer.member_1_ipv6_subnet_cidr = fd7b:f9f7:0fff:4eca::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.293 197 DEBUG tempest [-] identity.catalog_type = identity log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.293 193 DEBUG tempest [-] load_balancer.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.295 186 DEBUG tempest [-] load_balancer.member_2_ipv4_subnet_cidr = 10.2.2.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.295 197 DEBUG tempest [-] identity.default_domain_id = default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.296 193 DEBUG tempest [-] load_balancer.expected_availability_zone_capability = {'compute_zone': 'The compute availability zone.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.297 186 DEBUG tempest [-] load_balancer.member_2_ipv6_subnet_cidr = fd77:1457:4cf0:26a8::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.297 197 DEBUG tempest [-] identity.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.299 186 DEBUG tempest [-] load_balancer.member_role = load-balancer_member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.298 193 DEBUG tempest [-] load_balancer.expected_flavor_capability = {'loadbalancer_topology': 'The load balancer topology. One of: SINGLE - One amphora per load balancer. ACTIVE_STANDBY - Two amphora per load balancer.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.299 197 DEBUG tempest [-] identity.region = RegionOne log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.301 186 DEBUG tempest [-] load_balancer.octavia_svc_username = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.301 197 DEBUG tempest [-] identity.uri = http://172.30.13.94/identity/v2.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.301 193 DEBUG tempest [-] load_balancer.lb_build_interval = 10.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.302 186 DEBUG tempest [-] load_balancer.provider = octavia log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.303 197 DEBUG tempest [-] identity.uri_v3 = http://172.30.13.94/identity/v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.303 193 DEBUG tempest [-] load_balancer.lb_build_timeout = 900 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.304 186 DEBUG tempest [-] load_balancer.random_server_name_length = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.305 197 DEBUG tempest [-] identity.user_lockout_duration = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.306 193 DEBUG tempest [-] load_balancer.loadbalancer_topology = SINGLE log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.306 186 DEBUG tempest [-] load_balancer.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.307 197 DEBUG tempest [-] identity.user_lockout_failure_attempts = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.308 186 DEBUG tempest [-] load_balancer.scp_connection_attempts = 20 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.308 193 DEBUG tempest [-] load_balancer.member_1_ipv4_subnet_cidr = 10.2.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.309 197 DEBUG tempest [-] identity.user_unique_last_password_count = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.310 186 DEBUG tempest [-] load_balancer.scp_connection_timeout = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.311 193 DEBUG tempest [-] load_balancer.member_1_ipv6_subnet_cidr = fd7b:f9f7:0fff:4eca::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.311 197 DEBUG tempest [-] identity.v2_admin_endpoint_type = adminURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.312 186 DEBUG tempest [-] load_balancer.tenant_flow_log_file = /var/log/octavia-tenant-traffic.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.313 197 DEBUG tempest [-] identity.v2_public_endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.313 193 DEBUG tempest [-] load_balancer.member_2_ipv4_subnet_cidr = 10.2.2.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.313 186 DEBUG tempest [-] load_balancer.test_ipv6_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.315 197 DEBUG tempest [-] identity.v3_endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.315 186 DEBUG tempest [-] load_balancer.test_network_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.315 193 DEBUG tempest [-] load_balancer.member_2_ipv6_subnet_cidr = fd77:1457:4cf0:26a8::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.317 186 DEBUG tempest [-] load_balancer.test_reuse_connection = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.317 197 DEBUG tempest [-] service-clients.http_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.318 193 DEBUG tempest [-] load_balancer.member_role = load-balancer_member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.319 186 DEBUG tempest [-] load_balancer.test_server_path = /opt/octavia-tempest-plugin/test_server.bin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.319 197 DEBUG tempest [-] service-clients.proxy_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.320 193 DEBUG tempest [-] load_balancer.octavia_svc_username = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.321 186 DEBUG tempest [-] load_balancer.test_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.321 197 DEBUG tempest [-] identity-feature-enabled.access_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.323 186 DEBUG tempest [-] load_balancer.test_with_ipv6 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.323 193 DEBUG tempest [-] load_balancer.provider = octavia log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.323 197 DEBUG tempest [-] identity-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.324 186 DEBUG tempest [-] load_balancer.test_with_noop = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.325 193 DEBUG tempest [-] load_balancer.random_server_name_length = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.325 197 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "identity-feature-enabled" is deprecated for removal (The identity v2.0 API was removed in the Queens release. Tests that exercise the v2.0 API will be removed from tempest in the v22.0.0 release. They are kept only to test stable branches.). Its value may be silently ignored in the future. 2020-12-14 02:13:10.326 186 DEBUG tempest [-] load_balancer.vip_ipv6_subnet_cidr = fdde:1a92:7523:70a0::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.328 193 DEBUG tempest [-] load_balancer.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.328 197 DEBUG tempest [-] identity-feature-enabled.api_v2 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.328 186 DEBUG tempest [-] load_balancer.vip_subnet_cidr = 10.1.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.330 193 DEBUG tempest [-] load_balancer.scp_connection_attempts = 20 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.330 197 DEBUG tempest [-] identity-feature-enabled.api_v2_admin = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.330 186 DEBUG tempest [-] loadbalancer-feature-enabled.health_monitor_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.332 197 DEBUG tempest [-] identity-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.332 186 DEBUG tempest [-] loadbalancer-feature-enabled.l4_protocol = TCP log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.332 193 DEBUG tempest [-] load_balancer.scp_connection_timeout = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.334 186 DEBUG tempest [-] loadbalancer-feature-enabled.l7_protocol_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.334 197 DEBUG tempest [-] identity-feature-enabled.application_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.334 193 DEBUG tempest [-] load_balancer.tenant_flow_log_file = /var/log/octavia-tenant-traffic.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.336 186 DEBUG tempest [-] loadbalancer-feature-enabled.log_offload_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.336 197 DEBUG tempest [-] identity-feature-enabled.domain_specific_drivers = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.337 193 DEBUG tempest [-] load_balancer.test_ipv6_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.338 186 DEBUG tempest [-] loadbalancer-feature-enabled.not_implemented_is_error = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.338 197 DEBUG tempest [-] identity-feature-enabled.external_idp = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.339 186 DEBUG tempest [-] loadbalancer-feature-enabled.pool_algorithms_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.339 193 DEBUG tempest [-] load_balancer.test_network_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.340 197 DEBUG tempest [-] identity-feature-enabled.federation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.341 186 DEBUG tempest [-] loadbalancer-feature-enabled.session_persistence_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.342 197 DEBUG tempest [-] identity-feature-enabled.immutable_user_source = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.341 193 DEBUG tempest [-] load_balancer.test_reuse_connection = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.343 186 DEBUG tempest [-] loadbalancer-feature-enabled.spare_pool_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.344 197 DEBUG tempest [-] identity-feature-enabled.project_tags = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.344 193 DEBUG tempest [-] load_balancer.test_server_path = /opt/octavia-tempest-plugin/test_server.bin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.345 186 DEBUG tempest [-] loadbalancer-feature-enabled.terminated_tls_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.346 197 DEBUG tempest [-] identity-feature-enabled.security_compliance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.346 186 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2591 2020-12-14 02:13:10.346 193 DEBUG tempest [-] load_balancer.test_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.348 197 DEBUG tempest [-] identity-feature-enabled.trust = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.349 193 DEBUG tempest [-] load_balancer.test_with_ipv6 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.350 197 DEBUG tempest [-] image.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.351 193 DEBUG tempest [-] load_balancer.test_with_noop = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.351 197 DEBUG tempest [-] image.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.353 193 DEBUG tempest [-] load_balancer.vip_ipv6_subnet_cidr = fdde:1a92:7523:70a0::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.353 197 DEBUG tempest [-] image.catalog_type = image log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.356 197 DEBUG tempest [-] image.container_formats = ['ami', 'ari', 'aki', 'bare', 'ovf', 'ova'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.356 193 DEBUG tempest [-] load_balancer.vip_subnet_cidr = 10.1.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.358 193 DEBUG tempest [-] loadbalancer-feature-enabled.health_monitor_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.359 197 DEBUG tempest [-] image.disk_formats = ['ami', 'ari', 'aki', 'vhd', 'vmdk', 'raw', 'qcow2', 'vdi', 'iso', 'vhdx'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.361 193 DEBUG tempest [-] loadbalancer-feature-enabled.l4_protocol = TCP log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.361 197 DEBUG tempest [-] image.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.363 197 DEBUG tempest [-] image.http_image = http://download.cirros-cloud.net/0.3.1/cirros-0.3.1-x86_64-uec.tar.gz log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.363 193 DEBUG tempest [-] loadbalancer-feature-enabled.l7_protocol_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.365 197 DEBUG tempest [-] image.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.365 193 DEBUG tempest [-] loadbalancer-feature-enabled.log_offload_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.367 197 WARNING oslo_config.cfg [-] Deprecated: Option "api_v1" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-12-14 02:13:10.368 193 DEBUG tempest [-] loadbalancer-feature-enabled.not_implemented_is_error = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.369 197 DEBUG tempest [-] image-feature-enabled.api_v1 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.370 193 DEBUG tempest [-] loadbalancer-feature-enabled.pool_algorithms_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.369 186 DEBUG tempest.lib.services.clients [-] Successfully registered plugin __tempest__ in the service client registry with configuration: [{'name': 'compute', 'service_version': 'compute', 'module_path': 'tempest.lib.services.compute', 'client_names': ['AgentsClient', 'AggregatesClient', 'AvailabilityZoneClient', 'BaremetalNodesClient', 'CertificatesClient', 'ExtensionsClient', 'FixedIPsClient', 'FlavorsClient', 'FloatingIPPoolsClient', 'FloatingIPsBulkClient', 'FloatingIPsClient', 'HostsClient', 'HypervisorClient', 'ImagesClient', 'InstanceUsagesAuditLogClient', 'InterfacesClient', 'KeyPairsClient', 'LimitsClient', 'MigrationsClient', 'NetworksClient', 'QuotaClassesClient', 'QuotasClient', 'SecurityGroupDefaultRulesClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'ServerGroupsClient', 'ServersClient', 'ServicesClient', 'SnapshotsClient', 'TenantNetworksClient', 'TenantUsagesClient', 'VersionsClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'compute'}, {'name': 'placement', 'service_version': 'placement', 'module_path': 'tempest.lib.services.placement', 'client_names': ['PlacementClient', 'ResourceProvidersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'placement'}, {'name': 'identity_v2', 'service_version': 'identity.v2', 'module_path': 'tempest.lib.services.identity.v2', 'client_names': ['EndpointsClient', 'IdentityClient', 'RolesClient', 'ServicesClient', 'TenantsClient', 'TokenClient', 'UsersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'identity_v3', 'service_version': 'identity.v3', 'module_path': 'tempest.lib.services.identity.v3', 'client_names': ['AccessRulesClient', 'ApplicationCredentialsClient', 'CatalogClient', 'CredentialsClient', 'DomainsClient', 'DomainConfigurationClient', 'EndPointGroupsClient', 'EndPointsClient', 'EndPointsFilterClient', 'GroupsClient', 'IdentityClient', 'InheritedRolesClient', 'OAUTHConsumerClient', 'OAUTHTokenClient', 'PoliciesClient', 'ProjectsClient', 'ProjectTagsClient', 'RegionsClient', 'RoleAssignmentsClient', 'RolesClient', 'ServicesClient', 'V3TokenClient', 'TrustsClient', 'UsersClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'image_v1', 'service_version': 'image.v1', 'module_path': 'tempest.lib.services.image.v1', 'client_names': ['ImageMembersClient', 'ImagesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'image_v2', 'service_version': 'image.v2', 'module_path': 'tempest.lib.services.image.v2', 'client_names': ['ImageMembersClient', 'ImagesClient', 'NamespaceObjectsClient', 'NamespacePropertiesClient', 'NamespaceTagsClient', 'NamespacesClient', 'ResourceTypesClient', 'SchemasClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'network', 'service_version': 'network', 'module_path': 'tempest.lib.services.network', 'client_names': ['AgentsClient', 'ExtensionsClient', 'FloatingIPsClient', 'MeteringLabelRulesClient', 'MeteringLabelsClient', 'NetworksClient', 'NetworkVersionsClient', 'PortsClient', 'QosClient', 'QosMinimumBandwidthRulesClient', 'QuotasClient', 'RoutersClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'SegmentsClient', 'ServiceProvidersClient', 'SubnetpoolsClient', 'SubnetsClient', 'TagsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'network'}, {'name': 'object_storage', 'service_version': 'object-storage', 'module_path': 'tempest.lib.services.object_storage', 'client_names': ['AccountClient', 'BulkMiddlewareClient', 'CapabilitiesClient', 'ContainerClient', 'ObjectClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'object-store'}, {'name': 'volume_v1', 'service_version': 'volume.v1', 'module_path': 'tempest.lib.services.volume.v1', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v2', 'service_version': 'volume.v2', 'module_path': 'tempest.lib.services.volume.v2', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient', 'CapabilitiesClient', 'SchedulerStatsClient', 'SnapshotManageClient', 'VolumeManageClient', 'TransfersClient', 'QuotaClassesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v3', 'service_version': 'volume.v3', 'module_path': 'tempest.lib.services.volume.v3', 'client_names': ['AttachmentsClient', 'AvailabilityZoneClient', 'BackupsClient', 'BaseClient', 'CapabilitiesClient', 'EncryptionTypesClient', 'ExtensionsClient', 'GroupSnapshotsClient', 'GroupTypesClient', 'GroupsClient', 'HostsClient', 'LimitsClient', 'MessagesClient', 'QosSpecsClient', 'QuotaClassesClient', 'QuotasClient', 'SchedulerStatsClient', 'ServicesClient', 'SnapshotManageClient', 'SnapshotsClient', 'TransfersClient', 'TypesClient', 'VersionsClient', 'VolumeManageClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}] register_service_client /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/services/clients.py:121 2020-12-14 02:13:10.372 186 DEBUG tempest.lib.services.clients [-] Successfully registered plugin barbican_tests in the service client registry with configuration: [{'name': 'secret_v1', 'service_version': 'secret.v1', 'module_path': 'barbican_tempest_plugin.services.key_manager.json', 'client_names': ['ConsumerClient', 'ContainerClient', 'OrderClient', 'QuotaClient', 'SecretClient', 'SecretMetadataClient']}] register_service_client /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/services/clients.py:121 2020-12-14 02:13:10.372 197 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-12-14 02:13:10.372 193 DEBUG tempest [-] loadbalancer-feature-enabled.session_persistence_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.374 197 DEBUG tempest [-] image-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.375 186 DEBUG tempest.lib.services.clients [-] Successfully registered plugin octavia-tempest-plugin in the service client registry with configuration: [{'name': 'load-balancer_v2', 'service_version': 'load-balancer.v2', 'module_path': 'octavia_tempest_plugin.services.load_balancer.v2', 'client_names': ['LoadbalancerClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'publicURL', 'build_timeout': 300, 'build_interval': 5.0, 'region': 'RegionOne', 'service': 'load-balancer'}] register_service_client /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/services/clients.py:121 2020-12-14 02:13:10.375 193 DEBUG tempest [-] loadbalancer-feature-enabled.spare_pool_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.377 197 DEBUG tempest [-] image-feature-enabled.import_image = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.377 193 DEBUG tempest [-] loadbalancer-feature-enabled.terminated_tls_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.379 197 DEBUG tempest [-] network.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.379 193 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2591 2020-12-14 02:13:10.381 197 DEBUG tempest [-] network.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.383 197 DEBUG tempest [-] network.catalog_type = network log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.385 197 DEBUG tempest [-] network.default_network = ['192.168.120.0/24'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.387 197 DEBUG tempest [-] network.dns_servers = ['8.8.8.8', '8.8.4.4'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.389 197 DEBUG tempest [-] network.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.391 197 DEBUG tempest [-] network.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.393 197 DEBUG tempest [-] network.port_profile = {} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.395 197 DEBUG tempest [-] network.port_vnic_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.397 197 DEBUG tempest [-] network.project_network_cidr = 192.168.120.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.399 197 DEBUG tempest [-] network.project_network_mask_bits = 28 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.401 197 DEBUG tempest [-] network.project_network_v6_cidr = 2001:db8::/48 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.403 197 DEBUG tempest [-] network.project_network_v6_mask_bits = 64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.405 197 DEBUG tempest [-] network.project_networks_reachable = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.407 197 DEBUG tempest [-] network.public_network_id = 3fe4fc32-89a3-4f72-b166-6eb7100e1fea log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.409 197 DEBUG tempest [-] network.public_router_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.411 197 DEBUG tempest [-] network.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.410 193 DEBUG tempest.lib.services.clients [-] Successfully registered plugin __tempest__ in the service client registry with configuration: [{'name': 'compute', 'service_version': 'compute', 'module_path': 'tempest.lib.services.compute', 'client_names': ['AgentsClient', 'AggregatesClient', 'AvailabilityZoneClient', 'BaremetalNodesClient', 'CertificatesClient', 'ExtensionsClient', 'FixedIPsClient', 'FlavorsClient', 'FloatingIPPoolsClient', 'FloatingIPsBulkClient', 'FloatingIPsClient', 'HostsClient', 'HypervisorClient', 'ImagesClient', 'InstanceUsagesAuditLogClient', 'InterfacesClient', 'KeyPairsClient', 'LimitsClient', 'MigrationsClient', 'NetworksClient', 'QuotaClassesClient', 'QuotasClient', 'SecurityGroupDefaultRulesClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'ServerGroupsClient', 'ServersClient', 'ServicesClient', 'SnapshotsClient', 'TenantNetworksClient', 'TenantUsagesClient', 'VersionsClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'compute'}, {'name': 'placement', 'service_version': 'placement', 'module_path': 'tempest.lib.services.placement', 'client_names': ['PlacementClient', 'ResourceProvidersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'placement'}, {'name': 'identity_v2', 'service_version': 'identity.v2', 'module_path': 'tempest.lib.services.identity.v2', 'client_names': ['EndpointsClient', 'IdentityClient', 'RolesClient', 'ServicesClient', 'TenantsClient', 'TokenClient', 'UsersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'identity_v3', 'service_version': 'identity.v3', 'module_path': 'tempest.lib.services.identity.v3', 'client_names': ['AccessRulesClient', 'ApplicationCredentialsClient', 'CatalogClient', 'CredentialsClient', 'DomainsClient', 'DomainConfigurationClient', 'EndPointGroupsClient', 'EndPointsClient', 'EndPointsFilterClient', 'GroupsClient', 'IdentityClient', 'InheritedRolesClient', 'OAUTHConsumerClient', 'OAUTHTokenClient', 'PoliciesClient', 'ProjectsClient', 'ProjectTagsClient', 'RegionsClient', 'RoleAssignmentsClient', 'RolesClient', 'ServicesClient', 'V3TokenClient', 'TrustsClient', 'UsersClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'image_v1', 'service_version': 'image.v1', 'module_path': 'tempest.lib.services.image.v1', 'client_names': ['ImageMembersClient', 'ImagesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'image_v2', 'service_version': 'image.v2', 'module_path': 'tempest.lib.services.image.v2', 'client_names': ['ImageMembersClient', 'ImagesClient', 'NamespaceObjectsClient', 'NamespacePropertiesClient', 'NamespaceTagsClient', 'NamespacesClient', 'ResourceTypesClient', 'SchemasClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'network', 'service_version': 'network', 'module_path': 'tempest.lib.services.network', 'client_names': ['AgentsClient', 'ExtensionsClient', 'FloatingIPsClient', 'MeteringLabelRulesClient', 'MeteringLabelsClient', 'NetworksClient', 'NetworkVersionsClient', 'PortsClient', 'QosClient', 'QosMinimumBandwidthRulesClient', 'QuotasClient', 'RoutersClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'SegmentsClient', 'ServiceProvidersClient', 'SubnetpoolsClient', 'SubnetsClient', 'TagsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'network'}, {'name': 'object_storage', 'service_version': 'object-storage', 'module_path': 'tempest.lib.services.object_storage', 'client_names': ['AccountClient', 'BulkMiddlewareClient', 'CapabilitiesClient', 'ContainerClient', 'ObjectClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'object-store'}, {'name': 'volume_v1', 'service_version': 'volume.v1', 'module_path': 'tempest.lib.services.volume.v1', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v2', 'service_version': 'volume.v2', 'module_path': 'tempest.lib.services.volume.v2', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient', 'CapabilitiesClient', 'SchedulerStatsClient', 'SnapshotManageClient', 'VolumeManageClient', 'TransfersClient', 'QuotaClassesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v3', 'service_version': 'volume.v3', 'module_path': 'tempest.lib.services.volume.v3', 'client_names': ['AttachmentsClient', 'AvailabilityZoneClient', 'BackupsClient', 'BaseClient', 'CapabilitiesClient', 'EncryptionTypesClient', 'ExtensionsClient', 'GroupSnapshotsClient', 'GroupTypesClient', 'GroupsClient', 'HostsClient', 'LimitsClient', 'MessagesClient', 'QosSpecsClient', 'QuotaClassesClient', 'QuotasClient', 'SchedulerStatsClient', 'ServicesClient', 'SnapshotManageClient', 'SnapshotsClient', 'TransfersClient', 'TypesClient', 'VersionsClient', 'VolumeManageClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}] register_service_client /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/services/clients.py:121 2020-12-14 02:13:10.413 197 DEBUG tempest [-] network.shared_physical_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.414 193 DEBUG tempest.lib.services.clients [-] Successfully registered plugin barbican_tests in the service client registry with configuration: [{'name': 'secret_v1', 'service_version': 'secret.v1', 'module_path': 'barbican_tempest_plugin.services.key_manager.json', 'client_names': ['ConsumerClient', 'ContainerClient', 'OrderClient', 'QuotaClient', 'SecretClient', 'SecretMetadataClient']}] register_service_client /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/services/clients.py:121 2020-12-14 02:13:10.415 197 DEBUG tempest [-] network.subnet_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.417 193 DEBUG tempest.lib.services.clients [-] Successfully registered plugin octavia-tempest-plugin in the service client registry with configuration: [{'name': 'load-balancer_v2', 'service_version': 'load-balancer.v2', 'module_path': 'octavia_tempest_plugin.services.load_balancer.v2', 'client_names': ['LoadbalancerClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'publicURL', 'build_timeout': 300, 'build_interval': 5.0, 'region': 'RegionOne', 'service': 'load-balancer'}] register_service_client /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/services/clients.py:121 2020-12-14 02:13:10.419 197 DEBUG tempest [-] network-feature-enabled.api_extensions = ['address-group', 'address-scope', 'router-admin-state-down-before-update', 'agent', 'agent-resources-synced', 'allowed-address-pairs', 'auto-allocated-topology', 'availability_zone', 'availability_zone_filter', 'default-subnetpools', 'dhcp_agent_scheduler', 'dns-integration', 'dns-domain-ports', 'dvr', 'empty-string-filtering', 'expose-port-forwarding-in-fip', 'external-net', 'extra_dhcp_opt', 'extraroute', 'extraroute-atomic', 'filter-validation', 'floating-ip-port-forwarding-description', 'fip-port-details', 'flavors', 'floating-ip-port-forwarding', 'floatingip-pools', 'ip_allocation', 'ip-substring-filtering', 'l2_adjacency', 'router', 'ext-gw-mode', 'l3-ha', 'l3-flavors', 'l3-port-ip-change-not-allowed', 'l3_agent_scheduler', 'logging', 'multi-provider', 'net-mtu', 'net-mtu-writable', 'network_availability_zone', 'network-ip-availability', 'pagination', 'port-mac-address-regenerate', 'port-resource-request', 'binding', 'binding-extended', 'port-security', 'project-id', 'provider', 'qos', 'qos-bw-limit-direction', 'qos-bw-minimum-ingress', 'qos-default', 'qos-fip', 'qos-gateway-ip', 'qos-port-network-policy', 'qos-rule-type-details', 'qos-rules-alias', 'quotas', 'quota_details', 'rbac-policies', 'rbac-address-scope', 'rbac-security-groups', 'rbac-subnetpool', 'revision-if-match', 'standard-attr-revisions', 'router_availability_zone', 'port-security-groups-filtering', 'security-group', 'segment', 'segments-peer-subnet-host-routes', 'service-type', 'sorting', 'standard-attr-segment', 'standard-attr-description', 'stateful-security-group', 'subnet-dns-publish-fixed-ip', 'subnet_onboard', 'subnet-segmentid-writable', 'subnet-service-types', 'subnet_allocation', 'subnetpool-prefix-ops', 'standard-attr-tag', 'standard-attr-timestamp', 'trunk', 'trunk-details'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.421 197 DEBUG tempest [-] network-feature-enabled.available_features = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.423 197 DEBUG tempest [-] network-feature-enabled.floating_ips = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.425 197 DEBUG tempest [-] network-feature-enabled.ipv6 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.427 197 DEBUG tempest [-] network-feature-enabled.ipv6_subnet_attributes = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.429 197 DEBUG tempest [-] network-feature-enabled.port_admin_state_change = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.431 197 DEBUG tempest [-] network-feature-enabled.port_security = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.433 197 DEBUG tempest [-] network-feature-enabled.provider_net_base_segmentation_id = 3000 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.435 197 DEBUG tempest [-] network-feature-enabled.qos_placement_physnet = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.437 197 DEBUG tempest [-] validation.auth_method = keypair log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.439 197 DEBUG tempest [-] validation.connect_method = floating log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.441 197 DEBUG tempest [-] validation.connect_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.443 197 DEBUG tempest [-] validation.floating_ip_range = 10.0.0.0/29 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.445 197 DEBUG tempest [-] validation.image_alt_ssh_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.447 197 DEBUG tempest [-] validation.image_alt_ssh_user = root log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.449 197 DEBUG tempest [-] validation.image_ssh_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.452 197 DEBUG tempest [-] validation.image_ssh_user = cirros log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.454 197 DEBUG tempest [-] validation.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.456 197 DEBUG tempest [-] validation.network_for_ssh = patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.458 197 DEBUG tempest [-] validation.ping_count = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.460 197 DEBUG tempest [-] validation.ping_size = 56 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.462 197 DEBUG tempest [-] validation.ping_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.463 197 DEBUG tempest [-] validation.run_validation = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.465 197 DEBUG tempest [-] validation.security_group = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.467 197 DEBUG tempest [-] validation.security_group_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.470 197 DEBUG tempest [-] validation.ssh_shell_prologue = set -eu -o pipefail; PATH=$PATH:/sbin:/usr/sbin; log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.471 197 DEBUG tempest [-] validation.ssh_timeout = 196 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.474 197 DEBUG tempest [-] volume.backend_names = ['BACKEND_1', 'BACKEND_2'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.476 197 DEBUG tempest [-] volume.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.478 197 DEBUG tempest [-] volume.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.480 197 DEBUG tempest [-] volume.catalog_type = volumev3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.482 197 DEBUG tempest [-] volume.disk_format = raw log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.484 197 DEBUG tempest [-] volume.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.486 197 DEBUG tempest [-] volume.manage_snapshot_ref = ['source-name', 'snapshot-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.488 197 DEBUG tempest [-] volume.manage_volume_ref = ['source-name', 'volume-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.490 197 DEBUG tempest [-] volume.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.492 197 DEBUG tempest [-] volume.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.494 197 DEBUG tempest [-] volume.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.496 197 DEBUG tempest [-] volume.storage_protocol = ceph log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.498 197 DEBUG tempest [-] volume.vendor_name = Open Source log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.500 197 DEBUG tempest [-] volume.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.502 197 DEBUG tempest [-] volume-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.504 197 DEBUG tempest [-] volume-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.506 197 DEBUG tempest [-] volume-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.508 197 DEBUG tempest [-] volume-feature-enabled.backup = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.510 197 DEBUG tempest [-] volume-feature-enabled.clone = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.512 197 DEBUG tempest [-] volume-feature-enabled.consistency_group = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.514 197 DEBUG tempest [-] volume-feature-enabled.extend_attached_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.516 197 DEBUG tempest [-] volume-feature-enabled.extend_attached_volume = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.518 197 DEBUG tempest [-] volume-feature-enabled.manage_snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.520 197 DEBUG tempest [-] volume-feature-enabled.manage_volume = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.522 197 DEBUG tempest [-] volume-feature-enabled.multi_backend = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.524 197 DEBUG tempest [-] volume-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.526 197 DEBUG tempest [-] volume-feature-enabled.volume_revert = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.528 197 DEBUG tempest [-] object-storage.catalog_type = object-store log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.530 197 DEBUG tempest [-] object-storage.cluster_name = name1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.532 197 DEBUG tempest [-] object-storage.container_sync_interval = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.534 197 DEBUG tempest [-] object-storage.container_sync_timeout = 600 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.536 197 DEBUG tempest [-] object-storage.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.538 197 DEBUG tempest [-] object-storage.operator_role = member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.540 197 DEBUG tempest [-] object-storage.realm_name = realm1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.542 197 DEBUG tempest [-] object-storage.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.544 197 DEBUG tempest [-] object-storage.reseller_admin_role = ResellerAdmin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.546 197 DEBUG tempest [-] object-storage-feature-enabled.container_sync = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.548 197 DEBUG tempest [-] object-storage-feature-enabled.discoverability = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.550 197 DEBUG tempest [-] object-storage-feature-enabled.discoverable_apis = ['account_quotas', 'formpost', 'bulk_upload', 'bulk_delete', 'tempurl', 'crossdomain', 'container_quotas', 'staticweb', 'account_quotas', 'slo'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.552 197 DEBUG tempest [-] object-storage-feature-enabled.object_versioning = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.554 197 DEBUG tempest [-] scenario.dhcp_client = udhcpc log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.556 197 DEBUG tempest [-] scenario.img_container_format = bare log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.559 197 WARNING oslo_config.cfg [-] Deprecated: Option "img_dir" from group "scenario" is deprecated for removal. Its value may be silently ignored in the future. 2020-12-14 02:13:10.561 197 DEBUG tempest [-] scenario.img_dir = /home/opnfv/functest/images log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.563 197 DEBUG tempest [-] scenario.img_disk_format = qcow2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.565 197 DEBUG tempest [-] scenario.img_file = cirros-0.4.0-x86_64-disk.img log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.567 197 DEBUG tempest [-] scenario.img_properties = {'hw_scsi_model': 'virtio-scsi', 'hw_disk_bus': 'scsi'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.570 197 DEBUG tempest [-] scenario.protocol = icmp log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.571 197 DEBUG tempest [-] service_available.aodh = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.573 197 DEBUG tempest [-] service_available.barbican = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.575 197 DEBUG tempest [-] service_available.ceilometer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.577 197 DEBUG tempest [-] service_available.cinder = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.579 197 DEBUG tempest [-] service_available.cyborg = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.581 197 DEBUG tempest [-] service_available.glance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.583 197 DEBUG tempest [-] service_available.gnocchi = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.585 197 DEBUG tempest [-] service_available.heat = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.587 197 DEBUG tempest [-] service_available.load_balancer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.589 197 DEBUG tempest [-] service_available.neutron = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.591 197 DEBUG tempest [-] service_available.nova = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.593 197 DEBUG tempest [-] service_available.panko = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.595 197 DEBUG tempest [-] service_available.swift = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.597 197 DEBUG tempest [-] debug.trace_requests = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.599 197 DEBUG tempest [-] placement.catalog_type = placement log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.601 197 DEBUG tempest [-] placement.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.603 197 DEBUG tempest [-] placement.max_microversion = latest log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.605 197 DEBUG tempest [-] placement.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.607 197 DEBUG tempest [-] placement.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.609 197 DEBUG tempest [-] profiler.key = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.611 197 DEBUG tempest [-] heat_plugin.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.613 197 DEBUG tempest [-] heat_plugin.admin_project_name = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.615 197 DEBUG tempest [-] heat_plugin.admin_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.617 197 DEBUG tempest [-] heat_plugin.auth_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.619 197 DEBUG tempest [-] heat_plugin.auth_version = 3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.621 197 DEBUG tempest [-] heat_plugin.boot_config_env = /usr/lib/python3.8/site-packages/heat_tempest_plugin/tests/scenario/templates/boot_config_none_env.yaml log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.623 197 DEBUG tempest [-] heat_plugin.build_interval = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.625 197 DEBUG tempest [-] heat_plugin.build_timeout = 1200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.627 197 DEBUG tempest [-] heat_plugin.ca_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.629 197 DEBUG tempest [-] heat_plugin.catalog_type = orchestration log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.631 197 DEBUG tempest [-] heat_plugin.connectivity_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.633 197 DEBUG tempest [-] heat_plugin.convergence_engine_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.635 197 DEBUG tempest [-] heat_plugin.credential_secret_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.637 197 DEBUG tempest [-] heat_plugin.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.639 197 DEBUG tempest [-] heat_plugin.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.641 197 DEBUG tempest [-] heat_plugin.fixed_network_name = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.643 197 DEBUG tempest [-] heat_plugin.fixed_subnet_name = heat-subnet log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.645 197 DEBUG tempest [-] heat_plugin.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.647 197 DEBUG tempest [-] heat_plugin.heat_config_notify_script = heat-config-notify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.649 197 DEBUG tempest [-] heat_plugin.hidden_stack_tag = data-processing-cluster log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.651 197 DEBUG tempest [-] heat_plugin.image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.653 197 DEBUG tempest [-] heat_plugin.instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.655 197 DEBUG tempest [-] heat_plugin.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.656 197 DEBUG tempest [-] heat_plugin.keypair_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.658 197 DEBUG tempest [-] heat_plugin.minimal_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.660 197 DEBUG tempest [-] heat_plugin.minimal_instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.662 197 DEBUG tempest [-] heat_plugin.network_for_ssh = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.664 197 DEBUG tempest [-] heat_plugin.password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.666 197 DEBUG tempest [-] heat_plugin.project_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.668 197 DEBUG tempest [-] heat_plugin.project_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.670 197 DEBUG tempest [-] heat_plugin.project_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.672 197 DEBUG tempest [-] heat_plugin.region = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.674 197 DEBUG tempest [-] heat_plugin.skip_functional_test_list = ['EncryptionVolTypeTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.676 197 DEBUG tempest [-] heat_plugin.skip_functional_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.678 197 DEBUG tempest [-] heat_plugin.skip_scenario_test_list = ['AodhAlarmTest', 'SoftwareConfigIntegrationTest', 'VolumeBackupRestoreIntegrationTest', 'CfnInitIntegrationTest', 'LoadBalancerTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.680 197 DEBUG tempest [-] heat_plugin.skip_scenario_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.681 197 DEBUG tempest [-] heat_plugin.skip_test_stack_action_list = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.683 197 DEBUG tempest [-] heat_plugin.ssh_channel_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.685 197 DEBUG tempest [-] heat_plugin.ssh_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.687 197 DEBUG tempest [-] heat_plugin.user_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.689 197 DEBUG tempest [-] heat_plugin.user_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.690 197 DEBUG tempest [-] heat_plugin.username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.692 197 DEBUG tempest [-] heat_plugin.vm_to_heat_api_insecure = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.694 197 DEBUG tempest [-] heat_plugin.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.696 197 DEBUG tempest [-] heat_features_enabled.multi_cloud = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.698 197 DEBUG tempest [-] heat_features_enabled.stack_cancel = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.700 197 DEBUG tempest [-] fed_scenario.enable_k2k_groups_mapping = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.702 197 DEBUG tempest [-] fed_scenario.idp_ecp_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.704 197 DEBUG tempest [-] fed_scenario.idp_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.706 197 DEBUG tempest [-] fed_scenario.idp_password = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.707 197 DEBUG tempest [-] fed_scenario.idp_remote_ids = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.709 197 DEBUG tempest [-] fed_scenario.idp_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.711 197 DEBUG tempest [-] fed_scenario.mapping_group_domain_name = federated_domain log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.713 197 DEBUG tempest [-] fed_scenario.mapping_group_name = federated_users log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.715 197 DEBUG tempest [-] fed_scenario.mapping_remote_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.717 197 DEBUG tempest [-] fed_scenario.mapping_user_name = {0} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.719 197 DEBUG tempest [-] fed_scenario.protocol_id = mapped log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.721 197 DEBUG tempest [-] patrole.custom_policy_files = ['/etc/%s/policy.json'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.723 197 DEBUG tempest [-] patrole.custom_requirements_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.725 197 DEBUG tempest [-] patrole.rbac_test_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.727 197 DEBUG tempest [-] patrole.rbac_test_roles = ['admin'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.729 197 DEBUG tempest [-] patrole.test_custom_requirements = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.731 197 DEBUG tempest [-] patrole.validate_deprecated_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.733 197 DEBUG tempest [-] patrole_log.enable_reporting = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.735 197 DEBUG tempest [-] patrole_log.report_log_name = patrole.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.737 197 DEBUG tempest [-] patrole_log.report_log_path = . log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.739 197 DEBUG tempest [-] policy-feature-enabled.added_cinder_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.741 197 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_ussuri = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.743 197 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_victoria = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.744 197 DEBUG tempest [-] policy-feature-enabled.create_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.746 197 DEBUG tempest [-] policy-feature-enabled.keystone_policy_enforcement_train = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.748 197 DEBUG tempest [-] policy-feature-enabled.limits_extension_used_limits_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.750 197 DEBUG tempest [-] policy-feature-enabled.removed_keystone_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.752 197 DEBUG tempest [-] policy-feature-enabled.removed_nova_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.754 197 DEBUG tempest [-] policy-feature-enabled.removed_nova_policies_wallaby = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.756 197 DEBUG tempest [-] policy-feature-enabled.update_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.758 197 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_attach_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.760 197 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_reserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.762 197 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_unreserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.764 197 DEBUG tempest [-] telemetry.alarm_aggregation_method = rate:mean log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.765 197 DEBUG tempest [-] telemetry.alarm_granularity = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.767 197 DEBUG tempest [-] telemetry.alarm_metric_name = cpu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.769 197 DEBUG tempest [-] telemetry.alarm_threshold = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.771 197 DEBUG tempest [-] telemetry.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.773 197 DEBUG tempest [-] telemetry.notification_sleep = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.775 197 DEBUG tempest [-] telemetry.notification_wait = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.777 197 DEBUG tempest [-] event.catalog_type = event log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.779 197 DEBUG tempest [-] event.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.781 197 DEBUG tempest [-] alarming_plugin.catalog_type = alarming log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.783 197 DEBUG tempest [-] alarming_plugin.create_alarms = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.785 197 DEBUG tempest [-] alarming_plugin.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.787 197 DEBUG tempest [-] metric.catalog_type = metric log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.789 197 DEBUG tempest [-] metric.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.791 197 DEBUG tempest [-] ephemeral_storage_encryption.cipher = aes-xts-plain64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.793 197 DEBUG tempest [-] ephemeral_storage_encryption.enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.795 197 DEBUG tempest [-] ephemeral_storage_encryption.key_size = 256 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.797 197 DEBUG tempest [-] image_signature_verification.enforced = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.799 197 DEBUG tempest [-] load_balancer.RBAC_test_type = advanced log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.801 197 DEBUG tempest [-] load_balancer.admin_role = load-balancer_admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.803 197 DEBUG tempest [-] load_balancer.amphora_admin_log_file = /var/log/octavia-amphora.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.805 197 DEBUG tempest [-] load_balancer.amphora_ssh_key = /etc/octavia/.ssh/octavia_ssh_key log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.807 197 DEBUG tempest [-] load_balancer.amphora_ssh_user = ubuntu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.809 197 DEBUG tempest [-] load_balancer.availability_zone = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.810 197 DEBUG tempest [-] load_balancer.availability_zone2 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.812 197 DEBUG tempest [-] load_balancer.availability_zone3 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.814 197 DEBUG tempest [-] load_balancer.build_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.816 197 DEBUG tempest [-] load_balancer.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.818 197 DEBUG tempest [-] load_balancer.catalog_type = load-balancer log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.820 197 DEBUG tempest [-] load_balancer.check_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.822 197 DEBUG tempest [-] load_balancer.check_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.824 197 DEBUG tempest [-] load_balancer.disable_boot_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.826 197 DEBUG tempest [-] load_balancer.enable_security_groups = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.828 197 DEBUG tempest [-] load_balancer.enabled_provider_drivers = {'amphora': 'The Octavia Amphora driver.', 'amphorav2': 'The Octavia Amphora driver that uses taskflow jobboard persistence.', 'octavia': 'Deprecated alias of the Octavia Amphora driver.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.830 197 DEBUG tempest [-] load_balancer.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.833 197 DEBUG tempest [-] load_balancer.expected_availability_zone_capability = {'compute_zone': 'The compute availability zone.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.835 197 DEBUG tempest [-] load_balancer.expected_flavor_capability = {'loadbalancer_topology': 'The load balancer topology. One of: SINGLE - One amphora per load balancer. ACTIVE_STANDBY - Two amphora per load balancer.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.837 197 DEBUG tempest [-] load_balancer.lb_build_interval = 10.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.839 197 DEBUG tempest [-] load_balancer.lb_build_timeout = 900 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.841 197 DEBUG tempest [-] load_balancer.loadbalancer_topology = SINGLE log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.843 197 DEBUG tempest [-] load_balancer.member_1_ipv4_subnet_cidr = 10.2.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.845 197 DEBUG tempest [-] load_balancer.member_1_ipv6_subnet_cidr = fd7b:f9f7:0fff:4eca::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.847 197 DEBUG tempest [-] load_balancer.member_2_ipv4_subnet_cidr = 10.2.2.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.849 197 DEBUG tempest [-] load_balancer.member_2_ipv6_subnet_cidr = fd77:1457:4cf0:26a8::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.851 197 DEBUG tempest [-] load_balancer.member_role = load-balancer_member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.853 197 DEBUG tempest [-] load_balancer.octavia_svc_username = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.855 197 DEBUG tempest [-] load_balancer.provider = octavia log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.857 197 DEBUG tempest [-] load_balancer.random_server_name_length = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.859 197 DEBUG tempest [-] load_balancer.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.860 197 DEBUG tempest [-] load_balancer.scp_connection_attempts = 20 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.862 197 DEBUG tempest [-] load_balancer.scp_connection_timeout = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.864 197 DEBUG tempest [-] load_balancer.tenant_flow_log_file = /var/log/octavia-tenant-traffic.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.866 197 DEBUG tempest [-] load_balancer.test_ipv6_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.868 197 DEBUG tempest [-] load_balancer.test_network_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.870 197 DEBUG tempest [-] load_balancer.test_reuse_connection = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.872 197 DEBUG tempest [-] load_balancer.test_server_path = /opt/octavia-tempest-plugin/test_server.bin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.874 197 DEBUG tempest [-] load_balancer.test_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.876 197 DEBUG tempest [-] load_balancer.test_with_ipv6 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.878 197 DEBUG tempest [-] load_balancer.test_with_noop = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.880 197 DEBUG tempest [-] load_balancer.vip_ipv6_subnet_cidr = fdde:1a92:7523:70a0::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.882 197 DEBUG tempest [-] load_balancer.vip_subnet_cidr = 10.1.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.885 197 DEBUG tempest [-] loadbalancer-feature-enabled.health_monitor_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.887 197 DEBUG tempest [-] loadbalancer-feature-enabled.l4_protocol = TCP log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.889 197 DEBUG tempest [-] loadbalancer-feature-enabled.l7_protocol_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.891 197 DEBUG tempest [-] loadbalancer-feature-enabled.log_offload_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.893 197 DEBUG tempest [-] loadbalancer-feature-enabled.not_implemented_is_error = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.895 197 DEBUG tempest [-] loadbalancer-feature-enabled.pool_algorithms_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.897 197 DEBUG tempest [-] loadbalancer-feature-enabled.session_persistence_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.898 197 DEBUG tempest [-] loadbalancer-feature-enabled.spare_pool_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.900 197 DEBUG tempest [-] loadbalancer-feature-enabled.terminated_tls_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-14 02:13:10.902 197 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2591 2020-12-14 02:13:10.925 197 DEBUG tempest.lib.services.clients [-] Successfully registered plugin __tempest__ in the service client registry with configuration: [{'name': 'compute', 'service_version': 'compute', 'module_path': 'tempest.lib.services.compute', 'client_names': ['AgentsClient', 'AggregatesClient', 'AvailabilityZoneClient', 'BaremetalNodesClient', 'CertificatesClient', 'ExtensionsClient', 'FixedIPsClient', 'FlavorsClient', 'FloatingIPPoolsClient', 'FloatingIPsBulkClient', 'FloatingIPsClient', 'HostsClient', 'HypervisorClient', 'ImagesClient', 'InstanceUsagesAuditLogClient', 'InterfacesClient', 'KeyPairsClient', 'LimitsClient', 'MigrationsClient', 'NetworksClient', 'QuotaClassesClient', 'QuotasClient', 'SecurityGroupDefaultRulesClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'ServerGroupsClient', 'ServersClient', 'ServicesClient', 'SnapshotsClient', 'TenantNetworksClient', 'TenantUsagesClient', 'VersionsClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'compute'}, {'name': 'placement', 'service_version': 'placement', 'module_path': 'tempest.lib.services.placement', 'client_names': ['PlacementClient', 'ResourceProvidersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'placement'}, {'name': 'identity_v2', 'service_version': 'identity.v2', 'module_path': 'tempest.lib.services.identity.v2', 'client_names': ['EndpointsClient', 'IdentityClient', 'RolesClient', 'ServicesClient', 'TenantsClient', 'TokenClient', 'UsersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'identity_v3', 'service_version': 'identity.v3', 'module_path': 'tempest.lib.services.identity.v3', 'client_names': ['AccessRulesClient', 'ApplicationCredentialsClient', 'CatalogClient', 'CredentialsClient', 'DomainsClient', 'DomainConfigurationClient', 'EndPointGroupsClient', 'EndPointsClient', 'EndPointsFilterClient', 'GroupsClient', 'IdentityClient', 'InheritedRolesClient', 'OAUTHConsumerClient', 'OAUTHTokenClient', 'PoliciesClient', 'ProjectsClient', 'ProjectTagsClient', 'RegionsClient', 'RoleAssignmentsClient', 'RolesClient', 'ServicesClient', 'V3TokenClient', 'TrustsClient', 'UsersClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'image_v1', 'service_version': 'image.v1', 'module_path': 'tempest.lib.services.image.v1', 'client_names': ['ImageMembersClient', 'ImagesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'image_v2', 'service_version': 'image.v2', 'module_path': 'tempest.lib.services.image.v2', 'client_names': ['ImageMembersClient', 'ImagesClient', 'NamespaceObjectsClient', 'NamespacePropertiesClient', 'NamespaceTagsClient', 'NamespacesClient', 'ResourceTypesClient', 'SchemasClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'network', 'service_version': 'network', 'module_path': 'tempest.lib.services.network', 'client_names': ['AgentsClient', 'ExtensionsClient', 'FloatingIPsClient', 'MeteringLabelRulesClient', 'MeteringLabelsClient', 'NetworksClient', 'NetworkVersionsClient', 'PortsClient', 'QosClient', 'QosMinimumBandwidthRulesClient', 'QuotasClient', 'RoutersClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'SegmentsClient', 'ServiceProvidersClient', 'SubnetpoolsClient', 'SubnetsClient', 'TagsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'network'}, {'name': 'object_storage', 'service_version': 'object-storage', 'module_path': 'tempest.lib.services.object_storage', 'client_names': ['AccountClient', 'BulkMiddlewareClient', 'CapabilitiesClient', 'ContainerClient', 'ObjectClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'object-store'}, {'name': 'volume_v1', 'service_version': 'volume.v1', 'module_path': 'tempest.lib.services.volume.v1', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v2', 'service_version': 'volume.v2', 'module_path': 'tempest.lib.services.volume.v2', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient', 'CapabilitiesClient', 'SchedulerStatsClient', 'SnapshotManageClient', 'VolumeManageClient', 'TransfersClient', 'QuotaClassesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v3', 'service_version': 'volume.v3', 'module_path': 'tempest.lib.services.volume.v3', 'client_names': ['AttachmentsClient', 'AvailabilityZoneClient', 'BackupsClient', 'BaseClient', 'CapabilitiesClient', 'EncryptionTypesClient', 'ExtensionsClient', 'GroupSnapshotsClient', 'GroupTypesClient', 'GroupsClient', 'HostsClient', 'LimitsClient', 'MessagesClient', 'QosSpecsClient', 'QuotaClassesClient', 'QuotasClient', 'SchedulerStatsClient', 'ServicesClient', 'SnapshotManageClient', 'SnapshotsClient', 'TransfersClient', 'TypesClient', 'VersionsClient', 'VolumeManageClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}] register_service_client /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/services/clients.py:121 2020-12-14 02:13:10.929 197 DEBUG tempest.lib.services.clients [-] Successfully registered plugin barbican_tests in the service client registry with configuration: [{'name': 'secret_v1', 'service_version': 'secret.v1', 'module_path': 'barbican_tempest_plugin.services.key_manager.json', 'client_names': ['ConsumerClient', 'ContainerClient', 'OrderClient', 'QuotaClient', 'SecretClient', 'SecretMetadataClient']}] register_service_client /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/services/clients.py:121 2020-12-14 02:13:10.931 197 DEBUG tempest.lib.services.clients [-] Successfully registered plugin octavia-tempest-plugin in the service client registry with configuration: [{'name': 'load-balancer_v2', 'service_version': 'load-balancer.v2', 'module_path': 'octavia_tempest_plugin.services.load_balancer.v2', 'client_names': ['LoadbalancerClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'publicURL', 'build_timeout': 300, 'build_interval': 5.0, 'region': 'RegionOne', 'service': 'load-balancer'}] register_service_client /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/services/clients.py:121 2020-12-14 02:13:14.281 186 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: heat 2020-12-14 02:13:14.283 186 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cyborg_tempest_plugin 2020-12-14 02:13:14.285 186 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: keystone_tests 2020-12-14 02:13:14.286 186 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: patrole_tests 2020-12-14 02:13:14.286 189 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: heat 2020-12-14 02:13:14.288 186 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: telemetry_tests 2020-12-14 02:13:14.288 189 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cyborg_tempest_plugin 2020-12-14 02:13:14.289 186 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: barbican_tests 2020-12-14 02:13:14.290 189 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: keystone_tests 2020-12-14 02:13:14.291 186 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: neutron_tests 2020-12-14 02:13:14.291 189 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: patrole_tests 2020-12-14 02:13:14.292 186 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: octavia-tempest-plugin 2020-12-14 02:13:14.293 189 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: telemetry_tests 2020-12-14 02:13:14.294 186 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cinder_tests 2020-12-14 02:13:14.294 189 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: barbican_tests 2020-12-14 02:13:14.296 189 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: neutron_tests 2020-12-14 02:13:14.297 189 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: octavia-tempest-plugin 2020-12-14 02:13:14.299 189 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cinder_tests 2020-12-14 02:13:14.299 193 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: heat 2020-12-14 02:13:14.301 193 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cyborg_tempest_plugin 2020-12-14 02:13:14.303 193 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: keystone_tests 2020-12-14 02:13:14.304 193 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: patrole_tests 2020-12-14 02:13:14.306 193 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: telemetry_tests 2020-12-14 02:13:14.307 193 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: barbican_tests 2020-12-14 02:13:14.308 193 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: neutron_tests 2020-12-14 02:13:14.310 193 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: octavia-tempest-plugin 2020-12-14 02:13:14.311 193 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cinder_tests 2020-12-14 02:13:14.896 197 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: heat 2020-12-14 02:13:14.898 197 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cyborg_tempest_plugin 2020-12-14 02:13:14.900 197 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: keystone_tests 2020-12-14 02:13:14.901 197 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: patrole_tests 2020-12-14 02:13:14.903 197 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: telemetry_tests 2020-12-14 02:13:14.905 197 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: barbican_tests 2020-12-14 02:13:14.906 197 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: neutron_tests 2020-12-14 02:13:14.908 197 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: octavia-tempest-plugin 2020-12-14 02:13:14.909 197 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cinder_tests 2020-12-14 02:13:22.327 189 WARNING patrole_tempest_plugin.rbac_rule_validation [-] Deprecated: CONF.patrole.rbac_test_role is deprecated in favor of CONF.patrole.rbac_test_roles and will be removed in future. 2020-12-14 02:13:22.377 193 WARNING patrole_tempest_plugin.rbac_rule_validation [-] Deprecated: CONF.patrole.rbac_test_role is deprecated in favor of CONF.patrole.rbac_test_roles and will be removed in future. 2020-12-14 02:13:22.734 186 WARNING patrole_tempest_plugin.rbac_rule_validation [-] Deprecated: CONF.patrole.rbac_test_role is deprecated in favor of CONF.patrole.rbac_test_roles and will be removed in future. 2020-12-14 02:13:23.238 197 WARNING patrole_tempest_plugin.rbac_rule_validation [-] Deprecated: CONF.patrole.rbac_test_role is deprecated in favor of CONF.patrole.rbac_test_roles and will be removed in future. 2020-12-14 02:13:28.266 189 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" acquired by "neutron_lib.db.api._create_context_manager" :: waited 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:355 2020-12-14 02:13:28.270 189 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" released by "neutron_lib.db.api._create_context_manager" :: held 0.004s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:367 2020-12-14 02:13:28.466 193 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" acquired by "neutron_lib.db.api._create_context_manager" :: waited 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:355 2020-12-14 02:13:28.470 193 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" released by "neutron_lib.db.api._create_context_manager" :: held 0.004s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:367 2020-12-14 02:13:29.114 186 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" acquired by "neutron_lib.db.api._create_context_manager" :: waited 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:355 2020-12-14 02:13:29.133 186 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" released by "neutron_lib.db.api._create_context_manager" :: held 0.019s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:367 2020-12-14 02:13:29.254 197 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" acquired by "neutron_lib.db.api._create_context_manager" :: waited 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:355 2020-12-14 02:13:29.258 197 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" released by "neutron_lib.db.api._create_context_manager" :: held 0.004s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:367 2020-12-14 02:13:34.161 189 INFO tempest.test [-] raised in AgentsRbacTest.setUpClass. Invoking tearDownClass. 2020-12-14 02:13:34.291 189 INFO tempest.lib.common.rest_client [req-dc9e33f8-b133-4790-84f4-7ed4d9fbf0af ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:13:34.294 189 DEBUG tempest.lib.common.rest_client [req-dc9e33f8-b133-4790-84f4-7ed4d9fbf0af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc9e33f8-b133-4790-84f4-7ed4d9fbf0af', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["L3HXIUTkSmS_rFu4nPaphg"], "expires_at": "2020-12-14T03:13:34.000000Z", "issued_at": "2020-12-14T02:13:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:34.410 189 INFO tempest.lib.common.rest_client [req-e95502e0-affa-41ac-92bb-030c6529daf4 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:13:34.412 189 DEBUG tempest.lib.common.rest_client [req-e95502e0-affa-41ac-92bb-030c6529daf4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e95502e0-affa-41ac-92bb-030c6529daf4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["cV8npnvRRp2NrPbzkISZEw"], "expires_at": "2020-12-14T03:13:34.000000Z", "issued_at": "2020-12-14T02:13:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:34.480 189 INFO tempest.lib.common.rest_client [req-d6458928-8165-4d24-bbea-d51a25b6d788 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.056s 2020-12-14 02:13:34.483 189 DEBUG tempest.lib.common.rest_client [req-d6458928-8165-4d24-bbea-d51a25b6d788 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6458928-8165-4d24-bbea-d51a25b6d788', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:34.534 193 INFO tempest.lib.common.rest_client [req-7cd9a0dc-6e25-4273-a0eb-aa192b7ee5af ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.063s 2020-12-14 02:13:34.538 193 DEBUG tempest.lib.common.rest_client [req-7cd9a0dc-6e25-4273-a0eb-aa192b7ee5af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7cd9a0dc-6e25-4273-a0eb-aa192b7ee5af', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["vUOINkMXSvONAf8gQeL6lg"], "expires_at": "2020-12-14T03:13:34.000000Z", "issued_at": "2020-12-14T02:13:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:34.622 189 INFO tempest.lib.common.rest_client [req-49569066-c31f-403d-a35d-0df82ae7b5ec ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.091s 2020-12-14 02:13:34.625 189 DEBUG tempest.lib.common.rest_client [req-49569066-c31f-403d-a35d-0df82ae7b5ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-NovaAvailabilityZoneRbacTest-841159102-desc", "domain_id": "default", "name": "tempest-NovaAvailabilityZoneRbacTest-841159102"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '392', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-49569066-c31f-403d-a35d-0df82ae7b5ec', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "5e334204dd7346cca841ef313ff1e1ec", "name": "tempest-NovaAvailabilityZoneRbacTest-841159102", "domain_id": "default", "description": "tempest-NovaAvailabilityZoneRbacTest-841159102-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:34.700 193 INFO tempest.lib.common.rest_client [req-7560928d-33ac-4c37-b66c-fb9521848da5 ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:13:34.703 193 DEBUG tempest.lib.common.rest_client [req-7560928d-33ac-4c37-b66c-fb9521848da5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7560928d-33ac-4c37-b66c-fb9521848da5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["1j-aEWzDQe6NrT3r7-oEXg"], "expires_at": "2020-12-14T03:13:34.000000Z", "issued_at": "2020-12-14T02:13:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:34.758 189 INFO tempest.lib.common.rest_client [req-4fcfb422-cd77-43dc-b127-0b28d505cfeb ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.126s 2020-12-14 02:13:34.760 189 DEBUG tempest.lib.common.rest_client [req-4fcfb422-cd77-43dc-b127-0b28d505cfeb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-NovaAvailabilityZoneRbacTest-841159102", "password": "A1=#GzJ1dp#Q7~f", "project_id": "5e334204dd7346cca841ef313ff1e1ec", "email": "tempest-NovaAvailabilityZoneRbacTest-1457397198@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4fcfb422-cd77-43dc-b127-0b28d505cfeb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "5e334204dd7346cca841ef313ff1e1ec", "email": "tempest-NovaAvailabilityZoneRbacTest-1457397198@example.com", "id": "3421d1d7adcf4817b31dea244d514787", "name": "tempest-NovaAvailabilityZoneRbacTest-841159102", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/3421d1d7adcf4817b31dea244d514787"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:34.778 193 INFO tempest.lib.common.rest_client [req-b45ede42-765c-4812-af78-e7b7734eba91 ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.065s 2020-12-14 02:13:34.781 193 DEBUG tempest.lib.common.rest_client [req-b45ede42-765c-4812-af78-e7b7734eba91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b45ede42-765c-4812-af78-e7b7734eba91', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:34.832 189 INFO tempest.lib.common.rest_client [req-4b11f976-679b-485e-948f-f860883c2978 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:13:34.835 189 DEBUG tempest.lib.common.rest_client [req-4b11f976-679b-485e-948f-f860883c2978 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b11f976-679b-485e-948f-f860883c2978', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:34.904 193 INFO tempest.lib.common.rest_client [req-4b1adaec-9bf5-4222-be71-0b65a5eaa3bf ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.073s 2020-12-14 02:13:34.907 193 DEBUG tempest.lib.common.rest_client [req-4b1adaec-9bf5-4222-be71-0b65a5eaa3bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FloatingIpsBulkRbacTest-1007063652-desc", "domain_id": "default", "name": "tempest-FloatingIpsBulkRbacTest-1007063652"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b1adaec-9bf5-4222-be71-0b65a5eaa3bf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "d40da3377e57418ba43774aacdb51f8a", "name": "tempest-FloatingIpsBulkRbacTest-1007063652", "domain_id": "default", "description": "tempest-FloatingIpsBulkRbacTest-1007063652-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/d40da3377e57418ba43774aacdb51f8a"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:34.909 189 INFO tempest.lib.common.rest_client [req-40e46dc9-11d8-431d-ad7e-252c45119e13 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:13:34.912 189 DEBUG tempest.lib.common.rest_client [req-40e46dc9-11d8-431d-ad7e-252c45119e13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40e46dc9-11d8-431d-ad7e-252c45119e13', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.054 189 INFO tempest.lib.common.rest_client [req-ed94ce51-664e-4dd5-83bf-e8ddf3a44d6b ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles/72a4576c553448cd941b052c1ca0cf2d 0.135s 2020-12-14 02:13:35.057 189 DEBUG tempest.lib.common.rest_client [req-ed94ce51-664e-4dd5-83bf-e8ddf3a44d6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed94ce51-664e-4dd5-83bf-e8ddf3a44d6b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.060 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NovaAvailabilityZoneRbacTest-841159102', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5e334204dd7346cca841ef313ff1e1ec', 'project_name': 'tempest-NovaAvailabilityZoneRbacTest-841159102', 'tenant_id': '5e334204dd7346cca841ef313ff1e1ec', 'tenant_name': 'tempest-NovaAvailabilityZoneRbacTest-841159102', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '3421d1d7adcf4817b31dea244d514787'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:35.063 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NovaAvailabilityZoneRbacTest-841159102', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5e334204dd7346cca841ef313ff1e1ec', 'project_name': 'tempest-NovaAvailabilityZoneRbacTest-841159102', 'tenant_id': '5e334204dd7346cca841ef313ff1e1ec', 'tenant_name': 'tempest-NovaAvailabilityZoneRbacTest-841159102', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '3421d1d7adcf4817b31dea244d514787'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:35.087 193 INFO tempest.lib.common.rest_client [req-52e7f047-6057-44a0-b3c9-38b75cc65606 ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.172s 2020-12-14 02:13:35.090 193 DEBUG tempest.lib.common.rest_client [req-52e7f047-6057-44a0-b3c9-38b75cc65606 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FloatingIpsBulkRbacTest-1007063652", "password": "H9!HVPZ1!^FG@0v", "project_id": "d40da3377e57418ba43774aacdb51f8a", "email": "tempest-FloatingIpsBulkRbacTest-43603115@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '400', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52e7f047-6057-44a0-b3c9-38b75cc65606', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "d40da3377e57418ba43774aacdb51f8a", "email": "tempest-FloatingIpsBulkRbacTest-43603115@example.com", "id": "fb80e3ed557e47f2bc21c16410a468c5", "name": "tempest-FloatingIpsBulkRbacTest-1007063652", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/fb80e3ed557e47f2bc21c16410a468c5"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.213 193 INFO tempest.lib.common.rest_client [req-dcabf81a-ba1c-4e06-88eb-dc29bac743e2 ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.115s 2020-12-14 02:13:35.217 193 DEBUG tempest.lib.common.rest_client [req-dcabf81a-ba1c-4e06-88eb-dc29bac743e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dcabf81a-ba1c-4e06-88eb-dc29bac743e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.263 197 INFO tempest.test [-] raised in FixedIpsRbacTest.setUpClass. Invoking tearDownClass. 2020-12-14 02:13:35.267 189 INFO tempest.lib.common.rest_client [req-f8c6e8d0-4394-4e79-a891-3e2f297673a3 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.125s 2020-12-14 02:13:35.270 189 DEBUG tempest.lib.common.rest_client [req-f8c6e8d0-4394-4e79-a891-3e2f297673a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6585', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8c6e8d0-4394-4e79-a891-3e2f297673a3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3421d1d7adcf4817b31dea244d514787", "name": "tempest-NovaAvailabilityZoneRbacTest-841159102", "password_expires_at": null}, "audit_ids": ["1CcCQ2wMQMuEJTsCnYMH2g"], "expires_at": "2020-12-14T03:13:35.000000Z", "issued_at": "2020-12-14T02:13:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5e334204dd7346cca841ef313ff1e1ec", "name": "tempest-NovaAvailabilityZoneRbacTest-841159102"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.291 193 INFO tempest.lib.common.rest_client [req-280dd07a-a35d-4ac5-a03c-1579e1d236f3 ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:13:35.294 193 DEBUG tempest.lib.common.rest_client [req-280dd07a-a35d-4ac5-a03c-1579e1d236f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-280dd07a-a35d-4ac5-a03c-1579e1d236f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.325 189 INFO tempest.lib.common.rest_client [req-b7fad5c0-adde-4311-93d3-6caa426d1f5c ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:13:35.328 189 DEBUG tempest.lib.common.rest_client [req-b7fad5c0-adde-4311-93d3-6caa426d1f5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7fad5c0-adde-4311-93d3-6caa426d1f5c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["BbmO0uVcS6msXyqJbXW0zQ"], "expires_at": "2020-12-14T03:13:35.000000Z", "issued_at": "2020-12-14T02:13:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.352 197 INFO tempest.lib.common.rest_client [req-0e9ecd89-c1fb-4f9c-a465-5dd3cfd94cff ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.064s 2020-12-14 02:13:35.356 197 DEBUG tempest.lib.common.rest_client [req-0e9ecd89-c1fb-4f9c-a465-5dd3cfd94cff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e9ecd89-c1fb-4f9c-a465-5dd3cfd94cff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["NKQgvqD0S2arT8CSddJdHw"], "expires_at": "2020-12-14T03:13:35.000000Z", "issued_at": "2020-12-14T02:13:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.383 193 INFO tempest.lib.common.rest_client [req-ca198df3-a55b-498b-9762-bb710a32f650 ] Request (FloatingIpsBulkRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d40da3377e57418ba43774aacdb51f8a/users/fb80e3ed557e47f2bc21c16410a468c5/roles/72a4576c553448cd941b052c1ca0cf2d 0.081s 2020-12-14 02:13:35.387 193 DEBUG tempest.lib.common.rest_client [req-ca198df3-a55b-498b-9762-bb710a32f650 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca198df3-a55b-498b-9762-bb710a32f650', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d40da3377e57418ba43774aacdb51f8a/users/fb80e3ed557e47f2bc21c16410a468c5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.390 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FloatingIpsBulkRbacTest-1007063652', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd40da3377e57418ba43774aacdb51f8a', 'project_name': 'tempest-FloatingIpsBulkRbacTest-1007063652', 'tenant_id': 'd40da3377e57418ba43774aacdb51f8a', 'tenant_name': 'tempest-FloatingIpsBulkRbacTest-1007063652', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'fb80e3ed557e47f2bc21c16410a468c5'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:35.395 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FloatingIpsBulkRbacTest-1007063652', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd40da3377e57418ba43774aacdb51f8a', 'project_name': 'tempest-FloatingIpsBulkRbacTest-1007063652', 'tenant_id': 'd40da3377e57418ba43774aacdb51f8a', 'tenant_name': 'tempest-FloatingIpsBulkRbacTest-1007063652', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'fb80e3ed557e47f2bc21c16410a468c5'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:35.491 189 INFO tempest.lib.common.rest_client [req-1a44db87-8e5c-4241-a549-f07f97161c5e ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:13:35.494 189 DEBUG tempest.lib.common.rest_client [req-1a44db87-8e5c-4241-a549-f07f97161c5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a44db87-8e5c-4241-a549-f07f97161c5e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["07d2mzhlQKygWv99FHYCww"], "expires_at": "2020-12-14T03:13:35.000000Z", "issued_at": "2020-12-14T02:13:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.516 197 INFO tempest.lib.common.rest_client [req-b8edfb34-e1a9-450b-8c90-3671e612d31c ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:13:35.519 197 DEBUG tempest.lib.common.rest_client [req-b8edfb34-e1a9-450b-8c90-3671e612d31c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8edfb34-e1a9-450b-8c90-3671e612d31c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["OiVxsmuHSTSnsEdj-ZwH8g"], "expires_at": "2020-12-14T03:13:35.000000Z", "issued_at": "2020-12-14T02:13:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.520 186 INFO tempest.lib.common.rest_client [req-537532a9-4402-4210-8a5a-b0c4670baf1e ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.059s 2020-12-14 02:13:35.524 186 DEBUG tempest.lib.common.rest_client [req-537532a9-4402-4210-8a5a-b0c4670baf1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-537532a9-4402-4210-8a5a-b0c4670baf1e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["mL2U7mtSTsy-iOIs1toMbA"], "expires_at": "2020-12-14T03:13:35.000000Z", "issued_at": "2020-12-14T02:13:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.568 189 INFO tempest.lib.common.rest_client [req-13efd325-7102-4afe-872f-762cd5e6cacc ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.067s 2020-12-14 02:13:35.572 189 DEBUG tempest.lib.common.rest_client [req-13efd325-7102-4afe-872f-762cd5e6cacc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13efd325-7102-4afe-872f-762cd5e6cacc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.584 193 INFO tempest.lib.common.rest_client [req-24c887fd-ef2e-4755-a1ed-6e37f9ffab45 ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.113s 2020-12-14 02:13:35.587 193 DEBUG tempest.lib.common.rest_client [req-24c887fd-ef2e-4755-a1ed-6e37f9ffab45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24c887fd-ef2e-4755-a1ed-6e37f9ffab45', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fb80e3ed557e47f2bc21c16410a468c5", "name": "tempest-FloatingIpsBulkRbacTest-1007063652", "password_expires_at": null}, "audit_ids": ["FymmCrfrT8yJvPRcQeG1Ow"], "expires_at": "2020-12-14T03:13:35.000000Z", "issued_at": "2020-12-14T02:13:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d40da3377e57418ba43774aacdb51f8a", "name": "tempest-FloatingIpsBulkRbacTest-1007063652"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d40da3377e57418ba43774aacdb51f8a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d40da3377e57418ba43774aacdb51f8a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d40da3377e57418ba43774aacdb51f8a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d40da3377e57418ba43774aacdb51f8a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d40da3377e57418ba43774aacdb51f8a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d40da3377e57418ba43774aacdb51f8a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.611 197 INFO tempest.lib.common.rest_client [req-68bcc0a0-a856-4713-b8a6-4c8102b2d373 ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.081s 2020-12-14 02:13:35.614 197 DEBUG tempest.lib.common.rest_client [req-68bcc0a0-a856-4713-b8a6-4c8102b2d373 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68bcc0a0-a856-4713-b8a6-4c8102b2d373', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.638 186 INFO tempest.lib.common.rest_client [req-d0ced4e9-c0dc-486c-98e1-17bbe5dee92f ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:13:35.641 186 DEBUG tempest.lib.common.rest_client [req-d0ced4e9-c0dc-486c-98e1-17bbe5dee92f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0ced4e9-c0dc-486c-98e1-17bbe5dee92f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ADyElDGWT0SrofxkPhKEgA"], "expires_at": "2020-12-14T03:13:35.000000Z", "issued_at": "2020-12-14T02:13:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.642 189 INFO tempest.lib.common.rest_client [req-41dfca23-6ce9-4746-a031-63ae2eb26719 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:13:35.645 189 DEBUG tempest.lib.common.rest_client [req-41dfca23-6ce9-4746-a031-63ae2eb26719 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41dfca23-6ce9-4746-a031-63ae2eb26719', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.646 193 INFO tempest.lib.common.rest_client [req-e5bfaf78-7ec2-440a-a4b8-e81a6eeb99bd ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:13:35.650 193 DEBUG tempest.lib.common.rest_client [req-e5bfaf78-7ec2-440a-a4b8-e81a6eeb99bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5bfaf78-7ec2-440a-a4b8-e81a6eeb99bd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Hp8dzfsOQTyPuZzSP4oUfg"], "expires_at": "2020-12-14T03:13:35.000000Z", "issued_at": "2020-12-14T02:13:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.650 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:13:35.656 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:35.713 186 INFO tempest.lib.common.rest_client [req-76346753-9d21-4728-8e77-2d504e8eab75 ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.061s 2020-12-14 02:13:35.715 186 DEBUG tempest.lib.common.rest_client [req-76346753-9d21-4728-8e77-2d504e8eab75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76346753-9d21-4728-8e77-2d504e8eab75', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.738 189 INFO tempest.lib.common.rest_client [req-422d0fad-7cdf-487d-8463-46a3adf95ea3 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles 0.073s 2020-12-14 02:13:35.738 197 INFO tempest.lib.common.rest_client [req-5c64f623-7d88-4f3d-9477-0a68a47edeae ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.074s 2020-12-14 02:13:35.741 197 DEBUG tempest.lib.common.rest_client [req-5c64f623-7d88-4f3d-9477-0a68a47edeae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FlavorAccessRbacTest-2125871953-desc", "domain_id": "default", "name": "tempest-FlavorAccessRbacTest-2125871953"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '378', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c64f623-7d88-4f3d-9477-0a68a47edeae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "49bdc2127d1c4edc9a245fc036aeb613", "name": "tempest-FlavorAccessRbacTest-2125871953", "domain_id": "default", "description": "tempest-FlavorAccessRbacTest-2125871953-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.741 189 DEBUG tempest.lib.common.rest_client [req-422d0fad-7cdf-487d-8463-46a3adf95ea3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-422d0fad-7cdf-487d-8463-46a3adf95ea3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.809 193 INFO tempest.lib.common.rest_client [req-dfa59c91-196a-4332-a333-b91f45410a2d ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:13:35.813 193 DEBUG tempest.lib.common.rest_client [req-dfa59c91-196a-4332-a333-b91f45410a2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dfa59c91-196a-4332-a333-b91f45410a2d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["P6ZVpbnkSzyla9jfpGfpxw"], "expires_at": "2020-12-14T03:13:35.000000Z", "issued_at": "2020-12-14T02:13:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.864 189 INFO tempest.lib.common.rest_client [req-2ce2a57f-84e0-4d8d-b046-a1fa3a625ee9 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles/72a4576c553448cd941b052c1ca0cf2d 0.115s 2020-12-14 02:13:35.867 189 DEBUG tempest.lib.common.rest_client [req-2ce2a57f-84e0-4d8d-b046-a1fa3a625ee9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ce2a57f-84e0-4d8d-b046-a1fa3a625ee9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.871 197 INFO tempest.lib.common.rest_client [req-2461a6dd-d72b-4876-8bb1-8de651ce2797 ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.122s 2020-12-14 02:13:35.872 197 DEBUG tempest.lib.common.rest_client [req-2461a6dd-d72b-4876-8bb1-8de651ce2797 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FlavorAccessRbacTest-2125871953", "password": "C3=r&REA0cFQtOB", "project_id": "49bdc2127d1c4edc9a245fc036aeb613", "email": "tempest-FlavorAccessRbacTest-592382206@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '395', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2461a6dd-d72b-4876-8bb1-8de651ce2797', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "49bdc2127d1c4edc9a245fc036aeb613", "email": "tempest-FlavorAccessRbacTest-592382206@example.com", "id": "24b5fe7dca6a4c2f853b88640371d171", "name": "tempest-FlavorAccessRbacTest-2125871953", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/24b5fe7dca6a4c2f853b88640371d171"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.878 186 INFO tempest.lib.common.rest_client [req-ef2ecce4-834d-4aa2-9e05-7865a5ba392d ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.112s 2020-12-14 02:13:35.881 186 DEBUG tempest.lib.common.rest_client [req-ef2ecce4-834d-4aa2-9e05-7865a5ba392d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-AggregatesRbacTest-268111082-desc", "domain_id": "default", "name": "tempest-AggregatesRbacTest-268111082"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef2ecce4-834d-4aa2-9e05-7865a5ba392d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082", "domain_id": "default", "description": "tempest-AggregatesRbacTest-268111082-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.882 193 INFO tempest.lib.common.rest_client [req-a5deb9f0-e7f7-49fc-920a-59b10861cbcb ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.061s 2020-12-14 02:13:35.886 193 DEBUG tempest.lib.common.rest_client [req-a5deb9f0-e7f7-49fc-920a-59b10861cbcb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5deb9f0-e7f7-49fc-920a-59b10861cbcb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.983 189 INFO tempest.lib.common.rest_client [req-3a262dcc-4d2d-4208-b0b6-1c8959f4bc30 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles/a629c95d64b3416fb80ae90af4f69c05 0.109s 2020-12-14 02:13:35.986 189 DEBUG tempest.lib.common.rest_client [req-3a262dcc-4d2d-4208-b0b6-1c8959f4bc30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a262dcc-4d2d-4208-b0b6-1c8959f4bc30', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:35.992 197 INFO tempest.lib.common.rest_client [req-f1b135e5-65c7-4704-8eff-8e50699c329e ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.114s 2020-12-14 02:13:35.995 197 DEBUG tempest.lib.common.rest_client [req-f1b135e5-65c7-4704-8eff-8e50699c329e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1b135e5-65c7-4704-8eff-8e50699c329e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.017 193 INFO tempest.lib.common.rest_client [req-8162b31c-2e0f-4d39-af2a-77e887aaee94 ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.122s 2020-12-14 02:13:36.020 193 DEBUG tempest.lib.common.rest_client [req-8162b31c-2e0f-4d39-af2a-77e887aaee94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8162b31c-2e0f-4d39-af2a-77e887aaee94', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.023 186 INFO tempest.lib.common.rest_client [req-6d41e7e9-f13b-4837-b2da-0c739ba4b8fd ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.132s 2020-12-14 02:13:36.023 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:13:36.026 186 DEBUG tempest.lib.common.rest_client [req-6d41e7e9-f13b-4837-b2da-0c739ba4b8fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-AggregatesRbacTest-268111082", "password": "U3~pDcGvsrbQ8hK", "project_id": "7a204ba22ab84c0dbcf942d8815627ba", "email": "tempest-AggregatesRbacTest-1375053207@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '391', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d41e7e9-f13b-4837-b2da-0c739ba4b8fd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "7a204ba22ab84c0dbcf942d8815627ba", "email": "tempest-AggregatesRbacTest-1375053207@example.com", "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/e4d29d96d56f494bbee1298d2052ce15"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.028 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:36.126 197 INFO tempest.lib.common.rest_client [req-8e8fba6c-3c30-4bfb-8269-862c755e307d ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.124s 2020-12-14 02:13:36.129 197 DEBUG tempest.lib.common.rest_client [req-8e8fba6c-3c30-4bfb-8269-862c755e307d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e8fba6c-3c30-4bfb-8269-862c755e307d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.153 193 INFO tempest.lib.common.rest_client [req-491483ab-4dc4-490e-a683-c18f98238746 ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/d40da3377e57418ba43774aacdb51f8a/users/fb80e3ed557e47f2bc21c16410a468c5/roles 0.117s 2020-12-14 02:13:36.155 193 DEBUG tempest.lib.common.rest_client [req-491483ab-4dc4-490e-a683-c18f98238746 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-491483ab-4dc4-490e-a683-c18f98238746', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d40da3377e57418ba43774aacdb51f8a/users/fb80e3ed557e47f2bc21c16410a468c5/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d40da3377e57418ba43774aacdb51f8a/users/fb80e3ed557e47f2bc21c16410a468c5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.158 186 INFO tempest.lib.common.rest_client [req-d6c9d0a8-5046-4206-9ddb-71e14873993e ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.124s 2020-12-14 02:13:36.161 186 DEBUG tempest.lib.common.rest_client [req-d6c9d0a8-5046-4206-9ddb-71e14873993e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6c9d0a8-5046-4206-9ddb-71e14873993e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.214 197 INFO tempest.lib.common.rest_client [req-ba39f916-7cb4-4399-b984-913b198dc749 ] Request (FlavorAccessRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles/72a4576c553448cd941b052c1ca0cf2d 0.077s 2020-12-14 02:13:36.216 197 DEBUG tempest.lib.common.rest_client [req-ba39f916-7cb4-4399-b984-913b198dc749 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba39f916-7cb4-4399-b984-913b198dc749', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.219 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorAccessRbacTest-2125871953', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '49bdc2127d1c4edc9a245fc036aeb613', 'project_name': 'tempest-FlavorAccessRbacTest-2125871953', 'tenant_id': '49bdc2127d1c4edc9a245fc036aeb613', 'tenant_name': 'tempest-FlavorAccessRbacTest-2125871953', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '24b5fe7dca6a4c2f853b88640371d171'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:36.223 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorAccessRbacTest-2125871953', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '49bdc2127d1c4edc9a245fc036aeb613', 'project_name': 'tempest-FlavorAccessRbacTest-2125871953', 'tenant_id': '49bdc2127d1c4edc9a245fc036aeb613', 'tenant_name': 'tempest-FlavorAccessRbacTest-2125871953', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '24b5fe7dca6a4c2f853b88640371d171'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:36.235 186 INFO tempest.lib.common.rest_client [req-84547bc8-c962-412d-89bc-42282fe77a1b ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:13:36.238 186 DEBUG tempest.lib.common.rest_client [req-84547bc8-c962-412d-89bc-42282fe77a1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84547bc8-c962-412d-89bc-42282fe77a1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.243 193 INFO tempest.lib.common.rest_client [req-b9ae6784-da65-4967-b8d3-e2f140a71649 ] Request (FloatingIpsBulkRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d40da3377e57418ba43774aacdb51f8a/users/fb80e3ed557e47f2bc21c16410a468c5/roles/72a4576c553448cd941b052c1ca0cf2d 0.081s 2020-12-14 02:13:36.246 193 DEBUG tempest.lib.common.rest_client [req-b9ae6784-da65-4967-b8d3-e2f140a71649 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9ae6784-da65-4967-b8d3-e2f140a71649', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d40da3377e57418ba43774aacdb51f8a/users/fb80e3ed557e47f2bc21c16410a468c5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.358 193 INFO tempest.lib.common.rest_client [req-bf2406a8-7b7f-4380-857b-c600a0241dbd ] Request (FloatingIpsBulkRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d40da3377e57418ba43774aacdb51f8a/users/fb80e3ed557e47f2bc21c16410a468c5/roles/a629c95d64b3416fb80ae90af4f69c05 0.105s 2020-12-14 02:13:36.360 193 DEBUG tempest.lib.common.rest_client [req-bf2406a8-7b7f-4380-857b-c600a0241dbd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf2406a8-7b7f-4380-857b-c600a0241dbd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d40da3377e57418ba43774aacdb51f8a/users/fb80e3ed557e47f2bc21c16410a468c5/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.379 186 INFO tempest.lib.common.rest_client [req-741be4b6-af0d-4530-9e09-3e7bc5c95bd2 ] Request (AggregatesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles/72a4576c553448cd941b052c1ca0cf2d 0.134s 2020-12-14 02:13:36.381 186 DEBUG tempest.lib.common.rest_client [req-741be4b6-af0d-4530-9e09-3e7bc5c95bd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-741be4b6-af0d-4530-9e09-3e7bc5c95bd2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.384 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AggregatesRbacTest-268111082', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '7a204ba22ab84c0dbcf942d8815627ba', 'project_name': 'tempest-AggregatesRbacTest-268111082', 'tenant_id': '7a204ba22ab84c0dbcf942d8815627ba', 'tenant_name': 'tempest-AggregatesRbacTest-268111082', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'e4d29d96d56f494bbee1298d2052ce15'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:36.389 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AggregatesRbacTest-268111082', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '7a204ba22ab84c0dbcf942d8815627ba', 'project_name': 'tempest-AggregatesRbacTest-268111082', 'tenant_id': '7a204ba22ab84c0dbcf942d8815627ba', 'tenant_name': 'tempest-AggregatesRbacTest-268111082', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'e4d29d96d56f494bbee1298d2052ce15'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:36.435 197 INFO tempest.lib.common.rest_client [req-bf83a015-1d9b-4f16-9c98-0ec445720244 ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.136s 2020-12-14 02:13:36.438 197 DEBUG tempest.lib.common.rest_client [req-bf83a015-1d9b-4f16-9c98-0ec445720244 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6571', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf83a015-1d9b-4f16-9c98-0ec445720244', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "24b5fe7dca6a4c2f853b88640371d171", "name": "tempest-FlavorAccessRbacTest-2125871953", "password_expires_at": null}, "audit_ids": ["1u9RpMFoRpef1BpfeeEcCg"], "expires_at": "2020-12-14T03:13:36.000000Z", "issued_at": "2020-12-14T02:13:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "49bdc2127d1c4edc9a245fc036aeb613", "name": "tempest-FlavorAccessRbacTest-2125871953"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.548 197 INFO tempest.lib.common.rest_client [req-c9e25c72-8d75-465a-b6a2-ff24c1828c77 ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:13:36.551 197 DEBUG tempest.lib.common.rest_client [req-c9e25c72-8d75-465a-b6a2-ff24c1828c77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9e25c72-8d75-465a-b6a2-ff24c1828c77', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["So_u-mpiRr28YfbI3wOwsA"], "expires_at": "2020-12-14T03:13:36.000000Z", "issued_at": "2020-12-14T02:13:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.591 186 INFO tempest.lib.common.rest_client [req-e015c8c3-2ae9-4da0-9024-8b4f9f67149e ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.123s 2020-12-14 02:13:36.595 186 DEBUG tempest.lib.common.rest_client [req-e015c8c3-2ae9-4da0-9024-8b4f9f67149e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6565', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e015c8c3-2ae9-4da0-9024-8b4f9f67149e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["So86vnz2Qpuz2QaF2aPdKA"], "expires_at": "2020-12-14T03:13:36.000000Z", "issued_at": "2020-12-14T02:13:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.658 186 INFO tempest.lib.common.rest_client [req-217f2d37-ea24-4c7d-90ff-5bbd2c4835f0 ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:13:36.661 197 INFO tempest.lib.common.rest_client [req-f59f0e45-7deb-4eef-8f9e-fdc28a30789e ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:13:36.662 186 DEBUG tempest.lib.common.rest_client [req-217f2d37-ea24-4c7d-90ff-5bbd2c4835f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-217f2d37-ea24-4c7d-90ff-5bbd2c4835f0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["gvJF380VRYORvvrO2REj7A"], "expires_at": "2020-12-14T03:13:36.000000Z", "issued_at": "2020-12-14T02:13:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.663 197 DEBUG tempest.lib.common.rest_client [req-f59f0e45-7deb-4eef-8f9e-fdc28a30789e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f59f0e45-7deb-4eef-8f9e-fdc28a30789e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["LZLIYIokQpG-B1ZS2aqOiA"], "expires_at": "2020-12-14T03:13:36.000000Z", "issued_at": "2020-12-14T02:13:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.735 197 INFO tempest.lib.common.rest_client [req-126b7f4c-e6d9-4fd3-a38a-e2198722b822 ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.065s 2020-12-14 02:13:36.737 197 DEBUG tempest.lib.common.rest_client [req-126b7f4c-e6d9-4fd3-a38a-e2198722b822 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-126b7f4c-e6d9-4fd3-a38a-e2198722b822', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.778 186 INFO tempest.lib.common.rest_client [req-aaea492a-489e-42b9-ad3f-6f4a656e6389 ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:13:36.781 186 DEBUG tempest.lib.common.rest_client [req-aaea492a-489e-42b9-ad3f-6f4a656e6389 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aaea492a-489e-42b9-ad3f-6f4a656e6389', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["xlVpSpWIRxSgs-eC4-uNxQ"], "expires_at": "2020-12-14T03:13:36.000000Z", "issued_at": "2020-12-14T02:13:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.804 197 INFO tempest.lib.common.rest_client [req-d750e7fb-c882-4889-ace4-54e0297009fe ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:13:36.807 197 DEBUG tempest.lib.common.rest_client [req-d750e7fb-c882-4889-ace4-54e0297009fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d750e7fb-c882-4889-ace4-54e0297009fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.811 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:13:36.818 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:36.847 186 INFO tempest.lib.common.rest_client [req-e07a1a78-ce2c-4522-80cc-6e9e35bba702 ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.059s 2020-12-14 02:13:36.849 186 DEBUG tempest.lib.common.rest_client [req-e07a1a78-ce2c-4522-80cc-6e9e35bba702 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e07a1a78-ce2c-4522-80cc-6e9e35bba702', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.890 197 INFO tempest.lib.common.rest_client [req-a0e77faf-25ef-48ec-865c-99244a7a3da4 ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles 0.064s 2020-12-14 02:13:36.893 197 DEBUG tempest.lib.common.rest_client [req-a0e77faf-25ef-48ec-865c-99244a7a3da4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0e77faf-25ef-48ec-865c-99244a7a3da4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.913 186 INFO tempest.lib.common.rest_client [req-f0431cc6-7dd5-4386-9b85-f3ee99916e24 ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:13:36.916 186 DEBUG tempest.lib.common.rest_client [req-f0431cc6-7dd5-4386-9b85-f3ee99916e24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0431cc6-7dd5-4386-9b85-f3ee99916e24', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.920 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:13:36.926 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:36.973 197 INFO tempest.lib.common.rest_client [req-39fa0947-c3af-44ed-ab3c-9df6a71a0602 ] Request (FlavorAccessRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles/72a4576c553448cd941b052c1ca0cf2d 0.074s 2020-12-14 02:13:36.977 197 DEBUG tempest.lib.common.rest_client [req-39fa0947-c3af-44ed-ab3c-9df6a71a0602 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39fa0947-c3af-44ed-ab3c-9df6a71a0602', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:36.992 186 INFO tempest.lib.common.rest_client [req-709cd408-212e-4316-967b-82a50ecf5cdc ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.057s 2020-12-14 02:13:36.994 186 DEBUG tempest.lib.common.rest_client [req-709cd408-212e-4316-967b-82a50ecf5cdc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-709cd408-212e-4316-967b-82a50ecf5cdc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:37.088 189 INFO tempest.lib.common.rest_client [req-a24ae9c8-30c9-4c18-9345-3fb922ac6408 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:13:37.092 189 DEBUG tempest.lib.common.rest_client [req-a24ae9c8-30c9-4c18-9345-3fb922ac6408 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a24ae9c8-30c9-4c18-9345-3fb922ac6408', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3421d1d7adcf4817b31dea244d514787", "name": "tempest-NovaAvailabilityZoneRbacTest-841159102", "password_expires_at": null}, "audit_ids": ["puPTRDV7QZ209VohM1wEEw"], "expires_at": "2020-12-14T03:13:37.000000Z", "issued_at": "2020-12-14T02:13:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5e334204dd7346cca841ef313ff1e1ec", "name": "tempest-NovaAvailabilityZoneRbacTest-841159102"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:37.095 197 INFO tempest.lib.common.rest_client [req-0ca43334-94b2-45bd-b5e1-023ba8bcd992 ] Request (FlavorAccessRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles/a629c95d64b3416fb80ae90af4f69c05 0.112s 2020-12-14 02:13:37.098 197 DEBUG tempest.lib.common.rest_client [req-0ca43334-94b2-45bd-b5e1-023ba8bcd992 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ca43334-94b2-45bd-b5e1-023ba8bcd992', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:37.106 186 INFO tempest.lib.common.rest_client [req-f5e12af8-8e5a-4d50-9200-724005806689 ] Request (AggregatesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles/72a4576c553448cd941b052c1ca0cf2d 0.104s 2020-12-14 02:13:37.109 186 DEBUG tempest.lib.common.rest_client [req-f5e12af8-8e5a-4d50-9200-724005806689 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f5e12af8-8e5a-4d50-9200-724005806689', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:37.112 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:37.215 189 INFO tempest.lib.common.rest_client [req-69d2c8bd-683f-4d6c-b5b6-a60dca5f9fa9 ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:13:37.218 189 DEBUG tempest.lib.common.rest_client [req-69d2c8bd-683f-4d6c-b5b6-a60dca5f9fa9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69d2c8bd-683f-4d6c-b5b6-a60dca5f9fa9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["xjnFSJDuSHerW7Vap1ZREQ"], "expires_at": "2020-12-14T03:13:37.000000Z", "issued_at": "2020-12-14T02:13:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:37.228 186 INFO tempest.lib.common.rest_client [req-83b960c0-8d01-409a-b15a-4c5fa3e453ed ] Request (AggregatesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles/a629c95d64b3416fb80ae90af4f69c05 0.112s 2020-12-14 02:13:37.230 186 DEBUG tempest.lib.common.rest_client [req-83b960c0-8d01-409a-b15a-4c5fa3e453ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83b960c0-8d01-409a-b15a-4c5fa3e453ed', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:37.415 189 INFO tempest.lib.common.rest_client [req-c2c9f1ea-dbc6-4a13-bb37-ca9684fa59b6 ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.122s 2020-12-14 02:13:37.418 189 DEBUG tempest.lib.common.rest_client [req-c2c9f1ea-dbc6-4a13-bb37-ca9684fa59b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2c9f1ea-dbc6-4a13-bb37-ca9684fa59b6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["41WmcutSSyu02CmJVfwkYg"], "expires_at": "2020-12-14T03:13:37.000000Z", "issued_at": "2020-12-14T02:13:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:37.479 193 INFO tempest.lib.common.rest_client [req-26da7e69-ea7a-4054-b616-60a7ddeac920 ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-12-14 02:13:37.482 193 DEBUG tempest.lib.common.rest_client [req-26da7e69-ea7a-4054-b616-60a7ddeac920 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26da7e69-ea7a-4054-b616-60a7ddeac920', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fb80e3ed557e47f2bc21c16410a468c5", "name": "tempest-FloatingIpsBulkRbacTest-1007063652", "password_expires_at": null}, "audit_ids": ["hoIRcOKfSsOd5Sr7YQW8kQ"], "expires_at": "2020-12-14T03:13:37.000000Z", "issued_at": "2020-12-14T02:13:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d40da3377e57418ba43774aacdb51f8a", "name": "tempest-FloatingIpsBulkRbacTest-1007063652"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d40da3377e57418ba43774aacdb51f8a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d40da3377e57418ba43774aacdb51f8a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d40da3377e57418ba43774aacdb51f8a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d40da3377e57418ba43774aacdb51f8a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d40da3377e57418ba43774aacdb51f8a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d40da3377e57418ba43774aacdb51f8a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:37.493 189 INFO tempest.lib.common.rest_client [req-66359ed9-f683-457b-8d23-9beb5a9d1e2d ] Request (main): 200 GET http://172.30.13.94/identity/v3/services 0.064s 2020-12-14 02:13:37.496 189 DEBUG tempest.lib.common.rest_client [req-66359ed9-f683-457b-8d23-9beb5a9d1e2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '3880', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66359ed9-f683-457b-8d23-9beb5a9d1e2d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/services'} Body: b'{"services": [{"name": "heat", "description": "Heat Orchestration Service", "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/2dd99a84fcfe4d4c902af3c7e3370547"}}, {"name": "cinderv3", "description": "Cinder Volume Service V3", "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/4f0aec6b5f2347eeaf7987d5e52c15ee"}}, {"name": "heat-cfn", "description": "Heat CloudFormation Service", "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5635f75247b445dd8c099f6dae4391e9"}}, {"name": "neutron", "description": "Neutron Service", "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5b112e1f9f554e9ea13076091373ba24"}}, {"name": "placement", "description": "Placement Service", "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/7e47b727207a4e4e806b20fab1e17997"}}, {"name": "nova_legacy", "description": "Nova Compute Service (Legacy 2.0)", "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/8f2830f7e6d24fe0b8bf0b4df9612609"}}, {"name": "swift", "description": "Swift Service", "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/943b628f9f61458d9ef457915c0a4842"}}, {"name": "keystone", "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a2db5aab3c1d485cbf6ccd92ea7a2995"}}, {"name": "aodh", "description": "OpenStack Alarming Service", "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a372e5d5aaed47178d6bd28e25c4ed16"}}, {"name": "glance", "description": "Glance Image Service", "id": "b28a3fc2818546fd87c2e4c7f28b1ee2", "type": "image", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b28a3fc2818546fd87c2e4c7f28b1ee2"}}, {"name": "cinder", "description": "Cinder Volume Service", "id": "b29b4d43197d4c0b829c6cf8d8b39bf0", "type": "block-storage", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b29b4d43197d4c0b829c6cf8d8b39bf0"}}, {"name": "cinderv2", "description": "Cinder Volume Service V2", "id": "db8f8625cffe4b818eb0c765296f5282", "type": "volumev2", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/db8f8625cffe4b818eb0c765296f5282"}}, {"name": "gnocchi", "description": "OpenStack Metric Service", "id": "de459e19dc284669a50e9c8274d0ec7f", "type": "metric", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/de459e19dc284669a50e9c8274d0ec7f"}}, {"name": "barbican", "description": "Barbican Service", "id": "ee548e94135646b6a64be1daf30191d1", "type": "key-manager", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/ee548e94135646b6a64be1daf30191d1"}}, {"name": "nova", "description": "Nova Compute Service", "id": "f4181cc470594a9e82e091cd6ff52ad7", "type": "compute", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f4181cc470594a9e82e091cd6ff52ad7"}}, {"name": "panko", "description": "OpenStack Telemetry Service", "id": "f9b2abba6c934357b57aaf5757557344", "type": "event", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f9b2abba6c934357b57aaf5757557344"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/services", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:37.510 193 INFO tempest.lib.common.rest_client [-] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/ 0.015s 2020-12-14 02:13:37.512 193 DEBUG tempest.lib.common.rest_client [-] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '379', 'content-type': 'application/json', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/'} Body: b'{"versions": [{"id": "v2.0", "status": "SUPPORTED", "version": "", "min_version": "", "updated": "2011-01-21T11:33:21Z", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2/"}]}, {"id": "v2.1", "status": "CURRENT", "version": "2.87", "min_version": "2.1", "updated": "2013-07-23T11:33:21Z", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:37.552 193 INFO tempest.test [-] raised in FloatingIpsBulkRbacTest.setUpClass. Invoking tearDownClass. 2020-12-14 02:13:37.748 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.751 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.754 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.756 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.759 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.762 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.765 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.767 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.770 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.772 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.774 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.776 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.778 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.780 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.782 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.783 193 INFO tempest.lib.common.rest_client [req-a6b4168f-655c-4baf-8111-04d8433f3424 ] Request (FloatingIpsBulkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/fb80e3ed557e47f2bc21c16410a468c5 0.224s 2020-12-14 02:13:37.785 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.785 193 DEBUG tempest.lib.common.rest_client [req-a6b4168f-655c-4baf-8111-04d8433f3424 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a6b4168f-655c-4baf-8111-04d8433f3424', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/fb80e3ed557e47f2bc21c16410a468c5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:37.787 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.789 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.791 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.793 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.795 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.797 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.799 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.801 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.803 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.806 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.808 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.810 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.812 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.814 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.816 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.818 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.820 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.823 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.825 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.827 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.829 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.832 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.834 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.837 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.840 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.842 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.844 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.847 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.849 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.852 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.854 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.856 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.858 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.860 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.862 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.865 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.867 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.870 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.873 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.875 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.880 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.882 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.884 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.887 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.890 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.892 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.895 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.898 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.898 193 INFO tempest.lib.common.rest_client [req-98ee103c-ea60-484a-96c7-a5747b4b4eff ] Request (FloatingIpsBulkRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:13:37.901 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.902 193 DEBUG tempest.lib.common.rest_client [req-98ee103c-ea60-484a-96c7-a5747b4b4eff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98ee103c-ea60-484a-96c7-a5747b4b4eff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["zuvTaeTKQ7Cs9cjtyGPOgg"], "expires_at": "2020-12-14T03:13:37.000000Z", "issued_at": "2020-12-14T02:13:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:37.905 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.909 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.913 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.916 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.918 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.921 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:37.930 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-availability-zone:detail, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:37.933 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:38.010 189 INFO tempest.lib.common.rest_client [req-520462f2-8325-4f6f-9486-d2320e6e95eb ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_detail_rbac): 200 GET http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles 0.071s 2020-12-14 02:13:38.013 189 DEBUG tempest.lib.common.rest_client [req-520462f2-8325-4f6f-9486-d2320e6e95eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-520462f2-8325-4f6f-9486-d2320e6e95eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.128 189 INFO tempest.lib.common.rest_client [req-18ac27da-3f94-4e7f-b909-bc77e4c82548 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_detail_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:13:38.131 189 DEBUG tempest.lib.common.rest_client [req-18ac27da-3f94-4e7f-b909-bc77e4c82548 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-18ac27da-3f94-4e7f-b909-bc77e4c82548', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3421d1d7adcf4817b31dea244d514787", "name": "tempest-NovaAvailabilityZoneRbacTest-841159102", "password_expires_at": null}, "audit_ids": ["jEitmfIwR4G49sdbZjNwkg"], "expires_at": "2020-12-14T03:13:38.000000Z", "issued_at": "2020-12-14T02:13:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5e334204dd7346cca841ef313ff1e1ec", "name": "tempest-NovaAvailabilityZoneRbacTest-841159102"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.212 197 INFO tempest.lib.common.rest_client [req-88aead87-7a01-498c-9dbc-b7f90c39c530 ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:13:38.214 197 DEBUG tempest.lib.common.rest_client [req-88aead87-7a01-498c-9dbc-b7f90c39c530 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88aead87-7a01-498c-9dbc-b7f90c39c530', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "24b5fe7dca6a4c2f853b88640371d171", "name": "tempest-FlavorAccessRbacTest-2125871953", "password_expires_at": null}, "audit_ids": ["f4Q0--PvRUah4xTrsPiyvQ"], "expires_at": "2020-12-14T03:13:38.000000Z", "issued_at": "2020-12-14T02:13:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "49bdc2127d1c4edc9a245fc036aeb613", "name": "tempest-FlavorAccessRbacTest-2125871953"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.250 193 INFO tempest.lib.common.rest_client [req-85d736f0-cda6-45cd-9f9b-af8fbb4981e7 ] Request (FloatingIpsBulkRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d40da3377e57418ba43774aacdb51f8a&name=default 0.338s 2020-12-14 02:13:38.254 193 DEBUG tempest.lib.common.rest_client [req-85d736f0-cda6-45cd-9f9b-af8fbb4981e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-85d736f0-cda6-45cd-9f9b-af8fbb4981e7', 'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d40da3377e57418ba43774aacdb51f8a&name=default'} Body: b'{"security_groups": [{"id": "0e7bc2ca-f87d-4184-88a4-75897ca46232", "name": "default", "stateful": true, "tenant_id": "d40da3377e57418ba43774aacdb51f8a", "description": "Default security group", "security_group_rules": [{"id": "5cba0b22-9dcf-46b0-87bd-154755f70914", "tenant_id": "d40da3377e57418ba43774aacdb51f8a", "security_group_id": "0e7bc2ca-f87d-4184-88a4-75897ca46232", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:38Z", "updated_at": "2020-12-14T02:13:38Z", "revision_number": 0, "project_id": "d40da3377e57418ba43774aacdb51f8a"}, {"id": "60e8702f-9bc3-4de8-b00e-30507bcc02cd", "tenant_id": "d40da3377e57418ba43774aacdb51f8a", "security_group_id": "0e7bc2ca-f87d-4184-88a4-75897ca46232", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:38Z", "updated_at": "2020-12-14T02:13:38Z", "revision_number": 0, "project_id": "d40da3377e57418ba43774aacdb51f8a"}, {"id": "bfedb454-4686-4323-a572-90afbff4759c", "tenant_id": "d40da3377e57418ba43774aacdb51f8a", "security_group_id": "0e7bc2ca-f87d-4184-88a4-75897ca46232", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "0e7bc2ca-f87d-4184-88a4-75897ca46232", "description": null, "tags": [], "created_at": "2020-12-14T02:13:38Z", "updated_at": "2020-12-14T02:13:38Z", "revision_number": 0, "project_id": "d40da3377e57418ba43774aacdb51f8a"}, {"id": "d22ade21-40b2-4c11-8138-11182d3427e9", "tenant_id": "d40da3377e57418ba43774aacdb51f8a", "security_group_id": "0e7bc2ca-f87d-4184-88a4-75897ca46232", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "0e7bc2ca-f87d-4184-88a4-75897ca46232", "description": null, "tags": [], "created_at": "2020-12-14T02:13:38Z", "updated_at": "2020-12-14T02:13:38Z", "revision_number": 0, "project_id": "d40da3377e57418ba43774aacdb51f8a"}], "tags": [], "created_at": "2020-12-14T02:13:38Z", "updated_at": "2020-12-14T02:13:38Z", "revision_number": 1, "project_id": "d40da3377e57418ba43774aacdb51f8a"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.311 189 INFO tempest.lib.common.rest_client [req-0f338468-f06d-4e26-8b3f-1aa464b2cfad ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_detail_rbac): 200 GET http://172.30.13.94/compute/v2.1/os-availability-zone/detail 0.171s 2020-12-14 02:13:38.315 189 DEBUG tempest.lib.common.rest_client [req-0f338468-f06d-4e26-8b3f-1aa464b2cfad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '607', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0f338468-f06d-4e26-8b3f-1aa464b2cfad', 'x-compute-request-id': 'req-0f338468-f06d-4e26-8b3f-1aa464b2cfad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-availability-zone/detail'} Body: b'{"availabilityZoneInfo": [{"zoneName": "internal", "zoneState": {"available": true}, "hosts": {"lf-virtual9": {"nova-scheduler": {"available": true, "active": true, "updated_at": "2020-12-14T02:13:38.000000"}, "nova-conductor": {"available": true, "active": true, "updated_at": "2020-12-14T02:13:29.000000"}}}}, {"zoneName": "nova", "zoneState": {"available": true}, "hosts": {"lf-virtual9": {"nova-compute": {"available": true, "active": true, "updated_at": "2020-12-14T02:13:33.000000"}}, "lf-virtual8": {"nova-compute": {"available": true, "active": true, "updated_at": "2020-12-14T02:13:31.000000"}}}}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.351 197 INFO tempest.lib.common.rest_client [req-add228b9-c6ca-4bcc-9ba0-823075c13697 ] Request (FlavorAccessRbacTest:setUpClass): 200 POST http://172.30.13.94/compute/v2.1/flavors 0.117s 2020-12-14 02:13:38.353 197 DEBUG tempest.lib.common.rest_client [req-add228b9-c6ca-4bcc-9ba0-823075c13697 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"name": "tempest-FlavorAccessRbacTest-flavor-1810789169", "ram": 3, "vcpus": 6, "disk": 4, "id": "2f555ff1-ebfb-4103-832a-d0ebe69d8c2a", "os-flavor-access:is_public": false}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '507', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-add228b9-c6ca-4bcc-9ba0-823075c13697', 'x-compute-request-id': 'req-add228b9-c6ca-4bcc-9ba0-823075c13697', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors'} Body: b'{"flavor": {"id": "2f555ff1-ebfb-4103-832a-d0ebe69d8c2a", "name": "tempest-FlavorAccessRbacTest-flavor-1810789169", "ram": 3, "disk": 4, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 6, "os-flavor-access:is_public": false, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.353 186 INFO tempest.lib.common.rest_client [req-737910d8-f129-4f65-b421-d9fc13715c01 ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.115s 2020-12-14 02:13:38.356 186 DEBUG tempest.lib.common.rest_client [req-737910d8-f129-4f65-b421-d9fc13715c01 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-737910d8-f129-4f65-b421-d9fc13715c01', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["LuK07YpJTQCYLYIH0SkXzQ"], "expires_at": "2020-12-14T03:13:38.000000Z", "issued_at": "2020-12-14T02:13:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.364 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:38.388 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:38.400 193 INFO tempest.lib.common.rest_client [req-8f368ee0-6cf6-4798-aae0-5b86db9689a8 ] Request (FloatingIpsBulkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/0e7bc2ca-f87d-4184-88a4-75897ca46232 0.137s 2020-12-14 02:13:38.402 193 DEBUG tempest.lib.common.rest_client [req-8f368ee0-6cf6-4798-aae0-5b86db9689a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8f368ee0-6cf6-4798-aae0-5b86db9689a8', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/0e7bc2ca-f87d-4184-88a4-75897ca46232'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.440 189 INFO tempest.lib.common.rest_client [req-7454600d-439b-4a71-840e-6ef2cda1d19c ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_detail_rbac): 200 GET http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles 0.069s 2020-12-14 02:13:38.443 189 DEBUG tempest.lib.common.rest_client [req-7454600d-439b-4a71-840e-6ef2cda1d19c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7454600d-439b-4a71-840e-6ef2cda1d19c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.450 197 INFO tempest.lib.common.rest_client [req-94fa41c2-98b4-4af4-a929-8376fb9039fa ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:13:38.454 197 DEBUG tempest.lib.common.rest_client [req-94fa41c2-98b4-4af4-a929-8376fb9039fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94fa41c2-98b4-4af4-a929-8376fb9039fa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["5Vp4Noy5QeWXLF2hm2w7iA"], "expires_at": "2020-12-14T03:13:38.000000Z", "issued_at": "2020-12-14T02:13:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.502 186 INFO tempest.lib.common.rest_client [req-64e41251-150b-4415-b1c3-7ca5881b17e4 ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/detail 0.126s 2020-12-14 02:13:38.505 186 DEBUG tempest.lib.common.rest_client [req-64e41251-150b-4415-b1c3-7ca5881b17e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '3115', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-64e41251-150b-4415-b1c3-7ca5881b17e4', 'x-compute-request-id': 'req-64e41251-150b-4415-b1c3-7ca5881b17e4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/detail'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled", "vcpus": 88, "memory_mb": 64312, "local_gb": 100, "vcpus_used": 1, "memory_mb_used": 1024, "local_gb_used": 1, "hypervisor_type": "QEMU", "hypervisor_version": 4000000, "free_ram_mb": 63288, "free_disk_gb": 99, "current_workload": 0, "running_vms": 1, "disk_available_least": 62, "host_ip": "172.30.13.94", "service": {"id": 2, "host": "lf-virtual9", "disabled_reason": null}, "cpu_info": "{\\"arch\\": \\"x86_64\\", \\"model\\": \\"Broadwell-IBRS\\", \\"vendor\\": \\"Intel\\", \\"topology\\": {\\"cells\\": 2, \\"sockets\\": 1, \\"cores\\": 22, \\"threads\\": 2}, \\"features\\": [\\"fxsr\\", \\"syscall\\", \\"hle\\", \\"aes\\", \\"cx16\\", \\"avx2\\", \\"cmov\\", \\"smap\\", \\"pse\\", \\"ssse3\\", \\"xsave\\", \\"f16c\\", \\"rdrand\\", \\"vmx\\", \\"smx\\", \\"apic\\", \\"bmi2\\", \\"tsc_adjust\\", \\"rdtscp\\", \\"osxsave\\", \\"mca\\", \\"vme\\", \\"rdseed\\", \\"monitor\\", \\"spec-ctrl\\", \\"dtes64\\", \\"erms\\", \\"rtm\\", \\"invpcid\\", \\"popcnt\\", \\"pat\\", \\"x2apic\\", \\"pae\\", \\"ssbd\\", \\"arat\\", \\"ss\\", \\"tsc-deadline\\", \\"ds_cpl\\", \\"bmi1\\", \\"pcid\\", \\"pdpe1gb\\", \\"invtsc\\", \\"cx8\\", \\"dca\\", \\"smep\\", \\"mce\\", \\"ht\\", \\"fsgsbase\\", \\"intel-pt\\", \\"fma\\", \\"md-clear\\", \\"pge\\", \\"adx\\", \\"est\\", \\"lm\\", \\"abm\\", \\"lahf_lm\\", \\"acpi\\", \\"sse2\\", \\"tm2\\", \\"pni\\", \\"ds\\", \\"clflush\\", \\"xtpr\\", \\"msr\\", \\"sep\\", \\"pdcm\\", \\"tm\\", \\"nx\\", \\"sse4.1\\", \\"xsaveopt\\", \\"de\\", \\"tsc\\", \\"stibp\\", \\"3dnowprefetch\\", \\"sse4.2\\", \\"avx\\", \\"pbe\\", \\"pse36\\", \\"mmx\\", \\"pclmuldq\\", \\"mtrr\\", \\"movbe\\", \\"sse\\", \\"fpu\\"]}"}, {"id": 2, "hypervisor_hostname": "lf-virtual8", "state": "up", "status": "enabled", "vcpus": 88, "memory_mb": 64312, "local_gb": 100, "vcpus_used": 1, "memory_mb_used": 1024, "local_gb_used": 1, "hypervisor_type": "QEMU", "hypervisor_version": 4000000, "free_ram_mb": 63288, "free_disk_gb": 99, "current_workload": 0, "running_vms": 1, "disk_available_least": 62, "host_ip": "172.30.13.93", "service": {"id": 3, "host": "lf-virtual8", "disabled_reason": null}, "cpu_info": "{\\"arch\\": \\"x86_64\\", \\"model\\": \\"Broadwell-IBRS\\", \\"vendor\\": \\"Intel\\", \\"topology\\": {\\"cells\\": 2, \\"sockets\\": 1, \\"cores\\": 22, \\"threads\\": 2}, \\"features\\": [\\"f16c\\", \\"xsave\\", \\"pclmuldq\\", \\"rdtscp\\", \\"ds_cpl\\", \\"pdcm\\", \\"lm\\", \\"sse\\", \\"erms\\", \\"3dnowprefetch\\", \\"pdpe1gb\\", \\"adx\\", \\"apic\\", \\"ssse3\\", \\"bmi1\\", \\"stibp\\", \\"invpcid\\", \\"mmx\\", \\"avx2\\", \\"intel-pt\\", \\"pse36\\", \\"rdrand\\", \\"vmx\\", \\"pcid\\", \\"cx8\\", \\"est\\", \\"tsc-deadline\\", \\"cx16\\", \\"vme\\", \\"pni\\", \\"acpi\\", \\"pse\\", \\"x2apic\\", \\"dtes64\\", \\"de\\", \\"rtm\\", \\"smep\\", \\"mce\\", \\"ssbd\\", \\"xtpr\\", \\"monitor\\", \\"tsc\\", \\"xsaveopt\\", \\"movbe\\", \\"spec-ctrl\\", \\"osxsave\\", \\"ht\\", \\"tm\\", \\"arat\\", \\"abm\\", \\"smx\\", \\"fxsr\\", \\"pbe\\", \\"clflush\\", \\"ds\\", \\"md-clear\\", \\"ss\\", \\"sse4.1\\", \\"invtsc\\", \\"popcnt\\", \\"sse2\\", \\"sse4.2\\", \\"fpu\\", \\"fsgsbase\\", \\"smap\\", \\"pae\\", \\"aes\\", \\"avx\\", \\"tsc_adjust\\", \\"pge\\", \\"nx\\", \\"rdseed\\", \\"lahf_lm\\", \\"cmov\\", \\"fma\\", \\"msr\\", \\"tm2\\", \\"bmi2\\", \\"mtrr\\", \\"dca\\", \\"mca\\", \\"hle\\", \\"pat\\", \\"sep\\", \\"syscall\\"]}"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.505 189 INFO tempest.lib.common.rest_client [req-d3938380-92c4-44c9-812c-66488a126e0a ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_detail_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.055s 2020-12-14 02:13:38.508 189 DEBUG tempest.lib.common.rest_client [req-d3938380-92c4-44c9-812c-66488a126e0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3938380-92c4-44c9-812c-66488a126e0a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3421d1d7adcf4817b31dea244d514787", "name": "tempest-NovaAvailabilityZoneRbacTest-841159102", "password_expires_at": null}, "audit_ids": ["wZN0FgI_RS6mss1p9yaDfA"], "expires_at": "2020-12-14T03:13:38.000000Z", "issued_at": "2020-12-14T02:13:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5e334204dd7346cca841ef313ff1e1ec", "name": "tempest-NovaAvailabilityZoneRbacTest-841159102"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.552 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:38.556 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.557 193 INFO tempest.lib.common.rest_client [req-ea132db3-a1bf-4ec4-b2d8-17567dd701cf ] Request (FloatingIpsBulkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d40da3377e57418ba43774aacdb51f8a 0.148s 2020-12-14 02:13:38.560 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.560 193 DEBUG tempest.lib.common.rest_client [req-ea132db3-a1bf-4ec4-b2d8-17567dd701cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea132db3-a1bf-4ec4-b2d8-17567dd701cf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d40da3377e57418ba43774aacdb51f8a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.563 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.566 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.570 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.574 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.575 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:38.580 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.582 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.585 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.588 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.591 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.594 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.597 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.600 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.603 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.606 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.609 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.612 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.615 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.618 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.621 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.622 197 INFO tempest.lib.common.rest_client [req-759335a8-9965-4390-a9da-ed10294b4630 ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-14 02:13:38.623 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.626 197 DEBUG tempest.lib.common.rest_client [req-759335a8-9965-4390-a9da-ed10294b4630 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-759335a8-9965-4390-a9da-ed10294b4630', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["_vx3tAHVSX-mq8zvbJmOiQ"], "expires_at": "2020-12-14T03:13:38.000000Z", "issued_at": "2020-12-14T02:13:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.626 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.629 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.632 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.635 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.638 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.640 193 INFO tempest.lib.common.rest_client [req-68049416-b86c-41a8-9a1e-7155795d2e08 ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:13:38.641 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.641 186 INFO tempest.lib.common.rest_client [req-c0e62baf-0dc3-4da0-b8d6-589dd38dbacf ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:13:38.642 193 DEBUG tempest.lib.common.rest_client [req-68049416-b86c-41a8-9a1e-7155795d2e08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68049416-b86c-41a8-9a1e-7155795d2e08', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["bhG2mlGOT9SYCZSgHHy9_A"], "expires_at": "2020-12-14T03:13:38.000000Z", "issued_at": "2020-12-14T02:13:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.643 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.645 186 DEBUG tempest.lib.common.rest_client [req-c0e62baf-0dc3-4da0-b8d6-589dd38dbacf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c0e62baf-0dc3-4da0-b8d6-589dd38dbacf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["DJDHgQlpRFexH8GHrgHRiA"], "expires_at": "2020-12-14T03:13:38.000000Z", "issued_at": "2020-12-14T02:13:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.646 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.649 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.652 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.655 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.657 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.660 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.663 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.666 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.669 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.672 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.676 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.678 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.681 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.684 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.688 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.691 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.693 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.696 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.699 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.702 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.705 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.707 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.710 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.710 197 INFO tempest.lib.common.rest_client [req-fb296253-61f1-416d-bb22-454bc7d62064 ] Request (main): 200 GET http://172.30.13.94/identity/v3/services 0.074s 2020-12-14 02:13:38.713 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.713 197 DEBUG tempest.lib.common.rest_client [req-fb296253-61f1-416d-bb22-454bc7d62064 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '3880', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fb296253-61f1-416d-bb22-454bc7d62064', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/services'} Body: b'{"services": [{"name": "heat", "description": "Heat Orchestration Service", "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/2dd99a84fcfe4d4c902af3c7e3370547"}}, {"name": "cinderv3", "description": "Cinder Volume Service V3", "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/4f0aec6b5f2347eeaf7987d5e52c15ee"}}, {"name": "heat-cfn", "description": "Heat CloudFormation Service", "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5635f75247b445dd8c099f6dae4391e9"}}, {"name": "neutron", "description": "Neutron Service", "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5b112e1f9f554e9ea13076091373ba24"}}, {"name": "placement", "description": "Placement Service", "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/7e47b727207a4e4e806b20fab1e17997"}}, {"name": "nova_legacy", "description": "Nova Compute Service (Legacy 2.0)", "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/8f2830f7e6d24fe0b8bf0b4df9612609"}}, {"name": "swift", "description": "Swift Service", "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/943b628f9f61458d9ef457915c0a4842"}}, {"name": "keystone", "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a2db5aab3c1d485cbf6ccd92ea7a2995"}}, {"name": "aodh", "description": "OpenStack Alarming Service", "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a372e5d5aaed47178d6bd28e25c4ed16"}}, {"name": "glance", "description": "Glance Image Service", "id": "b28a3fc2818546fd87c2e4c7f28b1ee2", "type": "image", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b28a3fc2818546fd87c2e4c7f28b1ee2"}}, {"name": "cinder", "description": "Cinder Volume Service", "id": "b29b4d43197d4c0b829c6cf8d8b39bf0", "type": "block-storage", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b29b4d43197d4c0b829c6cf8d8b39bf0"}}, {"name": "cinderv2", "description": "Cinder Volume Service V2", "id": "db8f8625cffe4b818eb0c765296f5282", "type": "volumev2", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/db8f8625cffe4b818eb0c765296f5282"}}, {"name": "gnocchi", "description": "OpenStack Metric Service", "id": "de459e19dc284669a50e9c8274d0ec7f", "type": "metric", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/de459e19dc284669a50e9c8274d0ec7f"}}, {"name": "barbican", "description": "Barbican Service", "id": "ee548e94135646b6a64be1daf30191d1", "type": "key-manager", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/ee548e94135646b6a64be1daf30191d1"}}, {"name": "nova", "description": "Nova Compute Service", "id": "f4181cc470594a9e82e091cd6ff52ad7", "type": "compute", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f4181cc470594a9e82e091cd6ff52ad7"}}, {"name": "panko", "description": "OpenStack Telemetry Service", "id": "f9b2abba6c934357b57aaf5757557344", "type": "event", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f9b2abba6c934357b57aaf5757557344"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/services", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.716 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.720 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.723 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.729 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.732 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.735 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.738 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.741 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.744 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.747 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.749 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.752 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.755 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.758 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.763 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.766 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.767 193 INFO tempest.lib.common.rest_client [req-dc967b06-5ec7-431e-830f-88b1ca8487f1 ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-12-14 02:13:38.770 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.770 193 DEBUG tempest.lib.common.rest_client [req-dc967b06-5ec7-431e-830f-88b1ca8487f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc967b06-5ec7-431e-830f-88b1ca8487f1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["KjiGir1cR6S1z5WcoCzFgQ"], "expires_at": "2020-12-14T03:13:38.000000Z", "issued_at": "2020-12-14T02:13:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.770 186 INFO tempest.lib.common.rest_client [req-6c8321c8-4e51-4d2f-b543-3718e489a1e6 ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:13:38.773 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:38.774 186 DEBUG tempest.lib.common.rest_client [req-6c8321c8-4e51-4d2f-b543-3718e489a1e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c8321c8-4e51-4d2f-b543-3718e489a1e6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["uHdgGp56T4qPPCpDOQEJOQ"], "expires_at": "2020-12-14T03:13:38.000000Z", "issued_at": "2020-12-14T02:13:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.777 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-availability-zone:list, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:38.780 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:38.838 193 INFO tempest.lib.common.rest_client [req-51bc51f8-1a05-4b49-9f6f-11c2e527b2dd ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.059s 2020-12-14 02:13:38.841 193 DEBUG tempest.lib.common.rest_client [req-51bc51f8-1a05-4b49-9f6f-11c2e527b2dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51bc51f8-1a05-4b49-9f6f-11c2e527b2dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.846 186 INFO tempest.lib.common.rest_client [req-889dd00b-a478-46f5-88af-e1fc82f59252 ] Request (main): 200 GET http://172.30.13.94/identity/v3/services 0.059s 2020-12-14 02:13:38.850 186 DEBUG tempest.lib.common.rest_client [req-889dd00b-a478-46f5-88af-e1fc82f59252 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '3880', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-889dd00b-a478-46f5-88af-e1fc82f59252', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/services'} Body: b'{"services": [{"name": "heat", "description": "Heat Orchestration Service", "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/2dd99a84fcfe4d4c902af3c7e3370547"}}, {"name": "cinderv3", "description": "Cinder Volume Service V3", "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/4f0aec6b5f2347eeaf7987d5e52c15ee"}}, {"name": "heat-cfn", "description": "Heat CloudFormation Service", "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5635f75247b445dd8c099f6dae4391e9"}}, {"name": "neutron", "description": "Neutron Service", "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5b112e1f9f554e9ea13076091373ba24"}}, {"name": "placement", "description": "Placement Service", "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/7e47b727207a4e4e806b20fab1e17997"}}, {"name": "nova_legacy", "description": "Nova Compute Service (Legacy 2.0)", "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/8f2830f7e6d24fe0b8bf0b4df9612609"}}, {"name": "swift", "description": "Swift Service", "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/943b628f9f61458d9ef457915c0a4842"}}, {"name": "keystone", "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a2db5aab3c1d485cbf6ccd92ea7a2995"}}, {"name": "aodh", "description": "OpenStack Alarming Service", "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a372e5d5aaed47178d6bd28e25c4ed16"}}, {"name": "glance", "description": "Glance Image Service", "id": "b28a3fc2818546fd87c2e4c7f28b1ee2", "type": "image", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b28a3fc2818546fd87c2e4c7f28b1ee2"}}, {"name": "cinder", "description": "Cinder Volume Service", "id": "b29b4d43197d4c0b829c6cf8d8b39bf0", "type": "block-storage", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b29b4d43197d4c0b829c6cf8d8b39bf0"}}, {"name": "cinderv2", "description": "Cinder Volume Service V2", "id": "db8f8625cffe4b818eb0c765296f5282", "type": "volumev2", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/db8f8625cffe4b818eb0c765296f5282"}}, {"name": "gnocchi", "description": "OpenStack Metric Service", "id": "de459e19dc284669a50e9c8274d0ec7f", "type": "metric", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/de459e19dc284669a50e9c8274d0ec7f"}}, {"name": "barbican", "description": "Barbican Service", "id": "ee548e94135646b6a64be1daf30191d1", "type": "key-manager", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/ee548e94135646b6a64be1daf30191d1"}}, {"name": "nova", "description": "Nova Compute Service", "id": "f4181cc470594a9e82e091cd6ff52ad7", "type": "compute", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f4181cc470594a9e82e091cd6ff52ad7"}}, {"name": "panko", "description": "OpenStack Telemetry Service", "id": "f9b2abba6c934357b57aaf5757557344", "type": "event", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f9b2abba6c934357b57aaf5757557344"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/services", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.851 189 INFO tempest.lib.common.rest_client [req-4c7ded4e-dce7-40a9-aa8f-30bbb4d7d172 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_rbac): 200 GET http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles 0.066s 2020-12-14 02:13:38.854 189 DEBUG tempest.lib.common.rest_client [req-4c7ded4e-dce7-40a9-aa8f-30bbb4d7d172 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c7ded4e-dce7-40a9-aa8f-30bbb4d7d172', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.927 193 INFO tempest.lib.common.rest_client [req-b347d685-1a33-44d7-b9ff-19e861f35216 ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.079s 2020-12-14 02:13:38.929 193 DEBUG tempest.lib.common.rest_client [req-b347d685-1a33-44d7-b9ff-19e861f35216 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-LimitsRbacTest-1627406510-desc", "domain_id": "default", "name": "tempest-LimitsRbacTest-1627406510"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '366', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b347d685-1a33-44d7-b9ff-19e861f35216', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "37087e8b0dbd44e4a6ca42e1b247635a", "name": "tempest-LimitsRbacTest-1627406510", "domain_id": "default", "description": "tempest-LimitsRbacTest-1627406510-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:38.955 189 INFO tempest.lib.common.rest_client [req-fa0f3732-327b-48c9-b49a-a71b93aa0af5 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:13:38.959 189 DEBUG tempest.lib.common.rest_client [req-fa0f3732-327b-48c9-b49a-a71b93aa0af5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa0f3732-327b-48c9-b49a-a71b93aa0af5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3421d1d7adcf4817b31dea244d514787", "name": "tempest-NovaAvailabilityZoneRbacTest-841159102", "password_expires_at": null}, "audit_ids": ["6NmRkmiKScCFp_8xK0pBOg"], "expires_at": "2020-12-14T03:13:38.000000Z", "issued_at": "2020-12-14T02:13:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5e334204dd7346cca841ef313ff1e1ec", "name": "tempest-NovaAvailabilityZoneRbacTest-841159102"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.014 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.018 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.021 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.025 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.029 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.033 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.038 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.041 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.044 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.044 193 INFO tempest.lib.common.rest_client [req-b7f209a4-709c-4362-930a-8a06e9eadda9 ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.108s 2020-12-14 02:13:39.047 193 DEBUG tempest.lib.common.rest_client [req-b7f209a4-709c-4362-930a-8a06e9eadda9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-LimitsRbacTest-1627406510", "password": "G0#x7f#B^&V*%&W", "project_id": "37087e8b0dbd44e4a6ca42e1b247635a", "email": "tempest-LimitsRbacTest-1380566801@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7f209a4-709c-4362-930a-8a06e9eadda9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "37087e8b0dbd44e4a6ca42e1b247635a", "email": "tempest-LimitsRbacTest-1380566801@example.com", "id": "77e08e1ba559407c89781e0d18298d73", "name": "tempest-LimitsRbacTest-1627406510", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/77e08e1ba559407c89781e0d18298d73"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.047 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.050 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.053 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.056 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.059 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.062 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.066 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.069 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.072 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.075 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.077 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.080 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.083 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.086 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.089 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.091 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.094 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.097 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.100 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.103 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.105 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.108 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.111 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.114 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.117 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.117 193 INFO tempest.lib.common.rest_client [req-cab2c231-6d43-472b-9e88-3da63249aa69 ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:13:39.120 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.121 193 DEBUG tempest.lib.common.rest_client [req-cab2c231-6d43-472b-9e88-3da63249aa69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cab2c231-6d43-472b-9e88-3da63249aa69', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.123 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.127 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.132 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.137 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.142 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.142 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.145 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.146 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.149 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.150 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.152 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.155 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.156 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.159 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.160 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.164 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.164 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.167 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.167 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.170 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.171 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.172 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.174 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.175 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.178 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.178 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.181 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.181 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.184 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.185 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.187 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.187 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.190 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.190 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.189 193 INFO tempest.lib.common.rest_client [req-eac1143e-1d00-476c-8a61-68de07f6cc4a ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:13:39.192 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.193 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.193 193 DEBUG tempest.lib.common.rest_client [req-eac1143e-1d00-476c-8a61-68de07f6cc4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eac1143e-1d00-476c-8a61-68de07f6cc4a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.195 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.196 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.197 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.199 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.202 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.202 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.204 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.204 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.206 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.207 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.209 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.210 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.211 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.212 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.214 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.215 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.216 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.218 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.219 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.221 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.221 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.223 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.224 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.226 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.227 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.228 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.229 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.230 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.232 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.231 189 INFO tempest.lib.common.rest_client [req-b71faaee-8ac4-4f40-aa0f-7fcb28574ab6 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_rbac): 200 GET http://172.30.13.94/compute/v2.1/os-availability-zone 0.266s 2020-12-14 02:13:39.232 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.234 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.234 189 DEBUG tempest.lib.common.rest_client [req-b71faaee-8ac4-4f40-aa0f-7fcb28574ab6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '97', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b71faaee-8ac4-4f40-aa0f-7fcb28574ab6', 'x-compute-request-id': 'req-b71faaee-8ac4-4f40-aa0f-7fcb28574ab6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-availability-zone'} Body: b'{"availabilityZoneInfo": [{"zoneName": "nova", "zoneState": {"available": true}, "hosts": null}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.235 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.238 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.240 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.242 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-access:add_tenant_access, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:39.243 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.244 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:39.246 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.249 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.251 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.255 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.256 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:39.258 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.261 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.263 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.266 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.270 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.272 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.275 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.277 193 INFO tempest.lib.common.rest_client [req-f0ea1391-9de1-4954-9ba5-99415bc44c84 ] Request (LimitsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a/users/77e08e1ba559407c89781e0d18298d73/roles/72a4576c553448cd941b052c1ca0cf2d 0.077s 2020-12-14 02:13:39.278 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.279 193 DEBUG tempest.lib.common.rest_client [req-f0ea1391-9de1-4954-9ba5-99415bc44c84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0ea1391-9de1-4954-9ba5-99415bc44c84', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a/users/77e08e1ba559407c89781e0d18298d73/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.280 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.282 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-LimitsRbacTest-1627406510', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '37087e8b0dbd44e4a6ca42e1b247635a', 'project_name': 'tempest-LimitsRbacTest-1627406510', 'tenant_id': '37087e8b0dbd44e4a6ca42e1b247635a', 'tenant_name': 'tempest-LimitsRbacTest-1627406510', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '77e08e1ba559407c89781e0d18298d73'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:39.283 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.284 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-LimitsRbacTest-1627406510', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '37087e8b0dbd44e4a6ca42e1b247635a', 'project_name': 'tempest-LimitsRbacTest-1627406510', 'tenant_id': '37087e8b0dbd44e4a6ca42e1b247635a', 'tenant_name': 'tempest-LimitsRbacTest-1627406510', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '77e08e1ba559407c89781e0d18298d73'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:39.286 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.288 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.291 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.294 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.296 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.300 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.303 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.309 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.311 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.313 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.316 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.319 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.322 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.324 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.326 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.328 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.331 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.333 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.335 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.337 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.339 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.342 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:39.350 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:add_host, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:39.355 197 INFO tempest.lib.common.rest_client [req-c17b736a-a924-4cc8-bc9a-93e5d080e66e ] Request (FlavorAccessRbacTest:test_add_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles 0.105s 2020-12-14 02:13:39.358 197 DEBUG tempest.lib.common.rest_client [req-c17b736a-a924-4cc8-bc9a-93e5d080e66e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c17b736a-a924-4cc8-bc9a-93e5d080e66e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.372 189 INFO tempest.lib.common.rest_client [req-a7c0c3da-dc6f-4ba3-a4ab-abd9a97706de ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_rbac): 200 GET http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles 0.107s 2020-12-14 02:13:39.375 189 DEBUG tempest.lib.common.rest_client [req-a7c0c3da-dc6f-4ba3-a4ab-abd9a97706de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7c0c3da-dc6f-4ba3-a4ab-abd9a97706de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec/users/3421d1d7adcf4817b31dea244d514787/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.396 186 INFO tempest.lib.common.rest_client [req-5507e1b0-9b34-4102-90a8-59c85234e940 ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.042s 2020-12-14 02:13:39.399 186 DEBUG tempest.lib.common.rest_client [req-5507e1b0-9b34-4102-90a8-59c85234e940 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-1573340476"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '215', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5507e1b0-9b34-4102-90a8-59c85234e940', 'x-compute-request-id': 'req-5507e1b0-9b34-4102-90a8-59c85234e940', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 4553, "name": "tempest-AggregatesRbacTest-aggregate-1573340476", "created_at": "2020-12-14T02:13:39.379937", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.425 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:39.455 193 INFO tempest.lib.common.rest_client [req-c9aabbb0-8616-4be2-91ee-9be951a0c00e ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:13:39.458 193 DEBUG tempest.lib.common.rest_client [req-c9aabbb0-8616-4be2-91ee-9be951a0c00e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6559', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9aabbb0-8616-4be2-91ee-9be951a0c00e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "77e08e1ba559407c89781e0d18298d73", "name": "tempest-LimitsRbacTest-1627406510", "password_expires_at": null}, "audit_ids": ["pEIdMnBYRXS6wr4ElEHVhQ"], "expires_at": "2020-12-14T03:13:39.000000Z", "issued_at": "2020-12-14T02:13:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37087e8b0dbd44e4a6ca42e1b247635a", "name": "tempest-LimitsRbacTest-1627406510"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/im _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.463 197 INFO tempest.lib.common.rest_client [req-c83b9e38-ce38-4687-a2c3-5cf083313629 ] Request (FlavorAccessRbacTest:test_add_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:13:39.466 197 DEBUG tempest.lib.common.rest_client [req-c83b9e38-ce38-4687-a2c3-5cf083313629 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c83b9e38-ce38-4687-a2c3-5cf083313629', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "24b5fe7dca6a4c2f853b88640371d171", "name": "tempest-FlavorAccessRbacTest-2125871953", "password_expires_at": null}, "audit_ids": ["-8TFlin1SWib2ugTVYorEQ"], "expires_at": "2020-12-14T03:13:39.000000Z", "issued_at": "2020-12-14T02:13:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "49bdc2127d1c4edc9a245fc036aeb613", "name": "tempest-FlavorAccessRbacTest-2125871953"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.476 189 INFO tempest.lib.common.rest_client [req-40ec5302-b22c-4f52-902f-3880039f1951 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:13:39.480 189 DEBUG tempest.lib.common.rest_client [req-40ec5302-b22c-4f52-902f-3880039f1951 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40ec5302-b22c-4f52-902f-3880039f1951', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3421d1d7adcf4817b31dea244d514787", "name": "tempest-NovaAvailabilityZoneRbacTest-841159102", "password_expires_at": null}, "audit_ids": ["M2Sm_yIPQHmvWCDlk-bi3A"], "expires_at": "2020-12-14T03:13:39.000000Z", "issued_at": "2020-12-14T02:13:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5e334204dd7346cca841ef313ff1e1ec", "name": "tempest-NovaAvailabilityZoneRbacTest-841159102"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5e334204dd7346cca841ef313ff1e1ec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.484 186 INFO tempest.lib.common.rest_client [req-5e6599a7-440e-4ab5-878e-182398f6f418 ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.053s 2020-12-14 02:13:39.486 186 DEBUG tempest.lib.common.rest_client [req-5e6599a7-440e-4ab5-878e-182398f6f418 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e6599a7-440e-4ab5-878e-182398f6f418', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.515 193 INFO tempest.lib.common.rest_client [req-87dcb3d6-db32-4b35-95f2-63f8212cb18c ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:13:39.519 193 DEBUG tempest.lib.common.rest_client [req-87dcb3d6-db32-4b35-95f2-63f8212cb18c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87dcb3d6-db32-4b35-95f2-63f8212cb18c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["KHvciLx2QVSvXdaWu-Didw"], "expires_at": "2020-12-14T03:13:39.000000Z", "issued_at": "2020-12-14T02:13:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.566 186 INFO tempest.lib.common.rest_client [req-f97f10c4-e02e-401c-9088-6c6fed162498 ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.075s 2020-12-14 02:13:39.568 186 DEBUG tempest.lib.common.rest_client [req-f97f10c4-e02e-401c-9088-6c6fed162498 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f97f10c4-e02e-401c-9088-6c6fed162498', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["ExoP4O0yR82EgMhsLrz_iQ"], "expires_at": "2020-12-14T03:13:39.000000Z", "issued_at": "2020-12-14T02:13:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.628 193 INFO tempest.lib.common.rest_client [req-4774e1b7-bdac-4994-b500-be1f86f38453 ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:13:39.631 193 DEBUG tempest.lib.common.rest_client [req-4774e1b7-bdac-4994-b500-be1f86f38453 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4774e1b7-bdac-4994-b500-be1f86f38453', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["juf8DjX1S4yA83KRZv7NjQ"], "expires_at": "2020-12-14T03:13:39.000000Z", "issued_at": "2020-12-14T02:13:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.657 189 INFO tempest.lib.common.rest_client [req-5547b113-03c5-4793-afdc-74f64946cb96 ] Request (NovaAvailabilityZoneRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/3421d1d7adcf4817b31dea244d514787 0.148s 2020-12-14 02:13:39.660 189 DEBUG tempest.lib.common.rest_client [req-5547b113-03c5-4793-afdc-74f64946cb96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5547b113-03c5-4793-afdc-74f64946cb96', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/3421d1d7adcf4817b31dea244d514787'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.693 197 INFO tempest.lib.common.rest_client [req-a0d1a4e3-4bae-450b-b6ae-f30bb2904a1b ] Request (FlavorAccessRbacTest:test_add_flavor_access): 200 POST http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a/action 0.221s 2020-12-14 02:13:39.697 197 DEBUG tempest.lib.common.rest_client [req-a0d1a4e3-4bae-450b-b6ae-f30bb2904a1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addTenantAccess": {"tenant": "49bdc2127d1c4edc9a245fc036aeb613"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '123', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a0d1a4e3-4bae-450b-b6ae-f30bb2904a1b', 'x-compute-request-id': 'req-a0d1a4e3-4bae-450b-b6ae-f30bb2904a1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a/action'} Body: b'{"flavor_access": [{"flavor_id": "2f555ff1-ebfb-4103-832a-d0ebe69d8c2a", "tenant_id": "49bdc2127d1c4edc9a245fc036aeb613"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.712 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:39.749 193 INFO tempest.lib.common.rest_client [req-9dfb2ff5-b702-4393-922d-c21994402b7f ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.112s 2020-12-14 02:13:39.751 193 DEBUG tempest.lib.common.rest_client [req-9dfb2ff5-b702-4393-922d-c21994402b7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9dfb2ff5-b702-4393-922d-c21994402b7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.768 189 INFO tempest.lib.common.rest_client [req-10255f61-d8d3-442a-b3bf-1545e14900b9 ] Request (NovaAvailabilityZoneRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:13:39.771 189 DEBUG tempest.lib.common.rest_client [req-10255f61-d8d3-442a-b3bf-1545e14900b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10255f61-d8d3-442a-b3bf-1545e14900b9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["2sLTRxBxRe6hr5JurhHY7w"], "expires_at": "2020-12-14T03:13:39.000000Z", "issued_at": "2020-12-14T02:13:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.777 197 INFO tempest.lib.common.rest_client [req-116d1daf-c9a0-478a-9eb3-0a1e64b563a7 ] Request (FlavorAccessRbacTest:test_add_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles 0.059s 2020-12-14 02:13:39.779 197 DEBUG tempest.lib.common.rest_client [req-116d1daf-c9a0-478a-9eb3-0a1e64b563a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-116d1daf-c9a0-478a-9eb3-0a1e64b563a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.820 193 INFO tempest.lib.common.rest_client [req-874e54ec-9420-4f7a-9697-3165cc7a2008 ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:13:39.823 193 DEBUG tempest.lib.common.rest_client [req-874e54ec-9420-4f7a-9697-3165cc7a2008 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-874e54ec-9420-4f7a-9697-3165cc7a2008', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.827 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:13:39.829 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:39.879 197 INFO tempest.lib.common.rest_client [req-f4a46a10-70ab-4a80-992b-a31cc6acb5cd ] Request (FlavorAccessRbacTest:test_add_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:13:39.882 197 DEBUG tempest.lib.common.rest_client [req-f4a46a10-70ab-4a80-992b-a31cc6acb5cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4a46a10-70ab-4a80-992b-a31cc6acb5cd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "24b5fe7dca6a4c2f853b88640371d171", "name": "tempest-FlavorAccessRbacTest-2125871953", "password_expires_at": null}, "audit_ids": ["9UztManOQnOkw5wsG4X15A"], "expires_at": "2020-12-14T03:13:39.000000Z", "issued_at": "2020-12-14T02:13:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "49bdc2127d1c4edc9a245fc036aeb613", "name": "tempest-FlavorAccessRbacTest-2125871953"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.900 193 INFO tempest.lib.common.rest_client [req-51ae1f01-9611-44af-bdf5-103a26d22605 ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a/users/77e08e1ba559407c89781e0d18298d73/roles 0.065s 2020-12-14 02:13:39.902 193 DEBUG tempest.lib.common.rest_client [req-51ae1f01-9611-44af-bdf5-103a26d22605 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51ae1f01-9611-44af-bdf5-103a26d22605', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a/users/77e08e1ba559407c89781e0d18298d73/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a/users/77e08e1ba559407c89781e0d18298d73/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.938 186 INFO tempest.lib.common.rest_client [req-93d423f1-8a39-408c-b2b8-a9a5c6e472d0 ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates/4553/action 0.362s 2020-12-14 02:13:39.940 186 DEBUG tempest.lib.common.rest_client [req-93d423f1-8a39-408c-b2b8-a9a5c6e472d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"add_host": {"host": "lf-virtual9"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '257', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-93d423f1-8a39-408c-b2b8-a9a5c6e472d0', 'x-compute-request-id': 'req-93d423f1-8a39-408c-b2b8-a9a5c6e472d0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/4553/action'} Body: b'{"aggregate": {"id": 4553, "name": "tempest-AggregatesRbacTest-aggregate-1573340476", "hosts": ["lf-virtual9"], "metadata": {}, "created_at": "2020-12-14T02:13:39.000000", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:39.965 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:39.974 193 INFO tempest.lib.common.rest_client [req-4a5277d5-5210-404f-88bf-dc48c4cc9581 ] Request (LimitsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a/users/77e08e1ba559407c89781e0d18298d73/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-12-14 02:13:39.977 193 DEBUG tempest.lib.common.rest_client [req-4a5277d5-5210-404f-88bf-dc48c4cc9581 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a5277d5-5210-404f-88bf-dc48c4cc9581', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a/users/77e08e1ba559407c89781e0d18298d73/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.073 186 INFO tempest.lib.common.rest_client [req-109509f7-3cee-4f7f-9e69-eeb6d8160fc5 ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.103s 2020-12-14 02:13:40.074 189 INFO tempest.lib.common.rest_client [req-30f56028-4eef-4bec-a03a-09b7970cd769 ] Request (NovaAvailabilityZoneRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5e334204dd7346cca841ef313ff1e1ec&name=default 0.297s 2020-12-14 02:13:40.075 186 DEBUG tempest.lib.common.rest_client [req-109509f7-3cee-4f7f-9e69-eeb6d8160fc5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-109509f7-3cee-4f7f-9e69-eeb6d8160fc5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.077 189 DEBUG tempest.lib.common.rest_client [req-30f56028-4eef-4bec-a03a-09b7970cd769 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-30f56028-4eef-4bec-a03a-09b7970cd769', 'date': 'Mon, 14 Dec 2020 02:13:40 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5e334204dd7346cca841ef313ff1e1ec&name=default'} Body: b'{"security_groups": [{"id": "5e496417-58f3-416f-8f04-a810402e40a1", "name": "default", "stateful": true, "tenant_id": "5e334204dd7346cca841ef313ff1e1ec", "description": "Default security group", "security_group_rules": [{"id": "2b3f8f4b-6908-4686-9670-60186aed8e25", "tenant_id": "5e334204dd7346cca841ef313ff1e1ec", "security_group_id": "5e496417-58f3-416f-8f04-a810402e40a1", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5e496417-58f3-416f-8f04-a810402e40a1", "description": null, "tags": [], "created_at": "2020-12-14T02:13:39Z", "updated_at": "2020-12-14T02:13:39Z", "revision_number": 0, "project_id": "5e334204dd7346cca841ef313ff1e1ec"}, {"id": "33aabd6e-9bd5-4398-a246-7fcb90244f8e", "tenant_id": "5e334204dd7346cca841ef313ff1e1ec", "security_group_id": "5e496417-58f3-416f-8f04-a810402e40a1", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:39Z", "updated_at": "2020-12-14T02:13:39Z", "revision_number": 0, "project_id": "5e334204dd7346cca841ef313ff1e1ec"}, {"id": "d1d30d55-8942-4632-82a6-3a1d89e7ae08", "tenant_id": "5e334204dd7346cca841ef313ff1e1ec", "security_group_id": "5e496417-58f3-416f-8f04-a810402e40a1", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5e496417-58f3-416f-8f04-a810402e40a1", "description": null, "tags": [], "created_at": "2020-12-14T02:13:39Z", "updated_at": "2020-12-14T02:13:39Z", "revision_number": 0, "project_id": "5e334204dd7346cca841ef313ff1e1ec"}, {"id": "e42aeb55-253e-4e20-b634-8f30c52a2a0d", "tenant_id": "5e334204dd7346cca841ef313ff1e1ec", "security_group_id": "5e496417-58f3-416f-8f04-a810402e40a1", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:39Z", "updated_at": "2020-12-14T02:13:39Z", "revision_number": 0, "project_id": "5e334204dd7346cca841ef313ff1e1ec"}], "tags": [], "created_at": "2020-12-14T02:13:39Z", "updated_at": "2020-12-14T02:13:39Z", "revision_number": 1, "project_id": "5e334204dd7346cca841ef313ff1e1ec"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.094 193 INFO tempest.lib.common.rest_client [req-5308cc7f-6b12-41f2-abd3-36f32e44f0ec ] Request (LimitsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a/users/77e08e1ba559407c89781e0d18298d73/roles/a629c95d64b3416fb80ae90af4f69c05 0.109s 2020-12-14 02:13:40.097 193 DEBUG tempest.lib.common.rest_client [req-5308cc7f-6b12-41f2-abd3-36f32e44f0ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5308cc7f-6b12-41f2-abd3-36f32e44f0ec', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a/users/77e08e1ba559407c89781e0d18298d73/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.164 186 INFO tempest.lib.common.rest_client [req-6fb260ed-e2f2-4a7e-8e90-160d1b146708 ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-12-14 02:13:40.168 186 DEBUG tempest.lib.common.rest_client [req-6fb260ed-e2f2-4a7e-8e90-160d1b146708 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6fb260ed-e2f2-4a7e-8e90-160d1b146708', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["zU91CSq7T8W65aVWCfEtCg"], "expires_at": "2020-12-14T03:13:40.000000Z", "issued_at": "2020-12-14T02:13:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.212 189 INFO tempest.lib.common.rest_client [req-87289e23-89a0-493f-b6e9-29f51c90a423 ] Request (NovaAvailabilityZoneRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/5e496417-58f3-416f-8f04-a810402e40a1 0.129s 2020-12-14 02:13:40.215 189 DEBUG tempest.lib.common.rest_client [req-87289e23-89a0-493f-b6e9-29f51c90a423 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-87289e23-89a0-493f-b6e9-29f51c90a423', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:13:40 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5e496417-58f3-416f-8f04-a810402e40a1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.281 197 INFO tempest.lib.common.rest_client [req-b9d31630-a0d9-42c4-8463-38a3488ebbf5 ] Request (FlavorAccessRbacTest:_run_cleanups): 200 POST http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a/action 0.390s 2020-12-14 02:13:40.284 197 DEBUG tempest.lib.common.rest_client [req-b9d31630-a0d9-42c4-8463-38a3488ebbf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeTenantAccess": {"tenant": "49bdc2127d1c4edc9a245fc036aeb613"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '21', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b9d31630-a0d9-42c4-8463-38a3488ebbf5', 'x-compute-request-id': 'req-b9d31630-a0d9-42c4-8463-38a3488ebbf5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a/action'} Body: b'{"flavor_access": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.338 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:40.342 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.345 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.348 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.350 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.354 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.357 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.361 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.364 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.366 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.368 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.371 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.373 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.376 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.378 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.381 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.384 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.386 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.388 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.391 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.393 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.396 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.398 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.401 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.403 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.405 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.406 189 INFO tempest.lib.common.rest_client [req-c96e2f6c-9c26-4e75-a18c-6271724d241e ] Request (NovaAvailabilityZoneRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec 0.184s 2020-12-14 02:13:40.408 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.409 189 DEBUG tempest.lib.common.rest_client [req-c96e2f6c-9c26-4e75-a18c-6271724d241e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c96e2f6c-9c26-4e75-a18c-6271724d241e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5e334204dd7346cca841ef313ff1e1ec'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.410 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.412 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.414 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.417 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.419 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.421 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.423 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.425 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.428 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.430 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.432 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.435 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.438 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.440 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.443 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.445 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.447 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.450 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.453 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.455 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.457 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.459 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.462 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.464 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.466 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.469 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.471 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.473 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.476 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.478 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.483 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.485 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.488 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.490 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.492 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.495 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.497 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.499 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.502 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.504 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.507 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.509 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.512 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.514 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.516 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.521 189 INFO tempest.lib.common.rest_client [req-141b8e72-7c4d-4b62-810a-0f08934a68b6 ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:13:40.525 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-access, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:40.524 189 DEBUG tempest.lib.common.rest_client [req-141b8e72-7c4d-4b62-810a-0f08934a68b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-141b8e72-7c4d-4b62-810a-0f08934a68b6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["iPBgiNhDTeeV9gcWoKVB0Q"], "expires_at": "2020-12-14T03:13:40.000000Z", "issued_at": "2020-12-14T02:13:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.623 189 INFO tempest.lib.common.rest_client [req-2c6676cc-eb29-4663-978a-0c04601ee96c ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:13:40.625 189 DEBUG tempest.lib.common.rest_client [req-2c6676cc-eb29-4663-978a-0c04601ee96c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2c6676cc-eb29-4663-978a-0c04601ee96c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["BMyzSOpSRs-_sMN6Xhx9Mg"], "expires_at": "2020-12-14T03:13:40.000000Z", "issued_at": "2020-12-14T02:13:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.679 186 INFO tempest.lib.common.rest_client [req-46a83771-cdc3-43b6-8c3c-8ff005d0b279 ] Request (AggregatesRbacTest:_run_cleanups): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates/4553/action 0.499s 2020-12-14 02:13:40.682 186 DEBUG tempest.lib.common.rest_client [req-46a83771-cdc3-43b6-8c3c-8ff005d0b279 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"remove_host": {"host": "lf-virtual9"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '244', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-46a83771-cdc3-43b6-8c3c-8ff005d0b279', 'x-compute-request-id': 'req-46a83771-cdc3-43b6-8c3c-8ff005d0b279', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/4553/action'} Body: b'{"aggregate": {"id": 4553, "name": "tempest-AggregatesRbacTest-aggregate-1573340476", "hosts": [], "metadata": {}, "created_at": "2020-12-14T02:13:39.000000", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.708 189 INFO tempest.lib.common.rest_client [req-053cd80f-580e-4aeb-8a0f-5b2303a2cc9b ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.074s 2020-12-14 02:13:40.711 197 INFO tempest.lib.common.rest_client [req-2e71eeec-e97e-4cce-adb2-07f4c005087e ] Request (FlavorAccessRbacTest:test_list_flavor_access): 200 POST http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a/action 0.181s 2020-12-14 02:13:40.711 189 DEBUG tempest.lib.common.rest_client [req-053cd80f-580e-4aeb-8a0f-5b2303a2cc9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-053cd80f-580e-4aeb-8a0f-5b2303a2cc9b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.713 197 DEBUG tempest.lib.common.rest_client [req-2e71eeec-e97e-4cce-adb2-07f4c005087e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addTenantAccess": {"tenant": "49bdc2127d1c4edc9a245fc036aeb613"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '123', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2e71eeec-e97e-4cce-adb2-07f4c005087e', 'x-compute-request-id': 'req-2e71eeec-e97e-4cce-adb2-07f4c005087e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a/action'} Body: b'{"flavor_access": [{"flavor_id": "2f555ff1-ebfb-4103-832a-d0ebe69d8c2a", "tenant_id": "49bdc2127d1c4edc9a245fc036aeb613"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.726 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:40.777 186 INFO tempest.lib.common.rest_client [req-b7a9c3c8-a271-468f-9d67-5130c014643f ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/4553 0.062s 2020-12-14 02:13:40.780 186 DEBUG tempest.lib.common.rest_client [req-b7a9c3c8-a271-468f-9d67-5130c014643f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b7a9c3c8-a271-468f-9d67-5130c014643f', 'x-compute-request-id': 'req-b7a9c3c8-a271-468f-9d67-5130c014643f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/4553'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.802 197 INFO tempest.lib.common.rest_client [req-2b269a2e-e492-4fa6-83cc-c8c4e2f3b184 ] Request (FlavorAccessRbacTest:test_list_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles 0.070s 2020-12-14 02:13:40.803 189 INFO tempest.lib.common.rest_client [req-f97a0ce5-ca84-4654-8ddd-7fd85291fb28 ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.084s 2020-12-14 02:13:40.805 197 DEBUG tempest.lib.common.rest_client [req-2b269a2e-e492-4fa6-83cc-c8c4e2f3b184 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b269a2e-e492-4fa6-83cc-c8c4e2f3b184', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.805 189 DEBUG tempest.lib.common.rest_client [req-f97a0ce5-ca84-4654-8ddd-7fd85291fb28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FloatingIpPoolsRbacTest-1730574798-desc", "domain_id": "default", "name": "tempest-FloatingIpPoolsRbacTest-1730574798"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f97a0ce5-ca84-4654-8ddd-7fd85291fb28', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "a7e56b1cdd0743e3b2bb8bdf1bad6742", "name": "tempest-FloatingIpPoolsRbacTest-1730574798", "domain_id": "default", "description": "tempest-FloatingIpPoolsRbacTest-1730574798-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.825 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:40.831 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.836 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.841 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.846 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.852 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.858 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.866 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.869 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.871 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.874 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.877 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.880 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.883 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.887 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.890 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.893 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.896 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.899 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.902 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.905 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.906 197 INFO tempest.lib.common.rest_client [req-b9073abb-31d5-4128-85a6-135af07382e3 ] Request (FlavorAccessRbacTest:test_list_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:13:40.907 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.909 197 DEBUG tempest.lib.common.rest_client [req-b9073abb-31d5-4128-85a6-135af07382e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9073abb-31d5-4128-85a6-135af07382e3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "24b5fe7dca6a4c2f853b88640371d171", "name": "tempest-FlavorAccessRbacTest-2125871953", "password_expires_at": null}, "audit_ids": ["PD3QJ8DkQkys1rZfIAE4NA"], "expires_at": "2020-12-14T03:13:40.000000Z", "issued_at": "2020-12-14T02:13:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "49bdc2127d1c4edc9a245fc036aeb613", "name": "tempest-FlavorAccessRbacTest-2125871953"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.910 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.913 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.915 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.918 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.921 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.924 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.926 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.929 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.932 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.934 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.937 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.940 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.943 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.945 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.948 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.948 189 INFO tempest.lib.common.rest_client [req-e874be90-3345-4219-99da-22f2a72ce2ce ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.135s 2020-12-14 02:13:40.950 189 DEBUG tempest.lib.common.rest_client [req-e874be90-3345-4219-99da-22f2a72ce2ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FloatingIpPoolsRbacTest-1730574798", "password": "H1#nk3p2GB58kv4", "project_id": "a7e56b1cdd0743e3b2bb8bdf1bad6742", "email": "tempest-FloatingIpPoolsRbacTest-974162122@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '401', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e874be90-3345-4219-99da-22f2a72ce2ce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "a7e56b1cdd0743e3b2bb8bdf1bad6742", "email": "tempest-FloatingIpPoolsRbacTest-974162122@example.com", "id": "717397e237b94746a1ddc062fca02eaa", "name": "tempest-FloatingIpPoolsRbacTest-1730574798", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/717397e237b94746a1ddc062fca02eaa"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:40.951 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.954 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.957 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.960 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.963 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.966 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.968 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.972 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.975 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.977 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.980 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.983 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.986 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.988 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.991 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.994 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.997 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:40.999 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.003 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.006 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.012 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.015 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.017 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.019 189 INFO tempest.lib.common.rest_client [req-c9ae23bd-d390-4788-b75d-1f3046b557a8 ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:13:41.021 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.023 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.023 189 DEBUG tempest.lib.common.rest_client [req-c9ae23bd-d390-4788-b75d-1f3046b557a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9ae23bd-d390-4788-b75d-1f3046b557a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.026 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.029 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.032 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.034 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.037 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.040 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.043 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.045 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.048 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.051 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.060 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:create, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:41.062 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:41.096 189 INFO tempest.lib.common.rest_client [req-5090341d-dce6-4aa6-bea6-2681935c355b ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-12-14 02:13:41.098 189 DEBUG tempest.lib.common.rest_client [req-5090341d-dce6-4aa6-bea6-2681935c355b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5090341d-dce6-4aa6-bea6-2681935c355b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.137 197 INFO tempest.lib.common.rest_client [req-dd6d2212-e0c4-4e49-98b7-7c3aa1e5e46d ] Request (FlavorAccessRbacTest:test_list_flavor_access): 200 GET http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a/os-flavor-access 0.222s 2020-12-14 02:13:41.140 197 DEBUG tempest.lib.common.rest_client [req-dd6d2212-e0c4-4e49-98b7-7c3aa1e5e46d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '123', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dd6d2212-e0c4-4e49-98b7-7c3aa1e5e46d', 'x-compute-request-id': 'req-dd6d2212-e0c4-4e49-98b7-7c3aa1e5e46d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a/os-flavor-access'} Body: b'{"flavor_access": [{"flavor_id": "2f555ff1-ebfb-4103-832a-d0ebe69d8c2a", "tenant_id": "49bdc2127d1c4edc9a245fc036aeb613"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.152 186 INFO tempest.lib.common.rest_client [req-31c2a94d-151e-4706-b1a2-e34c37590845 ] Request (AggregatesRbacTest:test_create_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.083s 2020-12-14 02:13:41.155 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:41.155 186 DEBUG tempest.lib.common.rest_client [req-31c2a94d-151e-4706-b1a2-e34c37590845 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31c2a94d-151e-4706-b1a2-e34c37590845', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.193 189 INFO tempest.lib.common.rest_client [req-2d9ab266-4d22-40f3-801b-255c689b62a0 ] Request (FloatingIpPoolsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742/users/717397e237b94746a1ddc062fca02eaa/roles/72a4576c553448cd941b052c1ca0cf2d 0.087s 2020-12-14 02:13:41.196 189 DEBUG tempest.lib.common.rest_client [req-2d9ab266-4d22-40f3-801b-255c689b62a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2d9ab266-4d22-40f3-801b-255c689b62a0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742/users/717397e237b94746a1ddc062fca02eaa/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.199 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FloatingIpPoolsRbacTest-1730574798', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a7e56b1cdd0743e3b2bb8bdf1bad6742', 'project_name': 'tempest-FloatingIpPoolsRbacTest-1730574798', 'tenant_id': 'a7e56b1cdd0743e3b2bb8bdf1bad6742', 'tenant_name': 'tempest-FloatingIpPoolsRbacTest-1730574798', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '717397e237b94746a1ddc062fca02eaa'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:41.203 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FloatingIpPoolsRbacTest-1730574798', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a7e56b1cdd0743e3b2bb8bdf1bad6742', 'project_name': 'tempest-FloatingIpPoolsRbacTest-1730574798', 'tenant_id': 'a7e56b1cdd0743e3b2bb8bdf1bad6742', 'tenant_name': 'tempest-FloatingIpPoolsRbacTest-1730574798', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '717397e237b94746a1ddc062fca02eaa'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:41.210 193 INFO tempest.lib.common.rest_client [req-fa93304b-9abc-4a14-8f36-0ba5a82bfcbb ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:13:41.214 193 DEBUG tempest.lib.common.rest_client [req-fa93304b-9abc-4a14-8f36-0ba5a82bfcbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa93304b-9abc-4a14-8f36-0ba5a82bfcbb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "77e08e1ba559407c89781e0d18298d73", "name": "tempest-LimitsRbacTest-1627406510", "password_expires_at": null}, "audit_ids": ["DYGSceLJTzWbYPke1vsRIw"], "expires_at": "2020-12-14T03:13:41.000000Z", "issued_at": "2020-12-14T02:13:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37087e8b0dbd44e4a6ca42e1b247635a", "name": "tempest-LimitsRbacTest-1627406510"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.233 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:41.262 186 INFO tempest.lib.common.rest_client [req-1dd35d19-1ee2-4925-b6f5-730ce46b115b ] Request (AggregatesRbacTest:test_create_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:13:41.266 186 DEBUG tempest.lib.common.rest_client [req-1dd35d19-1ee2-4925-b6f5-730ce46b115b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1dd35d19-1ee2-4925-b6f5-730ce46b115b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["wgSq3OWKSDivX1Od5Wss2Q"], "expires_at": "2020-12-14T03:13:41.000000Z", "issued_at": "2020-12-14T02:13:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.272 197 INFO tempest.lib.common.rest_client [req-6dd5c62a-fa6f-497e-9db5-f9f95951136c ] Request (FlavorAccessRbacTest:test_list_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles 0.111s 2020-12-14 02:13:41.276 197 DEBUG tempest.lib.common.rest_client [req-6dd5c62a-fa6f-497e-9db5-f9f95951136c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6dd5c62a-fa6f-497e-9db5-f9f95951136c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.301 193 INFO tempest.lib.common.rest_client [req-6529d672-b1c2-464b-b2cc-6c7fa6eaf1ba ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-12-14 02:13:41.305 193 DEBUG tempest.lib.common.rest_client [req-6529d672-b1c2-464b-b2cc-6c7fa6eaf1ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6529d672-b1c2-464b-b2cc-6c7fa6eaf1ba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["oS2UeJc0REuis6myOtEFyg"], "expires_at": "2020-12-14T03:13:41.000000Z", "issued_at": "2020-12-14T02:13:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.397 189 INFO tempest.lib.common.rest_client [req-c93eaaf2-8604-40dd-a4c1-5688925543ae ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.124s 2020-12-14 02:13:41.400 189 DEBUG tempest.lib.common.rest_client [req-c93eaaf2-8604-40dd-a4c1-5688925543ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c93eaaf2-8604-40dd-a4c1-5688925543ae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "717397e237b94746a1ddc062fca02eaa", "name": "tempest-FloatingIpPoolsRbacTest-1730574798", "password_expires_at": null}, "audit_ids": ["XmfINT6kTgWkwMUsOgnhqg"], "expires_at": "2020-12-14T03:13:41.000000Z", "issued_at": "2020-12-14T02:13:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a7e56b1cdd0743e3b2bb8bdf1bad6742", "name": "tempest-FloatingIpPoolsRbacTest-1730574798"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.407 197 INFO tempest.lib.common.rest_client [req-3cb68abf-59a6-4482-81a0-65b52825d009 ] Request (FlavorAccessRbacTest:test_list_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.125s 2020-12-14 02:13:41.410 197 DEBUG tempest.lib.common.rest_client [req-3cb68abf-59a6-4482-81a0-65b52825d009 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3cb68abf-59a6-4482-81a0-65b52825d009', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "24b5fe7dca6a4c2f853b88640371d171", "name": "tempest-FlavorAccessRbacTest-2125871953", "password_expires_at": null}, "audit_ids": ["UArXdToRTRiIPhtXJOhPAQ"], "expires_at": "2020-12-14T03:13:41.000000Z", "issued_at": "2020-12-14T02:13:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "49bdc2127d1c4edc9a245fc036aeb613", "name": "tempest-FlavorAccessRbacTest-2125871953"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.459 186 INFO tempest.lib.common.rest_client [req-e3acf371-90e9-43fe-9893-d045a7cb2cd9 ] Request (AggregatesRbacTest:test_create_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.184s 2020-12-14 02:13:41.463 186 DEBUG tempest.lib.common.rest_client [req-e3acf371-90e9-43fe-9893-d045a7cb2cd9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-549831596"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '214', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e3acf371-90e9-43fe-9893-d045a7cb2cd9', 'x-compute-request-id': 'req-e3acf371-90e9-43fe-9893-d045a7cb2cd9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 4554, "name": "tempest-AggregatesRbacTest-aggregate-549831596", "created_at": "2020-12-14T02:13:41.430009", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.463 189 INFO tempest.lib.common.rest_client [req-4d285126-2053-4d44-81f3-5d626f8f5cd9 ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:13:41.466 189 DEBUG tempest.lib.common.rest_client [req-4d285126-2053-4d44-81f3-5d626f8f5cd9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d285126-2053-4d44-81f3-5d626f8f5cd9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["E9iepuAUTsmbELTpSUJbAg"], "expires_at": "2020-12-14T03:13:41.000000Z", "issued_at": "2020-12-14T02:13:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.489 193 INFO tempest.lib.common.rest_client [req-56ee6a13-2d73-4039-9f20-10fab739566f ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.061s 2020-12-14 02:13:41.491 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:41.492 193 DEBUG tempest.lib.common.rest_client [req-56ee6a13-2d73-4039-9f20-10fab739566f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56ee6a13-2d73-4039-9f20-10fab739566f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["DFdVMIfZQbGWHgbqDjMZ5Q"], "expires_at": "2020-12-14T03:13:41.000000Z", "issued_at": "2020-12-14T02:13:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.567 193 INFO tempest.lib.common.rest_client [req-68bca077-e9a4-489c-87dd-717429400164 ] Request (main): 200 GET http://172.30.13.94/identity/v3/services 0.064s 2020-12-14 02:13:41.568 186 INFO tempest.lib.common.rest_client [req-7299b217-2e70-4842-82b8-a934e8d96766 ] Request (AggregatesRbacTest:test_create_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.069s 2020-12-14 02:13:41.571 193 DEBUG tempest.lib.common.rest_client [req-68bca077-e9a4-489c-87dd-717429400164 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '3880', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68bca077-e9a4-489c-87dd-717429400164', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/services'} Body: b'{"services": [{"name": "heat", "description": "Heat Orchestration Service", "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/2dd99a84fcfe4d4c902af3c7e3370547"}}, {"name": "cinderv3", "description": "Cinder Volume Service V3", "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/4f0aec6b5f2347eeaf7987d5e52c15ee"}}, {"name": "heat-cfn", "description": "Heat CloudFormation Service", "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5635f75247b445dd8c099f6dae4391e9"}}, {"name": "neutron", "description": "Neutron Service", "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5b112e1f9f554e9ea13076091373ba24"}}, {"name": "placement", "description": "Placement Service", "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/7e47b727207a4e4e806b20fab1e17997"}}, {"name": "nova_legacy", "description": "Nova Compute Service (Legacy 2.0)", "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/8f2830f7e6d24fe0b8bf0b4df9612609"}}, {"name": "swift", "description": "Swift Service", "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/943b628f9f61458d9ef457915c0a4842"}}, {"name": "keystone", "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a2db5aab3c1d485cbf6ccd92ea7a2995"}}, {"name": "aodh", "description": "OpenStack Alarming Service", "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a372e5d5aaed47178d6bd28e25c4ed16"}}, {"name": "glance", "description": "Glance Image Service", "id": "b28a3fc2818546fd87c2e4c7f28b1ee2", "type": "image", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b28a3fc2818546fd87c2e4c7f28b1ee2"}}, {"name": "cinder", "description": "Cinder Volume Service", "id": "b29b4d43197d4c0b829c6cf8d8b39bf0", "type": "block-storage", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b29b4d43197d4c0b829c6cf8d8b39bf0"}}, {"name": "cinderv2", "description": "Cinder Volume Service V2", "id": "db8f8625cffe4b818eb0c765296f5282", "type": "volumev2", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/db8f8625cffe4b818eb0c765296f5282"}}, {"name": "gnocchi", "description": "OpenStack Metric Service", "id": "de459e19dc284669a50e9c8274d0ec7f", "type": "metric", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/de459e19dc284669a50e9c8274d0ec7f"}}, {"name": "barbican", "description": "Barbican Service", "id": "ee548e94135646b6a64be1daf30191d1", "type": "key-manager", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/ee548e94135646b6a64be1daf30191d1"}}, {"name": "nova", "description": "Nova Compute Service", "id": "f4181cc470594a9e82e091cd6ff52ad7", "type": "compute", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f4181cc470594a9e82e091cd6ff52ad7"}}, {"name": "panko", "description": "OpenStack Telemetry Service", "id": "f9b2abba6c934357b57aaf5757557344", "type": "event", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f9b2abba6c934357b57aaf5757557344"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/services", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.572 186 DEBUG tempest.lib.common.rest_client [req-7299b217-2e70-4842-82b8-a934e8d96766 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7299b217-2e70-4842-82b8-a934e8d96766', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.588 189 INFO tempest.lib.common.rest_client [req-986fad3d-0cd0-4828-9c58-6b23aa1a31ba ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-12-14 02:13:41.591 189 DEBUG tempest.lib.common.rest_client [req-986fad3d-0cd0-4828-9c58-6b23aa1a31ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-986fad3d-0cd0-4828-9c58-6b23aa1a31ba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Fjs7xDxpSU-fh6V3ecszbw"], "expires_at": "2020-12-14T03:13:41.000000Z", "issued_at": "2020-12-14T02:13:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.625 197 INFO tempest.lib.common.rest_client [req-d85ed908-3a2e-4ae6-8aa9-6179db754fd2 ] Request (FlavorAccessRbacTest:_run_cleanups): 200 POST http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a/action 0.204s 2020-12-14 02:13:41.628 197 DEBUG tempest.lib.common.rest_client [req-d85ed908-3a2e-4ae6-8aa9-6179db754fd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeTenantAccess": {"tenant": "49bdc2127d1c4edc9a245fc036aeb613"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '21', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d85ed908-3a2e-4ae6-8aa9-6179db754fd2', 'x-compute-request-id': 'req-d85ed908-3a2e-4ae6-8aa9-6179db754fd2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a/action'} Body: b'{"flavor_access": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.627 186 INFO tempest.lib.common.rest_client [req-bba49f8e-a999-467d-a08f-f6feeb816f84 ] Request (AggregatesRbacTest:test_create_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:13:41.632 186 DEBUG tempest.lib.common.rest_client [req-bba49f8e-a999-467d-a08f-f6feeb816f84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bba49f8e-a999-467d-a08f-f6feeb816f84', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["AGtpsorBT-yKlwmB8i-WOw"], "expires_at": "2020-12-14T03:13:41.000000Z", "issued_at": "2020-12-14T02:13:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.663 189 INFO tempest.lib.common.rest_client [req-39967e3a-d8ea-4294-afa2-5130e734d8f5 ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.066s 2020-12-14 02:13:41.665 189 DEBUG tempest.lib.common.rest_client [req-39967e3a-d8ea-4294-afa2-5130e734d8f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39967e3a-d8ea-4294-afa2-5130e734d8f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.669 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:41.674 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.677 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.681 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.684 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.688 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.692 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.697 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.700 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.703 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.705 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.708 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.711 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.714 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.717 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.720 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.724 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.727 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.730 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.733 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.736 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.738 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.741 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.741 189 INFO tempest.lib.common.rest_client [req-456ee291-3c41-4707-baf0-cadbac9c0dc4 ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.068s 2020-12-14 02:13:41.744 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.745 189 DEBUG tempest.lib.common.rest_client [req-456ee291-3c41-4707-baf0-cadbac9c0dc4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-456ee291-3c41-4707-baf0-cadbac9c0dc4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.747 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.750 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.750 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:13:41.753 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.753 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:41.756 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.758 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.761 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.764 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.767 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.770 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.772 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.775 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.778 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.781 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.784 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.787 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.790 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.794 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.793 186 INFO tempest.lib.common.rest_client [req-11655777-a278-4d41-a303-99bd3addf65a ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/4554 0.151s 2020-12-14 02:13:41.796 186 DEBUG tempest.lib.common.rest_client [req-11655777-a278-4d41-a303-99bd3addf65a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-11655777-a278-4d41-a303-99bd3addf65a', 'x-compute-request-id': 'req-11655777-a278-4d41-a303-99bd3addf65a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/4554'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.796 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.799 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.802 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.806 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.808 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.811 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.814 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.816 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.818 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.821 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.821 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:41.823 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.825 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.826 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.828 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.828 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.831 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.832 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.835 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.835 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.837 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.837 189 INFO tempest.lib.common.rest_client [req-1acea69d-10e6-4268-9559-d2811f1be0c5 ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742/users/717397e237b94746a1ddc062fca02eaa/roles 0.076s 2020-12-14 02:13:41.839 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.839 189 DEBUG tempest.lib.common.rest_client [req-1acea69d-10e6-4268-9559-d2811f1be0c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1acea69d-10e6-4268-9559-d2811f1be0c5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742/users/717397e237b94746a1ddc062fca02eaa/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742/users/717397e237b94746a1ddc062fca02eaa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.842 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.843 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.845 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.847 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.848 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.850 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.850 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.852 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.853 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.855 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.856 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.857 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.859 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.860 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.862 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.862 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.864 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.865 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.867 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.867 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.869 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.869 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.870 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.872 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.872 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.874 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.874 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.875 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.877 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.877 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.878 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.880 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.881 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.882 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.884 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-access:remove_tenant_access, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:41.885 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.885 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.888 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.889 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.891 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.891 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.893 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.894 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.896 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.896 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.898 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.899 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.901 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.902 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.903 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.904 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.906 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.907 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.909 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.910 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.913 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.914 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.915 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.918 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.918 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.921 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.922 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.924 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.926 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.927 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.928 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.930 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.930 189 INFO tempest.lib.common.rest_client [req-695b08ae-d81c-4c1f-85f3-0638dc638d6f ] Request (FloatingIpPoolsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742/users/717397e237b94746a1ddc062fca02eaa/roles/72a4576c553448cd941b052c1ca0cf2d 0.085s 2020-12-14 02:13:41.931 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.933 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.933 189 DEBUG tempest.lib.common.rest_client [req-695b08ae-d81c-4c1f-85f3-0638dc638d6f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-695b08ae-d81c-4c1f-85f3-0638dc638d6f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742/users/717397e237b94746a1ddc062fca02eaa/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:41.933 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.936 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.935 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.938 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.939 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.940 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.942 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.943 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.945 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.945 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.947 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.948 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.950 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.951 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.952 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.954 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.954 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.956 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.957 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.958 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.960 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.961 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.963 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.963 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.965 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.965 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.968 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.968 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.970 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.971 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.973 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.974 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.976 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.976 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.978 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.979 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.980 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.982 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.983 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.986 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.986 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.988 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.988 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.990 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.992 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.994 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.995 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.997 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:41.997 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.000 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.000 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.002 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.003 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.004 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.006 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.007 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.009 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.009 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.011 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.012 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.014 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.014 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.017 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.019 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.020 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.021 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.022 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.024 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.025 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.027 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.028 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.029 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.031 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.031 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.033 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.034 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.036 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.038 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.041 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.042 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:42.043 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.046 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.048 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.050 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.053 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.056 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:limits, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:42.058 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:42.062 189 INFO tempest.lib.common.rest_client [req-68ebeba5-1784-45bb-b1b2-4518c658a21d ] Request (FloatingIpPoolsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742/users/717397e237b94746a1ddc062fca02eaa/roles/a629c95d64b3416fb80ae90af4f69c05 0.122s 2020-12-14 02:13:42.065 189 DEBUG tempest.lib.common.rest_client [req-68ebeba5-1784-45bb-b1b2-4518c658a21d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68ebeba5-1784-45bb-b1b2-4518c658a21d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742/users/717397e237b94746a1ddc062fca02eaa/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.073 197 INFO tempest.lib.common.rest_client [req-793ee950-f55a-4ea7-9ec9-11eba99e4737 ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 200 POST http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a/action 0.183s 2020-12-14 02:13:42.076 197 DEBUG tempest.lib.common.rest_client [req-793ee950-f55a-4ea7-9ec9-11eba99e4737 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addTenantAccess": {"tenant": "49bdc2127d1c4edc9a245fc036aeb613"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '123', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-793ee950-f55a-4ea7-9ec9-11eba99e4737', 'x-compute-request-id': 'req-793ee950-f55a-4ea7-9ec9-11eba99e4737', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a/action'} Body: b'{"flavor_access": [{"flavor_id": "2f555ff1-ebfb-4103-832a-d0ebe69d8c2a", "tenant_id": "49bdc2127d1c4edc9a245fc036aeb613"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.090 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:42.099 186 INFO tempest.lib.common.rest_client [req-83481e56-b782-4101-a8c4-b076d02ac7ce ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.050s 2020-12-14 02:13:42.102 186 DEBUG tempest.lib.common.rest_client [req-83481e56-b782-4101-a8c4-b076d02ac7ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-1668143815"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '215', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-83481e56-b782-4101-a8c4-b076d02ac7ce', 'x-compute-request-id': 'req-83481e56-b782-4101-a8c4-b076d02ac7ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 4555, "name": "tempest-AggregatesRbacTest-aggregate-1668143815", "created_at": "2020-12-14T02:13:42.076831", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.132 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:42.195 193 INFO tempest.lib.common.rest_client [req-51f65695-cde0-4f55-b447-1fb96d2e0a58 ] Request (LimitsRbacTest:test_show_limits): 200 GET http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a/users/77e08e1ba559407c89781e0d18298d73/roles 0.132s 2020-12-14 02:13:42.198 193 DEBUG tempest.lib.common.rest_client [req-51f65695-cde0-4f55-b447-1fb96d2e0a58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51f65695-cde0-4f55-b447-1fb96d2e0a58', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a/users/77e08e1ba559407c89781e0d18298d73/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a/users/77e08e1ba559407c89781e0d18298d73/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.206 197 INFO tempest.lib.common.rest_client [req-78dfa962-0b22-428e-bd11-70e84af04e49 ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles 0.111s 2020-12-14 02:13:42.209 197 DEBUG tempest.lib.common.rest_client [req-78dfa962-0b22-428e-bd11-70e84af04e49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78dfa962-0b22-428e-bd11-70e84af04e49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.214 186 INFO tempest.lib.common.rest_client [req-56536c94-7ad6-4b36-80ba-b54e32ffb8b6 ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.075s 2020-12-14 02:13:42.218 186 DEBUG tempest.lib.common.rest_client [req-56536c94-7ad6-4b36-80ba-b54e32ffb8b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56536c94-7ad6-4b36-80ba-b54e32ffb8b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.304 193 INFO tempest.lib.common.rest_client [req-dfd21517-7424-44a9-be50-825c8caf2c54 ] Request (LimitsRbacTest:test_show_limits): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:13:42.307 193 DEBUG tempest.lib.common.rest_client [req-dfd21517-7424-44a9-be50-825c8caf2c54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dfd21517-7424-44a9-be50-825c8caf2c54', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "77e08e1ba559407c89781e0d18298d73", "name": "tempest-LimitsRbacTest-1627406510", "password_expires_at": null}, "audit_ids": ["g1eYb5vBTLmiXyYg3M4Lcg"], "expires_at": "2020-12-14T03:13:42.000000Z", "issued_at": "2020-12-14T02:13:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37087e8b0dbd44e4a6ca42e1b247635a", "name": "tempest-LimitsRbacTest-1627406510"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.319 197 INFO tempest.lib.common.rest_client [req-bc6196bb-d554-48e2-8fbd-4a004e0f786f ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:13:42.324 197 DEBUG tempest.lib.common.rest_client [req-bc6196bb-d554-48e2-8fbd-4a004e0f786f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc6196bb-d554-48e2-8fbd-4a004e0f786f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "24b5fe7dca6a4c2f853b88640371d171", "name": "tempest-FlavorAccessRbacTest-2125871953", "password_expires_at": null}, "audit_ids": ["d-9pPpw7RJqlT5uOBmqFoQ"], "expires_at": "2020-12-14T03:13:42.000000Z", "issued_at": "2020-12-14T02:13:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "49bdc2127d1c4edc9a245fc036aeb613", "name": "tempest-FlavorAccessRbacTest-2125871953"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.324 186 INFO tempest.lib.common.rest_client [req-bb5a1bcd-a273-4fca-81f4-772dea0fd0fe ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:13:42.327 186 DEBUG tempest.lib.common.rest_client [req-bb5a1bcd-a273-4fca-81f4-772dea0fd0fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb5a1bcd-a273-4fca-81f4-772dea0fd0fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["2gR5N70HTKylc8W7sHheiQ"], "expires_at": "2020-12-14T03:13:42.000000Z", "issued_at": "2020-12-14T02:13:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.488 193 INFO tempest.lib.common.rest_client [req-f677d3c5-8528-4e1d-9699-a2e2009c962e ] Request (LimitsRbacTest:test_show_limits): 200 GET http://172.30.13.94/compute/v2.1/limits 0.174s 2020-12-14 02:13:42.491 193 DEBUG tempest.lib.common.rest_client [req-f677d3c5-8528-4e1d-9699-a2e2009c962e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '511', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f677d3c5-8528-4e1d-9699-a2e2009c962e', 'x-compute-request-id': 'req-f677d3c5-8528-4e1d-9699-a2e2009c962e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/limits'} Body: b'{"limits": {"rate": [], "absolute": {"maxTotalInstances": 10, "maxTotalCores": 20, "maxTotalRAMSize": 51200, "maxServerMeta": 128, "maxImageMeta": 128, "maxPersonality": 5, "maxPersonalitySize": 10240, "maxTotalKeypairs": 100, "maxServerGroups": 10, "maxServerGroupMembers": 10, "maxTotalFloatingIps": -1, "maxSecurityGroups": -1, "maxSecurityGroupRules": -1, "totalRAMUsed": 0, "totalCoresUsed": 0, "totalInstancesUsed": 0, "totalFloatingIpsUsed": 0, "totalSecurityGroupsUsed": 0, "totalServerGroupsUsed": 0}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.512 186 INFO tempest.lib.common.rest_client [req-9febe11f-90ef-41f2-be29-bd80c0047976 ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/4555 0.178s 2020-12-14 02:13:42.515 186 DEBUG tempest.lib.common.rest_client [req-9febe11f-90ef-41f2-be29-bd80c0047976 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9febe11f-90ef-41f2-be29-bd80c0047976', 'x-compute-request-id': 'req-9febe11f-90ef-41f2-be29-bd80c0047976', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/4555'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.517 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:42.541 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:42.579 197 INFO tempest.lib.common.rest_client [req-6dc49ae0-3b77-40dc-91d5-0bbdda3dcf04 ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 200 POST http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a/action 0.248s 2020-12-14 02:13:42.581 197 DEBUG tempest.lib.common.rest_client [req-6dc49ae0-3b77-40dc-91d5-0bbdda3dcf04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeTenantAccess": {"tenant": "49bdc2127d1c4edc9a245fc036aeb613"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '21', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6dc49ae0-3b77-40dc-91d5-0bbdda3dcf04', 'x-compute-request-id': 'req-6dc49ae0-3b77-40dc-91d5-0bbdda3dcf04', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a/action'} Body: b'{"flavor_access": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.594 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:42.594 186 INFO tempest.lib.common.rest_client [req-8d328e1c-bbb3-47d0-a0e5-e468b1f15089 ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.070s 2020-12-14 02:13:42.598 186 DEBUG tempest.lib.common.rest_client [req-8d328e1c-bbb3-47d0-a0e5-e468b1f15089 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8d328e1c-bbb3-47d0-a0e5-e468b1f15089', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.620 193 INFO tempest.lib.common.rest_client [req-a2def39f-5387-4f5d-8291-36f55ec215f3 ] Request (LimitsRbacTest:test_show_limits): 200 GET http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a/users/77e08e1ba559407c89781e0d18298d73/roles 0.072s 2020-12-14 02:13:42.623 193 DEBUG tempest.lib.common.rest_client [req-a2def39f-5387-4f5d-8291-36f55ec215f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2def39f-5387-4f5d-8291-36f55ec215f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a/users/77e08e1ba559407c89781e0d18298d73/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a/users/77e08e1ba559407c89781e0d18298d73/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.655 186 INFO tempest.lib.common.rest_client [req-cf1985e7-5804-4b5b-be90-89ef829f998c ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:13:42.658 186 DEBUG tempest.lib.common.rest_client [req-cf1985e7-5804-4b5b-be90-89ef829f998c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf1985e7-5804-4b5b-be90-89ef829f998c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["Oe0eoqJRTV27Mwl7hCglig"], "expires_at": "2020-12-14T03:13:42.000000Z", "issued_at": "2020-12-14T02:13:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.671 197 INFO tempest.lib.common.rest_client [req-ffb63dd5-4cf8-4e8d-91df-3385d8f267a2 ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles 0.073s 2020-12-14 02:13:42.674 197 DEBUG tempest.lib.common.rest_client [req-ffb63dd5-4cf8-4e8d-91df-3385d8f267a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ffb63dd5-4cf8-4e8d-91df-3385d8f267a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613/users/24b5fe7dca6a4c2f853b88640371d171/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.680 193 INFO tempest.lib.common.rest_client [req-a0d66a0f-4b41-401c-bbde-256bb2106cf0 ] Request (LimitsRbacTest:test_show_limits): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:13:42.683 193 DEBUG tempest.lib.common.rest_client [req-a0d66a0f-4b41-401c-bbde-256bb2106cf0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0d66a0f-4b41-401c-bbde-256bb2106cf0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "77e08e1ba559407c89781e0d18298d73", "name": "tempest-LimitsRbacTest-1627406510", "password_expires_at": null}, "audit_ids": ["tDSj7HllR_eZI77e3eCm4w"], "expires_at": "2020-12-14T03:13:42.000000Z", "issued_at": "2020-12-14T02:13:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37087e8b0dbd44e4a6ca42e1b247635a", "name": "tempest-LimitsRbacTest-1627406510"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37087e8b0dbd44e4a6ca42e1b247635a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.732 197 INFO tempest.lib.common.rest_client [req-bb14553b-02e6-45ef-83e6-b83fb5077b1f ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:13:42.736 197 DEBUG tempest.lib.common.rest_client [req-bb14553b-02e6-45ef-83e6-b83fb5077b1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb14553b-02e6-45ef-83e6-b83fb5077b1f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "24b5fe7dca6a4c2f853b88640371d171", "name": "tempest-FlavorAccessRbacTest-2125871953", "password_expires_at": null}, "audit_ids": ["EmOPPgwsQRmZ4h7ITDfbRA"], "expires_at": "2020-12-14T03:13:42.000000Z", "issued_at": "2020-12-14T02:13:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "49bdc2127d1c4edc9a245fc036aeb613", "name": "tempest-FlavorAccessRbacTest-2125871953"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_49bdc2127d1c4edc9a245fc036aeb613", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.787 186 INFO tempest.lib.common.rest_client [req-9a230667-890c-4db0-9fe0-3cb228c16a19 ] Request (AggregatesRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/4555 0.119s 2020-12-14 02:13:42.790 186 DEBUG tempest.lib.common.rest_client [req-9a230667-890c-4db0-9fe0-3cb228c16a19 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '80', 'x-openstack-request-id': 'req-9a230667-890c-4db0-9fe0-3cb228c16a19', 'x-compute-request-id': 'req-9a230667-890c-4db0-9fe0-3cb228c16a19', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/4555'} Body: b'{"itemNotFound": {"code": 404, "message": "Aggregate 4555 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.811 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:42.814 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.817 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.820 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.823 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.826 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.829 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.833 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.835 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.837 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.840 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.842 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.844 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.847 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.849 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.852 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.854 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.857 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.859 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.861 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.864 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.866 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.868 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.871 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.873 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.875 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.877 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.879 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.882 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.884 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.886 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.888 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.891 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.893 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.895 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.897 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.897 193 INFO tempest.lib.common.rest_client [req-c9186282-d97b-4f92-98b1-95a50cc2b0e3 ] Request (LimitsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/77e08e1ba559407c89781e0d18298d73 0.168s 2020-12-14 02:13:42.899 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.899 193 DEBUG tempest.lib.common.rest_client [req-c9186282-d97b-4f92-98b1-95a50cc2b0e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9186282-d97b-4f92-98b1-95a50cc2b0e3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/77e08e1ba559407c89781e0d18298d73'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.902 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.904 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.906 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.909 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.913 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.917 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.919 197 INFO tempest.lib.common.rest_client [req-cca6e8eb-7bad-4f72-8f4c-57098b3d6afa ] Request (FlavorAccessRbacTest:_run_cleanups): 404 POST http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a/action 0.173s 2020-12-14 02:13:42.920 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.923 197 DEBUG tempest.lib.common.rest_client [req-cca6e8eb-7bad-4f72-8f4c-57098b3d6afa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeTenantAccess": {"tenant": "49bdc2127d1c4edc9a245fc036aeb613"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '127', 'x-openstack-request-id': 'req-cca6e8eb-7bad-4f72-8f4c-57098b3d6afa', 'x-compute-request-id': 'req-cca6e8eb-7bad-4f72-8f4c-57098b3d6afa', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a/action'} Body: b'{"itemNotFound": {"code": 404, "message": "Flavor access not found for 10463 / 49bdc2127d1c4edc9a245fc036aeb613 combination."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:42.925 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.928 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.930 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.933 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.935 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.937 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.940 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.942 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.944 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.946 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.948 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.951 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.954 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.958 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.960 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.963 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.966 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.968 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.970 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.972 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.974 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.977 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.979 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.981 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.984 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.986 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.988 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.990 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:42.998 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:index, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:42.999 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:43.001 197 INFO tempest.lib.common.rest_client [req-2f02ebb8-0e02-4dbf-9ec1-01a17f7cfc02 ] Request (FlavorAccessRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a 0.049s 2020-12-14 02:13:43.003 197 DEBUG tempest.lib.common.rest_client [req-2f02ebb8-0e02-4dbf-9ec1-01a17f7cfc02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2f02ebb8-0e02-4dbf-9ec1-01a17f7cfc02', 'x-compute-request-id': 'req-2f02ebb8-0e02-4dbf-9ec1-01a17f7cfc02', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/2f555ff1-ebfb-4103-832a-d0ebe69d8c2a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.007 193 INFO tempest.lib.common.rest_client [req-029150ff-966b-4ddf-bf72-c7e5a7430750 ] Request (LimitsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:13:43.010 193 DEBUG tempest.lib.common.rest_client [req-029150ff-966b-4ddf-bf72-c7e5a7430750 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-029150ff-966b-4ddf-bf72-c7e5a7430750', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["4lQdZF6kSAWtZsonr3q0eQ"], "expires_at": "2020-12-14T03:13:42.000000Z", "issued_at": "2020-12-14T02:13:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.052 197 INFO tempest.lib.common.rest_client [req-fad40b5d-11b2-4c19-8f4a-c79b5c729316 ] Request (FlavorAccessRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/flavors/detail 0.043s 2020-12-14 02:13:43.055 197 DEBUG tempest.lib.common.rest_client [req-fad40b5d-11b2-4c19-8f4a-c79b5c729316 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '9794', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fad40b5d-11b2-4c19-8f4a-c79b5c729316', 'x-compute-request-id': 'req-fad40b5d-11b2-4c19-8f4a-c79b5c729316', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/detail'} Body: b'{"flavors": [{"id": "01e7ff06-4a12-4431-9b40-26277becb41d", "name": "rally_full-flavor_8a0926b1-7dc8-420c-9bd4-67b88c62abef", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/01e7ff06-4a12-4431-9b40-26277becb41d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/01e7ff06-4a12-4431-9b40-26277becb41d"}]}, {"id": "1", "name": "m1.tiny", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1"}]}, {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "name": "patrole_reader-flavor_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, {"id": "2", "name": "m1.small", "ram": 2048, "disk": 20, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2"}]}, {"id": "2919ff17-00dc-474f-9e1b-bf368e65fc74", "name": "rally_verify_4911c945_dl9HdAq1", "ram": 64, "disk": 5, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2919ff17-00dc-474f-9e1b-bf368e65fc74"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2919ff17-00dc-474f-9e1b-bf368e65fc74"}]}, {"id": "29b55520-b9a3-4b97-a3ae-d9c83f854c93", "name": "m1.heat_micro", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}]}, {"id": "3", "name": "m1.medium", "ram": 4096, "disk": 40, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/3"}]}, {"id": "4", "name": "m1.large", "ram": 8192, "disk": 80, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 4, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/4"}]}, {"id": "42", "name": "m1.nano", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/42"}]}, {"id": "442d1175-790f-46a1-b7c8-f52a17f6f7d8", "name": "patrole_member-flavor_c7a2fe1e-65f4-45d7-bab1-5c456aa6e4d6", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30. _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.066 186 INFO tempest.lib.common.rest_client [req-50958545-8239-4866-9647-766cca8c723a ] Request (AggregatesRbacTest:test_list_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.062s 2020-12-14 02:13:43.069 186 DEBUG tempest.lib.common.rest_client [req-50958545-8239-4866-9647-766cca8c723a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-50958545-8239-4866-9647-766cca8c723a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.165 189 INFO tempest.lib.common.rest_client [req-ac520b60-ee1d-4809-b767-23d8ea07c1fe ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:13:43.169 189 DEBUG tempest.lib.common.rest_client [req-ac520b60-ee1d-4809-b767-23d8ea07c1fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac520b60-ee1d-4809-b767-23d8ea07c1fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "717397e237b94746a1ddc062fca02eaa", "name": "tempest-FloatingIpPoolsRbacTest-1730574798", "password_expires_at": null}, "audit_ids": ["1Yz1VZ7xThaqkqCappWGkg"], "expires_at": "2020-12-14T03:13:43.000000Z", "issued_at": "2020-12-14T02:13:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a7e56b1cdd0743e3b2bb8bdf1bad6742", "name": "tempest-FloatingIpPoolsRbacTest-1730574798"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.179 186 INFO tempest.lib.common.rest_client [req-cd48ec44-3282-4da0-8a3e-23f150687b35 ] Request (AggregatesRbacTest:test_list_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:13:43.180 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:43.182 186 DEBUG tempest.lib.common.rest_client [req-cd48ec44-3282-4da0-8a3e-23f150687b35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd48ec44-3282-4da0-8a3e-23f150687b35', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["i5KdN-YzRzue04SRZCSD6w"], "expires_at": "2020-12-14T03:13:43.000000Z", "issued_at": "2020-12-14T02:13:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.185 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.188 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.191 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.195 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.198 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.202 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.207 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.210 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.212 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.215 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.218 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.221 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.224 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.227 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.230 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.233 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.236 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.238 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.241 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.244 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.246 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.249 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.252 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.254 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.257 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.260 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.263 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.265 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.268 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.271 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.275 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.278 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.281 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.284 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.287 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.289 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.292 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.295 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.298 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.301 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.304 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.307 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.309 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.313 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.315 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.318 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.318 186 INFO tempest.lib.common.rest_client [req-c45cb419-09db-46de-b036-6267e3ee8fc0 ] Request (AggregatesRbacTest:test_list_aggregate_rbac): 200 GET http://172.30.13.94/compute/v2.1/os-aggregates 0.130s 2020-12-14 02:13:43.321 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.321 186 DEBUG tempest.lib.common.rest_client [req-c45cb419-09db-46de-b036-6267e3ee8fc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '18', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c45cb419-09db-46de-b036-6267e3ee8fc0', 'x-compute-request-id': 'req-c45cb419-09db-46de-b036-6267e3ee8fc0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregates": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.324 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.325 193 INFO tempest.lib.common.rest_client [req-fe0b4da6-bf84-44d4-b112-e8660c25e1ec ] Request (LimitsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=37087e8b0dbd44e4a6ca42e1b247635a&name=default 0.307s 2020-12-14 02:13:43.326 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.328 197 INFO tempest.lib.common.rest_client [req-9f1245f9-837b-4a71-9fb2-efbe05a321fb ] Request (FlavorAccessRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/24b5fe7dca6a4c2f853b88640371d171 0.134s 2020-12-14 02:13:43.329 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.328 193 DEBUG tempest.lib.common.rest_client [req-fe0b4da6-bf84-44d4-b112-e8660c25e1ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-fe0b4da6-bf84-44d4-b112-e8660c25e1ec', 'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=37087e8b0dbd44e4a6ca42e1b247635a&name=default'} Body: b'{"security_groups": [{"id": "406a3be5-dab1-419f-8f04-ec364e0934a3", "name": "default", "stateful": true, "tenant_id": "37087e8b0dbd44e4a6ca42e1b247635a", "description": "Default security group", "security_group_rules": [{"id": "53329678-446c-4af8-b652-85422c254c23", "tenant_id": "37087e8b0dbd44e4a6ca42e1b247635a", "security_group_id": "406a3be5-dab1-419f-8f04-ec364e0934a3", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:43Z", "updated_at": "2020-12-14T02:13:43Z", "revision_number": 0, "project_id": "37087e8b0dbd44e4a6ca42e1b247635a"}, {"id": "582ca4eb-829c-4379-a438-cd692d95635f", "tenant_id": "37087e8b0dbd44e4a6ca42e1b247635a", "security_group_id": "406a3be5-dab1-419f-8f04-ec364e0934a3", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "406a3be5-dab1-419f-8f04-ec364e0934a3", "description": null, "tags": [], "created_at": "2020-12-14T02:13:43Z", "updated_at": "2020-12-14T02:13:43Z", "revision_number": 0, "project_id": "37087e8b0dbd44e4a6ca42e1b247635a"}, {"id": "c33c945b-79c5-46c8-a37d-86acc35f503d", "tenant_id": "37087e8b0dbd44e4a6ca42e1b247635a", "security_group_id": "406a3be5-dab1-419f-8f04-ec364e0934a3", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "406a3be5-dab1-419f-8f04-ec364e0934a3", "description": null, "tags": [], "created_at": "2020-12-14T02:13:43Z", "updated_at": "2020-12-14T02:13:43Z", "revision_number": 0, "project_id": "37087e8b0dbd44e4a6ca42e1b247635a"}, {"id": "e1813ceb-01fd-4769-aa6d-84cb038c840f", "tenant_id": "37087e8b0dbd44e4a6ca42e1b247635a", "security_group_id": "406a3be5-dab1-419f-8f04-ec364e0934a3", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:43Z", "updated_at": "2020-12-14T02:13:43Z", "revision_number": 0, "project_id": "37087e8b0dbd44e4a6ca42e1b247635a"}], "tags": [], "created_at": "2020-12-14T02:13:43Z", "updated_at": "2020-12-14T02:13:43Z", "revision_number": 1, "project_id": "37087e8b0dbd44e4a6ca42e1b247635a"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.331 197 DEBUG tempest.lib.common.rest_client [req-9f1245f9-837b-4a71-9fb2-efbe05a321fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f1245f9-837b-4a71-9fb2-efbe05a321fb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/24b5fe7dca6a4c2f853b88640371d171'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.332 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.334 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.337 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.340 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.344 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.344 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:43.346 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.352 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.355 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.358 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.361 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.364 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.366 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.369 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.373 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.377 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.382 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.385 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.388 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.391 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.394 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.397 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.401 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-floating-ip-pools, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:43.404 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:43.437 197 INFO tempest.lib.common.rest_client [req-01da43c4-1ad7-41d2-a517-4608d67850c0 ] Request (FlavorAccessRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:13:43.439 197 DEBUG tempest.lib.common.rest_client [req-01da43c4-1ad7-41d2-a517-4608d67850c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01da43c4-1ad7-41d2-a517-4608d67850c0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["mUt7qZahSF-1BoNURRdOeQ"], "expires_at": "2020-12-14T03:13:43.000000Z", "issued_at": "2020-12-14T02:13:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.476 186 INFO tempest.lib.common.rest_client [req-0d7936be-0b4b-4023-b874-c263ad2a9777 ] Request (AggregatesRbacTest:test_list_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.126s 2020-12-14 02:13:43.479 186 DEBUG tempest.lib.common.rest_client [req-0d7936be-0b4b-4023-b874-c263ad2a9777 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d7936be-0b4b-4023-b874-c263ad2a9777', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.494 193 INFO tempest.lib.common.rest_client [req-77de19e4-5681-41f1-9213-c59e995bb5c5 ] Request (LimitsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/406a3be5-dab1-419f-8f04-ec364e0934a3 0.157s 2020-12-14 02:13:43.496 193 DEBUG tempest.lib.common.rest_client [req-77de19e4-5681-41f1-9213-c59e995bb5c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-77de19e4-5681-41f1-9213-c59e995bb5c5', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/406a3be5-dab1-419f-8f04-ec364e0934a3'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.499 189 INFO tempest.lib.common.rest_client [req-89530775-f713-45a2-bc71-76d6b33ab51b ] Request (FloatingIpPoolsRbacTest:test_list_floating_ip_pools): 200 GET http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742/users/717397e237b94746a1ddc062fca02eaa/roles 0.088s 2020-12-14 02:13:43.502 189 DEBUG tempest.lib.common.rest_client [req-89530775-f713-45a2-bc71-76d6b33ab51b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89530775-f713-45a2-bc71-76d6b33ab51b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742/users/717397e237b94746a1ddc062fca02eaa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742/users/717397e237b94746a1ddc062fca02eaa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.575 186 INFO tempest.lib.common.rest_client [req-61d5c192-2a6f-4110-b336-129089436137 ] Request (AggregatesRbacTest:test_list_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:13:43.578 186 DEBUG tempest.lib.common.rest_client [req-61d5c192-2a6f-4110-b336-129089436137 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61d5c192-2a6f-4110-b336-129089436137', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["AdwqQiY9RnaFMONGAaGXBw"], "expires_at": "2020-12-14T03:13:43.000000Z", "issued_at": "2020-12-14T02:13:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.589 189 INFO tempest.lib.common.rest_client [req-6e152e7a-6443-4a53-a66d-eeaa8f4fa53f ] Request (FloatingIpPoolsRbacTest:test_list_floating_ip_pools): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-12-14 02:13:43.592 189 DEBUG tempest.lib.common.rest_client [req-6e152e7a-6443-4a53-a66d-eeaa8f4fa53f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e152e7a-6443-4a53-a66d-eeaa8f4fa53f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "717397e237b94746a1ddc062fca02eaa", "name": "tempest-FloatingIpPoolsRbacTest-1730574798", "password_expires_at": null}, "audit_ids": ["ovj2_dgJSRC1n1deUNDCRQ"], "expires_at": "2020-12-14T03:13:43.000000Z", "issued_at": "2020-12-14T02:13:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a7e56b1cdd0743e3b2bb8bdf1bad6742", "name": "tempest-FloatingIpPoolsRbacTest-1730574798"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.601 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:43.606 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.609 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.613 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.616 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.620 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.624 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.629 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.631 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.634 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.637 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.640 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.641 193 INFO tempest.lib.common.rest_client [req-137aafdd-921f-4fa2-945e-8154c5a7cea6 ] Request (LimitsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a 0.137s 2020-12-14 02:13:43.643 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.645 193 DEBUG tempest.lib.common.rest_client [req-137aafdd-921f-4fa2-945e-8154c5a7cea6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-137aafdd-921f-4fa2-945e-8154c5a7cea6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/37087e8b0dbd44e4a6ca42e1b247635a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.646 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.649 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.652 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.656 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.659 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.661 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.664 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.667 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.670 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.673 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.676 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.678 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.681 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.684 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.687 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.690 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.693 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.695 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.698 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.701 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.704 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.706 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.709 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.712 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.715 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.718 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.721 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.725 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.727 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.730 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.733 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.737 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.740 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.743 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.745 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.748 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.751 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.754 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.757 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.759 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.761 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.763 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.766 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.769 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.774 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.776 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.778 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.781 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.784 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.788 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.792 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.792 197 INFO tempest.lib.common.rest_client [req-73919069-6753-4b3c-ac6f-b299a5eafabb ] Request (FlavorAccessRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=49bdc2127d1c4edc9a245fc036aeb613&name=default 0.346s 2020-12-14 02:13:43.795 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.795 197 DEBUG tempest.lib.common.rest_client [req-73919069-6753-4b3c-ac6f-b299a5eafabb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-73919069-6753-4b3c-ac6f-b299a5eafabb', 'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=49bdc2127d1c4edc9a245fc036aeb613&name=default'} Body: b'{"security_groups": [{"id": "12ed03cb-41bf-465d-81f7-c54058188e92", "name": "default", "stateful": true, "tenant_id": "49bdc2127d1c4edc9a245fc036aeb613", "description": "Default security group", "security_group_rules": [{"id": "40944fad-ac48-44d5-8d57-d4b5dba7591b", "tenant_id": "49bdc2127d1c4edc9a245fc036aeb613", "security_group_id": "12ed03cb-41bf-465d-81f7-c54058188e92", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:43Z", "updated_at": "2020-12-14T02:13:43Z", "revision_number": 0, "project_id": "49bdc2127d1c4edc9a245fc036aeb613"}, {"id": "638251f7-366a-484e-91c3-17540c4a9eea", "tenant_id": "49bdc2127d1c4edc9a245fc036aeb613", "security_group_id": "12ed03cb-41bf-465d-81f7-c54058188e92", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "12ed03cb-41bf-465d-81f7-c54058188e92", "description": null, "tags": [], "created_at": "2020-12-14T02:13:43Z", "updated_at": "2020-12-14T02:13:43Z", "revision_number": 0, "project_id": "49bdc2127d1c4edc9a245fc036aeb613"}, {"id": "c1df217d-1ba5-4df8-9c74-df0ab986df41", "tenant_id": "49bdc2127d1c4edc9a245fc036aeb613", "security_group_id": "12ed03cb-41bf-465d-81f7-c54058188e92", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "12ed03cb-41bf-465d-81f7-c54058188e92", "description": null, "tags": [], "created_at": "2020-12-14T02:13:43Z", "updated_at": "2020-12-14T02:13:43Z", "revision_number": 0, "project_id": "49bdc2127d1c4edc9a245fc036aeb613"}, {"id": "cf1cd0b9-f796-4e58-8f39-b453583cbc68", "tenant_id": "49bdc2127d1c4edc9a245fc036aeb613", "security_group_id": "12ed03cb-41bf-465d-81f7-c54058188e92", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:43Z", "updated_at": "2020-12-14T02:13:43Z", "revision_number": 0, "project_id": "49bdc2127d1c4edc9a245fc036aeb613"}], "tags": [], "created_at": "2020-12-14T02:13:43Z", "updated_at": "2020-12-14T02:13:43Z", "revision_number": 1, "project_id": "49bdc2127d1c4edc9a245fc036aeb613"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.799 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.803 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.806 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.810 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.813 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.816 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.818 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:43.826 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:remove_host, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:43.874 193 INFO tempest.lib.common.rest_client [req-f7152d96-c812-4e6d-a758-d71209df3bfe ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.200s 2020-12-14 02:13:43.878 193 DEBUG tempest.lib.common.rest_client [req-f7152d96-c812-4e6d-a758-d71209df3bfe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7152d96-c812-4e6d-a758-d71209df3bfe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["iWmlj8sWThS37mqRULgnig"], "expires_at": "2020-12-14T03:13:43.000000Z", "issued_at": "2020-12-14T02:13:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.953 197 INFO tempest.lib.common.rest_client [req-6e905d3f-2275-4b20-b1e7-695f369576c9 ] Request (FlavorAccessRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/12ed03cb-41bf-465d-81f7-c54058188e92 0.150s 2020-12-14 02:13:43.956 197 DEBUG tempest.lib.common.rest_client [req-6e905d3f-2275-4b20-b1e7-695f369576c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6e905d3f-2275-4b20-b1e7-695f369576c9', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/12ed03cb-41bf-465d-81f7-c54058188e92'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.994 193 INFO tempest.lib.common.rest_client [req-9a490281-77e5-4a5a-a975-f5f9138f85a6 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:13:43.997 193 DEBUG tempest.lib.common.rest_client [req-9a490281-77e5-4a5a-a975-f5f9138f85a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9a490281-77e5-4a5a-a975-f5f9138f85a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["DfeUzpnHSrS8DT5l9Z6dlA"], "expires_at": "2020-12-14T03:13:43.000000Z", "issued_at": "2020-12-14T02:13:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:43.998 186 INFO tempest.lib.common.rest_client [req-af1ccd1a-c643-49dc-886c-249f821d36fe ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.166s 2020-12-14 02:13:44.001 186 DEBUG tempest.lib.common.rest_client [req-af1ccd1a-c643-49dc-886c-249f821d36fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-2128169222"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '215', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-af1ccd1a-c643-49dc-886c-249f821d36fe', 'x-compute-request-id': 'req-af1ccd1a-c643-49dc-886c-249f821d36fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 4556, "name": "tempest-AggregatesRbacTest-aggregate-2128169222", "created_at": "2020-12-14T02:13:43.977335", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.063 193 INFO tempest.lib.common.rest_client [req-9bb8643c-4214-4368-90e4-e57e682c9379 ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.059s 2020-12-14 02:13:44.066 193 DEBUG tempest.lib.common.rest_client [req-9bb8643c-4214-4368-90e4-e57e682c9379 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9bb8643c-4214-4368-90e4-e57e682c9379', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.108 197 INFO tempest.lib.common.rest_client [req-13eaf03f-60f5-4cce-a585-274d0c6dcbc3 ] Request (FlavorAccessRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613 0.144s 2020-12-14 02:13:44.111 197 DEBUG tempest.lib.common.rest_client [req-13eaf03f-60f5-4cce-a585-274d0c6dcbc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13eaf03f-60f5-4cce-a585-274d0c6dcbc3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/49bdc2127d1c4edc9a245fc036aeb613'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.119 189 INFO tempest.lib.common.rest_client [req-132153e3-d493-41f3-9d59-afec1b7ce64d ] Request (FloatingIpPoolsRbacTest:test_list_floating_ip_pools): 200 GET http://172.30.13.94/compute/v2.1/os-floating-ip-pools 0.519s 2020-12-14 02:13:44.123 189 DEBUG tempest.lib.common.rest_client [req-132153e3-d493-41f3-9d59-afec1b7ce64d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '96', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-132153e3-d493-41f3-9d59-afec1b7ce64d', 'x-compute-request-id': 'req-132153e3-d493-41f3-9d59-afec1b7ce64d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-floating-ip-pools'} Body: b'{"floating_ip_pools": [{"name": "tempest-RoutersIpV6AdminTest-1081145424"}, {"name": "public"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.144 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:44.185 197 INFO tempest.lib.common.rest_client [req-fba943d6-2833-42cb-8556-871fb4a0cce3 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:13:44.189 197 DEBUG tempest.lib.common.rest_client [req-fba943d6-2833-42cb-8556-871fb4a0cce3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fba943d6-2833-42cb-8556-871fb4a0cce3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["mgHGQqCLTw-ZS5d-39XwDQ"], "expires_at": "2020-12-14T03:13:44.000000Z", "issued_at": "2020-12-14T02:13:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.212 193 INFO tempest.lib.common.rest_client [req-aa47d5c1-c3ab-48c7-8fae-282dc71df2ae ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.138s 2020-12-14 02:13:44.214 193 DEBUG tempest.lib.common.rest_client [req-aa47d5c1-c3ab-48c7-8fae-282dc71df2ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaSetsRbacTest-1374196686-desc", "domain_id": "default", "name": "tempest-QuotaSetsRbacTest-1374196686"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa47d5c1-c3ab-48c7-8fae-282dc71df2ae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "1629f2ea49854d5fa0e9921adfad1cec", "name": "tempest-QuotaSetsRbacTest-1374196686", "domain_id": "default", "description": "tempest-QuotaSetsRbacTest-1374196686-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.215 189 INFO tempest.lib.common.rest_client [req-3b472e3d-2d72-412b-bf57-b9d8dfc0df5c ] Request (FloatingIpPoolsRbacTest:test_list_floating_ip_pools): 200 GET http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742/users/717397e237b94746a1ddc062fca02eaa/roles 0.064s 2020-12-14 02:13:44.218 189 DEBUG tempest.lib.common.rest_client [req-3b472e3d-2d72-412b-bf57-b9d8dfc0df5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b472e3d-2d72-412b-bf57-b9d8dfc0df5c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742/users/717397e237b94746a1ddc062fca02eaa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742/users/717397e237b94746a1ddc062fca02eaa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.316 189 INFO tempest.lib.common.rest_client [req-7328369c-d37b-4c27-b842-46c924f0f03c ] Request (FloatingIpPoolsRbacTest:test_list_floating_ip_pools): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:13:44.320 189 DEBUG tempest.lib.common.rest_client [req-7328369c-d37b-4c27-b842-46c924f0f03c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7328369c-d37b-4c27-b842-46c924f0f03c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "717397e237b94746a1ddc062fca02eaa", "name": "tempest-FloatingIpPoolsRbacTest-1730574798", "password_expires_at": null}, "audit_ids": ["cHFg6KVJQ1SEKcirmaAwwg"], "expires_at": "2020-12-14T03:13:44.000000Z", "issued_at": "2020-12-14T02:13:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a7e56b1cdd0743e3b2bb8bdf1bad6742", "name": "tempest-FloatingIpPoolsRbacTest-1730574798"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e56b1cdd0743e3b2bb8bdf1bad6742", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.336 193 INFO tempest.lib.common.rest_client [req-9c122f6c-ce43-4610-9e2a-ea7695024fda ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.114s 2020-12-14 02:13:44.338 193 DEBUG tempest.lib.common.rest_client [req-9c122f6c-ce43-4610-9e2a-ea7695024fda ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-QuotaSetsRbacTest-1374196686", "password": "J9%w=z6kGDr0JfK", "project_id": "1629f2ea49854d5fa0e9921adfad1cec", "email": "tempest-QuotaSetsRbacTest-530657224@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '389', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c122f6c-ce43-4610-9e2a-ea7695024fda', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "1629f2ea49854d5fa0e9921adfad1cec", "email": "tempest-QuotaSetsRbacTest-530657224@example.com", "id": "342f2aba21b542088e86034d6dc206e6", "name": "tempest-QuotaSetsRbacTest-1374196686", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/342f2aba21b542088e86034d6dc206e6"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.338 197 INFO tempest.lib.common.rest_client [req-37c6e5f1-1099-4946-a4c1-b1c0319bd16f ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:13:44.340 197 DEBUG tempest.lib.common.rest_client [req-37c6e5f1-1099-4946-a4c1-b1c0319bd16f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-37c6e5f1-1099-4946-a4c1-b1c0319bd16f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["IRynM4bVTFehC5LAsx83UA"], "expires_at": "2020-12-14T03:13:44.000000Z", "issued_at": "2020-12-14T02:13:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.409 193 INFO tempest.lib.common.rest_client [req-c3ed57ac-218f-40cc-a121-f273326f390c ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:13:44.411 193 DEBUG tempest.lib.common.rest_client [req-c3ed57ac-218f-40cc-a121-f273326f390c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c3ed57ac-218f-40cc-a121-f273326f390c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.411 197 INFO tempest.lib.common.rest_client [req-ec3c7b54-d776-43f3-beb6-2efbd02cdcb4 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.061s 2020-12-14 02:13:44.414 197 DEBUG tempest.lib.common.rest_client [req-ec3c7b54-d776-43f3-beb6-2efbd02cdcb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec3c7b54-d776-43f3-beb6-2efbd02cdcb4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.438 186 INFO tempest.lib.common.rest_client [req-d67f2a4c-0652-4c24-ab90-c3b50d7cd025 ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates/4556/action 0.404s 2020-12-14 02:13:44.441 186 DEBUG tempest.lib.common.rest_client [req-d67f2a4c-0652-4c24-ab90-c3b50d7cd025 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"add_host": {"host": "lf-virtual9"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '257', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d67f2a4c-0652-4c24-ab90-c3b50d7cd025', 'x-compute-request-id': 'req-d67f2a4c-0652-4c24-ab90-c3b50d7cd025', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/4556/action'} Body: b'{"aggregate": {"id": 4556, "name": "tempest-AggregatesRbacTest-aggregate-2128169222", "hosts": ["lf-virtual9"], "metadata": {}, "created_at": "2020-12-14T02:13:44.000000", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.471 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:44.482 193 INFO tempest.lib.common.rest_client [req-71325b2f-edb0-43a0-9c4e-24a30ab43f1b ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:13:44.484 193 DEBUG tempest.lib.common.rest_client [req-71325b2f-edb0-43a0-9c4e-24a30ab43f1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-71325b2f-edb0-43a0-9c4e-24a30ab43f1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.495 189 INFO tempest.lib.common.rest_client [req-45d5c3ad-2f6b-4157-b14c-646e3392459e ] Request (FloatingIpPoolsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/717397e237b94746a1ddc062fca02eaa 0.143s 2020-12-14 02:13:44.499 189 DEBUG tempest.lib.common.rest_client [req-45d5c3ad-2f6b-4157-b14c-646e3392459e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45d5c3ad-2f6b-4157-b14c-646e3392459e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/717397e237b94746a1ddc062fca02eaa'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.501 197 INFO tempest.lib.common.rest_client [req-a8c855bb-c443-4d3f-9224-03c61c99b45c ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.076s 2020-12-14 02:13:44.504 197 DEBUG tempest.lib.common.rest_client [req-a8c855bb-c443-4d3f-9224-03c61c99b45c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FlavorExtraSpecsRbacTest-81596218-desc", "domain_id": "default", "name": "tempest-FlavorExtraSpecsRbacTest-81596218"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8c855bb-c443-4d3f-9224-03c61c99b45c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "4c07be6d6d244dd2b1627e66a2db2646", "name": "tempest-FlavorExtraSpecsRbacTest-81596218", "domain_id": "default", "description": "tempest-FlavorExtraSpecsRbacTest-81596218-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.590 189 INFO tempest.lib.common.rest_client [req-4b33c890-422a-4b64-be15-4f03fdbd98aa ] Request (FloatingIpPoolsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-12-14 02:13:44.593 189 DEBUG tempest.lib.common.rest_client [req-4b33c890-422a-4b64-be15-4f03fdbd98aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b33c890-422a-4b64-be15-4f03fdbd98aa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Lt-2mU1tRK6isZnvr1fJiw"], "expires_at": "2020-12-14T03:13:44.000000Z", "issued_at": "2020-12-14T02:13:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.594 186 INFO tempest.lib.common.rest_client [req-d70bd02e-6a1b-4474-862d-304168721508 ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.117s 2020-12-14 02:13:44.598 186 DEBUG tempest.lib.common.rest_client [req-d70bd02e-6a1b-4474-862d-304168721508 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d70bd02e-6a1b-4474-862d-304168721508', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.621 193 INFO tempest.lib.common.rest_client [req-05fed407-8584-4fc7-89e3-acd3e112c735 ] Request (QuotaSetsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles/72a4576c553448cd941b052c1ca0cf2d 0.129s 2020-12-14 02:13:44.624 193 DEBUG tempest.lib.common.rest_client [req-05fed407-8584-4fc7-89e3-acd3e112c735 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05fed407-8584-4fc7-89e3-acd3e112c735', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.627 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaSetsRbacTest-1374196686', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1629f2ea49854d5fa0e9921adfad1cec', 'project_name': 'tempest-QuotaSetsRbacTest-1374196686', 'tenant_id': '1629f2ea49854d5fa0e9921adfad1cec', 'tenant_name': 'tempest-QuotaSetsRbacTest-1374196686', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '342f2aba21b542088e86034d6dc206e6'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:44.630 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaSetsRbacTest-1374196686', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1629f2ea49854d5fa0e9921adfad1cec', 'project_name': 'tempest-QuotaSetsRbacTest-1374196686', 'tenant_id': '1629f2ea49854d5fa0e9921adfad1cec', 'tenant_name': 'tempest-QuotaSetsRbacTest-1374196686', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '342f2aba21b542088e86034d6dc206e6'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:44.645 197 INFO tempest.lib.common.rest_client [req-a5d1ebe9-f770-415e-9795-f802dbf7e79c ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.131s 2020-12-14 02:13:44.647 197 DEBUG tempest.lib.common.rest_client [req-a5d1ebe9-f770-415e-9795-f802dbf7e79c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FlavorExtraSpecsRbacTest-81596218", "password": "X5@wefo*4*c@IRW", "project_id": "4c07be6d6d244dd2b1627e66a2db2646", "email": "tempest-FlavorExtraSpecsRbacTest-870917781@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '401', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5d1ebe9-f770-415e-9795-f802dbf7e79c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "4c07be6d6d244dd2b1627e66a2db2646", "email": "tempest-FlavorExtraSpecsRbacTest-870917781@example.com", "id": "ef510e52f8894d8baef26dddf289a279", "name": "tempest-FlavorExtraSpecsRbacTest-81596218", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/ef510e52f8894d8baef26dddf289a279"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.692 186 INFO tempest.lib.common.rest_client [req-bf4bc9a9-0fc7-4c88-8e8e-582540b3a30a ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-14 02:13:44.696 186 DEBUG tempest.lib.common.rest_client [req-bf4bc9a9-0fc7-4c88-8e8e-582540b3a30a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf4bc9a9-0fc7-4c88-8e8e-582540b3a30a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["zj6eVtG5Q8Wa0mVqKz7Bcg"], "expires_at": "2020-12-14T03:13:44.000000Z", "issued_at": "2020-12-14T02:13:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.756 197 INFO tempest.lib.common.rest_client [req-4bba9616-450f-413a-bea4-b621f6bf1cc1 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.101s 2020-12-14 02:13:44.759 197 DEBUG tempest.lib.common.rest_client [req-4bba9616-450f-413a-bea4-b621f6bf1cc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4bba9616-450f-413a-bea4-b621f6bf1cc1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.836 197 INFO tempest.lib.common.rest_client [req-bf7777b4-ee89-487b-b436-8551c7f38907 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:13:44.838 197 DEBUG tempest.lib.common.rest_client [req-bf7777b4-ee89-487b-b436-8551c7f38907 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf7777b4-ee89-487b-b436-8551c7f38907', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.903 193 INFO tempest.lib.common.rest_client [req-03f934d7-58c5-4c3f-942e-6b06b80ec69d ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.204s 2020-12-14 02:13:44.906 193 DEBUG tempest.lib.common.rest_client [req-03f934d7-58c5-4c3f-942e-6b06b80ec69d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6565', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-03f934d7-58c5-4c3f-942e-6b06b80ec69d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "342f2aba21b542088e86034d6dc206e6", "name": "tempest-QuotaSetsRbacTest-1374196686", "password_expires_at": null}, "audit_ids": ["POBDxIE3R0-hzrJOLy4e6A"], "expires_at": "2020-12-14T03:13:44.000000Z", "issued_at": "2020-12-14T02:13:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1629f2ea49854d5fa0e9921adfad1cec", "name": "tempest-QuotaSetsRbacTest-1374196686"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.922 189 INFO tempest.lib.common.rest_client [req-04da8a29-3c25-4f9a-9c8d-f26bba0b323e ] Request (FloatingIpPoolsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a7e56b1cdd0743e3b2bb8bdf1bad6742&name=default 0.321s 2020-12-14 02:13:44.925 197 INFO tempest.lib.common.rest_client [req-29f92929-4b5c-42b0-a246-073ddf3f26e2 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles/72a4576c553448cd941b052c1ca0cf2d 0.078s 2020-12-14 02:13:44.925 189 DEBUG tempest.lib.common.rest_client [req-04da8a29-3c25-4f9a-9c8d-f26bba0b323e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-04da8a29-3c25-4f9a-9c8d-f26bba0b323e', 'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a7e56b1cdd0743e3b2bb8bdf1bad6742&name=default'} Body: b'{"security_groups": [{"id": "a0ee5761-fd31-4bd6-884f-56261ae4f118", "name": "default", "stateful": true, "tenant_id": "a7e56b1cdd0743e3b2bb8bdf1bad6742", "description": "Default security group", "security_group_rules": [{"id": "20c14437-7998-4073-8e3c-023c088d20aa", "tenant_id": "a7e56b1cdd0743e3b2bb8bdf1bad6742", "security_group_id": "a0ee5761-fd31-4bd6-884f-56261ae4f118", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a0ee5761-fd31-4bd6-884f-56261ae4f118", "description": null, "tags": [], "created_at": "2020-12-14T02:13:44Z", "updated_at": "2020-12-14T02:13:44Z", "revision_number": 0, "project_id": "a7e56b1cdd0743e3b2bb8bdf1bad6742"}, {"id": "47340d6e-711b-4cbd-a742-3b0f13e538ae", "tenant_id": "a7e56b1cdd0743e3b2bb8bdf1bad6742", "security_group_id": "a0ee5761-fd31-4bd6-884f-56261ae4f118", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:44Z", "updated_at": "2020-12-14T02:13:44Z", "revision_number": 0, "project_id": "a7e56b1cdd0743e3b2bb8bdf1bad6742"}, {"id": "4c8dd1a4-bf22-4203-b3bb-f8640aa381d7", "tenant_id": "a7e56b1cdd0743e3b2bb8bdf1bad6742", "security_group_id": "a0ee5761-fd31-4bd6-884f-56261ae4f118", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:44Z", "updated_at": "2020-12-14T02:13:44Z", "revision_number": 0, "project_id": "a7e56b1cdd0743e3b2bb8bdf1bad6742"}, {"id": "fea24a52-fea5-4a06-8962-fe0328bd9ba6", "tenant_id": "a7e56b1cdd0743e3b2bb8bdf1bad6742", "security_group_id": "a0ee5761-fd31-4bd6-884f-56261ae4f118", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a0ee5761-fd31-4bd6-884f-56261ae4f118", "description": null, "tags": [], "created_at": "2020-12-14T02:13:44Z", "updated_at": "2020-12-14T02:13:44Z", "revision_number": 0, "project_id": "a7e56b1cdd0743e3b2bb8bdf1bad6742"}], "tags": [], "created_at": "2020-12-14T02:13:44Z", "updated_at": "2020-12-14T02:13:44Z", "revision_number": 1, "project_id": "a7e56b1cdd0743e3b2bb8bdf1bad6742"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.928 197 DEBUG tempest.lib.common.rest_client [req-29f92929-4b5c-42b0-a246-073ddf3f26e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29f92929-4b5c-42b0-a246-073ddf3f26e2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:44.932 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorExtraSpecsRbacTest-81596218', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4c07be6d6d244dd2b1627e66a2db2646', 'project_name': 'tempest-FlavorExtraSpecsRbacTest-81596218', 'tenant_id': '4c07be6d6d244dd2b1627e66a2db2646', 'tenant_name': 'tempest-FlavorExtraSpecsRbacTest-81596218', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'ef510e52f8894d8baef26dddf289a279'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:44.936 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorExtraSpecsRbacTest-81596218', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4c07be6d6d244dd2b1627e66a2db2646', 'project_name': 'tempest-FlavorExtraSpecsRbacTest-81596218', 'tenant_id': '4c07be6d6d244dd2b1627e66a2db2646', 'tenant_name': 'tempest-FlavorExtraSpecsRbacTest-81596218', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'ef510e52f8894d8baef26dddf289a279'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:45.032 193 INFO tempest.lib.common.rest_client [req-75e9109d-82d4-492d-a649-37f7acfed5d6 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.118s 2020-12-14 02:13:45.034 193 DEBUG tempest.lib.common.rest_client [req-75e9109d-82d4-492d-a649-37f7acfed5d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaSetsRbacTest-117076030-desc", "domain_id": "default", "name": "tempest-QuotaSetsRbacTest-117076030"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '370', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-75e9109d-82d4-492d-a649-37f7acfed5d6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "085d5c0d66054177a5b2db8607045ff7", "name": "tempest-QuotaSetsRbacTest-117076030", "domain_id": "default", "description": "tempest-QuotaSetsRbacTest-117076030-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/085d5c0d66054177a5b2db8607045ff7"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.072 189 INFO tempest.lib.common.rest_client [req-551706b2-c73f-4df0-a895-284ad55163dd ] Request (FloatingIpPoolsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/a0ee5761-fd31-4bd6-884f-56261ae4f118 0.137s 2020-12-14 02:13:45.075 189 DEBUG tempest.lib.common.rest_client [req-551706b2-c73f-4df0-a895-284ad55163dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-551706b2-c73f-4df0-a895-284ad55163dd', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/a0ee5761-fd31-4bd6-884f-56261ae4f118'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.117 197 INFO tempest.lib.common.rest_client [req-4432a732-db4d-409a-b72a-8f17e431a971 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-12-14 02:13:45.120 197 DEBUG tempest.lib.common.rest_client [req-4432a732-db4d-409a-b72a-8f17e431a971 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4432a732-db4d-409a-b72a-8f17e431a971', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ef510e52f8894d8baef26dddf289a279", "name": "tempest-FlavorExtraSpecsRbacTest-81596218", "password_expires_at": null}, "audit_ids": ["qWYhZTRqRx2dbAxsJ7eL5Q"], "expires_at": "2020-12-14T03:13:45.000000Z", "issued_at": "2020-12-14T02:13:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4c07be6d6d244dd2b1627e66a2db2646", "name": "tempest-FlavorExtraSpecsRbacTest-81596218"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.161 193 INFO tempest.lib.common.rest_client [req-b7224b47-23ee-4c03-b108-03f0e222e667 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.118s 2020-12-14 02:13:45.164 193 DEBUG tempest.lib.common.rest_client [req-b7224b47-23ee-4c03-b108-03f0e222e667 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-QuotaSetsRbacTest-117076030", "password": "S1=ZaB&n2Da&w^a", "project_id": "085d5c0d66054177a5b2db8607045ff7", "email": "tempest-QuotaSetsRbacTest-832761795@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7224b47-23ee-4c03-b108-03f0e222e667', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "085d5c0d66054177a5b2db8607045ff7", "email": "tempest-QuotaSetsRbacTest-832761795@example.com", "id": "d9917ea1137e4a65909bccfc4ab35596", "name": "tempest-QuotaSetsRbacTest-117076030", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/d9917ea1137e4a65909bccfc4ab35596"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.198 186 INFO tempest.lib.common.rest_client [req-7090b8c1-b4cd-4e0c-b6b6-3a26d4d6fa96 ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates/4556/action 0.493s 2020-12-14 02:13:45.202 186 DEBUG tempest.lib.common.rest_client [req-7090b8c1-b4cd-4e0c-b6b6-3a26d4d6fa96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"remove_host": {"host": "lf-virtual9"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '244', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7090b8c1-b4cd-4e0c-b6b6-3a26d4d6fa96', 'x-compute-request-id': 'req-7090b8c1-b4cd-4e0c-b6b6-3a26d4d6fa96', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/4556/action'} Body: b'{"aggregate": {"id": 4556, "name": "tempest-AggregatesRbacTest-aggregate-2128169222", "hosts": [], "metadata": {}, "created_at": "2020-12-14T02:13:44.000000", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.229 197 INFO tempest.lib.common.rest_client [req-956d65b4-eb75-4767-baef-160e2d9da4a5 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:13:45.231 197 DEBUG tempest.lib.common.rest_client [req-956d65b4-eb75-4767-baef-160e2d9da4a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-956d65b4-eb75-4767-baef-160e2d9da4a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["6_lsuoX1T7C_tR5aS6qHnw"], "expires_at": "2020-12-14T03:13:45.000000Z", "issued_at": "2020-12-14T02:13:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.235 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:45.243 189 INFO tempest.lib.common.rest_client [req-8a4a5d8e-497b-4e15-ace1-01fc04e24b40 ] Request (FloatingIpPoolsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742 0.160s 2020-12-14 02:13:45.247 189 DEBUG tempest.lib.common.rest_client [req-8a4a5d8e-497b-4e15-ace1-01fc04e24b40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a4a5d8e-497b-4e15-ace1-01fc04e24b40', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e56b1cdd0743e3b2bb8bdf1bad6742'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.283 193 INFO tempest.lib.common.rest_client [req-6ffdedfc-7ecb-4ddf-9284-8df2e15fb712 ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.111s 2020-12-14 02:13:45.286 193 DEBUG tempest.lib.common.rest_client [req-6ffdedfc-7ecb-4ddf-9284-8df2e15fb712 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ffdedfc-7ecb-4ddf-9284-8df2e15fb712', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.312 186 INFO tempest.lib.common.rest_client [req-ba597cc8-c5a4-4c80-974a-adb5b2c59064 ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.069s 2020-12-14 02:13:45.315 186 DEBUG tempest.lib.common.rest_client [req-ba597cc8-c5a4-4c80-974a-adb5b2c59064 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba597cc8-c5a4-4c80-974a-adb5b2c59064', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.324 189 INFO tempest.lib.common.rest_client [req-61880ae3-180b-4ab1-8680-36b37e200a74 ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:13:45.328 189 DEBUG tempest.lib.common.rest_client [req-61880ae3-180b-4ab1-8680-36b37e200a74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61880ae3-180b-4ab1-8680-36b37e200a74', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["i0GCz3dNSO6bual3CStWtQ"], "expires_at": "2020-12-14T03:13:45.000000Z", "issued_at": "2020-12-14T02:13:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.353 197 INFO tempest.lib.common.rest_client [req-c8b4ee1a-3877-48e5-b4d3-0fc88149a328 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:13:45.355 197 DEBUG tempest.lib.common.rest_client [req-c8b4ee1a-3877-48e5-b4d3-0fc88149a328 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8b4ee1a-3877-48e5-b4d3-0fc88149a328', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["8xcdXQDuQ2qX0La57yRxOg"], "expires_at": "2020-12-14T03:13:45.000000Z", "issued_at": "2020-12-14T02:13:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.370 193 INFO tempest.lib.common.rest_client [req-bd8df396-283e-47f2-9159-b5b666772be0 ] Request (QuotaSetsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/085d5c0d66054177a5b2db8607045ff7/users/d9917ea1137e4a65909bccfc4ab35596/roles/a629c95d64b3416fb80ae90af4f69c05 0.077s 2020-12-14 02:13:45.373 193 DEBUG tempest.lib.common.rest_client [req-bd8df396-283e-47f2-9159-b5b666772be0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd8df396-283e-47f2-9159-b5b666772be0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/085d5c0d66054177a5b2db8607045ff7/users/d9917ea1137e4a65909bccfc4ab35596/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.376 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaSetsRbacTest-117076030', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '085d5c0d66054177a5b2db8607045ff7', 'project_name': 'tempest-QuotaSetsRbacTest-117076030', 'tenant_id': '085d5c0d66054177a5b2db8607045ff7', 'tenant_name': 'tempest-QuotaSetsRbacTest-117076030', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd9917ea1137e4a65909bccfc4ab35596'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:45.378 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaSetsRbacTest-117076030', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '085d5c0d66054177a5b2db8607045ff7', 'project_name': 'tempest-QuotaSetsRbacTest-117076030', 'tenant_id': '085d5c0d66054177a5b2db8607045ff7', 'tenant_name': 'tempest-QuotaSetsRbacTest-117076030', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd9917ea1137e4a65909bccfc4ab35596'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:45.409 186 INFO tempest.lib.common.rest_client [req-e225f970-8696-4f39-a4bb-54642d3793f5 ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-14 02:13:45.412 186 DEBUG tempest.lib.common.rest_client [req-e225f970-8696-4f39-a4bb-54642d3793f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e225f970-8696-4f39-a4bb-54642d3793f5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["EYVaZIR8SGah5qGJJ_aFJA"], "expires_at": "2020-12-14T03:13:45.000000Z", "issued_at": "2020-12-14T02:13:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.465 189 INFO tempest.lib.common.rest_client [req-37b79ee0-dfa1-4cf0-af5a-3060cce7cfd4 ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-12-14 02:13:45.467 189 DEBUG tempest.lib.common.rest_client [req-37b79ee0-dfa1-4cf0-af5a-3060cce7cfd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-37b79ee0-dfa1-4cf0-af5a-3060cce7cfd4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["AaMGsfOzRb232QHmcyc1kg"], "expires_at": "2020-12-14T03:13:45.000000Z", "issued_at": "2020-12-14T02:13:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.470 197 INFO tempest.lib.common.rest_client [req-7053b72e-05aa-4553-a1e8-2df98aa95672 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.107s 2020-12-14 02:13:45.473 197 DEBUG tempest.lib.common.rest_client [req-7053b72e-05aa-4553-a1e8-2df98aa95672 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7053b72e-05aa-4553-a1e8-2df98aa95672', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.536 189 INFO tempest.lib.common.rest_client [req-f9243be7-0f14-4dc4-b3ac-037f810f0db0 ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.062s 2020-12-14 02:13:45.538 189 DEBUG tempest.lib.common.rest_client [req-f9243be7-0f14-4dc4-b3ac-037f810f0db0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9243be7-0f14-4dc4-b3ac-037f810f0db0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.540 197 INFO tempest.lib.common.rest_client [req-050ab37a-24db-4719-8f0d-28d09c6996e2 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:13:45.543 197 DEBUG tempest.lib.common.rest_client [req-050ab37a-24db-4719-8f0d-28d09c6996e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-050ab37a-24db-4719-8f0d-28d09c6996e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.546 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:13:45.548 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:45.589 193 INFO tempest.lib.common.rest_client [req-1d821d30-135b-4f96-a497-32a9036e0640 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.150s 2020-12-14 02:13:45.593 193 DEBUG tempest.lib.common.rest_client [req-1d821d30-135b-4f96-a497-32a9036e0640 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d821d30-135b-4f96-a497-32a9036e0640', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d9917ea1137e4a65909bccfc4ab35596", "name": "tempest-QuotaSetsRbacTest-117076030", "password_expires_at": null}, "audit_ids": ["-WWmxUVGT9qzWHec5UWn7w"], "expires_at": "2020-12-14T03:13:45.000000Z", "issued_at": "2020-12-14T02:13:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "085d5c0d66054177a5b2db8607045ff7", "name": "tempest-QuotaSetsRbacTest-117076030"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/085d5c0d66054177a5b2db8607045ff7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/085d5c0d66054177a5b2db8607045ff7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/085d5c0d66054177a5b2db8607045ff7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_085d5c0d66054177a5b2db8607045ff7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_085d5c0d66054177a5b2db8607045ff7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_085d5c0d66054177a5b2db8607045ff7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.615 197 INFO tempest.lib.common.rest_client [req-7ea7b4eb-3067-46e0-894d-2eef478402fd ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles 0.061s 2020-12-14 02:13:45.618 197 DEBUG tempest.lib.common.rest_client [req-7ea7b4eb-3067-46e0-894d-2eef478402fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ea7b4eb-3067-46e0-894d-2eef478402fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.622 189 INFO tempest.lib.common.rest_client [req-0318c711-2fd5-4fc6-81b0-0efd9f1e7e5c ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.073s 2020-12-14 02:13:45.625 189 DEBUG tempest.lib.common.rest_client [req-0318c711-2fd5-4fc6-81b0-0efd9f1e7e5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImagesRbacTest-622606806-desc", "domain_id": "default", "name": "tempest-ImagesRbacTest-622606806"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '364', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0318c711-2fd5-4fc6-81b0-0efd9f1e7e5c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "a7e1198b79c9412caba6575e229a167c", "name": "tempest-ImagesRbacTest-622606806", "domain_id": "default", "description": "tempest-ImagesRbacTest-622606806-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.709 193 INFO tempest.lib.common.rest_client [req-5330d0eb-31df-4ee7-9521-a7edfa89b137 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:13:45.713 193 DEBUG tempest.lib.common.rest_client [req-5330d0eb-31df-4ee7-9521-a7edfa89b137 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5330d0eb-31df-4ee7-9521-a7edfa89b137', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["rWDMqriEQk-femosvW5k5A"], "expires_at": "2020-12-14T03:13:45.000000Z", "issued_at": "2020-12-14T02:13:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.752 197 INFO tempest.lib.common.rest_client [req-db1c091b-9204-40b9-a65e-2a8a644931c4 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles/72a4576c553448cd941b052c1ca0cf2d 0.126s 2020-12-14 02:13:45.756 197 DEBUG tempest.lib.common.rest_client [req-db1c091b-9204-40b9-a65e-2a8a644931c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db1c091b-9204-40b9-a65e-2a8a644931c4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.767 189 INFO tempest.lib.common.rest_client [req-ef7f6527-52af-4f6f-a43d-cba0a65bf26e ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.132s 2020-12-14 02:13:45.770 189 DEBUG tempest.lib.common.rest_client [req-ef7f6527-52af-4f6f-a43d-cba0a65bf26e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImagesRbacTest-622606806", "password": "S8^yJM4L!!8*xb4", "project_id": "a7e1198b79c9412caba6575e229a167c", "email": "tempest-ImagesRbacTest-407610246@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef7f6527-52af-4f6f-a43d-cba0a65bf26e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "a7e1198b79c9412caba6575e229a167c", "email": "tempest-ImagesRbacTest-407610246@example.com", "id": "5e21fd566d1f4fb9b67bd99640ec5abd", "name": "tempest-ImagesRbacTest-622606806", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/5e21fd566d1f4fb9b67bd99640ec5abd"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.867 193 INFO tempest.lib.common.rest_client [req-d97a4d41-fc9f-4f36-ba5f-fe101977323e ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-14 02:13:45.870 193 DEBUG tempest.lib.common.rest_client [req-d97a4d41-fc9f-4f36-ba5f-fe101977323e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d97a4d41-fc9f-4f36-ba5f-fe101977323e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["9uioYcYJRkaOkK45fD3VaA"], "expires_at": "2020-12-14T03:13:45.000000Z", "issued_at": "2020-12-14T02:13:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.888 189 INFO tempest.lib.common.rest_client [req-78cf48dc-d63f-4fbd-bc74-74b687d46cdb ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.108s 2020-12-14 02:13:45.891 189 DEBUG tempest.lib.common.rest_client [req-78cf48dc-d63f-4fbd-bc74-74b687d46cdb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78cf48dc-d63f-4fbd-bc74-74b687d46cdb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.907 197 INFO tempest.lib.common.rest_client [req-5a347ecb-1c4a-45f5-bd65-0fbbedc66daa ] Request (FlavorExtraSpecsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles/a629c95d64b3416fb80ae90af4f69c05 0.145s 2020-12-14 02:13:45.910 197 DEBUG tempest.lib.common.rest_client [req-5a347ecb-1c4a-45f5-bd65-0fbbedc66daa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a347ecb-1c4a-45f5-bd65-0fbbedc66daa', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.979 193 INFO tempest.lib.common.rest_client [req-22939360-60cb-4534-b800-5b9dc091a99e ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.103s 2020-12-14 02:13:45.981 193 DEBUG tempest.lib.common.rest_client [req-22939360-60cb-4534-b800-5b9dc091a99e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-22939360-60cb-4534-b800-5b9dc091a99e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:45.981 186 INFO tempest.lib.common.rest_client [req-ce6ed600-592f-485d-a5fe-e5b812cd7be9 ] Request (AggregatesRbacTest:_run_cleanups): 404 POST http://172.30.13.94/compute/v2.1/os-aggregates/4556/action 0.559s 2020-12-14 02:13:45.986 186 DEBUG tempest.lib.common.rest_client [req-ce6ed600-592f-485d-a5fe-e5b812cd7be9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"remove_host": {"host": "lf-virtual9"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '94', 'x-openstack-request-id': 'req-ce6ed600-592f-485d-a5fe-e5b812cd7be9', 'x-compute-request-id': 'req-ce6ed600-592f-485d-a5fe-e5b812cd7be9', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/4556/action'} Body: b'{"itemNotFound": {"code": 404, "message": "Cannot remove host lf-virtual9 in aggregate 4556"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.026 189 INFO tempest.lib.common.rest_client [req-af5f5b74-363b-4ce7-bd11-0bf212a2e0a4 ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.128s 2020-12-14 02:13:46.029 189 DEBUG tempest.lib.common.rest_client [req-af5f5b74-363b-4ce7-bd11-0bf212a2e0a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af5f5b74-363b-4ce7-bd11-0bf212a2e0a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.049 193 INFO tempest.lib.common.rest_client [req-42a95e1c-2350-4dfa-a2d1-4a6cdcfc2b39 ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:13:46.052 193 DEBUG tempest.lib.common.rest_client [req-42a95e1c-2350-4dfa-a2d1-4a6cdcfc2b39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42a95e1c-2350-4dfa-a2d1-4a6cdcfc2b39', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.055 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:13:46.057 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:46.065 186 INFO tempest.lib.common.rest_client [req-5ccb6191-0541-4557-b313-9be5f5500fb7 ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/4556 0.068s 2020-12-14 02:13:46.067 186 DEBUG tempest.lib.common.rest_client [req-5ccb6191-0541-4557-b313-9be5f5500fb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5ccb6191-0541-4557-b313-9be5f5500fb7', 'x-compute-request-id': 'req-5ccb6191-0541-4557-b313-9be5f5500fb7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/4556'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.096 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:46.100 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.104 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.107 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.110 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.114 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.118 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.120 189 INFO tempest.lib.common.rest_client [req-8c25076f-27cc-4801-90c2-7f22a1b8a345 ] Request (ImagesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles/72a4576c553448cd941b052c1ca0cf2d 0.082s 2020-12-14 02:13:46.124 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.124 189 DEBUG tempest.lib.common.rest_client [req-8c25076f-27cc-4801-90c2-7f22a1b8a345 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c25076f-27cc-4801-90c2-7f22a1b8a345', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.127 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.127 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesRbacTest-622606806', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a7e1198b79c9412caba6575e229a167c', 'project_name': 'tempest-ImagesRbacTest-622606806', 'tenant_id': 'a7e1198b79c9412caba6575e229a167c', 'tenant_name': 'tempest-ImagesRbacTest-622606806', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5e21fd566d1f4fb9b67bd99640ec5abd'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:46.130 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.130 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesRbacTest-622606806', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a7e1198b79c9412caba6575e229a167c', 'project_name': 'tempest-ImagesRbacTest-622606806', 'tenant_id': 'a7e1198b79c9412caba6575e229a167c', 'tenant_name': 'tempest-ImagesRbacTest-622606806', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5e21fd566d1f4fb9b67bd99640ec5abd'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:46.133 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.136 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.139 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.142 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.144 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.147 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.151 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.154 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.157 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.159 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.162 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.165 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.168 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.171 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.173 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.176 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.179 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.182 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.184 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.187 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.190 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.193 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.196 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.198 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.201 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.204 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.207 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.210 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.213 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.216 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.219 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.222 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.225 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.228 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.232 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.234 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.237 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.240 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.243 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.246 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.248 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.251 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.254 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.257 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.260 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.264 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.266 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.273 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.275 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.278 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.282 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.284 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.287 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.290 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.293 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.296 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.298 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.301 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.304 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.307 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.310 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.313 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:46.318 189 INFO tempest.lib.common.rest_client [req-7b890515-17c7-4c0b-adc3-2beedd7d0b12 ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.116s 2020-12-14 02:13:46.321 189 DEBUG tempest.lib.common.rest_client [req-7b890515-17c7-4c0b-adc3-2beedd7d0b12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6557', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7b890515-17c7-4c0b-adc3-2beedd7d0b12', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5e21fd566d1f4fb9b67bd99640ec5abd", "name": "tempest-ImagesRbacTest-622606806", "password_expires_at": null}, "audit_ids": ["2J5-JlqBRaCJOglEjEzHlQ"], "expires_at": "2020-12-14T03:13:46.000000Z", "issued_at": "2020-12-14T02:13:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a7e1198b79c9412caba6575e229a167c", "name": "tempest-ImagesRbacTest-622606806"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/imag _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.322 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:set_metadata, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:46.370 193 INFO tempest.lib.common.rest_client [req-568425e5-9850-4dbc-a7be-68603c0fff9c ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles 0.307s 2020-12-14 02:13:46.372 193 DEBUG tempest.lib.common.rest_client [req-568425e5-9850-4dbc-a7be-68603c0fff9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-568425e5-9850-4dbc-a7be-68603c0fff9c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.385 189 INFO tempest.lib.common.rest_client [req-1d23f4c4-2af8-4de9-a0d6-bd94cede9d53 ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:13:46.388 189 DEBUG tempest.lib.common.rest_client [req-1d23f4c4-2af8-4de9-a0d6-bd94cede9d53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d23f4c4-2af8-4de9-a0d6-bd94cede9d53', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["u5T-9sohTtGqQZTn1qnN9w"], "expires_at": "2020-12-14T03:13:46.000000Z", "issued_at": "2020-12-14T02:13:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.392 186 INFO tempest.lib.common.rest_client [req-a29358c7-1678-4e0c-bbca-84c9f0a18b83 ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.063s 2020-12-14 02:13:46.395 186 DEBUG tempest.lib.common.rest_client [req-a29358c7-1678-4e0c-bbca-84c9f0a18b83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-1317084922"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '215', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a29358c7-1678-4e0c-bbca-84c9f0a18b83', 'x-compute-request-id': 'req-a29358c7-1678-4e0c-bbca-84c9f0a18b83', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 4557, "name": "tempest-AggregatesRbacTest-aggregate-1317084922", "created_at": "2020-12-14T02:13:46.360630", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.424 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:46.502 186 INFO tempest.lib.common.rest_client [req-d413f136-09b9-4f26-9692-5b32dce29cb1 ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.071s 2020-12-14 02:13:46.505 189 INFO tempest.lib.common.rest_client [req-cd22926f-d5dc-461d-8baa-a6a6988d9d16 ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:13:46.506 186 DEBUG tempest.lib.common.rest_client [req-d413f136-09b9-4f26-9692-5b32dce29cb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d413f136-09b9-4f26-9692-5b32dce29cb1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.508 193 INFO tempest.lib.common.rest_client [req-70b2eb45-18ca-476f-9a53-27d3b5b93ab2 ] Request (QuotaSetsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles/72a4576c553448cd941b052c1ca0cf2d 0.129s 2020-12-14 02:13:46.509 189 DEBUG tempest.lib.common.rest_client [req-cd22926f-d5dc-461d-8baa-a6a6988d9d16 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd22926f-d5dc-461d-8baa-a6a6988d9d16', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["tti0h8idSFCRVjcSzl9kVg"], "expires_at": "2020-12-14T03:13:46.000000Z", "issued_at": "2020-12-14T02:13:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.511 193 DEBUG tempest.lib.common.rest_client [req-70b2eb45-18ca-476f-9a53-27d3b5b93ab2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70b2eb45-18ca-476f-9a53-27d3b5b93ab2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.609 186 INFO tempest.lib.common.rest_client [req-c3cd5c0e-ca76-44ff-b7e8-c10a8ad5ef2d ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:13:46.613 186 DEBUG tempest.lib.common.rest_client [req-c3cd5c0e-ca76-44ff-b7e8-c10a8ad5ef2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c3cd5c0e-ca76-44ff-b7e8-c10a8ad5ef2d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["TI5j6yXjSHyYuMu7YQC_Zg"], "expires_at": "2020-12-14T03:13:46.000000Z", "issued_at": "2020-12-14T02:13:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.626 189 INFO tempest.lib.common.rest_client [req-45e8e30d-e354-4172-8bbc-57fc438e7c58 ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.110s 2020-12-14 02:13:46.629 189 DEBUG tempest.lib.common.rest_client [req-45e8e30d-e354-4172-8bbc-57fc438e7c58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45e8e30d-e354-4172-8bbc-57fc438e7c58', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.643 193 INFO tempest.lib.common.rest_client [req-10f1f891-7594-4ab4-b7c9-0f605b1a5b17 ] Request (QuotaSetsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles/a629c95d64b3416fb80ae90af4f69c05 0.125s 2020-12-14 02:13:46.646 193 DEBUG tempest.lib.common.rest_client [req-10f1f891-7594-4ab4-b7c9-0f605b1a5b17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10f1f891-7594-4ab4-b7c9-0f605b1a5b17', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.742 189 INFO tempest.lib.common.rest_client [req-e9495d5e-07fd-4a06-be46-836a0e048a1f ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.107s 2020-12-14 02:13:46.746 189 DEBUG tempest.lib.common.rest_client [req-e9495d5e-07fd-4a06-be46-836a0e048a1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9495d5e-07fd-4a06-be46-836a0e048a1f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.748 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:13:46.751 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:46.824 189 INFO tempest.lib.common.rest_client [req-c3c0e0f7-206d-4bd3-acc9-814976f29f31 ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles 0.067s 2020-12-14 02:13:46.827 189 DEBUG tempest.lib.common.rest_client [req-c3c0e0f7-206d-4bd3-acc9-814976f29f31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c3c0e0f7-206d-4bd3-acc9-814976f29f31', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.894 186 INFO tempest.lib.common.rest_client [req-c275b1eb-ab3f-4c20-910e-f131e0223a09 ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates/4557/action 0.273s 2020-12-14 02:13:46.898 186 DEBUG tempest.lib.common.rest_client [req-c275b1eb-ab3f-4c20-910e-f131e0223a09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"set_metadata": {"metadata": {"tempest-AggregatesRbacTest-key-1833968113": "tempest-AggregatesRbacTest-val-1821700089"}}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '356', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c275b1eb-ab3f-4c20-910e-f131e0223a09', 'x-compute-request-id': 'req-c275b1eb-ab3f-4c20-910e-f131e0223a09', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/4557/action'} Body: b'{"aggregate": {"id": 4557, "name": "tempest-AggregatesRbacTest-aggregate-1317084922", "hosts": [], "metadata": {"tempest-AggregatesRbacTest-key-1833968113": "tempest-AggregatesRbacTest-val-1821700089"}, "created_at": "2020-12-14T02:13:46.000000", "updated_at": "2020-12-14T02:13:46.881046", "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.910 189 INFO tempest.lib.common.rest_client [req-5512f73e-6f9d-4e90-85cd-8463d63f8fb8 ] Request (ImagesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles/72a4576c553448cd941b052c1ca0cf2d 0.076s 2020-12-14 02:13:46.913 189 DEBUG tempest.lib.common.rest_client [req-5512f73e-6f9d-4e90-85cd-8463d63f8fb8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5512f73e-6f9d-4e90-85cd-8463d63f8fb8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:46.929 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:47.021 197 INFO tempest.lib.common.rest_client [req-333ceadd-b9df-4ff0-a997-ba39dcda3380 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-14 02:13:47.023 197 DEBUG tempest.lib.common.rest_client [req-333ceadd-b9df-4ff0-a997-ba39dcda3380 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-333ceadd-b9df-4ff0-a997-ba39dcda3380', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ef510e52f8894d8baef26dddf289a279", "name": "tempest-FlavorExtraSpecsRbacTest-81596218", "password_expires_at": null}, "audit_ids": ["QrBEFpb3RN68xzGzCYsAUQ"], "expires_at": "2020-12-14T03:13:46.000000Z", "issued_at": "2020-12-14T02:13:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4c07be6d6d244dd2b1627e66a2db2646", "name": "tempest-FlavorExtraSpecsRbacTest-81596218"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:47.033 189 INFO tempest.lib.common.rest_client [req-1a30e8b6-5ae5-4f60-839c-20f4945b105c ] Request (ImagesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles/a629c95d64b3416fb80ae90af4f69c05 0.115s 2020-12-14 02:13:47.035 189 DEBUG tempest.lib.common.rest_client [req-1a30e8b6-5ae5-4f60-839c-20f4945b105c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a30e8b6-5ae5-4f60-839c-20f4945b105c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:47.048 186 INFO tempest.lib.common.rest_client [req-962d2535-f550-469b-837a-77f2f828d849 ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.112s 2020-12-14 02:13:47.051 186 DEBUG tempest.lib.common.rest_client [req-962d2535-f550-469b-837a-77f2f828d849 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-962d2535-f550-469b-837a-77f2f828d849', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:47.152 186 INFO tempest.lib.common.rest_client [req-189e70dd-23dd-4edb-9626-2c739fa13d27 ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:13:47.156 186 DEBUG tempest.lib.common.rest_client [req-189e70dd-23dd-4edb-9626-2c739fa13d27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-189e70dd-23dd-4edb-9626-2c739fa13d27', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["pSxFnKNHTuizHmlhA3qurw"], "expires_at": "2020-12-14T03:13:47.000000Z", "issued_at": "2020-12-14T02:13:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:47.284 186 INFO tempest.lib.common.rest_client [req-9c918f8e-564f-4edd-836c-fdd1ef1525c8 ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/4557 0.118s 2020-12-14 02:13:47.287 186 DEBUG tempest.lib.common.rest_client [req-9c918f8e-564f-4edd-836c-fdd1ef1525c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9c918f8e-564f-4edd-836c-fdd1ef1525c8', 'x-compute-request-id': 'req-9c918f8e-564f-4edd-836c-fdd1ef1525c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/4557'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:47.309 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:47.313 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.317 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.320 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.322 197 INFO tempest.lib.common.rest_client [req-cff8f6d9-1ea5-4b2e-9bb5-7b2618255ce3 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 POST http://172.30.13.94/compute/v2.1/flavors 0.280s 2020-12-14 02:13:47.323 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.325 197 DEBUG tempest.lib.common.rest_client [req-cff8f6d9-1ea5-4b2e-9bb5-7b2618255ce3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"name": "tempest-FlavorExtraSpecsRbacTest-flavor-1877388211", "ram": 3, "vcpus": 9, "disk": 3, "id": "f306977b-75f8-4f2c-9067-8d1311b8956e"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '510', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cff8f6d9-1ea5-4b2e-9bb5-7b2618255ce3', 'x-compute-request-id': 'req-cff8f6d9-1ea5-4b2e-9bb5-7b2618255ce3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors'} Body: b'{"flavor": {"id": "f306977b-75f8-4f2c-9067-8d1311b8956e", "name": "tempest-FlavorExtraSpecsRbacTest-flavor-1877388211", "ram": 3, "disk": 3, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 9, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:47.327 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.331 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.336 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.338 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.341 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.344 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.347 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.350 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.353 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.356 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.359 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.362 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.365 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.368 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.371 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.373 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.376 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.376 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:47.379 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.381 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.382 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.384 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.385 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.387 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.388 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.390 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.391 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.393 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.395 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.395 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.398 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.399 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.401 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.403 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.404 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.406 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.407 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.409 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.410 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.412 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.412 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.415 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.415 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.417 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.418 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.420 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.421 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.423 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.424 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.426 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.427 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.429 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.431 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.432 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.434 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.435 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.437 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.438 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.439 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.441 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.442 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.444 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.445 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.447 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.448 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.450 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.451 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.452 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.453 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.455 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.456 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.458 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.459 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.461 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.462 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.463 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.465 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.466 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.467 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.469 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.470 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.473 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.473 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.476 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.476 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.479 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.482 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.482 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.484 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.484 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.487 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.487 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.490 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.490 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.493 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.493 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.496 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.496 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.499 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.500 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.502 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.502 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.504 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.505 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.507 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.508 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.510 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.512 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.513 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.515 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.516 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.517 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.518 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.520 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.521 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.523 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.526 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.529 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.530 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:47.531 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.534 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.537 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.540 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.544 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.546 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.552 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.555 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.558 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.562 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.564 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.567 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.570 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.573 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.576 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.579 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.581 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.584 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.586 186 INFO tempest.lib.common.rest_client [req-3b834afd-6866-46ac-82a5-9520cc1cbd4a ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.049s 2020-12-14 02:13:47.587 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.590 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.589 186 DEBUG tempest.lib.common.rest_client [req-3b834afd-6866-46ac-82a5-9520cc1cbd4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-845571640"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '214', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3b834afd-6866-46ac-82a5-9520cc1cbd4a', 'x-compute-request-id': 'req-3b834afd-6866-46ac-82a5-9520cc1cbd4a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 4558, "name": "tempest-AggregatesRbacTest-aggregate-845571640", "created_at": "2020-12-14T02:13:47.565462", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:47.593 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.605 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-extra-specs:index, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:47.618 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:47.668 197 INFO tempest.lib.common.rest_client [req-5ab5cbe1-74ba-4fc7-8105-de9c7a30325a ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 200 POST http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs 0.057s 2020-12-14 02:13:47.671 197 DEBUG tempest.lib.common.rest_client [req-5ab5cbe1-74ba-4fc7-8105-de9c7a30325a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-435971349": "tempest-FlavorExtraSpecsRbacTest-val-212203718"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '117', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5ab5cbe1-74ba-4fc7-8105-de9c7a30325a', 'x-compute-request-id': 'req-5ab5cbe1-74ba-4fc7-8105-de9c7a30325a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-435971349": "tempest-FlavorExtraSpecsRbacTest-val-212203718"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:47.686 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:47.751 193 INFO tempest.lib.common.rest_client [req-1bb792a8-ad40-4026-858f-1529b19b30a6 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:13:47.755 193 DEBUG tempest.lib.common.rest_client [req-1bb792a8-ad40-4026-858f-1529b19b30a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1bb792a8-ad40-4026-858f-1529b19b30a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "342f2aba21b542088e86034d6dc206e6", "name": "tempest-QuotaSetsRbacTest-1374196686", "password_expires_at": null}, "audit_ids": ["ZuzntVzxSH-AXyGFdhKXcg"], "expires_at": "2020-12-14T03:13:47.000000Z", "issued_at": "2020-12-14T02:13:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1629f2ea49854d5fa0e9921adfad1cec", "name": "tempest-QuotaSetsRbacTest-1374196686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:47.769 193 WARNING tempest.lib.common.rest_client [-] Deprecated: "tenant_id" property is deprecated for removal, use "project_id" instead 2020-12-14 02:13:47.774 186 INFO tempest.lib.common.rest_client [req-7e93a6dc-04c8-4b20-89f3-59aa0086a9ed ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.150s 2020-12-14 02:13:47.778 186 DEBUG tempest.lib.common.rest_client [req-7e93a6dc-04c8-4b20-89f3-59aa0086a9ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e93a6dc-04c8-4b20-89f3-59aa0086a9ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:47.781 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:47.791 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.794 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.798 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.801 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.805 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.809 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.814 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.817 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.820 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.822 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.824 197 INFO tempest.lib.common.rest_client [req-2b3f5bcd-700a-455a-8949-1095001c1776 ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles 0.132s 2020-12-14 02:13:47.825 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.827 197 DEBUG tempest.lib.common.rest_client [req-2b3f5bcd-700a-455a-8949-1095001c1776 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b3f5bcd-700a-455a-8949-1095001c1776', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:47.828 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.831 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.834 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.837 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.841 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.843 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.846 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.849 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.852 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.854 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.857 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.860 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.863 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.866 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.868 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.871 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.874 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.876 186 INFO tempest.lib.common.rest_client [req-85ea1144-2e7a-48be-8b2e-8f66b0237eb3 ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:13:47.877 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.879 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.880 186 DEBUG tempest.lib.common.rest_client [req-85ea1144-2e7a-48be-8b2e-8f66b0237eb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85ea1144-2e7a-48be-8b2e-8f66b0237eb3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["XoA2YgOWS-a8RDc1-aKZNA"], "expires_at": "2020-12-14T03:13:47.000000Z", "issued_at": "2020-12-14T02:13:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:47.882 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.885 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.888 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.890 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.893 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.896 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.899 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.902 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.905 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.908 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.911 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.913 197 INFO tempest.lib.common.rest_client [req-78249577-ec2c-43a3-a457-4fcf2d53cda4 ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-12-14 02:13:47.913 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.915 197 DEBUG tempest.lib.common.rest_client [req-78249577-ec2c-43a3-a457-4fcf2d53cda4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78249577-ec2c-43a3-a457-4fcf2d53cda4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ef510e52f8894d8baef26dddf289a279", "name": "tempest-FlavorExtraSpecsRbacTest-81596218", "password_expires_at": null}, "audit_ids": ["L3SWSwBWQw2cMPYKcpIl5g"], "expires_at": "2020-12-14T03:13:47.000000Z", "issued_at": "2020-12-14T02:13:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4c07be6d6d244dd2b1627e66a2db2646", "name": "tempest-FlavorExtraSpecsRbacTest-81596218"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:47.916 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.920 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.922 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.925 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.928 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.931 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.933 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.936 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.939 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.941 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.944 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.947 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.950 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.953 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.959 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.961 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.964 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.967 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.970 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.973 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.976 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.978 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.981 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.984 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.986 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.989 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.992 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.995 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:47.997 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.006 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-sets:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:48.034 186 INFO tempest.lib.common.rest_client [req-bb0e5b3f-4dc3-423a-82a5-83887ee1d0fb ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 200 GET http://172.30.13.94/compute/v2.1/os-aggregates/4558 0.146s 2020-12-14 02:13:48.038 186 DEBUG tempest.lib.common.rest_client [req-bb0e5b3f-4dc3-423a-82a5-83887ee1d0fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '243', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bb0e5b3f-4dc3-423a-82a5-83887ee1d0fb', 'x-compute-request-id': 'req-bb0e5b3f-4dc3-423a-82a5-83887ee1d0fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/4558'} Body: b'{"aggregate": {"id": 4558, "name": "tempest-AggregatesRbacTest-aggregate-845571640", "hosts": [], "metadata": {}, "created_at": "2020-12-14T02:13:48.000000", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.068 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:48.082 197 INFO tempest.lib.common.rest_client [req-7b45af7e-1398-4c55-a0f9-d74eaca48de1 ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 200 GET http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs 0.159s 2020-12-14 02:13:48.086 197 DEBUG tempest.lib.common.rest_client [req-7b45af7e-1398-4c55-a0f9-d74eaca48de1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '117', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7b45af7e-1398-4c55-a0f9-d74eaca48de1', 'x-compute-request-id': 'req-7b45af7e-1398-4c55-a0f9-d74eaca48de1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-435971349": "tempest-FlavorExtraSpecsRbacTest-val-212203718"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.099 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:48.142 189 INFO tempest.lib.common.rest_client [req-ac536fe3-60ce-40a3-8fb4-31396bbd2309 ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:13:48.145 189 DEBUG tempest.lib.common.rest_client [req-ac536fe3-60ce-40a3-8fb4-31396bbd2309 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac536fe3-60ce-40a3-8fb4-31396bbd2309', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5e21fd566d1f4fb9b67bd99640ec5abd", "name": "tempest-ImagesRbacTest-622606806", "password_expires_at": null}, "audit_ids": ["WLEojppURMeXhHxgrdJVag"], "expires_at": "2020-12-14T03:13:48.000000Z", "issued_at": "2020-12-14T02:13:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a7e1198b79c9412caba6575e229a167c", "name": "tempest-ImagesRbacTest-622606806"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.187 186 INFO tempest.lib.common.rest_client [req-6848bd47-584f-457d-bc26-97300076a1a8 ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.112s 2020-12-14 02:13:48.190 186 DEBUG tempest.lib.common.rest_client [req-6848bd47-584f-457d-bc26-97300076a1a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6848bd47-584f-457d-bc26-97300076a1a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.190 193 INFO tempest.lib.common.rest_client [req-9b477b83-9e69-49ce-8983-8afc52fbbacc ] Request (QuotaSetsRbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.176s 2020-12-14 02:13:48.195 193 DEBUG tempest.lib.common.rest_client [req-9b477b83-9e69-49ce-8983-8afc52fbbacc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b477b83-9e69-49ce-8983-8afc52fbbacc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.223 197 INFO tempest.lib.common.rest_client [req-318e0050-6857-4860-951b-e68de7cbf023 ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles 0.117s 2020-12-14 02:13:48.227 197 DEBUG tempest.lib.common.rest_client [req-318e0050-6857-4860-951b-e68de7cbf023 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-318e0050-6857-4860-951b-e68de7cbf023', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.243 186 INFO tempest.lib.common.rest_client [req-cf72b111-db8a-42a1-a38d-6a82531d03f9 ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:13:48.247 186 DEBUG tempest.lib.common.rest_client [req-cf72b111-db8a-42a1-a38d-6a82531d03f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf72b111-db8a-42a1-a38d-6a82531d03f9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["vTJnsT16Qpy9uLEXyPN3ew"], "expires_at": "2020-12-14T03:13:48.000000Z", "issued_at": "2020-12-14T02:13:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.270 193 INFO tempest.lib.common.rest_client [req-d5560146-7a1d-413d-87a5-76db3dffcb93 ] Request (QuotaSetsRbacTest:test_delete_quota_set): 201 POST http://172.30.13.94/identity/v3/projects 0.069s 2020-12-14 02:13:48.272 193 DEBUG tempest.lib.common.rest_client [req-d5560146-7a1d-413d-87a5-76db3dffcb93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaSetsRbacTest-1940238329-desc", "domain_id": "default", "name": "tempest-QuotaSetsRbacTest-1940238329"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5560146-7a1d-413d-87a5-76db3dffcb93', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "8cadfec3f18348c1bf65743f6b18b3ad", "name": "tempest-QuotaSetsRbacTest-1940238329", "domain_id": "default", "description": "tempest-QuotaSetsRbacTest-1940238329-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/8cadfec3f18348c1bf65743f6b18b3ad"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.274 197 INFO tempest.lib.common.rest_client [req-d5347882-bdf7-42e8-8558-ce394689dffe ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:13:48.277 197 DEBUG tempest.lib.common.rest_client [req-d5347882-bdf7-42e8-8558-ce394689dffe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5347882-bdf7-42e8-8558-ce394689dffe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ef510e52f8894d8baef26dddf289a279", "name": "tempest-FlavorExtraSpecsRbacTest-81596218", "password_expires_at": null}, "audit_ids": ["ftDbefZeRGCA1TJ6SCACZQ"], "expires_at": "2020-12-14T03:13:48.000000Z", "issued_at": "2020-12-14T02:13:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4c07be6d6d244dd2b1627e66a2db2646", "name": "tempest-FlavorExtraSpecsRbacTest-81596218"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.313 189 INFO tempest.lib.common.rest_client [req-3e12fdf0-1780-4245-add2-067c163442e3 ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/image/v2/images 0.155s 2020-12-14 02:13:48.316 189 DEBUG tempest.lib.common.rest_client [req-3e12fdf0-1780-4245-add2-067c163442e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesRbacTest-image-2027337052"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '643', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/3281175d-0c13-4afa-8011-7117ce65bf7d', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-3e12fdf0-1780-4245-add2-067c163442e3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesRbacTest-image-2027337052", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "a7e1198b79c9412caba6575e229a167c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "3281175d-0c13-4afa-8011-7117ce65bf7d", "created_at": "2020-12-14T02:13:48Z", "updated_at": "2020-12-14T02:13:48Z", "tags": [], "self": "/v2/images/3281175d-0c13-4afa-8011-7117ce65bf7d", "file": "/v2/images/3281175d-0c13-4afa-8011-7117ce65bf7d/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.323 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:48.365 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.373 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:48.389 193 INFO tempest.lib.common.rest_client [req-102270e5-34f3-4202-bd31-440756c8ddee ] Request (QuotaSetsRbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.111s 2020-12-14 02:13:48.391 193 DEBUG tempest.lib.common.rest_client [req-102270e5-34f3-4202-bd31-440756c8ddee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-102270e5-34f3-4202-bd31-440756c8ddee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.395 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:48.427 189 INFO tempest.lib.common.rest_client [req-80ae6289-8969-43bf-83e4-a0cdd8bca926 ] Request (ImagesRbacTest:test_delete_image): 201 POST http://172.30.13.94/image/v2/images 0.049s 2020-12-14 02:13:48.429 189 DEBUG tempest.lib.common.rest_client [req-80ae6289-8969-43bf-83e4-a0cdd8bca926 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesRbacTest-image-804074827"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '642', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/80dd1534-c90a-4992-8ac4-0f680abefa60', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-80ae6289-8969-43bf-83e4-a0cdd8bca926', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesRbacTest-image-804074827", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "a7e1198b79c9412caba6575e229a167c", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "80dd1534-c90a-4992-8ac4-0f680abefa60", "created_at": "2020-12-14T02:13:48Z", "updated_at": "2020-12-14T02:13:48Z", "tags": [], "self": "/v2/images/80dd1534-c90a-4992-8ac4-0f680abefa60", "file": "/v2/images/80dd1534-c90a-4992-8ac4-0f680abefa60/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.432 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:48.473 186 INFO tempest.lib.common.rest_client [req-c8f81cf7-6e19-4506-b5c3-dec0cacceacd ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/4558 0.214s 2020-12-14 02:13:48.475 186 DEBUG tempest.lib.common.rest_client [req-c8f81cf7-6e19-4506-b5c3-dec0cacceacd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c8f81cf7-6e19-4506-b5c3-dec0cacceacd', 'x-compute-request-id': 'req-c8f81cf7-6e19-4506-b5c3-dec0cacceacd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/4558'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.502 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:48.508 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.510 197 INFO tempest.lib.common.rest_client [req-87f957f6-c627-46d9-a43c-60f4756a14ae ] Request (FlavorExtraSpecsRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-435971349 0.224s 2020-12-14 02:13:48.513 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.513 197 DEBUG tempest.lib.common.rest_client [req-87f957f6-c627-46d9-a43c-60f4756a14ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-87f957f6-c627-46d9-a43c-60f4756a14ae', 'x-compute-request-id': 'req-87f957f6-c627-46d9-a43c-60f4756a14ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-435971349'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.517 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.521 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.526 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.526 193 INFO tempest.lib.common.rest_client [req-ae65b2c2-f7d9-45af-8a16-99ad7ae653ca ] Request (QuotaSetsRbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles 0.123s 2020-12-14 02:13:48.529 193 DEBUG tempest.lib.common.rest_client [req-ae65b2c2-f7d9-45af-8a16-99ad7ae653ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae65b2c2-f7d9-45af-8a16-99ad7ae653ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.531 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.536 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.539 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.542 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.545 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.547 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:48.547 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.550 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.551 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.550 189 INFO tempest.lib.common.rest_client [req-b12753ec-9617-47e8-b5d3-ff4b33d7682f ] Request (ImagesRbacTest:test_delete_image): 200 GET http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles 0.111s 2020-12-14 02:13:48.553 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.554 189 DEBUG tempest.lib.common.rest_client [req-b12753ec-9617-47e8-b5d3-ff4b33d7682f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b12753ec-9617-47e8-b5d3-ff4b33d7682f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.555 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.556 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.558 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.559 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.562 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.562 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.565 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.566 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.568 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.569 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.571 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.573 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.574 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.576 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.577 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.579 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.580 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.581 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.582 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.584 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.585 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.587 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.588 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.589 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.591 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.592 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.594 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.595 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.597 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.597 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.600 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.600 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.603 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.603 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.605 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.606 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.608 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.609 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.611 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.611 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.614 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.614 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.616 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.617 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.619 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.620 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.620 193 INFO tempest.lib.common.rest_client [req-98dbf9d4-6234-4a05-8b7a-126f3350e69f ] Request (QuotaSetsRbacTest:test_delete_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-14 02:13:48.622 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.622 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.623 193 DEBUG tempest.lib.common.rest_client [req-98dbf9d4-6234-4a05-8b7a-126f3350e69f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98dbf9d4-6234-4a05-8b7a-126f3350e69f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "342f2aba21b542088e86034d6dc206e6", "name": "tempest-QuotaSetsRbacTest-1374196686", "password_expires_at": null}, "audit_ids": ["X4o4HzXMRIeZoBNEn7rYPA"], "expires_at": "2020-12-14T03:13:48.000000Z", "issued_at": "2020-12-14T02:13:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1629f2ea49854d5fa0e9921adfad1cec", "name": "tempest-QuotaSetsRbacTest-1374196686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.625 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.625 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.628 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.628 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.630 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.631 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.633 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.634 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.636 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.636 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.639 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.640 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.641 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.642 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.644 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.645 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.647 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.648 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.650 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.651 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.653 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.653 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.655 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.656 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.658 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.659 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.660 189 INFO tempest.lib.common.rest_client [req-c8ebbf56-fa05-4aff-94a3-f0379b1cba8b ] Request (ImagesRbacTest:test_delete_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:13:48.661 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.662 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.664 189 DEBUG tempest.lib.common.rest_client [req-c8ebbf56-fa05-4aff-94a3-f0379b1cba8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8ebbf56-fa05-4aff-94a3-f0379b1cba8b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5e21fd566d1f4fb9b67bd99640ec5abd", "name": "tempest-ImagesRbacTest-622606806", "password_expires_at": null}, "audit_ids": ["3brKTxtSRfioxaYKz4sNyg"], "expires_at": "2020-12-14T03:13:48.000000Z", "issued_at": "2020-12-14T02:13:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a7e1198b79c9412caba6575e229a167c", "name": "tempest-ImagesRbacTest-622606806"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.664 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.664 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.667 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.668 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.670 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.671 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.673 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.674 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.676 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.679 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.680 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.682 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.682 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.685 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.685 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.688 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.688 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.690 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.691 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.693 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.694 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.696 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.697 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.699 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.699 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.701 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.702 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.704 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.705 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.707 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.708 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.710 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.711 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.713 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.714 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.716 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.719 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.720 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.722 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.724 193 INFO tempest.lib.common.rest_client [req-bb4cf5e1-83eb-4ac0-b5a0-cde796b138d6 ] Request (QuotaSetsRbacTest:test_delete_quota_set): 202 DELETE http://172.30.13.94/compute/v2.1/os-quota-sets/8cadfec3f18348c1bf65743f6b18b3ad 0.094s 2020-12-14 02:13:48.725 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.727 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:update, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:48.728 193 DEBUG tempest.lib.common.rest_client [req-bb4cf5e1-83eb-4ac0-b5a0-cde796b138d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bb4cf5e1-83eb-4ac0-b5a0-cde796b138d6', 'x-compute-request-id': 'req-bb4cf5e1-83eb-4ac0-b5a0-cde796b138d6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/8cadfec3f18348c1bf65743f6b18b3ad'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.728 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.730 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:48.731 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.734 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.737 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.739 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.744 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.748 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.752 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.757 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.761 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.766 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.770 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:48.782 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-extra-specs:create, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:48.784 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:48.803 186 INFO tempest.lib.common.rest_client [req-1fe755b1-72b3-4be9-84e3-e0e718d5a433 ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.069s 2020-12-14 02:13:48.803 193 INFO tempest.lib.common.rest_client [req-c49aaeb7-373d-4666-8df2-19f9b7d5417f ] Request (QuotaSetsRbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles 0.067s 2020-12-14 02:13:48.806 186 DEBUG tempest.lib.common.rest_client [req-1fe755b1-72b3-4be9-84e3-e0e718d5a433 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-4756971"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '212', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1fe755b1-72b3-4be9-84e3-e0e718d5a433', 'x-compute-request-id': 'req-1fe755b1-72b3-4be9-84e3-e0e718d5a433', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 4559, "name": "tempest-AggregatesRbacTest-aggregate-4756971", "created_at": "2020-12-14T02:13:48.772697", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.806 193 DEBUG tempest.lib.common.rest_client [req-c49aaeb7-373d-4666-8df2-19f9b7d5417f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c49aaeb7-373d-4666-8df2-19f9b7d5417f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.835 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:48.848 189 INFO tempest.lib.common.rest_client [req-cee358f8-4978-4450-8869-6db3df7d9ac7 ] Request (ImagesRbacTest:test_delete_image): 204 DELETE http://172.30.13.94/compute/v2.1/images/80dd1534-c90a-4992-8ac4-0f680abefa60 0.177s 2020-12-14 02:13:48.851 189 DEBUG tempest.lib.common.rest_client [req-cee358f8-4978-4450-8869-6db3df7d9ac7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cee358f8-4978-4450-8869-6db3df7d9ac7', 'x-compute-request-id': 'req-cee358f8-4978-4450-8869-6db3df7d9ac7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/80dd1534-c90a-4992-8ac4-0f680abefa60'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.854 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:48.861 193 INFO tempest.lib.common.rest_client [req-24e24aa7-7d66-46e4-b956-500d7220b947 ] Request (QuotaSetsRbacTest:test_delete_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:13:48.864 193 DEBUG tempest.lib.common.rest_client [req-24e24aa7-7d66-46e4-b956-500d7220b947 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24e24aa7-7d66-46e4-b956-500d7220b947', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "342f2aba21b542088e86034d6dc206e6", "name": "tempest-QuotaSetsRbacTest-1374196686", "password_expires_at": null}, "audit_ids": ["VWUJ3q6TSi6QvqC9CxpFFQ"], "expires_at": "2020-12-14T03:13:48.000000Z", "issued_at": "2020-12-14T02:13:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1629f2ea49854d5fa0e9921adfad1cec", "name": "tempest-QuotaSetsRbacTest-1374196686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.865 197 INFO tempest.lib.common.rest_client [req-7e562285-afa5-4f5c-9670-ed41d9546331 ] Request (FlavorExtraSpecsRbacTest:test_set_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles 0.071s 2020-12-14 02:13:48.868 197 DEBUG tempest.lib.common.rest_client [req-7e562285-afa5-4f5c-9670-ed41d9546331 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e562285-afa5-4f5c-9670-ed41d9546331', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.909 186 INFO tempest.lib.common.rest_client [req-928450ef-e145-4966-98e5-0d144ac49882 ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.067s 2020-12-14 02:13:48.913 186 DEBUG tempest.lib.common.rest_client [req-928450ef-e145-4966-98e5-0d144ac49882 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-928450ef-e145-4966-98e5-0d144ac49882', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.920 197 INFO tempest.lib.common.rest_client [req-6275c4c0-8c07-4283-89c5-ef78587aad54 ] Request (FlavorExtraSpecsRbacTest:test_set_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:13:48.925 197 DEBUG tempest.lib.common.rest_client [req-6275c4c0-8c07-4283-89c5-ef78587aad54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6275c4c0-8c07-4283-89c5-ef78587aad54', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ef510e52f8894d8baef26dddf289a279", "name": "tempest-FlavorExtraSpecsRbacTest-81596218", "password_expires_at": null}, "audit_ids": ["jtrMtsaFS1emIViCrLPlEA"], "expires_at": "2020-12-14T03:13:48.000000Z", "issued_at": "2020-12-14T02:13:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4c07be6d6d244dd2b1627e66a2db2646", "name": "tempest-FlavorExtraSpecsRbacTest-81596218"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:48.929 189 INFO tempest.lib.common.rest_client [req-61fd0949-47cc-4495-b4e5-ddaba1560372 ] Request (ImagesRbacTest:test_delete_image): 200 GET http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles 0.069s 2020-12-14 02:13:48.932 189 DEBUG tempest.lib.common.rest_client [req-61fd0949-47cc-4495-b4e5-ddaba1560372 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61fd0949-47cc-4495-b4e5-ddaba1560372', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.008 193 INFO tempest.lib.common.rest_client [req-2b4ce444-1a6f-490c-8138-a7fab98762a9 ] Request (QuotaSetsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/identity/v3/projects/8cadfec3f18348c1bf65743f6b18b3ad 0.133s 2020-12-14 02:13:49.010 193 DEBUG tempest.lib.common.rest_client [req-2b4ce444-1a6f-490c-8138-a7fab98762a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b4ce444-1a6f-490c-8138-a7fab98762a9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/8cadfec3f18348c1bf65743f6b18b3ad'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.018 186 INFO tempest.lib.common.rest_client [req-21df3389-ffab-4b11-9f12-2bf6bca4ecc0 ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:13:49.022 186 DEBUG tempest.lib.common.rest_client [req-21df3389-ffab-4b11-9f12-2bf6bca4ecc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21df3389-ffab-4b11-9f12-2bf6bca4ecc0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["aNh1wZUXTLa6dlQ4aVdiHw"], "expires_at": "2020-12-14T03:13:48.000000Z", "issued_at": "2020-12-14T02:13:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.037 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:49.041 189 INFO tempest.lib.common.rest_client [req-cc607866-59fa-4bf6-beb8-33ab07457475 ] Request (ImagesRbacTest:test_delete_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:13:49.042 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.045 189 DEBUG tempest.lib.common.rest_client [req-cc607866-59fa-4bf6-beb8-33ab07457475 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cc607866-59fa-4bf6-beb8-33ab07457475', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5e21fd566d1f4fb9b67bd99640ec5abd", "name": "tempest-ImagesRbacTest-622606806", "password_expires_at": null}, "audit_ids": ["E6MjZuZ8SByFgBaah3CS6w"], "expires_at": "2020-12-14T03:13:48.000000Z", "issued_at": "2020-12-14T02:13:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a7e1198b79c9412caba6575e229a167c", "name": "tempest-ImagesRbacTest-622606806"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.045 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.049 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.052 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.056 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.059 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.064 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.067 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.070 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.072 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.075 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.078 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.081 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.083 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.086 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.090 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.092 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.095 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.098 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.100 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.103 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.106 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.108 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.111 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.114 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.116 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.119 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.122 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.125 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.128 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.131 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.134 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.136 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.139 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.142 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.145 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.147 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.150 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.154 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.157 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.157 186 INFO tempest.lib.common.rest_client [req-34607a97-3748-4a06-9cfd-a0f8b5a4a1b1 ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 200 PUT http://172.30.13.94/compute/v2.1/os-aggregates/4559 0.127s 2020-12-14 02:13:49.160 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.160 186 DEBUG tempest.lib.common.rest_client [req-34607a97-3748-4a06-9cfd-a0f8b5a4a1b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-6044285"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '265', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-34607a97-3748-4a06-9cfd-a0f8b5a4a1b1', 'x-compute-request-id': 'req-34607a97-3748-4a06-9cfd-a0f8b5a4a1b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/4559'} Body: b'{"aggregate": {"id": 4559, "name": "tempest-AggregatesRbacTest-aggregate-6044285", "hosts": [], "metadata": {}, "created_at": "2020-12-14T02:13:49.000000", "updated_at": "2020-12-14T02:13:49.124156", "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.163 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.166 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.169 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.172 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.175 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.176 197 INFO tempest.lib.common.rest_client [req-1b6a022f-6dfd-459a-9ec2-53d5ab346b14 ] Request (FlavorExtraSpecsRbacTest:test_set_flavor_extra_spec): 200 POST http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs 0.242s 2020-12-14 02:13:49.178 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.179 197 DEBUG tempest.lib.common.rest_client [req-1b6a022f-6dfd-459a-9ec2-53d5ab346b14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-1860728556": "tempest-FlavorExtraSpecsRbacTest-val-258304842"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '118', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1b6a022f-6dfd-459a-9ec2-53d5ab346b14', 'x-compute-request-id': 'req-1b6a022f-6dfd-459a-9ec2-53d5ab346b14', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-1860728556": "tempest-FlavorExtraSpecsRbacTest-val-258304842"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.180 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.182 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.184 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.187 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.189 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.191 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.192 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:49.193 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.195 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:49.196 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.197 189 INFO tempest.lib.common.rest_client [req-bd0d7838-a168-4025-81c6-0c0a84905014 ] Request (ImagesRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/image/v2/images/80dd1534-c90a-4992-8ac4-0f680abefa60 0.142s 2020-12-14 02:13:49.198 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.200 189 DEBUG tempest.lib.common.rest_client [req-bd0d7838-a168-4025-81c6-0c0a84905014 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '147', 'content-type': 'application/json', 'x-openstack-request-id': 'req-bd0d7838-a168-4025-81c6-0c0a84905014', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/80dd1534-c90a-4992-8ac4-0f680abefa60'} Body: b'{"message": "Failed to find image 80dd1534-c90a-4992-8ac4-0f680abefa60 to delete

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.203 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.205 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.207 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.210 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.212 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.214 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:49.214 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.218 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.217 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.221 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.225 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.227 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_images, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:49.229 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.229 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:49.232 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.236 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.240 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.244 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.248 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.253 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-sets:defaults, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:49.256 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:49.315 197 INFO tempest.lib.common.rest_client [req-fc09ae3c-cbe8-4815-b37c-aee92ee4ae48 ] Request (FlavorExtraSpecsRbacTest:test_set_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles 0.114s 2020-12-14 02:13:49.319 197 DEBUG tempest.lib.common.rest_client [req-fc09ae3c-cbe8-4815-b37c-aee92ee4ae48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc09ae3c-cbe8-4815-b37c-aee92ee4ae48', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.333 186 INFO tempest.lib.common.rest_client [req-81563004-25a1-4dc7-95af-a97a2c70542b ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles 0.134s 2020-12-14 02:13:49.336 186 DEBUG tempest.lib.common.rest_client [req-81563004-25a1-4dc7-95af-a97a2c70542b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81563004-25a1-4dc7-95af-a97a2c70542b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba/users/e4d29d96d56f494bbee1298d2052ce15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.344 193 INFO tempest.lib.common.rest_client [req-f65b6d90-915c-4c7d-9fa5-8ffd5695d03d ] Request (QuotaSetsRbacTest:test_show_default_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles 0.081s 2020-12-14 02:13:49.346 189 INFO tempest.lib.common.rest_client [req-cadfe643-8ea2-45f5-9cb9-9c51a410c7a3 ] Request (ImagesRbacTest:test_list_images): 200 GET http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles 0.111s 2020-12-14 02:13:49.347 193 DEBUG tempest.lib.common.rest_client [req-f65b6d90-915c-4c7d-9fa5-8ffd5695d03d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f65b6d90-915c-4c7d-9fa5-8ffd5695d03d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.349 189 DEBUG tempest.lib.common.rest_client [req-cadfe643-8ea2-45f5-9cb9-9c51a410c7a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cadfe643-8ea2-45f5-9cb9-9c51a410c7a3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.371 197 INFO tempest.lib.common.rest_client [req-08e5020d-8c61-45a7-981a-e70b841ec180 ] Request (FlavorExtraSpecsRbacTest:test_set_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:13:49.374 197 DEBUG tempest.lib.common.rest_client [req-08e5020d-8c61-45a7-981a-e70b841ec180 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-08e5020d-8c61-45a7-981a-e70b841ec180', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ef510e52f8894d8baef26dddf289a279", "name": "tempest-FlavorExtraSpecsRbacTest-81596218", "password_expires_at": null}, "audit_ids": ["BSTg_RpjRhuDSJrjxtFYUQ"], "expires_at": "2020-12-14T03:13:49.000000Z", "issued_at": "2020-12-14T02:13:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4c07be6d6d244dd2b1627e66a2db2646", "name": "tempest-FlavorExtraSpecsRbacTest-81596218"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.386 186 INFO tempest.lib.common.rest_client [req-231602a3-6f73-42b4-973c-0cc66255d6af ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:13:49.390 186 DEBUG tempest.lib.common.rest_client [req-231602a3-6f73-42b4-973c-0cc66255d6af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-231602a3-6f73-42b4-973c-0cc66255d6af', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4d29d96d56f494bbee1298d2052ce15", "name": "tempest-AggregatesRbacTest-268111082", "password_expires_at": null}, "audit_ids": ["fqvIa64RTQiMuJc10SZPNA"], "expires_at": "2020-12-14T03:13:49.000000Z", "issued_at": "2020-12-14T02:13:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7a204ba22ab84c0dbcf942d8815627ba", "name": "tempest-AggregatesRbacTest-268111082"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7a204ba22ab84c0dbcf942d8815627ba", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.400 189 INFO tempest.lib.common.rest_client [req-6baaaec1-b19d-4f5b-8214-204215db38d6 ] Request (ImagesRbacTest:test_list_images): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:13:49.404 189 DEBUG tempest.lib.common.rest_client [req-6baaaec1-b19d-4f5b-8214-204215db38d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6baaaec1-b19d-4f5b-8214-204215db38d6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5e21fd566d1f4fb9b67bd99640ec5abd", "name": "tempest-ImagesRbacTest-622606806", "password_expires_at": null}, "audit_ids": ["NDe9zZ-fROePUd_Zr-XvgQ"], "expires_at": "2020-12-14T03:13:49.000000Z", "issued_at": "2020-12-14T02:13:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a7e1198b79c9412caba6575e229a167c", "name": "tempest-ImagesRbacTest-622606806"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.442 193 INFO tempest.lib.common.rest_client [req-d7382137-7c66-4560-a2f0-e120fdc3ade0 ] Request (QuotaSetsRbacTest:test_show_default_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:13:49.446 193 DEBUG tempest.lib.common.rest_client [req-d7382137-7c66-4560-a2f0-e120fdc3ade0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d7382137-7c66-4560-a2f0-e120fdc3ade0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "342f2aba21b542088e86034d6dc206e6", "name": "tempest-QuotaSetsRbacTest-1374196686", "password_expires_at": null}, "audit_ids": ["VBH3BdhFTjihyiV_nw_zyA"], "expires_at": "2020-12-14T03:13:49.000000Z", "issued_at": "2020-12-14T02:13:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1629f2ea49854d5fa0e9921adfad1cec", "name": "tempest-QuotaSetsRbacTest-1374196686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.501 197 INFO tempest.lib.common.rest_client [req-3506f196-817a-4d25-83f3-7c219a8cb93e ] Request (FlavorExtraSpecsRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-1860728556 0.118s 2020-12-14 02:13:49.504 197 DEBUG tempest.lib.common.rest_client [req-3506f196-817a-4d25-83f3-7c219a8cb93e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3506f196-817a-4d25-83f3-7c219a8cb93e', 'x-compute-request-id': 'req-3506f196-817a-4d25-83f3-7c219a8cb93e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-1860728556'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.504 186 INFO tempest.lib.common.rest_client [req-a66867ec-8e71-41e5-aaaa-efbcbabf9b96 ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/4559 0.104s 2020-12-14 02:13:49.506 186 DEBUG tempest.lib.common.rest_client [req-a66867ec-8e71-41e5-aaaa-efbcbabf9b96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a66867ec-8e71-41e5-aaaa-efbcbabf9b96', 'x-compute-request-id': 'req-a66867ec-8e71-41e5-aaaa-efbcbabf9b96', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/4559'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.566 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:49.570 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.574 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.577 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.580 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.584 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.588 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.593 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.596 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.596 189 INFO tempest.lib.common.rest_client [req-5cd83e61-78b5-43fb-a5c5-12f34913c72b ] Request (ImagesRbacTest:test_list_images): 200 GET http://172.30.13.94/compute/v2.1/images 0.184s 2020-12-14 02:13:49.598 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.598 189 DEBUG tempest.lib.common.rest_client [req-5cd83e61-78b5-43fb-a5c5-12f34913c72b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '4755', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5cd83e61-78b5-43fb-a5c5-12f34913c72b', 'x-compute-request-id': 'req-5cd83e61-78b5-43fb-a5c5-12f34913c72b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images'} Body: b'{"images": [{"id": "3281175d-0c13-4afa-8011-7117ce65bf7d", "name": "tempest-ImagesRbacTest-image-2027337052", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/3281175d-0c13-4afa-8011-7117ce65bf7d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/3281175d-0c13-4afa-8011-7117ce65bf7d"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/3281175d-0c13-4afa-8011-7117ce65bf7d"}]}, {"id": "458c165e-1594-40fd-a92a-ce6fd4a85db4", "name": "patrole_reader-img_alt_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/458c165e-1594-40fd-a92a-ce6fd4a85db4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/458c165e-1594-40fd-a92a-ce6fd4a85db4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/458c165e-1594-40fd-a92a-ce6fd4a85db4"}]}, {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "name": "patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/cd332004-33aa-4c81-9e50-54766a6df097"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, {"id": "d1a1a45a-4ff5-407f-8dc3-652d043802c7", "name": "patrole_member-img_alt_c7a2fe1e-65f4-45d7-bab1-5c456aa6e4d6", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/d1a1a45a-4ff5-407f-8dc3-652d043802c7"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/d1a1a45a-4ff5-407f-8dc3-652d043802c7"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/d1a1a45a-4ff5-407f-8dc3-652d043802c7"}]}, {"id": "f9ea473c-11ca-42fc-8822-2245e1be1239", "name": "patrole_member-img_c7a2fe1e-65f4-45d7-bab1-5c456aa6e4d6", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/f9ea473c-11ca-42fc-8822-2245e1be1239"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/f9ea473c-11ca-42fc-8822-2245e1be1239"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/f9ea473c-11ca-42fc-8822-2245e1be1239"}]}, {"id": "dce7d4a7-fb50-428d-8d25-2165b4fadf07", "name": "tempest_slow-img_alt_85214e35-2aab-4294-9a48-45b27036dd9f", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/dce7d4a7-fb50-428d-8d25-2165b4fadf07"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dce7d4a7-fb50-428d-8d25-2165b4fadf07"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/dce7d4a7-fb50-428d-8d25-2165b4fadf07"}]}, {"id": "376dbc58-0ba1-441a-afe9-cf0b703c7011", "name": "tempest_slow-img_85214e35-2aab-4294-9a48-45b27036dd9f", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/376dbc58-0ba1-441a-afe9-cf0b703c7011"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/376dbc58-0ba1-441a-afe9-cf0b703c7011"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/376dbc58-0ba1-441a-afe9-cf0b703c7011"}]}, {"id": "baeb7e76-01f2-444a-bfb0-5715c5fc53f5", "name": "rally_full-img_8a0926b1-7dc8-420c-9bd4-67b88c62abef", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/baeb7e76-01f2-444a-bfb0-5715c5fc53f5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/baeb7e76-01f2-444a-bfb0-5715c5fc53f5"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/baeb7e76-01f2-444a-bfb0-5715c5fc53f5"}]}, {"id": "70a7dd5d-fc3c-401c-994c-cdb25660a12f", "name": "Fedora-Cloud-Base-31-1.9.x86_64", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/70a7dd5d-fc3c-401c-994c-cdb25660a12f"}, {"rel": "bookmark", "href": "http://172.3 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.601 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.604 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.604 193 INFO tempest.lib.common.rest_client [req-12376686-a71f-4e69-8927-34dc59e962db ] Request (QuotaSetsRbacTest:test_show_default_quota_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-sets/1629f2ea49854d5fa0e9921adfad1cec/defaults 0.150s 2020-12-14 02:13:49.606 193 DEBUG tempest.lib.common.rest_client [req-12376686-a71f-4e69-8927-34dc59e962db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '371', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-12376686-a71f-4e69-8927-34dc59e962db', 'x-compute-request-id': 'req-12376686-a71f-4e69-8927-34dc59e962db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/1629f2ea49854d5fa0e9921adfad1cec/defaults'} Body: b'{"quota_set": {"id": "1629f2ea49854d5fa0e9921adfad1cec", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.607 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.610 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.613 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.616 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.619 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.622 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.625 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.628 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.631 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.634 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.634 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:49.636 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.639 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.642 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.645 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.648 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.650 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.653 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.656 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.659 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.661 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.664 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.666 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:49.667 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.670 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.672 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.675 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.678 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.681 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.684 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.683 186 INFO tempest.lib.common.rest_client [req-b789539a-4ff3-49ca-93df-110b6203c583 ] Request (AggregatesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/e4d29d96d56f494bbee1298d2052ce15 0.148s 2020-12-14 02:13:49.687 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.686 186 DEBUG tempest.lib.common.rest_client [req-b789539a-4ff3-49ca-93df-110b6203c583 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b789539a-4ff3-49ca-93df-110b6203c583', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/e4d29d96d56f494bbee1298d2052ce15'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.690 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.693 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.694 193 INFO tempest.lib.common.rest_client [req-8ed49da2-9ea4-4a20-a400-5eb0ab34dd4a ] Request (QuotaSetsRbacTest:test_show_default_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles 0.055s 2020-12-14 02:13:49.696 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.697 193 DEBUG tempest.lib.common.rest_client [req-8ed49da2-9ea4-4a20-a400-5eb0ab34dd4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ed49da2-9ea4-4a20-a400-5eb0ab34dd4a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.699 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.702 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.705 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.708 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.710 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.713 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.716 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.718 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.721 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.724 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.727 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.730 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.733 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.739 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.742 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.744 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.748 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.750 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.753 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.756 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.759 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.762 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.764 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.768 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.771 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.774 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.777 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.780 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.786 189 INFO tempest.lib.common.rest_client [req-e20503ad-e9aa-4ed2-bd9a-922e4b749323 ] Request (ImagesRbacTest:test_list_images): 200 GET http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles 0.112s 2020-12-14 02:13:49.788 186 INFO tempest.lib.common.rest_client [req-5fdc017b-1802-4e93-8efd-d8e7f2a36cbd ] Request (AggregatesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:13:49.790 189 DEBUG tempest.lib.common.rest_client [req-e20503ad-e9aa-4ed2-bd9a-922e4b749323 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e20503ad-e9aa-4ed2-bd9a-922e4b749323', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.791 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-extra-specs:show, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:49.792 186 DEBUG tempest.lib.common.rest_client [req-5fdc017b-1802-4e93-8efd-d8e7f2a36cbd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5fdc017b-1802-4e93-8efd-d8e7f2a36cbd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["62baZXSlQPq1tvda4vDNrQ"], "expires_at": "2020-12-14T03:13:49.000000Z", "issued_at": "2020-12-14T02:13:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.799 193 INFO tempest.lib.common.rest_client [req-187b934b-1020-4d4f-815b-e021db707e30 ] Request (QuotaSetsRbacTest:test_show_default_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:13:49.802 193 DEBUG tempest.lib.common.rest_client [req-187b934b-1020-4d4f-815b-e021db707e30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-187b934b-1020-4d4f-815b-e021db707e30', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "342f2aba21b542088e86034d6dc206e6", "name": "tempest-QuotaSetsRbacTest-1374196686", "password_expires_at": null}, "audit_ids": ["4MRh4Pn_RfaUpzokGMhjkQ"], "expires_at": "2020-12-14T03:13:49.000000Z", "issued_at": "2020-12-14T02:13:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1629f2ea49854d5fa0e9921adfad1cec", "name": "tempest-QuotaSetsRbacTest-1374196686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.824 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:49.828 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.831 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.834 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.837 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.840 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.843 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.848 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.850 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.852 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.855 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.857 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.859 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.860 197 INFO tempest.lib.common.rest_client [req-ebb464bd-cb08-4a8f-9cf9-d03bd5123df6 ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 200 POST http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs 0.062s 2020-12-14 02:13:49.862 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.864 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.864 197 DEBUG tempest.lib.common.rest_client [req-ebb464bd-cb08-4a8f-9cf9-d03bd5123df6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-159330143": "tempest-FlavorExtraSpecsRbacTest-val-934325676"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '117', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ebb464bd-cb08-4a8f-9cf9-d03bd5123df6', 'x-compute-request-id': 'req-ebb464bd-cb08-4a8f-9cf9-d03bd5123df6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-159330143": "tempest-FlavorExtraSpecsRbacTest-val-934325676"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.867 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.870 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.872 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.874 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.877 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.879 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.882 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.884 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.886 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.888 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.890 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.890 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:49.893 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.895 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.897 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.899 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.902 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.904 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.906 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.908 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.910 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.913 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.912 189 INFO tempest.lib.common.rest_client [req-21f8a71a-3027-472d-9890-fc55ed5d39bb ] Request (ImagesRbacTest:test_list_images): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.116s 2020-12-14 02:13:49.915 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.916 189 DEBUG tempest.lib.common.rest_client [req-21f8a71a-3027-472d-9890-fc55ed5d39bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21f8a71a-3027-472d-9890-fc55ed5d39bb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5e21fd566d1f4fb9b67bd99640ec5abd", "name": "tempest-ImagesRbacTest-622606806", "password_expires_at": null}, "audit_ids": ["a78_YrWfTmqgSbIyFQN4DA"], "expires_at": "2020-12-14T03:13:49.000000Z", "issued_at": "2020-12-14T02:13:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a7e1198b79c9412caba6575e229a167c", "name": "tempest-ImagesRbacTest-622606806"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.917 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.920 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.923 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.925 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.928 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.930 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.930 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:49.932 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.933 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.935 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.937 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.939 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.942 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.942 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_images, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:49.944 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.944 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:49.946 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.949 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.952 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.956 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.958 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.961 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.960 197 INFO tempest.lib.common.rest_client [req-e2c3bc74-de61-40bc-9266-0969f7a5fb36 ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles 0.062s 2020-12-14 02:13:49.964 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.964 197 DEBUG tempest.lib.common.rest_client [req-e2c3bc74-de61-40bc-9266-0969f7a5fb36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2c3bc74-de61-40bc-9266-0969f7a5fb36', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:49.966 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.971 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.973 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.976 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.979 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.981 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.983 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.985 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.988 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.990 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.992 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.994 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.997 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:49.999 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.001 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.003 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.013 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-sets:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:50.012 189 INFO tempest.lib.common.rest_client [req-84ce8969-bdf1-4e1b-9dee-4819ee37b1ab ] Request (ImagesRbacTest:test_list_images_with_details): 200 GET http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles 0.062s 2020-12-14 02:13:50.015 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:50.016 189 DEBUG tempest.lib.common.rest_client [req-84ce8969-bdf1-4e1b-9dee-4819ee37b1ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84ce8969-bdf1-4e1b-9dee-4819ee37b1ab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.065 189 INFO tempest.lib.common.rest_client [req-9856ded6-2701-4c5a-9f17-b692b06dae10 ] Request (ImagesRbacTest:test_list_images_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:13:50.068 189 DEBUG tempest.lib.common.rest_client [req-9856ded6-2701-4c5a-9f17-b692b06dae10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9856ded6-2701-4c5a-9f17-b692b06dae10', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5e21fd566d1f4fb9b67bd99640ec5abd", "name": "tempest-ImagesRbacTest-622606806", "password_expires_at": null}, "audit_ids": ["Vwb0ALEfTSe4oTVRYmUPnA"], "expires_at": "2020-12-14T03:13:50.000000Z", "issued_at": "2020-12-14T02:13:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a7e1198b79c9412caba6575e229a167c", "name": "tempest-ImagesRbacTest-622606806"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.077 193 INFO tempest.lib.common.rest_client [req-dcb91124-4c7f-46c9-bae3-1d8e8dffbf96 ] Request (QuotaSetsRbacTest:test_show_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles 0.057s 2020-12-14 02:13:50.078 197 INFO tempest.lib.common.rest_client [req-e66f43b6-15c9-4076-8031-e8c6a208586f ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-12-14 02:13:50.080 193 DEBUG tempest.lib.common.rest_client [req-dcb91124-4c7f-46c9-bae3-1d8e8dffbf96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dcb91124-4c7f-46c9-bae3-1d8e8dffbf96', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.082 197 DEBUG tempest.lib.common.rest_client [req-e66f43b6-15c9-4076-8031-e8c6a208586f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e66f43b6-15c9-4076-8031-e8c6a208586f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ef510e52f8894d8baef26dddf289a279", "name": "tempest-FlavorExtraSpecsRbacTest-81596218", "password_expires_at": null}, "audit_ids": ["sTRTh2PGQ8a1Zj-5cNVvFQ"], "expires_at": "2020-12-14T03:13:50.000000Z", "issued_at": "2020-12-14T02:13:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4c07be6d6d244dd2b1627e66a2db2646", "name": "tempest-FlavorExtraSpecsRbacTest-81596218"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.125 186 INFO tempest.lib.common.rest_client [req-5f76abe0-d842-4191-819a-dfccb9474660 ] Request (AggregatesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=7a204ba22ab84c0dbcf942d8815627ba&name=default 0.326s 2020-12-14 02:13:50.127 186 DEBUG tempest.lib.common.rest_client [req-5f76abe0-d842-4191-819a-dfccb9474660 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-5f76abe0-d842-4191-819a-dfccb9474660', 'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=7a204ba22ab84c0dbcf942d8815627ba&name=default'} Body: b'{"security_groups": [{"id": "b7db75f5-d22f-4ce2-a68e-85745b2f8aed", "name": "default", "stateful": true, "tenant_id": "7a204ba22ab84c0dbcf942d8815627ba", "description": "Default security group", "security_group_rules": [{"id": "282fc799-2cba-4bce-9168-c46cc9d0269c", "tenant_id": "7a204ba22ab84c0dbcf942d8815627ba", "security_group_id": "b7db75f5-d22f-4ce2-a68e-85745b2f8aed", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:50Z", "updated_at": "2020-12-14T02:13:50Z", "revision_number": 0, "project_id": "7a204ba22ab84c0dbcf942d8815627ba"}, {"id": "60f45d69-7da8-4840-8878-5c4ad61f62d4", "tenant_id": "7a204ba22ab84c0dbcf942d8815627ba", "security_group_id": "b7db75f5-d22f-4ce2-a68e-85745b2f8aed", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b7db75f5-d22f-4ce2-a68e-85745b2f8aed", "description": null, "tags": [], "created_at": "2020-12-14T02:13:50Z", "updated_at": "2020-12-14T02:13:50Z", "revision_number": 0, "project_id": "7a204ba22ab84c0dbcf942d8815627ba"}, {"id": "83c69c3c-6654-4ed3-bf8b-9df4d5bca523", "tenant_id": "7a204ba22ab84c0dbcf942d8815627ba", "security_group_id": "b7db75f5-d22f-4ce2-a68e-85745b2f8aed", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:50Z", "updated_at": "2020-12-14T02:13:50Z", "revision_number": 0, "project_id": "7a204ba22ab84c0dbcf942d8815627ba"}, {"id": "e5afd32f-5fa6-4a43-8063-08830f7eeaa8", "tenant_id": "7a204ba22ab84c0dbcf942d8815627ba", "security_group_id": "b7db75f5-d22f-4ce2-a68e-85745b2f8aed", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b7db75f5-d22f-4ce2-a68e-85745b2f8aed", "description": null, "tags": [], "created_at": "2020-12-14T02:13:50Z", "updated_at": "2020-12-14T02:13:50Z", "revision_number": 0, "project_id": "7a204ba22ab84c0dbcf942d8815627ba"}], "tags": [], "created_at": "2020-12-14T02:13:49Z", "updated_at": "2020-12-14T02:13:50Z", "revision_number": 1, "project_id": "7a204ba22ab84c0dbcf942d8815627ba"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.129 193 INFO tempest.lib.common.rest_client [req-7b20165c-8dbc-4427-b608-db373235a399 ] Request (QuotaSetsRbacTest:test_show_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:13:50.133 193 DEBUG tempest.lib.common.rest_client [req-7b20165c-8dbc-4427-b608-db373235a399 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7b20165c-8dbc-4427-b608-db373235a399', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "342f2aba21b542088e86034d6dc206e6", "name": "tempest-QuotaSetsRbacTest-1374196686", "password_expires_at": null}, "audit_ids": ["5o5W7lzHQg-Kd5JKle8_Gw"], "expires_at": "2020-12-14T03:13:50.000000Z", "issued_at": "2020-12-14T02:13:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1629f2ea49854d5fa0e9921adfad1cec", "name": "tempest-QuotaSetsRbacTest-1374196686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.248 197 INFO tempest.lib.common.rest_client [req-c96f76e7-c276-4b52-87f4-e897e7fa0775 ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 200 GET http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-159330143 0.159s 2020-12-14 02:13:50.251 197 DEBUG tempest.lib.common.rest_client [req-c96f76e7-c276-4b52-87f4-e897e7fa0775 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '100', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c96f76e7-c276-4b52-87f4-e897e7fa0775', 'x-compute-request-id': 'req-c96f76e7-c276-4b52-87f4-e897e7fa0775', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-159330143'} Body: b'{"tempest-FlavorExtraSpecsRbacTest-key-159330143": "tempest-FlavorExtraSpecsRbacTest-val-934325676"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.262 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:50.298 189 INFO tempest.lib.common.rest_client [req-6fe25e62-3e76-4ab2-a7ec-e97fdc1e3e29 ] Request (ImagesRbacTest:test_list_images_with_details): 200 GET http://172.30.13.94/compute/v2.1/images/detail 0.221s 2020-12-14 02:13:50.303 189 DEBUG tempest.lib.common.rest_client [req-6fe25e62-3e76-4ab2-a7ec-e97fdc1e3e29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '9155', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6fe25e62-3e76-4ab2-a7ec-e97fdc1e3e29', 'x-compute-request-id': 'req-6fe25e62-3e76-4ab2-a7ec-e97fdc1e3e29', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/detail'} Body: b'{"images": [{"id": "3281175d-0c13-4afa-8011-7117ce65bf7d", "name": "tempest-ImagesRbacTest-image-2027337052", "minRam": 0, "minDisk": 0, "metadata": {}, "created": "2020-12-14T02:13:48Z", "updated": "2020-12-14T02:13:48Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/3281175d-0c13-4afa-8011-7117ce65bf7d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/3281175d-0c13-4afa-8011-7117ce65bf7d"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/3281175d-0c13-4afa-8011-7117ce65bf7d"}]}, {"id": "458c165e-1594-40fd-a92a-ce6fd4a85db4", "name": "patrole_reader-img_alt_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "minRam": 0, "minDisk": 0, "metadata": {"owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_specified.shade.object": "images/patrole_reader-img_alt_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "hw_scsi_model": "virtio-scsi", "hw_disk_bus": "scsi"}, "created": "2020-12-14T02:10:03Z", "updated": "2020-12-14T02:10:04Z", "status": "ACTIVE", "progress": 100, "OS-EXT-IMG-SIZE:size": 12716032, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/458c165e-1594-40fd-a92a-ce6fd4a85db4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/458c165e-1594-40fd-a92a-ce6fd4a85db4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/458c165e-1594-40fd-a92a-ce6fd4a85db4"}]}, {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "name": "patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "minRam": 0, "minDisk": 0, "metadata": {"owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "hw_scsi_model": "virtio-scsi", "hw_disk_bus": "scsi"}, "created": "2020-12-14T02:05:22Z", "updated": "2020-12-14T02:05:23Z", "status": "ACTIVE", "progress": 100, "OS-EXT-IMG-SIZE:size": 12716032, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/cd332004-33aa-4c81-9e50-54766a6df097"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, {"id": "d1a1a45a-4ff5-407f-8dc3-652d043802c7", "name": "patrole_member-img_alt_c7a2fe1e-65f4-45d7-bab1-5c456aa6e4d6", "minRam": 0, "minDisk": 0, "metadata": {"owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_specified.shade.object": "images/patrole_member-img_alt_c7a2fe1e-65f4-45d7-bab1-5c456aa6e4d6", "hw_scsi_model": "virtio-scsi", "hw_disk_bus": "scsi"}, "created": "2020-12-14T01:51:14Z", "updated": "2020-12-14T01:51:14Z", "status": "ACTIVE", "progress": 100, "OS-EXT-IMG-SIZE:size": 12716032, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/d1a1a45a-4ff5-407f-8dc3-652d043802c7"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/d1a1a45a-4ff5-407f-8dc3-652d043802c7"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/d1a1a45a-4ff5-407f-8dc3-652d043802c7"}]}, {"id": "f9ea473c-11ca-42fc-8822-2245e1be1239", "name": "patrole_member-img_c7a2fe1e-65f4-45d7-bab1-5c456aa6e4d6", "minRam": 0, "minDisk": 0, "metadata": {"owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_specified.shade.object": "images/patrole_member-img_c7a2fe1e-65f4-45d7-bab1-5c456aa6e4d6", "hw_scsi_model": "virtio-scsi", "hw_disk_bus": "scsi"}, "created" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.321 186 INFO tempest.lib.common.rest_client [req-f360cf2e-db34-4722-95a1-a318280da0ea ] Request (AggregatesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/b7db75f5-d22f-4ce2-a68e-85745b2f8aed 0.188s 2020-12-14 02:13:50.322 193 INFO tempest.lib.common.rest_client [req-c15ad596-fede-48da-80dd-9a128269c06a ] Request (QuotaSetsRbacTest:test_show_quota_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-sets/1629f2ea49854d5fa0e9921adfad1cec 0.181s 2020-12-14 02:13:50.323 186 DEBUG tempest.lib.common.rest_client [req-f360cf2e-db34-4722-95a1-a318280da0ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f360cf2e-db34-4722-95a1-a318280da0ea', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/b7db75f5-d22f-4ce2-a68e-85745b2f8aed'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.326 193 DEBUG tempest.lib.common.rest_client [req-c15ad596-fede-48da-80dd-9a128269c06a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '371', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c15ad596-fede-48da-80dd-9a128269c06a', 'x-compute-request-id': 'req-c15ad596-fede-48da-80dd-9a128269c06a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/1629f2ea49854d5fa0e9921adfad1cec'} Body: b'{"quota_set": {"id": "1629f2ea49854d5fa0e9921adfad1cec", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.330 197 INFO tempest.lib.common.rest_client [req-b9025c6e-164c-4e24-8acb-970d3e0bbc8f ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles 0.062s 2020-12-14 02:13:50.333 197 DEBUG tempest.lib.common.rest_client [req-b9025c6e-164c-4e24-8acb-970d3e0bbc8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9025c6e-164c-4e24-8acb-970d3e0bbc8f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.352 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:50.392 197 INFO tempest.lib.common.rest_client [req-ef2adbac-415b-4f4a-9036-9ae60294023a ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:13:50.395 197 DEBUG tempest.lib.common.rest_client [req-ef2adbac-415b-4f4a-9036-9ae60294023a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef2adbac-415b-4f4a-9036-9ae60294023a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ef510e52f8894d8baef26dddf289a279", "name": "tempest-FlavorExtraSpecsRbacTest-81596218", "password_expires_at": null}, "audit_ids": ["IjqU260nRjGS7df4olccug"], "expires_at": "2020-12-14T03:13:50.000000Z", "issued_at": "2020-12-14T02:13:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4c07be6d6d244dd2b1627e66a2db2646", "name": "tempest-FlavorExtraSpecsRbacTest-81596218"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.410 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:50.422 193 INFO tempest.lib.common.rest_client [req-f5d90883-112d-4555-979b-f9b46bb5ff4f ] Request (QuotaSetsRbacTest:test_show_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles 0.065s 2020-12-14 02:13:50.424 193 DEBUG tempest.lib.common.rest_client [req-f5d90883-112d-4555-979b-f9b46bb5ff4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f5d90883-112d-4555-979b-f9b46bb5ff4f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.468 186 INFO tempest.lib.common.rest_client [req-b293dcc7-3479-473a-b916-8ce42258578f ] Request (AggregatesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba 0.139s 2020-12-14 02:13:50.470 186 DEBUG tempest.lib.common.rest_client [req-b293dcc7-3479-473a-b916-8ce42258578f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b293dcc7-3479-473a-b916-8ce42258578f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7a204ba22ab84c0dbcf942d8815627ba'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.528 193 INFO tempest.lib.common.rest_client [req-3ccabd06-277f-4b70-9ce4-d9a56ae48169 ] Request (QuotaSetsRbacTest:test_show_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:13:50.532 193 DEBUG tempest.lib.common.rest_client [req-3ccabd06-277f-4b70-9ce4-d9a56ae48169 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ccabd06-277f-4b70-9ce4-d9a56ae48169', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "342f2aba21b542088e86034d6dc206e6", "name": "tempest-QuotaSetsRbacTest-1374196686", "password_expires_at": null}, "audit_ids": ["61bMI6l8RiudSI0d2LHxtA"], "expires_at": "2020-12-14T03:13:50.000000Z", "issued_at": "2020-12-14T02:13:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1629f2ea49854d5fa0e9921adfad1cec", "name": "tempest-QuotaSetsRbacTest-1374196686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.533 186 INFO tempest.lib.common.rest_client [req-85420a73-8148-4cf6-a63a-6955d45b1202 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:13:50.536 186 DEBUG tempest.lib.common.rest_client [req-85420a73-8148-4cf6-a63a-6955d45b1202 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85420a73-8148-4cf6-a63a-6955d45b1202', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["YVOPCcllQau4-9qNKDggBQ"], "expires_at": "2020-12-14T03:13:50.000000Z", "issued_at": "2020-12-14T02:13:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.535 189 INFO tempest.lib.common.rest_client [req-5ddb5440-2fa7-4088-90ba-60b5b1d6f0f6 ] Request (ImagesRbacTest:test_list_images_with_details): 200 GET http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles 0.117s 2020-12-14 02:13:50.538 189 DEBUG tempest.lib.common.rest_client [req-5ddb5440-2fa7-4088-90ba-60b5b1d6f0f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ddb5440-2fa7-4088-90ba-60b5b1d6f0f6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.554 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:50.558 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.561 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.564 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.566 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.569 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.573 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.577 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.579 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.581 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.584 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.586 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.588 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.591 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.593 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.596 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.599 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.601 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.603 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.605 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.607 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.610 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.612 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.614 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.617 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.619 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.622 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.624 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.626 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.629 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.631 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.633 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.635 186 INFO tempest.lib.common.rest_client [req-25276796-cb6f-489a-9922-17661386624d ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:13:50.636 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.638 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.637 186 DEBUG tempest.lib.common.rest_client [req-25276796-cb6f-489a-9922-17661386624d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25276796-cb6f-489a-9922-17661386624d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["eBizG-mfTBy9NJP7kgkQjg"], "expires_at": "2020-12-14T03:13:50.000000Z", "issued_at": "2020-12-14T02:13:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.638 189 INFO tempest.lib.common.rest_client [req-f5ba7e65-8a8e-4567-944d-750d3d75210a ] Request (ImagesRbacTest:test_list_images_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:13:50.638 197 INFO tempest.lib.common.rest_client [req-23e372ae-05d1-446a-b568-6869bb386dfc ] Request (FlavorExtraSpecsRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-159330143 0.235s 2020-12-14 02:13:50.640 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.641 197 DEBUG tempest.lib.common.rest_client [req-23e372ae-05d1-446a-b568-6869bb386dfc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-23e372ae-05d1-446a-b568-6869bb386dfc', 'x-compute-request-id': 'req-23e372ae-05d1-446a-b568-6869bb386dfc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-159330143'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.642 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.642 189 DEBUG tempest.lib.common.rest_client [req-f5ba7e65-8a8e-4567-944d-750d3d75210a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f5ba7e65-8a8e-4567-944d-750d3d75210a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5e21fd566d1f4fb9b67bd99640ec5abd", "name": "tempest-ImagesRbacTest-622606806", "password_expires_at": null}, "audit_ids": ["gPgPk0IWQW-S8eOU3M8rLg"], "expires_at": "2020-12-14T03:13:50.000000Z", "issued_at": "2020-12-14T02:13:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a7e1198b79c9412caba6575e229a167c", "name": "tempest-ImagesRbacTest-622606806"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.644 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.646 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.648 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.651 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.653 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.656 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.656 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:50.658 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.660 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.660 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.663 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.666 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.668 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.668 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:50.670 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.671 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:50.672 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.675 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.677 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.679 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.681 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.684 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.686 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.689 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.691 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.695 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.698 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.698 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:50.700 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.703 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.705 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.705 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.707 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.709 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.709 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.711 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.712 186 INFO tempest.lib.common.rest_client [req-164977f5-37e2-4ae7-8360-5632e4328ce8 ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.067s 2020-12-14 02:13:50.713 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.713 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.714 186 DEBUG tempest.lib.common.rest_client [req-164977f5-37e2-4ae7-8360-5632e4328ce8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-164977f5-37e2-4ae7-8360-5632e4328ce8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.715 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.716 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.718 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.720 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.720 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.722 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.724 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.724 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.727 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.729 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.731 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.732 189 INFO tempest.lib.common.rest_client [req-0f995d23-02c9-474c-9151-6b9a1900721c ] Request (ImagesRbacTest:test_show_image_details): 200 GET http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles 0.055s 2020-12-14 02:13:50.734 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.736 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-sets:detail, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:50.737 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.735 189 DEBUG tempest.lib.common.rest_client [req-0f995d23-02c9-474c-9151-6b9a1900721c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f995d23-02c9-474c-9151-6b9a1900721c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.738 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:50.740 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.742 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.745 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.748 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.751 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.755 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.759 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.762 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.764 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.767 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.770 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.772 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.775 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.778 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.781 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.784 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.786 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.789 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.790 186 INFO tempest.lib.common.rest_client [req-0c3ff7f4-0d31-4077-9434-a5a9cd44bed0 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.069s 2020-12-14 02:13:50.790 189 INFO tempest.lib.common.rest_client [req-6436c8eb-2447-4084-866f-599ba28640a1 ] Request (ImagesRbacTest:test_show_image_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:13:50.792 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.793 186 DEBUG tempest.lib.common.rest_client [req-0c3ff7f4-0d31-4077-9434-a5a9cd44bed0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImageSizeRbacTest-1311523941-desc", "domain_id": "default", "name": "tempest-ImageSizeRbacTest-1311523941"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c3ff7f4-0d31-4077-9434-a5a9cd44bed0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "0aa919fd35164c8f8ff495e4c7bee62f", "name": "tempest-ImageSizeRbacTest-1311523941", "domain_id": "default", "description": "tempest-ImageSizeRbacTest-1311523941-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/0aa919fd35164c8f8ff495e4c7bee62f"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.794 189 DEBUG tempest.lib.common.rest_client [req-6436c8eb-2447-4084-866f-599ba28640a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6436c8eb-2447-4084-866f-599ba28640a1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5e21fd566d1f4fb9b67bd99640ec5abd", "name": "tempest-ImagesRbacTest-622606806", "password_expires_at": null}, "audit_ids": ["RUyPcHOpSACFqHvkPA7eAw"], "expires_at": "2020-12-14T03:13:50.000000Z", "issued_at": "2020-12-14T02:13:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a7e1198b79c9412caba6575e229a167c", "name": "tempest-ImagesRbacTest-622606806"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.795 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.798 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.801 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.803 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.806 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.809 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.809 193 INFO tempest.lib.common.rest_client [req-50271b8e-b10b-459f-ab8e-07ae61f89098 ] Request (QuotaSetsRbacTest:test_show_quota_set_details): 200 GET http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles 0.066s 2020-12-14 02:13:50.812 193 DEBUG tempest.lib.common.rest_client [req-50271b8e-b10b-459f-ab8e-07ae61f89098 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-50271b8e-b10b-459f-ab8e-07ae61f89098', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.812 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.815 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.818 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.821 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.825 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.828 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.831 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.833 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.837 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.841 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.844 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.847 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.851 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.854 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.857 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.861 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.865 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.868 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.871 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.875 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.877 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.884 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.887 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.890 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.894 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.896 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.899 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.902 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.904 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.907 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.910 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.910 193 INFO tempest.lib.common.rest_client [req-802e6fc5-94d1-4e19-9a4d-e6551b939eae ] Request (QuotaSetsRbacTest:test_show_quota_set_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:13:50.912 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.913 193 DEBUG tempest.lib.common.rest_client [req-802e6fc5-94d1-4e19-9a4d-e6551b939eae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-802e6fc5-94d1-4e19-9a4d-e6551b939eae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "342f2aba21b542088e86034d6dc206e6", "name": "tempest-QuotaSetsRbacTest-1374196686", "password_expires_at": null}, "audit_ids": ["9mOyVDyQQtG0E93Dcdk6Qw"], "expires_at": "2020-12-14T03:13:50.000000Z", "issued_at": "2020-12-14T02:13:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1629f2ea49854d5fa0e9921adfad1cec", "name": "tempest-QuotaSetsRbacTest-1374196686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.915 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.918 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.921 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.923 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:50.928 186 INFO tempest.lib.common.rest_client [req-1c6dc2b7-30c6-4ba3-8428-e6ed4cabeb39 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.127s 2020-12-14 02:13:50.930 186 DEBUG tempest.lib.common.rest_client [req-1c6dc2b7-30c6-4ba3-8428-e6ed4cabeb39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImageSizeRbacTest-1311523941", "password": "P4*Y4f&LUTQu6yL", "project_id": "0aa919fd35164c8f8ff495e4c7bee62f", "email": "tempest-ImageSizeRbacTest-1657925337@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c6dc2b7-30c6-4ba3-8428-e6ed4cabeb39', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "0aa919fd35164c8f8ff495e4c7bee62f", "email": "tempest-ImageSizeRbacTest-1657925337@example.com", "id": "b7212f2b83c54cfda23847d9e3308dd3", "name": "tempest-ImageSizeRbacTest-1311523941", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/b7212f2b83c54cfda23847d9e3308dd3"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:50.932 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-extra-specs:delete, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:51.015 186 INFO tempest.lib.common.rest_client [req-cc8af43f-b8fe-4dec-ab62-2e52f316c137 ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.078s 2020-12-14 02:13:51.018 186 DEBUG tempest.lib.common.rest_client [req-cc8af43f-b8fe-4dec-ab62-2e52f316c137 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cc8af43f-b8fe-4dec-ab62-2e52f316c137', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.024 189 INFO tempest.lib.common.rest_client [req-a89703d4-63c6-4b33-956d-b4208fbcaed7 ] Request (ImagesRbacTest:test_show_image_details): 200 GET http://172.30.13.94/compute/v2.1/images/3281175d-0c13-4afa-8011-7117ce65bf7d 0.222s 2020-12-14 02:13:51.027 189 DEBUG tempest.lib.common.rest_client [req-a89703d4-63c6-4b33-956d-b4208fbcaed7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '650', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a89703d4-63c6-4b33-956d-b4208fbcaed7', 'x-compute-request-id': 'req-a89703d4-63c6-4b33-956d-b4208fbcaed7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/3281175d-0c13-4afa-8011-7117ce65bf7d'} Body: b'{"image": {"id": "3281175d-0c13-4afa-8011-7117ce65bf7d", "name": "tempest-ImagesRbacTest-image-2027337052", "minRam": 0, "minDisk": 0, "metadata": {}, "created": "2020-12-14T02:13:48Z", "updated": "2020-12-14T02:13:48Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/3281175d-0c13-4afa-8011-7117ce65bf7d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/3281175d-0c13-4afa-8011-7117ce65bf7d"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/3281175d-0c13-4afa-8011-7117ce65bf7d"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.077 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:51.087 186 INFO tempest.lib.common.rest_client [req-7c9d9b00-f2f7-44c4-b0c5-7bf9bc722f54 ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:13:51.089 186 DEBUG tempest.lib.common.rest_client [req-7c9d9b00-f2f7-44c4-b0c5-7bf9bc722f54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7c9d9b00-f2f7-44c4-b0c5-7bf9bc722f54', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.115 193 INFO tempest.lib.common.rest_client [req-6c06f26b-1822-4e9c-b3c4-350b78b08c02 ] Request (QuotaSetsRbacTest:test_show_quota_set_details): 200 GET http://172.30.13.94/compute/v2.1/os-quota-sets/1629f2ea49854d5fa0e9921adfad1cec/detail 0.196s 2020-12-14 02:13:51.118 193 DEBUG tempest.lib.common.rest_client [req-6c06f26b-1822-4e9c-b3c4-350b78b08c02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '917', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6c06f26b-1822-4e9c-b3c4-350b78b08c02', 'x-compute-request-id': 'req-6c06f26b-1822-4e9c-b3c4-350b78b08c02', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/1629f2ea49854d5fa0e9921adfad1cec/detail'} Body: b'{"quota_set": {"id": "1629f2ea49854d5fa0e9921adfad1cec", "cores": {"limit": 20, "in_use": 0, "reserved": 0}, "fixed_ips": {"limit": -1, "in_use": 0, "reserved": 0}, "floating_ips": {"limit": -1, "in_use": 0, "reserved": 0}, "injected_file_content_bytes": {"limit": 10240, "in_use": 0, "reserved": 0}, "injected_file_path_bytes": {"limit": 255, "in_use": 0, "reserved": 0}, "injected_files": {"limit": 5, "in_use": 0, "reserved": 0}, "instances": {"limit": 10, "in_use": 0, "reserved": 0}, "key_pairs": {"limit": 100, "in_use": 0, "reserved": 0}, "metadata_items": {"limit": 128, "in_use": 0, "reserved": 0}, "ram": {"limit": 51200, "in_use": 0, "reserved": 0}, "security_group_rules": {"limit": -1, "in_use": 0, "reserved": 0}, "security_groups": {"limit": -1, "in_use": 0, "reserved": 0}, "server_group_members": {"limit": 10, "in_use": 0, "reserved": 0}, "server_groups": {"limit": 10, "in_use": 0, "reserved": 0}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.153 189 INFO tempest.lib.common.rest_client [req-b3a7a803-d84d-4bfa-a092-58ab88f4603c ] Request (ImagesRbacTest:test_show_image_details): 200 GET http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles 0.068s 2020-12-14 02:13:51.157 189 DEBUG tempest.lib.common.rest_client [req-b3a7a803-d84d-4bfa-a092-58ab88f4603c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3a7a803-d84d-4bfa-a092-58ab88f4603c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c/users/5e21fd566d1f4fb9b67bd99640ec5abd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.182 197 INFO tempest.lib.common.rest_client [req-e0571b59-091d-4834-abe3-73194630b1b0 ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 200 POST http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs 0.244s 2020-12-14 02:13:51.182 186 INFO tempest.lib.common.rest_client [req-e4f3bf41-8389-4c27-b937-d64ff2c09a87 ] Request (ImageSizeRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0aa919fd35164c8f8ff495e4c7bee62f/users/b7212f2b83c54cfda23847d9e3308dd3/roles/72a4576c553448cd941b052c1ca0cf2d 0.085s 2020-12-14 02:13:51.185 186 DEBUG tempest.lib.common.rest_client [req-e4f3bf41-8389-4c27-b937-d64ff2c09a87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4f3bf41-8389-4c27-b937-d64ff2c09a87', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0aa919fd35164c8f8ff495e4c7bee62f/users/b7212f2b83c54cfda23847d9e3308dd3/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.185 197 DEBUG tempest.lib.common.rest_client [req-e0571b59-091d-4834-abe3-73194630b1b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-224337647": "tempest-FlavorExtraSpecsRbacTest-val-485499398"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '117', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e0571b59-091d-4834-abe3-73194630b1b0', 'x-compute-request-id': 'req-e0571b59-091d-4834-abe3-73194630b1b0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-224337647": "tempest-FlavorExtraSpecsRbacTest-val-485499398"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.186 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:51.188 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageSizeRbacTest-1311523941', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0aa919fd35164c8f8ff495e4c7bee62f', 'project_name': 'tempest-ImageSizeRbacTest-1311523941', 'tenant_id': '0aa919fd35164c8f8ff495e4c7bee62f', 'tenant_name': 'tempest-ImageSizeRbacTest-1311523941', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'b7212f2b83c54cfda23847d9e3308dd3'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:51.190 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageSizeRbacTest-1311523941', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0aa919fd35164c8f8ff495e4c7bee62f', 'project_name': 'tempest-ImageSizeRbacTest-1311523941', 'tenant_id': '0aa919fd35164c8f8ff495e4c7bee62f', 'tenant_name': 'tempest-ImageSizeRbacTest-1311523941', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'b7212f2b83c54cfda23847d9e3308dd3'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:51.200 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:51.258 189 INFO tempest.lib.common.rest_client [req-fc10dc07-4f1d-4ca8-a151-7ceda5b510ef ] Request (ImagesRbacTest:test_show_image_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:13:51.262 189 DEBUG tempest.lib.common.rest_client [req-fc10dc07-4f1d-4ca8-a151-7ceda5b510ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc10dc07-4f1d-4ca8-a151-7ceda5b510ef', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5e21fd566d1f4fb9b67bd99640ec5abd", "name": "tempest-ImagesRbacTest-622606806", "password_expires_at": null}, "audit_ids": ["HVv6TTXzTxS1JwClZzKVow"], "expires_at": "2020-12-14T03:13:51.000000Z", "issued_at": "2020-12-14T02:13:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a7e1198b79c9412caba6575e229a167c", "name": "tempest-ImagesRbacTest-622606806"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a7e1198b79c9412caba6575e229a167c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.314 193 INFO tempest.lib.common.rest_client [req-bf85d922-50a0-42e2-9f9c-fc9f185bbe27 ] Request (QuotaSetsRbacTest:test_show_quota_set_details): 200 GET http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles 0.122s 2020-12-14 02:13:51.317 193 DEBUG tempest.lib.common.rest_client [req-bf85d922-50a0-42e2-9f9c-fc9f185bbe27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf85d922-50a0-42e2-9f9c-fc9f185bbe27', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.324 197 INFO tempest.lib.common.rest_client [req-aba0f5f7-2ce2-4740-8b0f-81f840ae9d73 ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles 0.118s 2020-12-14 02:13:51.328 197 DEBUG tempest.lib.common.rest_client [req-aba0f5f7-2ce2-4740-8b0f-81f840ae9d73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aba0f5f7-2ce2-4740-8b0f-81f840ae9d73', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.397 186 INFO tempest.lib.common.rest_client [req-3a388f1a-c09b-4dff-a40d-7148aa3f30a7 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.140s 2020-12-14 02:13:51.400 186 DEBUG tempest.lib.common.rest_client [req-3a388f1a-c09b-4dff-a40d-7148aa3f30a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6565', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a388f1a-c09b-4dff-a40d-7148aa3f30a7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b7212f2b83c54cfda23847d9e3308dd3", "name": "tempest-ImageSizeRbacTest-1311523941", "password_expires_at": null}, "audit_ids": ["Lhs2OVHoT8G2N0Tm7bEHbQ"], "expires_at": "2020-12-14T03:13:51.000000Z", "issued_at": "2020-12-14T02:13:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0aa919fd35164c8f8ff495e4c7bee62f", "name": "tempest-ImageSizeRbacTest-1311523941"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0aa919fd35164c8f8ff495e4c7bee62f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0aa919fd35164c8f8ff495e4c7bee62f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0aa919fd35164c8f8ff495e4c7bee62f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0aa919fd35164c8f8ff495e4c7bee62f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0aa919fd35164c8f8ff495e4c7bee62f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0aa919fd35164c8f8ff495e4c7bee62f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.414 193 INFO tempest.lib.common.rest_client [req-6b950385-9a24-477b-80a0-742e2ac57d8c ] Request (QuotaSetsRbacTest:test_show_quota_set_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:13:51.417 193 DEBUG tempest.lib.common.rest_client [req-6b950385-9a24-477b-80a0-742e2ac57d8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b950385-9a24-477b-80a0-742e2ac57d8c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "342f2aba21b542088e86034d6dc206e6", "name": "tempest-QuotaSetsRbacTest-1374196686", "password_expires_at": null}, "audit_ids": ["dly4WYQtReq8HwbpqIbwEQ"], "expires_at": "2020-12-14T03:13:51.000000Z", "issued_at": "2020-12-14T02:13:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1629f2ea49854d5fa0e9921adfad1cec", "name": "tempest-QuotaSetsRbacTest-1374196686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.427 197 INFO tempest.lib.common.rest_client [req-99848d5d-0897-4700-a62c-b8fc6e2c55cc ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:13:51.430 197 DEBUG tempest.lib.common.rest_client [req-99848d5d-0897-4700-a62c-b8fc6e2c55cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-99848d5d-0897-4700-a62c-b8fc6e2c55cc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ef510e52f8894d8baef26dddf289a279", "name": "tempest-FlavorExtraSpecsRbacTest-81596218", "password_expires_at": null}, "audit_ids": ["OoIJLGL2Tqq84EXT5Jhigw"], "expires_at": "2020-12-14T03:13:51.000000Z", "issued_at": "2020-12-14T02:13:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4c07be6d6d244dd2b1627e66a2db2646", "name": "tempest-FlavorExtraSpecsRbacTest-81596218"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.439 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:51.443 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.446 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.449 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.452 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.453 189 INFO tempest.lib.common.rest_client [req-6d4cecd0-d670-460e-9f6a-68eff7f2a466 ] Request (ImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/3281175d-0c13-4afa-8011-7117ce65bf7d 0.175s 2020-12-14 02:13:51.454 186 INFO tempest.lib.common.rest_client [req-6d3ef7e6-ab2b-4f9c-9d81-555cfe000580 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:13:51.455 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.456 189 DEBUG tempest.lib.common.rest_client [req-6d4cecd0-d670-460e-9f6a-68eff7f2a466 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-6d4cecd0-d670-460e-9f6a-68eff7f2a466', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/3281175d-0c13-4afa-8011-7117ce65bf7d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.457 186 DEBUG tempest.lib.common.rest_client [req-6d3ef7e6-ab2b-4f9c-9d81-555cfe000580 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d3ef7e6-ab2b-4f9c-9d81-555cfe000580', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["WQtWJqsGRyq8XumwWDrPPA"], "expires_at": "2020-12-14T03:13:51.000000Z", "issued_at": "2020-12-14T02:13:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.458 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.462 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.464 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.467 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.469 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.472 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.474 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.476 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.479 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.481 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.484 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.486 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.489 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.491 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.491 189 INFO tempest.lib.common.rest_client [req-65d1fc2d-dcfd-463a-b375-235fe08129d6 ] Request (ImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/3281175d-0c13-4afa-8011-7117ce65bf7d 0.029s 2020-12-14 02:13:51.493 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.494 189 DEBUG tempest.lib.common.rest_client [req-65d1fc2d-dcfd-463a-b375-235fe08129d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-65d1fc2d-dcfd-463a-b375-235fe08129d6', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/3281175d-0c13-4afa-8011-7117ce65bf7d'} Body: b'{"message": "No image found with ID 3281175d-0c13-4afa-8011-7117ce65bf7d

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.495 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.497 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.500 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.502 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.504 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.507 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.509 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.511 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.514 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.516 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.518 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.521 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.523 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.525 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.528 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.530 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.532 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.534 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.537 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.539 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.541 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.544 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.546 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.549 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.551 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.554 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.556 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.558 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.560 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.563 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.565 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.568 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.570 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.573 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.576 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.578 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.583 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.585 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.585 186 INFO tempest.lib.common.rest_client [req-8f9bcf47-65e5-4dba-8424-e6487ea0b900 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:13:51.587 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.588 186 DEBUG tempest.lib.common.rest_client [req-8f9bcf47-65e5-4dba-8424-e6487ea0b900 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f9bcf47-65e5-4dba-8424-e6487ea0b900', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["4z17yzn-QGGB5spBUGNpqg"], "expires_at": "2020-12-14T03:13:51.000000Z", "issued_at": "2020-12-14T02:13:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.590 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.592 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.594 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.597 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.599 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.601 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.603 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.606 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.608 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.606 197 INFO tempest.lib.common.rest_client [req-51c1a65a-18cc-43e6-8882-98cc8d09f7a0 ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 200 DELETE http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-224337647 0.166s 2020-12-14 02:13:51.610 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.612 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.611 197 DEBUG tempest.lib.common.rest_client [req-51c1a65a-18cc-43e6-8882-98cc8d09f7a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-51c1a65a-18cc-43e6-8882-98cc8d09f7a0', 'x-compute-request-id': 'req-51c1a65a-18cc-43e6-8882-98cc8d09f7a0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-224337647'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.614 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:51.615 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:51.621 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-sets:update, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:51.646 189 INFO tempest.lib.common.rest_client [req-00a70930-bc8c-4921-9f9a-3144672390e0 ] Request (ImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/5e21fd566d1f4fb9b67bd99640ec5abd 0.146s 2020-12-14 02:13:51.648 189 DEBUG tempest.lib.common.rest_client [req-00a70930-bc8c-4921-9f9a-3144672390e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-00a70930-bc8c-4921-9f9a-3144672390e0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/5e21fd566d1f4fb9b67bd99640ec5abd'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.669 186 INFO tempest.lib.common.rest_client [req-1fde1b93-b8a0-4ea4-898c-35b531499a8a ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.073s 2020-12-14 02:13:51.672 186 DEBUG tempest.lib.common.rest_client [req-1fde1b93-b8a0-4ea4-898c-35b531499a8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1fde1b93-b8a0-4ea4-898c-35b531499a8a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.735 197 INFO tempest.lib.common.rest_client [req-5a9efb6d-5428-40df-8cb2-48308f7fdef4 ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles 0.112s 2020-12-14 02:13:51.739 197 DEBUG tempest.lib.common.rest_client [req-5a9efb6d-5428-40df-8cb2-48308f7fdef4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a9efb6d-5428-40df-8cb2-48308f7fdef4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.749 189 INFO tempest.lib.common.rest_client [req-d5393e1b-9321-4f07-8b63-501c8f5529f3 ] Request (ImagesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:13:51.752 189 DEBUG tempest.lib.common.rest_client [req-d5393e1b-9321-4f07-8b63-501c8f5529f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5393e1b-9321-4f07-8b63-501c8f5529f3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["U5024RQJQxyDdLHuxu7pyA"], "expires_at": "2020-12-14T03:13:51.000000Z", "issued_at": "2020-12-14T02:13:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.795 186 INFO tempest.lib.common.rest_client [req-67d7b1e1-9477-47cc-bc21-f0033508afe9 ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.117s 2020-12-14 02:13:51.798 186 DEBUG tempest.lib.common.rest_client [req-67d7b1e1-9477-47cc-bc21-f0033508afe9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67d7b1e1-9477-47cc-bc21-f0033508afe9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.801 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:13:51.803 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:51.857 197 INFO tempest.lib.common.rest_client [req-c5505f57-8b19-4e4b-aef5-0ace2ee105d5 ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-12-14 02:13:51.862 197 DEBUG tempest.lib.common.rest_client [req-c5505f57-8b19-4e4b-aef5-0ace2ee105d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c5505f57-8b19-4e4b-aef5-0ace2ee105d5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ef510e52f8894d8baef26dddf289a279", "name": "tempest-FlavorExtraSpecsRbacTest-81596218", "password_expires_at": null}, "audit_ids": ["QVB2xRO6Skilym2Bxvjb3g"], "expires_at": "2020-12-14T03:13:51.000000Z", "issued_at": "2020-12-14T02:13:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4c07be6d6d244dd2b1627e66a2db2646", "name": "tempest-FlavorExtraSpecsRbacTest-81596218"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.871 186 INFO tempest.lib.common.rest_client [req-0eefce5e-ad07-4ea3-80ca-85b4955ea531 ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/0aa919fd35164c8f8ff495e4c7bee62f/users/b7212f2b83c54cfda23847d9e3308dd3/roles 0.062s 2020-12-14 02:13:51.873 186 DEBUG tempest.lib.common.rest_client [req-0eefce5e-ad07-4ea3-80ca-85b4955ea531 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0eefce5e-ad07-4ea3-80ca-85b4955ea531', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0aa919fd35164c8f8ff495e4c7bee62f/users/b7212f2b83c54cfda23847d9e3308dd3/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0aa919fd35164c8f8ff495e4c7bee62f/users/b7212f2b83c54cfda23847d9e3308dd3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.929 193 INFO tempest.lib.common.rest_client [req-f0cc7980-37f5-41b6-aad4-96ac547ec1dc ] Request (QuotaSetsRbacTest:test_update_quota_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-sets/1629f2ea49854d5fa0e9921adfad1cec/defaults 0.303s 2020-12-14 02:13:51.932 193 DEBUG tempest.lib.common.rest_client [req-f0cc7980-37f5-41b6-aad4-96ac547ec1dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '371', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f0cc7980-37f5-41b6-aad4-96ac547ec1dc', 'x-compute-request-id': 'req-f0cc7980-37f5-41b6-aad4-96ac547ec1dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/1629f2ea49854d5fa0e9921adfad1cec/defaults'} Body: b'{"quota_set": {"id": "1629f2ea49854d5fa0e9921adfad1cec", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.960 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:51.960 186 INFO tempest.lib.common.rest_client [req-be73c12f-1964-4263-a525-ad24a77eec7d ] Request (ImageSizeRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0aa919fd35164c8f8ff495e4c7bee62f/users/b7212f2b83c54cfda23847d9e3308dd3/roles/72a4576c553448cd941b052c1ca0cf2d 0.080s 2020-12-14 02:13:51.963 186 DEBUG tempest.lib.common.rest_client [req-be73c12f-1964-4263-a525-ad24a77eec7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be73c12f-1964-4263-a525-ad24a77eec7d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0aa919fd35164c8f8ff495e4c7bee62f/users/b7212f2b83c54cfda23847d9e3308dd3/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:51.980 197 INFO tempest.lib.common.rest_client [req-4f137205-37eb-4b46-a8ce-c31540524deb ] Request (FlavorExtraSpecsRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-224337647 0.109s 2020-12-14 02:13:51.983 197 DEBUG tempest.lib.common.rest_client [req-4f137205-37eb-4b46-a8ce-c31540524deb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '165', 'x-openstack-request-id': 'req-4f137205-37eb-4b46-a8ce-c31540524deb', 'x-compute-request-id': 'req-4f137205-37eb-4b46-a8ce-c31540524deb', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-224337647'} Body: b'{"itemNotFound": {"code": 404, "message": "Flavor f306977b-75f8-4f2c-9067-8d1311b8956e has no extra specs with key tempest-FlavorExtraSpecsRbacTest-key-224337647."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.012 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:52.016 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.019 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.023 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.026 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.030 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.034 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.038 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.041 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.044 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.046 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.049 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.048 189 INFO tempest.lib.common.rest_client [req-735bb76e-6170-4115-baed-2a9067abd1a7 ] Request (ImagesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a7e1198b79c9412caba6575e229a167c&name=default 0.289s 2020-12-14 02:13:52.052 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.052 189 DEBUG tempest.lib.common.rest_client [req-735bb76e-6170-4115-baed-2a9067abd1a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-735bb76e-6170-4115-baed-2a9067abd1a7', 'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a7e1198b79c9412caba6575e229a167c&name=default'} Body: b'{"security_groups": [{"id": "261e5c66-a2bd-4bb5-a70c-6013addc62e0", "name": "default", "stateful": true, "tenant_id": "a7e1198b79c9412caba6575e229a167c", "description": "Default security group", "security_group_rules": [{"id": "07074e99-d9d6-4003-9e93-b4ef7dc35003", "tenant_id": "a7e1198b79c9412caba6575e229a167c", "security_group_id": "261e5c66-a2bd-4bb5-a70c-6013addc62e0", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:51Z", "updated_at": "2020-12-14T02:13:51Z", "revision_number": 0, "project_id": "a7e1198b79c9412caba6575e229a167c"}, {"id": "092177e2-cca0-48a2-a738-4482206ea49b", "tenant_id": "a7e1198b79c9412caba6575e229a167c", "security_group_id": "261e5c66-a2bd-4bb5-a70c-6013addc62e0", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "261e5c66-a2bd-4bb5-a70c-6013addc62e0", "description": null, "tags": [], "created_at": "2020-12-14T02:13:51Z", "updated_at": "2020-12-14T02:13:51Z", "revision_number": 0, "project_id": "a7e1198b79c9412caba6575e229a167c"}, {"id": "dced20ea-0604-497f-bfd4-d7441035d483", "tenant_id": "a7e1198b79c9412caba6575e229a167c", "security_group_id": "261e5c66-a2bd-4bb5-a70c-6013addc62e0", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:51Z", "updated_at": "2020-12-14T02:13:51Z", "revision_number": 0, "project_id": "a7e1198b79c9412caba6575e229a167c"}, {"id": "e898bfa9-36e0-4543-ad1f-aa1fb80d69e0", "tenant_id": "a7e1198b79c9412caba6575e229a167c", "security_group_id": "261e5c66-a2bd-4bb5-a70c-6013addc62e0", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "261e5c66-a2bd-4bb5-a70c-6013addc62e0", "description": null, "tags": [], "created_at": "2020-12-14T02:13:51Z", "updated_at": "2020-12-14T02:13:51Z", "revision_number": 0, "project_id": "a7e1198b79c9412caba6575e229a167c"}], "tags": [], "created_at": "2020-12-14T02:13:51Z", "updated_at": "2020-12-14T02:13:51Z", "revision_number": 1, "project_id": "a7e1198b79c9412caba6575e229a167c"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.055 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.057 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.060 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.064 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.066 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.069 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.072 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.074 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.077 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.080 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.082 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.085 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.085 193 INFO tempest.lib.common.rest_client [req-31822bd2-d172-4ef8-a4f9-b9fc2a49ba8a ] Request (QuotaSetsRbacTest:test_update_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles 0.119s 2020-12-14 02:13:52.088 193 DEBUG tempest.lib.common.rest_client [req-31822bd2-d172-4ef8-a4f9-b9fc2a49ba8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31822bd2-d172-4ef8-a4f9-b9fc2a49ba8a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.088 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.090 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.093 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.096 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.095 186 INFO tempest.lib.common.rest_client [req-ec2fb3ae-189a-4834-8b76-f5452a904771 ] Request (ImageSizeRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0aa919fd35164c8f8ff495e4c7bee62f/users/b7212f2b83c54cfda23847d9e3308dd3/roles/a629c95d64b3416fb80ae90af4f69c05 0.125s 2020-12-14 02:13:52.098 186 DEBUG tempest.lib.common.rest_client [req-ec2fb3ae-189a-4834-8b76-f5452a904771 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec2fb3ae-189a-4834-8b76-f5452a904771', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0aa919fd35164c8f8ff495e4c7bee62f/users/b7212f2b83c54cfda23847d9e3308dd3/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.098 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.101 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.104 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.106 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.109 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.112 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.114 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.117 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.120 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.123 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.127 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.130 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.132 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.135 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.138 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.141 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.144 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.147 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.149 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.152 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.155 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.157 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.160 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.163 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.165 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.168 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.172 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.175 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.180 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.183 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.186 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.189 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.192 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.191 193 INFO tempest.lib.common.rest_client [req-b601099c-af4e-47b3-9bef-364ef9062c77 ] Request (QuotaSetsRbacTest:test_update_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:13:52.194 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.195 193 DEBUG tempest.lib.common.rest_client [req-b601099c-af4e-47b3-9bef-364ef9062c77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b601099c-af4e-47b3-9bef-364ef9062c77', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "342f2aba21b542088e86034d6dc206e6", "name": "tempest-QuotaSetsRbacTest-1374196686", "password_expires_at": null}, "audit_ids": ["SK51uKglStWn9PeKedsuYQ"], "expires_at": "2020-12-14T03:13:52.000000Z", "issued_at": "2020-12-14T02:13:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1629f2ea49854d5fa0e9921adfad1cec", "name": "tempest-QuotaSetsRbacTest-1374196686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.197 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.200 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.202 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.205 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.204 189 INFO tempest.lib.common.rest_client [req-e73a2896-6451-4974-94e3-ca9f948cfb84 ] Request (ImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/261e5c66-a2bd-4bb5-a70c-6013addc62e0 0.144s 2020-12-14 02:13:52.208 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.208 189 DEBUG tempest.lib.common.rest_client [req-e73a2896-6451-4974-94e3-ca9f948cfb84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e73a2896-6451-4974-94e3-ca9f948cfb84', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/261e5c66-a2bd-4bb5-a70c-6013addc62e0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.211 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.213 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.216 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.219 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:52.230 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-extra-specs:update, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:52.294 197 INFO tempest.lib.common.rest_client [req-663fab00-b491-4bc4-827a-953b9c1867b6 ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 200 POST http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs 0.058s 2020-12-14 02:13:52.297 197 DEBUG tempest.lib.common.rest_client [req-663fab00-b491-4bc4-827a-953b9c1867b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-1839906869": "tempest-FlavorExtraSpecsRbacTest-val-697248765"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '118', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-663fab00-b491-4bc4-827a-953b9c1867b6', 'x-compute-request-id': 'req-663fab00-b491-4bc4-827a-953b9c1867b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-1839906869": "tempest-FlavorExtraSpecsRbacTest-val-697248765"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.313 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:52.405 197 INFO tempest.lib.common.rest_client [req-6f7b51a4-7199-4d8a-9576-1e1d321efb2c ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles 0.085s 2020-12-14 02:13:52.409 197 DEBUG tempest.lib.common.rest_client [req-6f7b51a4-7199-4d8a-9576-1e1d321efb2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f7b51a4-7199-4d8a-9576-1e1d321efb2c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.417 189 INFO tempest.lib.common.rest_client [req-1e565c05-f1a9-41af-b565-57eb1a2bbb86 ] Request (ImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c 0.200s 2020-12-14 02:13:52.420 189 DEBUG tempest.lib.common.rest_client [req-1e565c05-f1a9-41af-b565-57eb1a2bbb86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e565c05-f1a9-41af-b565-57eb1a2bbb86', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a7e1198b79c9412caba6575e229a167c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.503 197 INFO tempest.lib.common.rest_client [req-b6205751-2913-43dd-b8e5-cf6917b457e1 ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-14 02:13:52.507 197 DEBUG tempest.lib.common.rest_client [req-b6205751-2913-43dd-b8e5-cf6917b457e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6205751-2913-43dd-b8e5-cf6917b457e1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ef510e52f8894d8baef26dddf289a279", "name": "tempest-FlavorExtraSpecsRbacTest-81596218", "password_expires_at": null}, "audit_ids": ["FyBeHBamS2y-p_xsRArjbw"], "expires_at": "2020-12-14T03:13:52.000000Z", "issued_at": "2020-12-14T02:13:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4c07be6d6d244dd2b1627e66a2db2646", "name": "tempest-FlavorExtraSpecsRbacTest-81596218"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.519 193 INFO tempest.lib.common.rest_client [req-a6363846-5327-4d2d-bb8c-c801565adf43 ] Request (QuotaSetsRbacTest:test_update_quota_set): 200 PUT http://172.30.13.94/compute/v2.1/os-quota-sets/1629f2ea49854d5fa0e9921adfad1cec 0.316s 2020-12-14 02:13:52.522 193 DEBUG tempest.lib.common.rest_client [req-a6363846-5327-4d2d-bb8c-c801565adf43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_set": {"force": true, "injected_file_content_bytes": 20480}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '329', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a6363846-5327-4d2d-bb8c-c801565adf43', 'x-compute-request-id': 'req-a6363846-5327-4d2d-bb8c-c801565adf43', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/1629f2ea49854d5fa0e9921adfad1cec'} Body: b'{"quota_set": {"cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 20480, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.539 189 INFO tempest.lib.common.rest_client [req-228ff5b9-be19-4ac1-95db-568dc4faa229 ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:13:52.542 189 DEBUG tempest.lib.common.rest_client [req-228ff5b9-be19-4ac1-95db-568dc4faa229 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-228ff5b9-be19-4ac1-95db-568dc4faa229', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["DMjyIZTPRLiUdH877pc4_g"], "expires_at": "2020-12-14T03:13:52.000000Z", "issued_at": "2020-12-14T02:13:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.555 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:52.627 193 INFO tempest.lib.common.rest_client [req-6965e7d0-963e-443a-853e-02a8090b4345 ] Request (QuotaSetsRbacTest:test_update_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles 0.066s 2020-12-14 02:13:52.631 193 DEBUG tempest.lib.common.rest_client [req-6965e7d0-963e-443a-853e-02a8090b4345 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6965e7d0-963e-443a-853e-02a8090b4345', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec/users/342f2aba21b542088e86034d6dc206e6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.633 189 INFO tempest.lib.common.rest_client [req-cec94fec-75d9-4fcd-8e32-cdbe8fae0a4f ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:13:52.636 189 DEBUG tempest.lib.common.rest_client [req-cec94fec-75d9-4fcd-8e32-cdbe8fae0a4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cec94fec-75d9-4fcd-8e32-cdbe8fae0a4f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ws94E9EHSN-Xzm2OBbMN_A"], "expires_at": "2020-12-14T03:13:52.000000Z", "issued_at": "2020-12-14T02:13:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.670 197 INFO tempest.lib.common.rest_client [req-477e38ed-8c27-4dfa-baf4-cd65a78c6bde ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 200 PUT http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-1839906869 0.156s 2020-12-14 02:13:52.673 197 DEBUG tempest.lib.common.rest_client [req-477e38ed-8c27-4dfa-baf4-cd65a78c6bde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"tempest-FlavorExtraSpecsRbacTest-key-1839906869": "tempest-FlavorExtraSpecsRbacTest-val-459608114"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '101', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-477e38ed-8c27-4dfa-baf4-cd65a78c6bde', 'x-compute-request-id': 'req-477e38ed-8c27-4dfa-baf4-cd65a78c6bde', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-1839906869'} Body: b'{"tempest-FlavorExtraSpecsRbacTest-key-1839906869": "tempest-FlavorExtraSpecsRbacTest-val-459608114"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.678 193 INFO tempest.lib.common.rest_client [req-9a3f67e5-1081-4331-a059-affda211245f ] Request (QuotaSetsRbacTest:test_update_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:13:52.682 193 DEBUG tempest.lib.common.rest_client [req-9a3f67e5-1081-4331-a059-affda211245f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9a3f67e5-1081-4331-a059-affda211245f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "342f2aba21b542088e86034d6dc206e6", "name": "tempest-QuotaSetsRbacTest-1374196686", "password_expires_at": null}, "audit_ids": ["jQ76CCRkSsepbB5F6HbqIg"], "expires_at": "2020-12-14T03:13:52.000000Z", "issued_at": "2020-12-14T02:13:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1629f2ea49854d5fa0e9921adfad1cec", "name": "tempest-QuotaSetsRbacTest-1374196686"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1629f2ea49854d5fa0e9921adfad1cec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.685 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:52.695 189 INFO tempest.lib.common.rest_client [req-4fa6a411-d096-41b9-87c3-d28d77bf0892 ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.051s 2020-12-14 02:13:52.698 189 DEBUG tempest.lib.common.rest_client [req-4fa6a411-d096-41b9-87c3-d28d77bf0892 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4fa6a411-d096-41b9-87c3-d28d77bf0892', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.753 197 INFO tempest.lib.common.rest_client [req-f27e501e-bd75-4c8f-ae2d-0e296d09909f ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles 0.061s 2020-12-14 02:13:52.756 197 DEBUG tempest.lib.common.rest_client [req-f27e501e-bd75-4c8f-ae2d-0e296d09909f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f27e501e-bd75-4c8f-ae2d-0e296d09909f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646/users/ef510e52f8894d8baef26dddf289a279/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.777 189 INFO tempest.lib.common.rest_client [req-cd9a142f-a02b-4b37-86cf-8cc9e14af7bb ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.070s 2020-12-14 02:13:52.780 189 DEBUG tempest.lib.common.rest_client [req-cd9a142f-a02b-4b37-86cf-8cc9e14af7bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-KeypairsRbacTest-1368540538-desc", "domain_id": "default", "name": "tempest-KeypairsRbacTest-1368540538"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '370', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd9a142f-a02b-4b37-86cf-8cc9e14af7bb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "1c563ea768b9412dac40184549a51a8b", "name": "tempest-KeypairsRbacTest-1368540538", "domain_id": "default", "description": "tempest-KeypairsRbacTest-1368540538-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.854 197 INFO tempest.lib.common.rest_client [req-b3f144c9-1f3f-4d6c-b041-164c2ce37e0f ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:13:52.858 197 DEBUG tempest.lib.common.rest_client [req-b3f144c9-1f3f-4d6c-b041-164c2ce37e0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3f144c9-1f3f-4d6c-b041-164c2ce37e0f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ef510e52f8894d8baef26dddf289a279", "name": "tempest-FlavorExtraSpecsRbacTest-81596218", "password_expires_at": null}, "audit_ids": ["qLh92z8DQzmm-XSrRHPJbQ"], "expires_at": "2020-12-14T03:13:52.000000Z", "issued_at": "2020-12-14T02:13:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4c07be6d6d244dd2b1627e66a2db2646", "name": "tempest-FlavorExtraSpecsRbacTest-81596218"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4c07be6d6d244dd2b1627e66a2db2646", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.910 189 INFO tempest.lib.common.rest_client [req-1d98ac16-d258-49e7-b240-f47e46b5705f ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.122s 2020-12-14 02:13:52.914 189 DEBUG tempest.lib.common.rest_client [req-1d98ac16-d258-49e7-b240-f47e46b5705f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-KeypairsRbacTest-1368540538", "password": "G7+6Gzbw!MiCRmv", "project_id": "1c563ea768b9412dac40184549a51a8b", "email": "tempest-KeypairsRbacTest-959195499@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '387', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d98ac16-d258-49e7-b240-f47e46b5705f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "1c563ea768b9412dac40184549a51a8b", "email": "tempest-KeypairsRbacTest-959195499@example.com", "id": "f417f183d4c04c66baf18282db9d1040", "name": "tempest-KeypairsRbacTest-1368540538", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/f417f183d4c04c66baf18282db9d1040"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:52.987 189 INFO tempest.lib.common.rest_client [req-31c65455-f9d8-43b4-8265-23003d8f9278 ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-12-14 02:13:52.990 189 DEBUG tempest.lib.common.rest_client [req-31c65455-f9d8-43b4-8265-23003d8f9278 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31c65455-f9d8-43b4-8265-23003d8f9278', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.055 189 INFO tempest.lib.common.rest_client [req-15a2c7c1-6f65-4896-9bf0-3a4cf9e6b6e9 ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:13:53.058 189 DEBUG tempest.lib.common.rest_client [req-15a2c7c1-6f65-4896-9bf0-3a4cf9e6b6e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15a2c7c1-6f65-4896-9bf0-3a4cf9e6b6e9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.059 197 INFO tempest.lib.common.rest_client [req-c5b07b88-b148-431a-835f-3f7935b7bef8 ] Request (FlavorExtraSpecsRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-1839906869 0.190s 2020-12-14 02:13:53.062 197 DEBUG tempest.lib.common.rest_client [req-c5b07b88-b148-431a-835f-3f7935b7bef8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c5b07b88-b148-431a-835f-3f7935b7bef8', 'x-compute-request-id': 'req-c5b07b88-b148-431a-835f-3f7935b7bef8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-1839906869'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.092 193 INFO tempest.lib.common.rest_client [req-9913ca27-b545-49d4-b05a-d95af413e206 ] Request (QuotaSetsRbacTest:_run_cleanups): 200 PUT http://172.30.13.94/compute/v2.1/os-quota-sets/1629f2ea49854d5fa0e9921adfad1cec 0.400s 2020-12-14 02:13:53.095 193 DEBUG tempest.lib.common.rest_client [req-9913ca27-b545-49d4-b05a-d95af413e206 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_set": {"cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '329', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9913ca27-b545-49d4-b05a-d95af413e206', 'x-compute-request-id': 'req-9913ca27-b545-49d4-b05a-d95af413e206', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/1629f2ea49854d5fa0e9921adfad1cec'} Body: b'{"quota_set": {"cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.137 197 INFO tempest.lib.common.rest_client [req-95dcee90-ed33-46a9-aebb-87997823de5b ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e 0.048s 2020-12-14 02:13:53.139 197 DEBUG tempest.lib.common.rest_client [req-95dcee90-ed33-46a9-aebb-87997823de5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-95dcee90-ed33-46a9-aebb-87997823de5b', 'x-compute-request-id': 'req-95dcee90-ed33-46a9-aebb-87997823de5b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/f306977b-75f8-4f2c-9067-8d1311b8956e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.147 189 INFO tempest.lib.common.rest_client [req-39859894-383f-4aa8-82a0-32615f7d870f ] Request (KeypairsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles/72a4576c553448cd941b052c1ca0cf2d 0.082s 2020-12-14 02:13:53.150 189 DEBUG tempest.lib.common.rest_client [req-39859894-383f-4aa8-82a0-32615f7d870f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39859894-383f-4aa8-82a0-32615f7d870f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.154 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-KeypairsRbacTest-1368540538', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1c563ea768b9412dac40184549a51a8b', 'project_name': 'tempest-KeypairsRbacTest-1368540538', 'tenant_id': '1c563ea768b9412dac40184549a51a8b', 'tenant_name': 'tempest-KeypairsRbacTest-1368540538', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f417f183d4c04c66baf18282db9d1040'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:53.156 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-KeypairsRbacTest-1368540538', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1c563ea768b9412dac40184549a51a8b', 'project_name': 'tempest-KeypairsRbacTest-1368540538', 'tenant_id': '1c563ea768b9412dac40184549a51a8b', 'tenant_name': 'tempest-KeypairsRbacTest-1368540538', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f417f183d4c04c66baf18282db9d1040'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:53.194 197 INFO tempest.lib.common.rest_client [req-a6394c8f-82b3-4c1a-9dba-c1c972c617ad ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/flavors/detail 0.049s 2020-12-14 02:13:53.196 197 DEBUG tempest.lib.common.rest_client [req-a6394c8f-82b3-4c1a-9dba-c1c972c617ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '9794', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a6394c8f-82b3-4c1a-9dba-c1c972c617ad', 'x-compute-request-id': 'req-a6394c8f-82b3-4c1a-9dba-c1c972c617ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/detail'} Body: b'{"flavors": [{"id": "01e7ff06-4a12-4431-9b40-26277becb41d", "name": "rally_full-flavor_8a0926b1-7dc8-420c-9bd4-67b88c62abef", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/01e7ff06-4a12-4431-9b40-26277becb41d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/01e7ff06-4a12-4431-9b40-26277becb41d"}]}, {"id": "1", "name": "m1.tiny", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1"}]}, {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "name": "patrole_reader-flavor_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, {"id": "2", "name": "m1.small", "ram": 2048, "disk": 20, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2"}]}, {"id": "2919ff17-00dc-474f-9e1b-bf368e65fc74", "name": "rally_verify_4911c945_dl9HdAq1", "ram": 64, "disk": 5, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2919ff17-00dc-474f-9e1b-bf368e65fc74"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2919ff17-00dc-474f-9e1b-bf368e65fc74"}]}, {"id": "29b55520-b9a3-4b97-a3ae-d9c83f854c93", "name": "m1.heat_micro", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}]}, {"id": "3", "name": "m1.medium", "ram": 4096, "disk": 40, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/3"}]}, {"id": "4", "name": "m1.large", "ram": 8192, "disk": 80, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 4, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/4"}]}, {"id": "42", "name": "m1.nano", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/42"}]}, {"id": "442d1175-790f-46a1-b7c8-f52a17f6f7d8", "name": "patrole_member-flavor_c7a2fe1e-65f4-45d7-bab1-5c456aa6e4d6", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30. _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.205 186 INFO tempest.lib.common.rest_client [req-6f57f103-3b32-4bb8-a86c-498f8456d4d8 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:13:53.208 186 DEBUG tempest.lib.common.rest_client [req-6f57f103-3b32-4bb8-a86c-498f8456d4d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f57f103-3b32-4bb8-a86c-498f8456d4d8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b7212f2b83c54cfda23847d9e3308dd3", "name": "tempest-ImageSizeRbacTest-1311523941", "password_expires_at": null}, "audit_ids": ["GBJfNCk2Sz-4iBSafi3xgg"], "expires_at": "2020-12-14T03:13:53.000000Z", "issued_at": "2020-12-14T02:13:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0aa919fd35164c8f8ff495e4c7bee62f", "name": "tempest-ImageSizeRbacTest-1311523941"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0aa919fd35164c8f8ff495e4c7bee62f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0aa919fd35164c8f8ff495e4c7bee62f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0aa919fd35164c8f8ff495e4c7bee62f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0aa919fd35164c8f8ff495e4c7bee62f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0aa919fd35164c8f8ff495e4c7bee62f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0aa919fd35164c8f8ff495e4c7bee62f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.344 193 INFO tempest.lib.common.rest_client [req-c4e327de-72ad-4393-ae56-0f07e964c4bc ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/342f2aba21b542088e86034d6dc206e6 0.193s 2020-12-14 02:13:53.347 193 DEBUG tempest.lib.common.rest_client [req-c4e327de-72ad-4393-ae56-0f07e964c4bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c4e327de-72ad-4393-ae56-0f07e964c4bc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/342f2aba21b542088e86034d6dc206e6'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.364 189 INFO tempest.lib.common.rest_client [req-837bc236-c9f8-4d3d-9617-8c8865c32c6e ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.139s 2020-12-14 02:13:53.368 189 DEBUG tempest.lib.common.rest_client [req-837bc236-c9f8-4d3d-9617-8c8865c32c6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6563', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-837bc236-c9f8-4d3d-9617-8c8865c32c6e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f417f183d4c04c66baf18282db9d1040", "name": "tempest-KeypairsRbacTest-1368540538", "password_expires_at": null}, "audit_ids": ["XGAZrDVEQ36tZGOrfGMhGg"], "expires_at": "2020-12-14T03:13:53.000000Z", "issued_at": "2020-12-14T02:13:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1c563ea768b9412dac40184549a51a8b", "name": "tempest-KeypairsRbacTest-1368540538"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.373 186 INFO tempest.lib.common.rest_client [req-e1fd56c3-dd2d-4275-8ba2-9ee541abb693 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/image/v2/images 0.152s 2020-12-14 02:13:53.375 186 DEBUG tempest.lib.common.rest_client [req-e1fd56c3-dd2d-4275-8ba2-9ee541abb693 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImageSizeRbacTest-image-969516590"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '645', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/b6d909ba-2c54-4837-b076-5cc87f409587', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-e1fd56c3-dd2d-4275-8ba2-9ee541abb693', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImageSizeRbacTest-image-969516590", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "0aa919fd35164c8f8ff495e4c7bee62f", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "b6d909ba-2c54-4837-b076-5cc87f409587", "created_at": "2020-12-14T02:13:53Z", "updated_at": "2020-12-14T02:13:53Z", "tags": [], "self": "/v2/images/b6d909ba-2c54-4837-b076-5cc87f409587", "file": "/v2/images/b6d909ba-2c54-4837-b076-5cc87f409587/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.430 189 INFO tempest.lib.common.rest_client [req-f4c831be-2908-416b-b8ee-150a10aaaec4 ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:13:53.434 189 DEBUG tempest.lib.common.rest_client [req-f4c831be-2908-416b-b8ee-150a10aaaec4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4c831be-2908-416b-b8ee-150a10aaaec4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["iafV_OzIQWODThagexDPtQ"], "expires_at": "2020-12-14T03:13:53.000000Z", "issued_at": "2020-12-14T02:13:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.446 193 INFO tempest.lib.common.rest_client [req-a4f1df52-a4d7-4d28-8a9c-ae20de6474a6 ] Request (QuotaSetsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:13:53.449 193 DEBUG tempest.lib.common.rest_client [req-a4f1df52-a4d7-4d28-8a9c-ae20de6474a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a4f1df52-a4d7-4d28-8a9c-ae20de6474a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["X7W9T9s2Rkeo8P-Z-IS1ag"], "expires_at": "2020-12-14T03:13:53.000000Z", "issued_at": "2020-12-14T02:13:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.501 186 INFO tempest.lib.common.rest_client [req-59a0dfaf-cd1c-451e-9084-4c1497a877fd ] Request (ImageSizeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/b6d909ba-2c54-4837-b076-5cc87f409587 0.108s 2020-12-14 02:13:53.504 186 DEBUG tempest.lib.common.rest_client [req-59a0dfaf-cd1c-451e-9084-4c1497a877fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-59a0dfaf-cd1c-451e-9084-4c1497a877fd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/b6d909ba-2c54-4837-b076-5cc87f409587'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.543 186 INFO tempest.lib.common.rest_client [req-634ec7fe-748c-455e-9275-4bc6a1cd2046 ] Request (ImageSizeRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/b6d909ba-2c54-4837-b076-5cc87f409587 0.031s 2020-12-14 02:13:53.546 189 INFO tempest.lib.common.rest_client [req-65ff62b3-82ec-4841-9b0d-e54a090e8feb ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:13:53.546 186 DEBUG tempest.lib.common.rest_client [req-634ec7fe-748c-455e-9275-4bc6a1cd2046 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-634ec7fe-748c-455e-9275-4bc6a1cd2046', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/b6d909ba-2c54-4837-b076-5cc87f409587'} Body: b'{"message": "No image found with ID b6d909ba-2c54-4837-b076-5cc87f409587

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.549 189 DEBUG tempest.lib.common.rest_client [req-65ff62b3-82ec-4841-9b0d-e54a090e8feb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-65ff62b3-82ec-4841-9b0d-e54a090e8feb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["8fkpW9tCQ5u3EzUzgAKVwg"], "expires_at": "2020-12-14T03:13:53.000000Z", "issued_at": "2020-12-14T02:13:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.552 197 INFO tempest.lib.common.rest_client [req-2cc05712-3959-44af-aa34-aa3a57e699a0 ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/ef510e52f8894d8baef26dddf289a279 0.218s 2020-12-14 02:13:53.554 197 DEBUG tempest.lib.common.rest_client [req-2cc05712-3959-44af-aa34-aa3a57e699a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2cc05712-3959-44af-aa34-aa3a57e699a0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/ef510e52f8894d8baef26dddf289a279'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.657 197 INFO tempest.lib.common.rest_client [req-b65e8e78-8f50-48e4-bd7b-b037f867ba38 ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:13:53.660 197 DEBUG tempest.lib.common.rest_client [req-b65e8e78-8f50-48e4-bd7b-b037f867ba38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b65e8e78-8f50-48e4-bd7b-b037f867ba38', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["2q1ib07eRXehLUPa1pl5dw"], "expires_at": "2020-12-14T03:13:53.000000Z", "issued_at": "2020-12-14T02:13:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.663 189 INFO tempest.lib.common.rest_client [req-02cd0c85-cf07-4bb2-81c5-1a817e302856 ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.107s 2020-12-14 02:13:53.666 189 DEBUG tempest.lib.common.rest_client [req-02cd0c85-cf07-4bb2-81c5-1a817e302856 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02cd0c85-cf07-4bb2-81c5-1a817e302856', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.734 193 INFO tempest.lib.common.rest_client [req-df446449-52fd-4107-b546-af0433619c7d ] Request (QuotaSetsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1629f2ea49854d5fa0e9921adfad1cec&name=default 0.277s 2020-12-14 02:13:53.735 189 INFO tempest.lib.common.rest_client [req-0350c951-818c-4670-8ca8-5ff1c40b0d54 ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:13:53.737 193 DEBUG tempest.lib.common.rest_client [req-df446449-52fd-4107-b546-af0433619c7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-df446449-52fd-4107-b546-af0433619c7d', 'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1629f2ea49854d5fa0e9921adfad1cec&name=default'} Body: b'{"security_groups": [{"id": "25cb234d-bef0-42a0-a772-a475d2a6c73d", "name": "default", "stateful": true, "tenant_id": "1629f2ea49854d5fa0e9921adfad1cec", "description": "Default security group", "security_group_rules": [{"id": "30e67c91-a78c-4727-8d16-0c062a949597", "tenant_id": "1629f2ea49854d5fa0e9921adfad1cec", "security_group_id": "25cb234d-bef0-42a0-a772-a475d2a6c73d", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "25cb234d-bef0-42a0-a772-a475d2a6c73d", "description": null, "tags": [], "created_at": "2020-12-14T02:13:53Z", "updated_at": "2020-12-14T02:13:53Z", "revision_number": 0, "project_id": "1629f2ea49854d5fa0e9921adfad1cec"}, {"id": "5b5bb719-04ae-4727-947a-756c7da3d1a8", "tenant_id": "1629f2ea49854d5fa0e9921adfad1cec", "security_group_id": "25cb234d-bef0-42a0-a772-a475d2a6c73d", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:53Z", "updated_at": "2020-12-14T02:13:53Z", "revision_number": 0, "project_id": "1629f2ea49854d5fa0e9921adfad1cec"}, {"id": "7ee093f5-fb76-48e7-9b3f-9cbfc4a31b81", "tenant_id": "1629f2ea49854d5fa0e9921adfad1cec", "security_group_id": "25cb234d-bef0-42a0-a772-a475d2a6c73d", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "25cb234d-bef0-42a0-a772-a475d2a6c73d", "description": null, "tags": [], "created_at": "2020-12-14T02:13:53Z", "updated_at": "2020-12-14T02:13:53Z", "revision_number": 0, "project_id": "1629f2ea49854d5fa0e9921adfad1cec"}, {"id": "f3415d09-9c4b-45be-8bda-afc34b39d7af", "tenant_id": "1629f2ea49854d5fa0e9921adfad1cec", "security_group_id": "25cb234d-bef0-42a0-a772-a475d2a6c73d", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:53Z", "updated_at": "2020-12-14T02:13:53Z", "revision_number": 0, "project_id": "1629f2ea49854d5fa0e9921adfad1cec"}], "tags": [], "created_at": "2020-12-14T02:13:53Z", "updated_at": "2020-12-14T02:13:53Z", "revision_number": 1, "project_id": "1629f2ea49854d5fa0e9921adfad1cec"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.738 189 DEBUG tempest.lib.common.rest_client [req-0350c951-818c-4670-8ca8-5ff1c40b0d54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0350c951-818c-4670-8ca8-5ff1c40b0d54', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.742 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:13:53.744 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:53.754 186 INFO tempest.lib.common.rest_client [req-dda27cb1-a2de-495d-a26b-2fc2cd21b959 ] Request (ImageSizeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/b7212f2b83c54cfda23847d9e3308dd3 0.200s 2020-12-14 02:13:53.757 186 DEBUG tempest.lib.common.rest_client [req-dda27cb1-a2de-495d-a26b-2fc2cd21b959 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dda27cb1-a2de-495d-a26b-2fc2cd21b959', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/b7212f2b83c54cfda23847d9e3308dd3'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.863 189 INFO tempest.lib.common.rest_client [req-f3c82644-9da9-40de-8e1b-6c07685233d5 ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles 0.112s 2020-12-14 02:13:53.867 189 DEBUG tempest.lib.common.rest_client [req-f3c82644-9da9-40de-8e1b-6c07685233d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3c82644-9da9-40de-8e1b-6c07685233d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.868 186 INFO tempest.lib.common.rest_client [req-34d96e96-bd3c-481a-a3cd-2cc35aa93b36 ] Request (ImageSizeRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:13:53.871 186 DEBUG tempest.lib.common.rest_client [req-34d96e96-bd3c-481a-a3cd-2cc35aa93b36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34d96e96-bd3c-481a-a3cd-2cc35aa93b36', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["VFwlvDdxTiK6Ds-NOYfFMQ"], "expires_at": "2020-12-14T03:13:53.000000Z", "issued_at": "2020-12-14T02:13:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.912 193 INFO tempest.lib.common.rest_client [req-b1a9ec70-d739-496a-acf7-c4403781cb65 ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/25cb234d-bef0-42a0-a772-a475d2a6c73d 0.169s 2020-12-14 02:13:53.916 193 DEBUG tempest.lib.common.rest_client [req-b1a9ec70-d739-496a-acf7-c4403781cb65 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-b1a9ec70-d739-496a-acf7-c4403781cb65', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/25cb234d-bef0-42a0-a772-a475d2a6c73d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:53.954 189 INFO tempest.lib.common.rest_client [req-0ab76ff3-33e4-42e8-92eb-850e42e23644 ] Request (KeypairsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles/72a4576c553448cd941b052c1ca0cf2d 0.080s 2020-12-14 02:13:53.957 189 DEBUG tempest.lib.common.rest_client [req-0ab76ff3-33e4-42e8-92eb-850e42e23644 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ab76ff3-33e4-42e8-92eb-850e42e23644', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.064 197 INFO tempest.lib.common.rest_client [req-177a73c5-6931-41cd-9050-c6519c4f4470 ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4c07be6d6d244dd2b1627e66a2db2646&name=default 0.397s 2020-12-14 02:13:54.066 193 INFO tempest.lib.common.rest_client [req-24011a05-4541-4ae6-b089-2276da83acdf ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec 0.144s 2020-12-14 02:13:54.068 197 DEBUG tempest.lib.common.rest_client [req-177a73c5-6931-41cd-9050-c6519c4f4470 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-177a73c5-6931-41cd-9050-c6519c4f4470', 'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4c07be6d6d244dd2b1627e66a2db2646&name=default'} Body: b'{"security_groups": [{"id": "d2bbf849-0e6b-41f0-b7a6-b9ca9b22178b", "name": "default", "stateful": true, "tenant_id": "4c07be6d6d244dd2b1627e66a2db2646", "description": "Default security group", "security_group_rules": [{"id": "0dc3264f-362f-47bc-b96e-95f2cd08c136", "tenant_id": "4c07be6d6d244dd2b1627e66a2db2646", "security_group_id": "d2bbf849-0e6b-41f0-b7a6-b9ca9b22178b", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:53Z", "updated_at": "2020-12-14T02:13:53Z", "revision_number": 0, "project_id": "4c07be6d6d244dd2b1627e66a2db2646"}, {"id": "3ba3abf6-657e-4ac6-a0e3-9050586bd92d", "tenant_id": "4c07be6d6d244dd2b1627e66a2db2646", "security_group_id": "d2bbf849-0e6b-41f0-b7a6-b9ca9b22178b", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d2bbf849-0e6b-41f0-b7a6-b9ca9b22178b", "description": null, "tags": [], "created_at": "2020-12-14T02:13:53Z", "updated_at": "2020-12-14T02:13:53Z", "revision_number": 0, "project_id": "4c07be6d6d244dd2b1627e66a2db2646"}, {"id": "577ad0f9-402d-4c09-838a-dc0f443d24b5", "tenant_id": "4c07be6d6d244dd2b1627e66a2db2646", "security_group_id": "d2bbf849-0e6b-41f0-b7a6-b9ca9b22178b", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d2bbf849-0e6b-41f0-b7a6-b9ca9b22178b", "description": null, "tags": [], "created_at": "2020-12-14T02:13:53Z", "updated_at": "2020-12-14T02:13:53Z", "revision_number": 0, "project_id": "4c07be6d6d244dd2b1627e66a2db2646"}, {"id": "9354a6c5-2c6f-4281-bdd9-b60891c2dd34", "tenant_id": "4c07be6d6d244dd2b1627e66a2db2646", "security_group_id": "d2bbf849-0e6b-41f0-b7a6-b9ca9b22178b", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:53Z", "updated_at": "2020-12-14T02:13:53Z", "revision_number": 0, "project_id": "4c07be6d6d244dd2b1627e66a2db2646"}], "tags": [], "created_at": "2020-12-14T02:13:53Z", "updated_at": "2020-12-14T02:13:53Z", "revision_number": 1, "project_id": "4c07be6d6d244dd2b1627e66a2db2646"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.069 193 DEBUG tempest.lib.common.rest_client [req-24011a05-4541-4ae6-b089-2276da83acdf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24011a05-4541-4ae6-b089-2276da83acdf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1629f2ea49854d5fa0e9921adfad1cec'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.070 189 INFO tempest.lib.common.rest_client [req-579f270b-2775-402e-a98a-8182b711dca5 ] Request (KeypairsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles/a629c95d64b3416fb80ae90af4f69c05 0.107s 2020-12-14 02:13:54.072 189 DEBUG tempest.lib.common.rest_client [req-579f270b-2775-402e-a98a-8182b711dca5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-579f270b-2775-402e-a98a-8182b711dca5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.215 186 INFO tempest.lib.common.rest_client [req-5fc8bbbc-70aa-4667-9c42-0141e7bb7705 ] Request (ImageSizeRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0aa919fd35164c8f8ff495e4c7bee62f&name=default 0.336s 2020-12-14 02:13:54.218 186 DEBUG tempest.lib.common.rest_client [req-5fc8bbbc-70aa-4667-9c42-0141e7bb7705 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-5fc8bbbc-70aa-4667-9c42-0141e7bb7705', 'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0aa919fd35164c8f8ff495e4c7bee62f&name=default'} Body: b'{"security_groups": [{"id": "0fd5ab63-0226-4ad8-9a24-a8e9157fbde0", "name": "default", "stateful": true, "tenant_id": "0aa919fd35164c8f8ff495e4c7bee62f", "description": "Default security group", "security_group_rules": [{"id": "050f6e4a-f17d-4c40-aa8c-a1a760b07b36", "tenant_id": "0aa919fd35164c8f8ff495e4c7bee62f", "security_group_id": "0fd5ab63-0226-4ad8-9a24-a8e9157fbde0", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:54Z", "updated_at": "2020-12-14T02:13:54Z", "revision_number": 0, "project_id": "0aa919fd35164c8f8ff495e4c7bee62f"}, {"id": "447fbd8c-d173-4b5f-80f7-bdb93c7786ea", "tenant_id": "0aa919fd35164c8f8ff495e4c7bee62f", "security_group_id": "0fd5ab63-0226-4ad8-9a24-a8e9157fbde0", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "0fd5ab63-0226-4ad8-9a24-a8e9157fbde0", "description": null, "tags": [], "created_at": "2020-12-14T02:13:54Z", "updated_at": "2020-12-14T02:13:54Z", "revision_number": 0, "project_id": "0aa919fd35164c8f8ff495e4c7bee62f"}, {"id": "45c4879d-a459-4806-b263-fa7abe523c23", "tenant_id": "0aa919fd35164c8f8ff495e4c7bee62f", "security_group_id": "0fd5ab63-0226-4ad8-9a24-a8e9157fbde0", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "0fd5ab63-0226-4ad8-9a24-a8e9157fbde0", "description": null, "tags": [], "created_at": "2020-12-14T02:13:54Z", "updated_at": "2020-12-14T02:13:54Z", "revision_number": 0, "project_id": "0aa919fd35164c8f8ff495e4c7bee62f"}, {"id": "bf8d342d-e947-4638-ad98-caa054a0511b", "tenant_id": "0aa919fd35164c8f8ff495e4c7bee62f", "security_group_id": "0fd5ab63-0226-4ad8-9a24-a8e9157fbde0", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:54Z", "updated_at": "2020-12-14T02:13:54Z", "revision_number": 0, "project_id": "0aa919fd35164c8f8ff495e4c7bee62f"}], "tags": [], "created_at": "2020-12-14T02:13:54Z", "updated_at": "2020-12-14T02:13:54Z", "revision_number": 1, "project_id": "0aa919fd35164c8f8ff495e4c7bee62f"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.219 197 INFO tempest.lib.common.rest_client [req-df3df3ea-9976-41a4-ad7d-779c21cf8b53 ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/d2bbf849-0e6b-41f0-b7a6-b9ca9b22178b 0.143s 2020-12-14 02:13:54.222 197 DEBUG tempest.lib.common.rest_client [req-df3df3ea-9976-41a4-ad7d-779c21cf8b53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-df3df3ea-9976-41a4-ad7d-779c21cf8b53', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/d2bbf849-0e6b-41f0-b7a6-b9ca9b22178b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.298 193 INFO tempest.lib.common.rest_client [req-d7bd840c-3c5a-4d83-8d69-eca92a4a75d9 ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/d9917ea1137e4a65909bccfc4ab35596 0.223s 2020-12-14 02:13:54.300 193 DEBUG tempest.lib.common.rest_client [req-d7bd840c-3c5a-4d83-8d69-eca92a4a75d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d7bd840c-3c5a-4d83-8d69-eca92a4a75d9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/d9917ea1137e4a65909bccfc4ab35596'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.373 197 INFO tempest.lib.common.rest_client [req-06065c89-98d7-453d-8f6c-0eb24e6ea40d ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646 0.144s 2020-12-14 02:13:54.376 197 DEBUG tempest.lib.common.rest_client [req-06065c89-98d7-453d-8f6c-0eb24e6ea40d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06065c89-98d7-453d-8f6c-0eb24e6ea40d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4c07be6d6d244dd2b1627e66a2db2646'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.411 186 INFO tempest.lib.common.rest_client [req-98418551-39fd-44df-b004-37146107e5dd ] Request (ImageSizeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/0fd5ab63-0226-4ad8-9a24-a8e9157fbde0 0.185s 2020-12-14 02:13:54.414 186 DEBUG tempest.lib.common.rest_client [req-98418551-39fd-44df-b004-37146107e5dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-98418551-39fd-44df-b004-37146107e5dd', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/0fd5ab63-0226-4ad8-9a24-a8e9157fbde0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.496 197 INFO tempest.lib.common.rest_client [req-43117d14-8890-44e3-b4d0-d38f81bf6119 ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:13:54.500 197 DEBUG tempest.lib.common.rest_client [req-43117d14-8890-44e3-b4d0-d38f81bf6119 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43117d14-8890-44e3-b4d0-d38f81bf6119', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Lj7UKc8mQpycRqnbbdpPrw"], "expires_at": "2020-12-14T03:13:54.000000Z", "issued_at": "2020-12-14T02:13:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.513 193 INFO tempest.lib.common.rest_client [req-eccf0c2d-a459-4bc3-aa69-ee8bc6daed7f ] Request (QuotaSetsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=085d5c0d66054177a5b2db8607045ff7&name=default 0.207s 2020-12-14 02:13:54.515 193 DEBUG tempest.lib.common.rest_client [req-eccf0c2d-a459-4bc3-aa69-ee8bc6daed7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-eccf0c2d-a459-4bc3-aa69-ee8bc6daed7f', 'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=085d5c0d66054177a5b2db8607045ff7&name=default'} Body: b'{"security_groups": [{"id": "dbbd28ef-bdee-4af0-9ff4-e084b98892ad", "name": "default", "stateful": true, "tenant_id": "085d5c0d66054177a5b2db8607045ff7", "description": "Default security group", "security_group_rules": [{"id": "129f8800-cb57-4e4a-b45d-e7c1d606caa4", "tenant_id": "085d5c0d66054177a5b2db8607045ff7", "security_group_id": "dbbd28ef-bdee-4af0-9ff4-e084b98892ad", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "dbbd28ef-bdee-4af0-9ff4-e084b98892ad", "description": null, "tags": [], "created_at": "2020-12-14T02:13:54Z", "updated_at": "2020-12-14T02:13:54Z", "revision_number": 0, "project_id": "085d5c0d66054177a5b2db8607045ff7"}, {"id": "32f1c761-b23f-477c-8129-e77ffc8b90aa", "tenant_id": "085d5c0d66054177a5b2db8607045ff7", "security_group_id": "dbbd28ef-bdee-4af0-9ff4-e084b98892ad", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:54Z", "updated_at": "2020-12-14T02:13:54Z", "revision_number": 0, "project_id": "085d5c0d66054177a5b2db8607045ff7"}, {"id": "54ee851c-d727-45b7-a876-3cac285a4023", "tenant_id": "085d5c0d66054177a5b2db8607045ff7", "security_group_id": "dbbd28ef-bdee-4af0-9ff4-e084b98892ad", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:54Z", "updated_at": "2020-12-14T02:13:54Z", "revision_number": 0, "project_id": "085d5c0d66054177a5b2db8607045ff7"}, {"id": "7ed3c690-fa1b-4df1-9663-37a49f3e8c1c", "tenant_id": "085d5c0d66054177a5b2db8607045ff7", "security_group_id": "dbbd28ef-bdee-4af0-9ff4-e084b98892ad", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "dbbd28ef-bdee-4af0-9ff4-e084b98892ad", "description": null, "tags": [], "created_at": "2020-12-14T02:13:54Z", "updated_at": "2020-12-14T02:13:54Z", "revision_number": 0, "project_id": "085d5c0d66054177a5b2db8607045ff7"}], "tags": [], "created_at": "2020-12-14T02:13:54Z", "updated_at": "2020-12-14T02:13:54Z", "revision_number": 1, "project_id": "085d5c0d66054177a5b2db8607045ff7"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.613 186 INFO tempest.lib.common.rest_client [req-06b78282-78b9-403b-8508-38f20174276f ] Request (ImageSizeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0aa919fd35164c8f8ff495e4c7bee62f 0.193s 2020-12-14 02:13:54.615 186 DEBUG tempest.lib.common.rest_client [req-06b78282-78b9-403b-8508-38f20174276f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06b78282-78b9-403b-8508-38f20174276f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0aa919fd35164c8f8ff495e4c7bee62f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.656 197 INFO tempest.lib.common.rest_client [req-5270d88d-5501-488d-a4bb-ab96c1303e49 ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:13:54.659 197 DEBUG tempest.lib.common.rest_client [req-5270d88d-5501-488d-a4bb-ab96c1303e49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5270d88d-5501-488d-a4bb-ab96c1303e49', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["UAxpQ6y3R3eLJQ4K0BiOfw"], "expires_at": "2020-12-14T03:13:54.000000Z", "issued_at": "2020-12-14T02:13:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.681 186 INFO tempest.lib.common.rest_client [req-97ca50f1-672c-434f-ba2c-c6e75170ef0f ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:13:54.683 193 INFO tempest.lib.common.rest_client [req-f3178d93-5152-450b-ae7b-8e60e9a60c9b ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/dbbd28ef-bdee-4af0-9ff4-e084b98892ad 0.162s 2020-12-14 02:13:54.685 186 DEBUG tempest.lib.common.rest_client [req-97ca50f1-672c-434f-ba2c-c6e75170ef0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97ca50f1-672c-434f-ba2c-c6e75170ef0f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["LaJ7DQB7T5iEqZR4XffhFQ"], "expires_at": "2020-12-14T03:13:54.000000Z", "issued_at": "2020-12-14T02:13:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.685 193 DEBUG tempest.lib.common.rest_client [req-f3178d93-5152-450b-ae7b-8e60e9a60c9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f3178d93-5152-450b-ae7b-8e60e9a60c9b', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/dbbd28ef-bdee-4af0-9ff4-e084b98892ad'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.732 197 INFO tempest.lib.common.rest_client [req-b5247273-7da2-44f2-8ab3-f2683ed9f04c ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.065s 2020-12-14 02:13:54.735 197 DEBUG tempest.lib.common.rest_client [req-b5247273-7da2-44f2-8ab3-f2683ed9f04c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b5247273-7da2-44f2-8ab3-f2683ed9f04c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.812 197 INFO tempest.lib.common.rest_client [req-8c1bceab-4e8f-4eba-b84c-b7f16745aaf6 ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.069s 2020-12-14 02:13:54.816 197 DEBUG tempest.lib.common.rest_client [req-8c1bceab-4e8f-4eba-b84c-b7f16745aaf6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FlavorManageRbacTest-1344068247-desc", "domain_id": "default", "name": "tempest-FlavorManageRbacTest-1344068247"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '378', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c1bceab-4e8f-4eba-b84c-b7f16745aaf6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "17a155987f7f426ea78e13dce4012d6e", "name": "tempest-FlavorManageRbacTest-1344068247", "domain_id": "default", "description": "tempest-FlavorManageRbacTest-1344068247-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.829 193 INFO tempest.lib.common.rest_client [req-e25a3e1c-b6de-4651-b14e-0d62ca8f217a ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/085d5c0d66054177a5b2db8607045ff7 0.136s 2020-12-14 02:13:54.832 186 INFO tempest.lib.common.rest_client [req-9bc943d5-e36e-4035-a976-17d13ad2f418 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:13:54.832 193 DEBUG tempest.lib.common.rest_client [req-e25a3e1c-b6de-4651-b14e-0d62ca8f217a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e25a3e1c-b6de-4651-b14e-0d62ca8f217a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/085d5c0d66054177a5b2db8607045ff7'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.835 186 DEBUG tempest.lib.common.rest_client [req-9bc943d5-e36e-4035-a976-17d13ad2f418 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9bc943d5-e36e-4035-a976-17d13ad2f418', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ZOimTaeLS6WE8LY4SgGKXA"], "expires_at": "2020-12-14T03:13:54.000000Z", "issued_at": "2020-12-14T02:13:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.920 193 INFO tempest.lib.common.rest_client [req-f5bb6993-bad4-4d43-aa9f-0a47f4cffdc3 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-12-14 02:13:54.923 193 DEBUG tempest.lib.common.rest_client [req-f5bb6993-bad4-4d43-aa9f-0a47f4cffdc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f5bb6993-bad4-4d43-aa9f-0a47f4cffdc3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["TgbZYCHUTNmN8zFtaxOuFA"], "expires_at": "2020-12-14T03:13:54.000000Z", "issued_at": "2020-12-14T02:13:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.939 197 INFO tempest.lib.common.rest_client [req-2188cef1-999c-4bcd-97d8-d075bf2a15d7 ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.115s 2020-12-14 02:13:54.942 197 DEBUG tempest.lib.common.rest_client [req-2188cef1-999c-4bcd-97d8-d075bf2a15d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FlavorManageRbacTest-1344068247", "password": "A6!R5L^azwplKfS", "project_id": "17a155987f7f426ea78e13dce4012d6e", "email": "tempest-FlavorManageRbacTest-619477750@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '395', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2188cef1-999c-4bcd-97d8-d075bf2a15d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "17a155987f7f426ea78e13dce4012d6e", "email": "tempest-FlavorManageRbacTest-619477750@example.com", "id": "5359248896304ba0800ab047b94ee6fe", "name": "tempest-FlavorManageRbacTest-1344068247", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/5359248896304ba0800ab047b94ee6fe"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:54.983 186 INFO tempest.lib.common.rest_client [req-da6f1522-aa9a-4afb-a7f1-c9cc4e6ac1cc ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.139s 2020-12-14 02:13:54.986 186 DEBUG tempest.lib.common.rest_client [req-da6f1522-aa9a-4afb-a7f1-c9cc4e6ac1cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da6f1522-aa9a-4afb-a7f1-c9cc4e6ac1cc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.009 197 INFO tempest.lib.common.rest_client [req-c7e57956-ef9e-4bb1-b35b-58f9fb85a5f5 ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:13:55.012 197 DEBUG tempest.lib.common.rest_client [req-c7e57956-ef9e-4bb1-b35b-58f9fb85a5f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7e57956-ef9e-4bb1-b35b-58f9fb85a5f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.030 193 INFO tempest.lib.common.rest_client [req-c9fd9a6e-a0e9-48d3-90fc-4ae592a74197 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:13:55.033 193 DEBUG tempest.lib.common.rest_client [req-c9fd9a6e-a0e9-48d3-90fc-4ae592a74197 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9fd9a6e-a0e9-48d3-90fc-4ae592a74197', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["g-2LaNwRQeWOWXpVc0Leyw"], "expires_at": "2020-12-14T03:13:55.000000Z", "issued_at": "2020-12-14T02:13:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.068 186 INFO tempest.lib.common.rest_client [req-cda63636-302a-4013-9c9d-5b71da15777d ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.075s 2020-12-14 02:13:55.071 186 DEBUG tempest.lib.common.rest_client [req-cda63636-302a-4013-9c9d-5b71da15777d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaClassesRbacTest-123847387-desc", "domain_id": "default", "name": "tempest-QuotaClassesRbacTest-123847387"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cda63636-302a-4013-9c9d-5b71da15777d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "4629b9b7560643dc92c3ab11be678c7e", "name": "tempest-QuotaClassesRbacTest-123847387", "domain_id": "default", "description": "tempest-QuotaClassesRbacTest-123847387-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.079 197 INFO tempest.lib.common.rest_client [req-e95208a1-475a-46e5-a41b-4783fc91065c ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:13:55.082 197 DEBUG tempest.lib.common.rest_client [req-e95208a1-475a-46e5-a41b-4783fc91065c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e95208a1-475a-46e5-a41b-4783fc91065c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.164 193 INFO tempest.lib.common.rest_client [req-53fad584-91e9-48cb-99bc-56bca8340747 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.123s 2020-12-14 02:13:55.166 193 DEBUG tempest.lib.common.rest_client [req-53fad584-91e9-48cb-99bc-56bca8340747 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53fad584-91e9-48cb-99bc-56bca8340747', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.188 189 INFO tempest.lib.common.rest_client [req-9ef3a794-0320-43ea-b8f1-fadbb3285ea2 ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:13:55.192 189 DEBUG tempest.lib.common.rest_client [req-9ef3a794-0320-43ea-b8f1-fadbb3285ea2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ef3a794-0320-43ea-b8f1-fadbb3285ea2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f417f183d4c04c66baf18282db9d1040", "name": "tempest-KeypairsRbacTest-1368540538", "password_expires_at": null}, "audit_ids": ["Ag4OmXInQqWJYVJO_fDppQ"], "expires_at": "2020-12-14T03:13:55.000000Z", "issued_at": "2020-12-14T02:13:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1c563ea768b9412dac40184549a51a8b", "name": "tempest-KeypairsRbacTest-1368540538"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.203 186 INFO tempest.lib.common.rest_client [req-f35fc33b-f099-4a97-a647-7b5a5691cb36 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.124s 2020-12-14 02:13:55.206 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:55.207 186 DEBUG tempest.lib.common.rest_client [req-f35fc33b-f099-4a97-a647-7b5a5691cb36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-QuotaClassesRbacTest-123847387", "password": "X9!915GlGD3*R04", "project_id": "4629b9b7560643dc92c3ab11be678c7e", "email": "tempest-QuotaClassesRbacTest-1130872391@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '395', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f35fc33b-f099-4a97-a647-7b5a5691cb36', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "4629b9b7560643dc92c3ab11be678c7e", "email": "tempest-QuotaClassesRbacTest-1130872391@example.com", "id": "ba3c9f05106c4703bb8682d3ad0c2e33", "name": "tempest-QuotaClassesRbacTest-123847387", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/ba3c9f05106c4703bb8682d3ad0c2e33"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.211 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.214 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.218 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.221 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.225 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.229 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.234 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.237 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.240 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.243 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.246 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.249 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.252 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.255 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.254 193 INFO tempest.lib.common.rest_client [req-746b9e49-a770-4c4f-bc18-59722fcd585e ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.079s 2020-12-14 02:13:55.258 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.257 193 DEBUG tempest.lib.common.rest_client [req-746b9e49-a770-4c4f-bc18-59722fcd585e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerConsolesRbacTest-1721381461-desc", "domain_id": "default", "name": "tempest-ServerConsolesRbacTest-1721381461"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-746b9e49-a770-4c4f-bc18-59722fcd585e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "6416f6d9d76f40d3a9a3fbe3e0564902", "name": "tempest-ServerConsolesRbacTest-1721381461", "domain_id": "default", "description": "tempest-ServerConsolesRbacTest-1721381461-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.261 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.261 197 INFO tempest.lib.common.rest_client [req-bf891481-2c74-49ed-bfc3-27fa7862f42f ] Request (FlavorManageRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles/72a4576c553448cd941b052c1ca0cf2d 0.168s 2020-12-14 02:13:55.264 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.265 197 DEBUG tempest.lib.common.rest_client [req-bf891481-2c74-49ed-bfc3-27fa7862f42f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf891481-2c74-49ed-bfc3-27fa7862f42f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.267 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.268 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorManageRbacTest-1344068247', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '17a155987f7f426ea78e13dce4012d6e', 'project_name': 'tempest-FlavorManageRbacTest-1344068247', 'tenant_id': '17a155987f7f426ea78e13dce4012d6e', 'tenant_name': 'tempest-FlavorManageRbacTest-1344068247', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5359248896304ba0800ab047b94ee6fe'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:55.270 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.270 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorManageRbacTest-1344068247', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '17a155987f7f426ea78e13dce4012d6e', 'project_name': 'tempest-FlavorManageRbacTest-1344068247', 'tenant_id': '17a155987f7f426ea78e13dce4012d6e', 'tenant_name': 'tempest-FlavorManageRbacTest-1344068247', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5359248896304ba0800ab047b94ee6fe'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:55.273 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.274 186 INFO tempest.lib.common.rest_client [req-bd721eca-681f-4b93-8431-bcaa31837270 ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-12-14 02:13:55.275 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.277 186 DEBUG tempest.lib.common.rest_client [req-bd721eca-681f-4b93-8431-bcaa31837270 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd721eca-681f-4b93-8431-bcaa31837270', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.278 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.281 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.284 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.287 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.289 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.292 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.295 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.298 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.301 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.303 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.306 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.309 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.312 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.315 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.318 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.320 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.323 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.327 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.330 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.333 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.336 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.338 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.342 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.345 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.348 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.350 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.353 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.356 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.359 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.362 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.364 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.367 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.370 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.374 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.377 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.383 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.386 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.389 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.388 193 INFO tempest.lib.common.rest_client [req-de18db06-ed83-49a9-820a-5682e470f598 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.120s 2020-12-14 02:13:55.391 193 DEBUG tempest.lib.common.rest_client [req-de18db06-ed83-49a9-820a-5682e470f598 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerConsolesRbacTest-1721381461", "password": "B3&RoBi2afiXfpk", "project_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "email": "tempest-ServerConsolesRbacTest-542719969@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '399', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de18db06-ed83-49a9-820a-5682e470f598', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "email": "tempest-ServerConsolesRbacTest-542719969@example.com", "id": "5061a16d2eeb43f98ad0aada2c68da9b", "name": "tempest-ServerConsolesRbacTest-1721381461", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/5061a16d2eeb43f98ad0aada2c68da9b"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.392 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.395 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.395 186 INFO tempest.lib.common.rest_client [req-57f18d28-3b69-4b0a-bc64-4858e77a5541 ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.109s 2020-12-14 02:13:55.398 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.398 186 DEBUG tempest.lib.common.rest_client [req-57f18d28-3b69-4b0a-bc64-4858e77a5541 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57f18d28-3b69-4b0a-bc64-4858e77a5541', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.401 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.403 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.406 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.409 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.412 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.415 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.417 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.420 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.423 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:55.433 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-keypairs:create, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:55.436 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:55.440 197 INFO tempest.lib.common.rest_client [req-53bbfee8-83a0-46f6-9ed6-3954877779d0 ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:13:55.444 197 DEBUG tempest.lib.common.rest_client [req-53bbfee8-83a0-46f6-9ed6-3954877779d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6571', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53bbfee8-83a0-46f6-9ed6-3954877779d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5359248896304ba0800ab047b94ee6fe", "name": "tempest-FlavorManageRbacTest-1344068247", "password_expires_at": null}, "audit_ids": ["iZbDInEUS6S_h8Ln5oq5pQ"], "expires_at": "2020-12-14T03:13:55.000000Z", "issued_at": "2020-12-14T02:13:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17a155987f7f426ea78e13dce4012d6e", "name": "tempest-FlavorManageRbacTest-1344068247"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.467 193 INFO tempest.lib.common.rest_client [req-9528f0d0-964c-4612-808e-fdd1350805f4 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:13:55.470 193 DEBUG tempest.lib.common.rest_client [req-9528f0d0-964c-4612-808e-fdd1350805f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9528f0d0-964c-4612-808e-fdd1350805f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.483 186 INFO tempest.lib.common.rest_client [req-3a1c6d63-555c-4923-99ce-b8da7b6c4f6d ] Request (QuotaClassesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles/72a4576c553448cd941b052c1ca0cf2d 0.078s 2020-12-14 02:13:55.485 186 DEBUG tempest.lib.common.rest_client [req-3a1c6d63-555c-4923-99ce-b8da7b6c4f6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a1c6d63-555c-4923-99ce-b8da7b6c4f6d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.487 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaClassesRbacTest-123847387', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4629b9b7560643dc92c3ab11be678c7e', 'project_name': 'tempest-QuotaClassesRbacTest-123847387', 'tenant_id': '4629b9b7560643dc92c3ab11be678c7e', 'tenant_name': 'tempest-QuotaClassesRbacTest-123847387', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'ba3c9f05106c4703bb8682d3ad0c2e33'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:55.490 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaClassesRbacTest-123847387', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4629b9b7560643dc92c3ab11be678c7e', 'project_name': 'tempest-QuotaClassesRbacTest-123847387', 'tenant_id': '4629b9b7560643dc92c3ab11be678c7e', 'tenant_name': 'tempest-QuotaClassesRbacTest-123847387', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'ba3c9f05106c4703bb8682d3ad0c2e33'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:55.504 189 INFO tempest.lib.common.rest_client [req-d4ef9595-d633-4019-a8cf-942260be6d07 ] Request (KeypairsRbacTest:test_create_keypair): 200 GET http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles 0.061s 2020-12-14 02:13:55.507 189 DEBUG tempest.lib.common.rest_client [req-d4ef9595-d633-4019-a8cf-942260be6d07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4ef9595-d633-4019-a8cf-942260be6d07', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.553 197 INFO tempest.lib.common.rest_client [req-b18c5ef1-3672-4fe0-886e-01f330ce3948 ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:13:55.557 197 DEBUG tempest.lib.common.rest_client [req-b18c5ef1-3672-4fe0-886e-01f330ce3948 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b18c5ef1-3672-4fe0-886e-01f330ce3948', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["sefwEq1iRB2a7pnTuMhYEg"], "expires_at": "2020-12-14T03:13:55.000000Z", "issued_at": "2020-12-14T02:13:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.579 193 INFO tempest.lib.common.rest_client [req-69939f82-cc86-407a-901b-901847954149 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.100s 2020-12-14 02:13:55.582 193 DEBUG tempest.lib.common.rest_client [req-69939f82-cc86-407a-901b-901847954149 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69939f82-cc86-407a-901b-901847954149', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.604 189 INFO tempest.lib.common.rest_client [req-d5853026-696e-4517-818d-c579d2bb29eb ] Request (KeypairsRbacTest:test_create_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:13:55.607 189 DEBUG tempest.lib.common.rest_client [req-d5853026-696e-4517-818d-c579d2bb29eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5853026-696e-4517-818d-c579d2bb29eb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f417f183d4c04c66baf18282db9d1040", "name": "tempest-KeypairsRbacTest-1368540538", "password_expires_at": null}, "audit_ids": ["mK-CLkkGQy6af82eRaUqQw"], "expires_at": "2020-12-14T03:13:55.000000Z", "issued_at": "2020-12-14T02:13:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1c563ea768b9412dac40184549a51a8b", "name": "tempest-KeypairsRbacTest-1368540538"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.663 193 INFO tempest.lib.common.rest_client [req-2e608feb-81d3-48c6-807d-ae20e6d89ca4 ] Request (ServerConsolesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902/users/5061a16d2eeb43f98ad0aada2c68da9b/roles/72a4576c553448cd941b052c1ca0cf2d 0.073s 2020-12-14 02:13:55.666 193 DEBUG tempest.lib.common.rest_client [req-2e608feb-81d3-48c6-807d-ae20e6d89ca4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e608feb-81d3-48c6-807d-ae20e6d89ca4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902/users/5061a16d2eeb43f98ad0aada2c68da9b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.668 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerConsolesRbacTest-1721381461', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6416f6d9d76f40d3a9a3fbe3e0564902', 'project_name': 'tempest-ServerConsolesRbacTest-1721381461', 'tenant_id': '6416f6d9d76f40d3a9a3fbe3e0564902', 'tenant_name': 'tempest-ServerConsolesRbacTest-1721381461', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5061a16d2eeb43f98ad0aada2c68da9b'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:55.671 186 INFO tempest.lib.common.rest_client [req-fff0a090-8b10-456a-92f9-ca0bad062712 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.117s 2020-12-14 02:13:55.674 186 DEBUG tempest.lib.common.rest_client [req-fff0a090-8b10-456a-92f9-ca0bad062712 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fff0a090-8b10-456a-92f9-ca0bad062712', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ba3c9f05106c4703bb8682d3ad0c2e33", "name": "tempest-QuotaClassesRbacTest-123847387", "password_expires_at": null}, "audit_ids": ["umuQxFewSfyezSTAO535sQ"], "expires_at": "2020-12-14T03:13:55.000000Z", "issued_at": "2020-12-14T02:13:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4629b9b7560643dc92c3ab11be678c7e", "name": "tempest-QuotaClassesRbacTest-123847387"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.726 197 INFO tempest.lib.common.rest_client [req-38f2d8f9-a43d-4d00-a4d8-658c651404ed ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-14 02:13:55.729 197 DEBUG tempest.lib.common.rest_client [req-38f2d8f9-a43d-4d00-a4d8-658c651404ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-38f2d8f9-a43d-4d00-a4d8-658c651404ed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["cl6dqL70QNOp4TcQVtiZfA"], "expires_at": "2020-12-14T03:13:55.000000Z", "issued_at": "2020-12-14T02:13:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.763 193 INFO tempest.lib.common.rest_client [req-e2a03e03-6b83-42ca-b8bf-39ebfba11cee ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:13:55.766 193 DEBUG tempest.lib.common.rest_client [req-e2a03e03-6b83-42ca-b8bf-39ebfba11cee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2a03e03-6b83-42ca-b8bf-39ebfba11cee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["HrrZdLEORXGx_fkrVA2D5w"], "expires_at": "2020-12-14T03:13:55.000000Z", "issued_at": "2020-12-14T02:13:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.797 186 INFO tempest.lib.common.rest_client [req-b7578f5b-a4ea-4a2a-9402-1913ff026b08 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.114s 2020-12-14 02:13:55.798 197 INFO tempest.lib.common.rest_client [req-669ee508-f3fa-4bf9-9073-2cfa64d538c9 ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.061s 2020-12-14 02:13:55.800 186 DEBUG tempest.lib.common.rest_client [req-b7578f5b-a4ea-4a2a-9402-1913ff026b08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaClassesRbacTest-2108276618-desc", "domain_id": "default", "name": "tempest-QuotaClassesRbacTest-2108276618"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '378', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7578f5b-a4ea-4a2a-9402-1913ff026b08', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "2dc13acca6e841c4ad217a5b210ae146", "name": "tempest-QuotaClassesRbacTest-2108276618", "domain_id": "default", "description": "tempest-QuotaClassesRbacTest-2108276618-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/2dc13acca6e841c4ad217a5b210ae146"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.801 197 DEBUG tempest.lib.common.rest_client [req-669ee508-f3fa-4bf9-9073-2cfa64d538c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-669ee508-f3fa-4bf9-9073-2cfa64d538c9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.911 197 INFO tempest.lib.common.rest_client [req-b8991aff-a421-4895-af6b-a6f6384c5a58 ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.102s 2020-12-14 02:13:55.914 197 DEBUG tempest.lib.common.rest_client [req-b8991aff-a421-4895-af6b-a6f6384c5a58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8991aff-a421-4895-af6b-a6f6384c5a58', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.917 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:13:55.919 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:55.929 186 INFO tempest.lib.common.rest_client [req-f8bc35f1-a835-4370-be83-288772e3862d ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.120s 2020-12-14 02:13:55.932 186 DEBUG tempest.lib.common.rest_client [req-f8bc35f1-a835-4370-be83-288772e3862d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-QuotaClassesRbacTest-2108276618", "password": "J6=4#L!2pph5Py*", "project_id": "2dc13acca6e841c4ad217a5b210ae146", "email": "tempest-QuotaClassesRbacTest-1606573210@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '396', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8bc35f1-a835-4370-be83-288772e3862d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "2dc13acca6e841c4ad217a5b210ae146", "email": "tempest-QuotaClassesRbacTest-1606573210@example.com", "id": "ebebc7ce0fbe4420a76a383792536022", "name": "tempest-QuotaClassesRbacTest-2108276618", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/ebebc7ce0fbe4420a76a383792536022"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:55.983 197 INFO tempest.lib.common.rest_client [req-151df2ec-7c14-4577-bd00-c1c574e6a97e ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles 0.059s 2020-12-14 02:13:55.986 197 DEBUG tempest.lib.common.rest_client [req-151df2ec-7c14-4577-bd00-c1c574e6a97e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-151df2ec-7c14-4577-bd00-c1c574e6a97e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.001 186 INFO tempest.lib.common.rest_client [req-cdaa9b9d-d9eb-48d6-8786-c77f75034b2f ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:13:56.004 186 DEBUG tempest.lib.common.rest_client [req-cdaa9b9d-d9eb-48d6-8786-c77f75034b2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cdaa9b9d-d9eb-48d6-8786-c77f75034b2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.022 189 INFO tempest.lib.common.rest_client [req-a11e9295-e3ce-4002-926a-861950127c2a ] Request (KeypairsRbacTest:test_create_keypair): 200 POST http://172.30.13.94/compute/v2.1/os-keypairs 0.405s 2020-12-14 02:13:56.025 189 DEBUG tempest.lib.common.rest_client [req-a11e9295-e3ce-4002-926a-861950127c2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"keypair": {"name": "tempest-KeypairsRbacTest-key-1395605576"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2314', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a11e9295-e3ce-4002-926a-861950127c2a', 'x-compute-request-id': 'req-a11e9295-e3ce-4002-926a-861950127c2a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs'} Body: b'{"keypair": {"private_key": "-----BEGIN RSA PRIVATE KEY-----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\\nXpmOp38RlgV3TvsW3yQMDy6+1THXxQiVx38eAWWWlSvQVUC+75+j\\n-----END RSA PRIVATE KEY-----\\n", "name": "tempest-KeypairsRbacTest-key-1395605576", "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDktKrW7xVAjHhbuUPv8IvdK+IvSztTgL4LG+HBr5X+TSI9CSKiQAKurU0S52iUKUJbjKBMfnWuY1PZysISU/XKuLnmW0tjLGIKKPZfNG+u3dlKONmFUO48oQz91pWVo4b/hGIYQIc1G8cnqcMbvWAlIyKnp5tya14E8u+h/b1ZJcNkxpzVIbM0UCKCYsL7Q/DNn9/EoeDseJVNghd6eWdoY+2i0yJ/j2Oyqb3ukndqhcLu9NHcY9Gwkj6DDq3tRsJcYQZXpkton64h1GimGS82qrUnASQCxYUznE5kE3nMkLx/uhRIoP++IzXqZtOvVPAZomEqt1QKc+sBgYcmk4QJ Generated-by-Nova", "fingerprint": "60:39:3a:88:9b:f6:ff:a6:b1:6e:ab:b7:60:a5:56:1e", "user_id": "f417f183d4c04c66baf18282db9d1040"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.047 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:56.067 197 INFO tempest.lib.common.rest_client [req-b88f84f3-1226-47c9-a9f3-84345fc878b8 ] Request (FlavorManageRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles/72a4576c553448cd941b052c1ca0cf2d 0.073s 2020-12-14 02:13:56.070 197 DEBUG tempest.lib.common.rest_client [req-b88f84f3-1226-47c9-a9f3-84345fc878b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b88f84f3-1226-47c9-a9f3-84345fc878b8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.086 186 INFO tempest.lib.common.rest_client [req-66354159-5ed2-4177-8874-0e7539f6be56 ] Request (QuotaClassesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/2dc13acca6e841c4ad217a5b210ae146/users/ebebc7ce0fbe4420a76a383792536022/roles/a629c95d64b3416fb80ae90af4f69c05 0.073s 2020-12-14 02:13:56.089 186 DEBUG tempest.lib.common.rest_client [req-66354159-5ed2-4177-8874-0e7539f6be56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66354159-5ed2-4177-8874-0e7539f6be56', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/2dc13acca6e841c4ad217a5b210ae146/users/ebebc7ce0fbe4420a76a383792536022/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.092 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaClassesRbacTest-2108276618', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '2dc13acca6e841c4ad217a5b210ae146', 'project_name': 'tempest-QuotaClassesRbacTest-2108276618', 'tenant_id': '2dc13acca6e841c4ad217a5b210ae146', 'tenant_name': 'tempest-QuotaClassesRbacTest-2108276618', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'ebebc7ce0fbe4420a76a383792536022'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:56.095 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaClassesRbacTest-2108276618', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '2dc13acca6e841c4ad217a5b210ae146', 'project_name': 'tempest-QuotaClassesRbacTest-2108276618', 'tenant_id': '2dc13acca6e841c4ad217a5b210ae146', 'tenant_name': 'tempest-QuotaClassesRbacTest-2108276618', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'ebebc7ce0fbe4420a76a383792536022'}, Network: None, Subnet: None, Router: None 2020-12-14 02:13:56.192 189 INFO tempest.lib.common.rest_client [req-d39953a5-de87-4bcc-aa36-11f1f171378b ] Request (KeypairsRbacTest:test_create_keypair): 200 GET http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles 0.137s 2020-12-14 02:13:56.196 189 DEBUG tempest.lib.common.rest_client [req-d39953a5-de87-4bcc-aa36-11f1f171378b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d39953a5-de87-4bcc-aa36-11f1f171378b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.196 197 INFO tempest.lib.common.rest_client [req-e19343b0-8117-41dc-bad3-155950a117fa ] Request (FlavorManageRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles/a629c95d64b3416fb80ae90af4f69c05 0.118s 2020-12-14 02:13:56.199 197 DEBUG tempest.lib.common.rest_client [req-e19343b0-8117-41dc-bad3-155950a117fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e19343b0-8117-41dc-bad3-155950a117fa', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.286 186 INFO tempest.lib.common.rest_client [req-6e51933d-1d50-44d4-af59-a182e0dfab18 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.127s 2020-12-14 02:13:56.289 186 DEBUG tempest.lib.common.rest_client [req-6e51933d-1d50-44d4-af59-a182e0dfab18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e51933d-1d50-44d4-af59-a182e0dfab18', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ebebc7ce0fbe4420a76a383792536022", "name": "tempest-QuotaClassesRbacTest-2108276618", "password_expires_at": null}, "audit_ids": ["gUXloxUdT-WSOT7Lrsu_PQ"], "expires_at": "2020-12-14T03:13:56.000000Z", "issued_at": "2020-12-14T02:13:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "2dc13acca6e841c4ad217a5b210ae146", "name": "tempest-QuotaClassesRbacTest-2108276618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/2dc13acca6e841c4ad217a5b210ae146", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/2dc13acca6e841c4ad217a5b210ae146", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/2dc13acca6e841c4ad217a5b210ae146", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2dc13acca6e841c4ad217a5b210ae146", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2dc13acca6e841c4ad217a5b210ae146", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2dc13acca6e841c4ad217a5b210ae146", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.292 189 INFO tempest.lib.common.rest_client [req-79992a21-ffe9-4d1a-9bf0-1d0533de27e2 ] Request (KeypairsRbacTest:test_create_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:13:56.295 189 DEBUG tempest.lib.common.rest_client [req-79992a21-ffe9-4d1a-9bf0-1d0533de27e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79992a21-ffe9-4d1a-9bf0-1d0533de27e2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f417f183d4c04c66baf18282db9d1040", "name": "tempest-KeypairsRbacTest-1368540538", "password_expires_at": null}, "audit_ids": ["B7vM_FqkTgS6YhUqPjeXpw"], "expires_at": "2020-12-14T03:13:56.000000Z", "issued_at": "2020-12-14T02:13:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1c563ea768b9412dac40184549a51a8b", "name": "tempest-KeypairsRbacTest-1368540538"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.395 186 INFO tempest.lib.common.rest_client [req-0657de05-19d8-4738-9d53-094ebaaf90c2 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:13:56.398 186 DEBUG tempest.lib.common.rest_client [req-0657de05-19d8-4738-9d53-094ebaaf90c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0657de05-19d8-4738-9d53-094ebaaf90c2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Nlbv5z0gRI2K5a85T7Tanw"], "expires_at": "2020-12-14T03:13:56.000000Z", "issued_at": "2020-12-14T02:13:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.423 189 INFO tempest.lib.common.rest_client [req-0404b4bc-3465-4823-85e1-a3e52d343d13 ] Request (KeypairsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1395605576 0.120s 2020-12-14 02:13:56.426 189 DEBUG tempest.lib.common.rest_client [req-0404b4bc-3465-4823-85e1-a3e52d343d13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0404b4bc-3465-4823-85e1-a3e52d343d13', 'x-compute-request-id': 'req-0404b4bc-3465-4823-85e1-a3e52d343d13', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1395605576'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.453 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:56.457 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.461 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.464 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.467 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.471 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.476 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.481 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.483 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.486 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.489 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.492 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.495 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.498 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.501 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.504 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.508 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.511 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.513 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.516 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.517 186 INFO tempest.lib.common.rest_client [req-39e4cfb5-37af-4a54-9169-d0d1b95093f7 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:13:56.519 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.520 186 DEBUG tempest.lib.common.rest_client [req-39e4cfb5-37af-4a54-9169-d0d1b95093f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39e4cfb5-37af-4a54-9169-d0d1b95093f7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["hYFaR1tnQj6oaBXwlOZ0Aw"], "expires_at": "2020-12-14T03:13:56.000000Z", "issued_at": "2020-12-14T02:13:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.522 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.525 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.528 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.530 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.533 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.536 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.539 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.542 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.545 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.548 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.551 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.553 193 INFO tempest.lib.common.rest_client [req-43f00c32-cb53-4767-822b-36ca9f046476 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.780s 2020-12-14 02:13:56.554 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.556 193 DEBUG tempest.lib.common.rest_client [req-43f00c32-cb53-4767-822b-36ca9f046476 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerConsolesRbacTest-734479438-network", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902"}} Response - Headers: {'content-type': 'application/json', 'content-length': '737', 'x-openstack-request-id': 'req-43f00c32-cb53-4767-822b-36ca9f046476', 'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"677d9531-31e0-4552-824b-7b4e207e716e","name":"tempest-ServerConsolesRbacTest-734479438-network","tenant_id":"6416f6d9d76f40d3a9a3fbe3e0564902","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"6416f6d9d76f40d3a9a3fbe3e0564902","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":29,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:13:56Z","updated_at":"2020-12-14T02:13:56Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.557 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.559 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.562 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.565 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.568 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.571 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.574 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.578 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.580 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.583 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.586 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.586 186 INFO tempest.lib.common.rest_client [req-82100984-19cf-4c74-9002-56a370e7c20d ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.058s 2020-12-14 02:13:56.589 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.589 186 DEBUG tempest.lib.common.rest_client [req-82100984-19cf-4c74-9002-56a370e7c20d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-82100984-19cf-4c74-9002-56a370e7c20d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.592 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.595 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.598 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.601 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.603 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.606 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.609 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.611 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.614 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.617 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.620 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.623 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.629 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.632 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.635 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.638 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.641 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.643 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.646 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.649 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.652 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.654 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.657 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.659 186 INFO tempest.lib.common.rest_client [req-d92543ca-71db-4a40-ad2f-6f0c8a94fc5d ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:13:56.660 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.662 186 DEBUG tempest.lib.common.rest_client [req-d92543ca-71db-4a40-ad2f-6f0c8a94fc5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d92543ca-71db-4a40-ad2f-6f0c8a94fc5d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.663 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.665 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:13:56.666 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.667 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:56.669 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:56.679 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-keypairs:delete, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:56.745 186 INFO tempest.lib.common.rest_client [req-64e14f2a-3928-4c00-97ab-6f1d38d71d36 ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles 0.071s 2020-12-14 02:13:56.748 186 DEBUG tempest.lib.common.rest_client [req-64e14f2a-3928-4c00-97ab-6f1d38d71d36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-64e14f2a-3928-4c00-97ab-6f1d38d71d36', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.836 186 INFO tempest.lib.common.rest_client [req-d13b94b4-bbea-49e8-ac19-a0276596bcd5 ] Request (QuotaClassesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles/72a4576c553448cd941b052c1ca0cf2d 0.080s 2020-12-14 02:13:56.838 186 DEBUG tempest.lib.common.rest_client [req-d13b94b4-bbea-49e8-ac19-a0276596bcd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d13b94b4-bbea-49e8-ac19-a0276596bcd5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.895 189 INFO tempest.lib.common.rest_client [req-9d796e5e-960c-42f5-9e9d-0b2a6a0d25f8 ] Request (KeypairsRbacTest:test_delete_keypair): 200 POST http://172.30.13.94/compute/v2.1/os-keypairs 0.210s 2020-12-14 02:13:56.899 189 DEBUG tempest.lib.common.rest_client [req-9d796e5e-960c-42f5-9e9d-0b2a6a0d25f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"keypair": {"name": "tempest-KeypairsRbacTest-key-724762590"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2317', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9d796e5e-960c-42f5-9e9d-0b2a6a0d25f8', 'x-compute-request-id': 'req-9d796e5e-960c-42f5-9e9d-0b2a6a0d25f8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs'} Body: b'{"keypair": {"private_key": "-----BEGIN RSA PRIVATE KEY-----\\nMIIEpQIBAAKCAQEA8MYlQvH6zl9JoLiWKTkY5vRKRxhBYD8ClYNTbkgMdOy62gVT\\nTdHt5J/hW0qlwWCWeMpTQaShMSg+oBfzS7kzRFI818FCoHUU87NxtUY9xTL9j0HY\\nBPdnuRbdVPXTxe7Otsla9xwu70tSOxucg5ouFo5UoBm6sv0owt0FDpFCZjOBsJ9F\\nZ5EpxlUm5PpnXj2ZQe2gZhN72NbUVPiK2IxRUrCOB1NkyFR197SQqckbVqufajkd\\nt2z2o+tXL8f4Iel32QpEMqwUy11UEz+SzoCK65HNifitPQXbLcurvDpHlxKRnXWP\\nks56NTLVRcOTaDi+jcqKSNYHk6BZKXxHwa9GZQIDAQABAoIBAQDZ4sYXhflsxmhP\\nzJr+5Q+2+P06xyVqXrsM6FIY65RyP0R8RfNz6fT5PwHl5nCHxcuFtbqQHdZNMNkz\\ncVkXfpp5Sl6K9PZBVJLIUuwkmlMN4K369R/ypp0zrxBOcUPay9g/K4ppMxT6MdRR\\nbxQ9N8pbWSQV2hLNJTG83dxUqXlIF7TkpRBqVGhpieuTM8rOuE8N3XwI+s5ElSfs\\n0DVERo1vtN1IIzB2GDa3dPsYsuzqqDJK2mbBWss7Zp2J8AjaQHnqxeLGcZjubpSo\\n50+8YSmM41KY8tADs612EKe/j0ZhDz/GwFA9DUIZVO1FLMEYbT7Pg1toVsYFSAf0\\nhMwFnE0FAoGBAP2CvdY1P+q6KiE/MmF99xDJ2vn82vnFtVlE5Tro+HqwNR3ANfkT\\nMc5wtLTV5kJmt49Exjg8bU1mWINyqH03NLbgsLY+WkR2iqjs79ej9LdzxgYyk8lQ\\niZ3YNXa8t9RgRdZ0EZtB7IXwtFeVHtXZhR5b+Lb8s1qN5tb6o0ERsdbPAoGBAPMj\\nYyd8BdMlzFJGIl4jW6wMpBL5T660tZdjUI8dXRbBab/g93nVlYWu0zKUBehp8koI\\n8rko0ppKo+u5KYjDUzQ3Q5S/RbD+RkGJA1+Wk4S1XhBDd56wWDNCu07vZVkryRse\\nM540PYhpkZAmvlPgDtmhnM5N87F7KOQcDOU7jxyLAoGBAM7rC+/vfsAkO4bvgju5\\nCRQW7jjlfgYoraCzbzbqOQZLFM+3t1YZqKmLrLN9c3f3RxQVWoVELSLjypNf3s51\\nZP1v4EygECWZbAv9eLZWCMREJvmgBqhmqCzB8MF9v74E5nvoOQa0hE2+7jQebxC1\\nfsYM47DYCbx73lLSOLY/rxxZAoGAShR+IYmoPK1Hk8nKruQXClTPqPhNTu3AZl/c\\nK77GnihQECZ7QKPS6uhZcQ+ovSeKqwQO8Ft/z4LubuP7w6+/qiksbiXZFhRjU5Rr\\ncrRuPgEEp+/mgnM4bGXorCREvOaaX6jUEV/ZX7bKoyEq3GNoIuca38DgfzMHQnlJ\\ndI6xDAECgYEA0kXb6AE0um7tS3tsDuFZ6sSt7SpSRQEWmc0dCfOp6M1z0P5I91kS\\nC8Ftql/pTfeTSpupBNAmbQe19737H3YarIA76H/qTkapJjFuw49MhtJT182GIb2x\\nEHvu2FkKsZPQh7lvv2kKW0Wqt70hNzZobsoa7IUQNaCUrDUixsS9+rU=\\n-----END RSA PRIVATE KEY-----\\n", "name": "tempest-KeypairsRbacTest-key-724762590", "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDwxiVC8frOX0mguJYpORjm9EpHGEFgPwKVg1NuSAx07LraBVNN0e3kn+FbSqXBYJZ4ylNBpKExKD6gF/NLuTNEUjzXwUKgdRTzs3G1Rj3FMv2PQdgE92e5Ft1U9dPF7s62yVr3HC7vS1I7G5yDmi4WjlSgGbqy/SjC3QUOkUJmM4Gwn0VnkSnGVSbk+mdePZlB7aBmE3vY1tRU+IrYjFFSsI4HU2TIVHX3tJCpyRtWq59qOR23bPaj61cvx/gh6XfZCkQyrBTLXVQTP5LOgIrrkc2J+K09Bdsty6u8OkeXEpGddY+Szno1MtVFw5NoOL6NyopI1geToFkpfEfBr0Zl Generated-by-Nova", "fingerprint": "65:c4:00:89:51:39:b2:5f:f2:ba:ee:41:74:4d:db:85", "user_id": "f417f183d4c04c66baf18282db9d1040"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:56.915 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:56.985 186 INFO tempest.lib.common.rest_client [req-e677e8f8-7f05-4885-a0e9-5ca38ac2a915 ] Request (QuotaClassesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles/a629c95d64b3416fb80ae90af4f69c05 0.139s 2020-12-14 02:13:56.988 186 DEBUG tempest.lib.common.rest_client [req-e677e8f8-7f05-4885-a0e9-5ca38ac2a915 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e677e8f8-7f05-4885-a0e9-5ca38ac2a915', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:57.050 189 INFO tempest.lib.common.rest_client [req-101db7e2-b373-4f09-9419-45f00a151b44 ] Request (KeypairsRbacTest:test_delete_keypair): 200 GET http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles 0.129s 2020-12-14 02:13:57.053 189 DEBUG tempest.lib.common.rest_client [req-101db7e2-b373-4f09-9419-45f00a151b44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-101db7e2-b373-4f09-9419-45f00a151b44', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:57.170 189 INFO tempest.lib.common.rest_client [req-ff02f3ac-367b-4982-9e8c-2802b3af4e29 ] Request (KeypairsRbacTest:test_delete_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-12-14 02:13:57.175 189 DEBUG tempest.lib.common.rest_client [req-ff02f3ac-367b-4982-9e8c-2802b3af4e29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff02f3ac-367b-4982-9e8c-2802b3af4e29', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f417f183d4c04c66baf18282db9d1040", "name": "tempest-KeypairsRbacTest-1368540538", "password_expires_at": null}, "audit_ids": ["2Xcty2J9SKuG2PaWH9PqdA"], "expires_at": "2020-12-14T03:13:57.000000Z", "issued_at": "2020-12-14T02:13:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1c563ea768b9412dac40184549a51a8b", "name": "tempest-KeypairsRbacTest-1368540538"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:57.324 197 INFO tempest.lib.common.rest_client [req-b146628e-3286-4fc1-9d51-f672a96681d2 ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.116s 2020-12-14 02:13:57.327 197 DEBUG tempest.lib.common.rest_client [req-b146628e-3286-4fc1-9d51-f672a96681d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b146628e-3286-4fc1-9d51-f672a96681d2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5359248896304ba0800ab047b94ee6fe", "name": "tempest-FlavorManageRbacTest-1344068247", "password_expires_at": null}, "audit_ids": ["kLGI3OWZSoO2glVd0utn0g"], "expires_at": "2020-12-14T03:13:57.000000Z", "issued_at": "2020-12-14T02:13:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17a155987f7f426ea78e13dce4012d6e", "name": "tempest-FlavorManageRbacTest-1344068247"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:57.339 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:57.343 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.347 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.350 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.353 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.357 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.358 193 INFO tempest.lib.common.rest_client [req-4787d558-d84e-47f5-bff2-e97ee08f6702 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.793s 2020-12-14 02:13:57.360 193 DEBUG tempest.lib.common.rest_client [req-4787d558-d84e-47f5-bff2-e97ee08f6702 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "677d9531-31e0-4552-824b-7b4e207e716e", "cidr": "192.168.120.0/28", "name": "tempest-ServerConsolesRbacTest-734479438-subnet", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '709', 'x-openstack-request-id': 'req-4787d558-d84e-47f5-bff2-e97ee08f6702', 'date': 'Mon, 14 Dec 2020 02:13:57 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"98ac1ef5-3071-4a7d-b9bc-8467fe9063ee","name":"tempest-ServerConsolesRbacTest-734479438-subnet","tenant_id":"6416f6d9d76f40d3a9a3fbe3e0564902","network_id":"677d9531-31e0-4552-824b-7b4e207e716e","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:13:56Z","updated_at":"2020-12-14T02:13:56Z","revision_number":0,"project_id":"6416f6d9d76f40d3a9a3fbe3e0564902"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:57.361 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.365 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.368 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.371 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.374 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.377 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.379 189 INFO tempest.lib.common.rest_client [req-73452169-5a97-4356-b02e-5870fd215ac2 ] Request (KeypairsRbacTest:test_delete_keypair): 202 DELETE http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-724762590 0.193s 2020-12-14 02:13:57.379 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.381 189 DEBUG tempest.lib.common.rest_client [req-73452169-5a97-4356-b02e-5870fd215ac2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-73452169-5a97-4356-b02e-5870fd215ac2', 'x-compute-request-id': 'req-73452169-5a97-4356-b02e-5870fd215ac2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-724762590'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:57.382 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.384 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:57.385 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.388 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.391 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.394 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.397 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.400 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.402 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.405 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.408 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.410 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.413 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.416 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.419 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.421 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.424 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.427 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.430 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.433 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.435 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.438 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.441 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.444 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.446 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.449 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.452 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.455 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.458 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.461 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.464 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.467 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.470 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.473 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.476 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.479 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.481 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.484 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.487 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.489 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.492 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.495 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.498 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.501 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.504 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.510 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.513 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.513 189 INFO tempest.lib.common.rest_client [req-e26e9924-4ec0-46b5-8b88-3d8667eadd53 ] Request (KeypairsRbacTest:test_delete_keypair): 200 GET http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles 0.123s 2020-12-14 02:13:57.515 189 DEBUG tempest.lib.common.rest_client [req-e26e9924-4ec0-46b5-8b88-3d8667eadd53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e26e9924-4ec0-46b5-8b88-3d8667eadd53', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:57.516 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.519 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.522 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.524 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.527 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.530 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.533 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.536 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.538 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.541 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.544 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.546 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.549 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.556 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-manage:create, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:57.558 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:57.570 189 INFO tempest.lib.common.rest_client [req-0c239c13-e5bc-4811-b666-38627219ebc2 ] Request (KeypairsRbacTest:test_delete_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:13:57.573 189 DEBUG tempest.lib.common.rest_client [req-0c239c13-e5bc-4811-b666-38627219ebc2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c239c13-e5bc-4811-b666-38627219ebc2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f417f183d4c04c66baf18282db9d1040", "name": "tempest-KeypairsRbacTest-1368540538", "password_expires_at": null}, "audit_ids": ["YoeDIAC5SXWYDccUqaSbFw"], "expires_at": "2020-12-14T03:13:57.000000Z", "issued_at": "2020-12-14T02:13:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1c563ea768b9412dac40184549a51a8b", "name": "tempest-KeypairsRbacTest-1368540538"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:57.635 197 INFO tempest.lib.common.rest_client [req-0efbc56b-38fa-4b3a-86e7-0ed039867185 ] Request (FlavorManageRbacTest:test_create_flavor_manage): 200 GET http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles 0.072s 2020-12-14 02:13:57.638 197 DEBUG tempest.lib.common.rest_client [req-0efbc56b-38fa-4b3a-86e7-0ed039867185 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0efbc56b-38fa-4b3a-86e7-0ed039867185', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:57.689 197 INFO tempest.lib.common.rest_client [req-69366234-94c6-49f9-814b-01ee7f076827 ] Request (FlavorManageRbacTest:test_create_flavor_manage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:13:57.693 197 DEBUG tempest.lib.common.rest_client [req-69366234-94c6-49f9-814b-01ee7f076827 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69366234-94c6-49f9-814b-01ee7f076827', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5359248896304ba0800ab047b94ee6fe", "name": "tempest-FlavorManageRbacTest-1344068247", "password_expires_at": null}, "audit_ids": ["VoOLVnajSf-p4cZCKtXFwQ"], "expires_at": "2020-12-14T03:13:57.000000Z", "issued_at": "2020-12-14T02:13:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17a155987f7f426ea78e13dce4012d6e", "name": "tempest-FlavorManageRbacTest-1344068247"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:57.706 189 INFO tempest.lib.common.rest_client [req-94a9dd0e-8c51-49f0-bd45-eec68f8ea188 ] Request (KeypairsRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-724762590 0.124s 2020-12-14 02:13:57.709 189 DEBUG tempest.lib.common.rest_client [req-94a9dd0e-8c51-49f0-bd45-eec68f8ea188 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '144', 'x-openstack-request-id': 'req-94a9dd0e-8c51-49f0-bd45-eec68f8ea188', 'x-compute-request-id': 'req-94a9dd0e-8c51-49f0-bd45-eec68f8ea188', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-724762590'} Body: b'{"itemNotFound": {"code": 404, "message": "Keypair tempest-KeypairsRbacTest-key-724762590 not found for user f417f183d4c04c66baf18282db9d1040"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:57.738 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:57.743 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.747 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.751 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.757 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.763 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.768 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.772 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.775 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.778 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.780 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.783 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.786 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.789 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.792 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.795 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.800 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.804 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.806 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.809 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.812 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.812 197 INFO tempest.lib.common.rest_client [req-c8bfc33e-f92b-42e0-b731-881cbc82a16f ] Request (FlavorManageRbacTest:test_create_flavor_manage): 200 POST http://172.30.13.94/compute/v2.1/flavors 0.108s 2020-12-14 02:13:57.814 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.814 197 DEBUG tempest.lib.common.rest_client [req-c8bfc33e-f92b-42e0-b731-881cbc82a16f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"name": "tempest-FlavorManageRbacTest-flavor-1005585871", "ram": 1, "vcpus": 8, "disk": 2, "id": "78e6a658-f652-4422-8fdb-22cdec7c4be1"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '506', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c8bfc33e-f92b-42e0-b731-881cbc82a16f', 'x-compute-request-id': 'req-c8bfc33e-f92b-42e0-b731-881cbc82a16f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors'} Body: b'{"flavor": {"id": "78e6a658-f652-4422-8fdb-22cdec7c4be1", "name": "tempest-FlavorManageRbacTest-flavor-1005585871", "ram": 1, "disk": 2, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 8, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/78e6a658-f652-4422-8fdb-22cdec7c4be1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/78e6a658-f652-4422-8fdb-22cdec7c4be1"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:57.817 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.820 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.822 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.825 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.827 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.830 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.833 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.835 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.838 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.840 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.842 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:57.843 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.846 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.848 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.851 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.854 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.857 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.859 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.862 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.865 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.868 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.871 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.873 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.877 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.879 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.882 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.885 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.887 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.890 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.892 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.895 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.898 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.900 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.903 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.907 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.909 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.915 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.916 197 INFO tempest.lib.common.rest_client [req-60a5bbaa-2bad-455f-8e8d-80ae4496a242 ] Request (FlavorManageRbacTest:test_create_flavor_manage): 200 GET http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles 0.068s 2020-12-14 02:13:57.917 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.919 197 DEBUG tempest.lib.common.rest_client [req-60a5bbaa-2bad-455f-8e8d-80ae4496a242 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60a5bbaa-2bad-455f-8e8d-80ae4496a242', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:57.920 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.923 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.926 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.929 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.931 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.934 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.937 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.939 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.942 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.944 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.947 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.950 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.952 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:57.963 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-keypairs:index, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:57.965 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:57.969 197 INFO tempest.lib.common.rest_client [req-d328e1d9-474d-46d1-9324-756860f2acf5 ] Request (FlavorManageRbacTest:test_create_flavor_manage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:13:57.973 197 DEBUG tempest.lib.common.rest_client [req-d328e1d9-474d-46d1-9324-756860f2acf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d328e1d9-474d-46d1-9324-756860f2acf5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5359248896304ba0800ab047b94ee6fe", "name": "tempest-FlavorManageRbacTest-1344068247", "password_expires_at": null}, "audit_ids": ["HT7WXQWxSryqAMtiIpVSxg"], "expires_at": "2020-12-14T03:13:57.000000Z", "issued_at": "2020-12-14T02:13:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17a155987f7f426ea78e13dce4012d6e", "name": "tempest-FlavorManageRbacTest-1344068247"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:57.999 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:58.002 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.005 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.007 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.010 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.013 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.016 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.020 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.022 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.024 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.026 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.028 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.031 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.033 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.035 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.038 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.040 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.042 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.043 189 INFO tempest.lib.common.rest_client [req-b9791e6d-f634-4dab-9af8-e4d6518eed41 ] Request (KeypairsRbacTest:test_index_keypair): 200 GET http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles 0.071s 2020-12-14 02:13:58.045 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.046 189 DEBUG tempest.lib.common.rest_client [req-b9791e6d-f634-4dab-9af8-e4d6518eed41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9791e6d-f634-4dab-9af8-e4d6518eed41', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.047 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.049 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.051 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.055 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.057 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.060 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.062 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.064 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.066 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.068 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.070 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.072 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.074 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.077 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.079 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.082 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.085 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.088 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.091 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.090 186 INFO tempest.lib.common.rest_client [req-a2bb402d-4b2e-415a-a299-1297c3408643 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:13:58.093 186 DEBUG tempest.lib.common.rest_client [req-a2bb402d-4b2e-415a-a299-1297c3408643 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2bb402d-4b2e-415a-a299-1297c3408643', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ba3c9f05106c4703bb8682d3ad0c2e33", "name": "tempest-QuotaClassesRbacTest-123847387", "password_expires_at": null}, "audit_ids": ["50TpLDCDTSWqbKHW33eRoQ"], "expires_at": "2020-12-14T03:13:58.000000Z", "issued_at": "2020-12-14T02:13:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4629b9b7560643dc92c3ab11be678c7e", "name": "tempest-QuotaClassesRbacTest-123847387"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.094 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.097 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.100 189 INFO tempest.lib.common.rest_client [req-d3e92135-91e4-4648-b152-67c3dc5c18fb ] Request (KeypairsRbacTest:test_index_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:13:58.100 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.102 189 DEBUG tempest.lib.common.rest_client [req-d3e92135-91e4-4648-b152-67c3dc5c18fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3e92135-91e4-4648-b152-67c3dc5c18fb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f417f183d4c04c66baf18282db9d1040", "name": "tempest-KeypairsRbacTest-1368540538", "password_expires_at": null}, "audit_ids": ["L3c0XlztRkWTV50os2mC4g"], "expires_at": "2020-12-14T03:13:58.000000Z", "issued_at": "2020-12-14T02:13:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1c563ea768b9412dac40184549a51a8b", "name": "tempest-KeypairsRbacTest-1368540538"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.103 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.105 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.108 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.112 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.114 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.117 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.120 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.123 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.126 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.128 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.130 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.132 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.134 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.136 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.139 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.141 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.146 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.148 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.150 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.152 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.155 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.157 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.159 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.161 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.163 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.166 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.168 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.170 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.172 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.174 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.177 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.184 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-manage:delete, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:58.215 189 INFO tempest.lib.common.rest_client [req-b62a9994-b824-426f-976b-6d397ca8510a ] Request (KeypairsRbacTest:test_index_keypair): 200 GET http://172.30.13.94/compute/v2.1/os-keypairs 0.105s 2020-12-14 02:13:58.218 189 DEBUG tempest.lib.common.rest_client [req-b62a9994-b824-426f-976b-6d397ca8510a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '16', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b62a9994-b824-426f-976b-6d397ca8510a', 'x-compute-request-id': 'req-b62a9994-b824-426f-976b-6d397ca8510a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs'} Body: b'{"keypairs": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.229 186 INFO tempest.lib.common.rest_client [req-c9ba17fe-18cd-4625-9828-4f7b3d5d5c25 ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.124s 2020-12-14 02:13:58.232 186 DEBUG tempest.lib.common.rest_client [req-c9ba17fe-18cd-4625-9828-4f7b3d5d5c25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9ba17fe-18cd-4625-9828-4f7b3d5d5c25', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.246 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:58.297 197 INFO tempest.lib.common.rest_client [req-e6019177-ee26-4c6f-a7c0-f3264d85a39a ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 200 POST http://172.30.13.94/compute/v2.1/flavors 0.106s 2020-12-14 02:13:58.299 197 DEBUG tempest.lib.common.rest_client [req-e6019177-ee26-4c6f-a7c0-f3264d85a39a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"name": "tempest-FlavorManageRbacTest-flavor-1178726746", "ram": 3, "vcpus": 6, "disk": 7, "id": "e18ea84e-eb19-46a1-a7fd-d2cf6671f429"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '506', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e6019177-ee26-4c6f-a7c0-f3264d85a39a', 'x-compute-request-id': 'req-e6019177-ee26-4c6f-a7c0-f3264d85a39a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors'} Body: b'{"flavor": {"id": "e18ea84e-eb19-46a1-a7fd-d2cf6671f429", "name": "tempest-FlavorManageRbacTest-flavor-1178726746", "ram": 3, "disk": 7, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 6, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/e18ea84e-eb19-46a1-a7fd-d2cf6671f429"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/e18ea84e-eb19-46a1-a7fd-d2cf6671f429"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.307 186 INFO tempest.lib.common.rest_client [req-981336b1-f4b7-4df2-b646-d49ad13bfae8 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.069s 2020-12-14 02:13:58.309 186 DEBUG tempest.lib.common.rest_client [req-981336b1-f4b7-4df2-b646-d49ad13bfae8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaClassesRbacTest-241848182-desc", "domain_id": "default", "name": "tempest-QuotaClassesRbacTest-241848182"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-981336b1-f4b7-4df2-b646-d49ad13bfae8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "43bd2de5875e47339deb9ac3f75de4d1", "name": "tempest-QuotaClassesRbacTest-241848182", "domain_id": "default", "description": "tempest-QuotaClassesRbacTest-241848182-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/43bd2de5875e47339deb9ac3f75de4d1"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.328 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:58.330 189 INFO tempest.lib.common.rest_client [req-2e738732-4f89-444d-8e96-dae91d91a797 ] Request (KeypairsRbacTest:test_index_keypair): 200 GET http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles 0.076s 2020-12-14 02:13:58.334 189 DEBUG tempest.lib.common.rest_client [req-2e738732-4f89-444d-8e96-dae91d91a797 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e738732-4f89-444d-8e96-dae91d91a797', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.442 197 INFO tempest.lib.common.rest_client [req-f7909a92-2f1f-4bd8-91c8-6740a9efb3cb ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 200 GET http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles 0.110s 2020-12-14 02:13:58.444 197 DEBUG tempest.lib.common.rest_client [req-f7909a92-2f1f-4bd8-91c8-6740a9efb3cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7909a92-2f1f-4bd8-91c8-6740a9efb3cb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.446 189 INFO tempest.lib.common.rest_client [req-71544a60-b1ec-43ba-872b-fdf27e32ccb3 ] Request (KeypairsRbacTest:test_index_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:13:58.449 189 DEBUG tempest.lib.common.rest_client [req-71544a60-b1ec-43ba-872b-fdf27e32ccb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-71544a60-b1ec-43ba-872b-fdf27e32ccb3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f417f183d4c04c66baf18282db9d1040", "name": "tempest-KeypairsRbacTest-1368540538", "password_expires_at": null}, "audit_ids": ["5v9QwA60S5CTra6JNd9nrA"], "expires_at": "2020-12-14T03:13:58.000000Z", "issued_at": "2020-12-14T02:13:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1c563ea768b9412dac40184549a51a8b", "name": "tempest-KeypairsRbacTest-1368540538"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.450 186 INFO tempest.lib.common.rest_client [req-5966227e-7347-46d1-83a1-1e682a23acae ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.133s 2020-12-14 02:13:58.453 186 DEBUG tempest.lib.common.rest_client [req-5966227e-7347-46d1-83a1-1e682a23acae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5966227e-7347-46d1-83a1-1e682a23acae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.457 186 DEBUG oslo_concurrency.lockutils [-] Acquired lock "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:266 2020-12-14 02:13:58.462 186 DEBUG oslo_concurrency.lockutils [-] Acquired external semaphore "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:272 2020-12-14 02:13:58.466 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:58.469 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.472 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.475 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.477 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.480 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:58.480 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.483 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.484 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.487 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.487 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.489 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.490 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.492 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.494 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.494 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.496 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.497 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.498 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.501 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.501 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.503 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.506 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.506 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.508 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.509 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.511 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.511 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.513 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.514 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.515 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.517 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.517 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.519 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.520 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.522 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.523 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.524 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.525 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.526 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.528 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.528 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.531 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.532 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.533 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.535 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.534 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.537 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.537 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.539 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.540 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.541 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.543 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.543 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.545 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.545 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.547 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.548 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.549 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.548 197 INFO tempest.lib.common.rest_client [req-850361f1-6ecd-4138-aea7-edba6e13008a ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:13:58.551 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.551 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.552 197 DEBUG tempest.lib.common.rest_client [req-850361f1-6ecd-4138-aea7-edba6e13008a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-850361f1-6ecd-4138-aea7-edba6e13008a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5359248896304ba0800ab047b94ee6fe", "name": "tempest-FlavorManageRbacTest-1344068247", "password_expires_at": null}, "audit_ids": ["QKnPlW5sQJCOP0UNuPTpKA"], "expires_at": "2020-12-14T03:13:58.000000Z", "issued_at": "2020-12-14T02:13:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17a155987f7f426ea78e13dce4012d6e", "name": "tempest-FlavorManageRbacTest-1344068247"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.553 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.553 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.555 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.556 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.558 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.559 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.560 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.561 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.562 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.564 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.564 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.566 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.568 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.569 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.571 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.572 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.573 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.575 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.575 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.577 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.577 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.579 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.580 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.581 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.583 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.583 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.585 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.586 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.588 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.588 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.590 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.591 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.592 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.594 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.595 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.597 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.597 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.600 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.602 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.603 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.604 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.605 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.606 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.608 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.609 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.611 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.612 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.613 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.614 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.615 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.617 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.617 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.619 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.620 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.622 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.622 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.624 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.625 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.626 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.628 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.628 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.630 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.630 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.632 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.632 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.634 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.637 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.639 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.640 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-class-sets:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:58.641 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:58.644 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.646 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.648 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.650 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.652 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.655 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.657 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.659 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.661 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.663 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.665 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.668 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.670 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.672 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.674 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:58.682 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-keypairs:show, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:58.695 197 INFO tempest.lib.common.rest_client [req-331356c4-66cc-492d-b7e2-565362f5bfed ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 202 DELETE http://172.30.13.94/compute/v2.1/flavors/e18ea84e-eb19-46a1-a7fd-d2cf6671f429 0.137s 2020-12-14 02:13:58.697 197 DEBUG tempest.lib.common.rest_client [req-331356c4-66cc-492d-b7e2-565362f5bfed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-331356c4-66cc-492d-b7e2-565362f5bfed', 'x-compute-request-id': 'req-331356c4-66cc-492d-b7e2-565362f5bfed', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/e18ea84e-eb19-46a1-a7fd-d2cf6671f429'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.700 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:58.704 186 INFO tempest.lib.common.rest_client [req-d23a4c7b-804c-4a1c-90d8-8eddff75acac ] Request (QuotaClassesRbacTest:test_show_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles 0.058s 2020-12-14 02:13:58.706 186 DEBUG tempest.lib.common.rest_client [req-d23a4c7b-804c-4a1c-90d8-8eddff75acac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d23a4c7b-804c-4a1c-90d8-8eddff75acac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.765 197 INFO tempest.lib.common.rest_client [req-04ad0640-db54-4651-9fdc-f8f86b9b1af5 ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 200 GET http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles 0.059s 2020-12-14 02:13:58.769 197 DEBUG tempest.lib.common.rest_client [req-04ad0640-db54-4651-9fdc-f8f86b9b1af5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04ad0640-db54-4651-9fdc-f8f86b9b1af5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e/users/5359248896304ba0800ab047b94ee6fe/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.778 193 INFO tempest.lib.common.rest_client [req-3374ddbe-10ce-46c8-b5e7-f5ec0fcc087d ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.411s 2020-12-14 02:13:58.781 193 DEBUG tempest.lib.common.rest_client [req-3374ddbe-10ce-46c8-b5e7-f5ec0fcc087d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerConsolesRbacTest-734479438-router", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '811', 'x-openstack-request-id': 'req-3374ddbe-10ce-46c8-b5e7-f5ec0fcc087d', 'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "ca4a9a05-9aca-4f2b-a91a-f14741c83891", "name": "tempest-ServerConsolesRbacTest-734479438-router", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.163"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::1bc"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:13:57Z", "updated_at": "2020-12-14T02:13:58Z", "revision_number": 3, "project_id": "6416f6d9d76f40d3a9a3fbe3e0564902"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.814 197 INFO tempest.lib.common.rest_client [req-2911fa41-6145-416d-97ac-6f9b6c374fc4 ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:13:58.813 186 INFO tempest.lib.common.rest_client [req-26892452-6b62-400e-b63c-543df3d91502 ] Request (QuotaClassesRbacTest:test_show_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:13:58.816 197 DEBUG tempest.lib.common.rest_client [req-2911fa41-6145-416d-97ac-6f9b6c374fc4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2911fa41-6145-416d-97ac-6f9b6c374fc4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5359248896304ba0800ab047b94ee6fe", "name": "tempest-FlavorManageRbacTest-1344068247", "password_expires_at": null}, "audit_ids": ["N5uESXliS0aiVDXe01Nj9Q"], "expires_at": "2020-12-14T03:13:58.000000Z", "issued_at": "2020-12-14T02:13:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17a155987f7f426ea78e13dce4012d6e", "name": "tempest-FlavorManageRbacTest-1344068247"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17a155987f7f426ea78e13dce4012d6e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.817 186 DEBUG tempest.lib.common.rest_client [req-26892452-6b62-400e-b63c-543df3d91502 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26892452-6b62-400e-b63c-543df3d91502', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ba3c9f05106c4703bb8682d3ad0c2e33", "name": "tempest-QuotaClassesRbacTest-123847387", "password_expires_at": null}, "audit_ids": ["dZtmt1pzSiq7H1BS9CA2mA"], "expires_at": "2020-12-14T03:13:58.000000Z", "issued_at": "2020-12-14T02:13:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4629b9b7560643dc92c3ab11be678c7e", "name": "tempest-QuotaClassesRbacTest-123847387"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.873 189 INFO tempest.lib.common.rest_client [req-310e6a63-0d98-44d5-a909-7882556e00ff ] Request (KeypairsRbacTest:test_show_keypair): 200 POST http://172.30.13.94/compute/v2.1/os-keypairs 0.186s 2020-12-14 02:13:58.877 189 DEBUG tempest.lib.common.rest_client [req-310e6a63-0d98-44d5-a909-7882556e00ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"keypair": {"name": "tempest-KeypairsRbacTest-key-1119009868"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2318', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-310e6a63-0d98-44d5-a909-7882556e00ff', 'x-compute-request-id': 'req-310e6a63-0d98-44d5-a909-7882556e00ff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs'} Body: b'{"keypair": {"private_key": "-----BEGIN RSA PRIVATE KEY-----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\\nOPxskbrHIRQvxiSWyiN0/DKEErMlaeQ1g9QFpudocQoc0zPrk/wanKg=\\n-----END RSA PRIVATE KEY-----\\n", "name": "tempest-KeypairsRbacTest-key-1119009868", "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2vIqDm6MhhvFLS92v4IqUnC/QjR60fvvvPZmVWVa9bpe5ezan2MQUwknMHRG8p5LTE9VscZv9vkKSJ33J6/Pkmk2ZAB5wnwnZmMS/BOSHJOkJa5oqfNRHeXTqiv98q1hfrVhhVLpMDbWupKp2kdsDITZyhdMKxx3h1tk1H5bGDUWL0lOtYNiDFr9NyDiJt3V6ZDEIKhTBbfHYMTzh02i3+hzgPfpvfEVg7JqBZsDNdckO8FsTttSII94hRV1aKLdq3APXQPnqeYZcJErol2Hke1EgF7cPkCwbplni+63mrRYdfQKPdEpSa5GBevQAj3KsJN2SClZ7ZtYJUVD+5lOL Generated-by-Nova", "fingerprint": "b2:c4:b3:4f:c8:04:1e:8f:d3:26:eb:c7:69:bb:57:fe", "user_id": "f417f183d4c04c66baf18282db9d1040"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.893 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:58.920 186 INFO tempest.lib.common.rest_client [req-3f91d931-448e-447d-bffa-a65067851069 ] Request (QuotaClassesRbacTest:test_show_quota_class_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-class-sets/default 0.096s 2020-12-14 02:13:58.923 186 DEBUG tempest.lib.common.rest_client [req-3f91d931-448e-447d-bffa-a65067851069 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '303', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3f91d931-448e-447d-bffa-a65067851069', 'x-compute-request-id': 'req-3f91d931-448e-447d-bffa-a65067851069', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-class-sets/default'} Body: b'{"quota_class_set": {"id": "default", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.930 197 INFO tempest.lib.common.rest_client [req-d36de94c-c2ec-4497-ae53-ab24844a3ac5 ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 200 GET http://172.30.13.94/compute/v2.1/flavors/detail 0.108s 2020-12-14 02:13:58.933 197 DEBUG tempest.lib.common.rest_client [req-d36de94c-c2ec-4497-ae53-ab24844a3ac5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '10290', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d36de94c-c2ec-4497-ae53-ab24844a3ac5', 'x-compute-request-id': 'req-d36de94c-c2ec-4497-ae53-ab24844a3ac5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/detail'} Body: b'{"flavors": [{"id": "01e7ff06-4a12-4431-9b40-26277becb41d", "name": "rally_full-flavor_8a0926b1-7dc8-420c-9bd4-67b88c62abef", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/01e7ff06-4a12-4431-9b40-26277becb41d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/01e7ff06-4a12-4431-9b40-26277becb41d"}]}, {"id": "1", "name": "m1.tiny", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1"}]}, {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "name": "patrole_reader-flavor_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, {"id": "2", "name": "m1.small", "ram": 2048, "disk": 20, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2"}]}, {"id": "2919ff17-00dc-474f-9e1b-bf368e65fc74", "name": "rally_verify_4911c945_dl9HdAq1", "ram": 64, "disk": 5, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2919ff17-00dc-474f-9e1b-bf368e65fc74"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2919ff17-00dc-474f-9e1b-bf368e65fc74"}]}, {"id": "29b55520-b9a3-4b97-a3ae-d9c83f854c93", "name": "m1.heat_micro", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}]}, {"id": "3", "name": "m1.medium", "ram": 4096, "disk": 40, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/3"}]}, {"id": "4", "name": "m1.large", "ram": 8192, "disk": 80, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 4, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/4"}]}, {"id": "42", "name": "m1.nano", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/42"}]}, {"id": "442d1175-790f-46a1-b7c8-f52a17f6f7d8", "name": "patrole_member-flavor_c7a2fe1e-65f4-45d7-bab1-5c456aa6e4d6", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30. _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:58.955 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:58.964 189 INFO tempest.lib.common.rest_client [req-57b02e8e-3ea8-4cda-81fe-8d6a051daad6 ] Request (KeypairsRbacTest:test_show_keypair): 200 GET http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles 0.064s 2020-12-14 02:13:58.967 189 DEBUG tempest.lib.common.rest_client [req-57b02e8e-3ea8-4cda-81fe-8d6a051daad6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57b02e8e-3ea8-4cda-81fe-8d6a051daad6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.031 189 INFO tempest.lib.common.rest_client [req-d7c3a0ae-38dc-4835-b887-5df15dcdb69f ] Request (KeypairsRbacTest:test_show_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.058s 2020-12-14 02:13:59.034 189 DEBUG tempest.lib.common.rest_client [req-d7c3a0ae-38dc-4835-b887-5df15dcdb69f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d7c3a0ae-38dc-4835-b887-5df15dcdb69f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f417f183d4c04c66baf18282db9d1040", "name": "tempest-KeypairsRbacTest-1368540538", "password_expires_at": null}, "audit_ids": ["8GAohfo-SEWSDwtNOZov6w"], "expires_at": "2020-12-14T03:13:59.000000Z", "issued_at": "2020-12-14T02:13:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1c563ea768b9412dac40184549a51a8b", "name": "tempest-KeypairsRbacTest-1368540538"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.038 186 INFO tempest.lib.common.rest_client [req-99233573-11e6-4a39-8ddc-54354c07e58b ] Request (QuotaClassesRbacTest:test_show_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles 0.076s 2020-12-14 02:13:59.042 186 DEBUG tempest.lib.common.rest_client [req-99233573-11e6-4a39-8ddc-54354c07e58b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-99233573-11e6-4a39-8ddc-54354c07e58b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.091 186 INFO tempest.lib.common.rest_client [req-87697783-fa18-47fe-97de-c55035f95c12 ] Request (QuotaClassesRbacTest:test_show_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:13:59.094 186 DEBUG tempest.lib.common.rest_client [req-87697783-fa18-47fe-97de-c55035f95c12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87697783-fa18-47fe-97de-c55035f95c12', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ba3c9f05106c4703bb8682d3ad0c2e33", "name": "tempest-QuotaClassesRbacTest-123847387", "password_expires_at": null}, "audit_ids": ["jdKjsV-qSRqfnotb4kgdLw"], "expires_at": "2020-12-14T03:13:59.000000Z", "issued_at": "2020-12-14T02:13:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4629b9b7560643dc92c3ab11be678c7e", "name": "tempest-QuotaClassesRbacTest-123847387"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.096 197 INFO tempest.lib.common.rest_client [req-df2b10d2-49f1-4744-9bd4-3925fc87f8ad ] Request (FlavorManageRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/flavors/e18ea84e-eb19-46a1-a7fd-d2cf6671f429 0.036s 2020-12-14 02:13:59.098 197 DEBUG tempest.lib.common.rest_client [req-df2b10d2-49f1-4744-9bd4-3925fc87f8ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '109', 'x-openstack-request-id': 'req-df2b10d2-49f1-4744-9bd4-3925fc87f8ad', 'x-compute-request-id': 'req-df2b10d2-49f1-4744-9bd4-3925fc87f8ad', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/e18ea84e-eb19-46a1-a7fd-d2cf6671f429'} Body: b'{"itemNotFound": {"code": 404, "message": "Flavor e18ea84e-eb19-46a1-a7fd-d2cf6671f429 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.100 186 DEBUG oslo_concurrency.lockutils [-] Releasing lock "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:282 2020-12-14 02:13:59.118 186 DEBUG oslo_concurrency.lockutils [-] Acquired lock "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:266 2020-12-14 02:13:59.122 186 DEBUG oslo_concurrency.lockutils [-] Acquired external semaphore "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:272 2020-12-14 02:13:59.127 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:13:59.129 189 INFO tempest.lib.common.rest_client [req-275e920a-2c9a-41ee-bf87-edb2722bc0b8 ] Request (KeypairsRbacTest:test_show_keypair): 200 GET http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1119009868 0.088s 2020-12-14 02:13:59.131 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.132 189 DEBUG tempest.lib.common.rest_client [req-275e920a-2c9a-41ee-bf87-edb2722bc0b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '708', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-275e920a-2c9a-41ee-bf87-edb2722bc0b8', 'x-compute-request-id': 'req-275e920a-2c9a-41ee-bf87-edb2722bc0b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1119009868'} Body: b'{"keypair": {"name": "tempest-KeypairsRbacTest-key-1119009868", "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2vIqDm6MhhvFLS92v4IqUnC/QjR60fvvvPZmVWVa9bpe5ezan2MQUwknMHRG8p5LTE9VscZv9vkKSJ33J6/Pkmk2ZAB5wnwnZmMS/BOSHJOkJa5oqfNRHeXTqiv98q1hfrVhhVLpMDbWupKp2kdsDITZyhdMKxx3h1tk1H5bGDUWL0lOtYNiDFr9NyDiJt3V6ZDEIKhTBbfHYMTzh02i3+hzgPfpvfEVg7JqBZsDNdckO8FsTttSII94hRV1aKLdq3APXQPnqeYZcJErol2Hke1EgF7cPkCwbplni+63mrRYdfQKPdEpSa5GBevQAj3KsJN2SClZ7ZtYJUVD+5lOL Generated-by-Nova", "fingerprint": "b2:c4:b3:4f:c8:04:1e:8f:d3:26:eb:c7:69:bb:57:fe", "user_id": "f417f183d4c04c66baf18282db9d1040", "created_at": "2020-12-14T02:13:59.000000", "deleted": false, "deleted_at": null, "id": 16876, "updated_at": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.134 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.138 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.141 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.144 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.148 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.153 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.155 197 INFO tempest.lib.common.rest_client [req-2b631360-50ca-49b9-992b-b5511882d45f ] Request (FlavorManageRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/flavors/detail 0.050s 2020-12-14 02:13:59.156 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.158 197 DEBUG tempest.lib.common.rest_client [req-2b631360-50ca-49b9-992b-b5511882d45f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '10290', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2b631360-50ca-49b9-992b-b5511882d45f', 'x-compute-request-id': 'req-2b631360-50ca-49b9-992b-b5511882d45f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/detail'} Body: b'{"flavors": [{"id": "01e7ff06-4a12-4431-9b40-26277becb41d", "name": "rally_full-flavor_8a0926b1-7dc8-420c-9bd4-67b88c62abef", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/01e7ff06-4a12-4431-9b40-26277becb41d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/01e7ff06-4a12-4431-9b40-26277becb41d"}]}, {"id": "1", "name": "m1.tiny", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1"}]}, {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "name": "patrole_reader-flavor_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, {"id": "2", "name": "m1.small", "ram": 2048, "disk": 20, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2"}]}, {"id": "2919ff17-00dc-474f-9e1b-bf368e65fc74", "name": "rally_verify_4911c945_dl9HdAq1", "ram": 64, "disk": 5, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2919ff17-00dc-474f-9e1b-bf368e65fc74"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2919ff17-00dc-474f-9e1b-bf368e65fc74"}]}, {"id": "29b55520-b9a3-4b97-a3ae-d9c83f854c93", "name": "m1.heat_micro", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}]}, {"id": "3", "name": "m1.medium", "ram": 4096, "disk": 40, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/3"}]}, {"id": "4", "name": "m1.large", "ram": 8192, "disk": 80, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 4, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/4"}]}, {"id": "42", "name": "m1.nano", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/42"}]}, {"id": "442d1175-790f-46a1-b7c8-f52a17f6f7d8", "name": "patrole_member-flavor_c7a2fe1e-65f4-45d7-bab1-5c456aa6e4d6", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30. _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.158 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.161 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.161 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:59.164 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.167 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.170 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.173 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.176 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.183 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.188 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.191 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.194 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.198 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.200 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.203 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.206 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.208 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.211 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.213 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.215 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.218 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.220 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.222 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.224 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.226 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.229 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.231 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.233 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.236 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.238 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.240 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.241 189 INFO tempest.lib.common.rest_client [req-a7a30a6b-f04d-4de4-b9e4-a2a2f2649340 ] Request (KeypairsRbacTest:test_show_keypair): 200 GET http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles 0.073s 2020-12-14 02:13:59.243 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.245 189 DEBUG tempest.lib.common.rest_client [req-a7a30a6b-f04d-4de4-b9e4-a2a2f2649340 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7a30a6b-f04d-4de4-b9e4-a2a2f2649340', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b/users/f417f183d4c04c66baf18282db9d1040/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.246 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.248 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.250 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.253 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.258 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.261 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.265 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.268 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.272 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.274 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.277 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.279 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.281 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.284 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.286 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.289 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.291 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.293 189 INFO tempest.lib.common.rest_client [req-cdc77239-299c-4475-a3e2-c78dbfd00387 ] Request (KeypairsRbacTest:test_show_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:13:59.296 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.296 189 DEBUG tempest.lib.common.rest_client [req-cdc77239-299c-4475-a3e2-c78dbfd00387 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cdc77239-299c-4475-a3e2-c78dbfd00387', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f417f183d4c04c66baf18282db9d1040", "name": "tempest-KeypairsRbacTest-1368540538", "password_expires_at": null}, "audit_ids": ["uTTMI4xzQ_qsfNzEcG7fFQ"], "expires_at": "2020-12-14T03:13:59.000000Z", "issued_at": "2020-12-14T02:13:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1c563ea768b9412dac40184549a51a8b", "name": "tempest-KeypairsRbacTest-1368540538"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1c563ea768b9412dac40184549a51a8b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.298 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.300 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.303 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.305 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.308 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.310 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.312 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.314 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.316 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.319 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.318 197 INFO tempest.lib.common.rest_client [req-261b99f9-62ab-401a-ade1-42d6a18468e9 ] Request (FlavorManageRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/flavors/78e6a658-f652-4422-8fdb-22cdec7c4be1 0.039s 2020-12-14 02:13:59.320 197 DEBUG tempest.lib.common.rest_client [req-261b99f9-62ab-401a-ade1-42d6a18468e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-261b99f9-62ab-401a-ade1-42d6a18468e9', 'x-compute-request-id': 'req-261b99f9-62ab-401a-ade1-42d6a18468e9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/78e6a658-f652-4422-8fdb-22cdec7c4be1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.321 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.323 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.325 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.328 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:13:59.335 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-class-sets:update, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:13:59.376 197 INFO tempest.lib.common.rest_client [req-0c62bdd8-9056-4f86-8789-5e74b3199a2f ] Request (FlavorManageRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/flavors/detail 0.050s 2020-12-14 02:13:59.379 197 DEBUG tempest.lib.common.rest_client [req-0c62bdd8-9056-4f86-8789-5e74b3199a2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '9794', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0c62bdd8-9056-4f86-8789-5e74b3199a2f', 'x-compute-request-id': 'req-0c62bdd8-9056-4f86-8789-5e74b3199a2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/detail'} Body: b'{"flavors": [{"id": "01e7ff06-4a12-4431-9b40-26277becb41d", "name": "rally_full-flavor_8a0926b1-7dc8-420c-9bd4-67b88c62abef", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/01e7ff06-4a12-4431-9b40-26277becb41d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/01e7ff06-4a12-4431-9b40-26277becb41d"}]}, {"id": "1", "name": "m1.tiny", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1"}]}, {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "name": "patrole_reader-flavor_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, {"id": "2", "name": "m1.small", "ram": 2048, "disk": 20, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2"}]}, {"id": "2919ff17-00dc-474f-9e1b-bf368e65fc74", "name": "rally_verify_4911c945_dl9HdAq1", "ram": 64, "disk": 5, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2919ff17-00dc-474f-9e1b-bf368e65fc74"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2919ff17-00dc-474f-9e1b-bf368e65fc74"}]}, {"id": "29b55520-b9a3-4b97-a3ae-d9c83f854c93", "name": "m1.heat_micro", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}]}, {"id": "3", "name": "m1.medium", "ram": 4096, "disk": 40, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/3"}]}, {"id": "4", "name": "m1.large", "ram": 8192, "disk": 80, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 4, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/4"}]}, {"id": "42", "name": "m1.nano", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/42"}]}, {"id": "442d1175-790f-46a1-b7c8-f52a17f6f7d8", "name": "patrole_member-flavor_c7a2fe1e-65f4-45d7-bab1-5c456aa6e4d6", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30. _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.407 189 INFO tempest.lib.common.rest_client [req-9004c632-ba6c-43f5-8f2d-1d988b1cea8f ] Request (KeypairsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1119009868 0.102s 2020-12-14 02:13:59.410 189 DEBUG tempest.lib.common.rest_client [req-9004c632-ba6c-43f5-8f2d-1d988b1cea8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9004c632-ba6c-43f5-8f2d-1d988b1cea8f', 'x-compute-request-id': 'req-9004c632-ba6c-43f5-8f2d-1d988b1cea8f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1119009868'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.439 186 INFO tempest.lib.common.rest_client [req-c13237b7-aeee-45a0-a90f-34c825a99601 ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-class-sets/43bd2de5875e47339deb9ac3f75de4d1 0.100s 2020-12-14 02:13:59.442 186 DEBUG tempest.lib.common.rest_client [req-c13237b7-aeee-45a0-a90f-34c825a99601 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '328', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c13237b7-aeee-45a0-a90f-34c825a99601', 'x-compute-request-id': 'req-c13237b7-aeee-45a0-a90f-34c825a99601', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-class-sets/43bd2de5875e47339deb9ac3f75de4d1'} Body: b'{"quota_class_set": {"id": "43bd2de5875e47339deb9ac3f75de4d1", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.465 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:13:59.529 186 INFO tempest.lib.common.rest_client [req-e45c64b7-b860-49ef-8680-c1677bce53e7 ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles 0.059s 2020-12-14 02:13:59.532 186 DEBUG tempest.lib.common.rest_client [req-e45c64b7-b860-49ef-8680-c1677bce53e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e45c64b7-b860-49ef-8680-c1677bce53e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.576 186 INFO tempest.lib.common.rest_client [req-6044515e-1807-47e3-a26e-d678edbb6a51 ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:13:59.578 186 DEBUG tempest.lib.common.rest_client [req-6044515e-1807-47e3-a26e-d678edbb6a51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6044515e-1807-47e3-a26e-d678edbb6a51', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ba3c9f05106c4703bb8682d3ad0c2e33", "name": "tempest-QuotaClassesRbacTest-123847387", "password_expires_at": null}, "audit_ids": ["mkA2cNQGQdekzSk4LY_3qQ"], "expires_at": "2020-12-14T03:13:59.000000Z", "issued_at": "2020-12-14T02:13:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4629b9b7560643dc92c3ab11be678c7e", "name": "tempest-QuotaClassesRbacTest-123847387"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.591 189 INFO tempest.lib.common.rest_client [req-a106ef72-b1e0-4c43-b776-02508ff0c589 ] Request (KeypairsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/f417f183d4c04c66baf18282db9d1040 0.149s 2020-12-14 02:13:59.594 189 DEBUG tempest.lib.common.rest_client [req-a106ef72-b1e0-4c43-b776-02508ff0c589 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a106ef72-b1e0-4c43-b776-02508ff0c589', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/f417f183d4c04c66baf18282db9d1040'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.651 197 INFO tempest.lib.common.rest_client [req-c05897cd-16f1-48ee-b490-bebeccdaeeab ] Request (FlavorManageRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/5359248896304ba0800ab047b94ee6fe 0.137s 2020-12-14 02:13:59.654 197 DEBUG tempest.lib.common.rest_client [req-c05897cd-16f1-48ee-b490-bebeccdaeeab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c05897cd-16f1-48ee-b490-bebeccdaeeab', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/5359248896304ba0800ab047b94ee6fe'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.730 189 INFO tempest.lib.common.rest_client [req-a6a80581-cca8-4f6f-9e70-c4ba363060cc ] Request (KeypairsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.128s 2020-12-14 02:13:59.734 189 DEBUG tempest.lib.common.rest_client [req-a6a80581-cca8-4f6f-9e70-c4ba363060cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a6a80581-cca8-4f6f-9e70-c4ba363060cc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["OGGdM-IxT8mJDg0NOZZhhg"], "expires_at": "2020-12-14T03:13:59.000000Z", "issued_at": "2020-12-14T02:13:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.763 197 INFO tempest.lib.common.rest_client [req-413ff950-94d7-4a1d-a723-8edd6049fe25 ] Request (FlavorManageRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:13:59.766 197 DEBUG tempest.lib.common.rest_client [req-413ff950-94d7-4a1d-a723-8edd6049fe25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-413ff950-94d7-4a1d-a723-8edd6049fe25', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["5vkOwMOPSjODKGmcupVxGQ"], "expires_at": "2020-12-14T03:13:59.000000Z", "issued_at": "2020-12-14T02:13:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.931 186 INFO tempest.lib.common.rest_client [req-14a8cbf3-a0d9-4e74-b6a5-0862487ad763 ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 200 PUT http://172.30.13.94/compute/v2.1/os-quota-class-sets/43bd2de5875e47339deb9ac3f75de4d1 0.347s 2020-12-14 02:13:59.934 186 DEBUG tempest.lib.common.rest_client [req-14a8cbf3-a0d9-4e74-b6a5-0862487ad763 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_class_set": {"cores": 120, "fixed_ips": 99, "floating_ips": 99, "injected_file_content_bytes": 10340, "injected_file_path_bytes": 355, "injected_files": 105, "instances": 110, "key_pairs": 200, "metadata_items": 228, "ram": 51300, "security_group_rules": 99, "security_groups": 99}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '290', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-14a8cbf3-a0d9-4e74-b6a5-0862487ad763', 'x-compute-request-id': 'req-14a8cbf3-a0d9-4e74-b6a5-0862487ad763', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-class-sets/43bd2de5875e47339deb9ac3f75de4d1'} Body: b'{"quota_class_set": {"cores": 120, "fixed_ips": 99, "floating_ips": 99, "injected_file_content_bytes": 10340, "injected_file_path_bytes": 355, "injected_files": 105, "instances": 110, "key_pairs": 200, "metadata_items": 228, "ram": 51300, "security_group_rules": 99, "security_groups": 99}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:13:59.956 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:00.014 186 INFO tempest.lib.common.rest_client [req-70089773-64dc-4d4a-9b01-7a5f2dc5014b ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles 0.053s 2020-12-14 02:14:00.017 186 DEBUG tempest.lib.common.rest_client [req-70089773-64dc-4d4a-9b01-7a5f2dc5014b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:13:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70089773-64dc-4d4a-9b01-7a5f2dc5014b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e/users/ba3c9f05106c4703bb8682d3ad0c2e33/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:00.132 189 INFO tempest.lib.common.rest_client [req-5bf99f71-32f9-4863-bb6b-2394f64fd85b ] Request (KeypairsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1c563ea768b9412dac40184549a51a8b&name=default 0.392s 2020-12-14 02:14:00.132 186 INFO tempest.lib.common.rest_client [req-42c10d21-63dd-4ae2-a079-78a4fd5a8d6c ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:14:00.134 189 DEBUG tempest.lib.common.rest_client [req-5bf99f71-32f9-4863-bb6b-2394f64fd85b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-5bf99f71-32f9-4863-bb6b-2394f64fd85b', 'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1c563ea768b9412dac40184549a51a8b&name=default'} Body: b'{"security_groups": [{"id": "4fbc0045-daa8-4649-bd43-f39720acd3c2", "name": "default", "stateful": true, "tenant_id": "1c563ea768b9412dac40184549a51a8b", "description": "Default security group", "security_group_rules": [{"id": "1b8066d3-c13b-450b-b74d-d0664ef327f5", "tenant_id": "1c563ea768b9412dac40184549a51a8b", "security_group_id": "4fbc0045-daa8-4649-bd43-f39720acd3c2", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:59Z", "updated_at": "2020-12-14T02:13:59Z", "revision_number": 0, "project_id": "1c563ea768b9412dac40184549a51a8b"}, {"id": "b6450e13-618b-4c60-8471-3293d404ac1e", "tenant_id": "1c563ea768b9412dac40184549a51a8b", "security_group_id": "4fbc0045-daa8-4649-bd43-f39720acd3c2", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:59Z", "updated_at": "2020-12-14T02:13:59Z", "revision_number": 0, "project_id": "1c563ea768b9412dac40184549a51a8b"}, {"id": "e30fe5b3-c1fd-41a4-9309-721a02c71812", "tenant_id": "1c563ea768b9412dac40184549a51a8b", "security_group_id": "4fbc0045-daa8-4649-bd43-f39720acd3c2", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4fbc0045-daa8-4649-bd43-f39720acd3c2", "description": null, "tags": [], "created_at": "2020-12-14T02:13:59Z", "updated_at": "2020-12-14T02:13:59Z", "revision_number": 0, "project_id": "1c563ea768b9412dac40184549a51a8b"}, {"id": "f2bedb74-37bc-4357-861d-e5d5776cb9d5", "tenant_id": "1c563ea768b9412dac40184549a51a8b", "security_group_id": "4fbc0045-daa8-4649-bd43-f39720acd3c2", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4fbc0045-daa8-4649-bd43-f39720acd3c2", "description": null, "tags": [], "created_at": "2020-12-14T02:13:59Z", "updated_at": "2020-12-14T02:13:59Z", "revision_number": 0, "project_id": "1c563ea768b9412dac40184549a51a8b"}], "tags": [], "created_at": "2020-12-14T02:13:59Z", "updated_at": "2020-12-14T02:13:59Z", "revision_number": 1, "project_id": "1c563ea768b9412dac40184549a51a8b"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:00.136 186 DEBUG tempest.lib.common.rest_client [req-42c10d21-63dd-4ae2-a079-78a4fd5a8d6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42c10d21-63dd-4ae2-a079-78a4fd5a8d6c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "ba3c9f05106c4703bb8682d3ad0c2e33", "name": "tempest-QuotaClassesRbacTest-123847387", "password_expires_at": null}, "audit_ids": ["bbrzr9IiTJq9_3g2jt69cQ"], "expires_at": "2020-12-14T03:14:00.000000Z", "issued_at": "2020-12-14T02:14:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4629b9b7560643dc92c3ab11be678c7e", "name": "tempest-QuotaClassesRbacTest-123847387"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4629b9b7560643dc92c3ab11be678c7e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:00.141 186 DEBUG oslo_concurrency.lockutils [-] Releasing lock "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:282 2020-12-14 02:14:00.174 197 INFO tempest.lib.common.rest_client [req-cf263895-93d1-4584-b15b-23250ed61ac4 ] Request (FlavorManageRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=17a155987f7f426ea78e13dce4012d6e&name=default 0.400s 2020-12-14 02:14:00.177 197 DEBUG tempest.lib.common.rest_client [req-cf263895-93d1-4584-b15b-23250ed61ac4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-cf263895-93d1-4584-b15b-23250ed61ac4', 'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=17a155987f7f426ea78e13dce4012d6e&name=default'} Body: b'{"security_groups": [{"id": "325af4f8-c2bc-4681-847b-11af3cb869e1", "name": "default", "stateful": true, "tenant_id": "17a155987f7f426ea78e13dce4012d6e", "description": "Default security group", "security_group_rules": [{"id": "57d662ee-30e8-4bef-b6c0-236856b9129c", "tenant_id": "17a155987f7f426ea78e13dce4012d6e", "security_group_id": "325af4f8-c2bc-4681-847b-11af3cb869e1", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "325af4f8-c2bc-4681-847b-11af3cb869e1", "description": null, "tags": [], "created_at": "2020-12-14T02:14:00Z", "updated_at": "2020-12-14T02:14:00Z", "revision_number": 0, "project_id": "17a155987f7f426ea78e13dce4012d6e"}, {"id": "5c16d5be-d230-4eb8-a5b0-cd68438a9e77", "tenant_id": "17a155987f7f426ea78e13dce4012d6e", "security_group_id": "325af4f8-c2bc-4681-847b-11af3cb869e1", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:00Z", "updated_at": "2020-12-14T02:14:00Z", "revision_number": 0, "project_id": "17a155987f7f426ea78e13dce4012d6e"}, {"id": "64fe39de-c838-462c-8f58-0d52195fcd10", "tenant_id": "17a155987f7f426ea78e13dce4012d6e", "security_group_id": "325af4f8-c2bc-4681-847b-11af3cb869e1", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "325af4f8-c2bc-4681-847b-11af3cb869e1", "description": null, "tags": [], "created_at": "2020-12-14T02:14:00Z", "updated_at": "2020-12-14T02:14:00Z", "revision_number": 0, "project_id": "17a155987f7f426ea78e13dce4012d6e"}, {"id": "96b1c17e-afcf-4d9d-83b9-18b661acc747", "tenant_id": "17a155987f7f426ea78e13dce4012d6e", "security_group_id": "325af4f8-c2bc-4681-847b-11af3cb869e1", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:00Z", "updated_at": "2020-12-14T02:14:00Z", "revision_number": 0, "project_id": "17a155987f7f426ea78e13dce4012d6e"}], "tags": [], "created_at": "2020-12-14T02:13:59Z", "updated_at": "2020-12-14T02:14:00Z", "revision_number": 1, "project_id": "17a155987f7f426ea78e13dce4012d6e"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:00.318 197 INFO tempest.lib.common.rest_client [req-390b8ff2-9152-4928-ba5c-d495a4bee571 ] Request (FlavorManageRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/325af4f8-c2bc-4681-847b-11af3cb869e1 0.133s 2020-12-14 02:14:00.321 197 DEBUG tempest.lib.common.rest_client [req-390b8ff2-9152-4928-ba5c-d495a4bee571 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-390b8ff2-9152-4928-ba5c-d495a4bee571', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/325af4f8-c2bc-4681-847b-11af3cb869e1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:00.396 186 INFO tempest.lib.common.rest_client [req-7e865431-0151-4df0-aa7f-6e6dac7bc31e ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/43bd2de5875e47339deb9ac3f75de4d1 0.234s 2020-12-14 02:14:00.399 186 DEBUG tempest.lib.common.rest_client [req-7e865431-0151-4df0-aa7f-6e6dac7bc31e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e865431-0151-4df0-aa7f-6e6dac7bc31e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/43bd2de5875e47339deb9ac3f75de4d1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:00.450 189 INFO tempest.lib.common.rest_client [req-68deeb8e-27e0-4be1-b98c-c059ca54ce4d ] Request (KeypairsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/4fbc0045-daa8-4649-bd43-f39720acd3c2 0.308s 2020-12-14 02:14:00.453 189 DEBUG tempest.lib.common.rest_client [req-68deeb8e-27e0-4be1-b98c-c059ca54ce4d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-68deeb8e-27e0-4be1-b98c-c059ca54ce4d', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/4fbc0045-daa8-4649-bd43-f39720acd3c2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:00.522 197 INFO tempest.lib.common.rest_client [req-8c5adcb7-414a-42b8-a325-ef1b6f6263cc ] Request (FlavorManageRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e 0.193s 2020-12-14 02:14:00.525 197 DEBUG tempest.lib.common.rest_client [req-8c5adcb7-414a-42b8-a325-ef1b6f6263cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c5adcb7-414a-42b8-a325-ef1b6f6263cc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/17a155987f7f426ea78e13dce4012d6e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:00.542 186 INFO tempest.lib.common.rest_client [req-6c297b33-1b3c-4548-96cd-3c516c10b45d ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/ba3c9f05106c4703bb8682d3ad0c2e33 0.139s 2020-12-14 02:14:00.544 186 DEBUG tempest.lib.common.rest_client [req-6c297b33-1b3c-4548-96cd-3c516c10b45d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c297b33-1b3c-4548-96cd-3c516c10b45d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/ba3c9f05106c4703bb8682d3ad0c2e33'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:00.655 186 INFO tempest.lib.common.rest_client [req-b6d26d60-61d9-46a4-9fb0-0b34a620af67 ] Request (QuotaClassesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:14:00.657 186 DEBUG tempest.lib.common.rest_client [req-b6d26d60-61d9-46a4-9fb0-0b34a620af67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6d26d60-61d9-46a4-9fb0-0b34a620af67', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["5zFAQLK1TvmXecC6v7r5TA"], "expires_at": "2020-12-14T03:14:00.000000Z", "issued_at": "2020-12-14T02:14:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:00.660 197 INFO tempest.lib.common.rest_client [req-a7dd8f27-3146-464a-b42d-e37908e68623 ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.114s 2020-12-14 02:14:00.663 197 DEBUG tempest.lib.common.rest_client [req-a7dd8f27-3146-464a-b42d-e37908e68623 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7dd8f27-3146-464a-b42d-e37908e68623', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["LJMbt9_STwKXtvmOU16W3w"], "expires_at": "2020-12-14T03:14:00.000000Z", "issued_at": "2020-12-14T02:14:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:00.693 189 INFO tempest.lib.common.rest_client [req-d01a4f22-a24d-442b-8656-42d273262320 ] Request (KeypairsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b 0.234s 2020-12-14 02:14:00.696 189 DEBUG tempest.lib.common.rest_client [req-d01a4f22-a24d-442b-8656-42d273262320 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d01a4f22-a24d-442b-8656-42d273262320', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1c563ea768b9412dac40184549a51a8b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:00.823 189 INFO tempest.lib.common.rest_client [req-392d29d1-022c-4e1c-bfb3-4c9813a110d0 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:14:00.825 189 DEBUG tempest.lib.common.rest_client [req-392d29d1-022c-4e1c-bfb3-4c9813a110d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-392d29d1-022c-4e1c-bfb3-4c9813a110d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["-LVWsDC4Qia5xmkUUlsqHA"], "expires_at": "2020-12-14T03:14:00.000000Z", "issued_at": "2020-12-14T02:14:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:00.842 197 INFO tempest.lib.common.rest_client [req-6d843931-dfae-4406-b59c-b4eb5c846e20 ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.116s 2020-12-14 02:14:00.845 197 DEBUG tempest.lib.common.rest_client [req-6d843931-dfae-4406-b59c-b4eb5c846e20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d843931-dfae-4406-b59c-b4eb5c846e20', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["d4qn4_fxQ7KQxuyOCbzcqQ"], "expires_at": "2020-12-14T03:14:00.000000Z", "issued_at": "2020-12-14T02:14:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:00.911 197 INFO tempest.lib.common.rest_client [req-aa95d9dd-467a-4090-bd19-59eb3a23b1aa ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.059s 2020-12-14 02:14:00.913 197 DEBUG tempest.lib.common.rest_client [req-aa95d9dd-467a-4090-bd19-59eb3a23b1aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa95d9dd-467a-4090-bd19-59eb3a23b1aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:00.938 189 INFO tempest.lib.common.rest_client [req-55ea6990-6f20-466d-bb26-e02314900629 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:14:00.940 189 DEBUG tempest.lib.common.rest_client [req-55ea6990-6f20-466d-bb26-e02314900629 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55ea6990-6f20-466d-bb26-e02314900629', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["G5V9FhbsTVOCTlpLngqE6w"], "expires_at": "2020-12-14T03:14:00.000000Z", "issued_at": "2020-12-14T02:14:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:00.989 197 INFO tempest.lib.common.rest_client [req-67ae94ab-7593-40f1-873b-7d2287d2a6c5 ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.068s 2020-12-14 02:14:00.991 197 DEBUG tempest.lib.common.rest_client [req-67ae94ab-7593-40f1-873b-7d2287d2a6c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FlavorRxtxRbacTest-584235707-desc", "domain_id": "default", "name": "tempest-FlavorRxtxRbacTest-584235707"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67ae94ab-7593-40f1-873b-7d2287d2a6c5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "c7faef3bf7d545f0b5e428ed3f40792f", "name": "tempest-FlavorRxtxRbacTest-584235707", "domain_id": "default", "description": "tempest-FlavorRxtxRbacTest-584235707-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/c7faef3bf7d545f0b5e428ed3f40792f"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.005 189 INFO tempest.lib.common.rest_client [req-a98920ec-8441-4cbb-b11a-73593c98a065 ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.058s 2020-12-14 02:14:01.008 189 DEBUG tempest.lib.common.rest_client [req-a98920ec-8441-4cbb-b11a-73593c98a065 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a98920ec-8441-4cbb-b11a-73593c98a065', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.044 186 INFO tempest.lib.common.rest_client [req-a4c1a394-05d0-44dc-9860-473aea1434f8 ] Request (QuotaClassesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4629b9b7560643dc92c3ab11be678c7e&name=default 0.379s 2020-12-14 02:14:01.047 186 DEBUG tempest.lib.common.rest_client [req-a4c1a394-05d0-44dc-9860-473aea1434f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-a4c1a394-05d0-44dc-9860-473aea1434f8', 'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4629b9b7560643dc92c3ab11be678c7e&name=default'} Body: b'{"security_groups": [{"id": "d92a62a9-2687-4e4f-8202-336f7dae72f8", "name": "default", "stateful": true, "tenant_id": "4629b9b7560643dc92c3ab11be678c7e", "description": "Default security group", "security_group_rules": [{"id": "1c00803d-57bd-4a2f-8094-cb123d8786e7", "tenant_id": "4629b9b7560643dc92c3ab11be678c7e", "security_group_id": "d92a62a9-2687-4e4f-8202-336f7dae72f8", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d92a62a9-2687-4e4f-8202-336f7dae72f8", "description": null, "tags": [], "created_at": "2020-12-14T02:14:00Z", "updated_at": "2020-12-14T02:14:00Z", "revision_number": 0, "project_id": "4629b9b7560643dc92c3ab11be678c7e"}, {"id": "951c204f-be82-47be-bf7e-f99975fd15bf", "tenant_id": "4629b9b7560643dc92c3ab11be678c7e", "security_group_id": "d92a62a9-2687-4e4f-8202-336f7dae72f8", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:00Z", "updated_at": "2020-12-14T02:14:00Z", "revision_number": 0, "project_id": "4629b9b7560643dc92c3ab11be678c7e"}, {"id": "e3b68fe3-4e4e-4198-abcc-7e859ae9e9c1", "tenant_id": "4629b9b7560643dc92c3ab11be678c7e", "security_group_id": "d92a62a9-2687-4e4f-8202-336f7dae72f8", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d92a62a9-2687-4e4f-8202-336f7dae72f8", "description": null, "tags": [], "created_at": "2020-12-14T02:14:00Z", "updated_at": "2020-12-14T02:14:00Z", "revision_number": 0, "project_id": "4629b9b7560643dc92c3ab11be678c7e"}, {"id": "e42374fb-4ccf-4514-b39b-ef1ac8118b53", "tenant_id": "4629b9b7560643dc92c3ab11be678c7e", "security_group_id": "d92a62a9-2687-4e4f-8202-336f7dae72f8", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:00Z", "updated_at": "2020-12-14T02:14:00Z", "revision_number": 0, "project_id": "4629b9b7560643dc92c3ab11be678c7e"}], "tags": [], "created_at": "2020-12-14T02:14:00Z", "updated_at": "2020-12-14T02:14:00Z", "revision_number": 1, "project_id": "4629b9b7560643dc92c3ab11be678c7e"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.101 197 INFO tempest.lib.common.rest_client [req-1f7424cd-ccec-4a01-8ca0-bdc3bdd0dc8e ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.103s 2020-12-14 02:14:01.103 197 DEBUG tempest.lib.common.rest_client [req-1f7424cd-ccec-4a01-8ca0-bdc3bdd0dc8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FlavorRxtxRbacTest-584235707", "password": "B5#e&DZ3yViyTba", "project_id": "c7faef3bf7d545f0b5e428ed3f40792f", "email": "tempest-FlavorRxtxRbacTest-2077035331@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '391', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f7424cd-ccec-4a01-8ca0-bdc3bdd0dc8e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "c7faef3bf7d545f0b5e428ed3f40792f", "email": "tempest-FlavorRxtxRbacTest-2077035331@example.com", "id": "7776998c50494745bdc214b3864ad6fc", "name": "tempest-FlavorRxtxRbacTest-584235707", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/7776998c50494745bdc214b3864ad6fc"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.117 189 INFO tempest.lib.common.rest_client [req-bd0a03c8-2b3b-4aa9-b998-c3794dad055f ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.103s 2020-12-14 02:14:01.119 189 DEBUG tempest.lib.common.rest_client [req-bd0a03c8-2b3b-4aa9-b998-c3794dad055f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerActionsRbacTest-1901705202-desc", "domain_id": "default", "name": "tempest-ServerActionsRbacTest-1901705202"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd0a03c8-2b3b-4aa9-b998-c3794dad055f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202", "domain_id": "default", "description": "tempest-ServerActionsRbacTest-1901705202-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.205 186 INFO tempest.lib.common.rest_client [req-3c0ea7bb-120a-4f4f-9e0c-0a4f5de7dedb ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/d92a62a9-2687-4e4f-8202-336f7dae72f8 0.152s 2020-12-14 02:14:01.207 186 DEBUG tempest.lib.common.rest_client [req-3c0ea7bb-120a-4f4f-9e0c-0a4f5de7dedb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-3c0ea7bb-120a-4f4f-9e0c-0a4f5de7dedb', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/d92a62a9-2687-4e4f-8202-336f7dae72f8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.209 197 INFO tempest.lib.common.rest_client [req-6a7cf12b-b41a-4ad3-b6bd-1abfa2c5d805 ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.095s 2020-12-14 02:14:01.213 197 DEBUG tempest.lib.common.rest_client [req-6a7cf12b-b41a-4ad3-b6bd-1abfa2c5d805 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a7cf12b-b41a-4ad3-b6bd-1abfa2c5d805', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.232 193 INFO tempest.lib.common.rest_client [req-0269451e-4691-436b-9651-46438a636fa0 ] Request (ServerConsolesRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/ca4a9a05-9aca-4f2b-a91a-f14741c83891/add_router_interface 2.441s 2020-12-14 02:14:01.235 193 DEBUG tempest.lib.common.rest_client [req-0269451e-4691-436b-9651-46438a636fa0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "98ac1ef5-3071-4a7d-b9bc-8467fe9063ee"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-0269451e-4691-436b-9651-46438a636fa0', 'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/ca4a9a05-9aca-4f2b-a91a-f14741c83891/add_router_interface'} Body: b'{"id": "ca4a9a05-9aca-4f2b-a91a-f14741c83891", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "port_id": "a0db55f5-beaf-4d96-931b-c9dd51227e1c", "network_id": "677d9531-31e0-4552-824b-7b4e207e716e", "subnet_id": "98ac1ef5-3071-4a7d-b9bc-8467fe9063ee", "subnet_ids": ["98ac1ef5-3071-4a7d-b9bc-8467fe9063ee"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.238 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerConsolesRbacTest-1721381461', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6416f6d9d76f40d3a9a3fbe3e0564902', 'project_name': 'tempest-ServerConsolesRbacTest-1721381461', 'tenant_id': '6416f6d9d76f40d3a9a3fbe3e0564902', 'tenant_name': 'tempest-ServerConsolesRbacTest-1721381461', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5061a16d2eeb43f98ad0aada2c68da9b'}, Network: {'id': '677d9531-31e0-4552-824b-7b4e207e716e', 'name': 'tempest-ServerConsolesRbacTest-734479438-network', 'tenant_id': '6416f6d9d76f40d3a9a3fbe3e0564902', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '6416f6d9d76f40d3a9a3fbe3e0564902', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:13:56Z', 'updated_at': '2020-12-14T02:13:56Z', 'revision_number': 1}, Subnet: {'id': '98ac1ef5-3071-4a7d-b9bc-8467fe9063ee', 'name': 'tempest-ServerConsolesRbacTest-734479438-subnet', 'tenant_id': '6416f6d9d76f40d3a9a3fbe3e0564902', 'network_id': '677d9531-31e0-4552-824b-7b4e207e716e', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:13:56Z', 'updated_at': '2020-12-14T02:13:56Z', 'revision_number': 0, 'project_id': '6416f6d9d76f40d3a9a3fbe3e0564902'}, Router: {'id': 'ca4a9a05-9aca-4f2b-a91a-f14741c83891', 'name': 'tempest-ServerConsolesRbacTest-734479438-router', 'tenant_id': '6416f6d9d76f40d3a9a3fbe3e0564902', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.163'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::1bc'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:13:57Z', 'updated_at': '2020-12-14T02:13:58Z', 'revision_number': 3, 'project_id': '6416f6d9d76f40d3a9a3fbe3e0564902'} 2020-12-14 02:14:01.247 189 INFO tempest.lib.common.rest_client [req-fd4c91ba-d4d3-4b63-9459-dc5f77e82ed6 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.120s 2020-12-14 02:14:01.249 189 DEBUG tempest.lib.common.rest_client [req-fd4c91ba-d4d3-4b63-9459-dc5f77e82ed6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerActionsRbacTest-1901705202", "password": "L3&s*82MT+H*J6j", "project_id": "3400d8caa66043d0b7fa128b68a28ecc", "email": "tempest-ServerActionsRbacTest-1224520941@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '398', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd4c91ba-d4d3-4b63-9459-dc5f77e82ed6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "3400d8caa66043d0b7fa128b68a28ecc", "email": "tempest-ServerActionsRbacTest-1224520941@example.com", "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/fc49b78fc1304d33aaa92419232a1e0d"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.275 197 INFO tempest.lib.common.rest_client [req-8ded8f07-a024-4f05-8143-67e5814f9b01 ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:14:01.277 197 DEBUG tempest.lib.common.rest_client [req-8ded8f07-a024-4f05-8143-67e5814f9b01 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ded8f07-a024-4f05-8143-67e5814f9b01', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.306 189 INFO tempest.lib.common.rest_client [req-218dd8dc-e5e9-4b6c-bd97-9904a80bca81 ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-12-14 02:14:01.307 189 DEBUG tempest.lib.common.rest_client [req-218dd8dc-e5e9-4b6c-bd97-9904a80bca81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-218dd8dc-e5e9-4b6c-bd97-9904a80bca81', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.357 197 INFO tempest.lib.common.rest_client [req-fd9bb82a-49d0-4b8e-adf5-5bafb09a5993 ] Request (FlavorRxtxRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c7faef3bf7d545f0b5e428ed3f40792f/users/7776998c50494745bdc214b3864ad6fc/roles/72a4576c553448cd941b052c1ca0cf2d 0.073s 2020-12-14 02:14:01.359 197 DEBUG tempest.lib.common.rest_client [req-fd9bb82a-49d0-4b8e-adf5-5bafb09a5993 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd9bb82a-49d0-4b8e-adf5-5bafb09a5993', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c7faef3bf7d545f0b5e428ed3f40792f/users/7776998c50494745bdc214b3864ad6fc/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.362 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorRxtxRbacTest-584235707', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c7faef3bf7d545f0b5e428ed3f40792f', 'project_name': 'tempest-FlavorRxtxRbacTest-584235707', 'tenant_id': 'c7faef3bf7d545f0b5e428ed3f40792f', 'tenant_name': 'tempest-FlavorRxtxRbacTest-584235707', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '7776998c50494745bdc214b3864ad6fc'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:01.363 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorRxtxRbacTest-584235707', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c7faef3bf7d545f0b5e428ed3f40792f', 'project_name': 'tempest-FlavorRxtxRbacTest-584235707', 'tenant_id': 'c7faef3bf7d545f0b5e428ed3f40792f', 'tenant_name': 'tempest-FlavorRxtxRbacTest-584235707', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '7776998c50494745bdc214b3864ad6fc'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:01.370 189 INFO tempest.lib.common.rest_client [req-c00541aa-c046-4037-beb9-e8f79e4fe564 ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:14:01.372 189 DEBUG tempest.lib.common.rest_client [req-c00541aa-c046-4037-beb9-e8f79e4fe564 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c00541aa-c046-4037-beb9-e8f79e4fe564', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.402 186 INFO tempest.lib.common.rest_client [req-2a4820f7-a30f-46aa-8a47-e419859fed53 ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e 0.189s 2020-12-14 02:14:01.404 186 DEBUG tempest.lib.common.rest_client [req-2a4820f7-a30f-46aa-8a47-e419859fed53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a4820f7-a30f-46aa-8a47-e419859fed53', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4629b9b7560643dc92c3ab11be678c7e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.444 193 INFO tempest.lib.common.rest_client [req-7f6ea829-38fc-4e7e-86d5-453b2d15ee22 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:14:01.447 193 DEBUG tempest.lib.common.rest_client [req-7f6ea829-38fc-4e7e-86d5-453b2d15ee22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f6ea829-38fc-4e7e-86d5-453b2d15ee22', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5061a16d2eeb43f98ad0aada2c68da9b", "name": "tempest-ServerConsolesRbacTest-1721381461", "password_expires_at": null}, "audit_ids": ["6gCFeLUqS-KycbPdiD4EeQ"], "expires_at": "2020-12-14T03:14:01.000000Z", "issued_at": "2020-12-14T02:14:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6416f6d9d76f40d3a9a3fbe3e0564902", "name": "tempest-ServerConsolesRbacTest-1721381461"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.501 189 INFO tempest.lib.common.rest_client [req-a1040259-46ab-466f-b6c2-db147d5cc4a6 ] Request (ServerActionsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles/72a4576c553448cd941b052c1ca0cf2d 0.120s 2020-12-14 02:14:01.504 189 DEBUG tempest.lib.common.rest_client [req-a1040259-46ab-466f-b6c2-db147d5cc4a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1040259-46ab-466f-b6c2-db147d5cc4a6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.509 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsRbacTest-1901705202', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3400d8caa66043d0b7fa128b68a28ecc', 'project_name': 'tempest-ServerActionsRbacTest-1901705202', 'tenant_id': '3400d8caa66043d0b7fa128b68a28ecc', 'tenant_name': 'tempest-ServerActionsRbacTest-1901705202', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'fc49b78fc1304d33aaa92419232a1e0d'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:01.525 197 INFO tempest.lib.common.rest_client [req-289cabd0-e7ee-431a-9c81-28706811520e ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-12-14 02:14:01.528 197 DEBUG tempest.lib.common.rest_client [req-289cabd0-e7ee-431a-9c81-28706811520e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6565', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-289cabd0-e7ee-431a-9c81-28706811520e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7776998c50494745bdc214b3864ad6fc", "name": "tempest-FlavorRxtxRbacTest-584235707", "password_expires_at": null}, "audit_ids": ["bGLjXZzWQCmeeIJLON2w1Q"], "expires_at": "2020-12-14T03:14:01.000000Z", "issued_at": "2020-12-14T02:14:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c7faef3bf7d545f0b5e428ed3f40792f", "name": "tempest-FlavorRxtxRbacTest-584235707"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c7faef3bf7d545f0b5e428ed3f40792f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c7faef3bf7d545f0b5e428ed3f40792f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c7faef3bf7d545f0b5e428ed3f40792f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c7faef3bf7d545f0b5e428ed3f40792f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c7faef3bf7d545f0b5e428ed3f40792f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c7faef3bf7d545f0b5e428ed3f40792f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.554 193 INFO tempest.lib.common.rest_client [req-57dc9614-e453-46d9-8f3f-3f2a603e8775 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:14:01.558 193 DEBUG tempest.lib.common.rest_client [req-57dc9614-e453-46d9-8f3f-3f2a603e8775 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57dc9614-e453-46d9-8f3f-3f2a603e8775', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["F7VV2ZuqQHOpor0Z58-9-Q"], "expires_at": "2020-12-14T03:14:01.000000Z", "issued_at": "2020-12-14T02:14:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.565 189 INFO tempest.lib.common.rest_client [req-523c3a0b-d4db-4a4a-a260-eb0e8fd7aba5 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:14:01.569 189 DEBUG tempest.lib.common.rest_client [req-523c3a0b-d4db-4a4a-a260-eb0e8fd7aba5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-523c3a0b-d4db-4a4a-a260-eb0e8fd7aba5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["IKO-MmTrQDmJVKqscECUAA"], "expires_at": "2020-12-14T03:14:01.000000Z", "issued_at": "2020-12-14T02:14:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.592 186 INFO tempest.lib.common.rest_client [req-576145af-ecab-4234-b983-0a6723d73413 ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/ebebc7ce0fbe4420a76a383792536022 0.182s 2020-12-14 02:14:01.596 186 DEBUG tempest.lib.common.rest_client [req-576145af-ecab-4234-b983-0a6723d73413 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-576145af-ecab-4234-b983-0a6723d73413', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/ebebc7ce0fbe4420a76a383792536022'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.596 197 INFO tempest.lib.common.rest_client [req-421d996e-0d07-4c80-ac87-9e9906aeec80 ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.058s 2020-12-14 02:14:01.599 197 DEBUG tempest.lib.common.rest_client [req-421d996e-0d07-4c80-ac87-9e9906aeec80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-421d996e-0d07-4c80-ac87-9e9906aeec80', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["qYvqKTefTGitZjtfQGPT9w"], "expires_at": "2020-12-14T03:14:01.000000Z", "issued_at": "2020-12-14T02:14:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.720 193 INFO tempest.lib.common.rest_client [req-fd6b2f24-ee48-4057-9071-ff0be1254034 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:14:01.723 193 DEBUG tempest.lib.common.rest_client [req-fd6b2f24-ee48-4057-9071-ff0be1254034 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd6b2f24-ee48-4057-9071-ff0be1254034', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ZVzLHpQ9QD-Z5tkh4I49AA"], "expires_at": "2020-12-14T03:14:01.000000Z", "issued_at": "2020-12-14T02:14:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.747 197 INFO tempest.lib.common.rest_client [req-40d7c410-068c-4c44-8fac-ac601977517e ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:14:01.750 197 DEBUG tempest.lib.common.rest_client [req-40d7c410-068c-4c44-8fac-ac601977517e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40d7c410-068c-4c44-8fac-ac601977517e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["mwOnQHqxQ62YXzGHjRGboA"], "expires_at": "2020-12-14T03:14:01.000000Z", "issued_at": "2020-12-14T02:14:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.783 193 INFO tempest.lib.common.rest_client [req-ae849396-95ae-45b2-8785-9ab8bbb266e5 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.053s 2020-12-14 02:14:01.786 193 DEBUG tempest.lib.common.rest_client [req-ae849396-95ae-45b2-8785-9ab8bbb266e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae849396-95ae-45b2-8785-9ab8bbb266e5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.787 186 INFO tempest.lib.common.rest_client [req-efc8059f-8dff-4dd3-ad78-280e3b0dc7af ] Request (QuotaClassesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=2dc13acca6e841c4ad217a5b210ae146&name=default 0.185s 2020-12-14 02:14:01.789 186 DEBUG tempest.lib.common.rest_client [req-efc8059f-8dff-4dd3-ad78-280e3b0dc7af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-efc8059f-8dff-4dd3-ad78-280e3b0dc7af', 'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=2dc13acca6e841c4ad217a5b210ae146&name=default'} Body: b'{"security_groups": [{"id": "134be5ee-899f-428d-b8a8-2bcd8106f55b", "name": "default", "stateful": true, "tenant_id": "2dc13acca6e841c4ad217a5b210ae146", "description": "Default security group", "security_group_rules": [{"id": "29e15fb9-26af-4790-aec7-d0884328bf1e", "tenant_id": "2dc13acca6e841c4ad217a5b210ae146", "security_group_id": "134be5ee-899f-428d-b8a8-2bcd8106f55b", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:01Z", "updated_at": "2020-12-14T02:14:01Z", "revision_number": 0, "project_id": "2dc13acca6e841c4ad217a5b210ae146"}, {"id": "2ccd067d-6a0e-49f0-8de3-48036391ae5c", "tenant_id": "2dc13acca6e841c4ad217a5b210ae146", "security_group_id": "134be5ee-899f-428d-b8a8-2bcd8106f55b", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:01Z", "updated_at": "2020-12-14T02:14:01Z", "revision_number": 0, "project_id": "2dc13acca6e841c4ad217a5b210ae146"}, {"id": "6a2954b6-b027-4f64-b356-4432d13878de", "tenant_id": "2dc13acca6e841c4ad217a5b210ae146", "security_group_id": "134be5ee-899f-428d-b8a8-2bcd8106f55b", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "134be5ee-899f-428d-b8a8-2bcd8106f55b", "description": null, "tags": [], "created_at": "2020-12-14T02:14:01Z", "updated_at": "2020-12-14T02:14:01Z", "revision_number": 0, "project_id": "2dc13acca6e841c4ad217a5b210ae146"}, {"id": "8edbf10c-c158-46a4-9bfe-53d90f3713ea", "tenant_id": "2dc13acca6e841c4ad217a5b210ae146", "security_group_id": "134be5ee-899f-428d-b8a8-2bcd8106f55b", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "134be5ee-899f-428d-b8a8-2bcd8106f55b", "description": null, "tags": [], "created_at": "2020-12-14T02:14:01Z", "updated_at": "2020-12-14T02:14:01Z", "revision_number": 0, "project_id": "2dc13acca6e841c4ad217a5b210ae146"}], "tags": [], "created_at": "2020-12-14T02:14:01Z", "updated_at": "2020-12-14T02:14:01Z", "revision_number": 1, "project_id": "2dc13acca6e841c4ad217a5b210ae146"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.808 197 INFO tempest.lib.common.rest_client [req-f0a35562-c709-4282-9500-b686b8116a04 ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.051s 2020-12-14 02:14:01.811 197 DEBUG tempest.lib.common.rest_client [req-f0a35562-c709-4282-9500-b686b8116a04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0a35562-c709-4282-9500-b686b8116a04', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.854 193 INFO tempest.lib.common.rest_client [req-5021fc9c-149a-4a28-985f-06c0a1cfa79c ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:14:01.857 193 DEBUG tempest.lib.common.rest_client [req-5021fc9c-149a-4a28-985f-06c0a1cfa79c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5021fc9c-149a-4a28-985f-06c0a1cfa79c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.860 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:14:01.862 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:01.872 197 INFO tempest.lib.common.rest_client [req-0c32fd5d-0625-4cf1-8b1c-c8af0a1f57bd ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-14 02:14:01.874 197 DEBUG tempest.lib.common.rest_client [req-0c32fd5d-0625-4cf1-8b1c-c8af0a1f57bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c32fd5d-0625-4cf1-8b1c-c8af0a1f57bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.877 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:14:01.879 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:01.928 186 INFO tempest.lib.common.rest_client [req-5baac821-54a7-4027-ba85-505d6661ec2d ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/134be5ee-899f-428d-b8a8-2bcd8106f55b 0.132s 2020-12-14 02:14:01.931 186 DEBUG tempest.lib.common.rest_client [req-5baac821-54a7-4027-ba85-505d6661ec2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5baac821-54a7-4027-ba85-505d6661ec2d', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/134be5ee-899f-428d-b8a8-2bcd8106f55b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.932 193 INFO tempest.lib.common.rest_client [req-22440969-45b8-46bb-b5b1-13f62bc70511 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902/users/5061a16d2eeb43f98ad0aada2c68da9b/roles 0.064s 2020-12-14 02:14:01.935 193 DEBUG tempest.lib.common.rest_client [req-22440969-45b8-46bb-b5b1-13f62bc70511 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-22440969-45b8-46bb-b5b1-13f62bc70511', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902/users/5061a16d2eeb43f98ad0aada2c68da9b/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902/users/5061a16d2eeb43f98ad0aada2c68da9b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:01.936 197 INFO tempest.lib.common.rest_client [req-d2613cc5-02a9-40ef-972d-a9db2283d7dd ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/c7faef3bf7d545f0b5e428ed3f40792f/users/7776998c50494745bdc214b3864ad6fc/roles 0.051s 2020-12-14 02:14:01.938 197 DEBUG tempest.lib.common.rest_client [req-d2613cc5-02a9-40ef-972d-a9db2283d7dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2613cc5-02a9-40ef-972d-a9db2283d7dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c7faef3bf7d545f0b5e428ed3f40792f/users/7776998c50494745bdc214b3864ad6fc/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c7faef3bf7d545f0b5e428ed3f40792f/users/7776998c50494745bdc214b3864ad6fc/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:02.002 193 INFO tempest.lib.common.rest_client [req-1b1cb149-08b4-495f-946a-0352c9941694 ] Request (ServerConsolesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902/users/5061a16d2eeb43f98ad0aada2c68da9b/roles/72a4576c553448cd941b052c1ca0cf2d 0.060s 2020-12-14 02:14:02.005 193 DEBUG tempest.lib.common.rest_client [req-1b1cb149-08b4-495f-946a-0352c9941694 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b1cb149-08b4-495f-946a-0352c9941694', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902/users/5061a16d2eeb43f98ad0aada2c68da9b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:02.009 197 INFO tempest.lib.common.rest_client [req-de53ee44-c1b2-4e63-b819-d77e5d1453c4 ] Request (FlavorRxtxRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c7faef3bf7d545f0b5e428ed3f40792f/users/7776998c50494745bdc214b3864ad6fc/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-12-14 02:14:02.011 197 DEBUG tempest.lib.common.rest_client [req-de53ee44-c1b2-4e63-b819-d77e5d1453c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de53ee44-c1b2-4e63-b819-d77e5d1453c4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c7faef3bf7d545f0b5e428ed3f40792f/users/7776998c50494745bdc214b3864ad6fc/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:02.094 186 INFO tempest.lib.common.rest_client [req-f4f19fff-bb98-4d7d-8ce4-ab59db8f179c ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/2dc13acca6e841c4ad217a5b210ae146 0.157s 2020-12-14 02:14:02.096 186 DEBUG tempest.lib.common.rest_client [req-f4f19fff-bb98-4d7d-8ce4-ab59db8f179c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4f19fff-bb98-4d7d-8ce4-ab59db8f179c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/2dc13acca6e841c4ad217a5b210ae146'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:02.137 193 INFO tempest.lib.common.rest_client [req-e8d64fca-eff9-4a3a-94f8-41f642c9db0e ] Request (ServerConsolesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902/users/5061a16d2eeb43f98ad0aada2c68da9b/roles/a629c95d64b3416fb80ae90af4f69c05 0.125s 2020-12-14 02:14:02.140 193 DEBUG tempest.lib.common.rest_client [req-e8d64fca-eff9-4a3a-94f8-41f642c9db0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e8d64fca-eff9-4a3a-94f8-41f642c9db0e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902/users/5061a16d2eeb43f98ad0aada2c68da9b/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:02.145 197 INFO tempest.lib.common.rest_client [req-874d5bc5-6cda-4ad1-81d6-6174f9ffe38e ] Request (FlavorRxtxRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c7faef3bf7d545f0b5e428ed3f40792f/users/7776998c50494745bdc214b3864ad6fc/roles/a629c95d64b3416fb80ae90af4f69c05 0.127s 2020-12-14 02:14:02.148 197 DEBUG tempest.lib.common.rest_client [req-874d5bc5-6cda-4ad1-81d6-6174f9ffe38e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-874d5bc5-6cda-4ad1-81d6-6174f9ffe38e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c7faef3bf7d545f0b5e428ed3f40792f/users/7776998c50494745bdc214b3864ad6fc/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:02.218 186 INFO tempest.lib.common.rest_client [req-6fd972b9-2836-4bb9-9f88-a7e987c43d1c ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:14:02.220 186 DEBUG tempest.lib.common.rest_client [req-6fd972b9-2836-4bb9-9f88-a7e987c43d1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6fd972b9-2836-4bb9-9f88-a7e987c43d1c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["eJbLLEWCTzeObpgph6K_Pg"], "expires_at": "2020-12-14T03:14:02.000000Z", "issued_at": "2020-12-14T02:14:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:02.279 189 INFO tempest.lib.common.rest_client [req-b4c06a6d-d73d-47f6-bcd7-51e44a2caef7 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.701s 2020-12-14 02:14:02.282 189 DEBUG tempest.lib.common.rest_client [req-b4c06a6d-d73d-47f6-bcd7-51e44a2caef7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerActionsRbacTest-2074532455-network", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc"}} Response - Headers: {'content-type': 'application/json', 'content-length': '737', 'x-openstack-request-id': 'req-b4c06a6d-d73d-47f6-bcd7-51e44a2caef7', 'date': 'Mon, 14 Dec 2020 02:14:02 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"1c085583-16aa-4f2c-b48c-e9cce6ab197b","name":"tempest-ServerActionsRbacTest-2074532455-network","tenant_id":"3400d8caa66043d0b7fa128b68a28ecc","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"3400d8caa66043d0b7fa128b68a28ecc","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":53,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:14:02Z","updated_at":"2020-12-14T02:14:02Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:02.314 186 INFO tempest.lib.common.rest_client [req-9dc00c6c-85c4-431c-af36-bb9d308ba5b9 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:14:02.317 186 DEBUG tempest.lib.common.rest_client [req-9dc00c6c-85c4-431c-af36-bb9d308ba5b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9dc00c6c-85c4-431c-af36-bb9d308ba5b9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["DLvkEtPJTzSLaEsPYvdSZA"], "expires_at": "2020-12-14T03:14:02.000000Z", "issued_at": "2020-12-14T02:14:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:02.406 186 INFO tempest.lib.common.rest_client [req-bb5d73e6-ca72-4c24-b780-6993454f583a ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.081s 2020-12-14 02:14:02.408 186 DEBUG tempest.lib.common.rest_client [req-bb5d73e6-ca72-4c24-b780-6993454f583a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb5d73e6-ca72-4c24-b780-6993454f583a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:02.542 186 INFO tempest.lib.common.rest_client [req-a1954035-1615-4f2d-83ca-9357eb56af9c ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.125s 2020-12-14 02:14:02.545 186 DEBUG tempest.lib.common.rest_client [req-a1954035-1615-4f2d-83ca-9357eb56af9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SecurityGroupsRbacMaxV235Test-1484120275-desc", "domain_id": "default", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '396', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1954035-1615-4f2d-83ca-9357eb56af9c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "33c46f077835416681662f06a975e8b6", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275", "domain_id": "default", "description": "tempest-SecurityGroupsRbacMaxV235Test-1484120275-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:02.668 186 INFO tempest.lib.common.rest_client [req-e2e3bbc2-72ad-42e5-98db-59e30ec7d4a5 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.115s 2020-12-14 02:14:02.670 186 DEBUG tempest.lib.common.rest_client [req-e2e3bbc2-72ad-42e5-98db-59e30ec7d4a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275", "password": "C5*_J#Gr6Y2Pu@o", "project_id": "33c46f077835416681662f06a975e8b6", "email": "tempest-SecurityGroupsRbacMaxV235Test-2141689420@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '414', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2e3bbc2-72ad-42e5-98db-59e30ec7d4a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "33c46f077835416681662f06a975e8b6", "email": "tempest-SecurityGroupsRbacMaxV235Test-2141689420@example.com", "id": "72485d39e26a4e25901a096bea538e63", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/72485d39e26a4e25901a096bea538e63"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:02.737 186 INFO tempest.lib.common.rest_client [req-2b81312c-fca3-40e1-8d91-5f698fff5ef9 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:14:02.740 186 DEBUG tempest.lib.common.rest_client [req-2b81312c-fca3-40e1-8d91-5f698fff5ef9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b81312c-fca3-40e1-8d91-5f698fff5ef9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:02.811 186 INFO tempest.lib.common.rest_client [req-fd50d9f5-f70d-4677-b818-48e295803889 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:14:02.814 186 DEBUG tempest.lib.common.rest_client [req-fd50d9f5-f70d-4677-b818-48e295803889 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd50d9f5-f70d-4677-b818-48e295803889', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:02.909 186 INFO tempest.lib.common.rest_client [req-e7f9d073-e704-4b35-97b8-6cc8d1bef14a ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles/72a4576c553448cd941b052c1ca0cf2d 0.086s 2020-12-14 02:14:02.912 186 DEBUG tempest.lib.common.rest_client [req-e7f9d073-e704-4b35-97b8-6cc8d1bef14a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7f9d073-e704-4b35-97b8-6cc8d1bef14a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:02.916 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SecurityGroupsRbacMaxV235Test-1484120275', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '33c46f077835416681662f06a975e8b6', 'project_name': 'tempest-SecurityGroupsRbacMaxV235Test-1484120275', 'tenant_id': '33c46f077835416681662f06a975e8b6', 'tenant_name': 'tempest-SecurityGroupsRbacMaxV235Test-1484120275', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '72485d39e26a4e25901a096bea538e63'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:02.918 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SecurityGroupsRbacMaxV235Test-1484120275', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '33c46f077835416681662f06a975e8b6', 'project_name': 'tempest-SecurityGroupsRbacMaxV235Test-1484120275', 'tenant_id': '33c46f077835416681662f06a975e8b6', 'tenant_name': 'tempest-SecurityGroupsRbacMaxV235Test-1484120275', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '72485d39e26a4e25901a096bea538e63'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:03.020 189 INFO tempest.lib.common.rest_client [req-248cc273-39d7-4c7f-abba-cd86ebdd1cb5 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.728s 2020-12-14 02:14:03.022 189 DEBUG tempest.lib.common.rest_client [req-248cc273-39d7-4c7f-abba-cd86ebdd1cb5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "1c085583-16aa-4f2c-b48c-e9cce6ab197b", "cidr": "192.168.120.0/28", "name": "tempest-ServerActionsRbacTest-2074532455-subnet", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '709', 'x-openstack-request-id': 'req-248cc273-39d7-4c7f-abba-cd86ebdd1cb5', 'date': 'Mon, 14 Dec 2020 02:14:03 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"44ba7cc9-68a6-4156-9489-4626e8414142","name":"tempest-ServerActionsRbacTest-2074532455-subnet","tenant_id":"3400d8caa66043d0b7fa128b68a28ecc","network_id":"1c085583-16aa-4f2c-b48c-e9cce6ab197b","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:14:02Z","updated_at":"2020-12-14T02:14:02Z","revision_number":0,"project_id":"3400d8caa66043d0b7fa128b68a28ecc"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:03.088 186 INFO tempest.lib.common.rest_client [req-d0f63286-5a33-47f2-a7e1-bbbab119aca6 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:14:03.090 186 DEBUG tempest.lib.common.rest_client [req-d0f63286-5a33-47f2-a7e1-bbbab119aca6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6589', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0f63286-5a33-47f2-a7e1-bbbab119aca6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72485d39e26a4e25901a096bea538e63", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275", "password_expires_at": null}, "audit_ids": ["hVkEmsgYT3a-WelWZHjpfQ"], "expires_at": "2020-12-14T03:14:03.000000Z", "issued_at": "2020-12-14T02:14:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "33c46f077835416681662f06a975e8b6", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:03.195 186 INFO tempest.lib.common.rest_client [req-754a64b6-4d1d-4198-a842-6a5a7ec4c851 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:14:03.198 186 DEBUG tempest.lib.common.rest_client [req-754a64b6-4d1d-4198-a842-6a5a7ec4c851 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-754a64b6-4d1d-4198-a842-6a5a7ec4c851', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["XwxGrFSQQmiRwMXNRFJiDA"], "expires_at": "2020-12-14T03:14:03.000000Z", "issued_at": "2020-12-14T02:14:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:03.250 193 INFO tempest.lib.common.rest_client [req-8e86f76f-3136-4519-973a-f0804a757fd8 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:14:03.251 197 INFO tempest.lib.common.rest_client [req-7c3cfeb3-8f84-45a1-9690-0e6db3a98e68 ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:14:03.254 193 DEBUG tempest.lib.common.rest_client [req-8e86f76f-3136-4519-973a-f0804a757fd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e86f76f-3136-4519-973a-f0804a757fd8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5061a16d2eeb43f98ad0aada2c68da9b", "name": "tempest-ServerConsolesRbacTest-1721381461", "password_expires_at": null}, "audit_ids": ["0ZWflKitRKSsS5CJxDWYTQ"], "expires_at": "2020-12-14T03:14:03.000000Z", "issued_at": "2020-12-14T02:14:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6416f6d9d76f40d3a9a3fbe3e0564902", "name": "tempest-ServerConsolesRbacTest-1721381461"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:03.254 197 DEBUG tempest.lib.common.rest_client [req-7c3cfeb3-8f84-45a1-9690-0e6db3a98e68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7c3cfeb3-8f84-45a1-9690-0e6db3a98e68', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7776998c50494745bdc214b3864ad6fc", "name": "tempest-FlavorRxtxRbacTest-584235707", "password_expires_at": null}, "audit_ids": ["YT8bTxwITayv1anfx51dQA"], "expires_at": "2020-12-14T03:14:03.000000Z", "issued_at": "2020-12-14T02:14:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c7faef3bf7d545f0b5e428ed3f40792f", "name": "tempest-FlavorRxtxRbacTest-584235707"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c7faef3bf7d545f0b5e428ed3f40792f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c7faef3bf7d545f0b5e428ed3f40792f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c7faef3bf7d545f0b5e428ed3f40792f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c7faef3bf7d545f0b5e428ed3f40792f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c7faef3bf7d545f0b5e428ed3f40792f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c7faef3bf7d545f0b5e428ed3f40792f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:03.317 186 INFO tempest.lib.common.rest_client [req-6ece744b-ff93-460f-8582-d443541557c1 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:14:03.321 186 DEBUG tempest.lib.common.rest_client [req-6ece744b-ff93-460f-8582-d443541557c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ece744b-ff93-460f-8582-d443541557c1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["rylKjU9YTfu8qGgTvECkyA"], "expires_at": "2020-12-14T03:14:03.000000Z", "issued_at": "2020-12-14T02:14:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:03.375 193 INFO tempest.lib.common.rest_client [req-2a348e11-86ce-4c9f-9c77-cef099ba4fa8 ] Request (ServerConsolesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:14:03.378 193 DEBUG tempest.lib.common.rest_client [req-2a348e11-86ce-4c9f-9c77-cef099ba4fa8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a348e11-86ce-4c9f-9c77-cef099ba4fa8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5061a16d2eeb43f98ad0aada2c68da9b", "name": "tempest-ServerConsolesRbacTest-1721381461", "password_expires_at": null}, "audit_ids": ["9RGsyUYITSCwv8NLTSlFXA"], "expires_at": "2020-12-14T03:14:03.000000Z", "issued_at": "2020-12-14T02:14:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6416f6d9d76f40d3a9a3fbe3e0564902", "name": "tempest-ServerConsolesRbacTest-1721381461"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:03.384 193 INFO tempest.lib.common.fixed_network [-] (ServerConsolesRbacTest:setUpClass) Found network {'id': '677d9531-31e0-4552-824b-7b4e207e716e', 'name': 'tempest-ServerConsolesRbacTest-734479438-network', 'tenant_id': '6416f6d9d76f40d3a9a3fbe3e0564902', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '6416f6d9d76f40d3a9a3fbe3e0564902', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:13:56Z', 'updated_at': '2020-12-14T02:13:56Z', 'revision_number': 1} available for tenant 2020-12-14 02:14:03.391 186 INFO tempest.lib.common.rest_client [req-e65ff207-8fb8-4642-b295-89d571f02e49 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.063s 2020-12-14 02:14:03.394 186 DEBUG tempest.lib.common.rest_client [req-e65ff207-8fb8-4642-b295-89d571f02e49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e65ff207-8fb8-4642-b295-89d571f02e49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:03.412 197 INFO tempest.lib.common.rest_client [req-d7459f83-1e58-478d-b4c5-63756d48b540 ] Request (FlavorRxtxRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/7776998c50494745bdc214b3864ad6fc 0.136s 2020-12-14 02:14:03.415 197 DEBUG tempest.lib.common.rest_client [req-d7459f83-1e58-478d-b4c5-63756d48b540 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d7459f83-1e58-478d-b4c5-63756d48b540', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/7776998c50494745bdc214b3864ad6fc'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:03.507 197 INFO tempest.lib.common.rest_client [req-83bc785d-8733-404b-af76-183a5df5aee7 ] Request (FlavorRxtxRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-14 02:14:03.507 186 INFO tempest.lib.common.rest_client [req-5c8fb882-c476-4db2-abd8-8ac3b9c2fcd7 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.105s 2020-12-14 02:14:03.510 197 DEBUG tempest.lib.common.rest_client [req-83bc785d-8733-404b-af76-183a5df5aee7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83bc785d-8733-404b-af76-183a5df5aee7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["H4QRNR_uT1qyN9xPEESGNw"], "expires_at": "2020-12-14T03:14:03.000000Z", "issued_at": "2020-12-14T02:14:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:03.511 186 DEBUG tempest.lib.common.rest_client [req-5c8fb882-c476-4db2-abd8-8ac3b9c2fcd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c8fb882-c476-4db2-abd8-8ac3b9c2fcd7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:03.515 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:14:03.517 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:03.582 186 INFO tempest.lib.common.rest_client [req-c7e2d694-f9fb-4a7e-9702-29577b09bef9 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles 0.059s 2020-12-14 02:14:03.585 186 DEBUG tempest.lib.common.rest_client [req-c7e2d694-f9fb-4a7e-9702-29577b09bef9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7e2d694-f9fb-4a7e-9702-29577b09bef9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:03.661 186 INFO tempest.lib.common.rest_client [req-051c3725-254d-479d-8216-cd735e82d6a1 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-12-14 02:14:03.663 186 DEBUG tempest.lib.common.rest_client [req-051c3725-254d-479d-8216-cd735e82d6a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-051c3725-254d-479d-8216-cd735e82d6a1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:03.784 186 INFO tempest.lib.common.rest_client [req-74fffe77-8c86-4577-b575-a758e650653d ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles/a629c95d64b3416fb80ae90af4f69c05 0.115s 2020-12-14 02:14:03.788 186 DEBUG tempest.lib.common.rest_client [req-74fffe77-8c86-4577-b575-a758e650653d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74fffe77-8c86-4577-b575-a758e650653d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:03.916 197 INFO tempest.lib.common.rest_client [req-748c2f9d-c900-46a2-ba5c-fd6688bf48fe ] Request (FlavorRxtxRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c7faef3bf7d545f0b5e428ed3f40792f&name=default 0.399s 2020-12-14 02:14:03.919 197 DEBUG tempest.lib.common.rest_client [req-748c2f9d-c900-46a2-ba5c-fd6688bf48fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-748c2f9d-c900-46a2-ba5c-fd6688bf48fe', 'date': 'Mon, 14 Dec 2020 02:14:03 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c7faef3bf7d545f0b5e428ed3f40792f&name=default'} Body: b'{"security_groups": [{"id": "e0e7d86c-ab57-4e6f-9cf3-94e1f58a50dc", "name": "default", "stateful": true, "tenant_id": "c7faef3bf7d545f0b5e428ed3f40792f", "description": "Default security group", "security_group_rules": [{"id": "24a0be96-83b8-43b4-a21d-8fd252bff438", "tenant_id": "c7faef3bf7d545f0b5e428ed3f40792f", "security_group_id": "e0e7d86c-ab57-4e6f-9cf3-94e1f58a50dc", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:03Z", "updated_at": "2020-12-14T02:14:03Z", "revision_number": 0, "project_id": "c7faef3bf7d545f0b5e428ed3f40792f"}, {"id": "2e3cc253-8cbf-4dec-8e96-8eaf4984f41d", "tenant_id": "c7faef3bf7d545f0b5e428ed3f40792f", "security_group_id": "e0e7d86c-ab57-4e6f-9cf3-94e1f58a50dc", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "e0e7d86c-ab57-4e6f-9cf3-94e1f58a50dc", "description": null, "tags": [], "created_at": "2020-12-14T02:14:03Z", "updated_at": "2020-12-14T02:14:03Z", "revision_number": 0, "project_id": "c7faef3bf7d545f0b5e428ed3f40792f"}, {"id": "86379b01-f64e-499d-8f0b-923d94acd473", "tenant_id": "c7faef3bf7d545f0b5e428ed3f40792f", "security_group_id": "e0e7d86c-ab57-4e6f-9cf3-94e1f58a50dc", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "e0e7d86c-ab57-4e6f-9cf3-94e1f58a50dc", "description": null, "tags": [], "created_at": "2020-12-14T02:14:03Z", "updated_at": "2020-12-14T02:14:03Z", "revision_number": 0, "project_id": "c7faef3bf7d545f0b5e428ed3f40792f"}, {"id": "e97cfa7c-b274-4248-a0fa-63f8cb3c0354", "tenant_id": "c7faef3bf7d545f0b5e428ed3f40792f", "security_group_id": "e0e7d86c-ab57-4e6f-9cf3-94e1f58a50dc", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:03Z", "updated_at": "2020-12-14T02:14:03Z", "revision_number": 0, "project_id": "c7faef3bf7d545f0b5e428ed3f40792f"}], "tags": [], "created_at": "2020-12-14T02:14:03Z", "updated_at": "2020-12-14T02:14:03Z", "revision_number": 1, "project_id": "c7faef3bf7d545f0b5e428ed3f40792f"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:04.103 197 INFO tempest.lib.common.rest_client [req-fb421c95-b402-48de-a4eb-430c01fd36cd ] Request (FlavorRxtxRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/e0e7d86c-ab57-4e6f-9cf3-94e1f58a50dc 0.177s 2020-12-14 02:14:04.106 197 DEBUG tempest.lib.common.rest_client [req-fb421c95-b402-48de-a4eb-430c01fd36cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-fb421c95-b402-48de-a4eb-430c01fd36cd', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:14:04 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/e0e7d86c-ab57-4e6f-9cf3-94e1f58a50dc'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:04.290 197 INFO tempest.lib.common.rest_client [req-5d3835aa-24ff-4340-94c0-19a41b92a32c ] Request (FlavorRxtxRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c7faef3bf7d545f0b5e428ed3f40792f 0.177s 2020-12-14 02:14:04.292 197 DEBUG tempest.lib.common.rest_client [req-5d3835aa-24ff-4340-94c0-19a41b92a32c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d3835aa-24ff-4340-94c0-19a41b92a32c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c7faef3bf7d545f0b5e428ed3f40792f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:04.342 193 INFO tempest.lib.common.rest_client [req-48592f0e-f90d-4c23-b810-0eebb09eb789 ] Request (ServerConsolesRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 0.947s 2020-12-14 02:14:04.345 193 DEBUG tempest.lib.common.rest_client [req-48592f0e-f90d-4c23-b810-0eebb09eb789 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerConsolesRbacTest-server-876389742", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "677d9531-31e0-4552-824b-7b4e207e716e"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-48592f0e-f90d-4c23-b810-0eebb09eb789', 'x-compute-request-id': 'req-48592f0e-f90d-4c23-b810-0eebb09eb789', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "ad76074f-74fc-4e91-b8a0-4eee44b0ad1e", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "kqZ3oMeim6Sf"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:04.396 197 INFO tempest.lib.common.rest_client [req-f60a651c-73e7-4337-a4a5-9e6fbf6a401f ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-12-14 02:14:04.398 197 DEBUG tempest.lib.common.rest_client [req-f60a651c-73e7-4337-a4a5-9e6fbf6a401f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f60a651c-73e7-4337-a4a5-9e6fbf6a401f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["-h-PjwbGSHyJf7GZxHLp9w"], "expires_at": "2020-12-14T03:14:04.000000Z", "issued_at": "2020-12-14T02:14:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:04.460 189 INFO tempest.lib.common.rest_client [req-acf88aa1-1b18-4cbc-bf7d-92a819e48e32 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.429s 2020-12-14 02:14:04.463 189 DEBUG tempest.lib.common.rest_client [req-acf88aa1-1b18-4cbc-bf7d-92a819e48e32 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerActionsRbacTest-2074532455-router", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '810', 'x-openstack-request-id': 'req-acf88aa1-1b18-4cbc-bf7d-92a819e48e32', 'date': 'Mon, 14 Dec 2020 02:14:04 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "fe52c74c-54df-444b-921e-383460bb9202", "name": "tempest-ServerActionsRbacTest-2074532455-router", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.223"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::29"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:14:03Z", "updated_at": "2020-12-14T02:14:04Z", "revision_number": 3, "project_id": "3400d8caa66043d0b7fa128b68a28ecc"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:04.501 197 INFO tempest.lib.common.rest_client [req-17d2e400-500f-4f62-be25-062c9a0f7b75 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:14:04.504 197 DEBUG tempest.lib.common.rest_client [req-17d2e400-500f-4f62-be25-062c9a0f7b75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17d2e400-500f-4f62-be25-062c9a0f7b75', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["xZL7ILilTbeSo4u1Je3zwA"], "expires_at": "2020-12-14T03:14:04.000000Z", "issued_at": "2020-12-14T02:14:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:04.580 197 INFO tempest.lib.common.rest_client [req-221ffee3-e0d7-4f40-bd28-b86114c1163d ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.068s 2020-12-14 02:14:04.583 197 DEBUG tempest.lib.common.rest_client [req-221ffee3-e0d7-4f40-bd28-b86114c1163d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-221ffee3-e0d7-4f40-bd28-b86114c1163d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:04.607 193 INFO tempest.lib.common.rest_client [req-e80fea3c-2bbe-4b09-a1b3-a553fe90507e ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e 0.232s 2020-12-14 02:14:04.610 193 DEBUG tempest.lib.common.rest_client [req-e80fea3c-2bbe-4b09-a1b3-a553fe90507e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1397', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e80fea3c-2bbe-4b09-a1b3-a553fe90507e', 'x-compute-request-id': 'req-e80fea3c-2bbe-4b09-a1b3-a553fe90507e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e'} Body: b'{"server": {"id": "ad76074f-74fc-4e91-b8a0-4eee44b0ad1e", "name": "tempest-ServerConsolesRbacTest-server-876389742", "status": "BUILD", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "user_id": "5061a16d2eeb43f98ad0aada2c68da9b", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:04Z", "updated": "2020-12-14T02:14:04Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:04.662 197 INFO tempest.lib.common.rest_client [req-68272fe8-0675-454f-a604-6e2c6ebba080 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.072s 2020-12-14 02:14:04.664 197 DEBUG tempest.lib.common.rest_client [req-68272fe8-0675-454f-a604-6e2c6ebba080 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-HostsRbacTest-30241668-desc", "domain_id": "default", "name": "tempest-HostsRbacTest-30241668"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '360', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68272fe8-0675-454f-a604-6e2c6ebba080', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "8a2cc90cad0f4539aec408739e096a50", "name": "tempest-HostsRbacTest-30241668", "domain_id": "default", "description": "tempest-HostsRbacTest-30241668-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:04.796 197 INFO tempest.lib.common.rest_client [req-16372fc5-7ff7-4d60-a208-d2ae2a8dfde6 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.125s 2020-12-14 02:14:04.799 197 DEBUG tempest.lib.common.rest_client [req-16372fc5-7ff7-4d60-a208-d2ae2a8dfde6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-HostsRbacTest-30241668", "password": "P9~TicvRdoTiBuN", "project_id": "8a2cc90cad0f4539aec408739e096a50", "email": "tempest-HostsRbacTest-296706629@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '379', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16372fc5-7ff7-4d60-a208-d2ae2a8dfde6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "8a2cc90cad0f4539aec408739e096a50", "email": "tempest-HostsRbacTest-296706629@example.com", "id": "34843ccdc18b4b9d845ff3c1bf6374be", "name": "tempest-HostsRbacTest-30241668", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/34843ccdc18b4b9d845ff3c1bf6374be"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:04.870 197 INFO tempest.lib.common.rest_client [req-07d2e391-c2be-4968-b73d-27ede820ab15 ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:14:04.872 197 DEBUG tempest.lib.common.rest_client [req-07d2e391-c2be-4968-b73d-27ede820ab15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07d2e391-c2be-4968-b73d-27ede820ab15', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:04.902 186 INFO tempest.lib.common.rest_client [req-a979a6c2-6be7-4175-8798-464da51b8b86 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:14:04.905 186 DEBUG tempest.lib.common.rest_client [req-a979a6c2-6be7-4175-8798-464da51b8b86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a979a6c2-6be7-4175-8798-464da51b8b86', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72485d39e26a4e25901a096bea538e63", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275", "password_expires_at": null}, "audit_ids": ["vBepeY5uQDO6N5UrHr3zpg"], "expires_at": "2020-12-14T03:14:04.000000Z", "issued_at": "2020-12-14T02:14:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "33c46f077835416681662f06a975e8b6", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:04.917 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:04.921 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.924 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.928 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.931 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.935 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.938 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.942 197 INFO tempest.lib.common.rest_client [req-bd87ed01-ff96-4c46-9cdd-6e153cfe9867 ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:14:04.943 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.945 197 DEBUG tempest.lib.common.rest_client [req-bd87ed01-ff96-4c46-9cdd-6e153cfe9867 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd87ed01-ff96-4c46-9cdd-6e153cfe9867', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:04.946 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.949 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.951 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.954 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.957 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.960 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.963 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.966 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.969 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.972 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.977 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.982 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.986 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.988 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.991 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.994 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.996 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:04.999 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.002 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.005 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.007 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.010 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.013 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.016 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.018 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.021 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.024 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.027 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.029 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.029 197 INFO tempest.lib.common.rest_client [req-b36705d3-96d3-43cc-b7f4-41c66372be8a ] Request (HostsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles/72a4576c553448cd941b052c1ca0cf2d 0.077s 2020-12-14 02:14:05.032 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.032 197 DEBUG tempest.lib.common.rest_client [req-b36705d3-96d3-43cc-b7f4-41c66372be8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b36705d3-96d3-43cc-b7f4-41c66372be8a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:05.035 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.036 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HostsRbacTest-30241668', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '8a2cc90cad0f4539aec408739e096a50', 'project_name': 'tempest-HostsRbacTest-30241668', 'tenant_id': '8a2cc90cad0f4539aec408739e096a50', 'tenant_name': 'tempest-HostsRbacTest-30241668', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '34843ccdc18b4b9d845ff3c1bf6374be'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:05.038 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HostsRbacTest-30241668', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '8a2cc90cad0f4539aec408739e096a50', 'project_name': 'tempest-HostsRbacTest-30241668', 'tenant_id': '8a2cc90cad0f4539aec408739e096a50', 'tenant_name': 'tempest-HostsRbacTest-30241668', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '34843ccdc18b4b9d845ff3c1bf6374be'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:05.038 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.041 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.044 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.047 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.050 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.053 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.056 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.059 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.062 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.064 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.067 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.070 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.073 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.075 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.078 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.081 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.084 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.087 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.093 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.096 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.099 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.102 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.105 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.107 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.110 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.113 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.115 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.118 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.121 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.125 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.128 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.131 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.133 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:05.145 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:create, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:05.147 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:05.197 197 INFO tempest.lib.common.rest_client [req-4a298ad5-636b-4593-8540-b1749f3b3633 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.113s 2020-12-14 02:14:05.200 197 DEBUG tempest.lib.common.rest_client [req-4a298ad5-636b-4593-8540-b1749f3b3633 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6553', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a298ad5-636b-4593-8540-b1749f3b3633', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "34843ccdc18b4b9d845ff3c1bf6374be", "name": "tempest-HostsRbacTest-30241668", "password_expires_at": null}, "audit_ids": ["THD8tlv3ScuIvuorvb_aig"], "expires_at": "2020-12-14T03:14:05.000000Z", "issued_at": "2020-12-14T02:14:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "8a2cc90cad0f4539aec408739e096a50", "name": "tempest-HostsRbacTest-30241668"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/image", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:05.258 197 INFO tempest.lib.common.rest_client [req-cd94e196-b90f-4c07-bd6e-58735834c5d3 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:14:05.260 197 DEBUG tempest.lib.common.rest_client [req-cd94e196-b90f-4c07-bd6e-58735834c5d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd94e196-b90f-4c07-bd6e-58735834c5d3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["CTw-oepzRm22if4ADWf7gA"], "expires_at": "2020-12-14T03:14:05.000000Z", "issued_at": "2020-12-14T02:14:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:05.271 186 INFO tempest.lib.common.rest_client [req-745a416e-aac7-4d59-a58d-3b170b8b57e6 ] Request (SecurityGroupsRbacMaxV235Test:test_create_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles 0.117s 2020-12-14 02:14:05.275 186 DEBUG tempest.lib.common.rest_client [req-745a416e-aac7-4d59-a58d-3b170b8b57e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-745a416e-aac7-4d59-a58d-3b170b8b57e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:05.362 197 INFO tempest.lib.common.rest_client [req-b098653b-9f97-4c4d-8162-fef0a761f28d ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:14:05.366 197 DEBUG tempest.lib.common.rest_client [req-b098653b-9f97-4c4d-8162-fef0a761f28d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b098653b-9f97-4c4d-8162-fef0a761f28d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["OODxWdcVSmGjFIFyoFL8cw"], "expires_at": "2020-12-14T03:14:05.000000Z", "issued_at": "2020-12-14T02:14:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:05.380 186 INFO tempest.lib.common.rest_client [req-a77bfba1-2379-45c0-b578-a2c6c75e2d47 ] Request (SecurityGroupsRbacMaxV235Test:test_create_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:14:05.383 186 DEBUG tempest.lib.common.rest_client [req-a77bfba1-2379-45c0-b578-a2c6c75e2d47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a77bfba1-2379-45c0-b578-a2c6c75e2d47', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72485d39e26a4e25901a096bea538e63", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275", "password_expires_at": null}, "audit_ids": ["eeOCTjMRSZKYDNZ6XFfWwQ"], "expires_at": "2020-12-14T03:14:05.000000Z", "issued_at": "2020-12-14T02:14:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "33c46f077835416681662f06a975e8b6", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:05.431 197 INFO tempest.lib.common.rest_client [req-0c5c88c5-0727-48f0-9cc2-c689fe10d631 ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.059s 2020-12-14 02:14:05.434 197 DEBUG tempest.lib.common.rest_client [req-0c5c88c5-0727-48f0-9cc2-c689fe10d631 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c5c88c5-0727-48f0-9cc2-c689fe10d631', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:05.497 197 INFO tempest.lib.common.rest_client [req-da0ea796-bb3e-4264-8e57-ef61a96f126f ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:14:05.500 197 DEBUG tempest.lib.common.rest_client [req-da0ea796-bb3e-4264-8e57-ef61a96f126f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da0ea796-bb3e-4264-8e57-ef61a96f126f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:05.503 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:14:05.505 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:05.577 197 INFO tempest.lib.common.rest_client [req-3eee6aa2-4e38-4cc6-abf8-22a0be29daee ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles 0.066s 2020-12-14 02:14:05.580 197 DEBUG tempest.lib.common.rest_client [req-3eee6aa2-4e38-4cc6-abf8-22a0be29daee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3eee6aa2-4e38-4cc6-abf8-22a0be29daee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:05.655 197 INFO tempest.lib.common.rest_client [req-a7ce0a1d-8d1e-4582-9fd8-b8ead9b05e95 ] Request (HostsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-12-14 02:14:05.657 197 DEBUG tempest.lib.common.rest_client [req-a7ce0a1d-8d1e-4582-9fd8-b8ead9b05e95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7ce0a1d-8d1e-4582-9fd8-b8ead9b05e95', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:05.779 197 INFO tempest.lib.common.rest_client [req-05f24597-11da-4a9e-80b4-13c75dd10520 ] Request (HostsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles/a629c95d64b3416fb80ae90af4f69c05 0.117s 2020-12-14 02:14:05.781 197 DEBUG tempest.lib.common.rest_client [req-05f24597-11da-4a9e-80b4-13c75dd10520 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05f24597-11da-4a9e-80b4-13c75dd10520', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:05.893 193 INFO tempest.lib.common.rest_client [req-9535bc1a-09f1-4922-92cd-dc626179cabf ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e 0.171s 2020-12-14 02:14:05.897 193 DEBUG tempest.lib.common.rest_client [req-9535bc1a-09f1-4922-92cd-dc626179cabf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1492', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9535bc1a-09f1-4922-92cd-dc626179cabf', 'x-compute-request-id': 'req-9535bc1a-09f1-4922-92cd-dc626179cabf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e'} Body: b'{"server": {"id": "ad76074f-74fc-4e91-b8a0-4eee44b0ad1e", "name": "tempest-ServerConsolesRbacTest-server-876389742", "status": "BUILD", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "user_id": "5061a16d2eeb43f98ad0aada2c68da9b", "metadata": {}, "hostId": "fc3f0cd2beac00d12da95cabcbf1160f3f05c30bfc009c2ed86610de", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:04Z", "updated": "2020-12-14T02:14:06Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:06.005 193 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/networking" after 2 second wait 2020-12-14 02:14:06.288 186 INFO tempest.lib.common.rest_client [req-1693dd19-13cd-413e-966e-c7ad3767b97e ] Request (SecurityGroupsRbacMaxV235Test:test_create_security_groups): 200 POST http://172.30.13.94/compute/v2.1/os-security-groups 0.897s 2020-12-14 02:14:06.290 186 DEBUG tempest.lib.common.rest_client [req-1693dd19-13cd-413e-966e-c7ad3767b97e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-1043429977", "description": "tempest-description-1527319761"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '251', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1693dd19-13cd-413e-966e-c7ad3767b97e', 'x-compute-request-id': 'req-1693dd19-13cd-413e-966e-c7ad3767b97e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups'} Body: b'{"security_group": {"id": "5b3ba6d1-4cf7-428d-b49f-70df7905f5a1", "description": "tempest-description-1527319761", "name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-1043429977", "tenant_id": "33c46f077835416681662f06a975e8b6", "rules": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:06.330 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:06.449 186 INFO tempest.lib.common.rest_client [req-14d59046-7a0c-4c5d-88f2-a484f18819ac ] Request (SecurityGroupsRbacMaxV235Test:test_create_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles 0.112s 2020-12-14 02:14:06.452 186 DEBUG tempest.lib.common.rest_client [req-14d59046-7a0c-4c5d-88f2-a484f18819ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14d59046-7a0c-4c5d-88f2-a484f18819ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:06.647 186 INFO tempest.lib.common.rest_client [req-96aab071-7c18-4458-af04-d113651b2931 ] Request (SecurityGroupsRbacMaxV235Test:test_create_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.187s 2020-12-14 02:14:06.651 186 DEBUG tempest.lib.common.rest_client [req-96aab071-7c18-4458-af04-d113651b2931 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96aab071-7c18-4458-af04-d113651b2931', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72485d39e26a4e25901a096bea538e63", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275", "password_expires_at": null}, "audit_ids": ["1xO30N7vSJ2bFFhxSQhyGw"], "expires_at": "2020-12-14T03:14:06.000000Z", "issued_at": "2020-12-14T02:14:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "33c46f077835416681662f06a975e8b6", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:06.654 189 INFO tempest.lib.common.rest_client [req-e3fa31bc-042c-4377-ba26-27dd1232e106 ] Request (ServerActionsRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/fe52c74c-54df-444b-921e-383460bb9202/add_router_interface 2.182s 2020-12-14 02:14:06.657 189 DEBUG tempest.lib.common.rest_client [req-e3fa31bc-042c-4377-ba26-27dd1232e106 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "44ba7cc9-68a6-4156-9489-4626e8414142"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-e3fa31bc-042c-4377-ba26-27dd1232e106', 'date': 'Mon, 14 Dec 2020 02:14:06 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/fe52c74c-54df-444b-921e-383460bb9202/add_router_interface'} Body: b'{"id": "fe52c74c-54df-444b-921e-383460bb9202", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "port_id": "e29c3e28-f4dd-4c26-9ffb-fc98d7a6cdf3", "network_id": "1c085583-16aa-4f2c-b48c-e9cce6ab197b", "subnet_id": "44ba7cc9-68a6-4156-9489-4626e8414142", "subnet_ids": ["44ba7cc9-68a6-4156-9489-4626e8414142"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:06.659 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsRbacTest-1901705202', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3400d8caa66043d0b7fa128b68a28ecc', 'project_name': 'tempest-ServerActionsRbacTest-1901705202', 'tenant_id': '3400d8caa66043d0b7fa128b68a28ecc', 'tenant_name': 'tempest-ServerActionsRbacTest-1901705202', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'fc49b78fc1304d33aaa92419232a1e0d'}, Network: {'id': '1c085583-16aa-4f2c-b48c-e9cce6ab197b', 'name': 'tempest-ServerActionsRbacTest-2074532455-network', 'tenant_id': '3400d8caa66043d0b7fa128b68a28ecc', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3400d8caa66043d0b7fa128b68a28ecc', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:14:02Z', 'updated_at': '2020-12-14T02:14:02Z', 'revision_number': 1}, Subnet: {'id': '44ba7cc9-68a6-4156-9489-4626e8414142', 'name': 'tempest-ServerActionsRbacTest-2074532455-subnet', 'tenant_id': '3400d8caa66043d0b7fa128b68a28ecc', 'network_id': '1c085583-16aa-4f2c-b48c-e9cce6ab197b', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:02Z', 'updated_at': '2020-12-14T02:14:02Z', 'revision_number': 0, 'project_id': '3400d8caa66043d0b7fa128b68a28ecc'}, Router: {'id': 'fe52c74c-54df-444b-921e-383460bb9202', 'name': 'tempest-ServerActionsRbacTest-2074532455-router', 'tenant_id': '3400d8caa66043d0b7fa128b68a28ecc', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.223'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::29'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:03Z', 'updated_at': '2020-12-14T02:14:04Z', 'revision_number': 3, 'project_id': '3400d8caa66043d0b7fa128b68a28ecc'} 2020-12-14 02:14:06.676 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:06.681 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.684 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.687 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.690 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.694 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.697 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.702 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.705 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.707 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.710 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.713 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.716 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.719 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.721 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.724 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.728 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.731 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.733 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.736 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.739 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.741 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.744 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.747 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.750 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.752 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.755 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.758 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.760 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.763 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.766 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.768 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.771 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.774 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.777 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.779 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.782 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.785 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.788 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.791 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.795 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.798 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.800 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.803 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.807 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.810 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.812 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.815 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.818 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.821 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.824 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.827 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.830 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.833 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.837 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.840 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.843 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.847 189 INFO tempest.lib.common.rest_client [req-e8db8522-d156-4f59-9c0d-43562a78b4a0 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.125s 2020-12-14 02:14:06.850 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.850 189 DEBUG tempest.lib.common.rest_client [req-e8db8522-d156-4f59-9c0d-43562a78b4a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6573', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e8db8522-d156-4f59-9c0d-43562a78b4a0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["h1coBXGDSNSkVZAW1Q5rkQ"], "expires_at": "2020-12-14T03:14:06.000000Z", "issued_at": "2020-12-14T02:14:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://1 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:06.853 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.856 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.860 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.862 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.865 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.868 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.871 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.873 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.876 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.879 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.881 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.880 197 INFO tempest.lib.common.rest_client [req-cd1c74b7-640d-4a41-9313-dcb57f245823 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:14:06.883 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.884 197 DEBUG tempest.lib.common.rest_client [req-cd1c74b7-640d-4a41-9313-dcb57f245823 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd1c74b7-640d-4a41-9313-dcb57f245823', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "34843ccdc18b4b9d845ff3c1bf6374be", "name": "tempest-HostsRbacTest-30241668", "password_expires_at": null}, "audit_ids": ["-TI1tWjmTAuB6FiSRn5kBQ"], "expires_at": "2020-12-14T03:14:06.000000Z", "issued_at": "2020-12-14T02:14:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "8a2cc90cad0f4539aec408739e096a50", "name": "tempest-HostsRbacTest-30241668"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:06.885 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.887 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.897 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:06.898 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:06.901 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.905 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.908 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.911 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.915 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.919 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.924 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.927 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.930 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.932 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.935 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.935 189 INFO tempest.lib.common.rest_client [req-0456d740-3182-4622-91f5-d9d973df1ad8 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.075s 2020-12-14 02:14:06.938 189 DEBUG tempest.lib.common.rest_client [req-0456d740-3182-4622-91f5-d9d973df1ad8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerActionsRbacTest-1337290257-desc", "domain_id": "default", "name": "tempest-ServerActionsRbacTest-1337290257"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0456d740-3182-4622-91f5-d9d973df1ad8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "70770d0b5506411ca294041fa7d6b3d9", "name": "tempest-ServerActionsRbacTest-1337290257", "domain_id": "default", "description": "tempest-ServerActionsRbacTest-1337290257-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/70770d0b5506411ca294041fa7d6b3d9"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:06.938 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.941 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.944 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.947 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.950 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.953 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.956 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.958 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.961 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.964 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.967 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.970 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.972 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.975 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.978 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.981 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.984 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.986 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.989 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.992 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.995 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:06.997 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.000 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.003 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.006 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.008 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.010 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.013 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.015 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.018 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.020 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.022 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.026 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.028 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.030 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.032 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.035 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.037 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.039 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.041 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.043 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.045 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.047 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.050 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.052 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.057 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.059 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.061 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.064 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.066 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.068 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.070 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.072 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.074 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.076 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.078 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.080 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.083 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.085 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.087 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.094 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hosts:list, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:07.096 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:07.142 189 INFO tempest.lib.common.rest_client [req-36b2a49d-2bae-4122-b36f-34d16f5826c9 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.196s 2020-12-14 02:14:07.146 189 DEBUG tempest.lib.common.rest_client [req-36b2a49d-2bae-4122-b36f-34d16f5826c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerActionsRbacTest-1337290257", "password": "X5_sU&tqP5CVHqL", "project_id": "70770d0b5506411ca294041fa7d6b3d9", "email": "tempest-ServerActionsRbacTest-2057610788@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '398', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36b2a49d-2bae-4122-b36f-34d16f5826c9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "70770d0b5506411ca294041fa7d6b3d9", "email": "tempest-ServerActionsRbacTest-2057610788@example.com", "id": "085f65123c634e01beaa63852dd155c8", "name": "tempest-ServerActionsRbacTest-1337290257", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/085f65123c634e01beaa63852dd155c8"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:07.173 197 INFO tempest.lib.common.rest_client [req-15417aae-9277-4b08-8f12-c33cf643657c ] Request (HostsRbacTest:test_list_hosts): 200 GET http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles 0.071s 2020-12-14 02:14:07.176 197 DEBUG tempest.lib.common.rest_client [req-15417aae-9277-4b08-8f12-c33cf643657c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15417aae-9277-4b08-8f12-c33cf643657c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:07.226 189 INFO tempest.lib.common.rest_client [req-ca016256-af1f-4125-bdb1-7c2f26ca8f12 ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.072s 2020-12-14 02:14:07.228 189 DEBUG tempest.lib.common.rest_client [req-ca016256-af1f-4125-bdb1-7c2f26ca8f12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca016256-af1f-4125-bdb1-7c2f26ca8f12', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:07.289 197 INFO tempest.lib.common.rest_client [req-8625d350-aa33-405d-a8f9-e1029b72fba8 ] Request (HostsRbacTest:test_list_hosts): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-12-14 02:14:07.293 197 DEBUG tempest.lib.common.rest_client [req-8625d350-aa33-405d-a8f9-e1029b72fba8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8625d350-aa33-405d-a8f9-e1029b72fba8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "34843ccdc18b4b9d845ff3c1bf6374be", "name": "tempest-HostsRbacTest-30241668", "password_expires_at": null}, "audit_ids": ["fu2arpjFSv6Yo1Dy4hI9yA"], "expires_at": "2020-12-14T03:14:07.000000Z", "issued_at": "2020-12-14T02:14:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "8a2cc90cad0f4539aec408739e096a50", "name": "tempest-HostsRbacTest-30241668"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:07.298 193 INFO tempest.lib.common.rest_client [req-a888274b-4f54-4200-b694-4a864d633b0e ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e 0.285s 2020-12-14 02:14:07.301 193 DEBUG tempest.lib.common.rest_client [req-a888274b-4f54-4200-b694-4a864d633b0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a888274b-4f54-4200-b694-4a864d633b0e', 'x-compute-request-id': 'req-a888274b-4f54-4200-b694-4a864d633b0e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e'} Body: b'{"server": {"id": "ad76074f-74fc-4e91-b8a0-4eee44b0ad1e", "name": "tempest-ServerConsolesRbacTest-server-876389742", "status": "BUILD", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "user_id": "5061a16d2eeb43f98ad0aada2c68da9b", "metadata": {}, "hostId": "fc3f0cd2beac00d12da95cabcbf1160f3f05c30bfc009c2ed86610de", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:04Z", "updated": "2020-12-14T02:14:06Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:07.336 189 INFO tempest.lib.common.rest_client [req-698386e8-c583-41d5-88d0-22efe663dcc9 ] Request (ServerActionsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/70770d0b5506411ca294041fa7d6b3d9/users/085f65123c634e01beaa63852dd155c8/roles/a629c95d64b3416fb80ae90af4f69c05 0.099s 2020-12-14 02:14:07.339 189 DEBUG tempest.lib.common.rest_client [req-698386e8-c583-41d5-88d0-22efe663dcc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-698386e8-c583-41d5-88d0-22efe663dcc9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/70770d0b5506411ca294041fa7d6b3d9/users/085f65123c634e01beaa63852dd155c8/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:07.342 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsRbacTest-1337290257', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '70770d0b5506411ca294041fa7d6b3d9', 'project_name': 'tempest-ServerActionsRbacTest-1337290257', 'tenant_id': '70770d0b5506411ca294041fa7d6b3d9', 'tenant_name': 'tempest-ServerActionsRbacTest-1337290257', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '085f65123c634e01beaa63852dd155c8'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:07.415 193 INFO tempest.common.waiters [-] State transition "BUILD/networking" ==> "BUILD/spawning" after 3 second wait 2020-12-14 02:14:07.479 197 INFO tempest.lib.common.rest_client [req-b88187d4-398d-4301-b1a5-01c8b0f061e6 ] Request (HostsRbacTest:test_list_hosts): 200 GET http://172.30.13.94/compute/v2.1/os-hosts 0.178s 2020-12-14 02:14:07.481 197 DEBUG tempest.lib.common.rest_client [req-b88187d4-398d-4301-b1a5-01c8b0f061e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '369', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b88187d4-398d-4301-b1a5-01c8b0f061e6', 'x-compute-request-id': 'req-b88187d4-398d-4301-b1a5-01c8b0f061e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hosts'} Body: b'{"hosts": [{"host_name": "lf-virtual9", "service": "scheduler", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "conductor", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "conductor", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "compute", "zone": "nova"}, {"host_name": "lf-virtual8", "service": "compute", "zone": "nova"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:07.493 186 INFO tempest.lib.common.rest_client [req-41105a5e-08da-4b13-8187-8c5e62c37088 ] Request (SecurityGroupsRbacMaxV235Test:test_delete_security_groups): 200 POST http://172.30.13.94/compute/v2.1/os-security-groups 0.590s 2020-12-14 02:14:07.496 186 DEBUG tempest.lib.common.rest_client [req-41105a5e-08da-4b13-8187-8c5e62c37088 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-355150993", "description": "tempest-description-596545396"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '249', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-41105a5e-08da-4b13-8187-8c5e62c37088', 'x-compute-request-id': 'req-41105a5e-08da-4b13-8187-8c5e62c37088', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups'} Body: b'{"security_group": {"id": "ed576bb0-1d57-4965-ab9c-399ab849a7ae", "description": "tempest-description-596545396", "name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-355150993", "tenant_id": "33c46f077835416681662f06a975e8b6", "rules": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:07.505 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:07.526 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:07.622 197 INFO tempest.lib.common.rest_client [req-b705b54e-c075-4071-b596-6a1e55a0d565 ] Request (HostsRbacTest:test_list_hosts): 200 GET http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles 0.112s 2020-12-14 02:14:07.625 197 DEBUG tempest.lib.common.rest_client [req-b705b54e-c075-4071-b596-6a1e55a0d565 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b705b54e-c075-4071-b596-6a1e55a0d565', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:07.649 186 INFO tempest.lib.common.rest_client [req-d0eabb29-c192-42c7-af69-985aa2ef07fe ] Request (SecurityGroupsRbacMaxV235Test:test_delete_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles 0.118s 2020-12-14 02:14:07.652 186 DEBUG tempest.lib.common.rest_client [req-d0eabb29-c192-42c7-af69-985aa2ef07fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0eabb29-c192-42c7-af69-985aa2ef07fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:07.681 197 INFO tempest.lib.common.rest_client [req-1da572a7-01c4-4d95-9ef7-f2e64f826149 ] Request (HostsRbacTest:test_list_hosts): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:14:07.684 197 DEBUG tempest.lib.common.rest_client [req-1da572a7-01c4-4d95-9ef7-f2e64f826149 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1da572a7-01c4-4d95-9ef7-f2e64f826149', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "34843ccdc18b4b9d845ff3c1bf6374be", "name": "tempest-HostsRbacTest-30241668", "password_expires_at": null}, "audit_ids": ["ddJ6HvLdQoOPhySU1Pj6mA"], "expires_at": "2020-12-14T03:14:07.000000Z", "issued_at": "2020-12-14T02:14:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "8a2cc90cad0f4539aec408739e096a50", "name": "tempest-HostsRbacTest-30241668"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:07.709 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:07.713 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.716 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.719 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.723 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.727 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.730 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.735 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.738 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.741 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.743 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.746 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.747 186 INFO tempest.lib.common.rest_client [req-6596838d-cf32-4b4c-8bc5-924162d94564 ] Request (SecurityGroupsRbacMaxV235Test:test_delete_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:14:07.749 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.750 186 DEBUG tempest.lib.common.rest_client [req-6596838d-cf32-4b4c-8bc5-924162d94564 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6596838d-cf32-4b4c-8bc5-924162d94564', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72485d39e26a4e25901a096bea538e63", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275", "password_expires_at": null}, "audit_ids": ["rl1o1QhjQA6qX7u2fZnckw"], "expires_at": "2020-12-14T03:14:07.000000Z", "issued_at": "2020-12-14T02:14:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "33c46f077835416681662f06a975e8b6", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:07.752 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.755 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.758 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.761 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.764 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.767 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.770 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.772 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.775 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.778 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.781 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.783 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.786 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.789 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.792 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.794 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.797 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.800 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.803 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.805 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.808 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.811 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.814 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.817 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.819 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.822 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.825 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.829 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.831 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.834 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.837 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.841 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.844 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.846 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.849 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.852 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.855 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.857 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.860 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.863 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.866 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.868 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.872 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.875 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.881 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.884 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.886 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.890 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.892 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.895 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.898 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.901 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.903 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.906 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.909 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.912 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.914 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.917 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.920 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:07.921 189 INFO tempest.lib.common.rest_client [req-e307e6e8-5f5c-4e54-8a68-93f3fa332d0e ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.571s 2020-12-14 02:14:07.924 189 DEBUG tempest.lib.common.rest_client [req-e307e6e8-5f5c-4e54-8a68-93f3fa332d0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerActionsRbacTest-1387900475-network", "tenant_id": "70770d0b5506411ca294041fa7d6b3d9"}} Response - Headers: {'content-type': 'application/json', 'content-length': '737', 'x-openstack-request-id': 'req-e307e6e8-5f5c-4e54-8a68-93f3fa332d0e', 'date': 'Mon, 14 Dec 2020 02:14:07 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"7b3948bf-9b3c-4c81-bbb7-bc525dd2ef6c","name":"tempest-ServerActionsRbacTest-1387900475-network","tenant_id":"70770d0b5506411ca294041fa7d6b3d9","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"70770d0b5506411ca294041fa7d6b3d9","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":59,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:14:07Z","updated_at":"2020-12-14T02:14:07Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:07.929 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hosts:show, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:08.043 197 INFO tempest.lib.common.rest_client [req-84ddddd4-0bf5-423f-a79e-7fb66f3100bf ] Request (HostsRbacTest:test_show_host_details): 200 GET http://172.30.13.94/compute/v2.1/os-hosts 0.108s 2020-12-14 02:14:08.047 197 DEBUG tempest.lib.common.rest_client [req-84ddddd4-0bf5-423f-a79e-7fb66f3100bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '369', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-84ddddd4-0bf5-423f-a79e-7fb66f3100bf', 'x-compute-request-id': 'req-84ddddd4-0bf5-423f-a79e-7fb66f3100bf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hosts'} Body: b'{"hosts": [{"host_name": "lf-virtual9", "service": "scheduler", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "conductor", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "conductor", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "compute", "zone": "nova"}, {"host_name": "lf-virtual8", "service": "compute", "zone": "nova"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:08.070 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:08.124 186 INFO tempest.lib.common.rest_client [req-7d1bd1b7-0ae1-4b2f-8dd4-a3c3f3a27b40 ] Request (SecurityGroupsRbacMaxV235Test:test_delete_security_groups): 202 DELETE http://172.30.13.94/compute/v2.1/os-security-groups/ed576bb0-1d57-4965-ab9c-399ab849a7ae 0.367s 2020-12-14 02:14:08.128 186 DEBUG tempest.lib.common.rest_client [req-7d1bd1b7-0ae1-4b2f-8dd4-a3c3f3a27b40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7d1bd1b7-0ae1-4b2f-8dd4-a3c3f3a27b40', 'x-compute-request-id': 'req-7d1bd1b7-0ae1-4b2f-8dd4-a3c3f3a27b40', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/ed576bb0-1d57-4965-ab9c-399ab849a7ae'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:08.131 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:08.139 197 INFO tempest.lib.common.rest_client [req-bc5df13d-43f1-4ae5-876e-4fac75faa4c0 ] Request (HostsRbacTest:test_show_host_details): 200 GET http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles 0.063s 2020-12-14 02:14:08.141 197 DEBUG tempest.lib.common.rest_client [req-bc5df13d-43f1-4ae5-876e-4fac75faa4c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc5df13d-43f1-4ae5-876e-4fac75faa4c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:08.192 197 INFO tempest.lib.common.rest_client [req-c0350e5f-7604-4a08-bdf5-fe0839cfa70a ] Request (HostsRbacTest:test_show_host_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:14:08.196 197 DEBUG tempest.lib.common.rest_client [req-c0350e5f-7604-4a08-bdf5-fe0839cfa70a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c0350e5f-7604-4a08-bdf5-fe0839cfa70a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "34843ccdc18b4b9d845ff3c1bf6374be", "name": "tempest-HostsRbacTest-30241668", "password_expires_at": null}, "audit_ids": ["Ho0JCo1WTd6JMR4ZR5WJUw"], "expires_at": "2020-12-14T03:14:08.000000Z", "issued_at": "2020-12-14T02:14:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "8a2cc90cad0f4539aec408739e096a50", "name": "tempest-HostsRbacTest-30241668"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:08.200 186 INFO tempest.lib.common.rest_client [req-75a8a295-04e9-416c-b2a1-ff6e8b4bc4ff ] Request (SecurityGroupsRbacMaxV235Test:test_delete_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles 0.063s 2020-12-14 02:14:08.204 186 DEBUG tempest.lib.common.rest_client [req-75a8a295-04e9-416c-b2a1-ff6e8b4bc4ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-75a8a295-04e9-416c-b2a1-ff6e8b4bc4ff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:08.255 186 INFO tempest.lib.common.rest_client [req-13911701-08b9-466f-8fe8-bf67140e2a76 ] Request (SecurityGroupsRbacMaxV235Test:test_delete_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:14:08.258 186 DEBUG tempest.lib.common.rest_client [req-13911701-08b9-466f-8fe8-bf67140e2a76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13911701-08b9-466f-8fe8-bf67140e2a76', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72485d39e26a4e25901a096bea538e63", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275", "password_expires_at": null}, "audit_ids": ["mT734J2PTqSTcFT3tCDeQw"], "expires_at": "2020-12-14T03:14:08.000000Z", "issued_at": "2020-12-14T02:14:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "33c46f077835416681662f06a975e8b6", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:08.283 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:08.288 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.291 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.295 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.298 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.302 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.306 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.312 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.314 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.317 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.320 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.323 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.326 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.329 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.332 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.332 197 INFO tempest.lib.common.rest_client [req-52c7c7c2-6b61-4591-913d-70211d74b91d ] Request (HostsRbacTest:test_show_host_details): 200 GET http://172.30.13.94/compute/v2.1/os-hosts/lf-virtual9 0.129s 2020-12-14 02:14:08.334 197 DEBUG tempest.lib.common.rest_client [req-52c7c7c2-6b61-4591-913d-70211d74b91d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '459', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-52c7c7c2-6b61-4591-913d-70211d74b91d', 'x-compute-request-id': 'req-52c7c7c2-6b61-4591-913d-70211d74b91d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hosts/lf-virtual9'} Body: b'{"host": [{"resource": {"host": "lf-virtual9", "project": "(total)", "cpu": 88, "memory_mb": 64312, "disk_gb": 100}}, {"resource": {"host": "lf-virtual9", "project": "(used_now)", "cpu": 1, "memory_mb": 1024, "disk_gb": 1}}, {"resource": {"host": "lf-virtual9", "project": "(used_max)", "cpu": 1, "memory_mb": 512, "disk_gb": 1}}, {"resource": {"host": "lf-virtual9", "project": "6416f6d9d76f40d3a9a3fbe3e0564902", "cpu": 1, "memory_mb": 512, "disk_gb": 1}}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:08.335 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.338 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.341 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.344 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.347 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.348 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:08.350 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.352 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.355 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.358 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.361 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.364 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.366 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.369 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.372 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.375 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.378 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.381 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.384 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.387 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.390 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.393 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.396 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.399 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.402 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.405 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.408 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.411 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.414 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.416 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.418 197 INFO tempest.lib.common.rest_client [req-ced13ab1-aac4-4239-b0e5-26faf168f262 ] Request (HostsRbacTest:test_show_host_details): 200 GET http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles 0.064s 2020-12-14 02:14:08.420 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.421 197 DEBUG tempest.lib.common.rest_client [req-ced13ab1-aac4-4239-b0e5-26faf168f262 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ced13ab1-aac4-4239-b0e5-26faf168f262', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50/users/34843ccdc18b4b9d845ff3c1bf6374be/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:08.423 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.426 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.428 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.431 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.434 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.437 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.439 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.442 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.445 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.448 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.451 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.454 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.460 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.463 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.466 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.469 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.469 197 INFO tempest.lib.common.rest_client [req-1757d944-f149-41da-8943-08aa4a2f1857 ] Request (HostsRbacTest:test_show_host_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:14:08.472 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.473 197 DEBUG tempest.lib.common.rest_client [req-1757d944-f149-41da-8943-08aa4a2f1857 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1757d944-f149-41da-8943-08aa4a2f1857', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "34843ccdc18b4b9d845ff3c1bf6374be", "name": "tempest-HostsRbacTest-30241668", "password_expires_at": null}, "audit_ids": ["j_WOeUFGQAG1pRUtZMWNLA"], "expires_at": "2020-12-14T03:14:08.000000Z", "issued_at": "2020-12-14T02:14:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "8a2cc90cad0f4539aec408739e096a50", "name": "tempest-HostsRbacTest-30241668"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_8a2cc90cad0f4539aec408739e096a50", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:08.475 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.478 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.480 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.483 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.486 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.488 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.491 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.494 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.497 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.499 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:08.512 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:get, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:08.515 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:08.584 186 INFO tempest.lib.common.rest_client [req-ce5ae6e9-426a-4f7e-8674-4e42e10d899b ] Request (SecurityGroupsRbacMaxV235Test:test_list_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles 0.063s 2020-12-14 02:14:08.587 186 DEBUG tempest.lib.common.rest_client [req-ce5ae6e9-426a-4f7e-8674-4e42e10d899b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce5ae6e9-426a-4f7e-8674-4e42e10d899b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:08.639 186 INFO tempest.lib.common.rest_client [req-6a1fd0f8-a7d5-465d-aaf1-10239b298faf ] Request (SecurityGroupsRbacMaxV235Test:test_list_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:14:08.644 186 DEBUG tempest.lib.common.rest_client [req-6a1fd0f8-a7d5-465d-aaf1-10239b298faf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a1fd0f8-a7d5-465d-aaf1-10239b298faf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72485d39e26a4e25901a096bea538e63", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275", "password_expires_at": null}, "audit_ids": ["W11n3JGPSe-0WE0ZHFEwVw"], "expires_at": "2020-12-14T03:14:08.000000Z", "issued_at": "2020-12-14T02:14:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "33c46f077835416681662f06a975e8b6", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:08.657 193 INFO tempest.lib.common.rest_client [req-84f1de1b-6077-4a01-9537-3f9003eac935 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e 0.231s 2020-12-14 02:14:08.661 193 DEBUG tempest.lib.common.rest_client [req-84f1de1b-6077-4a01-9537-3f9003eac935 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-84f1de1b-6077-4a01-9537-3f9003eac935', 'x-compute-request-id': 'req-84f1de1b-6077-4a01-9537-3f9003eac935', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e'} Body: b'{"server": {"id": "ad76074f-74fc-4e91-b8a0-4eee44b0ad1e", "name": "tempest-ServerConsolesRbacTest-server-876389742", "status": "BUILD", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "user_id": "5061a16d2eeb43f98ad0aada2c68da9b", "metadata": {}, "hostId": "fc3f0cd2beac00d12da95cabcbf1160f3f05c30bfc009c2ed86610de", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:04Z", "updated": "2020-12-14T02:14:06Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:08.669 197 INFO tempest.lib.common.rest_client [req-b4162f51-ce1c-4217-98ba-4db0dea7764f ] Request (HostsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/34843ccdc18b4b9d845ff3c1bf6374be 0.167s 2020-12-14 02:14:08.671 197 DEBUG tempest.lib.common.rest_client [req-b4162f51-ce1c-4217-98ba-4db0dea7764f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4162f51-ce1c-4217-98ba-4db0dea7764f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/34843ccdc18b4b9d845ff3c1bf6374be'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:08.773 197 INFO tempest.lib.common.rest_client [req-bf0874fe-cba2-42ea-aa0d-f39021afba28 ] Request (HostsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:14:08.776 197 DEBUG tempest.lib.common.rest_client [req-bf0874fe-cba2-42ea-aa0d-f39021afba28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf0874fe-cba2-42ea-aa0d-f39021afba28', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["9noMl8POTpq4NorjNAee8g"], "expires_at": "2020-12-14T03:14:08.000000Z", "issued_at": "2020-12-14T02:14:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:09.055 186 INFO tempest.lib.common.rest_client [req-294cf930-af42-4975-b9fb-5138177f19bd ] Request (SecurityGroupsRbacMaxV235Test:test_list_security_groups): 200 GET http://172.30.13.94/compute/v2.1/os-security-groups 0.403s 2020-12-14 02:14:09.058 186 DEBUG tempest.lib.common.rest_client [req-294cf930-af42-4975-b9fb-5138177f19bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '940', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-294cf930-af42-4975-b9fb-5138177f19bd', 'x-compute-request-id': 'req-294cf930-af42-4975-b9fb-5138177f19bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups'} Body: b'{"security_groups": [{"id": "a198fdcc-2546-4001-b18b-8a35ec3317d1", "description": "Default security group", "name": "default", "tenant_id": "33c46f077835416681662f06a975e8b6", "rules": [{"id": "8e05ce96-11e0-408b-895a-00027527ac8f", "parent_group_id": "a198fdcc-2546-4001-b18b-8a35ec3317d1", "ip_protocol": null, "from_port": null, "to_port": null, "group": {"name": "default", "tenant_id": "33c46f077835416681662f06a975e8b6"}, "ip_range": {}}, {"id": "bc780f66-8f7a-453f-b0b0-a80e6d2a0199", "parent_group_id": "a198fdcc-2546-4001-b18b-8a35ec3317d1", "ip_protocol": null, "from_port": null, "to_port": null, "group": {"name": "default", "tenant_id": "33c46f077835416681662f06a975e8b6"}, "ip_range": {}}]}, {"id": "5b3ba6d1-4cf7-428d-b49f-70df7905f5a1", "description": "tempest-description-1527319761", "name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-1043429977", "tenant_id": "33c46f077835416681662f06a975e8b6", "rules": []}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:09.106 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:09.111 197 INFO tempest.lib.common.rest_client [req-a38536f2-729c-4dd8-868e-46389e21c1f7 ] Request (HostsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=8a2cc90cad0f4539aec408739e096a50&name=default 0.327s 2020-12-14 02:14:09.114 197 DEBUG tempest.lib.common.rest_client [req-a38536f2-729c-4dd8-868e-46389e21c1f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-a38536f2-729c-4dd8-868e-46389e21c1f7', 'date': 'Mon, 14 Dec 2020 02:14:09 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=8a2cc90cad0f4539aec408739e096a50&name=default'} Body: b'{"security_groups": [{"id": "2e4fd79f-05d9-4e7e-8901-ba037e73456d", "name": "default", "stateful": true, "tenant_id": "8a2cc90cad0f4539aec408739e096a50", "description": "Default security group", "security_group_rules": [{"id": "023f0b2f-97e1-41f1-a359-5f9a1648d262", "tenant_id": "8a2cc90cad0f4539aec408739e096a50", "security_group_id": "2e4fd79f-05d9-4e7e-8901-ba037e73456d", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2e4fd79f-05d9-4e7e-8901-ba037e73456d", "description": null, "tags": [], "created_at": "2020-12-14T02:14:09Z", "updated_at": "2020-12-14T02:14:09Z", "revision_number": 0, "project_id": "8a2cc90cad0f4539aec408739e096a50"}, {"id": "0d1cb041-f75f-4b84-9eba-be377d8736b1", "tenant_id": "8a2cc90cad0f4539aec408739e096a50", "security_group_id": "2e4fd79f-05d9-4e7e-8901-ba037e73456d", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:09Z", "updated_at": "2020-12-14T02:14:09Z", "revision_number": 0, "project_id": "8a2cc90cad0f4539aec408739e096a50"}, {"id": "5eaa7d5e-b207-4124-98a1-af53dfa759fc", "tenant_id": "8a2cc90cad0f4539aec408739e096a50", "security_group_id": "2e4fd79f-05d9-4e7e-8901-ba037e73456d", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2e4fd79f-05d9-4e7e-8901-ba037e73456d", "description": null, "tags": [], "created_at": "2020-12-14T02:14:09Z", "updated_at": "2020-12-14T02:14:09Z", "revision_number": 0, "project_id": "8a2cc90cad0f4539aec408739e096a50"}, {"id": "dbd1d76f-2f9e-4111-9edf-d71175af34cd", "tenant_id": "8a2cc90cad0f4539aec408739e096a50", "security_group_id": "2e4fd79f-05d9-4e7e-8901-ba037e73456d", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:09Z", "updated_at": "2020-12-14T02:14:09Z", "revision_number": 0, "project_id": "8a2cc90cad0f4539aec408739e096a50"}], "tags": [], "created_at": "2020-12-14T02:14:08Z", "updated_at": "2020-12-14T02:14:09Z", "revision_number": 1, "project_id": "8a2cc90cad0f4539aec408739e096a50"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:09.178 186 INFO tempest.lib.common.rest_client [req-178e1f5e-49a0-476a-95b7-7fd4aa2ed644 ] Request (SecurityGroupsRbacMaxV235Test:test_list_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles 0.066s 2020-12-14 02:14:09.182 186 DEBUG tempest.lib.common.rest_client [req-178e1f5e-49a0-476a-95b7-7fd4aa2ed644 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-178e1f5e-49a0-476a-95b7-7fd4aa2ed644', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:09.236 186 INFO tempest.lib.common.rest_client [req-570bcddb-04ec-4b31-81e2-e2aade5a6998 ] Request (SecurityGroupsRbacMaxV235Test:test_list_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:14:09.239 186 DEBUG tempest.lib.common.rest_client [req-570bcddb-04ec-4b31-81e2-e2aade5a6998 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-570bcddb-04ec-4b31-81e2-e2aade5a6998', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72485d39e26a4e25901a096bea538e63", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275", "password_expires_at": null}, "audit_ids": ["FvbudwD9TyyEjnnp-k7AUA"], "expires_at": "2020-12-14T03:14:09.000000Z", "issued_at": "2020-12-14T02:14:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "33c46f077835416681662f06a975e8b6", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:09.264 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:09.269 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.268 197 INFO tempest.lib.common.rest_client [req-fa28f6a4-49c1-42ba-825e-5dce58c38328 ] Request (HostsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/2e4fd79f-05d9-4e7e-8901-ba037e73456d 0.146s 2020-12-14 02:14:09.272 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.271 197 DEBUG tempest.lib.common.rest_client [req-fa28f6a4-49c1-42ba-825e-5dce58c38328 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-fa28f6a4-49c1-42ba-825e-5dce58c38328', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:14:09 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/2e4fd79f-05d9-4e7e-8901-ba037e73456d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:09.275 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.278 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.282 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.286 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.291 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.294 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.296 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.299 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.302 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.305 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.308 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.311 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.314 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.317 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.320 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.323 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.326 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.328 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.331 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.334 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.337 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.340 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.342 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.345 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.348 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.351 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.354 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.356 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.359 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.362 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.365 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.368 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.370 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.373 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.376 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.379 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.382 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.385 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.388 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.391 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.393 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.397 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.400 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.402 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.405 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.408 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.411 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.413 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.416 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.419 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.421 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.424 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.428 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.431 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.433 197 INFO tempest.lib.common.rest_client [req-975efdbf-44b3-4b92-9432-10ff4b0eb40e ] Request (HostsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50 0.154s 2020-12-14 02:14:09.436 197 DEBUG tempest.lib.common.rest_client [req-975efdbf-44b3-4b92-9432-10ff4b0eb40e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-975efdbf-44b3-4b92-9432-10ff4b0eb40e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/8a2cc90cad0f4539aec408739e096a50'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:09.436 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.439 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.442 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.445 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.448 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.451 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.453 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.456 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.458 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.460 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.463 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.465 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.467 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.469 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.472 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:09.481 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:09.557 197 INFO tempest.lib.common.rest_client [req-9229fc59-7b94-4815-981b-421b281f7014 ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:14:09.561 197 DEBUG tempest.lib.common.rest_client [req-9229fc59-7b94-4815-981b-421b281f7014 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9229fc59-7b94-4815-981b-421b281f7014', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["KuHyE7oPTeWV6rG2_Jbj8A"], "expires_at": "2020-12-14T03:14:09.000000Z", "issued_at": "2020-12-14T02:14:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:09.675 197 INFO tempest.lib.common.rest_client [req-894bbae5-493a-4aa3-bd61-61a99fb16b25 ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:14:09.678 197 DEBUG tempest.lib.common.rest_client [req-894bbae5-493a-4aa3-bd61-61a99fb16b25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-894bbae5-493a-4aa3-bd61-61a99fb16b25', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["km_05eP4RS-qxprDPKP2RQ"], "expires_at": "2020-12-14T03:14:09.000000Z", "issued_at": "2020-12-14T02:14:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:09.745 197 INFO tempest.lib.common.rest_client [req-353f2e1b-b2e6-4582-8208-67873ae298d5 ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.059s 2020-12-14 02:14:09.747 197 DEBUG tempest.lib.common.rest_client [req-353f2e1b-b2e6-4582-8208-67873ae298d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-353f2e1b-b2e6-4582-8208-67873ae298d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:09.836 197 INFO tempest.lib.common.rest_client [req-7ad1c10c-f783-4524-90e5-9eadc6e60554 ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.081s 2020-12-14 02:14:09.839 197 DEBUG tempest.lib.common.rest_client [req-7ad1c10c-f783-4524-90e5-9eadc6e60554 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-HypervisorMaxv252RbacTest-1128464019-desc", "domain_id": "default", "name": "tempest-HypervisorMaxv252RbacTest-1128464019"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ad1c10c-f783-4524-90e5-9eadc6e60554', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "30ea0fb965884e9fabbb95e1316a74d4", "name": "tempest-HypervisorMaxv252RbacTest-1128464019", "domain_id": "default", "description": "tempest-HypervisorMaxv252RbacTest-1128464019-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:09.963 197 INFO tempest.lib.common.rest_client [req-ac1cd27d-825f-43ed-8750-ffe880bd7d91 ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.117s 2020-12-14 02:14:09.965 197 DEBUG tempest.lib.common.rest_client [req-ac1cd27d-825f-43ed-8750-ffe880bd7d91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-HypervisorMaxv252RbacTest-1128464019", "password": "P4*fZll#UH1QuPy", "project_id": "30ea0fb965884e9fabbb95e1316a74d4", "email": "tempest-HypervisorMaxv252RbacTest-168600894@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '405', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac1cd27d-825f-43ed-8750-ffe880bd7d91', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "30ea0fb965884e9fabbb95e1316a74d4", "email": "tempest-HypervisorMaxv252RbacTest-168600894@example.com", "id": "bb37d7423bb14baa9fa0a4a308afd5ad", "name": "tempest-HypervisorMaxv252RbacTest-1128464019", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/bb37d7423bb14baa9fa0a4a308afd5ad"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:10.017 186 INFO tempest.lib.common.rest_client [req-a279c4ee-bdc1-4427-a2c6-9f83d79136ed ] Request (SecurityGroupsRbacMaxV235Test:test_show_security_groups): 200 POST http://172.30.13.94/compute/v2.1/os-security-groups 0.530s 2020-12-14 02:14:10.020 186 DEBUG tempest.lib.common.rest_client [req-a279c4ee-bdc1-4427-a2c6-9f83d79136ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-185551276", "description": "tempest-description-1265813786"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '250', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a279c4ee-bdc1-4427-a2c6-9f83d79136ed', 'x-compute-request-id': 'req-a279c4ee-bdc1-4427-a2c6-9f83d79136ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups'} Body: b'{"security_group": {"id": "807eda23-57e6-4e7e-8775-97bf9f38d0d8", "description": "tempest-description-1265813786", "name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-185551276", "tenant_id": "33c46f077835416681662f06a975e8b6", "rules": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:10.031 197 INFO tempest.lib.common.rest_client [req-7a7be952-fdd5-473e-9e3a-19f6b182c8a7 ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:14:10.034 197 DEBUG tempest.lib.common.rest_client [req-7a7be952-fdd5-473e-9e3a-19f6b182c8a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a7be952-fdd5-473e-9e3a-19f6b182c8a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:10.063 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:10.106 197 INFO tempest.lib.common.rest_client [req-f69c79b7-9ae5-4561-a330-79c46b0d634f ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:14:10.109 197 DEBUG tempest.lib.common.rest_client [req-f69c79b7-9ae5-4561-a330-79c46b0d634f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f69c79b7-9ae5-4561-a330-79c46b0d634f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:10.121 186 INFO tempest.lib.common.rest_client [req-3edafec0-a31f-4dfd-aaa0-3ecb3b892b0d ] Request (SecurityGroupsRbacMaxV235Test:test_show_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles 0.053s 2020-12-14 02:14:10.124 186 DEBUG tempest.lib.common.rest_client [req-3edafec0-a31f-4dfd-aaa0-3ecb3b892b0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3edafec0-a31f-4dfd-aaa0-3ecb3b892b0d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:10.201 197 INFO tempest.lib.common.rest_client [req-1addc129-b390-4426-b19f-20cd24a045e7 ] Request (HypervisorMaxv252RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles/72a4576c553448cd941b052c1ca0cf2d 0.083s 2020-12-14 02:14:10.204 197 DEBUG tempest.lib.common.rest_client [req-1addc129-b390-4426-b19f-20cd24a045e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1addc129-b390-4426-b19f-20cd24a045e7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:10.207 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HypervisorMaxv252RbacTest-1128464019', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '30ea0fb965884e9fabbb95e1316a74d4', 'project_name': 'tempest-HypervisorMaxv252RbacTest-1128464019', 'tenant_id': '30ea0fb965884e9fabbb95e1316a74d4', 'tenant_name': 'tempest-HypervisorMaxv252RbacTest-1128464019', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'bb37d7423bb14baa9fa0a4a308afd5ad'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:10.209 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HypervisorMaxv252RbacTest-1128464019', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '30ea0fb965884e9fabbb95e1316a74d4', 'project_name': 'tempest-HypervisorMaxv252RbacTest-1128464019', 'tenant_id': '30ea0fb965884e9fabbb95e1316a74d4', 'tenant_name': 'tempest-HypervisorMaxv252RbacTest-1128464019', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'bb37d7423bb14baa9fa0a4a308afd5ad'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:10.227 186 INFO tempest.lib.common.rest_client [req-d80a8a9d-117f-4ce9-bcfd-e2800afd7e6b ] Request (SecurityGroupsRbacMaxV235Test:test_show_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:14:10.230 186 DEBUG tempest.lib.common.rest_client [req-d80a8a9d-117f-4ce9-bcfd-e2800afd7e6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d80a8a9d-117f-4ce9-bcfd-e2800afd7e6b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72485d39e26a4e25901a096bea538e63", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275", "password_expires_at": null}, "audit_ids": ["6nb4tWC7ShmQCjPDg4FMsQ"], "expires_at": "2020-12-14T03:14:10.000000Z", "issued_at": "2020-12-14T02:14:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "33c46f077835416681662f06a975e8b6", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:10.388 197 INFO tempest.lib.common.rest_client [req-8cf75062-e55b-4bed-a663-787cfb163724 ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.116s 2020-12-14 02:14:10.390 197 DEBUG tempest.lib.common.rest_client [req-8cf75062-e55b-4bed-a663-787cfb163724 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8cf75062-e55b-4bed-a663-787cfb163724', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bb37d7423bb14baa9fa0a4a308afd5ad", "name": "tempest-HypervisorMaxv252RbacTest-1128464019", "password_expires_at": null}, "audit_ids": ["wLrqevuPTuqrlanweKkh7w"], "expires_at": "2020-12-14T03:14:10.000000Z", "issued_at": "2020-12-14T02:14:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "30ea0fb965884e9fabbb95e1316a74d4", "name": "tempest-HypervisorMaxv252RbacTest-1128464019"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:10.593 197 INFO tempest.lib.common.rest_client [req-5b74888f-9ade-4b77-aab5-aa237a9f6b04 ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.193s 2020-12-14 02:14:10.595 197 DEBUG tempest.lib.common.rest_client [req-5b74888f-9ade-4b77-aab5-aa237a9f6b04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b74888f-9ade-4b77-aab5-aa237a9f6b04', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["FVnrBSU6QnOofR4mQcz5vw"], "expires_at": "2020-12-14T03:14:10.000000Z", "issued_at": "2020-12-14T02:14:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:10.695 197 INFO tempest.lib.common.rest_client [req-1de68f42-fccb-45a3-8c3f-6a5df6892fe9 ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:14:10.698 197 DEBUG tempest.lib.common.rest_client [req-1de68f42-fccb-45a3-8c3f-6a5df6892fe9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1de68f42-fccb-45a3-8c3f-6a5df6892fe9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["RdEqnXVJRIKNkfcb_4vOxA"], "expires_at": "2020-12-14T03:14:10.000000Z", "issued_at": "2020-12-14T02:14:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:10.761 197 INFO tempest.lib.common.rest_client [req-f4b65752-230a-4098-9244-bb532490ddbc ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.056s 2020-12-14 02:14:10.765 197 DEBUG tempest.lib.common.rest_client [req-f4b65752-230a-4098-9244-bb532490ddbc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4b65752-230a-4098-9244-bb532490ddbc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:10.829 197 INFO tempest.lib.common.rest_client [req-f6824e24-7c57-4bad-877f-e0f75901d176 ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:14:10.832 197 DEBUG tempest.lib.common.rest_client [req-f6824e24-7c57-4bad-877f-e0f75901d176 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6824e24-7c57-4bad-877f-e0f75901d176', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:10.836 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:14:10.838 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:10.914 197 INFO tempest.lib.common.rest_client [req-d39ba84e-45de-40f8-bc13-b7b5154834a9 ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles 0.070s 2020-12-14 02:14:10.916 197 DEBUG tempest.lib.common.rest_client [req-d39ba84e-45de-40f8-bc13-b7b5154834a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d39ba84e-45de-40f8-bc13-b7b5154834a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:10.986 197 INFO tempest.lib.common.rest_client [req-831e1aa7-477b-4354-88ea-9e1417b3b9c9 ] Request (HypervisorMaxv252RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles/72a4576c553448cd941b052c1ca0cf2d 0.064s 2020-12-14 02:14:10.989 197 DEBUG tempest.lib.common.rest_client [req-831e1aa7-477b-4354-88ea-9e1417b3b9c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-831e1aa7-477b-4354-88ea-9e1417b3b9c9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:11.113 197 INFO tempest.lib.common.rest_client [req-68317eec-e50f-4d52-a999-a509b47e9a62 ] Request (HypervisorMaxv252RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles/a629c95d64b3416fb80ae90af4f69c05 0.117s 2020-12-14 02:14:11.116 197 DEBUG tempest.lib.common.rest_client [req-68317eec-e50f-4d52-a999-a509b47e9a62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68317eec-e50f-4d52-a999-a509b47e9a62', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:12.231 197 INFO tempest.lib.common.rest_client [req-83a9afd0-de76-4bf0-ba0e-7333923b8385 ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:14:12.234 197 DEBUG tempest.lib.common.rest_client [req-83a9afd0-de76-4bf0-ba0e-7333923b8385 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83a9afd0-de76-4bf0-ba0e-7333923b8385', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bb37d7423bb14baa9fa0a4a308afd5ad", "name": "tempest-HypervisorMaxv252RbacTest-1128464019", "password_expires_at": null}, "audit_ids": ["-pznJ4oRQEOrYHVtSpH_WQ"], "expires_at": "2020-12-14T03:14:12.000000Z", "issued_at": "2020-12-14T02:14:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "30ea0fb965884e9fabbb95e1316a74d4", "name": "tempest-HypervisorMaxv252RbacTest-1128464019"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:12.448 197 INFO tempest.lib.common.rest_client [req-235906f7-8e4d-484e-8b40-bfe633bf9b3b ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors 0.202s 2020-12-14 02:14:12.450 197 DEBUG tempest.lib.common.rest_client [req-235906f7-8e4d-484e-8b40-bfe633bf9b3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '187', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-235906f7-8e4d-484e-8b40-bfe633bf9b3b', 'x-compute-request-id': 'req-235906f7-8e4d-484e-8b40-bfe633bf9b3b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled"}, {"id": 2, "hypervisor_hostname": "lf-virtual8", "state": "up", "status": "enabled"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:12.478 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:12.483 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.487 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.490 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.493 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.497 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.501 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.506 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.509 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.511 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.514 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.517 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.520 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.523 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.525 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.528 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.530 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.533 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.535 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.539 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.542 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.544 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.547 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.550 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.553 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.555 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.558 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.561 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.564 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.566 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.569 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.572 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.575 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.578 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.580 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.582 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.585 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.587 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.590 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.592 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.595 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.597 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.599 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.602 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.604 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.607 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.609 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.612 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.614 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.617 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.620 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.626 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.629 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.631 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.634 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.638 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.641 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.647 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.650 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.652 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.656 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.658 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.661 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.664 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.666 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.669 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.672 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.675 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.677 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.680 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.683 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.686 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:12.697 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:servers, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:12.700 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:12.804 197 INFO tempest.lib.common.rest_client [req-7a59285a-0eb2-40b9-bfc2-e726a563ff80 ] Request (HypervisorMaxv252RbacTest:test_list_servers_on_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles 0.098s 2020-12-14 02:14:12.808 197 DEBUG tempest.lib.common.rest_client [req-7a59285a-0eb2-40b9-bfc2-e726a563ff80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a59285a-0eb2-40b9-bfc2-e726a563ff80', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:12.818 189 INFO tempest.lib.common.rest_client [req-505a558f-7ad7-4ffd-ad47-b851166682f0 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 4.884s 2020-12-14 02:14:12.821 189 DEBUG tempest.lib.common.rest_client [req-505a558f-7ad7-4ffd-ad47-b851166682f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "7b3948bf-9b3c-4c81-bbb7-bc525dd2ef6c", "cidr": "192.168.120.0/28", "name": "tempest-ServerActionsRbacTest-1387900475-subnet", "tenant_id": "70770d0b5506411ca294041fa7d6b3d9", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '709', 'x-openstack-request-id': 'req-505a558f-7ad7-4ffd-ad47-b851166682f0', 'date': 'Mon, 14 Dec 2020 02:14:12 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"a7d43c78-7c2a-4816-80bf-ed206c4f523d","name":"tempest-ServerActionsRbacTest-1387900475-subnet","tenant_id":"70770d0b5506411ca294041fa7d6b3d9","network_id":"7b3948bf-9b3c-4c81-bbb7-bc525dd2ef6c","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:14:08Z","updated_at":"2020-12-14T02:14:08Z","revision_number":0,"project_id":"70770d0b5506411ca294041fa7d6b3d9"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:12.863 197 INFO tempest.lib.common.rest_client [req-fe2ac285-60f8-44a5-b505-d4df99e1c858 ] Request (HypervisorMaxv252RbacTest:test_list_servers_on_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:14:12.867 197 DEBUG tempest.lib.common.rest_client [req-fe2ac285-60f8-44a5-b505-d4df99e1c858 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe2ac285-60f8-44a5-b505-d4df99e1c858', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bb37d7423bb14baa9fa0a4a308afd5ad", "name": "tempest-HypervisorMaxv252RbacTest-1128464019", "password_expires_at": null}, "audit_ids": ["1Ky27pmgT0-Rc2B9sEXk6g"], "expires_at": "2020-12-14T03:14:12.000000Z", "issued_at": "2020-12-14T02:14:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "30ea0fb965884e9fabbb95e1316a74d4", "name": "tempest-HypervisorMaxv252RbacTest-1128464019"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:12.997 197 INFO tempest.lib.common.rest_client [req-b8f26bcb-ac5b-4c88-bb23-916766baa901 ] Request (HypervisorMaxv252RbacTest:test_list_servers_on_hypervisor): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/lf-virtual9/servers 0.122s 2020-12-14 02:14:13.001 197 DEBUG tempest.lib.common.rest_client [req-b8f26bcb-ac5b-4c88-bb23-916766baa901 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b8f26bcb-ac5b-4c88-bb23-916766baa901', 'x-compute-request-id': 'req-b8f26bcb-ac5b-4c88-bb23-916766baa901', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/lf-virtual9/servers'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled", "servers": [{"name": "instance-0000dbc3", "uuid": "ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:13.043 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:13.109 197 INFO tempest.lib.common.rest_client [req-67f7ffd8-2169-4585-b0ba-1e9fe986685a ] Request (HypervisorMaxv252RbacTest:test_list_servers_on_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles 0.060s 2020-12-14 02:14:13.112 197 DEBUG tempest.lib.common.rest_client [req-67f7ffd8-2169-4585-b0ba-1e9fe986685a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67f7ffd8-2169-4585-b0ba-1e9fe986685a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:13.166 197 INFO tempest.lib.common.rest_client [req-21643383-9b9f-4128-b29f-b499b449ce2c ] Request (HypervisorMaxv252RbacTest:test_list_servers_on_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:14:13.170 197 DEBUG tempest.lib.common.rest_client [req-21643383-9b9f-4128-b29f-b499b449ce2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21643383-9b9f-4128-b29f-b499b449ce2c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bb37d7423bb14baa9fa0a4a308afd5ad", "name": "tempest-HypervisorMaxv252RbacTest-1128464019", "password_expires_at": null}, "audit_ids": ["VEf50L03SN6HV44NwVW5sg"], "expires_at": "2020-12-14T03:14:13.000000Z", "issued_at": "2020-12-14T02:14:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "30ea0fb965884e9fabbb95e1316a74d4", "name": "tempest-HypervisorMaxv252RbacTest-1128464019"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:13.205 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:13.213 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.218 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.223 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.228 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.234 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.240 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.246 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.249 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.252 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.255 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.260 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.263 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.266 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.269 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.272 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.275 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.278 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.281 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.283 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.286 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.289 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.292 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.295 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.297 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.300 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.303 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.306 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.309 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.312 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.314 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.317 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.320 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.323 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.326 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.329 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.332 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.334 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.337 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.341 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.344 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.347 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.350 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.353 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.357 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.359 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.362 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.365 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.368 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.371 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.374 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.376 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.379 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.383 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.386 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.390 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.393 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.400 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.403 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.406 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.409 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.412 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.415 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.418 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.420 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.423 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.426 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.429 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.432 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.435 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.437 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.440 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:13.450 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:search, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:13.452 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:13.540 197 INFO tempest.lib.common.rest_client [req-a916eafc-8daf-433b-a229-b147cd4b4f53 ] Request (HypervisorMaxv252RbacTest:test_search_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles 0.082s 2020-12-14 02:14:13.544 197 DEBUG tempest.lib.common.rest_client [req-a916eafc-8daf-433b-a229-b147cd4b4f53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a916eafc-8daf-433b-a229-b147cd4b4f53', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:13.598 197 INFO tempest.lib.common.rest_client [req-0b4667b4-0579-46a9-9b1c-df216a46d490 ] Request (HypervisorMaxv252RbacTest:test_search_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:14:13.602 197 DEBUG tempest.lib.common.rest_client [req-0b4667b4-0579-46a9-9b1c-df216a46d490 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b4667b4-0579-46a9-9b1c-df216a46d490', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bb37d7423bb14baa9fa0a4a308afd5ad", "name": "tempest-HypervisorMaxv252RbacTest-1128464019", "password_expires_at": null}, "audit_ids": ["YTitMDmNSDirPiHEsoi9gQ"], "expires_at": "2020-12-14T03:14:13.000000Z", "issued_at": "2020-12-14T02:14:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "30ea0fb965884e9fabbb95e1316a74d4", "name": "tempest-HypervisorMaxv252RbacTest-1128464019"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:13.714 197 INFO tempest.lib.common.rest_client [req-cc58deca-8dc1-4105-9a03-40efdf1211da ] Request (HypervisorMaxv252RbacTest:test_search_hypervisor): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/lf-virtual9/search 0.103s 2020-12-14 02:14:13.717 197 DEBUG tempest.lib.common.rest_client [req-cc58deca-8dc1-4105-9a03-40efdf1211da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '102', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cc58deca-8dc1-4105-9a03-40efdf1211da', 'x-compute-request-id': 'req-cc58deca-8dc1-4105-9a03-40efdf1211da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/lf-virtual9/search'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:13.735 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:13.802 197 INFO tempest.lib.common.rest_client [req-36ab77b9-01ce-49db-b9fa-157e6c37a456 ] Request (HypervisorMaxv252RbacTest:test_search_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles 0.062s 2020-12-14 02:14:13.804 197 DEBUG tempest.lib.common.rest_client [req-36ab77b9-01ce-49db-b9fa-157e6c37a456 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36ab77b9-01ce-49db-b9fa-157e6c37a456', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4/users/bb37d7423bb14baa9fa0a4a308afd5ad/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:13.850 197 INFO tempest.lib.common.rest_client [req-57ab1ab9-f0ea-4608-854b-6a38acf2878c ] Request (HypervisorMaxv252RbacTest:test_search_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:14:13.854 197 DEBUG tempest.lib.common.rest_client [req-57ab1ab9-f0ea-4608-854b-6a38acf2878c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57ab1ab9-f0ea-4608-854b-6a38acf2878c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bb37d7423bb14baa9fa0a4a308afd5ad", "name": "tempest-HypervisorMaxv252RbacTest-1128464019", "password_expires_at": null}, "audit_ids": ["GxKu2jKGT9OP9sRcjM2G6Q"], "expires_at": "2020-12-14T03:14:13.000000Z", "issued_at": "2020-12-14T02:14:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "30ea0fb965884e9fabbb95e1316a74d4", "name": "tempest-HypervisorMaxv252RbacTest-1128464019"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_30ea0fb965884e9fabbb95e1316a74d4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:14.040 197 INFO tempest.lib.common.rest_client [req-92e8c86c-9834-4b37-ae14-fe62389bbf9c ] Request (HypervisorMaxv252RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/bb37d7423bb14baa9fa0a4a308afd5ad 0.160s 2020-12-14 02:14:14.042 197 DEBUG tempest.lib.common.rest_client [req-92e8c86c-9834-4b37-ae14-fe62389bbf9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92e8c86c-9834-4b37-ae14-fe62389bbf9c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/bb37d7423bb14baa9fa0a4a308afd5ad'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:14.139 197 INFO tempest.lib.common.rest_client [req-39408ca0-9314-4db9-9278-c3ecff1cee71 ] Request (HypervisorMaxv252RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:14:14.141 197 DEBUG tempest.lib.common.rest_client [req-39408ca0-9314-4db9-9278-c3ecff1cee71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39408ca0-9314-4db9-9278-c3ecff1cee71', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["0NyXKZqsR1e20r4fOmh0WA"], "expires_at": "2020-12-14T03:14:14.000000Z", "issued_at": "2020-12-14T02:14:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:14.502 189 INFO tempest.lib.common.rest_client [req-9a9ed968-568e-4a57-aba2-a8a82d90e583 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.672s 2020-12-14 02:14:14.504 189 DEBUG tempest.lib.common.rest_client [req-9a9ed968-568e-4a57-aba2-a8a82d90e583 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerActionsRbacTest-1387900475-router", "tenant_id": "70770d0b5506411ca294041fa7d6b3d9", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '810', 'x-openstack-request-id': 'req-9a9ed968-568e-4a57-aba2-a8a82d90e583', 'date': 'Mon, 14 Dec 2020 02:14:14 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "9b8eb022-a890-45ec-a77d-8e12781894d2", "name": "tempest-ServerActionsRbacTest-1387900475-router", "tenant_id": "70770d0b5506411ca294041fa7d6b3d9", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.84"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::2bb"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:14:13Z", "updated_at": "2020-12-14T02:14:14Z", "revision_number": 3, "project_id": "70770d0b5506411ca294041fa7d6b3d9"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:14.670 197 INFO tempest.lib.common.rest_client [req-6e34a8dd-b90a-44c1-9f5c-188d6baf9a14 ] Request (HypervisorMaxv252RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=30ea0fb965884e9fabbb95e1316a74d4&name=default 0.522s 2020-12-14 02:14:14.673 197 DEBUG tempest.lib.common.rest_client [req-6e34a8dd-b90a-44c1-9f5c-188d6baf9a14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-6e34a8dd-b90a-44c1-9f5c-188d6baf9a14', 'date': 'Mon, 14 Dec 2020 02:14:14 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=30ea0fb965884e9fabbb95e1316a74d4&name=default'} Body: b'{"security_groups": [{"id": "5c5f0630-bc94-44d8-82bd-8fa8f80d5dd0", "name": "default", "stateful": true, "tenant_id": "30ea0fb965884e9fabbb95e1316a74d4", "description": "Default security group", "security_group_rules": [{"id": "95637515-af35-4899-986a-076532722630", "tenant_id": "30ea0fb965884e9fabbb95e1316a74d4", "security_group_id": "5c5f0630-bc94-44d8-82bd-8fa8f80d5dd0", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5c5f0630-bc94-44d8-82bd-8fa8f80d5dd0", "description": null, "tags": [], "created_at": "2020-12-14T02:14:14Z", "updated_at": "2020-12-14T02:14:14Z", "revision_number": 0, "project_id": "30ea0fb965884e9fabbb95e1316a74d4"}, {"id": "9a516f21-f3fc-4607-a5eb-8d5414ca3a35", "tenant_id": "30ea0fb965884e9fabbb95e1316a74d4", "security_group_id": "5c5f0630-bc94-44d8-82bd-8fa8f80d5dd0", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5c5f0630-bc94-44d8-82bd-8fa8f80d5dd0", "description": null, "tags": [], "created_at": "2020-12-14T02:14:14Z", "updated_at": "2020-12-14T02:14:14Z", "revision_number": 0, "project_id": "30ea0fb965884e9fabbb95e1316a74d4"}, {"id": "a178f737-710e-44e9-83fb-e56eb93ae473", "tenant_id": "30ea0fb965884e9fabbb95e1316a74d4", "security_group_id": "5c5f0630-bc94-44d8-82bd-8fa8f80d5dd0", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:14Z", "updated_at": "2020-12-14T02:14:14Z", "revision_number": 0, "project_id": "30ea0fb965884e9fabbb95e1316a74d4"}, {"id": "eeee9121-c500-475c-adc0-2b192908f492", "tenant_id": "30ea0fb965884e9fabbb95e1316a74d4", "security_group_id": "5c5f0630-bc94-44d8-82bd-8fa8f80d5dd0", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:14Z", "updated_at": "2020-12-14T02:14:14Z", "revision_number": 0, "project_id": "30ea0fb965884e9fabbb95e1316a74d4"}], "tags": [], "created_at": "2020-12-14T02:14:14Z", "updated_at": "2020-12-14T02:14:14Z", "revision_number": 1, "project_id": "30ea0fb965884e9fabbb95e1316a74d4"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:14.807 197 INFO tempest.lib.common.rest_client [req-afbced10-ac24-45b7-ab92-054ad5befc5c ] Request (HypervisorMaxv252RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/5c5f0630-bc94-44d8-82bd-8fa8f80d5dd0 0.127s 2020-12-14 02:14:14.809 197 DEBUG tempest.lib.common.rest_client [req-afbced10-ac24-45b7-ab92-054ad5befc5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-afbced10-ac24-45b7-ab92-054ad5befc5c', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:14:14 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5c5f0630-bc94-44d8-82bd-8fa8f80d5dd0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:14.938 197 INFO tempest.lib.common.rest_client [req-2523b6f8-9476-4cb1-bd1b-05ab1065f487 ] Request (HypervisorMaxv252RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4 0.124s 2020-12-14 02:14:14.941 197 DEBUG tempest.lib.common.rest_client [req-2523b6f8-9476-4cb1-bd1b-05ab1065f487 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2523b6f8-9476-4cb1-bd1b-05ab1065f487', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/30ea0fb965884e9fabbb95e1316a74d4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:15.059 197 INFO tempest.lib.common.rest_client [req-0e33fbe5-ace0-4f90-be31-424bdb73532c ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:14:15.061 197 DEBUG tempest.lib.common.rest_client [req-0e33fbe5-ace0-4f90-be31-424bdb73532c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e33fbe5-ace0-4f90-be31-424bdb73532c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["zbWRt7g2Sy6Fw78AlMZM1A"], "expires_at": "2020-12-14T03:14:14.000000Z", "issued_at": "2020-12-14T02:14:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:15.199 197 INFO tempest.lib.common.rest_client [req-0c04aa05-bad3-4617-8292-ca0b65539ea2 ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:14:15.202 197 DEBUG tempest.lib.common.rest_client [req-0c04aa05-bad3-4617-8292-ca0b65539ea2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c04aa05-bad3-4617-8292-ca0b65539ea2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["REpA4iX3Qcyxf1JrEPkd3w"], "expires_at": "2020-12-14T03:14:15.000000Z", "issued_at": "2020-12-14T02:14:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:15.269 197 INFO tempest.lib.common.rest_client [req-31f9f22f-c0a4-41e3-819e-6005aa5c2575 ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.061s 2020-12-14 02:14:15.272 197 DEBUG tempest.lib.common.rest_client [req-31f9f22f-c0a4-41e3-819e-6005aa5c2575 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31f9f22f-c0a4-41e3-819e-6005aa5c2575', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:15.345 197 INFO tempest.lib.common.rest_client [req-a420286d-c765-4460-8118-8339081d98ad ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.067s 2020-12-14 02:14:15.347 197 DEBUG tempest.lib.common.rest_client [req-a420286d-c765-4460-8118-8339081d98ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-HypervisorRbacTest-1153777260-desc", "domain_id": "default", "name": "tempest-HypervisorRbacTest-1153777260"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '374', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a420286d-c765-4460-8118-8339081d98ad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "d4e4b9d8fee64ca4822f1e55576f32e8", "name": "tempest-HypervisorRbacTest-1153777260", "domain_id": "default", "description": "tempest-HypervisorRbacTest-1153777260-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:15.480 197 INFO tempest.lib.common.rest_client [req-972b042d-e104-4ee6-a62d-76182aba2268 ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.126s 2020-12-14 02:14:15.482 197 DEBUG tempest.lib.common.rest_client [req-972b042d-e104-4ee6-a62d-76182aba2268 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-HypervisorRbacTest-1153777260", "password": "U8!7TTe7%00LYL*", "project_id": "d4e4b9d8fee64ca4822f1e55576f32e8", "email": "tempest-HypervisorRbacTest-7650747@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '389', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-972b042d-e104-4ee6-a62d-76182aba2268', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "d4e4b9d8fee64ca4822f1e55576f32e8", "email": "tempest-HypervisorRbacTest-7650747@example.com", "id": "c9d96765bf484b8cbb28a9b2408a3c5b", "name": "tempest-HypervisorRbacTest-1153777260", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/c9d96765bf484b8cbb28a9b2408a3c5b"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:15.553 197 INFO tempest.lib.common.rest_client [req-f82af65c-ab07-4eb7-937c-2767bd2f8c26 ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.064s 2020-12-14 02:14:15.555 197 DEBUG tempest.lib.common.rest_client [req-f82af65c-ab07-4eb7-937c-2767bd2f8c26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f82af65c-ab07-4eb7-937c-2767bd2f8c26', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:15.675 197 INFO tempest.lib.common.rest_client [req-4dd22d35-0869-48da-b7ea-34a9a5788c1e ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.112s 2020-12-14 02:14:15.678 197 DEBUG tempest.lib.common.rest_client [req-4dd22d35-0869-48da-b7ea-34a9a5788c1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4dd22d35-0869-48da-b7ea-34a9a5788c1e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:15.764 197 INFO tempest.lib.common.rest_client [req-6df79778-aeaa-421d-8a62-38303d380c12 ] Request (HypervisorRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles/72a4576c553448cd941b052c1ca0cf2d 0.079s 2020-12-14 02:14:15.767 197 DEBUG tempest.lib.common.rest_client [req-6df79778-aeaa-421d-8a62-38303d380c12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6df79778-aeaa-421d-8a62-38303d380c12', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:15.769 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HypervisorRbacTest-1153777260', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd4e4b9d8fee64ca4822f1e55576f32e8', 'project_name': 'tempest-HypervisorRbacTest-1153777260', 'tenant_id': 'd4e4b9d8fee64ca4822f1e55576f32e8', 'tenant_name': 'tempest-HypervisorRbacTest-1153777260', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c9d96765bf484b8cbb28a9b2408a3c5b'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:15.771 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HypervisorRbacTest-1153777260', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd4e4b9d8fee64ca4822f1e55576f32e8', 'project_name': 'tempest-HypervisorRbacTest-1153777260', 'tenant_id': 'd4e4b9d8fee64ca4822f1e55576f32e8', 'tenant_name': 'tempest-HypervisorRbacTest-1153777260', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c9d96765bf484b8cbb28a9b2408a3c5b'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:15.954 197 INFO tempest.lib.common.rest_client [req-c7bae113-034a-4143-8703-08ccaf8437b5 ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.120s 2020-12-14 02:14:15.956 197 DEBUG tempest.lib.common.rest_client [req-c7bae113-034a-4143-8703-08ccaf8437b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6567', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7bae113-034a-4143-8703-08ccaf8437b5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9d96765bf484b8cbb28a9b2408a3c5b", "name": "tempest-HypervisorRbacTest-1153777260", "password_expires_at": null}, "audit_ids": ["YUVhUldmTVuBPBM98c2hqQ"], "expires_at": "2020-12-14T03:14:15.000000Z", "issued_at": "2020-12-14T02:14:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d4e4b9d8fee64ca4822f1e55576f32e8", "name": "tempest-HypervisorRbacTest-1153777260"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30. _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:15.979 186 INFO tempest.lib.common.rest_client [req-206d9d4c-4677-4ff6-8274-0868a176c231 ] Request (SecurityGroupsRbacMaxV235Test:test_show_security_groups): 200 GET http://172.30.13.94/compute/v2.1/os-security-groups/807eda23-57e6-4e7e-8775-97bf9f38d0d8 5.739s 2020-12-14 02:14:15.982 186 DEBUG tempest.lib.common.rest_client [req-206d9d4c-4677-4ff6-8274-0868a176c231 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '250', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-206d9d4c-4677-4ff6-8274-0868a176c231', 'x-compute-request-id': 'req-206d9d4c-4677-4ff6-8274-0868a176c231', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/807eda23-57e6-4e7e-8775-97bf9f38d0d8'} Body: b'{"security_group": {"id": "807eda23-57e6-4e7e-8775-97bf9f38d0d8", "description": "tempest-description-1265813786", "name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-185551276", "tenant_id": "33c46f077835416681662f06a975e8b6", "rules": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:16.022 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:16.065 197 INFO tempest.lib.common.rest_client [req-a25ab255-b785-4179-a4b7-0bbb429a984e ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:14:16.067 193 INFO tempest.lib.common.rest_client [req-0efa6712-1775-4a05-9816-a18008af6b57 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e 6.295s 2020-12-14 02:14:16.068 197 DEBUG tempest.lib.common.rest_client [req-a25ab255-b785-4179-a4b7-0bbb429a984e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a25ab255-b785-4179-a4b7-0bbb429a984e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["-Oz2xqONRde31phPTNQ3TA"], "expires_at": "2020-12-14T03:14:15.000000Z", "issued_at": "2020-12-14T02:14:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:16.070 193 DEBUG tempest.lib.common.rest_client [req-0efa6712-1775-4a05-9816-a18008af6b57 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0efa6712-1775-4a05-9816-a18008af6b57', 'x-compute-request-id': 'req-0efa6712-1775-4a05-9816-a18008af6b57', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e'} Body: b'{"server": {"id": "ad76074f-74fc-4e91-b8a0-4eee44b0ad1e", "name": "tempest-ServerConsolesRbacTest-server-876389742", "status": "BUILD", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "user_id": "5061a16d2eeb43f98ad0aada2c68da9b", "metadata": {}, "hostId": "fc3f0cd2beac00d12da95cabcbf1160f3f05c30bfc009c2ed86610de", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:04Z", "updated": "2020-12-14T02:14:06Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:16.193 197 INFO tempest.lib.common.rest_client [req-cb734c4a-2005-49be-8b27-6c6dddc250a2 ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:14:16.196 197 DEBUG tempest.lib.common.rest_client [req-cb734c4a-2005-49be-8b27-6c6dddc250a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb734c4a-2005-49be-8b27-6c6dddc250a2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["j2GNlTawTf-goDaplm3Yng"], "expires_at": "2020-12-14T03:14:16.000000Z", "issued_at": "2020-12-14T02:14:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:16.197 186 INFO tempest.lib.common.rest_client [req-89f20a21-13bf-4417-ba07-fe3f0df5ff68 ] Request (SecurityGroupsRbacMaxV235Test:test_show_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles 0.168s 2020-12-14 02:14:16.201 186 DEBUG tempest.lib.common.rest_client [req-89f20a21-13bf-4417-ba07-fe3f0df5ff68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89f20a21-13bf-4417-ba07-fe3f0df5ff68', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:16.264 197 INFO tempest.lib.common.rest_client [req-f7608dde-6916-4cc9-b697-662934773eb4 ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.060s 2020-12-14 02:14:16.267 197 DEBUG tempest.lib.common.rest_client [req-f7608dde-6916-4cc9-b697-662934773eb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7608dde-6916-4cc9-b697-662934773eb4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:16.310 186 INFO tempest.lib.common.rest_client [req-d64a91a2-a0b4-448c-9c58-8662356e54d7 ] Request (SecurityGroupsRbacMaxV235Test:test_show_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:14:16.313 186 DEBUG tempest.lib.common.rest_client [req-d64a91a2-a0b4-448c-9c58-8662356e54d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d64a91a2-a0b4-448c-9c58-8662356e54d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72485d39e26a4e25901a096bea538e63", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275", "password_expires_at": null}, "audit_ids": ["Krt4390XSw2kMc9cCqFd-A"], "expires_at": "2020-12-14T03:14:16.000000Z", "issued_at": "2020-12-14T02:14:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "33c46f077835416681662f06a975e8b6", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:16.329 197 INFO tempest.lib.common.rest_client [req-d1fdf787-4647-4c5e-822d-72923e490f2c ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-14 02:14:16.331 197 DEBUG tempest.lib.common.rest_client [req-d1fdf787-4647-4c5e-822d-72923e490f2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1fdf787-4647-4c5e-822d-72923e490f2c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:16.334 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:14:16.336 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:16.338 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:16.343 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.346 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.350 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.353 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.357 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.360 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.368 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.372 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.375 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.377 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.380 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.383 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.386 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.389 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.392 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.393 189 INFO tempest.lib.common.rest_client [req-a2d1f555-7935-4b7c-959b-4779da47d8c4 ] Request (ServerActionsRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/9b8eb022-a890-45ec-a77d-8e12781894d2/add_router_interface 1.883s 2020-12-14 02:14:16.395 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.397 189 DEBUG tempest.lib.common.rest_client [req-a2d1f555-7935-4b7c-959b-4779da47d8c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "a7d43c78-7c2a-4816-80bf-ed206c4f523d"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-a2d1f555-7935-4b7c-959b-4779da47d8c4', 'date': 'Mon, 14 Dec 2020 02:14:16 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/9b8eb022-a890-45ec-a77d-8e12781894d2/add_router_interface'} Body: b'{"id": "9b8eb022-a890-45ec-a77d-8e12781894d2", "tenant_id": "70770d0b5506411ca294041fa7d6b3d9", "port_id": "a7758ef2-03ad-49db-a0a4-f504eb9e09ff", "network_id": "7b3948bf-9b3c-4c81-bbb7-bc525dd2ef6c", "subnet_id": "a7d43c78-7c2a-4816-80bf-ed206c4f523d", "subnet_ids": ["a7d43c78-7c2a-4816-80bf-ed206c4f523d"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:16.398 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.401 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.400 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsRbacTest-1337290257', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '70770d0b5506411ca294041fa7d6b3d9', 'project_name': 'tempest-ServerActionsRbacTest-1337290257', 'tenant_id': '70770d0b5506411ca294041fa7d6b3d9', 'tenant_name': 'tempest-ServerActionsRbacTest-1337290257', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '085f65123c634e01beaa63852dd155c8'}, Network: {'id': '7b3948bf-9b3c-4c81-bbb7-bc525dd2ef6c', 'name': 'tempest-ServerActionsRbacTest-1387900475-network', 'tenant_id': '70770d0b5506411ca294041fa7d6b3d9', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '70770d0b5506411ca294041fa7d6b3d9', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 59, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:14:07Z', 'updated_at': '2020-12-14T02:14:07Z', 'revision_number': 1}, Subnet: {'id': 'a7d43c78-7c2a-4816-80bf-ed206c4f523d', 'name': 'tempest-ServerActionsRbacTest-1387900475-subnet', 'tenant_id': '70770d0b5506411ca294041fa7d6b3d9', 'network_id': '7b3948bf-9b3c-4c81-bbb7-bc525dd2ef6c', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:08Z', 'updated_at': '2020-12-14T02:14:08Z', 'revision_number': 0, 'project_id': '70770d0b5506411ca294041fa7d6b3d9'}, Router: {'id': '9b8eb022-a890-45ec-a77d-8e12781894d2', 'name': 'tempest-ServerActionsRbacTest-1387900475-router', 'tenant_id': '70770d0b5506411ca294041fa7d6b3d9', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.84'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::2bb'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:13Z', 'updated_at': '2020-12-14T02:14:14Z', 'revision_number': 3, 'project_id': '70770d0b5506411ca294041fa7d6b3d9'} 2020-12-14 02:14:16.404 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.405 197 INFO tempest.lib.common.rest_client [req-afbde29a-195d-42b0-ab5d-3a09bbfd7650 ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles 0.062s 2020-12-14 02:14:16.406 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.409 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.408 197 DEBUG tempest.lib.common.rest_client [req-afbde29a-195d-42b0-ab5d-3a09bbfd7650 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-afbde29a-195d-42b0-ab5d-3a09bbfd7650', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:16.412 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.414 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.417 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.420 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.422 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.425 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.428 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.430 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.433 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.436 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.438 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.441 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.444 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.446 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.449 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.452 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.454 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.458 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.461 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.464 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.466 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.469 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.472 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.475 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.478 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.481 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.484 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.487 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.489 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.492 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.495 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.498 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.500 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.501 197 INFO tempest.lib.common.rest_client [req-0ea648ed-2e05-4aca-9959-7d9a23f709c4 ] Request (HypervisorRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles/72a4576c553448cd941b052c1ca0cf2d 0.084s 2020-12-14 02:14:16.503 197 DEBUG tempest.lib.common.rest_client [req-0ea648ed-2e05-4aca-9959-7d9a23f709c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ea648ed-2e05-4aca-9959-7d9a23f709c4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:16.504 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.507 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.513 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.516 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.519 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.522 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.525 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.528 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.530 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.532 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.535 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.537 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.540 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.542 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.544 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.546 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.549 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:16.560 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:update, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:16.591 189 INFO tempest.lib.common.rest_client [req-043df0b6-ef27-4ba4-9fd9-26168e81335b ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.112s 2020-12-14 02:14:16.593 189 DEBUG tempest.lib.common.rest_client [req-043df0b6-ef27-4ba4-9fd9-26168e81335b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-043df0b6-ef27-4ba4-9fd9-26168e81335b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "085f65123c634e01beaa63852dd155c8", "name": "tempest-ServerActionsRbacTest-1337290257", "password_expires_at": null}, "audit_ids": ["2Zwhx1VOS-K6T_hLVu_5aw"], "expires_at": "2020-12-14T03:14:16.000000Z", "issued_at": "2020-12-14T02:14:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "70770d0b5506411ca294041fa7d6b3d9", "name": "tempest-ServerActionsRbacTest-1337290257"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/70770d0b5506411ca294041fa7d6b3d9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/70770d0b5506411ca294041fa7d6b3d9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/70770d0b5506411ca294041fa7d6b3d9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_70770d0b5506411ca294041fa7d6b3d9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_70770d0b5506411ca294041fa7d6b3d9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_70770d0b5506411ca294041fa7d6b3d9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:16.620 197 INFO tempest.lib.common.rest_client [req-9b233367-279b-4846-a21d-8b71666806cb ] Request (HypervisorRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles/a629c95d64b3416fb80ae90af4f69c05 0.110s 2020-12-14 02:14:16.623 197 DEBUG tempest.lib.common.rest_client [req-9b233367-279b-4846-a21d-8b71666806cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b233367-279b-4846-a21d-8b71666806cb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:16.694 189 INFO tempest.lib.common.rest_client [req-e06b732a-55fc-45e8-8cc1-c3b11bae49dd ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:14:16.697 189 DEBUG tempest.lib.common.rest_client [req-e06b732a-55fc-45e8-8cc1-c3b11bae49dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e06b732a-55fc-45e8-8cc1-c3b11bae49dd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["LjSFA0ZWScyK7oU_DlnoEg"], "expires_at": "2020-12-14T03:14:16.000000Z", "issued_at": "2020-12-14T02:14:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:16.819 189 INFO tempest.lib.common.rest_client [req-c0e7e681-adb5-4c38-8520-9192c1aff220 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:14:16.822 189 DEBUG tempest.lib.common.rest_client [req-c0e7e681-adb5-4c38-8520-9192c1aff220 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c0e7e681-adb5-4c38-8520-9192c1aff220', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["O5l9qg13Sgee825tsjwY-w"], "expires_at": "2020-12-14T03:14:16.000000Z", "issued_at": "2020-12-14T02:14:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:16.926 189 INFO tempest.lib.common.rest_client [req-67e2c3b4-5649-40df-9674-b5e292af21e3 ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.097s 2020-12-14 02:14:16.930 189 DEBUG tempest.lib.common.rest_client [req-67e2c3b4-5649-40df-9674-b5e292af21e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67e2c3b4-5649-40df-9674-b5e292af21e3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:17.060 189 INFO tempest.lib.common.rest_client [req-7470e154-70d8-429d-99ae-32fa30bb088e ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.120s 2020-12-14 02:14:17.062 189 DEBUG tempest.lib.common.rest_client [req-7470e154-70d8-429d-99ae-32fa30bb088e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7470e154-70d8-429d-99ae-32fa30bb088e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:17.065 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:14:17.069 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:17.151 189 INFO tempest.lib.common.rest_client [req-4ed6e272-7967-42d4-a782-1599c6ebf94a ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.074s 2020-12-14 02:14:17.155 189 DEBUG tempest.lib.common.rest_client [req-4ed6e272-7967-42d4-a782-1599c6ebf94a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ed6e272-7967-42d4-a782-1599c6ebf94a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:17.231 189 INFO tempest.lib.common.rest_client [req-321da4b1-31b2-40c7-b48a-d1bdbc220733 ] Request (ServerActionsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles/72a4576c553448cd941b052c1ca0cf2d 0.070s 2020-12-14 02:14:17.233 189 DEBUG tempest.lib.common.rest_client [req-321da4b1-31b2-40c7-b48a-d1bdbc220733 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-321da4b1-31b2-40c7-b48a-d1bdbc220733', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:17.269 186 INFO tempest.lib.common.rest_client [req-027418ad-733c-4909-9676-4be8009c160f ] Request (SecurityGroupsRbacMaxV235Test:test_update_security_groups): 200 POST http://172.30.13.94/compute/v2.1/os-security-groups 0.703s 2020-12-14 02:14:17.273 186 DEBUG tempest.lib.common.rest_client [req-027418ad-733c-4909-9676-4be8009c160f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-243590976", "description": "tempest-description-2012550869"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '250', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-027418ad-733c-4909-9676-4be8009c160f', 'x-compute-request-id': 'req-027418ad-733c-4909-9676-4be8009c160f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups'} Body: b'{"security_group": {"id": "4912f47f-96c4-4235-a69c-11d5fe1a63bf", "description": "tempest-description-2012550869", "name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-243590976", "tenant_id": "33c46f077835416681662f06a975e8b6", "rules": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:17.325 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:17.376 189 INFO tempest.lib.common.rest_client [req-3a2130c1-9aed-42e4-b376-efa8f94299a9 ] Request (ServerActionsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles/a629c95d64b3416fb80ae90af4f69c05 0.135s 2020-12-14 02:14:17.378 189 DEBUG tempest.lib.common.rest_client [req-3a2130c1-9aed-42e4-b376-efa8f94299a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a2130c1-9aed-42e4-b376-efa8f94299a9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:17.389 186 INFO tempest.lib.common.rest_client [req-b0b5c751-d8c5-4f2e-9903-84a355c6229a ] Request (SecurityGroupsRbacMaxV235Test:test_update_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles 0.057s 2020-12-14 02:14:17.391 186 DEBUG tempest.lib.common.rest_client [req-b0b5c751-d8c5-4f2e-9903-84a355c6229a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b0b5c751-d8c5-4f2e-9903-84a355c6229a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:17.431 193 INFO tempest.lib.common.rest_client [req-3c2e7cd1-a81b-4035-9171-91c9262588c2 ] Request (ServerConsolesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e 0.250s 2020-12-14 02:14:17.433 193 DEBUG tempest.lib.common.rest_client [req-3c2e7cd1-a81b-4035-9171-91c9262588c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3c2e7cd1-a81b-4035-9171-91c9262588c2', 'x-compute-request-id': 'req-3c2e7cd1-a81b-4035-9171-91c9262588c2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e'} Body: b'{"server": {"id": "ad76074f-74fc-4e91-b8a0-4eee44b0ad1e", "name": "tempest-ServerConsolesRbacTest-server-876389742", "status": "ACTIVE", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "user_id": "5061a16d2eeb43f98ad0aada2c68da9b", "metadata": {}, "hostId": "fc3f0cd2beac00d12da95cabcbf1160f3f05c30bfc009c2ed86610de", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:04Z", "updated": "2020-12-14T02:14:13Z", "addresses": {"tempest-ServerConsolesRbacTest-734479438-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:50:5d:ac"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:12.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:17.490 186 INFO tempest.lib.common.rest_client [req-cefd30e1-7ca7-4804-a396-c19ae02d2654 ] Request (SecurityGroupsRbacMaxV235Test:test_update_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:14:17.494 186 DEBUG tempest.lib.common.rest_client [req-cefd30e1-7ca7-4804-a396-c19ae02d2654 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cefd30e1-7ca7-4804-a396-c19ae02d2654', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72485d39e26a4e25901a096bea538e63", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275", "password_expires_at": null}, "audit_ids": ["javJCi4dRbeKa4koSSPGkw"], "expires_at": "2020-12-14T03:14:17.000000Z", "issued_at": "2020-12-14T02:14:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "33c46f077835416681662f06a975e8b6", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:17.540 193 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 13 second wait 2020-12-14 02:14:17.548 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:17.553 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.556 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.559 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.563 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.566 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.570 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.575 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.578 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.581 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.583 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.586 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.589 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.592 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.595 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.598 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.601 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.604 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.607 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.609 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.612 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.615 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.617 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.620 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.623 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.625 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.628 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.631 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.634 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.636 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.639 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.642 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.644 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.647 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.650 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.652 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.655 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.658 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.661 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.664 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.667 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.669 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.671 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.674 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.676 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.678 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.680 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.682 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.684 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.686 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.688 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.690 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.692 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.694 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.696 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.698 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.700 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.704 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.706 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.708 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.711 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.713 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.715 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.716 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.718 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.721 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.723 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.725 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.727 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.729 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.731 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.733 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.734 197 INFO tempest.lib.common.rest_client [req-09e18010-0051-4b0b-b8ca-5c21b4787274 ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:14:17.738 197 DEBUG tempest.lib.common.rest_client [req-09e18010-0051-4b0b-b8ca-5c21b4787274 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-09e18010-0051-4b0b-b8ca-5c21b4787274', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9d96765bf484b8cbb28a9b2408a3c5b", "name": "tempest-HypervisorRbacTest-1153777260", "password_expires_at": null}, "audit_ids": ["a9h_R8r9RkSzJKkpx_0kRQ"], "expires_at": "2020-12-14T03:14:17.000000Z", "issued_at": "2020-12-14T02:14:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d4e4b9d8fee64ca4822f1e55576f32e8", "name": "tempest-HypervisorRbacTest-1153777260"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:17.741 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-console-output, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:17.743 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:17.853 193 INFO tempest.lib.common.rest_client [req-b2885f63-9a8b-436e-a36a-71bf982a6915 ] Request (ServerConsolesRbacTest:test_get_console_output): 200 GET http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902/users/5061a16d2eeb43f98ad0aada2c68da9b/roles 0.105s 2020-12-14 02:14:17.855 193 DEBUG tempest.lib.common.rest_client [req-b2885f63-9a8b-436e-a36a-71bf982a6915 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2885f63-9a8b-436e-a36a-71bf982a6915', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902/users/5061a16d2eeb43f98ad0aada2c68da9b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902/users/5061a16d2eeb43f98ad0aada2c68da9b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:17.862 197 INFO tempest.lib.common.rest_client [req-1a382d56-2562-436a-98d7-2a64e1195d69 ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors 0.112s 2020-12-14 02:14:17.863 186 INFO tempest.lib.common.rest_client [req-64a3e057-a482-4f46-8024-a5270085afad ] Request (SecurityGroupsRbacMaxV235Test:test_update_security_groups): 200 PUT http://172.30.13.94/compute/v2.1/os-security-groups/4912f47f-96c4-4235-a69c-11d5fe1a63bf 0.363s 2020-12-14 02:14:17.865 197 DEBUG tempest.lib.common.rest_client [req-1a382d56-2562-436a-98d7-2a64e1195d69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '187', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1a382d56-2562-436a-98d7-2a64e1195d69', 'x-compute-request-id': 'req-1a382d56-2562-436a-98d7-2a64e1195d69', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled"}, {"id": 2, "hypervisor_hostname": "lf-virtual8", "state": "up", "status": "enabled"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:17.866 186 DEBUG tempest.lib.common.rest_client [req-64a3e057-a482-4f46-8024-a5270085afad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-104077044", "description": "tempest-220261700"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '193', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-64a3e057-a482-4f46-8024-a5270085afad', 'x-compute-request-id': 'req-64a3e057-a482-4f46-8024-a5270085afad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/4912f47f-96c4-4235-a69c-11d5fe1a63bf'} Body: b'{"security_group": {"id": "4912f47f-96c4-4235-a69c-11d5fe1a63bf", "description": "tempest-220261700", "name": "tempest-104077044", "tenant_id": "33c46f077835416681662f06a975e8b6", "rules": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:17.893 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:17.898 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.899 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:17.901 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.904 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.908 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.912 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.918 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.925 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.930 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.934 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.938 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.943 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.947 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.952 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.956 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.958 193 INFO tempest.lib.common.rest_client [req-b3d64fc5-0580-477c-89d7-2228c50f135e ] Request (ServerConsolesRbacTest:test_get_console_output): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:14:17.962 193 DEBUG tempest.lib.common.rest_client [req-b3d64fc5-0580-477c-89d7-2228c50f135e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3d64fc5-0580-477c-89d7-2228c50f135e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5061a16d2eeb43f98ad0aada2c68da9b", "name": "tempest-ServerConsolesRbacTest-1721381461", "password_expires_at": null}, "audit_ids": ["_7T1z4H9Tp6wOpUYCv4_Jg"], "expires_at": "2020-12-14T03:14:17.000000Z", "issued_at": "2020-12-14T02:14:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6416f6d9d76f40d3a9a3fbe3e0564902", "name": "tempest-ServerConsolesRbacTest-1721381461"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:17.961 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.967 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.971 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.975 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.980 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.984 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.989 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.993 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:17.997 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.000 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.003 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.005 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.008 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.008 186 INFO tempest.lib.common.rest_client [req-b1d7aad3-b414-41cb-8396-e58964f32d44 ] Request (SecurityGroupsRbacMaxV235Test:test_update_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles 0.101s 2020-12-14 02:14:18.010 186 DEBUG tempest.lib.common.rest_client [req-b1d7aad3-b414-41cb-8396-e58964f32d44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1d7aad3-b414-41cb-8396-e58964f32d44', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6/users/72485d39e26a4e25901a096bea538e63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:18.011 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.014 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.017 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.020 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.022 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.025 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.028 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.031 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.034 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.037 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.040 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.043 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.046 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.048 186 INFO tempest.lib.common.rest_client [req-0a561b3a-28ec-436d-a547-9c2d2caeb380 ] Request (SecurityGroupsRbacMaxV235Test:test_update_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-14 02:14:18.049 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.050 186 DEBUG tempest.lib.common.rest_client [req-0a561b3a-28ec-436d-a547-9c2d2caeb380 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0a561b3a-28ec-436d-a547-9c2d2caeb380', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "72485d39e26a4e25901a096bea538e63", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275", "password_expires_at": null}, "audit_ids": ["xAQiJD6LQbeF1ef7vRiQOg"], "expires_at": "2020-12-14T03:14:18.000000Z", "issued_at": "2020-12-14T02:14:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "33c46f077835416681662f06a975e8b6", "name": "tempest-SecurityGroupsRbacMaxV235Test-1484120275"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_33c46f077835416681662f06a975e8b6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:18.052 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.055 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.058 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.061 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.064 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.067 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.069 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.072 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.075 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.078 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.080 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.083 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.086 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.090 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.092 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.098 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.101 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.103 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.106 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.108 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.111 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.113 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.115 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.117 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.120 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.128 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.130 193 INFO tempest.lib.common.rest_client [req-30b37a67-1ece-4a0a-8bed-b2eef3235831 ] Request (ServerConsolesRbacTest:test_get_console_output): 200 POST http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e/action 0.161s 2020-12-14 02:14:18.130 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.133 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.133 193 DEBUG tempest.lib.common.rest_client [req-30b37a67-1ece-4a0a-8bed-b2eef3235831 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-getConsoleOutput": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '22114', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-30b37a67-1ece-4a0a-8bed-b2eef3235831', 'x-compute-request-id': 'req-30b37a67-1ece-4a0a-8bed-b2eef3235831', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e/action'} Body: b'{"output": "[ 0.000000] Initializing cgroup subsys cpuset\\n[ 0.000000] Initializing cgroup subsys cpu\\n[ 0.000000] Initializing cgroup subsys cpuacct\\n[ 0.000000] Linux version 4.4.0-28-generic (buildd@lcy01-13) (gcc version 5.3.1 20160413 (Ubuntu 5.3.1-14ubuntu2.1) ) #47-Ubuntu SMP Fri Jun 24 10:09:13 UTC 2016 (Ubuntu 4.4.0-28.47-generic 4.4.13)\\n[ 0.000000] Command line: LABEL=cirros-rootfs ro console=tty1 console=ttyS0\\n[ 0.000000] KERNEL supported cpus:\\n[ 0.000000] Intel GenuineIntel\\n[ 0.000000] AMD AuthenticAMD\\n[ 0.000000] Centaur CentaurHauls\\n[ 0.000000] x86/fpu: Legacy x87 FPU detected.\\n[ 0.000000] x86/fpu: Using \'lazy\' FPU context switches.\\n[ 0.000000] e820: BIOS-provided physical RAM map:\\n[ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable\\n[ 0.000000] BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved\\n[ 0.000000] BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved\\n[ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x000000001ffdbfff] usable\\n[ 0.000000] BIOS-e820: [mem 0x000000001ffdc000-0x000000001fffffff] reserved\\n[ 0.000000] BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved\\n[ 0.000000] BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved\\n[ 0.000000] NX (Execute Disable) protection: active\\n[ 0.000000] SMBIOS 2.8 present.\\n[ 0.000000] Hypervisor detected: KVM\\n[ 0.000000] e820: last_pfn = 0x1ffdc max_arch_pfn = 0x400000000\\n[ 0.000000] x86/PAT: PAT not supported by CPU.\\n[ 0.000000] found SMP MP-table at [mem 0x000f6a80-0x000f6a8f] mapped at [ffff8800000f6a80]\\n[ 0.000000] Scanning 1 areas for low memory corruption\\n[ 0.000000] RAMDISK: [mem 0x1fb16000-0x1ffcbfff]\\n[ 0.000000] ACPI: Early table checksum verification disabled\\n[ 0.000000] ACPI: RSDP 0x00000000000F6890 000014 (v00 BOCHS )\\n[ 0.000000] ACPI: RSDT 0x000000001FFE1504 00002C (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001)\\n[ 0.000000] ACPI: FACP 0x000000001FFE1418 000074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001)\\n[ 0.000000] ACPI: DSDT 0x000000001FFE0040 0013D8 (v01 BOCHS BXPCDSDT 00000001 BXPC 00000001)\\n[ 0.000000] ACPI: FACS 0x000000001FFE0000 000040\\n[ 0.000000] ACPI: APIC 0x000000001FFE148C 000078 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001)\\n[ 0.000000] No NUMA configuration found\\n[ 0.000000] Faking a node at [mem 0x0000000000000000-0x000000001ffdbfff]\\n[ 0.000000] NODE_DATA(0) allocated [mem 0x1ffd7000-0x1ffdbfff]\\n[ 0.000000] kvm-clock: Using msrs 4b564d01 and 4b564d00\\n[ 0.000000] kvm-clock: cpu 0, msr 0:1ffd3001, primary cpu clock\\n[ 0.000000] kvm-clock: using sched offset of 1493790949 cycles\\n[ 0.000000] clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns\\n[ 0.000000] Zone ranges:\\n[ 0.000000] DMA [mem 0x0000000000001000-0x0000000000ffffff]\\n[ 0.000000] DMA32 [mem 0x0000000001000000-0x000000001ffdbfff]\\n[ 0.000000] Normal empty\\n[ 0.000000] Device empty\\n[ 0.000000] Movable zone start for each node\\n[ 0.000000] Early memory node ranges\\n[ 0.000000] node 0: [mem 0x0000000000001000-0x000000000009efff]\\n[ 0.000000] node 0: [mem 0x0000000000100000-0x000000001ffdbfff]\\n[ 0.000000] Initmem setup node 0 [mem 0x0000000000001000-0x000000001ffdbfff]\\n[ 0.000000] ACPI: PM-Timer IO Port: 0x608\\n[ 0.000000] ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])\\n[ 0.000000] IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23\\n[ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)\\n[ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level)\\n[ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)\\n[ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level)\\n[ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level)\\n[ 0.000000] Using ACPI (MADT) for SMP configuration inf _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:18.135 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.137 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.146 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:list, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:18.146 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:18.148 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:18.203 193 INFO tempest.lib.common.rest_client [req-54fa8f00-5250-47b0-a859-8713949b447c ] Request (ServerConsolesRbacTest:test_get_console_output): 200 GET http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902/users/5061a16d2eeb43f98ad0aada2c68da9b/roles 0.052s 2020-12-14 02:14:18.206 193 DEBUG tempest.lib.common.rest_client [req-54fa8f00-5250-47b0-a859-8713949b447c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-54fa8f00-5250-47b0-a859-8713949b447c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902/users/5061a16d2eeb43f98ad0aada2c68da9b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902/users/5061a16d2eeb43f98ad0aada2c68da9b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:18.213 197 INFO tempest.lib.common.rest_client [req-d7d50295-4dd7-460b-aa4c-773f3d57b03a ] Request (HypervisorRbacTest:test_list_hypervisors): 200 GET http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles 0.060s 2020-12-14 02:14:18.216 197 DEBUG tempest.lib.common.rest_client [req-d7d50295-4dd7-460b-aa4c-773f3d57b03a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d7d50295-4dd7-460b-aa4c-773f3d57b03a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:18.253 193 INFO tempest.lib.common.rest_client [req-7144b224-4062-470c-9865-fea09518f155 ] Request (ServerConsolesRbacTest:test_get_console_output): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:14:18.254 197 INFO tempest.lib.common.rest_client [req-f4f64322-9488-4867-af07-674b924f2a7a ] Request (HypervisorRbacTest:test_list_hypervisors): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-14 02:14:18.256 197 DEBUG tempest.lib.common.rest_client [req-f4f64322-9488-4867-af07-674b924f2a7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4f64322-9488-4867-af07-674b924f2a7a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9d96765bf484b8cbb28a9b2408a3c5b", "name": "tempest-HypervisorRbacTest-1153777260", "password_expires_at": null}, "audit_ids": ["tvf2JD71SFydL0JIs5b1zw"], "expires_at": "2020-12-14T03:14:18.000000Z", "issued_at": "2020-12-14T02:14:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d4e4b9d8fee64ca4822f1e55576f32e8", "name": "tempest-HypervisorRbacTest-1153777260"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:18.257 193 DEBUG tempest.lib.common.rest_client [req-7144b224-4062-470c-9865-fea09518f155 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7144b224-4062-470c-9865-fea09518f155', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5061a16d2eeb43f98ad0aada2c68da9b", "name": "tempest-ServerConsolesRbacTest-1721381461", "password_expires_at": null}, "audit_ids": ["vcLQW11JREafv5VqDMLOjg"], "expires_at": "2020-12-14T03:14:18.000000Z", "issued_at": "2020-12-14T02:14:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6416f6d9d76f40d3a9a3fbe3e0564902", "name": "tempest-ServerConsolesRbacTest-1721381461"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6416f6d9d76f40d3a9a3fbe3e0564902", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:18.375 197 INFO tempest.lib.common.rest_client [req-7531489b-c88c-49c1-83ff-4ace96f42063 ] Request (HypervisorRbacTest:test_list_hypervisors): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors 0.112s 2020-12-14 02:14:18.378 197 DEBUG tempest.lib.common.rest_client [req-7531489b-c88c-49c1-83ff-4ace96f42063 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '187', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7531489b-c88c-49c1-83ff-4ace96f42063', 'x-compute-request-id': 'req-7531489b-c88c-49c1-83ff-4ace96f42063', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled"}, {"id": 2, "hypervisor_hostname": "lf-virtual8", "state": "up", "status": "enabled"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:18.398 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:18.461 197 INFO tempest.lib.common.rest_client [req-01ebf3de-ef92-49f2-b2e8-33055efa6cf2 ] Request (HypervisorRbacTest:test_list_hypervisors): 200 GET http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles 0.058s 2020-12-14 02:14:18.463 197 DEBUG tempest.lib.common.rest_client [req-01ebf3de-ef92-49f2-b2e8-33055efa6cf2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01ebf3de-ef92-49f2-b2e8-33055efa6cf2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:18.484 189 INFO tempest.lib.common.rest_client [req-b36f627a-4833-4fe4-a885-75cba50e7a78 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:14:18.486 189 DEBUG tempest.lib.common.rest_client [req-b36f627a-4833-4fe4-a885-75cba50e7a78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b36f627a-4833-4fe4-a885-75cba50e7a78', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["k--kFO-sR0u7AVjn8AHCyg"], "expires_at": "2020-12-14T03:14:18.000000Z", "issued_at": "2020-12-14T02:14:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:18.510 197 INFO tempest.lib.common.rest_client [req-757d3ad6-6e34-4267-a99b-dd4b5fca9a96 ] Request (HypervisorRbacTest:test_list_hypervisors): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:14:18.513 197 DEBUG tempest.lib.common.rest_client [req-757d3ad6-6e34-4267-a99b-dd4b5fca9a96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-757d3ad6-6e34-4267-a99b-dd4b5fca9a96', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9d96765bf484b8cbb28a9b2408a3c5b", "name": "tempest-HypervisorRbacTest-1153777260", "password_expires_at": null}, "audit_ids": ["Kgg0l9ofRD6JKA7qL0O4WA"], "expires_at": "2020-12-14T03:14:18.000000Z", "issued_at": "2020-12-14T02:14:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d4e4b9d8fee64ca4822f1e55576f32e8", "name": "tempest-HypervisorRbacTest-1153777260"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:18.529 193 INFO tempest.lib.common.rest_client [req-c5aa548c-8e97-4e6f-b18d-3ddb9f6d5884 ] Request (ServerConsolesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e 0.244s 2020-12-14 02:14:18.531 193 DEBUG tempest.lib.common.rest_client [req-c5aa548c-8e97-4e6f-b18d-3ddb9f6d5884 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c5aa548c-8e97-4e6f-b18d-3ddb9f6d5884', 'x-compute-request-id': 'req-c5aa548c-8e97-4e6f-b18d-3ddb9f6d5884', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:18.531 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:18.535 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.538 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.540 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.543 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.546 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.550 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.554 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.556 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.556 186 INFO tempest.lib.common.rest_client [req-46858ad8-e96c-48e5-af2d-7d54fc297f4a ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/os-security-groups/4912f47f-96c4-4235-a69c-11d5fe1a63bf 0.480s 2020-12-14 02:14:18.558 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.559 186 DEBUG tempest.lib.common.rest_client [req-46858ad8-e96c-48e5-af2d-7d54fc297f4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-46858ad8-e96c-48e5-af2d-7d54fc297f4a', 'x-compute-request-id': 'req-46858ad8-e96c-48e5-af2d-7d54fc297f4a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/4912f47f-96c4-4235-a69c-11d5fe1a63bf'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:18.561 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.563 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.565 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.568 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.570 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.572 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.575 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.578 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.580 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.582 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.583 189 INFO tempest.lib.common.rest_client [req-373c974a-ec48-4ed5-8e2c-0357d0c2e505 ] Request (ServerActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:14:18.584 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.586 189 DEBUG tempest.lib.common.rest_client [req-373c974a-ec48-4ed5-8e2c-0357d0c2e505 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-373c974a-ec48-4ed5-8e2c-0357d0c2e505', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["rQ38xx8FQ4iYM_sHHRwiYg"], "expires_at": "2020-12-14T03:14:18.000000Z", "issued_at": "2020-12-14T02:14:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:18.586 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.589 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.591 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.591 189 INFO tempest.lib.common.fixed_network [-] (ServerActionsRbacTest:setUpClass) Found network {'id': '1c085583-16aa-4f2c-b48c-e9cce6ab197b', 'name': 'tempest-ServerActionsRbacTest-2074532455-network', 'tenant_id': '3400d8caa66043d0b7fa128b68a28ecc', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3400d8caa66043d0b7fa128b68a28ecc', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:14:02Z', 'updated_at': '2020-12-14T02:14:02Z', 'revision_number': 1} available for tenant 2020-12-14 02:14:18.593 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.595 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.598 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.600 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.602 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.604 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.606 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.609 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.611 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.615 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.618 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.622 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.626 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.629 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.633 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.637 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.641 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.645 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.648 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.652 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.659 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.662 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.664 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.666 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.668 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.671 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.673 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.675 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.678 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.680 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.682 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.685 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.687 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.692 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.695 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.697 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.700 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.702 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.704 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.707 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.709 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.711 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.713 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.716 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.718 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.720 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.722 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.724 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:18.733 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:list-detail, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:18.735 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:18.796 197 INFO tempest.lib.common.rest_client [req-c057ee91-d0b7-4370-88bb-8ae0d8691db7 ] Request (HypervisorRbacTest:test_list_hypervisors_with_details): 200 GET http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles 0.056s 2020-12-14 02:14:18.799 197 DEBUG tempest.lib.common.rest_client [req-c057ee91-d0b7-4370-88bb-8ae0d8691db7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c057ee91-d0b7-4370-88bb-8ae0d8691db7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:18.802 193 INFO tempest.lib.common.rest_client [req-016eeae9-9e85-4cd5-b0b0-4159e38ce5d0 ] Request (ServerConsolesRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e 0.265s 2020-12-14 02:14:18.804 193 DEBUG tempest.lib.common.rest_client [req-016eeae9-9e85-4cd5-b0b0-4159e38ce5d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1724', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-016eeae9-9e85-4cd5-b0b0-4159e38ce5d0', 'x-compute-request-id': 'req-016eeae9-9e85-4cd5-b0b0-4159e38ce5d0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e'} Body: b'{"server": {"id": "ad76074f-74fc-4e91-b8a0-4eee44b0ad1e", "name": "tempest-ServerConsolesRbacTest-server-876389742", "status": "ACTIVE", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "user_id": "5061a16d2eeb43f98ad0aada2c68da9b", "metadata": {}, "hostId": "fc3f0cd2beac00d12da95cabcbf1160f3f05c30bfc009c2ed86610de", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:04Z", "updated": "2020-12-14T02:14:18Z", "addresses": {"tempest-ServerConsolesRbacTest-734479438-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:50:5d:ac"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:12.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:18.851 197 INFO tempest.lib.common.rest_client [req-d6c7c0f3-4337-4c5f-9df6-3c9441b87409 ] Request (HypervisorRbacTest:test_list_hypervisors_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:14:18.855 197 DEBUG tempest.lib.common.rest_client [req-d6c7c0f3-4337-4c5f-9df6-3c9441b87409 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6c7c0f3-4337-4c5f-9df6-3c9441b87409', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9d96765bf484b8cbb28a9b2408a3c5b", "name": "tempest-HypervisorRbacTest-1153777260", "password_expires_at": null}, "audit_ids": ["ZaRwATq3SJGRtV4NH9xYzA"], "expires_at": "2020-12-14T03:14:18.000000Z", "issued_at": "2020-12-14T02:14:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d4e4b9d8fee64ca4822f1e55576f32e8", "name": "tempest-HypervisorRbacTest-1153777260"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:19.020 186 INFO tempest.lib.common.rest_client [req-5a630ed2-eb68-47cf-8508-73d2e42ed5b6 ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/os-security-groups/807eda23-57e6-4e7e-8775-97bf9f38d0d8 0.455s 2020-12-14 02:14:19.022 186 DEBUG tempest.lib.common.rest_client [req-5a630ed2-eb68-47cf-8508-73d2e42ed5b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5a630ed2-eb68-47cf-8508-73d2e42ed5b6', 'x-compute-request-id': 'req-5a630ed2-eb68-47cf-8508-73d2e42ed5b6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/807eda23-57e6-4e7e-8775-97bf9f38d0d8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:19.088 186 INFO tempest.lib.common.rest_client [req-c8a7d852-512d-4f7b-8a0d-cd92e448f8d0 ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/os-security-groups/ed576bb0-1d57-4965-ab9c-399ab849a7ae 0.060s 2020-12-14 02:14:19.092 186 DEBUG tempest.lib.common.rest_client [req-c8a7d852-512d-4f7b-8a0d-cd92e448f8d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '194', 'x-openstack-request-id': 'req-c8a7d852-512d-4f7b-8a0d-cd92e448f8d0', 'x-compute-request-id': 'req-c8a7d852-512d-4f7b-8a0d-cd92e448f8d0', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/ed576bb0-1d57-4965-ab9c-399ab849a7ae'} Body: b'{"itemNotFound": {"code": 404, "message": "Security group ed576bb0-1d57-4965-ab9c-399ab849a7ae does not exist\\nNeutron server returns request_ids: [\'req-03f6d559-0014-4f62-b5b7-0a6bce1ac159\']"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:19.101 197 INFO tempest.lib.common.rest_client [req-7cb1f896-c094-4391-8637-679a0e3822f9 ] Request (HypervisorRbacTest:test_list_hypervisors_with_details): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/detail 0.236s 2020-12-14 02:14:19.105 197 DEBUG tempest.lib.common.rest_client [req-7cb1f896-c094-4391-8637-679a0e3822f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '3115', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7cb1f896-c094-4391-8637-679a0e3822f9', 'x-compute-request-id': 'req-7cb1f896-c094-4391-8637-679a0e3822f9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/detail'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled", "vcpus": 88, "memory_mb": 64312, "local_gb": 100, "vcpus_used": 1, "memory_mb_used": 1024, "local_gb_used": 1, "hypervisor_type": "QEMU", "hypervisor_version": 4000000, "free_ram_mb": 63288, "free_disk_gb": 99, "current_workload": 0, "running_vms": 1, "disk_available_least": 62, "host_ip": "172.30.13.94", "service": {"id": 2, "host": "lf-virtual9", "disabled_reason": null}, "cpu_info": "{\\"arch\\": \\"x86_64\\", \\"model\\": \\"Broadwell-IBRS\\", \\"vendor\\": \\"Intel\\", \\"topology\\": {\\"cells\\": 2, \\"sockets\\": 1, \\"cores\\": 22, \\"threads\\": 2}, \\"features\\": [\\"fxsr\\", \\"syscall\\", \\"hle\\", \\"aes\\", \\"cx16\\", \\"avx2\\", \\"cmov\\", \\"smap\\", \\"pse\\", \\"ssse3\\", \\"xsave\\", \\"f16c\\", \\"rdrand\\", \\"vmx\\", \\"smx\\", \\"apic\\", \\"bmi2\\", \\"tsc_adjust\\", \\"rdtscp\\", \\"osxsave\\", \\"mca\\", \\"vme\\", \\"rdseed\\", \\"monitor\\", \\"spec-ctrl\\", \\"dtes64\\", \\"erms\\", \\"rtm\\", \\"invpcid\\", \\"popcnt\\", \\"pat\\", \\"x2apic\\", \\"pae\\", \\"ssbd\\", \\"arat\\", \\"ss\\", \\"tsc-deadline\\", \\"ds_cpl\\", \\"bmi1\\", \\"pcid\\", \\"pdpe1gb\\", \\"invtsc\\", \\"cx8\\", \\"dca\\", \\"smep\\", \\"mce\\", \\"ht\\", \\"fsgsbase\\", \\"intel-pt\\", \\"fma\\", \\"md-clear\\", \\"pge\\", \\"adx\\", \\"est\\", \\"lm\\", \\"abm\\", \\"lahf_lm\\", \\"acpi\\", \\"sse2\\", \\"tm2\\", \\"pni\\", \\"ds\\", \\"clflush\\", \\"xtpr\\", \\"msr\\", \\"sep\\", \\"pdcm\\", \\"tm\\", \\"nx\\", \\"sse4.1\\", \\"xsaveopt\\", \\"de\\", \\"tsc\\", \\"stibp\\", \\"3dnowprefetch\\", \\"sse4.2\\", \\"avx\\", \\"pbe\\", \\"pse36\\", \\"mmx\\", \\"pclmuldq\\", \\"mtrr\\", \\"movbe\\", \\"sse\\", \\"fpu\\"]}"}, {"id": 2, "hypervisor_hostname": "lf-virtual8", "state": "up", "status": "enabled", "vcpus": 88, "memory_mb": 64312, "local_gb": 100, "vcpus_used": 0, "memory_mb_used": 512, "local_gb_used": 0, "hypervisor_type": "QEMU", "hypervisor_version": 4000000, "free_ram_mb": 63800, "free_disk_gb": 100, "current_workload": 0, "running_vms": 0, "disk_available_least": 62, "host_ip": "172.30.13.93", "service": {"id": 3, "host": "lf-virtual8", "disabled_reason": null}, "cpu_info": "{\\"arch\\": \\"x86_64\\", \\"model\\": \\"Broadwell-IBRS\\", \\"vendor\\": \\"Intel\\", \\"topology\\": {\\"cells\\": 2, \\"sockets\\": 1, \\"cores\\": 22, \\"threads\\": 2}, \\"features\\": [\\"f16c\\", \\"xsave\\", \\"pclmuldq\\", \\"rdtscp\\", \\"ds_cpl\\", \\"pdcm\\", \\"lm\\", \\"sse\\", \\"erms\\", \\"3dnowprefetch\\", \\"pdpe1gb\\", \\"adx\\", \\"apic\\", \\"ssse3\\", \\"bmi1\\", \\"stibp\\", \\"invpcid\\", \\"mmx\\", \\"avx2\\", \\"intel-pt\\", \\"pse36\\", \\"rdrand\\", \\"vmx\\", \\"pcid\\", \\"cx8\\", \\"est\\", \\"tsc-deadline\\", \\"cx16\\", \\"vme\\", \\"pni\\", \\"acpi\\", \\"pse\\", \\"x2apic\\", \\"dtes64\\", \\"de\\", \\"rtm\\", \\"smep\\", \\"mce\\", \\"ssbd\\", \\"xtpr\\", \\"monitor\\", \\"tsc\\", \\"xsaveopt\\", \\"movbe\\", \\"spec-ctrl\\", \\"osxsave\\", \\"ht\\", \\"tm\\", \\"arat\\", \\"abm\\", \\"smx\\", \\"fxsr\\", \\"pbe\\", \\"clflush\\", \\"ds\\", \\"md-clear\\", \\"ss\\", \\"sse4.1\\", \\"invtsc\\", \\"popcnt\\", \\"sse2\\", \\"sse4.2\\", \\"fpu\\", \\"fsgsbase\\", \\"smap\\", \\"pae\\", \\"aes\\", \\"avx\\", \\"tsc_adjust\\", \\"pge\\", \\"nx\\", \\"rdseed\\", \\"lahf_lm\\", \\"cmov\\", \\"fma\\", \\"msr\\", \\"tm2\\", \\"bmi2\\", \\"mtrr\\", \\"dca\\", \\"mca\\", \\"hle\\", \\"pat\\", \\"sep\\", \\"syscall\\"]}"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:19.192 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:19.317 197 INFO tempest.lib.common.rest_client [req-e4343c00-06f7-4c15-bae5-e7b234b489ba ] Request (HypervisorRbacTest:test_list_hypervisors_with_details): 200 GET http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles 0.117s 2020-12-14 02:14:19.321 197 DEBUG tempest.lib.common.rest_client [req-e4343c00-06f7-4c15-bae5-e7b234b489ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4343c00-06f7-4c15-bae5-e7b234b489ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:19.364 186 INFO tempest.lib.common.rest_client [req-55169c62-9ab9-4d9c-a6cc-a93f1d91b40f ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/os-security-groups/5b3ba6d1-4cf7-428d-b49f-70df7905f5a1 0.265s 2020-12-14 02:14:19.367 186 DEBUG tempest.lib.common.rest_client [req-55169c62-9ab9-4d9c-a6cc-a93f1d91b40f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-55169c62-9ab9-4d9c-a6cc-a93f1d91b40f', 'x-compute-request-id': 'req-55169c62-9ab9-4d9c-a6cc-a93f1d91b40f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/5b3ba6d1-4cf7-428d-b49f-70df7905f5a1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:19.377 197 INFO tempest.lib.common.rest_client [req-8bae99ac-ff94-4968-9974-7ec7b8d3e364 ] Request (HypervisorRbacTest:test_list_hypervisors_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:14:19.381 197 DEBUG tempest.lib.common.rest_client [req-8bae99ac-ff94-4968-9974-7ec7b8d3e364 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8bae99ac-ff94-4968-9974-7ec7b8d3e364', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9d96765bf484b8cbb28a9b2408a3c5b", "name": "tempest-HypervisorRbacTest-1153777260", "password_expires_at": null}, "audit_ids": ["Vs4ErTwXRC6NrGO7AWgTCA"], "expires_at": "2020-12-14T03:14:19.000000Z", "issued_at": "2020-12-14T02:14:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d4e4b9d8fee64ca4822f1e55576f32e8", "name": "tempest-HypervisorRbacTest-1153777260"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:19.407 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:19.412 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.415 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.418 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.421 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.425 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.429 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.434 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.437 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.439 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.442 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.445 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.448 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.451 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.454 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.457 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.460 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.463 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.466 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.469 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.471 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.474 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.477 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.480 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.482 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.485 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.488 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.491 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.493 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.496 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.499 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.502 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.504 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.507 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.510 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.513 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.516 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.519 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.521 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.525 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.528 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.528 186 INFO tempest.lib.common.rest_client [req-762cb398-8fe6-43f7-a3c3-7f5de6d11604 ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/72485d39e26a4e25901a096bea538e63 0.155s 2020-12-14 02:14:19.531 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.531 186 DEBUG tempest.lib.common.rest_client [req-762cb398-8fe6-43f7-a3c3-7f5de6d11604 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-762cb398-8fe6-43f7-a3c3-7f5de6d11604', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/72485d39e26a4e25901a096bea538e63'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:19.533 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.536 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.540 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.542 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.545 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.548 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.551 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.554 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.557 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.561 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.564 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.567 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.571 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.576 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.578 189 INFO tempest.lib.common.rest_client [req-fc54db41-c350-4bf9-b2bc-bb888cf6c8ea ] Request (ServerActionsRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 0.979s 2020-12-14 02:14:19.579 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.581 189 DEBUG tempest.lib.common.rest_client [req-fc54db41-c350-4bf9-b2bc-bb888cf6c8ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerActionsRbacTest-server-1660550320", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "1c085583-16aa-4f2c-b48c-e9cce6ab197b"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fc54db41-c350-4bf9-b2bc-bb888cf6c8ea', 'x-compute-request-id': 'req-fc54db41-c350-4bf9-b2bc-bb888cf6c8ea', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "7wDQ4SCEVNkj"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:19.586 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.588 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.590 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.593 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.595 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.597 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.600 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.602 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.604 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.606 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.608 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.611 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.613 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.615 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.617 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:19.625 186 INFO tempest.lib.common.rest_client [req-f76fc68f-e4b2-4c11-bcd0-2d182c5a12fe ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-14 02:14:19.626 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:show, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:19.627 186 DEBUG tempest.lib.common.rest_client [req-f76fc68f-e4b2-4c11-bcd0-2d182c5a12fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f76fc68f-e4b2-4c11-bcd0-2d182c5a12fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["TYj_hjykR-WkSHQu8HqHMA"], "expires_at": "2020-12-14T03:14:19.000000Z", "issued_at": "2020-12-14T02:14:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:19.628 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:19.692 197 INFO tempest.lib.common.rest_client [req-45b3bef1-afae-47c7-b602-61ea2cea8dcc ] Request (HypervisorRbacTest:test_show_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles 0.060s 2020-12-14 02:14:19.694 197 DEBUG tempest.lib.common.rest_client [req-45b3bef1-afae-47c7-b602-61ea2cea8dcc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45b3bef1-afae-47c7-b602-61ea2cea8dcc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:19.721 189 INFO tempest.lib.common.rest_client [req-937d673b-08e1-45f4-adfb-403e15c91a66 ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.112s 2020-12-14 02:14:19.723 189 DEBUG tempest.lib.common.rest_client [req-937d673b-08e1-45f4-adfb-403e15c91a66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1397', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-937d673b-08e1-45f4-adfb-403e15c91a66', 'x-compute-request-id': 'req-937d673b-08e1-45f4-adfb-403e15c91a66', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:20Z", "updated": "2020-12-14T02:14:19Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:19.785 197 INFO tempest.lib.common.rest_client [req-c29be1f9-0d6c-45ef-adcd-bc1326a2ead0 ] Request (HypervisorRbacTest:test_show_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-12-14 02:14:19.789 197 DEBUG tempest.lib.common.rest_client [req-c29be1f9-0d6c-45ef-adcd-bc1326a2ead0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c29be1f9-0d6c-45ef-adcd-bc1326a2ead0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9d96765bf484b8cbb28a9b2408a3c5b", "name": "tempest-HypervisorRbacTest-1153777260", "password_expires_at": null}, "audit_ids": ["ho-onaefTMinv4cilrczOg"], "expires_at": "2020-12-14T03:14:19.000000Z", "issued_at": "2020-12-14T02:14:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d4e4b9d8fee64ca4822f1e55576f32e8", "name": "tempest-HypervisorRbacTest-1153777260"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:19.943 186 INFO tempest.lib.common.rest_client [req-0261978c-a7f0-4d77-823e-3ae48f4c606b ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=33c46f077835416681662f06a975e8b6&name=default 0.309s 2020-12-14 02:14:19.946 186 DEBUG tempest.lib.common.rest_client [req-0261978c-a7f0-4d77-823e-3ae48f4c606b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-0261978c-a7f0-4d77-823e-3ae48f4c606b', 'date': 'Mon, 14 Dec 2020 02:14:19 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=33c46f077835416681662f06a975e8b6&name=default'} Body: b'{"security_groups": [{"id": "a198fdcc-2546-4001-b18b-8a35ec3317d1", "name": "default", "stateful": true, "tenant_id": "33c46f077835416681662f06a975e8b6", "description": "Default security group", "security_group_rules": [{"id": "370f9d24-072d-4d80-9954-6d7e91b382e3", "tenant_id": "33c46f077835416681662f06a975e8b6", "security_group_id": "a198fdcc-2546-4001-b18b-8a35ec3317d1", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:05Z", "updated_at": "2020-12-14T02:14:05Z", "revision_number": 0, "project_id": "33c46f077835416681662f06a975e8b6"}, {"id": "417d00f6-8281-4354-b1f3-bc6d107acb03", "tenant_id": "33c46f077835416681662f06a975e8b6", "security_group_id": "a198fdcc-2546-4001-b18b-8a35ec3317d1", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:05Z", "updated_at": "2020-12-14T02:14:05Z", "revision_number": 0, "project_id": "33c46f077835416681662f06a975e8b6"}, {"id": "8e05ce96-11e0-408b-895a-00027527ac8f", "tenant_id": "33c46f077835416681662f06a975e8b6", "security_group_id": "a198fdcc-2546-4001-b18b-8a35ec3317d1", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a198fdcc-2546-4001-b18b-8a35ec3317d1", "description": null, "tags": [], "created_at": "2020-12-14T02:14:05Z", "updated_at": "2020-12-14T02:14:05Z", "revision_number": 0, "project_id": "33c46f077835416681662f06a975e8b6"}, {"id": "bc780f66-8f7a-453f-b0b0-a80e6d2a0199", "tenant_id": "33c46f077835416681662f06a975e8b6", "security_group_id": "a198fdcc-2546-4001-b18b-8a35ec3317d1", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a198fdcc-2546-4001-b18b-8a35ec3317d1", "description": null, "tags": [], "created_at": "2020-12-14T02:14:05Z", "updated_at": "2020-12-14T02:14:05Z", "revision_number": 0, "project_id": "33c46f077835416681662f06a975e8b6"}], "tags": [], "created_at": "2020-12-14T02:14:05Z", "updated_at": "2020-12-14T02:14:05Z", "revision_number": 1, "project_id": "33c46f077835416681662f06a975e8b6"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:20.002 197 INFO tempest.lib.common.rest_client [req-3cb2ffb5-a6f4-470d-8434-917daa6f3702 ] Request (HypervisorRbacTest:test_show_hypervisor): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/1 0.207s 2020-12-14 02:14:20.005 197 DEBUG tempest.lib.common.rest_client [req-3cb2ffb5-a6f4-470d-8434-917daa6f3702 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1563', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3cb2ffb5-a6f4-470d-8434-917daa6f3702', 'x-compute-request-id': 'req-3cb2ffb5-a6f4-470d-8434-917daa6f3702', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/1'} Body: b'{"hypervisor": {"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled", "vcpus": 88, "memory_mb": 64312, "local_gb": 100, "vcpus_used": 1, "memory_mb_used": 1024, "local_gb_used": 1, "hypervisor_type": "QEMU", "hypervisor_version": 4000000, "free_ram_mb": 63288, "free_disk_gb": 99, "current_workload": 0, "running_vms": 1, "disk_available_least": 62, "host_ip": "172.30.13.94", "service": {"id": 2, "host": "lf-virtual9", "disabled_reason": null}, "cpu_info": "{\\"arch\\": \\"x86_64\\", \\"model\\": \\"Broadwell-IBRS\\", \\"vendor\\": \\"Intel\\", \\"topology\\": {\\"cells\\": 2, \\"sockets\\": 1, \\"cores\\": 22, \\"threads\\": 2}, \\"features\\": [\\"fxsr\\", \\"syscall\\", \\"hle\\", \\"aes\\", \\"cx16\\", \\"avx2\\", \\"cmov\\", \\"smap\\", \\"pse\\", \\"ssse3\\", \\"xsave\\", \\"f16c\\", \\"rdrand\\", \\"vmx\\", \\"smx\\", \\"apic\\", \\"bmi2\\", \\"tsc_adjust\\", \\"rdtscp\\", \\"osxsave\\", \\"mca\\", \\"vme\\", \\"rdseed\\", \\"monitor\\", \\"spec-ctrl\\", \\"dtes64\\", \\"erms\\", \\"rtm\\", \\"invpcid\\", \\"popcnt\\", \\"pat\\", \\"x2apic\\", \\"pae\\", \\"ssbd\\", \\"arat\\", \\"ss\\", \\"tsc-deadline\\", \\"ds_cpl\\", \\"bmi1\\", \\"pcid\\", \\"pdpe1gb\\", \\"invtsc\\", \\"cx8\\", \\"dca\\", \\"smep\\", \\"mce\\", \\"ht\\", \\"fsgsbase\\", \\"intel-pt\\", \\"fma\\", \\"md-clear\\", \\"pge\\", \\"adx\\", \\"est\\", \\"lm\\", \\"abm\\", \\"lahf_lm\\", \\"acpi\\", \\"sse2\\", \\"tm2\\", \\"pni\\", \\"ds\\", \\"clflush\\", \\"xtpr\\", \\"msr\\", \\"sep\\", \\"pdcm\\", \\"tm\\", \\"nx\\", \\"sse4.1\\", \\"xsaveopt\\", \\"de\\", \\"tsc\\", \\"stibp\\", \\"3dnowprefetch\\", \\"sse4.2\\", \\"avx\\", \\"pbe\\", \\"pse36\\", \\"mmx\\", \\"pclmuldq\\", \\"mtrr\\", \\"movbe\\", \\"sse\\", \\"fpu\\"]}"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:20.050 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:20.117 197 INFO tempest.lib.common.rest_client [req-43acde30-d021-4d40-89ff-da68920bd1f4 ] Request (HypervisorRbacTest:test_show_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles 0.062s 2020-12-14 02:14:20.119 197 DEBUG tempest.lib.common.rest_client [req-43acde30-d021-4d40-89ff-da68920bd1f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43acde30-d021-4d40-89ff-da68920bd1f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:20.138 186 INFO tempest.lib.common.rest_client [req-40623f63-a5ea-41b0-9c95-28eac20fce9d ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/a198fdcc-2546-4001-b18b-8a35ec3317d1 0.185s 2020-12-14 02:14:20.141 186 DEBUG tempest.lib.common.rest_client [req-40623f63-a5ea-41b0-9c95-28eac20fce9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-40623f63-a5ea-41b0-9c95-28eac20fce9d', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:14:20 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/a198fdcc-2546-4001-b18b-8a35ec3317d1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:20.197 197 INFO tempest.lib.common.rest_client [req-2301923a-2799-4a55-b66e-064c81fd5c6e ] Request (HypervisorRbacTest:test_show_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.073s 2020-12-14 02:14:20.200 197 DEBUG tempest.lib.common.rest_client [req-2301923a-2799-4a55-b66e-064c81fd5c6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2301923a-2799-4a55-b66e-064c81fd5c6e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9d96765bf484b8cbb28a9b2408a3c5b", "name": "tempest-HypervisorRbacTest-1153777260", "password_expires_at": null}, "audit_ids": ["n7x-f_0GQiiLm0WOigSOuQ"], "expires_at": "2020-12-14T03:14:20.000000Z", "issued_at": "2020-12-14T02:14:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d4e4b9d8fee64ca4822f1e55576f32e8", "name": "tempest-HypervisorRbacTest-1153777260"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:20.224 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:20.227 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.230 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.233 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.235 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.238 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.242 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.246 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.248 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.250 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.252 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.255 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.257 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.259 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.261 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.264 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.267 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.269 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.272 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.274 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.276 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.278 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.281 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.283 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.285 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.287 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.290 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.292 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.294 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.297 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.299 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.301 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.304 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.306 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.308 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.310 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.313 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.315 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.317 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.320 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.323 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.325 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.327 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.330 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.331 186 INFO tempest.lib.common.rest_client [req-2a63730f-7a50-4538-8205-e2659868af13 ] Request (SecurityGroupsRbacMaxV235Test:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6 0.184s 2020-12-14 02:14:20.332 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.333 186 DEBUG tempest.lib.common.rest_client [req-2a63730f-7a50-4538-8205-e2659868af13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a63730f-7a50-4538-8205-e2659868af13', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/33c46f077835416681662f06a975e8b6'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:20.335 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.337 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.339 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.342 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.344 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.346 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.348 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.350 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.353 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.355 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.358 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.360 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.365 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.368 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.370 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.373 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.375 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.377 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.379 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.382 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.384 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.386 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.389 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.391 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.393 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.396 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.398 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:20.406 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:statistics, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:20.408 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:20.451 186 INFO tempest.lib.common.rest_client [req-16b0bdb1-3d9d-410f-bd76-deb2529b3b31 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:14:20.454 186 DEBUG tempest.lib.common.rest_client [req-16b0bdb1-3d9d-410f-bd76-deb2529b3b31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16b0bdb1-3d9d-410f-bd76-deb2529b3b31', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["DwN0-PaCT5KBdZYOyeoktg"], "expires_at": "2020-12-14T03:14:20.000000Z", "issued_at": "2020-12-14T02:14:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:20.604 197 INFO tempest.lib.common.rest_client [req-42d0e3d2-e7df-4836-b171-f00b4f5fa035 ] Request (HypervisorRbacTest:test_show_hypervisor_statistics): 200 GET http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles 0.190s 2020-12-14 02:14:20.607 186 INFO tempest.lib.common.rest_client [req-2792c2ea-ead9-4106-b555-6d5b6319ef96 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:14:20.608 197 DEBUG tempest.lib.common.rest_client [req-42d0e3d2-e7df-4836-b171-f00b4f5fa035 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42d0e3d2-e7df-4836-b171-f00b4f5fa035', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:20.610 186 DEBUG tempest.lib.common.rest_client [req-2792c2ea-ead9-4106-b555-6d5b6319ef96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2792c2ea-ead9-4106-b555-6d5b6319ef96', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["zQS9V0rST6mdMyotFmICOw"], "expires_at": "2020-12-14T03:14:20.000000Z", "issued_at": "2020-12-14T02:14:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:20.681 186 INFO tempest.lib.common.rest_client [req-7a238dd5-c264-45e2-a7fd-2084e1d8ec3a ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.064s 2020-12-14 02:14:20.684 186 DEBUG tempest.lib.common.rest_client [req-7a238dd5-c264-45e2-a7fd-2084e1d8ec3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a238dd5-c264-45e2-a7fd-2084e1d8ec3a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:20.710 197 INFO tempest.lib.common.rest_client [req-32b55018-c27c-4d53-8c6b-1b03e464d8c2 ] Request (HypervisorRbacTest:test_show_hypervisor_statistics): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:14:20.713 197 DEBUG tempest.lib.common.rest_client [req-32b55018-c27c-4d53-8c6b-1b03e464d8c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32b55018-c27c-4d53-8c6b-1b03e464d8c2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9d96765bf484b8cbb28a9b2408a3c5b", "name": "tempest-HypervisorRbacTest-1153777260", "password_expires_at": null}, "audit_ids": ["qrydJj9eTQ2YlUS-WRqN9g"], "expires_at": "2020-12-14T03:14:20.000000Z", "issued_at": "2020-12-14T02:14:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d4e4b9d8fee64ca4822f1e55576f32e8", "name": "tempest-HypervisorRbacTest-1153777260"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:20.763 186 INFO tempest.lib.common.rest_client [req-6488e057-97f0-4ff7-8ad6-80fde5fb91ae ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.072s 2020-12-14 02:14:20.766 186 DEBUG tempest.lib.common.rest_client [req-6488e057-97f0-4ff7-8ad6-80fde5fb91ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SecurtiyGroupsRbacTest-292399113-desc", "domain_id": "default", "name": "tempest-SecurtiyGroupsRbacTest-292399113"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6488e057-97f0-4ff7-8ad6-80fde5fb91ae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "6953bed3e9a64731a022421886bffdd1", "name": "tempest-SecurtiyGroupsRbacTest-292399113", "domain_id": "default", "description": "tempest-SecurtiyGroupsRbacTest-292399113-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:20.897 186 INFO tempest.lib.common.rest_client [req-d8fe9a53-2eaa-49c2-82ac-4e0107abfba3 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.122s 2020-12-14 02:14:20.899 186 DEBUG tempest.lib.common.rest_client [req-d8fe9a53-2eaa-49c2-82ac-4e0107abfba3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SecurtiyGroupsRbacTest-292399113", "password": "I9=PoE3q3xy9BJ5", "project_id": "6953bed3e9a64731a022421886bffdd1", "email": "tempest-SecurtiyGroupsRbacTest-9528472@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '396', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8fe9a53-2eaa-49c2-82ac-4e0107abfba3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "6953bed3e9a64731a022421886bffdd1", "email": "tempest-SecurtiyGroupsRbacTest-9528472@example.com", "id": "d6454cbca87a43e4843df1863d9a4ee6", "name": "tempest-SecurtiyGroupsRbacTest-292399113", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/d6454cbca87a43e4843df1863d9a4ee6"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:20.939 197 INFO tempest.lib.common.rest_client [req-ae904d6f-046a-43dd-aa4e-7ef25b4115b0 ] Request (HypervisorRbacTest:test_show_hypervisor_statistics): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/statistics 0.220s 2020-12-14 02:14:20.942 197 DEBUG tempest.lib.common.rest_client [req-ae904d6f-046a-43dd-aa4e-7ef25b4115b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '266', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ae904d6f-046a-43dd-aa4e-7ef25b4115b0', 'x-compute-request-id': 'req-ae904d6f-046a-43dd-aa4e-7ef25b4115b0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/statistics'} Body: b'{"hypervisor_statistics": {"count": 2, "vcpus": 176, "memory_mb": 128624, "local_gb": 200, "vcpus_used": 1, "memory_mb_used": 1536, "local_gb_used": 1, "free_ram_mb": 127088, "free_disk_gb": 199, "current_workload": 0, "running_vms": 1, "disk_available_least": 124}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:20.965 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:20.969 186 INFO tempest.lib.common.rest_client [req-434d9b73-cb14-42ff-94d3-976061dc3b67 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:14:20.972 186 DEBUG tempest.lib.common.rest_client [req-434d9b73-cb14-42ff-94d3-976061dc3b67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-434d9b73-cb14-42ff-94d3-976061dc3b67', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:20.986 189 INFO tempest.lib.common.rest_client [req-2850b12d-704a-47f3-b67f-ffef5dbbdcef ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.174s 2020-12-14 02:14:20.989 189 DEBUG tempest.lib.common.rest_client [req-2850b12d-704a-47f3-b67f-ffef5dbbdcef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1484', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2850b12d-704a-47f3-b67f-ffef5dbbdcef', 'x-compute-request-id': 'req-2850b12d-704a-47f3-b67f-ffef5dbbdcef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:20Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:21.031 197 INFO tempest.lib.common.rest_client [req-73b93657-79be-40a4-83b3-8b3a1a1a1638 ] Request (HypervisorRbacTest:test_show_hypervisor_statistics): 200 GET http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles 0.060s 2020-12-14 02:14:21.033 197 DEBUG tempest.lib.common.rest_client [req-73b93657-79be-40a4-83b3-8b3a1a1a1638 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73b93657-79be-40a4-83b3-8b3a1a1a1638', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:21.040 186 INFO tempest.lib.common.rest_client [req-ed37bf9e-5df6-4a18-b2b3-c1f280bf4c4e ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:14:21.044 186 DEBUG tempest.lib.common.rest_client [req-ed37bf9e-5df6-4a18-b2b3-c1f280bf4c4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed37bf9e-5df6-4a18-b2b3-c1f280bf4c4e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:21.080 197 INFO tempest.lib.common.rest_client [req-9aa69734-dc92-467c-b5fe-042aeef3fbb3 ] Request (HypervisorRbacTest:test_show_hypervisor_statistics): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:14:21.083 197 DEBUG tempest.lib.common.rest_client [req-9aa69734-dc92-467c-b5fe-042aeef3fbb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9aa69734-dc92-467c-b5fe-042aeef3fbb3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9d96765bf484b8cbb28a9b2408a3c5b", "name": "tempest-HypervisorRbacTest-1153777260", "password_expires_at": null}, "audit_ids": ["x5asCRhHQ6yIy6Wm43KhAQ"], "expires_at": "2020-12-14T03:14:21.000000Z", "issued_at": "2020-12-14T02:14:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d4e4b9d8fee64ca4822f1e55576f32e8", "name": "tempest-HypervisorRbacTest-1153777260"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:21.091 189 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 2 second wait 2020-12-14 02:14:21.105 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:21.109 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.111 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.114 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.117 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.120 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.124 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.130 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.133 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.136 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.140 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.143 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.144 186 INFO tempest.lib.common.rest_client [req-f482dc23-d907-4227-8047-b2cc0e10f8c5 ] Request (SecurtiyGroupsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles/72a4576c553448cd941b052c1ca0cf2d 0.087s 2020-12-14 02:14:21.146 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.147 186 DEBUG tempest.lib.common.rest_client [req-f482dc23-d907-4227-8047-b2cc0e10f8c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f482dc23-d907-4227-8047-b2cc0e10f8c5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:21.148 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.150 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SecurtiyGroupsRbacTest-292399113', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6953bed3e9a64731a022421886bffdd1', 'project_name': 'tempest-SecurtiyGroupsRbacTest-292399113', 'tenant_id': '6953bed3e9a64731a022421886bffdd1', 'tenant_name': 'tempest-SecurtiyGroupsRbacTest-292399113', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd6454cbca87a43e4843df1863d9a4ee6'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:21.151 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.154 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.157 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.159 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.161 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.164 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.166 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.168 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.170 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.172 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.174 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.176 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.178 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.181 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.183 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.185 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.187 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.189 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.191 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.194 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.196 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.198 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.200 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.203 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.205 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.207 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.210 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.212 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.215 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.217 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.220 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.222 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.224 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.226 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.228 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.231 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.233 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.235 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.238 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.240 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.242 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.245 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.247 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.252 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.254 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.254 186 INFO tempest.lib.common.rest_client [req-c1e47963-95ec-44e3-bb16-d894523ba9b9 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:14:21.256 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.258 186 DEBUG tempest.lib.common.rest_client [req-c1e47963-95ec-44e3-bb16-d894523ba9b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c1e47963-95ec-44e3-bb16-d894523ba9b9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ubEdbubsTlCrCbaTuBHWRg"], "expires_at": "2020-12-14T03:14:21.000000Z", "issued_at": "2020-12-14T02:14:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:21.258 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.261 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.263 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.265 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.267 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.269 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.272 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.274 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.276 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.278 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.281 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.283 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:21.291 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:uptime, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:21.292 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:21.352 197 INFO tempest.lib.common.rest_client [req-6c26d678-a587-437b-9e70-edcaa041e717 ] Request (HypervisorRbacTest:test_show_hypervisor_uptime): 200 GET http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles 0.055s 2020-12-14 02:14:21.355 197 DEBUG tempest.lib.common.rest_client [req-6c26d678-a587-437b-9e70-edcaa041e717 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c26d678-a587-437b-9e70-edcaa041e717', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:21.454 197 INFO tempest.lib.common.rest_client [req-8de72e58-c697-4fc8-a936-eda010d10e00 ] Request (HypervisorRbacTest:test_show_hypervisor_uptime): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:14:21.456 197 DEBUG tempest.lib.common.rest_client [req-8de72e58-c697-4fc8-a936-eda010d10e00 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8de72e58-c697-4fc8-a936-eda010d10e00', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9d96765bf484b8cbb28a9b2408a3c5b", "name": "tempest-HypervisorRbacTest-1153777260", "password_expires_at": null}, "audit_ids": ["QChDRoAASsyRrAk5ALDv0Q"], "expires_at": "2020-12-14T03:14:21.000000Z", "issued_at": "2020-12-14T02:14:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d4e4b9d8fee64ca4822f1e55576f32e8", "name": "tempest-HypervisorRbacTest-1153777260"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:21.773 197 INFO tempest.lib.common.rest_client [req-a578003b-510b-4af4-b1a3-202608bb57b4 ] Request (HypervisorRbacTest:test_show_hypervisor_uptime): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/1/uptime 0.311s 2020-12-14 02:14:21.777 197 DEBUG tempest.lib.common.rest_client [req-a578003b-510b-4af4-b1a3-202608bb57b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '185', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a578003b-510b-4af4-b1a3-202608bb57b4', 'x-compute-request-id': 'req-a578003b-510b-4af4-b1a3-202608bb57b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/1/uptime'} Body: b'{"hypervisor": {"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled", "uptime": " 18:14:21 up 68 days, 5:49, 0 users, load average: 7.58, 7.21, 7.63\\n"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:21.795 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:21.894 197 INFO tempest.lib.common.rest_client [req-061ba966-da76-4fba-8e5f-d08bdd1c93f0 ] Request (HypervisorRbacTest:test_show_hypervisor_uptime): 200 GET http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles 0.094s 2020-12-14 02:14:21.897 197 DEBUG tempest.lib.common.rest_client [req-061ba966-da76-4fba-8e5f-d08bdd1c93f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-061ba966-da76-4fba-8e5f-d08bdd1c93f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8/users/c9d96765bf484b8cbb28a9b2408a3c5b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:21.945 197 INFO tempest.lib.common.rest_client [req-2053013f-b67b-4979-ba95-cd4e5148d064 ] Request (HypervisorRbacTest:test_show_hypervisor_uptime): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:14:21.948 197 DEBUG tempest.lib.common.rest_client [req-2053013f-b67b-4979-ba95-cd4e5148d064 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2053013f-b67b-4979-ba95-cd4e5148d064', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9d96765bf484b8cbb28a9b2408a3c5b", "name": "tempest-HypervisorRbacTest-1153777260", "password_expires_at": null}, "audit_ids": ["jkduG-oCRpi0OlG_SVEWfQ"], "expires_at": "2020-12-14T03:14:21.000000Z", "issued_at": "2020-12-14T02:14:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d4e4b9d8fee64ca4822f1e55576f32e8", "name": "tempest-HypervisorRbacTest-1153777260"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d4e4b9d8fee64ca4822f1e55576f32e8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:21.966 186 INFO tempest.lib.common.rest_client [req-0240b923-54cb-470e-b966-b07254904fed ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.701s 2020-12-14 02:14:21.968 186 DEBUG tempest.lib.common.rest_client [req-0240b923-54cb-470e-b966-b07254904fed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-SecurtiyGroupsRbacTest-14230347-network", "tenant_id": "6953bed3e9a64731a022421886bffdd1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '736', 'x-openstack-request-id': 'req-0240b923-54cb-470e-b966-b07254904fed', 'date': 'Mon, 14 Dec 2020 02:14:21 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"0238966e-2ff5-45a9-a802-c7e41594a9d8","name":"tempest-SecurtiyGroupsRbacTest-14230347-network","tenant_id":"6953bed3e9a64731a022421886bffdd1","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"6953bed3e9a64731a022421886bffdd1","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":65,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:14:21Z","updated_at":"2020-12-14T02:14:21Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:22.106 197 INFO tempest.lib.common.rest_client [req-1616e4ee-a260-4c18-86ab-bf4e0d6832b6 ] Request (HypervisorRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/c9d96765bf484b8cbb28a9b2408a3c5b 0.131s 2020-12-14 02:14:22.109 197 DEBUG tempest.lib.common.rest_client [req-1616e4ee-a260-4c18-86ab-bf4e0d6832b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1616e4ee-a260-4c18-86ab-bf4e0d6832b6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/c9d96765bf484b8cbb28a9b2408a3c5b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:22.192 197 INFO tempest.lib.common.rest_client [req-63438f1c-4eb5-4435-87c1-a0f760a3b4b6 ] Request (HypervisorRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.076s 2020-12-14 02:14:22.195 197 DEBUG tempest.lib.common.rest_client [req-63438f1c-4eb5-4435-87c1-a0f760a3b4b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63438f1c-4eb5-4435-87c1-a0f760a3b4b6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["iQtzU2CiTt-hcpqnV_5eEw"], "expires_at": "2020-12-14T03:14:22.000000Z", "issued_at": "2020-12-14T02:14:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:22.276 189 INFO tempest.lib.common.rest_client [req-053460fa-79de-47be-92ef-0e994b350afa ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.178s 2020-12-14 02:14:22.278 189 DEBUG tempest.lib.common.rest_client [req-053460fa-79de-47be-92ef-0e994b350afa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1490', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-053460fa-79de-47be-92ef-0e994b350afa', 'x-compute-request-id': 'req-053460fa-79de-47be-92ef-0e994b350afa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:22.378 189 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 3 second wait 2020-12-14 02:14:22.748 197 INFO tempest.lib.common.rest_client [req-7f061b29-7441-4a25-ab86-e59bdc6c2416 ] Request (HypervisorRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d4e4b9d8fee64ca4822f1e55576f32e8&name=default 0.546s 2020-12-14 02:14:22.752 197 DEBUG tempest.lib.common.rest_client [req-7f061b29-7441-4a25-ab86-e59bdc6c2416 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-7f061b29-7441-4a25-ab86-e59bdc6c2416', 'date': 'Mon, 14 Dec 2020 02:14:22 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d4e4b9d8fee64ca4822f1e55576f32e8&name=default'} Body: b'{"security_groups": [{"id": "0efbd323-233c-43ff-9953-2743ee6e4ff7", "name": "default", "stateful": true, "tenant_id": "d4e4b9d8fee64ca4822f1e55576f32e8", "description": "Default security group", "security_group_rules": [{"id": "38874f1f-3c47-4599-b16a-b0dae143b0d8", "tenant_id": "d4e4b9d8fee64ca4822f1e55576f32e8", "security_group_id": "0efbd323-233c-43ff-9953-2743ee6e4ff7", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "0efbd323-233c-43ff-9953-2743ee6e4ff7", "description": null, "tags": [], "created_at": "2020-12-14T02:14:22Z", "updated_at": "2020-12-14T02:14:22Z", "revision_number": 0, "project_id": "d4e4b9d8fee64ca4822f1e55576f32e8"}, {"id": "e6801fd1-04f4-4d1f-bd4a-c8e20ab494ed", "tenant_id": "d4e4b9d8fee64ca4822f1e55576f32e8", "security_group_id": "0efbd323-233c-43ff-9953-2743ee6e4ff7", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:22Z", "updated_at": "2020-12-14T02:14:22Z", "revision_number": 0, "project_id": "d4e4b9d8fee64ca4822f1e55576f32e8"}, {"id": "ed18d8fa-a4df-47ed-b9ce-008f7730a96e", "tenant_id": "d4e4b9d8fee64ca4822f1e55576f32e8", "security_group_id": "0efbd323-233c-43ff-9953-2743ee6e4ff7", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:22Z", "updated_at": "2020-12-14T02:14:22Z", "revision_number": 0, "project_id": "d4e4b9d8fee64ca4822f1e55576f32e8"}, {"id": "f6de8d4c-4378-44a1-8367-af83a03d0727", "tenant_id": "d4e4b9d8fee64ca4822f1e55576f32e8", "security_group_id": "0efbd323-233c-43ff-9953-2743ee6e4ff7", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "0efbd323-233c-43ff-9953-2743ee6e4ff7", "description": null, "tags": [], "created_at": "2020-12-14T02:14:22Z", "updated_at": "2020-12-14T02:14:22Z", "revision_number": 0, "project_id": "d4e4b9d8fee64ca4822f1e55576f32e8"}], "tags": [], "created_at": "2020-12-14T02:14:22Z", "updated_at": "2020-12-14T02:14:22Z", "revision_number": 1, "project_id": "d4e4b9d8fee64ca4822f1e55576f32e8"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:22.832 186 INFO tempest.lib.common.rest_client [req-d5bffea1-d821-4918-a90d-ff36c5acfb87 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.853s 2020-12-14 02:14:22.835 186 DEBUG tempest.lib.common.rest_client [req-d5bffea1-d821-4918-a90d-ff36c5acfb87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "0238966e-2ff5-45a9-a802-c7e41594a9d8", "cidr": "192.168.120.0/28", "name": "tempest-SecurtiyGroupsRbacTest-14230347-subnet", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '708', 'x-openstack-request-id': 'req-d5bffea1-d821-4918-a90d-ff36c5acfb87', 'date': 'Mon, 14 Dec 2020 02:14:22 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"be5de3d1-91f7-43bb-97ca-ee82b79fbd1b","name":"tempest-SecurtiyGroupsRbacTest-14230347-subnet","tenant_id":"6953bed3e9a64731a022421886bffdd1","network_id":"0238966e-2ff5-45a9-a802-c7e41594a9d8","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:14:22Z","updated_at":"2020-12-14T02:14:22Z","revision_number":0,"project_id":"6953bed3e9a64731a022421886bffdd1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:22.837 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SecurtiyGroupsRbacTest-292399113', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6953bed3e9a64731a022421886bffdd1', 'project_name': 'tempest-SecurtiyGroupsRbacTest-292399113', 'tenant_id': '6953bed3e9a64731a022421886bffdd1', 'tenant_name': 'tempest-SecurtiyGroupsRbacTest-292399113', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd6454cbca87a43e4843df1863d9a4ee6'}, Network: {'id': '0238966e-2ff5-45a9-a802-c7e41594a9d8', 'name': 'tempest-SecurtiyGroupsRbacTest-14230347-network', 'tenant_id': '6953bed3e9a64731a022421886bffdd1', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '6953bed3e9a64731a022421886bffdd1', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 65, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:14:21Z', 'updated_at': '2020-12-14T02:14:21Z', 'revision_number': 1}, Subnet: {'id': 'be5de3d1-91f7-43bb-97ca-ee82b79fbd1b', 'name': 'tempest-SecurtiyGroupsRbacTest-14230347-subnet', 'tenant_id': '6953bed3e9a64731a022421886bffdd1', 'network_id': '0238966e-2ff5-45a9-a802-c7e41594a9d8', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:22Z', 'updated_at': '2020-12-14T02:14:22Z', 'revision_number': 0, 'project_id': '6953bed3e9a64731a022421886bffdd1'}, Router: None 2020-12-14 02:14:22.900 197 INFO tempest.lib.common.rest_client [req-2138cf35-3187-4e23-8976-b528b1a31701 ] Request (HypervisorRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/0efbd323-233c-43ff-9953-2743ee6e4ff7 0.142s 2020-12-14 02:14:22.903 197 DEBUG tempest.lib.common.rest_client [req-2138cf35-3187-4e23-8976-b528b1a31701 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2138cf35-3187-4e23-8976-b528b1a31701', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:14:22 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/0efbd323-233c-43ff-9953-2743ee6e4ff7'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.001 186 INFO tempest.lib.common.rest_client [req-3a0e0f08-3df4-4591-bf39-784438b93fb0 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:14:23.005 186 DEBUG tempest.lib.common.rest_client [req-3a0e0f08-3df4-4591-bf39-784438b93fb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6573', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a0e0f08-3df4-4591-bf39-784438b93fb0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d6454cbca87a43e4843df1863d9a4ee6", "name": "tempest-SecurtiyGroupsRbacTest-292399113", "password_expires_at": null}, "audit_ids": ["EwK8iNbERsy5gY-H8TP-uQ"], "expires_at": "2020-12-14T03:14:22.000000Z", "issued_at": "2020-12-14T02:14:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6953bed3e9a64731a022421886bffdd1", "name": "tempest-SecurtiyGroupsRbacTest-292399113"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://1 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.054 197 INFO tempest.lib.common.rest_client [req-4e9b8c8f-d7ec-479b-860b-552866c5f6bf ] Request (HypervisorRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8 0.143s 2020-12-14 02:14:23.058 197 DEBUG tempest.lib.common.rest_client [req-4e9b8c8f-d7ec-479b-860b-552866c5f6bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e9b8c8f-d7ec-479b-860b-552866c5f6bf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d4e4b9d8fee64ca4822f1e55576f32e8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.104 186 INFO tempest.lib.common.rest_client [req-8100c530-64fa-4f05-a351-8a5a763e80d3 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:14:23.108 186 DEBUG tempest.lib.common.rest_client [req-8100c530-64fa-4f05-a351-8a5a763e80d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8100c530-64fa-4f05-a351-8a5a763e80d3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["8TE9yXBLSE2X1W2b_ndCNQ"], "expires_at": "2020-12-14T03:14:23.000000Z", "issued_at": "2020-12-14T02:14:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.127 197 INFO tempest.lib.common.rest_client [req-ea1932e4-bdda-47f2-817c-19aa42fc2a69 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:14:23.130 197 DEBUG tempest.lib.common.rest_client [req-ea1932e4-bdda-47f2-817c-19aa42fc2a69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea1932e4-bdda-47f2-817c-19aa42fc2a69', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["sCv1LOJJQyWtJbLLyR0hqQ"], "expires_at": "2020-12-14T03:14:23.000000Z", "issued_at": "2020-12-14T02:14:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.212 197 INFO tempest.lib.common.rest_client [req-c21969a7-72bf-4251-b381-cb89096ee2b9 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:14:23.214 197 DEBUG tempest.lib.common.rest_client [req-c21969a7-72bf-4251-b381-cb89096ee2b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c21969a7-72bf-4251-b381-cb89096ee2b9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["AITQFov8TPmJe8H_yLJ5Rw"], "expires_at": "2020-12-14T03:14:23.000000Z", "issued_at": "2020-12-14T02:14:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.219 186 INFO tempest.lib.common.rest_client [req-283e6494-bd38-4998-8c5e-c44e5aa23cd3 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:14:23.221 186 DEBUG tempest.lib.common.rest_client [req-283e6494-bd38-4998-8c5e-c44e5aa23cd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-283e6494-bd38-4998-8c5e-c44e5aa23cd3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["16ZYfTVDTP-WKkTS27dnGQ"], "expires_at": "2020-12-14T03:14:23.000000Z", "issued_at": "2020-12-14T02:14:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.276 197 INFO tempest.lib.common.rest_client [req-56d58674-81b7-4f0c-856b-7fee0bfcb788 ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.056s 2020-12-14 02:14:23.278 197 DEBUG tempest.lib.common.rest_client [req-56d58674-81b7-4f0c-856b-7fee0bfcb788 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56d58674-81b7-4f0c-856b-7fee0bfcb788', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.280 186 INFO tempest.lib.common.rest_client [req-2cb32c5a-7ef5-47f3-a84b-49da3c23b393 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.054s 2020-12-14 02:14:23.283 186 DEBUG tempest.lib.common.rest_client [req-2cb32c5a-7ef5-47f3-a84b-49da3c23b393 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2cb32c5a-7ef5-47f3-a84b-49da3c23b393', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.344 186 INFO tempest.lib.common.rest_client [req-0f1fd649-ffb6-4196-a785-6f0d85757a0a ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-12-14 02:14:23.347 186 DEBUG tempest.lib.common.rest_client [req-0f1fd649-ffb6-4196-a785-6f0d85757a0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f1fd649-ffb6-4196-a785-6f0d85757a0a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.350 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:14:23.352 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:23.355 197 INFO tempest.lib.common.rest_client [req-74898118-9f01-4837-bbbb-d3ef39e28422 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.071s 2020-12-14 02:14:23.357 197 DEBUG tempest.lib.common.rest_client [req-74898118-9f01-4837-bbbb-d3ef39e28422 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImagesMetadataRbacTest-1129545559-desc", "domain_id": "default", "name": "tempest-ImagesMetadataRbacTest-1129545559"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74898118-9f01-4837-bbbb-d3ef39e28422', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "21ee5a672ddd44f7a4c48346daaf0211", "name": "tempest-ImagesMetadataRbacTest-1129545559", "domain_id": "default", "description": "tempest-ImagesMetadataRbacTest-1129545559-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.465 186 INFO tempest.lib.common.rest_client [req-7ac2605f-1f6a-4f96-b58b-502dabf51453 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles 0.108s 2020-12-14 02:14:23.469 186 DEBUG tempest.lib.common.rest_client [req-7ac2605f-1f6a-4f96-b58b-502dabf51453 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ac2605f-1f6a-4f96-b58b-502dabf51453', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.475 197 INFO tempest.lib.common.rest_client [req-7006cb4e-e95d-4e50-a269-dce9af1bc4d5 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.111s 2020-12-14 02:14:23.477 197 DEBUG tempest.lib.common.rest_client [req-7006cb4e-e95d-4e50-a269-dce9af1bc4d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImagesMetadataRbacTest-1129545559", "password": "Q4&dNf@MM9BHjge", "project_id": "21ee5a672ddd44f7a4c48346daaf0211", "email": "tempest-ImagesMetadataRbacTest-1846887089@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '400', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7006cb4e-e95d-4e50-a269-dce9af1bc4d5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "21ee5a672ddd44f7a4c48346daaf0211", "email": "tempest-ImagesMetadataRbacTest-1846887089@example.com", "id": "3dee4fbc99b54dd79e8b9e98e32f97b0", "name": "tempest-ImagesMetadataRbacTest-1129545559", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/3dee4fbc99b54dd79e8b9e98e32f97b0"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.586 197 INFO tempest.lib.common.rest_client [req-29107eab-28d9-4fbb-aa08-e9d247827b09 ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.104s 2020-12-14 02:14:23.588 197 DEBUG tempest.lib.common.rest_client [req-29107eab-28d9-4fbb-aa08-e9d247827b09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29107eab-28d9-4fbb-aa08-e9d247827b09', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.608 186 INFO tempest.lib.common.rest_client [req-01679370-125b-4d92-9bb6-e2c53781f1fa ] Request (SecurtiyGroupsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles/72a4576c553448cd941b052c1ca0cf2d 0.132s 2020-12-14 02:14:23.611 186 DEBUG tempest.lib.common.rest_client [req-01679370-125b-4d92-9bb6-e2c53781f1fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01679370-125b-4d92-9bb6-e2c53781f1fa', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.619 189 INFO tempest.lib.common.rest_client [req-165f1971-abbc-4e72-8162-e5da23c4d01a ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.232s 2020-12-14 02:14:23.622 189 DEBUG tempest.lib.common.rest_client [req-165f1971-abbc-4e72-8162-e5da23c4d01a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-165f1971-abbc-4e72-8162-e5da23c4d01a', 'x-compute-request-id': 'req-165f1971-abbc-4e72-8162-e5da23c4d01a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.697 197 INFO tempest.lib.common.rest_client [req-696ebb09-5338-4dce-9c1e-aaa3f0500ebc ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.101s 2020-12-14 02:14:23.700 197 DEBUG tempest.lib.common.rest_client [req-696ebb09-5338-4dce-9c1e-aaa3f0500ebc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-696ebb09-5338-4dce-9c1e-aaa3f0500ebc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.728 186 INFO tempest.lib.common.rest_client [req-0ec2e709-fb8b-498d-ac68-bcef72c1bcb4 ] Request (SecurtiyGroupsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles/a629c95d64b3416fb80ae90af4f69c05 0.110s 2020-12-14 02:14:23.730 186 DEBUG tempest.lib.common.rest_client [req-0ec2e709-fb8b-498d-ac68-bcef72c1bcb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ec2e709-fb8b-498d-ac68-bcef72c1bcb4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.824 197 INFO tempest.lib.common.rest_client [req-d33ad341-6570-414f-8d1e-e5713dc26687 ] Request (ImagesMetadataRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles/72a4576c553448cd941b052c1ca0cf2d 0.118s 2020-12-14 02:14:23.826 197 DEBUG tempest.lib.common.rest_client [req-d33ad341-6570-414f-8d1e-e5713dc26687 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d33ad341-6570-414f-8d1e-e5713dc26687', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:23.828 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesMetadataRbacTest-1129545559', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '21ee5a672ddd44f7a4c48346daaf0211', 'project_name': 'tempest-ImagesMetadataRbacTest-1129545559', 'tenant_id': '21ee5a672ddd44f7a4c48346daaf0211', 'tenant_name': 'tempest-ImagesMetadataRbacTest-1129545559', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '3dee4fbc99b54dd79e8b9e98e32f97b0'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:23.830 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesMetadataRbacTest-1129545559', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '21ee5a672ddd44f7a4c48346daaf0211', 'project_name': 'tempest-ImagesMetadataRbacTest-1129545559', 'tenant_id': '21ee5a672ddd44f7a4c48346daaf0211', 'tenant_name': 'tempest-ImagesMetadataRbacTest-1129545559', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '3dee4fbc99b54dd79e8b9e98e32f97b0'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:23.979 197 INFO tempest.lib.common.rest_client [req-c37dde68-2806-4650-8145-a3f55370c6d1 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:14:23.981 197 DEBUG tempest.lib.common.rest_client [req-c37dde68-2806-4650-8145-a3f55370c6d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c37dde68-2806-4650-8145-a3f55370c6d1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3dee4fbc99b54dd79e8b9e98e32f97b0", "name": "tempest-ImagesMetadataRbacTest-1129545559", "password_expires_at": null}, "audit_ids": ["KaLAkJrpTN6MDnsl25Fe6Q"], "expires_at": "2020-12-14T03:14:23.000000Z", "issued_at": "2020-12-14T02:14:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ee5a672ddd44f7a4c48346daaf0211", "name": "tempest-ImagesMetadataRbacTest-1129545559"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:24.077 197 INFO tempest.lib.common.rest_client [req-ef064a27-af37-42d7-928c-6fbac30caada ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-14 02:14:24.079 197 DEBUG tempest.lib.common.rest_client [req-ef064a27-af37-42d7-928c-6fbac30caada ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef064a27-af37-42d7-928c-6fbac30caada', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["svizJGKlTN-Tj0sLMXqgqQ"], "expires_at": "2020-12-14T03:14:24.000000Z", "issued_at": "2020-12-14T02:14:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:24.172 197 INFO tempest.lib.common.rest_client [req-98f80dad-449a-4c26-aab9-eaa7f388f629 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:14:24.175 197 DEBUG tempest.lib.common.rest_client [req-98f80dad-449a-4c26-aab9-eaa7f388f629 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98f80dad-449a-4c26-aab9-eaa7f388f629', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["iPuIGJ3hRQ-Wlcdi-ESG7Q"], "expires_at": "2020-12-14T03:14:24.000000Z", "issued_at": "2020-12-14T02:14:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:24.238 197 INFO tempest.lib.common.rest_client [req-1760d717-7c06-46fb-874a-66ed1edb59e7 ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.056s 2020-12-14 02:14:24.241 197 DEBUG tempest.lib.common.rest_client [req-1760d717-7c06-46fb-874a-66ed1edb59e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1760d717-7c06-46fb-874a-66ed1edb59e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:24.349 197 INFO tempest.lib.common.rest_client [req-e857960e-4f48-4556-8d1d-9c4bc223dadb ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.102s 2020-12-14 02:14:24.351 197 DEBUG tempest.lib.common.rest_client [req-e857960e-4f48-4556-8d1d-9c4bc223dadb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e857960e-4f48-4556-8d1d-9c4bc223dadb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:24.355 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:14:24.357 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:24.416 197 INFO tempest.lib.common.rest_client [req-6f2be4e1-bbcd-44c3-8da4-5534ba660b24 ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles 0.055s 2020-12-14 02:14:24.418 197 DEBUG tempest.lib.common.rest_client [req-6f2be4e1-bbcd-44c3-8da4-5534ba660b24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f2be4e1-bbcd-44c3-8da4-5534ba660b24', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:24.475 197 INFO tempest.lib.common.rest_client [req-637d000d-6881-4852-880f-b8a5cc3aa023 ] Request (ImagesMetadataRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles/72a4576c553448cd941b052c1ca0cf2d 0.052s 2020-12-14 02:14:24.477 197 DEBUG tempest.lib.common.rest_client [req-637d000d-6881-4852-880f-b8a5cc3aa023 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-637d000d-6881-4852-880f-b8a5cc3aa023', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:24.588 197 INFO tempest.lib.common.rest_client [req-86bd53fe-0a54-4add-86c4-5ec32f13a1ef ] Request (ImagesMetadataRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles/a629c95d64b3416fb80ae90af4f69c05 0.107s 2020-12-14 02:14:24.590 197 DEBUG tempest.lib.common.rest_client [req-86bd53fe-0a54-4add-86c4-5ec32f13a1ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-86bd53fe-0a54-4add-86c4-5ec32f13a1ef', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:24.838 186 INFO tempest.lib.common.rest_client [req-6f749d91-9d19-4a88-abd9-c52633424740 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:14:24.841 186 DEBUG tempest.lib.common.rest_client [req-6f749d91-9d19-4a88-abd9-c52633424740 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f749d91-9d19-4a88-abd9-c52633424740', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d6454cbca87a43e4843df1863d9a4ee6", "name": "tempest-SecurtiyGroupsRbacTest-292399113", "password_expires_at": null}, "audit_ids": ["fNQsMTNURT-Qn3FDxNNmWg"], "expires_at": "2020-12-14T03:14:24.000000Z", "issued_at": "2020-12-14T02:14:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6953bed3e9a64731a022421886bffdd1", "name": "tempest-SecurtiyGroupsRbacTest-292399113"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:24.951 189 INFO tempest.lib.common.rest_client [req-c4d1ae97-0ba9-4c89-97ad-46e3957e6c1f ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.218s 2020-12-14 02:14:24.953 189 DEBUG tempest.lib.common.rest_client [req-c4d1ae97-0ba9-4c89-97ad-46e3957e6c1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c4d1ae97-0ba9-4c89-97ad-46e3957e6c1f', 'x-compute-request-id': 'req-c4d1ae97-0ba9-4c89-97ad-46e3957e6c1f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:24.959 186 INFO tempest.lib.common.rest_client [req-2b2210f8-7848-4f11-84ad-8d8ffc42ce33 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:14:24.962 186 DEBUG tempest.lib.common.rest_client [req-2b2210f8-7848-4f11-84ad-8d8ffc42ce33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b2210f8-7848-4f11-84ad-8d8ffc42ce33', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d6454cbca87a43e4843df1863d9a4ee6", "name": "tempest-SecurtiyGroupsRbacTest-292399113", "password_expires_at": null}, "audit_ids": ["7I5xWLTmRH6X7t47Vy45BA"], "expires_at": "2020-12-14T03:14:24.000000Z", "issued_at": "2020-12-14T02:14:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6953bed3e9a64731a022421886bffdd1", "name": "tempest-SecurtiyGroupsRbacTest-292399113"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:24.969 186 INFO tempest.lib.common.fixed_network [-] (SecurtiyGroupsRbacTest:setUpClass) Found network {'id': '0238966e-2ff5-45a9-a802-c7e41594a9d8', 'name': 'tempest-SecurtiyGroupsRbacTest-14230347-network', 'tenant_id': '6953bed3e9a64731a022421886bffdd1', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '6953bed3e9a64731a022421886bffdd1', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 65, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:14:21Z', 'updated_at': '2020-12-14T02:14:21Z', 'revision_number': 1} available for tenant 2020-12-14 02:14:25.694 193 INFO tempest.lib.common.rest_client [req-7b35ad36-a6fd-4dce-aa1d-5bf9b7288cbb ] Request (ServerConsolesRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e 5.774s 2020-12-14 02:14:25.697 193 DEBUG tempest.lib.common.rest_client [req-7b35ad36-a6fd-4dce-aa1d-5bf9b7288cbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1682', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7b35ad36-a6fd-4dce-aa1d-5bf9b7288cbb', 'x-compute-request-id': 'req-7b35ad36-a6fd-4dce-aa1d-5bf9b7288cbb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e'} Body: b'{"server": {"id": "ad76074f-74fc-4e91-b8a0-4eee44b0ad1e", "name": "tempest-ServerConsolesRbacTest-server-876389742", "status": "ACTIVE", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "user_id": "5061a16d2eeb43f98ad0aada2c68da9b", "metadata": {}, "hostId": "fc3f0cd2beac00d12da95cabcbf1160f3f05c30bfc009c2ed86610de", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:04Z", "updated": "2020-12-14T02:14:19Z", "addresses": {"tempest-ServerConsolesRbacTest-734479438-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:50:5d:ac"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:12.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:25.711 197 INFO tempest.lib.common.rest_client [req-515f9b89-8003-467f-b7cc-8b4d1a511292 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.114s 2020-12-14 02:14:25.714 197 DEBUG tempest.lib.common.rest_client [req-515f9b89-8003-467f-b7cc-8b4d1a511292 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-515f9b89-8003-467f-b7cc-8b4d1a511292', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3dee4fbc99b54dd79e8b9e98e32f97b0", "name": "tempest-ImagesMetadataRbacTest-1129545559", "password_expires_at": null}, "audit_ids": ["RLvgpWuaS3-LysrwYPNFqg"], "expires_at": "2020-12-14T03:14:25.000000Z", "issued_at": "2020-12-14T02:14:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ee5a672ddd44f7a4c48346daaf0211", "name": "tempest-ImagesMetadataRbacTest-1129545559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:25.896 197 INFO tempest.lib.common.rest_client [req-1e73ba44-817c-4b82-bd60-7a3082c78b59 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/image/v2/images 0.170s 2020-12-14 02:14:25.899 197 DEBUG tempest.lib.common.rest_client [req-1e73ba44-817c-4b82-bd60-7a3082c78b59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesMetadataRbacTest-image-2075058837"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '651', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/5d1079d2-5186-4d7d-9c09-23169f69d861', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-1e73ba44-817c-4b82-bd60-7a3082c78b59', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesMetadataRbacTest-image-2075058837", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "21ee5a672ddd44f7a4c48346daaf0211", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "5d1079d2-5186-4d7d-9c09-23169f69d861", "created_at": "2020-12-14T02:14:26Z", "updated_at": "2020-12-14T02:14:26Z", "tags": [], "self": "/v2/images/5d1079d2-5186-4d7d-9c09-23169f69d861", "file": "/v2/images/5d1079d2-5186-4d7d-9c09-23169f69d861/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:25.906 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:25.947 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:25.956 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:25.958 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:26.013 186 INFO tempest.lib.common.rest_client [req-8b511e9c-bd48-415f-a281-7f06e6724a54 ] Request (SecurtiyGroupsRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 1.034s 2020-12-14 02:14:26.015 186 DEBUG tempest.lib.common.rest_client [req-8b511e9c-bd48-415f-a281-7f06e6724a54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-SecurtiyGroupsRbacTest-server-1712569055", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "0238966e-2ff5-45a9-a802-c7e41594a9d8"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8b511e9c-bd48-415f-a281-7f06e6724a54', 'x-compute-request-id': 'req-8b511e9c-bd48-415f-a281-7f06e6724a54', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "J3GGtTTLK8rW"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:26.133 197 INFO tempest.lib.common.rest_client [req-fa362ab2-a16b-49b1-a94d-d41ced120e7e ] Request (ImagesMetadataRbacTest:test_create_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles 0.169s 2020-12-14 02:14:26.136 197 DEBUG tempest.lib.common.rest_client [req-fa362ab2-a16b-49b1-a94d-d41ced120e7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa362ab2-a16b-49b1-a94d-d41ced120e7e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:26.164 186 INFO tempest.lib.common.rest_client [req-ee21e530-48ed-49ce-aa95-db4fc5228c4c ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9 0.118s 2020-12-14 02:14:26.167 186 DEBUG tempest.lib.common.rest_client [req-ee21e530-48ed-49ce-aa95-db4fc5228c4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1398', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ee21e530-48ed-49ce-aa95-db4fc5228c4c', 'x-compute-request-id': 'req-ee21e530-48ed-49ce-aa95-db4fc5228c4c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9'} Body: b'{"server": {"id": "ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9", "name": "tempest-SecurtiyGroupsRbacTest-server-1712569055", "status": "BUILD", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "user_id": "d6454cbca87a43e4843df1863d9a4ee6", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:26Z", "updated": "2020-12-14T02:14:26Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:26.240 197 INFO tempest.lib.common.rest_client [req-6d89f5c8-9d3d-4289-be99-6e9bf2302dd3 ] Request (ImagesMetadataRbacTest:test_create_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:14:26.243 197 DEBUG tempest.lib.common.rest_client [req-6d89f5c8-9d3d-4289-be99-6e9bf2302dd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d89f5c8-9d3d-4289-be99-6e9bf2302dd3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3dee4fbc99b54dd79e8b9e98e32f97b0", "name": "tempest-ImagesMetadataRbacTest-1129545559", "password_expires_at": null}, "audit_ids": ["NO2D5dHqQcCzPQcKDV-tzg"], "expires_at": "2020-12-14T03:14:26.000000Z", "issued_at": "2020-12-14T02:14:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ee5a672ddd44f7a4c48346daaf0211", "name": "tempest-ImagesMetadataRbacTest-1129545559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:26.293 189 INFO tempest.lib.common.rest_client [req-63168f44-0330-4108-a726-dd4105ad7c7d ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.230s 2020-12-14 02:14:26.295 189 DEBUG tempest.lib.common.rest_client [req-63168f44-0330-4108-a726-dd4105ad7c7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-63168f44-0330-4108-a726-dd4105ad7c7d', 'x-compute-request-id': 'req-63168f44-0330-4108-a726-dd4105ad7c7d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:26.748 197 INFO tempest.lib.common.rest_client [req-f572ff0c-0a51-4e27-8cab-51aa1aa6013a ] Request (ImagesMetadataRbacTest:test_create_image_metadata): 200 POST http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata 0.497s 2020-12-14 02:14:26.751 197 DEBUG tempest.lib.common.rest_client [req-f572ff0c-0a51-4e27-8cab-51aa1aa6013a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"foo": "bar"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '28', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f572ff0c-0a51-4e27-8cab-51aa1aa6013a', 'x-compute-request-id': 'req-f572ff0c-0a51-4e27-8cab-51aa1aa6013a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata'} Body: b'{"metadata": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:26.766 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:26.877 193 INFO tempest.lib.common.rest_client [req-59994ef2-383f-4c83-a162-c489ffd83e3d ] Request (ServerConsolesRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e 0.071s 2020-12-14 02:14:26.879 193 DEBUG tempest.lib.common.rest_client [req-59994ef2-383f-4c83-a162-c489ffd83e3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-59994ef2-383f-4c83-a162-c489ffd83e3d', 'x-compute-request-id': 'req-59994ef2-383f-4c83-a162-c489ffd83e3d', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ad76074f-74fc-4e91-b8a0-4eee44b0ad1e'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance ad76074f-74fc-4e91-b8a0-4eee44b0ad1e could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:26.881 193 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '677d9531-31e0-4552-824b-7b4e207e716e', 'name': 'tempest-ServerConsolesRbacTest-734479438-network', 'tenant_id': '6416f6d9d76f40d3a9a3fbe3e0564902', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '6416f6d9d76f40d3a9a3fbe3e0564902', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:13:56Z', 'updated_at': '2020-12-14T02:13:56Z', 'revision_number': 1}, subnet: {'id': '98ac1ef5-3071-4a7d-b9bc-8467fe9063ee', 'name': 'tempest-ServerConsolesRbacTest-734479438-subnet', 'tenant_id': '6416f6d9d76f40d3a9a3fbe3e0564902', 'network_id': '677d9531-31e0-4552-824b-7b4e207e716e', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:13:56Z', 'updated_at': '2020-12-14T02:13:56Z', 'revision_number': 0, 'project_id': '6416f6d9d76f40d3a9a3fbe3e0564902'}, router: {'id': 'ca4a9a05-9aca-4f2b-a91a-f14741c83891', 'name': 'tempest-ServerConsolesRbacTest-734479438-router', 'tenant_id': '6416f6d9d76f40d3a9a3fbe3e0564902', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.163'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::1bc'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:13:57Z', 'updated_at': '2020-12-14T02:13:58Z', 'revision_number': 3, 'project_id': '6416f6d9d76f40d3a9a3fbe3e0564902'} _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:14:26.888 197 INFO tempest.lib.common.rest_client [req-3669d299-4ebf-46a8-906a-dfb6737f7f44 ] Request (ImagesMetadataRbacTest:test_create_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles 0.115s 2020-12-14 02:14:26.891 197 DEBUG tempest.lib.common.rest_client [req-3669d299-4ebf-46a8-906a-dfb6737f7f44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3669d299-4ebf-46a8-906a-dfb6737f7f44', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:26.945 197 INFO tempest.lib.common.rest_client [req-ef5fc869-9f89-4f45-bdb5-706c5c660ec8 ] Request (ImagesMetadataRbacTest:test_create_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:14:26.950 197 DEBUG tempest.lib.common.rest_client [req-ef5fc869-9f89-4f45-bdb5-706c5c660ec8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef5fc869-9f89-4f45-bdb5-706c5c660ec8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3dee4fbc99b54dd79e8b9e98e32f97b0", "name": "tempest-ImagesMetadataRbacTest-1129545559", "password_expires_at": null}, "audit_ids": ["uXAjcTqgR0ukTLUZiKCU9Q"], "expires_at": "2020-12-14T03:14:26.000000Z", "issued_at": "2020-12-14T02:14:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ee5a672ddd44f7a4c48346daaf0211", "name": "tempest-ImagesMetadataRbacTest-1129545559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:27.362 197 INFO tempest.lib.common.rest_client [req-aced4f33-f05c-4aee-a414-e404fb5f19a5 ] Request (ImagesMetadataRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata/foo 0.398s 2020-12-14 02:14:27.366 197 DEBUG tempest.lib.common.rest_client [req-aced4f33-f05c-4aee-a414-e404fb5f19a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aced4f33-f05c-4aee-a414-e404fb5f19a5', 'x-compute-request-id': 'req-aced4f33-f05c-4aee-a414-e404fb5f19a5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata/foo'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:27.380 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:27.386 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:27.396 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:27.463 186 INFO tempest.lib.common.rest_client [req-9f9b8dd6-1452-4b97-88ac-cce69bf09759 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9 0.187s 2020-12-14 02:14:27.466 186 DEBUG tempest.lib.common.rest_client [req-9f9b8dd6-1452-4b97-88ac-cce69bf09759 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1503', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9f9b8dd6-1452-4b97-88ac-cce69bf09759', 'x-compute-request-id': 'req-9f9b8dd6-1452-4b97-88ac-cce69bf09759', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9'} Body: b'{"server": {"id": "ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9", "name": "tempest-SecurtiyGroupsRbacTest-server-1712569055", "status": "BUILD", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "user_id": "d6454cbca87a43e4843df1863d9a4ee6", "metadata": {}, "hostId": "636fddd831194c880400fb9230827e71d4afbe03e9540705de30335d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:25Z", "updated": "2020-12-14T02:14:27Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc5", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "block_device_mapping", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:27.543 186 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/block_device_mapping" after 1 second wait 2020-12-14 02:14:27.611 189 INFO tempest.lib.common.rest_client [req-fda82e45-ba6a-4c3b-865d-e0c69d540ad5 ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.234s 2020-12-14 02:14:27.613 189 DEBUG tempest.lib.common.rest_client [req-fda82e45-ba6a-4c3b-865d-e0c69d540ad5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fda82e45-ba6a-4c3b-865d-e0c69d540ad5', 'x-compute-request-id': 'req-fda82e45-ba6a-4c3b-865d-e0c69d540ad5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:27.723 197 INFO tempest.lib.common.rest_client [req-39e1c831-1ebf-4370-95c1-1500ffcb53ed ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 200 PUT http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata 0.321s 2020-12-14 02:14:27.725 197 DEBUG tempest.lib.common.rest_client [req-39e1c831-1ebf-4370-95c1-1500ffcb53ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"foo": "bar"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '28', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-39e1c831-1ebf-4370-95c1-1500ffcb53ed', 'x-compute-request-id': 'req-39e1c831-1ebf-4370-95c1-1500ffcb53ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata'} Body: b'{"metadata": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:27.738 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:27.802 197 INFO tempest.lib.common.rest_client [req-69752776-eaec-4506-9c3a-23d47d1bb5da ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles 0.057s 2020-12-14 02:14:27.805 197 DEBUG tempest.lib.common.rest_client [req-69752776-eaec-4506-9c3a-23d47d1bb5da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69752776-eaec-4506-9c3a-23d47d1bb5da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:27.861 197 INFO tempest.lib.common.rest_client [req-e51a84f5-4c82-487d-a58e-6d08900816db ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:14:27.864 197 DEBUG tempest.lib.common.rest_client [req-e51a84f5-4c82-487d-a58e-6d08900816db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e51a84f5-4c82-487d-a58e-6d08900816db', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3dee4fbc99b54dd79e8b9e98e32f97b0", "name": "tempest-ImagesMetadataRbacTest-1129545559", "password_expires_at": null}, "audit_ids": ["oBHrRyPvSGi3c3WdDTS5Ng"], "expires_at": "2020-12-14T03:14:27.000000Z", "issued_at": "2020-12-14T02:14:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ee5a672ddd44f7a4c48346daaf0211", "name": "tempest-ImagesMetadataRbacTest-1129545559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:28.214 197 INFO tempest.lib.common.rest_client [req-fd39b289-14a0-4d7c-abd7-e19c9f68545e ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 204 DELETE http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata/foo 0.343s 2020-12-14 02:14:28.218 197 DEBUG tempest.lib.common.rest_client [req-fd39b289-14a0-4d7c-abd7-e19c9f68545e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fd39b289-14a0-4d7c-abd7-e19c9f68545e', 'x-compute-request-id': 'req-fd39b289-14a0-4d7c-abd7-e19c9f68545e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata/foo'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:28.220 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:28.286 197 INFO tempest.lib.common.rest_client [req-969e7517-7856-4a2e-87c2-9130990ebae2 ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles 0.059s 2020-12-14 02:14:28.290 197 DEBUG tempest.lib.common.rest_client [req-969e7517-7856-4a2e-87c2-9130990ebae2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-969e7517-7856-4a2e-87c2-9130990ebae2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:28.338 197 INFO tempest.lib.common.rest_client [req-c231b287-18eb-4cb0-b603-d2bba0398d80 ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:14:28.340 197 DEBUG tempest.lib.common.rest_client [req-c231b287-18eb-4cb0-b603-d2bba0398d80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c231b287-18eb-4cb0-b603-d2bba0398d80', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3dee4fbc99b54dd79e8b9e98e32f97b0", "name": "tempest-ImagesMetadataRbacTest-1129545559", "password_expires_at": null}, "audit_ids": ["trZ11EiZR-2z5x-r99GgsA"], "expires_at": "2020-12-14T03:14:28.000000Z", "issued_at": "2020-12-14T02:14:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ee5a672ddd44f7a4c48346daaf0211", "name": "tempest-ImagesMetadataRbacTest-1129545559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:28.475 197 INFO tempest.lib.common.rest_client [req-034b4bbd-3f1d-43f4-8fba-5b90adac90f8 ] Request (ImagesMetadataRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata/foo 0.126s 2020-12-14 02:14:28.478 197 DEBUG tempest.lib.common.rest_client [req-034b4bbd-3f1d-43f4-8fba-5b90adac90f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '66', 'x-openstack-request-id': 'req-034b4bbd-3f1d-43f4-8fba-5b90adac90f8', 'x-compute-request-id': 'req-034b4bbd-3f1d-43f4-8fba-5b90adac90f8', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata/foo'} Body: b'{"itemNotFound": {"code": 404, "message": "Invalid metadata key"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:28.490 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:28.494 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:28.502 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_image, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:28.505 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:28.557 197 INFO tempest.lib.common.rest_client [req-a5c35247-e396-4b5b-8972-8bb431b723c6 ] Request (ImagesMetadataRbacTest:test_list_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles 0.046s 2020-12-14 02:14:28.560 197 DEBUG tempest.lib.common.rest_client [req-a5c35247-e396-4b5b-8972-8bb431b723c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5c35247-e396-4b5b-8972-8bb431b723c6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:28.609 197 INFO tempest.lib.common.rest_client [req-1e5bcefa-248c-443a-b33a-cf54638d56a8 ] Request (ImagesMetadataRbacTest:test_list_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:14:28.612 197 DEBUG tempest.lib.common.rest_client [req-1e5bcefa-248c-443a-b33a-cf54638d56a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e5bcefa-248c-443a-b33a-cf54638d56a8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3dee4fbc99b54dd79e8b9e98e32f97b0", "name": "tempest-ImagesMetadataRbacTest-1129545559", "password_expires_at": null}, "audit_ids": ["n9796ZvNRrG42l8h1LmGnQ"], "expires_at": "2020-12-14T03:14:28.000000Z", "issued_at": "2020-12-14T02:14:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ee5a672ddd44f7a4c48346daaf0211", "name": "tempest-ImagesMetadataRbacTest-1129545559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:28.744 197 INFO tempest.lib.common.rest_client [req-b55514de-e636-4533-902a-dbbe09df5d76 ] Request (ImagesMetadataRbacTest:test_list_image_metadata): 200 GET http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata 0.124s 2020-12-14 02:14:28.748 197 DEBUG tempest.lib.common.rest_client [req-b55514de-e636-4533-902a-dbbe09df5d76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '16', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b55514de-e636-4533-902a-dbbe09df5d76', 'x-compute-request-id': 'req-b55514de-e636-4533-902a-dbbe09df5d76', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata'} Body: b'{"metadata": {}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:28.763 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:28.798 186 INFO tempest.lib.common.rest_client [req-c61b0ec9-b5c3-482f-b7de-e8368e329b81 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9 0.248s 2020-12-14 02:14:28.802 186 DEBUG tempest.lib.common.rest_client [req-c61b0ec9-b5c3-482f-b7de-e8368e329b81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1533', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c61b0ec9-b5c3-482f-b7de-e8368e329b81', 'x-compute-request-id': 'req-c61b0ec9-b5c3-482f-b7de-e8368e329b81', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9'} Body: b'{"server": {"id": "ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9", "name": "tempest-SecurtiyGroupsRbacTest-server-1712569055", "status": "BUILD", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "user_id": "d6454cbca87a43e4843df1863d9a4ee6", "metadata": {}, "hostId": "636fddd831194c880400fb9230827e71d4afbe03e9540705de30335d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:25Z", "updated": "2020-12-14T02:14:27Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc5", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:28.829 197 INFO tempest.lib.common.rest_client [req-6e944039-ad51-428b-8f83-ac79c1b4341b ] Request (ImagesMetadataRbacTest:test_list_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles 0.060s 2020-12-14 02:14:28.832 197 DEBUG tempest.lib.common.rest_client [req-6e944039-ad51-428b-8f83-ac79c1b4341b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e944039-ad51-428b-8f83-ac79c1b4341b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:28.886 197 INFO tempest.lib.common.rest_client [req-64b86077-226f-449a-9c27-0940801f50f7 ] Request (ImagesMetadataRbacTest:test_list_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:14:28.890 197 DEBUG tempest.lib.common.rest_client [req-64b86077-226f-449a-9c27-0940801f50f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-64b86077-226f-449a-9c27-0940801f50f7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3dee4fbc99b54dd79e8b9e98e32f97b0", "name": "tempest-ImagesMetadataRbacTest-1129545559", "password_expires_at": null}, "audit_ids": ["JO2xhLjOSeWD-q3CQxKOPQ"], "expires_at": "2020-12-14T03:14:28.000000Z", "issued_at": "2020-12-14T02:14:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ee5a672ddd44f7a4c48346daaf0211", "name": "tempest-ImagesMetadataRbacTest-1129545559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:28.900 186 INFO tempest.common.waiters [-] State transition "BUILD/block_device_mapping" ==> "BUILD/spawning" after 2 second wait 2020-12-14 02:14:28.903 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:28.907 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:28.916 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_image, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:28.933 189 INFO tempest.lib.common.rest_client [req-45f6c567-29d4-4d8f-a89e-dfdb5256573e ] Request (ServerActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.209s 2020-12-14 02:14:28.935 189 DEBUG tempest.lib.common.rest_client [req-45f6c567-29d4-4d8f-a89e-dfdb5256573e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-45f6c567-29d4-4d8f-a89e-dfdb5256573e', 'x-compute-request-id': 'req-45f6c567-29d4-4d8f-a89e-dfdb5256573e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:28Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:27.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:29.038 189 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 10 second wait 2020-12-14 02:14:29.249 193 INFO tempest.lib.common.rest_client [req-764942ed-49f4-491f-b592-8e76e62b087c ] Request (ServerConsolesRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/ca4a9a05-9aca-4f2b-a91a-f14741c83891/remove_router_interface 2.357s 2020-12-14 02:14:29.255 193 DEBUG tempest.lib.common.rest_client [req-764942ed-49f4-491f-b592-8e76e62b087c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "98ac1ef5-3071-4a7d-b9bc-8467fe9063ee"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-764942ed-49f4-491f-b592-8e76e62b087c', 'date': 'Mon, 14 Dec 2020 02:14:29 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/ca4a9a05-9aca-4f2b-a91a-f14741c83891/remove_router_interface'} Body: b'{"id": "ca4a9a05-9aca-4f2b-a91a-f14741c83891", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "port_id": "a0db55f5-beaf-4d96-931b-c9dd51227e1c", "network_id": "677d9531-31e0-4552-824b-7b4e207e716e", "subnet_id": "98ac1ef5-3071-4a7d-b9bc-8467fe9063ee", "subnet_ids": ["98ac1ef5-3071-4a7d-b9bc-8467fe9063ee"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:29.275 189 INFO tempest.lib.common.rest_client [req-1178ebac-a5c2-4bf2-ae38-7660d8809d10 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.225s 2020-12-14 02:14:29.278 189 DEBUG tempest.lib.common.rest_client [req-1178ebac-a5c2-4bf2-ae38-7660d8809d10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1178ebac-a5c2-4bf2-ae38-7660d8809d10', 'x-compute-request-id': 'req-1178ebac-a5c2-4bf2-ae38-7660d8809d10', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:28Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:27.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:29.300 197 INFO tempest.lib.common.rest_client [req-0fddb223-6ac1-48d2-9dfe-0df23a72d85b ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 200 PUT http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata 0.378s 2020-12-14 02:14:29.304 197 DEBUG tempest.lib.common.rest_client [req-0fddb223-6ac1-48d2-9dfe-0df23a72d85b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"foo": "bar"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '28', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0fddb223-6ac1-48d2-9dfe-0df23a72d85b', 'x-compute-request-id': 'req-0fddb223-6ac1-48d2-9dfe-0df23a72d85b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata'} Body: b'{"metadata": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:29.318 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:29.386 197 INFO tempest.lib.common.rest_client [req-1eeffc66-bfdf-4229-978d-a282daad7f69 ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles 0.062s 2020-12-14 02:14:29.391 197 DEBUG tempest.lib.common.rest_client [req-1eeffc66-bfdf-4229-978d-a282daad7f69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1eeffc66-bfdf-4229-978d-a282daad7f69', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:29.402 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:29.407 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.410 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.413 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.416 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.420 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.424 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.429 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.432 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.434 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.437 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.440 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.442 197 INFO tempest.lib.common.rest_client [req-3eea192c-4121-4dda-909c-2078666be061 ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:14:29.443 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.444 197 DEBUG tempest.lib.common.rest_client [req-3eea192c-4121-4dda-909c-2078666be061 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3eea192c-4121-4dda-909c-2078666be061', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3dee4fbc99b54dd79e8b9e98e32f97b0", "name": "tempest-ImagesMetadataRbacTest-1129545559", "password_expires_at": null}, "audit_ids": ["QRgfylh7RX-hZ_0eEaLRxQ"], "expires_at": "2020-12-14T03:14:29.000000Z", "issued_at": "2020-12-14T02:14:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ee5a672ddd44f7a4c48346daaf0211", "name": "tempest-ImagesMetadataRbacTest-1129545559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:29.446 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.448 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.451 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.454 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.456 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.459 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.461 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.463 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.465 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.467 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.470 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.472 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.474 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.476 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.478 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.480 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.483 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.485 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.487 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.489 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.491 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.493 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.495 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.497 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.499 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.501 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.503 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.506 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.507 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.510 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.512 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.514 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.516 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.518 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.520 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.522 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.524 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.526 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.528 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.531 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.533 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.535 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.538 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.540 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.544 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.546 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.548 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.551 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.553 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.555 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.557 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.559 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.561 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.563 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.565 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.567 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.569 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.571 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.573 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:29.573 197 INFO tempest.lib.common.rest_client [req-3bcd7a79-7104-4bda-af18-39f06e7f0a18 ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 200 GET http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata/foo 0.121s 2020-12-14 02:14:29.577 197 DEBUG tempest.lib.common.rest_client [req-3bcd7a79-7104-4bda-af18-39f06e7f0a18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '24', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3bcd7a79-7104-4bda-af18-39f06e7f0a18', 'x-compute-request-id': 'req-3bcd7a79-7104-4bda-af18-39f06e7f0a18', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata/foo'} Body: b'{"meta": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:29.582 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:confirm_resize, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:29.590 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:29.655 197 INFO tempest.lib.common.rest_client [req-0f2640b2-f134-4eeb-9ad7-0c4db3a1b3c0 ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles 0.059s 2020-12-14 02:14:29.658 197 DEBUG tempest.lib.common.rest_client [req-0f2640b2-f134-4eeb-9ad7-0c4db3a1b3c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f2640b2-f134-4eeb-9ad7-0c4db3a1b3c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:29.708 197 INFO tempest.lib.common.rest_client [req-d1605945-06b4-4b2a-9af7-e9afc3277633 ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:14:29.711 197 DEBUG tempest.lib.common.rest_client [req-d1605945-06b4-4b2a-9af7-e9afc3277633 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1605945-06b4-4b2a-9af7-e9afc3277633', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3dee4fbc99b54dd79e8b9e98e32f97b0", "name": "tempest-ImagesMetadataRbacTest-1129545559", "password_expires_at": null}, "audit_ids": ["5qNdiD6kSiC3_w50FWxa3w"], "expires_at": "2020-12-14T03:14:29.000000Z", "issued_at": "2020-12-14T02:14:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ee5a672ddd44f7a4c48346daaf0211", "name": "tempest-ImagesMetadataRbacTest-1129545559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:29.904 189 INFO tempest.lib.common.rest_client [req-38a6e133-de72-4bfb-a138-f406561bc645 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.317s 2020-12-14 02:14:29.907 189 DEBUG tempest.lib.common.rest_client [req-38a6e133-de72-4bfb-a138-f406561bc645 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-38a6e133-de72-4bfb-a138-f406561bc645', 'x-compute-request-id': 'req-38a6e133-de72-4bfb-a138-f406561bc645', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:28Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:27.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:30.075 197 INFO tempest.lib.common.rest_client [req-00a325c9-13e0-47d9-9dee-e8184481e3cd ] Request (ImagesMetadataRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata/foo 0.353s 2020-12-14 02:14:30.079 197 DEBUG tempest.lib.common.rest_client [req-00a325c9-13e0-47d9-9dee-e8184481e3cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-00a325c9-13e0-47d9-9dee-e8184481e3cd', 'x-compute-request-id': 'req-00a325c9-13e0-47d9-9dee-e8184481e3cd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata/foo'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:30.091 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:30.095 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:30.104 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:30.106 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:30.164 197 INFO tempest.lib.common.rest_client [req-63c0cd94-a4dd-4f5e-ad00-db1861df42bc ] Request (ImagesMetadataRbacTest:test_update_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles 0.052s 2020-12-14 02:14:30.167 197 DEBUG tempest.lib.common.rest_client [req-63c0cd94-a4dd-4f5e-ad00-db1861df42bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63c0cd94-a4dd-4f5e-ad00-db1861df42bc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:30.224 197 INFO tempest.lib.common.rest_client [req-d780990c-0a24-4e0e-879d-98fbd2c00064 ] Request (ImagesMetadataRbacTest:test_update_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:14:30.228 197 DEBUG tempest.lib.common.rest_client [req-d780990c-0a24-4e0e-879d-98fbd2c00064 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d780990c-0a24-4e0e-879d-98fbd2c00064', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3dee4fbc99b54dd79e8b9e98e32f97b0", "name": "tempest-ImagesMetadataRbacTest-1129545559", "password_expires_at": null}, "audit_ids": ["7sV9m3X2QW2L6i5WFZoFwQ"], "expires_at": "2020-12-14T03:14:30.000000Z", "issued_at": "2020-12-14T02:14:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ee5a672ddd44f7a4c48346daaf0211", "name": "tempest-ImagesMetadataRbacTest-1129545559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:30.413 186 INFO tempest.lib.common.rest_client [req-d5887230-4468-4fc0-ba02-a7dcabe0f452 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9 0.504s 2020-12-14 02:14:30.415 186 DEBUG tempest.lib.common.rest_client [req-d5887230-4468-4fc0-ba02-a7dcabe0f452 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1533', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d5887230-4468-4fc0-ba02-a7dcabe0f452', 'x-compute-request-id': 'req-d5887230-4468-4fc0-ba02-a7dcabe0f452', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9'} Body: b'{"server": {"id": "ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9", "name": "tempest-SecurtiyGroupsRbacTest-server-1712569055", "status": "BUILD", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "user_id": "d6454cbca87a43e4843df1863d9a4ee6", "metadata": {}, "hostId": "636fddd831194c880400fb9230827e71d4afbe03e9540705de30335d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:25Z", "updated": "2020-12-14T02:14:27Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc5", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:30.422 189 INFO tempest.lib.common.rest_client [req-5511ccda-4571-492e-96b4-ec1b161fa420 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 202 POST http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action 0.428s 2020-12-14 02:14:30.426 189 DEBUG tempest.lib.common.rest_client [req-5511ccda-4571-492e-96b4-ec1b161fa420 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"resize": {"flavorRef": "8a56823e-8563-423c-896d-50c73f98dd64"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5511ccda-4571-492e-96b4-ec1b161fa420', 'x-compute-request-id': 'req-5511ccda-4571-492e-96b4-ec1b161fa420', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:30.585 197 INFO tempest.lib.common.rest_client [req-d7ec1d49-0923-44f2-97ca-f52150064618 ] Request (ImagesMetadataRbacTest:test_update_image_metadata): 200 PUT http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata 0.349s 2020-12-14 02:14:30.589 197 DEBUG tempest.lib.common.rest_client [req-d7ec1d49-0923-44f2-97ca-f52150064618 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"foo": "bar"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '28', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d7ec1d49-0923-44f2-97ca-f52150064618', 'x-compute-request-id': 'req-d7ec1d49-0923-44f2-97ca-f52150064618', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata'} Body: b'{"metadata": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:30.602 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:30.645 193 INFO tempest.lib.common.rest_client [req-07317920-4bcc-4fb0-b10b-6dab8c32e5ef ] Request (ServerConsolesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/ca4a9a05-9aca-4f2b-a91a-f14741c83891 1.381s 2020-12-14 02:14:30.647 193 DEBUG tempest.lib.common.rest_client [req-07317920-4bcc-4fb0-b10b-6dab8c32e5ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-07317920-4bcc-4fb0-b10b-6dab8c32e5ef', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:14:30 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/ca4a9a05-9aca-4f2b-a91a-f14741c83891'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:30.677 197 INFO tempest.lib.common.rest_client [req-e4c0ac08-dba6-480d-bf85-29617f258223 ] Request (ImagesMetadataRbacTest:test_update_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles 0.068s 2020-12-14 02:14:30.681 197 DEBUG tempest.lib.common.rest_client [req-e4c0ac08-dba6-480d-bf85-29617f258223 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4c0ac08-dba6-480d-bf85-29617f258223', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:30.727 197 INFO tempest.lib.common.rest_client [req-fed8a4b3-1602-4558-bf83-53c6a02f1c38 ] Request (ImagesMetadataRbacTest:test_update_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:14:30.731 197 DEBUG tempest.lib.common.rest_client [req-fed8a4b3-1602-4558-bf83-53c6a02f1c38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fed8a4b3-1602-4558-bf83-53c6a02f1c38', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3dee4fbc99b54dd79e8b9e98e32f97b0", "name": "tempest-ImagesMetadataRbacTest-1129545559", "password_expires_at": null}, "audit_ids": ["xaqREHUVRwCR-QzkK7F3LA"], "expires_at": "2020-12-14T03:14:30.000000Z", "issued_at": "2020-12-14T02:14:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ee5a672ddd44f7a4c48346daaf0211", "name": "tempest-ImagesMetadataRbacTest-1129545559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:30.770 189 INFO tempest.lib.common.rest_client [req-6a766119-1a12-4137-9de4-d205e4357c40 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.340s 2020-12-14 02:14:30.773 189 DEBUG tempest.lib.common.rest_client [req-6a766119-1a12-4137-9de4-d205e4357c40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6a766119-1a12-4137-9de4-d205e4357c40', 'x-compute-request-id': 'req-6a766119-1a12-4137-9de4-d205e4357c40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:30Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:27.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:31.108 197 INFO tempest.lib.common.rest_client [req-c5fa5ad6-f8f6-4646-bb59-0d94a2758d34 ] Request (ImagesMetadataRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata/foo 0.368s 2020-12-14 02:14:31.111 197 DEBUG tempest.lib.common.rest_client [req-c5fa5ad6-f8f6-4646-bb59-0d94a2758d34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c5fa5ad6-f8f6-4646-bb59-0d94a2758d34', 'x-compute-request-id': 'req-c5fa5ad6-f8f6-4646-bb59-0d94a2758d34', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata/foo'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:31.123 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:31.127 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:31.130 193 INFO tempest.lib.common.rest_client [req-7702464a-b811-4ff5-8b07-8e5cc4997e13 ] Request (ServerConsolesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/98ac1ef5-3071-4a7d-b9bc-8467fe9063ee 0.478s 2020-12-14 02:14:31.133 193 DEBUG tempest.lib.common.rest_client [req-7702464a-b811-4ff5-8b07-8e5cc4997e13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-7702464a-b811-4ff5-8b07-8e5cc4997e13', 'date': 'Mon, 14 Dec 2020 02:14:31 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/98ac1ef5-3071-4a7d-b9bc-8467fe9063ee'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:31.136 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:31.138 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:31.204 197 INFO tempest.lib.common.rest_client [req-4ae21aa4-4778-4abc-901e-fae5015b0bbd ] Request (ImagesMetadataRbacTest:test_update_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles 0.059s 2020-12-14 02:14:31.207 197 DEBUG tempest.lib.common.rest_client [req-4ae21aa4-4778-4abc-901e-fae5015b0bbd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ae21aa4-4778-4abc-901e-fae5015b0bbd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:31.260 197 INFO tempest.lib.common.rest_client [req-ed17c057-f931-4d50-af28-1793b76b3c08 ] Request (ImagesMetadataRbacTest:test_update_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:14:31.264 197 DEBUG tempest.lib.common.rest_client [req-ed17c057-f931-4d50-af28-1793b76b3c08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed17c057-f931-4d50-af28-1793b76b3c08', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3dee4fbc99b54dd79e8b9e98e32f97b0", "name": "tempest-ImagesMetadataRbacTest-1129545559", "password_expires_at": null}, "audit_ids": ["VBkG6XkTRdKPzRFWlL3lSw"], "expires_at": "2020-12-14T03:14:31.000000Z", "issued_at": "2020-12-14T02:14:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ee5a672ddd44f7a4c48346daaf0211", "name": "tempest-ImagesMetadataRbacTest-1129545559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:31.657 197 INFO tempest.lib.common.rest_client [req-15deaf23-6ed6-4a65-a6a8-d1d5223891fa ] Request (ImagesMetadataRbacTest:test_update_image_metadata_item): 200 PUT http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata/foo 0.384s 2020-12-14 02:14:31.660 197 DEBUG tempest.lib.common.rest_client [req-15deaf23-6ed6-4a65-a6a8-d1d5223891fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"meta": {"foo": "bar"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '24', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-15deaf23-6ed6-4a65-a6a8-d1d5223891fa', 'x-compute-request-id': 'req-15deaf23-6ed6-4a65-a6a8-d1d5223891fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata/foo'} Body: b'{"meta": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:31.675 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:31.756 197 INFO tempest.lib.common.rest_client [req-7d87adca-e4f3-4070-87c5-23f0e0d8b19c ] Request (ImagesMetadataRbacTest:test_update_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles 0.074s 2020-12-14 02:14:31.759 197 DEBUG tempest.lib.common.rest_client [req-7d87adca-e4f3-4070-87c5-23f0e0d8b19c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d87adca-e4f3-4070-87c5-23f0e0d8b19c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211/users/3dee4fbc99b54dd79e8b9e98e32f97b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:31.791 186 INFO tempest.lib.common.rest_client [req-501679b8-ed53-451a-b55a-96b210ef03a3 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9 0.268s 2020-12-14 02:14:31.794 186 DEBUG tempest.lib.common.rest_client [req-501679b8-ed53-451a-b55a-96b210ef03a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1533', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-501679b8-ed53-451a-b55a-96b210ef03a3', 'x-compute-request-id': 'req-501679b8-ed53-451a-b55a-96b210ef03a3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9'} Body: b'{"server": {"id": "ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9", "name": "tempest-SecurtiyGroupsRbacTest-server-1712569055", "status": "BUILD", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "user_id": "d6454cbca87a43e4843df1863d9a4ee6", "metadata": {}, "hostId": "636fddd831194c880400fb9230827e71d4afbe03e9540705de30335d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:25Z", "updated": "2020-12-14T02:14:27Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc5", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:31.811 197 INFO tempest.lib.common.rest_client [req-ed070135-8ccb-4003-907f-afccb836ef1c ] Request (ImagesMetadataRbacTest:test_update_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:14:31.814 197 DEBUG tempest.lib.common.rest_client [req-ed070135-8ccb-4003-907f-afccb836ef1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed070135-8ccb-4003-907f-afccb836ef1c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3dee4fbc99b54dd79e8b9e98e32f97b0", "name": "tempest-ImagesMetadataRbacTest-1129545559", "password_expires_at": null}, "audit_ids": ["7g0ki4gQRBW5NTwSWe_mJA"], "expires_at": "2020-12-14T03:14:31.000000Z", "issued_at": "2020-12-14T02:14:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21ee5a672ddd44f7a4c48346daaf0211", "name": "tempest-ImagesMetadataRbacTest-1129545559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21ee5a672ddd44f7a4c48346daaf0211", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:31.813 193 INFO tempest.lib.common.rest_client [req-3a30eedf-966b-4126-ac3d-c877ee172feb ] Request (ServerConsolesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/677d9531-31e0-4552-824b-7b4e207e716e 0.674s 2020-12-14 02:14:31.816 193 DEBUG tempest.lib.common.rest_client [req-3a30eedf-966b-4126-ac3d-c877ee172feb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-3a30eedf-966b-4126-ac3d-c877ee172feb', 'date': 'Mon, 14 Dec 2020 02:14:31 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/677d9531-31e0-4552-824b-7b4e207e716e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:31.982 193 INFO tempest.lib.common.rest_client [req-13dd0fc6-d147-421e-8073-65bbc51dd1b7 ] Request (ServerConsolesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/5061a16d2eeb43f98ad0aada2c68da9b 0.156s 2020-12-14 02:14:31.985 193 DEBUG tempest.lib.common.rest_client [req-13dd0fc6-d147-421e-8073-65bbc51dd1b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13dd0fc6-d147-421e-8073-65bbc51dd1b7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/5061a16d2eeb43f98ad0aada2c68da9b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:32.063 193 INFO tempest.lib.common.rest_client [req-c7c82e45-bf9c-4ee5-805f-7f4d73e2cfe1 ] Request (ServerConsolesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6416f6d9d76f40d3a9a3fbe3e0564902&name=default 0.072s 2020-12-14 02:14:32.066 193 DEBUG tempest.lib.common.rest_client [req-c7c82e45-bf9c-4ee5-805f-7f4d73e2cfe1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-c7c82e45-bf9c-4ee5-805f-7f4d73e2cfe1', 'date': 'Mon, 14 Dec 2020 02:14:32 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6416f6d9d76f40d3a9a3fbe3e0564902&name=default'} Body: b'{"security_groups": [{"id": "5d6cb0c5-ead0-4daf-b00b-b3b4fa86c22f", "name": "default", "stateful": true, "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "description": "Default security group", "security_group_rules": [{"id": "044dad71-c0dd-4db4-8d90-aa950ad3dd32", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "security_group_id": "5d6cb0c5-ead0-4daf-b00b-b3b4fa86c22f", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5d6cb0c5-ead0-4daf-b00b-b3b4fa86c22f", "description": null, "tags": [], "created_at": "2020-12-14T02:13:56Z", "updated_at": "2020-12-14T02:13:56Z", "revision_number": 0, "project_id": "6416f6d9d76f40d3a9a3fbe3e0564902"}, {"id": "1e248b81-594a-4b16-931b-9bc6fd0eb4f6", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "security_group_id": "5d6cb0c5-ead0-4daf-b00b-b3b4fa86c22f", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5d6cb0c5-ead0-4daf-b00b-b3b4fa86c22f", "description": null, "tags": [], "created_at": "2020-12-14T02:13:56Z", "updated_at": "2020-12-14T02:13:56Z", "revision_number": 0, "project_id": "6416f6d9d76f40d3a9a3fbe3e0564902"}, {"id": "42daeb5c-2faf-49da-be59-476010561328", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "security_group_id": "5d6cb0c5-ead0-4daf-b00b-b3b4fa86c22f", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:56Z", "updated_at": "2020-12-14T02:13:56Z", "revision_number": 0, "project_id": "6416f6d9d76f40d3a9a3fbe3e0564902"}, {"id": "f154d941-8edb-427b-84eb-ec450c3137a2", "tenant_id": "6416f6d9d76f40d3a9a3fbe3e0564902", "security_group_id": "5d6cb0c5-ead0-4daf-b00b-b3b4fa86c22f", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:13:56Z", "updated_at": "2020-12-14T02:13:56Z", "revision_number": 0, "project_id": "6416f6d9d76f40d3a9a3fbe3e0564902"}], "tags": [], "created_at": "2020-12-14T02:13:56Z", "updated_at": "2020-12-14T02:13:56Z", "revision_number": 1, "project_id": "6416f6d9d76f40d3a9a3fbe3e0564902"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:32.093 189 INFO tempest.lib.common.rest_client [req-b72482f9-07af-42e2-a4b5-e5e787b9afe7 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.229s 2020-12-14 02:14:32.096 189 DEBUG tempest.lib.common.rest_client [req-b72482f9-07af-42e2-a4b5-e5e787b9afe7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b72482f9-07af-42e2-a4b5-e5e787b9afe7', 'x-compute-request-id': 'req-b72482f9-07af-42e2-a4b5-e5e787b9afe7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:31Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:27.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:32.198 197 INFO tempest.lib.common.rest_client [req-267df539-7dc8-49ca-b182-50c20f16a3e6 ] Request (ImagesMetadataRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata/foo 0.375s 2020-12-14 02:14:32.202 197 DEBUG tempest.lib.common.rest_client [req-267df539-7dc8-49ca-b182-50c20f16a3e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-267df539-7dc8-49ca-b182-50c20f16a3e6', 'x-compute-request-id': 'req-267df539-7dc8-49ca-b182-50c20f16a3e6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/5d1079d2-5186-4d7d-9c09-23169f69d861/metadata/foo'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:32.276 193 INFO tempest.lib.common.rest_client [req-9e382ba5-13f9-48a7-8105-61807181b37d ] Request (ServerConsolesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/5d6cb0c5-ead0-4daf-b00b-b3b4fa86c22f 0.203s 2020-12-14 02:14:32.279 193 DEBUG tempest.lib.common.rest_client [req-9e382ba5-13f9-48a7-8105-61807181b37d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-9e382ba5-13f9-48a7-8105-61807181b37d', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:14:32 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5d6cb0c5-ead0-4daf-b00b-b3b4fa86c22f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:32.300 197 INFO tempest.lib.common.rest_client [req-6e292bcd-7f07-4ee1-b6a2-536daa48499c ] Request (ImagesMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/5d1079d2-5186-4d7d-9c09-23169f69d861 0.085s 2020-12-14 02:14:32.302 197 DEBUG tempest.lib.common.rest_client [req-6e292bcd-7f07-4ee1-b6a2-536daa48499c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-6e292bcd-7f07-4ee1-b6a2-536daa48499c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/5d1079d2-5186-4d7d-9c09-23169f69d861'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:32.335 197 INFO tempest.lib.common.rest_client [req-4dc8cffd-421e-40c8-95be-bc0e67f3c139 ] Request (ImagesMetadataRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/5d1079d2-5186-4d7d-9c09-23169f69d861 0.027s 2020-12-14 02:14:32.337 197 DEBUG tempest.lib.common.rest_client [req-4dc8cffd-421e-40c8-95be-bc0e67f3c139 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-4dc8cffd-421e-40c8-95be-bc0e67f3c139', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/5d1079d2-5186-4d7d-9c09-23169f69d861'} Body: b'{"message": "No image found with ID 5d1079d2-5186-4d7d-9c09-23169f69d861

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:32.475 193 INFO tempest.lib.common.rest_client [req-eb4cb3f1-c182-4d8a-ac32-a12c24baf696 ] Request (ServerConsolesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902 0.189s 2020-12-14 02:14:32.478 193 DEBUG tempest.lib.common.rest_client [req-eb4cb3f1-c182-4d8a-ac32-a12c24baf696 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb4cb3f1-c182-4d8a-ac32-a12c24baf696', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6416f6d9d76f40d3a9a3fbe3e0564902'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:32.506 197 INFO tempest.lib.common.rest_client [req-aa5b2ee2-0d4f-49a9-a34f-171d297d193f ] Request (ImagesMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/3dee4fbc99b54dd79e8b9e98e32f97b0 0.162s 2020-12-14 02:14:32.509 197 DEBUG tempest.lib.common.rest_client [req-aa5b2ee2-0d4f-49a9-a34f-171d297d193f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa5b2ee2-0d4f-49a9-a34f-171d297d193f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/3dee4fbc99b54dd79e8b9e98e32f97b0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:32.604 193 INFO tempest.lib.common.rest_client [req-9e01bd98-0a36-44f3-9781-2bd2b2b38020 ] Request (ServerGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:14:32.607 193 DEBUG tempest.lib.common.rest_client [req-9e01bd98-0a36-44f3-9781-2bd2b2b38020 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e01bd98-0a36-44f3-9781-2bd2b2b38020', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["H1TwEQfYRNyz5PCeOhHY8A"], "expires_at": "2020-12-14T03:14:32.000000Z", "issued_at": "2020-12-14T02:14:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:32.625 197 INFO tempest.lib.common.rest_client [req-18ca9eae-1a79-4ad2-99d0-d72bd3f9616d ] Request (ImagesMetadataRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:14:32.628 197 DEBUG tempest.lib.common.rest_client [req-18ca9eae-1a79-4ad2-99d0-d72bd3f9616d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-18ca9eae-1a79-4ad2-99d0-d72bd3f9616d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["S0xK79GrRb-WHQaPUUgsLg"], "expires_at": "2020-12-14T03:14:32.000000Z", "issued_at": "2020-12-14T02:14:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:32.704 193 INFO tempest.lib.common.rest_client [req-4e2afd36-8fa9-49f1-8f3d-24f3766be1dd ] Request (ServerGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:14:32.707 193 DEBUG tempest.lib.common.rest_client [req-4e2afd36-8fa9-49f1-8f3d-24f3766be1dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e2afd36-8fa9-49f1-8f3d-24f3766be1dd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["iUXE6kH6SO60Vn8sCqMOFA"], "expires_at": "2020-12-14T03:14:32.000000Z", "issued_at": "2020-12-14T02:14:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:32.821 193 INFO tempest.lib.common.rest_client [req-449e6d1d-7111-49c4-91dd-9aed3e14e89c ] Request (ServerGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.105s 2020-12-14 02:14:32.825 193 DEBUG tempest.lib.common.rest_client [req-449e6d1d-7111-49c4-91dd-9aed3e14e89c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-449e6d1d-7111-49c4-91dd-9aed3e14e89c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:32.925 193 INFO tempest.lib.common.rest_client [req-765eef13-2bc5-418f-802e-ee82dfd3293f ] Request (ServerGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.092s 2020-12-14 02:14:32.927 193 DEBUG tempest.lib.common.rest_client [req-765eef13-2bc5-418f-802e-ee82dfd3293f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerGroupsRbacTest-697286629-desc", "domain_id": "default", "name": "tempest-ServerGroupsRbacTest-697286629"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-765eef13-2bc5-418f-802e-ee82dfd3293f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "515736bf7b0647c594bd5fac4e74c348", "name": "tempest-ServerGroupsRbacTest-697286629", "domain_id": "default", "description": "tempest-ServerGroupsRbacTest-697286629-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:32.933 197 INFO tempest.lib.common.rest_client [req-adb20785-4111-4528-af89-fc37b7ed8c5b ] Request (ImagesMetadataRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=21ee5a672ddd44f7a4c48346daaf0211&name=default 0.299s 2020-12-14 02:14:32.936 197 DEBUG tempest.lib.common.rest_client [req-adb20785-4111-4528-af89-fc37b7ed8c5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-adb20785-4111-4528-af89-fc37b7ed8c5b', 'date': 'Mon, 14 Dec 2020 02:14:32 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=21ee5a672ddd44f7a4c48346daaf0211&name=default'} Body: b'{"security_groups": [{"id": "6e9d826d-ed3b-46b3-ad23-9a8f1726a3f9", "name": "default", "stateful": true, "tenant_id": "21ee5a672ddd44f7a4c48346daaf0211", "description": "Default security group", "security_group_rules": [{"id": "50106ea5-4f5b-4385-9302-2b24612a7eb7", "tenant_id": "21ee5a672ddd44f7a4c48346daaf0211", "security_group_id": "6e9d826d-ed3b-46b3-ad23-9a8f1726a3f9", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "6e9d826d-ed3b-46b3-ad23-9a8f1726a3f9", "description": null, "tags": [], "created_at": "2020-12-14T02:14:32Z", "updated_at": "2020-12-14T02:14:32Z", "revision_number": 0, "project_id": "21ee5a672ddd44f7a4c48346daaf0211"}, {"id": "54263aa4-87e2-47e3-90e1-f75bbdaf39e6", "tenant_id": "21ee5a672ddd44f7a4c48346daaf0211", "security_group_id": "6e9d826d-ed3b-46b3-ad23-9a8f1726a3f9", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:32Z", "updated_at": "2020-12-14T02:14:32Z", "revision_number": 0, "project_id": "21ee5a672ddd44f7a4c48346daaf0211"}, {"id": "c2a0d6c8-5247-4800-b291-0a0e268f066f", "tenant_id": "21ee5a672ddd44f7a4c48346daaf0211", "security_group_id": "6e9d826d-ed3b-46b3-ad23-9a8f1726a3f9", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "6e9d826d-ed3b-46b3-ad23-9a8f1726a3f9", "description": null, "tags": [], "created_at": "2020-12-14T02:14:32Z", "updated_at": "2020-12-14T02:14:32Z", "revision_number": 0, "project_id": "21ee5a672ddd44f7a4c48346daaf0211"}, {"id": "ee06bba8-33b7-4bb5-b70a-96064db00160", "tenant_id": "21ee5a672ddd44f7a4c48346daaf0211", "security_group_id": "6e9d826d-ed3b-46b3-ad23-9a8f1726a3f9", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:32Z", "updated_at": "2020-12-14T02:14:32Z", "revision_number": 0, "project_id": "21ee5a672ddd44f7a4c48346daaf0211"}], "tags": [], "created_at": "2020-12-14T02:14:32Z", "updated_at": "2020-12-14T02:14:32Z", "revision_number": 1, "project_id": "21ee5a672ddd44f7a4c48346daaf0211"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.069 193 INFO tempest.lib.common.rest_client [req-81df1e2f-83d2-45b5-8089-eccac79e119c ] Request (ServerGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.134s 2020-12-14 02:14:33.072 193 DEBUG tempest.lib.common.rest_client [req-81df1e2f-83d2-45b5-8089-eccac79e119c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerGroupsRbacTest-697286629", "password": "C2^8OUPHde85&wD", "project_id": "515736bf7b0647c594bd5fac4e74c348", "email": "tempest-ServerGroupsRbacTest-1766047561@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '395', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81df1e2f-83d2-45b5-8089-eccac79e119c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "515736bf7b0647c594bd5fac4e74c348", "email": "tempest-ServerGroupsRbacTest-1766047561@example.com", "id": "bdfd1eebd9e34654a457e5b91abc3168", "name": "tempest-ServerGroupsRbacTest-697286629", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/bdfd1eebd9e34654a457e5b91abc3168"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.130 197 INFO tempest.lib.common.rest_client [req-458ca7c4-3dff-4ec5-9cee-65a8a1e0732c ] Request (ImagesMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/6e9d826d-ed3b-46b3-ad23-9a8f1726a3f9 0.188s 2020-12-14 02:14:33.132 197 DEBUG tempest.lib.common.rest_client [req-458ca7c4-3dff-4ec5-9cee-65a8a1e0732c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-458ca7c4-3dff-4ec5-9cee-65a8a1e0732c', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/6e9d826d-ed3b-46b3-ad23-9a8f1726a3f9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.144 193 INFO tempest.lib.common.rest_client [req-cadeabfa-5c28-4530-ba09-53b604527c0f ] Request (ServerGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.064s 2020-12-14 02:14:33.149 193 DEBUG tempest.lib.common.rest_client [req-cadeabfa-5c28-4530-ba09-53b604527c0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cadeabfa-5c28-4530-ba09-53b604527c0f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.195 186 INFO tempest.lib.common.rest_client [req-1f052cec-ed44-41db-8c8c-737f615bfbb9 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9 0.296s 2020-12-14 02:14:33.197 186 DEBUG tempest.lib.common.rest_client [req-1f052cec-ed44-41db-8c8c-737f615bfbb9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1533', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1f052cec-ed44-41db-8c8c-737f615bfbb9', 'x-compute-request-id': 'req-1f052cec-ed44-41db-8c8c-737f615bfbb9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9'} Body: b'{"server": {"id": "ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9", "name": "tempest-SecurtiyGroupsRbacTest-server-1712569055", "status": "BUILD", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "user_id": "d6454cbca87a43e4843df1863d9a4ee6", "metadata": {}, "hostId": "636fddd831194c880400fb9230827e71d4afbe03e9540705de30335d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:25Z", "updated": "2020-12-14T02:14:27Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc5", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.225 193 INFO tempest.lib.common.rest_client [req-05cad365-8000-47f9-9ccf-7dbda7e02236 ] Request (ServerGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-12-14 02:14:33.227 193 DEBUG tempest.lib.common.rest_client [req-05cad365-8000-47f9-9ccf-7dbda7e02236 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05cad365-8000-47f9-9ccf-7dbda7e02236', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.288 197 INFO tempest.lib.common.rest_client [req-b20de01e-257a-4758-b6ce-34e965c4b9e3 ] Request (ImagesMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211 0.149s 2020-12-14 02:14:33.290 197 DEBUG tempest.lib.common.rest_client [req-b20de01e-257a-4758-b6ce-34e965c4b9e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b20de01e-257a-4758-b6ce-34e965c4b9e3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21ee5a672ddd44f7a4c48346daaf0211'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.350 197 INFO tempest.lib.common.rest_client [req-3d7248bb-056e-4ba8-8100-e38f7564a6fa ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:14:33.352 197 DEBUG tempest.lib.common.rest_client [req-3d7248bb-056e-4ba8-8100-e38f7564a6fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d7248bb-056e-4ba8-8100-e38f7564a6fa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["kk5-KoLMTk25krHPMKNdKg"], "expires_at": "2020-12-14T03:14:33.000000Z", "issued_at": "2020-12-14T02:14:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.372 193 INFO tempest.lib.common.rest_client [req-4b0fc435-8fa4-45cf-ba1d-c8ded91c41b4 ] Request (ServerGroupsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles/72a4576c553448cd941b052c1ca0cf2d 0.137s 2020-12-14 02:14:33.375 193 DEBUG tempest.lib.common.rest_client [req-4b0fc435-8fa4-45cf-ba1d-c8ded91c41b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b0fc435-8fa4-45cf-ba1d-c8ded91c41b4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.378 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerGroupsRbacTest-697286629', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '515736bf7b0647c594bd5fac4e74c348', 'project_name': 'tempest-ServerGroupsRbacTest-697286629', 'tenant_id': '515736bf7b0647c594bd5fac4e74c348', 'tenant_name': 'tempest-ServerGroupsRbacTest-697286629', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'bdfd1eebd9e34654a457e5b91abc3168'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:33.381 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerGroupsRbacTest-697286629', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '515736bf7b0647c594bd5fac4e74c348', 'project_name': 'tempest-ServerGroupsRbacTest-697286629', 'tenant_id': '515736bf7b0647c594bd5fac4e74c348', 'tenant_name': 'tempest-ServerGroupsRbacTest-697286629', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'bdfd1eebd9e34654a457e5b91abc3168'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:33.439 189 INFO tempest.lib.common.rest_client [req-7cb1c97f-c3d3-4fc6-9e6d-a0e28d087385 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.228s 2020-12-14 02:14:33.444 189 DEBUG tempest.lib.common.rest_client [req-7cb1c97f-c3d3-4fc6-9e6d-a0e28d087385 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7cb1c97f-c3d3-4fc6-9e6d-a0e28d087385', 'x-compute-request-id': 'req-7cb1c97f-c3d3-4fc6-9e6d-a0e28d087385', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:33Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:27.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.493 197 INFO tempest.lib.common.rest_client [req-43bc7da1-4a9c-45f7-a233-228e9dab434f ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:14:33.497 197 DEBUG tempest.lib.common.rest_client [req-43bc7da1-4a9c-45f7-a233-228e9dab434f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43bc7da1-4a9c-45f7-a233-228e9dab434f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["LI3fbj7nSqeyfMjf9h1hEw"], "expires_at": "2020-12-14T03:14:33.000000Z", "issued_at": "2020-12-14T02:14:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.564 189 INFO tempest.common.waiters [-] State transition "RESIZE/resize_prep" ==> "RESIZE/resize_migrating" after 3 second wait 2020-12-14 02:14:33.566 197 INFO tempest.lib.common.rest_client [req-8d8f913f-5925-4176-8793-5fc5976f99f4 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.063s 2020-12-14 02:14:33.569 197 DEBUG tempest.lib.common.rest_client [req-8d8f913f-5925-4176-8793-5fc5976f99f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8d8f913f-5925-4176-8793-5fc5976f99f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.581 193 INFO tempest.lib.common.rest_client [req-e15e0c1b-3a4d-4f6d-a041-5ce142c8d1fe ] Request (ServerGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.113s 2020-12-14 02:14:33.583 193 DEBUG tempest.lib.common.rest_client [req-e15e0c1b-3a4d-4f6d-a041-5ce142c8d1fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e15e0c1b-3a4d-4f6d-a041-5ce142c8d1fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdfd1eebd9e34654a457e5b91abc3168", "name": "tempest-ServerGroupsRbacTest-697286629", "password_expires_at": null}, "audit_ids": ["qDm-3f6TTEy__7KDaqC6SA"], "expires_at": "2020-12-14T03:14:33.000000Z", "issued_at": "2020-12-14T02:14:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "515736bf7b0647c594bd5fac4e74c348", "name": "tempest-ServerGroupsRbacTest-697286629"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.649 193 INFO tempest.lib.common.rest_client [req-0e0dea45-0bf8-44e2-80a1-b9bed9593097 ] Request (ServerGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-12-14 02:14:33.651 197 INFO tempest.lib.common.rest_client [req-86a8eab7-d743-42d5-b92a-f0e24f728aeb ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.075s 2020-12-14 02:14:33.653 193 DEBUG tempest.lib.common.rest_client [req-0e0dea45-0bf8-44e2-80a1-b9bed9593097 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e0dea45-0bf8-44e2-80a1-b9bed9593097', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ppJe0ziGSWuO2KGBqiDrfw"], "expires_at": "2020-12-14T03:14:33.000000Z", "issued_at": "2020-12-14T02:14:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.653 197 DEBUG tempest.lib.common.rest_client [req-86a8eab7-d743-42d5-b92a-f0e24f728aeb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-InstanceUsagesAuditLogRbacTest-865672369-desc", "domain_id": "default", "name": "tempest-InstanceUsagesAuditLogRbacTest-865672369"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '396', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-86a8eab7-d743-42d5-b92a-f0e24f728aeb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "20fa654695204d73b7055b8083732885", "name": "tempest-InstanceUsagesAuditLogRbacTest-865672369", "domain_id": "default", "description": "tempest-InstanceUsagesAuditLogRbacTest-865672369-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.773 193 INFO tempest.lib.common.rest_client [req-47093790-fad9-437a-9f09-b2e7426bd813 ] Request (ServerGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-12-14 02:14:33.776 193 DEBUG tempest.lib.common.rest_client [req-47093790-fad9-437a-9f09-b2e7426bd813 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47093790-fad9-437a-9f09-b2e7426bd813', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["FzEwtyzCR5-OaaCdpYwkxg"], "expires_at": "2020-12-14T03:14:33.000000Z", "issued_at": "2020-12-14T02:14:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.780 197 INFO tempest.lib.common.rest_client [req-9493a1a1-56d7-4c32-9289-6c45338bebbb ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.120s 2020-12-14 02:14:33.784 197 DEBUG tempest.lib.common.rest_client [req-9493a1a1-56d7-4c32-9289-6c45338bebbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-InstanceUsagesAuditLogRbacTest-865672369", "password": "X1+iyBv!v5d~FN0", "project_id": "20fa654695204d73b7055b8083732885", "email": "tempest-InstanceUsagesAuditLogRbacTest-1926748677@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '415', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9493a1a1-56d7-4c32-9289-6c45338bebbb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "20fa654695204d73b7055b8083732885", "email": "tempest-InstanceUsagesAuditLogRbacTest-1926748677@example.com", "id": "92788c636c894587b01236fb5e03f727", "name": "tempest-InstanceUsagesAuditLogRbacTest-865672369", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/92788c636c894587b01236fb5e03f727"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.843 193 INFO tempest.lib.common.rest_client [req-a8a89f78-2c53-4c1d-982b-6755425d70b2 ] Request (ServerGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.060s 2020-12-14 02:14:33.845 193 DEBUG tempest.lib.common.rest_client [req-a8a89f78-2c53-4c1d-982b-6755425d70b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8a89f78-2c53-4c1d-982b-6755425d70b2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.853 197 INFO tempest.lib.common.rest_client [req-18060e3f-e2dc-49a7-94d6-3d534eab415e ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:14:33.856 197 DEBUG tempest.lib.common.rest_client [req-18060e3f-e2dc-49a7-94d6-3d534eab415e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-18060e3f-e2dc-49a7-94d6-3d534eab415e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.912 193 INFO tempest.lib.common.rest_client [req-273a1373-a68d-4072-be63-983fdb9938f6 ] Request (ServerGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:14:33.915 193 DEBUG tempest.lib.common.rest_client [req-273a1373-a68d-4072-be63-983fdb9938f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-273a1373-a68d-4072-be63-983fdb9938f6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.921 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:14:33.924 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:33.930 197 INFO tempest.lib.common.rest_client [req-c7384f9a-1f25-4ef8-976c-4527b78bc0c9 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-12-14 02:14:33.932 197 DEBUG tempest.lib.common.rest_client [req-c7384f9a-1f25-4ef8-976c-4527b78bc0c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7384f9a-1f25-4ef8-976c-4527b78bc0c9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:33.999 193 INFO tempest.lib.common.rest_client [req-231e9982-56cf-44c5-bac1-dcec8fbed1b9 ] Request (ServerGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles 0.069s 2020-12-14 02:14:34.003 193 DEBUG tempest.lib.common.rest_client [req-231e9982-56cf-44c5-bac1-dcec8fbed1b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-231e9982-56cf-44c5-bac1-dcec8fbed1b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:34.022 197 INFO tempest.lib.common.rest_client [req-32387d0d-65be-4563-9b7b-c73fcba4aaca ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles/72a4576c553448cd941b052c1ca0cf2d 0.080s 2020-12-14 02:14:34.024 197 DEBUG tempest.lib.common.rest_client [req-32387d0d-65be-4563-9b7b-c73fcba4aaca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32387d0d-65be-4563-9b7b-c73fcba4aaca', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:34.027 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-InstanceUsagesAuditLogRbacTest-865672369', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '20fa654695204d73b7055b8083732885', 'project_name': 'tempest-InstanceUsagesAuditLogRbacTest-865672369', 'tenant_id': '20fa654695204d73b7055b8083732885', 'tenant_name': 'tempest-InstanceUsagesAuditLogRbacTest-865672369', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '92788c636c894587b01236fb5e03f727'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:34.029 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-InstanceUsagesAuditLogRbacTest-865672369', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '20fa654695204d73b7055b8083732885', 'project_name': 'tempest-InstanceUsagesAuditLogRbacTest-865672369', 'tenant_id': '20fa654695204d73b7055b8083732885', 'tenant_name': 'tempest-InstanceUsagesAuditLogRbacTest-865672369', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '92788c636c894587b01236fb5e03f727'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:34.157 193 INFO tempest.lib.common.rest_client [req-1a5ce13f-1275-4020-8dfd-a353d49fca3d ] Request (ServerGroupsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles/72a4576c553448cd941b052c1ca0cf2d 0.146s 2020-12-14 02:14:34.159 193 DEBUG tempest.lib.common.rest_client [req-1a5ce13f-1275-4020-8dfd-a353d49fca3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a5ce13f-1275-4020-8dfd-a353d49fca3d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:34.216 197 INFO tempest.lib.common.rest_client [req-a103c6e6-98d6-4075-9300-a895c9f61d1f ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.118s 2020-12-14 02:14:34.220 197 DEBUG tempest.lib.common.rest_client [req-a103c6e6-98d6-4075-9300-a895c9f61d1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6589', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a103c6e6-98d6-4075-9300-a895c9f61d1f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "92788c636c894587b01236fb5e03f727", "name": "tempest-InstanceUsagesAuditLogRbacTest-865672369", "password_expires_at": null}, "audit_ids": ["d3TnF2tsTWKeixy5D4cfOg"], "expires_at": "2020-12-14T03:14:34.000000Z", "issued_at": "2020-12-14T02:14:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "20fa654695204d73b7055b8083732885", "name": "tempest-InstanceUsagesAuditLogRbacTest-865672369"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:34.278 193 INFO tempest.lib.common.rest_client [req-2087b633-a146-428f-961f-a59488b22531 ] Request (ServerGroupsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles/a629c95d64b3416fb80ae90af4f69c05 0.111s 2020-12-14 02:14:34.281 193 DEBUG tempest.lib.common.rest_client [req-2087b633-a146-428f-961f-a59488b22531 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2087b633-a146-428f-961f-a59488b22531', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:34.328 197 INFO tempest.lib.common.rest_client [req-7d979097-6654-49b6-9dc3-fcc149e97b65 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:14:34.330 197 DEBUG tempest.lib.common.rest_client [req-7d979097-6654-49b6-9dc3-fcc149e97b65 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d979097-6654-49b6-9dc3-fcc149e97b65', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["H2JPJ8ZLTJWS9pdgXNRI6Q"], "expires_at": "2020-12-14T03:14:34.000000Z", "issued_at": "2020-12-14T02:14:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:34.442 197 INFO tempest.lib.common.rest_client [req-3fbf9a8e-713c-4db7-a365-fb6e796439d1 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:14:34.445 197 DEBUG tempest.lib.common.rest_client [req-3fbf9a8e-713c-4db7-a365-fb6e796439d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3fbf9a8e-713c-4db7-a365-fb6e796439d1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["o9KMqNSIQOqFn51uG4f8zQ"], "expires_at": "2020-12-14T03:14:34.000000Z", "issued_at": "2020-12-14T02:14:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:34.510 197 INFO tempest.lib.common.rest_client [req-82985eb0-7c8a-4527-8bd3-25ab20f59ecd ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.057s 2020-12-14 02:14:34.512 197 DEBUG tempest.lib.common.rest_client [req-82985eb0-7c8a-4527-8bd3-25ab20f59ecd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-82985eb0-7c8a-4527-8bd3-25ab20f59ecd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:34.574 197 INFO tempest.lib.common.rest_client [req-d45897e4-3834-4830-b156-726ab8c18027 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-14 02:14:34.576 197 DEBUG tempest.lib.common.rest_client [req-d45897e4-3834-4830-b156-726ab8c18027 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d45897e4-3834-4830-b156-726ab8c18027', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:34.580 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:14:34.583 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:34.585 186 INFO tempest.lib.common.rest_client [req-15a1c4c6-55be-4cdb-86de-52dc3aed7e88 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9 0.278s 2020-12-14 02:14:34.588 186 DEBUG tempest.lib.common.rest_client [req-15a1c4c6-55be-4cdb-86de-52dc3aed7e88 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-15a1c4c6-55be-4cdb-86de-52dc3aed7e88', 'x-compute-request-id': 'req-15a1c4c6-55be-4cdb-86de-52dc3aed7e88', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9'} Body: b'{"server": {"id": "ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9", "name": "tempest-SecurtiyGroupsRbacTest-server-1712569055", "status": "ACTIVE", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "user_id": "d6454cbca87a43e4843df1863d9a4ee6", "metadata": {}, "hostId": "636fddd831194c880400fb9230827e71d4afbe03e9540705de30335d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:25Z", "updated": "2020-12-14T02:14:33Z", "addresses": {"tempest-SecurtiyGroupsRbacTest-14230347-network": [{"version": 4, "addr": "192.168.120.10", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:9a:ba:ca"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:33.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc5", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:34.650 197 INFO tempest.lib.common.rest_client [req-081b07c8-5397-4daa-9957-da9a28620696 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles 0.060s 2020-12-14 02:14:34.653 197 DEBUG tempest.lib.common.rest_client [req-081b07c8-5397-4daa-9957-da9a28620696 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-081b07c8-5397-4daa-9957-da9a28620696', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:34.700 186 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 8 second wait 2020-12-14 02:14:34.708 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:34.713 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.716 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.719 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.722 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.726 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.729 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.734 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.737 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.738 197 INFO tempest.lib.common.rest_client [req-a41f7e99-49b0-4887-98ad-aced1b428bd2 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles/72a4576c553448cd941b052c1ca0cf2d 0.077s 2020-12-14 02:14:34.739 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.741 197 DEBUG tempest.lib.common.rest_client [req-a41f7e99-49b0-4887-98ad-aced1b428bd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a41f7e99-49b0-4887-98ad-aced1b428bd2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:34.742 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.745 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.748 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.751 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.754 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.757 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.760 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.763 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.765 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.768 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.771 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.773 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.776 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.779 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.781 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.784 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.787 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.790 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.792 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.795 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.798 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.800 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.803 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.806 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.808 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.811 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.814 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.816 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.819 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.822 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.825 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.828 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.830 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.833 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.837 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.839 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.842 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.845 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.847 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.849 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.851 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.853 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.856 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.858 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.857 197 INFO tempest.lib.common.rest_client [req-b4ec9742-e53b-4d40-8bdd-2e8cc840cc0d ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-12-14 02:14:34.860 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.860 197 DEBUG tempest.lib.common.rest_client [req-b4ec9742-e53b-4d40-8bdd-2e8cc840cc0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4ec9742-e53b-4d40-8bdd-2e8cc840cc0d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:34.863 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.865 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.870 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.872 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.875 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.877 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.879 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.882 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.882 189 INFO tempest.lib.common.rest_client [req-46798227-214f-4b80-be67-a12c136b25f8 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.310s 2020-12-14 02:14:34.884 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.886 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.886 189 DEBUG tempest.lib.common.rest_client [req-46798227-214f-4b80-be67-a12c136b25f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-46798227-214f-4b80-be67-a12c136b25f8', 'x-compute-request-id': 'req-46798227-214f-4b80-be67-a12c136b25f8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:33Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:27.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:34.888 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.890 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.892 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.895 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.897 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.899 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.901 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:34.911 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:add, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:35.323 186 INFO tempest.lib.common.rest_client [req-462e50cf-c8aa-44d5-a7e6-8bd2767ba583 ] Request (SecurtiyGroupsRbacTest:test_create_security_group_for_server): 200 POST http://172.30.13.94/compute/v2.1/os-security-groups 0.407s 2020-12-14 02:14:35.326 186 DEBUG tempest.lib.common.rest_client [req-462e50cf-c8aa-44d5-a7e6-8bd2767ba583 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecurtiyGroupsRbacTest-securitygroup-747779946", "description": "tempest-description-995984366"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '242', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-462e50cf-c8aa-44d5-a7e6-8bd2767ba583', 'x-compute-request-id': 'req-462e50cf-c8aa-44d5-a7e6-8bd2767ba583', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups'} Body: b'{"security_group": {"id": "8e3b4f40-10dc-4922-807d-e057737616f5", "description": "tempest-description-995984366", "name": "tempest-SecurtiyGroupsRbacTest-securitygroup-747779946", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "rules": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:35.362 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:35.390 193 INFO tempest.lib.common.rest_client [req-9aa993e7-b95d-4971-92ac-9b600bc137ab ] Request (ServerGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:14:35.393 193 DEBUG tempest.lib.common.rest_client [req-9aa993e7-b95d-4971-92ac-9b600bc137ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9aa993e7-b95d-4971-92ac-9b600bc137ab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdfd1eebd9e34654a457e5b91abc3168", "name": "tempest-ServerGroupsRbacTest-697286629", "password_expires_at": null}, "audit_ids": ["2LO5pRFmTQKdHmIoGQRiYA"], "expires_at": "2020-12-14T03:14:35.000000Z", "issued_at": "2020-12-14T02:14:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "515736bf7b0647c594bd5fac4e74c348", "name": "tempest-ServerGroupsRbacTest-697286629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:35.406 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:35.411 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.415 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.418 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.421 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.425 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.429 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.434 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.436 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.439 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.442 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.445 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.447 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.450 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.453 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.457 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.460 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.463 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.465 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.468 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.471 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.473 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.476 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.479 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.481 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.484 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.487 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.489 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.492 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.494 186 INFO tempest.lib.common.rest_client [req-4d1d72b7-1514-4fa6-beaa-10360bdcbd4e ] Request (SecurtiyGroupsRbacTest:test_create_security_group_for_server): 200 GET http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles 0.127s 2020-12-14 02:14:35.495 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.496 186 DEBUG tempest.lib.common.rest_client [req-4d1d72b7-1514-4fa6-beaa-10360bdcbd4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d1d72b7-1514-4fa6-beaa-10360bdcbd4e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:35.497 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.500 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.503 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.506 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.508 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.511 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.515 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.519 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.524 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.528 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.531 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.534 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.537 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.539 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.543 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.546 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.548 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.551 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.554 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.557 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.560 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.563 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.565 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.568 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.571 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.574 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.577 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.583 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.584 186 INFO tempest.lib.common.rest_client [req-7a404658-dea6-454d-8ecd-e067441da851 ] Request (SecurtiyGroupsRbacTest:test_create_security_group_for_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-12-14 02:14:35.586 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.589 186 DEBUG tempest.lib.common.rest_client [req-7a404658-dea6-454d-8ecd-e067441da851 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a404658-dea6-454d-8ecd-e067441da851', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d6454cbca87a43e4843df1863d9a4ee6", "name": "tempest-SecurtiyGroupsRbacTest-292399113", "password_expires_at": null}, "audit_ids": ["_3E4BKscQRaW4F6s3JGPJA"], "expires_at": "2020-12-14T03:14:35.000000Z", "issued_at": "2020-12-14T02:14:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6953bed3e9a64731a022421886bffdd1", "name": "tempest-SecurtiyGroupsRbacTest-292399113"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:35.589 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.593 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.595 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.598 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.601 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.604 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.606 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.609 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.612 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.615 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.617 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.620 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.622 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.630 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-groups:create, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:35.633 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:35.710 193 INFO tempest.lib.common.rest_client [req-8d5911d6-8132-4105-bb92-ee1b317e35b6 ] Request (ServerGroupsRbacTest:test_create_server_group): 200 GET http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles 0.071s 2020-12-14 02:14:35.714 193 DEBUG tempest.lib.common.rest_client [req-8d5911d6-8132-4105-bb92-ee1b317e35b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8d5911d6-8132-4105-bb92-ee1b317e35b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:35.763 193 INFO tempest.lib.common.rest_client [req-90a3f5e1-7ee6-45ab-8e49-7b42b4103235 ] Request (ServerGroupsRbacTest:test_create_server_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:14:35.766 193 DEBUG tempest.lib.common.rest_client [req-90a3f5e1-7ee6-45ab-8e49-7b42b4103235 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90a3f5e1-7ee6-45ab-8e49-7b42b4103235', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdfd1eebd9e34654a457e5b91abc3168", "name": "tempest-ServerGroupsRbacTest-697286629", "password_expires_at": null}, "audit_ids": ["YvIZXC6eRSmNbo11qlQdkw"], "expires_at": "2020-12-14T03:14:35.000000Z", "issued_at": "2020-12-14T02:14:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "515736bf7b0647c594bd5fac4e74c348", "name": "tempest-ServerGroupsRbacTest-697286629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:35.946 193 INFO tempest.lib.common.rest_client [req-42b8d0c3-1199-4414-9f82-db13a76ba3ea ] Request (ServerGroupsRbacTest:test_create_server_group): 200 POST http://172.30.13.94/compute/v2.1/os-server-groups 0.171s 2020-12-14 02:14:35.949 193 DEBUG tempest.lib.common.rest_client [req-42b8d0c3-1199-4414-9f82-db13a76ba3ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server_group": {"name": "tempest-ServerGroupsRbacTest-Server-Group-13840436", "policies": ["affinity"]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '183', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-42b8d0c3-1199-4414-9f82-db13a76ba3ea', 'x-compute-request-id': 'req-42b8d0c3-1199-4414-9f82-db13a76ba3ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups'} Body: b'{"server_group": {"id": "e42a7df6-8951-4fc6-adeb-9c65e6f02afa", "name": "tempest-ServerGroupsRbacTest-Server-Group-13840436", "policies": ["affinity"], "metadata": {}, "members": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:35.961 197 INFO tempest.lib.common.rest_client [req-0fe76402-b135-4fc0-a4e3-45838e7d32e5 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:14:35.965 197 DEBUG tempest.lib.common.rest_client [req-0fe76402-b135-4fc0-a4e3-45838e7d32e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0fe76402-b135-4fc0-a4e3-45838e7d32e5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "92788c636c894587b01236fb5e03f727", "name": "tempest-InstanceUsagesAuditLogRbacTest-865672369", "password_expires_at": null}, "audit_ids": ["A6Omb7cdSD-ul3CY6ZgKgQ"], "expires_at": "2020-12-14T03:14:35.000000Z", "issued_at": "2020-12-14T02:14:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "20fa654695204d73b7055b8083732885", "name": "tempest-InstanceUsagesAuditLogRbacTest-865672369"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:35.973 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:35.979 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:35.984 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.987 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.990 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.994 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:35.998 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.002 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.006 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.009 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.012 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.015 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.018 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.020 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.023 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.026 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.029 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.033 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.036 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.039 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.040 193 INFO tempest.lib.common.rest_client [req-98b30742-0267-49fe-99c5-bc9464dd1946 ] Request (ServerGroupsRbacTest:test_create_server_group): 200 GET http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles 0.060s 2020-12-14 02:14:36.042 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.044 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.043 193 DEBUG tempest.lib.common.rest_client [req-98b30742-0267-49fe-99c5-bc9464dd1946 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98b30742-0267-49fe-99c5-bc9464dd1946', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:36.047 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.050 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.053 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.055 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.058 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.061 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.064 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.067 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.069 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.072 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.076 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.079 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.081 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.084 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.087 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.090 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.093 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.095 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.098 193 INFO tempest.lib.common.rest_client [req-bdc8ec57-2821-4704-a91e-3ff27a53d78e ] Request (ServerGroupsRbacTest:test_create_server_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:14:36.099 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.101 193 DEBUG tempest.lib.common.rest_client [req-bdc8ec57-2821-4704-a91e-3ff27a53d78e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bdc8ec57-2821-4704-a91e-3ff27a53d78e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdfd1eebd9e34654a457e5b91abc3168", "name": "tempest-ServerGroupsRbacTest-697286629", "password_expires_at": null}, "audit_ids": ["z2hS3c1YRU28NyCRQjloyw"], "expires_at": "2020-12-14T03:14:36.000000Z", "issued_at": "2020-12-14T02:14:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "515736bf7b0647c594bd5fac4e74c348", "name": "tempest-ServerGroupsRbacTest-697286629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:36.102 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.105 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.108 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.110 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.114 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.117 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.119 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.122 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.126 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.129 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.132 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.133 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:36.135 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.137 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.138 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.140 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.140 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.143 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.143 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.147 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.147 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.150 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.151 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.155 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.156 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.159 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.159 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.161 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.163 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.165 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.167 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.168 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.170 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.171 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.173 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.174 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.176 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.177 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.179 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.180 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.182 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.182 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.184 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.185 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.187 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.189 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.190 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.191 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.193 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.194 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.196 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.197 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.199 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.202 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.205 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.206 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-instance-usage-audit-log:list, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:36.207 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.208 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:36.210 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.213 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.215 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.218 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.220 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.223 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.226 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.228 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.231 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.234 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.236 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.239 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.242 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.245 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.247 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.251 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.254 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.256 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.259 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.262 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.265 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.268 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.270 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.273 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.276 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.279 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.279 197 INFO tempest.lib.common.rest_client [req-98a44dbb-44c5-4fb9-b6a0-d32799a087fa ] Request (InstanceUsagesAuditLogRbacTest:test_list_instance_usage_audit_logs): 200 GET http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles 0.064s 2020-12-14 02:14:36.281 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.282 197 DEBUG tempest.lib.common.rest_client [req-98a44dbb-44c5-4fb9-b6a0-d32799a087fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98a44dbb-44c5-4fb9-b6a0-d32799a087fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:36.284 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.287 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.290 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.292 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.296 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.299 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.305 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.307 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.310 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.313 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.316 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.319 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.322 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.324 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.327 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.330 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.332 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.335 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.335 197 INFO tempest.lib.common.rest_client [req-0be978ff-a9d5-4eb3-b3dc-b2203b62a67f ] Request (InstanceUsagesAuditLogRbacTest:test_list_instance_usage_audit_logs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:14:36.338 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.338 197 DEBUG tempest.lib.common.rest_client [req-0be978ff-a9d5-4eb3-b3dc-b2203b62a67f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0be978ff-a9d5-4eb3-b3dc-b2203b62a67f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "92788c636c894587b01236fb5e03f727", "name": "tempest-InstanceUsagesAuditLogRbacTest-865672369", "password_expires_at": null}, "audit_ids": ["TnnWQiLmTFafqYrkaP45WQ"], "expires_at": "2020-12-14T03:14:36.000000Z", "issued_at": "2020-12-14T02:14:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "20fa654695204d73b7055b8083732885", "name": "tempest-InstanceUsagesAuditLogRbacTest-865672369"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:36.340 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.343 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.354 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-groups:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:36.447 197 INFO tempest.lib.common.rest_client [req-f705231a-8d9a-4da8-96ca-1920d0674ef2 ] Request (InstanceUsagesAuditLogRbacTest:test_list_instance_usage_audit_logs): 200 GET http://172.30.13.94/compute/v2.1/os-instance_usage_audit_log 0.101s 2020-12-14 02:14:36.451 197 DEBUG tempest.lib.common.rest_client [req-f705231a-8d9a-4da8-96ca-1920d0674ef2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '319', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f705231a-8d9a-4da8-96ca-1920d0674ef2', 'x-compute-request-id': 'req-f705231a-8d9a-4da8-96ca-1920d0674ef2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-instance_usage_audit_log'} Body: b'{"instance_usage_audit_logs": {"period_beginning": "2020-12-14 01:00:00", "period_ending": "2020-12-14 02:00:00", "num_hosts": 0, "num_hosts_done": 0, "num_hosts_running": 0, "num_hosts_not_run": 0, "hosts_not_run": [], "total_instances": 0, "total_errors": 0, "overall_status": "ALL hosts done. 0 errors.", "log": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:36.473 186 INFO tempest.lib.common.rest_client [req-00986124-4cc0-4489-a8ff-6b63b20d98dc ] Request (SecurtiyGroupsRbacTest:test_create_security_group_for_server): 202 POST http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9/action 0.877s 2020-12-14 02:14:36.475 186 DEBUG tempest.lib.common.rest_client [req-00986124-4cc0-4489-a8ff-6b63b20d98dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addSecurityGroup": {"name": "tempest-SecurtiyGroupsRbacTest-securitygroup-747779946"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-00986124-4cc0-4489-a8ff-6b63b20d98dc', 'x-compute-request-id': 'req-00986124-4cc0-4489-a8ff-6b63b20d98dc', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:36.478 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:36.487 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:36.515 189 INFO tempest.lib.common.rest_client [req-8d281e28-42e8-4689-bc38-8621fef1bd73 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.522s 2020-12-14 02:14:36.519 189 DEBUG tempest.lib.common.rest_client [req-8d281e28-42e8-4689-bc38-8621fef1bd73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8d281e28-42e8-4689-bc38-8621fef1bd73', 'x-compute-request-id': 'req-8d281e28-42e8-4689-bc38-8621fef1bd73', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:36Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:27.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:36.550 193 INFO tempest.lib.common.rest_client [req-d62a698b-ca6b-427f-b447-cf482d3b70b3 ] Request (ServerGroupsRbacTest:test_delete_server_group): 200 POST http://172.30.13.94/compute/v2.1/os-server-groups 0.189s 2020-12-14 02:14:36.554 193 DEBUG tempest.lib.common.rest_client [req-d62a698b-ca6b-427f-b447-cf482d3b70b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server_group": {"name": "tempest-ServerGroupsRbacTest-Server-Group-1328875002", "policies": ["affinity"]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '185', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d62a698b-ca6b-427f-b447-cf482d3b70b3', 'x-compute-request-id': 'req-d62a698b-ca6b-427f-b447-cf482d3b70b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups'} Body: b'{"server_group": {"id": "c9fd2689-564b-420f-9448-739a1a692ca7", "name": "tempest-ServerGroupsRbacTest-Server-Group-1328875002", "policies": ["affinity"], "metadata": {}, "members": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:36.577 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:36.600 186 INFO tempest.lib.common.rest_client [req-790f8228-b7f7-45fa-adcd-ecfc11c9b4cd ] Request (SecurtiyGroupsRbacTest:test_create_security_group_for_server): 200 GET http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles 0.115s 2020-12-14 02:14:36.604 186 DEBUG tempest.lib.common.rest_client [req-790f8228-b7f7-45fa-adcd-ecfc11c9b4cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-790f8228-b7f7-45fa-adcd-ecfc11c9b4cd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:36.626 189 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrating" ==> "RESIZE/resize_migrated" after 6 second wait 2020-12-14 02:14:36.641 197 INFO tempest.lib.common.rest_client [req-04fdd2fe-37e0-44f2-8bd4-0e0894ed2760 ] Request (InstanceUsagesAuditLogRbacTest:test_list_instance_usage_audit_logs): 200 GET http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles 0.147s 2020-12-14 02:14:36.645 197 DEBUG tempest.lib.common.rest_client [req-04fdd2fe-37e0-44f2-8bd4-0e0894ed2760 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04fdd2fe-37e0-44f2-8bd4-0e0894ed2760', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:36.647 193 INFO tempest.lib.common.rest_client [req-2fa9c683-09b8-48b0-9885-4740db786781 ] Request (ServerGroupsRbacTest:test_delete_server_group): 200 GET http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles 0.064s 2020-12-14 02:14:36.651 193 DEBUG tempest.lib.common.rest_client [req-2fa9c683-09b8-48b0-9885-4740db786781 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2fa9c683-09b8-48b0-9885-4740db786781', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:36.707 186 INFO tempest.lib.common.rest_client [req-a7bcfa31-c8f6-4d85-9af2-c6ee07132bd4 ] Request (SecurtiyGroupsRbacTest:test_create_security_group_for_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:14:36.711 186 DEBUG tempest.lib.common.rest_client [req-a7bcfa31-c8f6-4d85-9af2-c6ee07132bd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7bcfa31-c8f6-4d85-9af2-c6ee07132bd4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d6454cbca87a43e4843df1863d9a4ee6", "name": "tempest-SecurtiyGroupsRbacTest-292399113", "password_expires_at": null}, "audit_ids": ["trX5u9EDTmaFay86XNYe9A"], "expires_at": "2020-12-14T03:14:36.000000Z", "issued_at": "2020-12-14T02:14:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6953bed3e9a64731a022421886bffdd1", "name": "tempest-SecurtiyGroupsRbacTest-292399113"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:36.744 197 INFO tempest.lib.common.rest_client [req-a1b7bde4-a17a-4b32-a03f-fd10e7e6fbd7 ] Request (InstanceUsagesAuditLogRbacTest:test_list_instance_usage_audit_logs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:14:36.746 193 INFO tempest.lib.common.rest_client [req-609871b9-8434-46c3-9a68-1c26df9edd0d ] Request (ServerGroupsRbacTest:test_delete_server_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-14 02:14:36.749 197 DEBUG tempest.lib.common.rest_client [req-a1b7bde4-a17a-4b32-a03f-fd10e7e6fbd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1b7bde4-a17a-4b32-a03f-fd10e7e6fbd7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "92788c636c894587b01236fb5e03f727", "name": "tempest-InstanceUsagesAuditLogRbacTest-865672369", "password_expires_at": null}, "audit_ids": ["BZa6cY2vQrCPkKwJFWoTKw"], "expires_at": "2020-12-14T03:14:36.000000Z", "issued_at": "2020-12-14T02:14:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "20fa654695204d73b7055b8083732885", "name": "tempest-InstanceUsagesAuditLogRbacTest-865672369"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:36.751 193 DEBUG tempest.lib.common.rest_client [req-609871b9-8434-46c3-9a68-1c26df9edd0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-609871b9-8434-46c3-9a68-1c26df9edd0d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdfd1eebd9e34654a457e5b91abc3168", "name": "tempest-ServerGroupsRbacTest-697286629", "password_expires_at": null}, "audit_ids": ["zsT0ZFWLQeC9WHnc3oejKQ"], "expires_at": "2020-12-14T03:14:36.000000Z", "issued_at": "2020-12-14T02:14:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "515736bf7b0647c594bd5fac4e74c348", "name": "tempest-ServerGroupsRbacTest-697286629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:36.773 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:36.777 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.780 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.784 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.787 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.791 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.795 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.799 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.802 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.805 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.808 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.811 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.813 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.816 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.819 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.822 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.826 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.828 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.831 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.834 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.837 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.839 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.842 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.845 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.848 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.851 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.853 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.856 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.859 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.862 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.865 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.868 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.870 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.873 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.874 193 INFO tempest.lib.common.rest_client [req-795fae27-675c-4013-b6f1-0822fa05d588 ] Request (ServerGroupsRbacTest:test_delete_server_group): 204 DELETE http://172.30.13.94/compute/v2.1/os-server-groups/c9fd2689-564b-420f-9448-739a1a692ca7 0.116s 2020-12-14 02:14:36.876 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.877 193 DEBUG tempest.lib.common.rest_client [req-795fae27-675c-4013-b6f1-0822fa05d588 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-795fae27-675c-4013-b6f1-0822fa05d588', 'x-compute-request-id': 'req-795fae27-675c-4013-b6f1-0822fa05d588', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups/c9fd2689-564b-420f-9448-739a1a692ca7'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:36.879 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.881 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:36.882 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.885 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.887 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.891 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.894 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.897 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.899 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.902 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.911 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.914 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.916 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.918 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.920 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.923 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.925 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.927 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.929 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.932 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.934 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.937 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.939 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.944 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.946 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.948 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.951 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.952 193 INFO tempest.lib.common.rest_client [req-0c30c9cf-cc4c-4e83-8851-ae8c80f45d7b ] Request (ServerGroupsRbacTest:test_delete_server_group): 200 GET http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles 0.064s 2020-12-14 02:14:36.953 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.955 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.955 193 DEBUG tempest.lib.common.rest_client [req-0c30c9cf-cc4c-4e83-8851-ae8c80f45d7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c30c9cf-cc4c-4e83-8851-ae8c80f45d7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:36.957 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.960 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.962 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.964 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.966 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.969 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.971 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.973 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.975 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:36.983 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-instance-usage-audit-log:show, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:36.986 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:37.006 193 INFO tempest.lib.common.rest_client [req-66eee601-5334-4b54-8061-29cf3a3986e3 ] Request (ServerGroupsRbacTest:test_delete_server_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:14:37.010 193 DEBUG tempest.lib.common.rest_client [req-66eee601-5334-4b54-8061-29cf3a3986e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66eee601-5334-4b54-8061-29cf3a3986e3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdfd1eebd9e34654a457e5b91abc3168", "name": "tempest-ServerGroupsRbacTest-697286629", "password_expires_at": null}, "audit_ids": ["2J-JDNd4TKSHX6zmpW3ceA"], "expires_at": "2020-12-14T03:14:36.000000Z", "issued_at": "2020-12-14T02:14:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "515736bf7b0647c594bd5fac4e74c348", "name": "tempest-ServerGroupsRbacTest-697286629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:37.037 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:37.041 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.044 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.047 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.050 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.051 197 INFO tempest.lib.common.rest_client [req-1a0f6966-257a-44ce-bb4f-456580a11db2 ] Request (InstanceUsagesAuditLogRbacTest:test_show_instance_usage_audit_log): 200 GET http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles 0.060s 2020-12-14 02:14:37.054 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.055 197 DEBUG tempest.lib.common.rest_client [req-1a0f6966-257a-44ce-bb4f-456580a11db2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a0f6966-257a-44ce-bb4f-456580a11db2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:37.058 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.062 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.065 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.067 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.070 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.073 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.075 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.078 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.081 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.084 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.087 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.090 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.093 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.096 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.098 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.101 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.101 197 INFO tempest.lib.common.rest_client [req-da37be94-b3bc-44c7-880e-3b13fcc9f401 ] Request (InstanceUsagesAuditLogRbacTest:test_show_instance_usage_audit_log): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:14:37.104 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.105 197 DEBUG tempest.lib.common.rest_client [req-da37be94-b3bc-44c7-880e-3b13fcc9f401 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da37be94-b3bc-44c7-880e-3b13fcc9f401', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "92788c636c894587b01236fb5e03f727", "name": "tempest-InstanceUsagesAuditLogRbacTest-865672369", "password_expires_at": null}, "audit_ids": ["aYJD0WWQQ3aBhtaBUhhSIA"], "expires_at": "2020-12-14T03:14:37.000000Z", "issued_at": "2020-12-14T02:14:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "20fa654695204d73b7055b8083732885", "name": "tempest-InstanceUsagesAuditLogRbacTest-865672369"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:37.106 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.109 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.112 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.115 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.117 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.120 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.123 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.126 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.129 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.132 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.135 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.138 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.141 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.144 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.146 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.148 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.151 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.154 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.156 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.158 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.161 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.164 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.166 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.168 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.170 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.173 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.175 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.177 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.180 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.182 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.185 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.187 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.190 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.192 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.197 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.200 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.202 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.205 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.207 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.209 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.212 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.214 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.216 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.219 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.219 197 INFO tempest.lib.common.rest_client [req-f9fafe9d-c5fe-4b7e-86fe-a42eab73216d ] Request (InstanceUsagesAuditLogRbacTest:test_show_instance_usage_audit_log): 200 GET http://172.30.13.94/compute/v2.1/os-instance_usage_audit_log/2020-12-14%2002%3A14%3A36 0.104s 2020-12-14 02:14:37.221 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.222 197 DEBUG tempest.lib.common.rest_client [req-f9fafe9d-c5fe-4b7e-86fe-a42eab73216d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '318', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f9fafe9d-c5fe-4b7e-86fe-a42eab73216d', 'x-compute-request-id': 'req-f9fafe9d-c5fe-4b7e-86fe-a42eab73216d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-instance_usage_audit_log/2020-12-14%2002%3A14%3A36'} Body: b'{"instance_usage_audit_log": {"period_beginning": "2020-12-14 01:00:00", "period_ending": "2020-12-14 02:00:00", "num_hosts": 0, "num_hosts_done": 0, "num_hosts_running": 0, "num_hosts_not_run": 0, "hosts_not_run": [], "total_instances": 0, "total_errors": 0, "overall_status": "ALL hosts done. 0 errors.", "log": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:37.223 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.225 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.228 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.230 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.239 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-groups:index, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:37.241 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:37.255 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:37.303 193 INFO tempest.lib.common.rest_client [req-3fcb9745-4fdd-46e4-8e8f-7a891b1a1312 ] Request (ServerGroupsRbacTest:test_list_server_groups): 200 GET http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles 0.057s 2020-12-14 02:14:37.306 193 DEBUG tempest.lib.common.rest_client [req-3fcb9745-4fdd-46e4-8e8f-7a891b1a1312 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3fcb9745-4fdd-46e4-8e8f-7a891b1a1312', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:37.321 197 INFO tempest.lib.common.rest_client [req-7847b746-20cb-4305-91aa-e55062caf683 ] Request (InstanceUsagesAuditLogRbacTest:test_show_instance_usage_audit_log): 200 GET http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles 0.060s 2020-12-14 02:14:37.324 197 DEBUG tempest.lib.common.rest_client [req-7847b746-20cb-4305-91aa-e55062caf683 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7847b746-20cb-4305-91aa-e55062caf683', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885/users/92788c636c894587b01236fb5e03f727/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:37.351 193 INFO tempest.lib.common.rest_client [req-8e812c7a-177c-423f-91bb-89dcb50e05e8 ] Request (ServerGroupsRbacTest:test_list_server_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:14:37.353 193 DEBUG tempest.lib.common.rest_client [req-8e812c7a-177c-423f-91bb-89dcb50e05e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e812c7a-177c-423f-91bb-89dcb50e05e8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdfd1eebd9e34654a457e5b91abc3168", "name": "tempest-ServerGroupsRbacTest-697286629", "password_expires_at": null}, "audit_ids": ["eczVParhQkSHj1Mz57rJow"], "expires_at": "2020-12-14T03:14:37.000000Z", "issued_at": "2020-12-14T02:14:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "515736bf7b0647c594bd5fac4e74c348", "name": "tempest-ServerGroupsRbacTest-697286629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:37.372 197 INFO tempest.lib.common.rest_client [req-12eb3a95-4713-45de-bf3a-c2d89fae3345 ] Request (InstanceUsagesAuditLogRbacTest:test_show_instance_usage_audit_log): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:14:37.375 197 DEBUG tempest.lib.common.rest_client [req-12eb3a95-4713-45de-bf3a-c2d89fae3345 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-12eb3a95-4713-45de-bf3a-c2d89fae3345', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "92788c636c894587b01236fb5e03f727", "name": "tempest-InstanceUsagesAuditLogRbacTest-865672369", "password_expires_at": null}, "audit_ids": ["496Bj8eJR--9JmCTM8tFUQ"], "expires_at": "2020-12-14T03:14:37.000000Z", "issued_at": "2020-12-14T02:14:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "20fa654695204d73b7055b8083732885", "name": "tempest-InstanceUsagesAuditLogRbacTest-865672369"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_20fa654695204d73b7055b8083732885", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:37.550 193 INFO tempest.lib.common.rest_client [req-f82bd07a-9e95-43a3-9ad4-2d80cc319593 ] Request (ServerGroupsRbacTest:test_list_server_groups): 200 GET http://172.30.13.94/compute/v2.1/os-server-groups 0.191s 2020-12-14 02:14:37.553 193 DEBUG tempest.lib.common.rest_client [req-f82bd07a-9e95-43a3-9ad4-2d80cc319593 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '186', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f82bd07a-9e95-43a3-9ad4-2d80cc319593', 'x-compute-request-id': 'req-f82bd07a-9e95-43a3-9ad4-2d80cc319593', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups'} Body: b'{"server_groups": [{"id": "e42a7df6-8951-4fc6-adeb-9c65e6f02afa", "name": "tempest-ServerGroupsRbacTest-Server-Group-13840436", "policies": ["affinity"], "metadata": {}, "members": []}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:37.574 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:37.583 186 INFO tempest.lib.common.rest_client [req-965e4d8f-fae1-4d63-92a7-d35bdcbdf764 ] Request (SecurtiyGroupsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9/action 0.861s 2020-12-14 02:14:37.587 186 DEBUG tempest.lib.common.rest_client [req-965e4d8f-fae1-4d63-92a7-d35bdcbdf764 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeSecurityGroup": {"name": "tempest-SecurtiyGroupsRbacTest-securitygroup-747779946"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-965e4d8f-fae1-4d63-92a7-d35bdcbdf764', 'x-compute-request-id': 'req-965e4d8f-fae1-4d63-92a7-d35bdcbdf764', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:37.610 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:37.614 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.616 197 INFO tempest.lib.common.rest_client [req-8d249d66-6cc8-428e-a3e2-797a01190221 ] Request (InstanceUsagesAuditLogRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/92788c636c894587b01236fb5e03f727 0.212s 2020-12-14 02:14:37.617 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.619 197 DEBUG tempest.lib.common.rest_client [req-8d249d66-6cc8-428e-a3e2-797a01190221 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8d249d66-6cc8-428e-a3e2-797a01190221', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/92788c636c894587b01236fb5e03f727'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:37.620 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.623 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.627 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.630 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.635 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.638 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.640 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.643 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.645 193 INFO tempest.lib.common.rest_client [req-e6074bc9-467d-45f0-8876-cc005ef0860f ] Request (ServerGroupsRbacTest:test_list_server_groups): 200 GET http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles 0.065s 2020-12-14 02:14:37.646 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.647 193 DEBUG tempest.lib.common.rest_client [req-e6074bc9-467d-45f0-8876-cc005ef0860f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6074bc9-467d-45f0-8876-cc005ef0860f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:37.648 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.651 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.654 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.657 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.660 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.663 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.666 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.668 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.671 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.674 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.676 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.679 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.682 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.685 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.688 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.690 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.693 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.696 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.698 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.701 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.704 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.707 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.709 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.712 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.715 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.718 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.721 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.724 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.727 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.727 197 INFO tempest.lib.common.rest_client [req-dfb01d6c-32ba-4cfd-b3e1-192c4ae90140 ] Request (InstanceUsagesAuditLogRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:14:37.730 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.730 197 DEBUG tempest.lib.common.rest_client [req-dfb01d6c-32ba-4cfd-b3e1-192c4ae90140 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dfb01d6c-32ba-4cfd-b3e1-192c4ae90140', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["xltdFNiDQmCT5U8823GcVA"], "expires_at": "2020-12-14T03:14:37.000000Z", "issued_at": "2020-12-14T02:14:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:37.733 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.735 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.739 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.741 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.744 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.747 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.747 193 INFO tempest.lib.common.rest_client [req-1a8de85d-81e2-4fd1-bb8e-3b8550fd140a ] Request (ServerGroupsRbacTest:test_list_server_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:14:37.750 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.751 193 DEBUG tempest.lib.common.rest_client [req-1a8de85d-81e2-4fd1-bb8e-3b8550fd140a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a8de85d-81e2-4fd1-bb8e-3b8550fd140a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdfd1eebd9e34654a457e5b91abc3168", "name": "tempest-ServerGroupsRbacTest-697286629", "password_expires_at": null}, "audit_ids": ["OrQ1ZeQPRl2RVdvJGOz4ag"], "expires_at": "2020-12-14T03:14:37.000000Z", "issued_at": "2020-12-14T02:14:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "515736bf7b0647c594bd5fac4e74c348", "name": "tempest-ServerGroupsRbacTest-697286629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:37.752 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.755 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.757 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.760 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.763 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.765 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.769 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.772 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.775 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:37.778 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.779 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.780 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.781 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.783 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.784 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.786 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.786 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.789 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.789 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.791 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.792 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.794 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.796 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.797 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.798 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.799 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.801 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.802 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.803 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.805 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.805 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.807 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.807 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.809 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.810 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.811 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.812 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.813 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.814 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.817 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.819 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.822 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.823 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:list, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:37.824 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.825 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:37.826 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.828 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.831 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.833 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.835 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.837 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.839 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.842 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.844 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.846 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.848 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.850 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.852 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.855 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.857 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.859 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.861 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.863 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.866 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.868 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.872 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.874 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.877 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.879 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.882 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.886 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.890 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.893 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.893 186 INFO tempest.lib.common.rest_client [req-ba4fc820-ab58-4b77-90bd-0959cbc59b20 ] Request (SecurtiyGroupsRbacTest:test_list_security_groups_by_server): 200 GET http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles 0.061s 2020-12-14 02:14:37.896 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.896 186 DEBUG tempest.lib.common.rest_client [req-ba4fc820-ab58-4b77-90bd-0959cbc59b20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba4fc820-ab58-4b77-90bd-0959cbc59b20', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:37.898 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.901 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.904 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.907 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.909 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.912 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.916 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.919 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.925 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.927 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.930 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.933 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.936 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.939 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.942 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.944 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.947 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.950 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.952 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.955 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.958 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.958 189 INFO tempest.lib.common.rest_client [req-ec361895-4f90-44c8-b650-0e0786087569 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.324s 2020-12-14 02:14:37.960 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.961 189 DEBUG tempest.lib.common.rest_client [req-ec361895-4f90-44c8-b650-0e0786087569 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ec361895-4f90-44c8-b650-0e0786087569', 'x-compute-request-id': 'req-ec361895-4f90-44c8-b650-0e0786087569', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:36Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:27.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:37.963 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:37.975 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-groups:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:37.997 186 INFO tempest.lib.common.rest_client [req-6559cc9b-6c2c-4e40-92d5-d97725c8d0c3 ] Request (SecurtiyGroupsRbacTest:test_list_security_groups_by_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:14:38.001 186 DEBUG tempest.lib.common.rest_client [req-6559cc9b-6c2c-4e40-92d5-d97725c8d0c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6559cc9b-6c2c-4e40-92d5-d97725c8d0c3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d6454cbca87a43e4843df1863d9a4ee6", "name": "tempest-SecurtiyGroupsRbacTest-292399113", "password_expires_at": null}, "audit_ids": ["1vAS4MFQTx-V6w8cZTyVQA"], "expires_at": "2020-12-14T03:14:37.000000Z", "issued_at": "2020-12-14T02:14:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6953bed3e9a64731a022421886bffdd1", "name": "tempest-SecurtiyGroupsRbacTest-292399113"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:38.077 197 INFO tempest.lib.common.rest_client [req-26e61ac1-2bc2-4309-879c-7497dcf0429b ] Request (InstanceUsagesAuditLogRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=20fa654695204d73b7055b8083732885&name=default 0.340s 2020-12-14 02:14:38.080 197 DEBUG tempest.lib.common.rest_client [req-26e61ac1-2bc2-4309-879c-7497dcf0429b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-26e61ac1-2bc2-4309-879c-7497dcf0429b', 'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=20fa654695204d73b7055b8083732885&name=default'} Body: b'{"security_groups": [{"id": "912d9367-6313-4557-a28d-3f72991ca335", "name": "default", "stateful": true, "tenant_id": "20fa654695204d73b7055b8083732885", "description": "Default security group", "security_group_rules": [{"id": "3a3abfa4-9081-48cb-b6d6-6599b56ca80e", "tenant_id": "20fa654695204d73b7055b8083732885", "security_group_id": "912d9367-6313-4557-a28d-3f72991ca335", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:37Z", "updated_at": "2020-12-14T02:14:37Z", "revision_number": 0, "project_id": "20fa654695204d73b7055b8083732885"}, {"id": "3bfee122-5087-420d-9531-971b3c093e4f", "tenant_id": "20fa654695204d73b7055b8083732885", "security_group_id": "912d9367-6313-4557-a28d-3f72991ca335", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "912d9367-6313-4557-a28d-3f72991ca335", "description": null, "tags": [], "created_at": "2020-12-14T02:14:37Z", "updated_at": "2020-12-14T02:14:37Z", "revision_number": 0, "project_id": "20fa654695204d73b7055b8083732885"}, {"id": "69e10a5e-cd99-47f1-a4af-be773e962ac3", "tenant_id": "20fa654695204d73b7055b8083732885", "security_group_id": "912d9367-6313-4557-a28d-3f72991ca335", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "912d9367-6313-4557-a28d-3f72991ca335", "description": null, "tags": [], "created_at": "2020-12-14T02:14:37Z", "updated_at": "2020-12-14T02:14:37Z", "revision_number": 0, "project_id": "20fa654695204d73b7055b8083732885"}, {"id": "81091d2d-e7c3-4e82-a8b8-8c8f55350fb7", "tenant_id": "20fa654695204d73b7055b8083732885", "security_group_id": "912d9367-6313-4557-a28d-3f72991ca335", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:37Z", "updated_at": "2020-12-14T02:14:37Z", "revision_number": 0, "project_id": "20fa654695204d73b7055b8083732885"}], "tags": [], "created_at": "2020-12-14T02:14:37Z", "updated_at": "2020-12-14T02:14:37Z", "revision_number": 1, "project_id": "20fa654695204d73b7055b8083732885"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:38.272 197 INFO tempest.lib.common.rest_client [req-5ccfa456-07a3-4fbc-88cf-b487e6c028ea ] Request (InstanceUsagesAuditLogRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/912d9367-6313-4557-a28d-3f72991ca335 0.185s 2020-12-14 02:14:38.274 197 DEBUG tempest.lib.common.rest_client [req-5ccfa456-07a3-4fbc-88cf-b487e6c028ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5ccfa456-07a3-4fbc-88cf-b487e6c028ea', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/912d9367-6313-4557-a28d-3f72991ca335'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:38.310 193 INFO tempest.lib.common.rest_client [req-ee24576e-a300-4a8f-8087-be021a4893af ] Request (ServerGroupsRbacTest:test_show_server_group): 200 POST http://172.30.13.94/compute/v2.1/os-server-groups 0.327s 2020-12-14 02:14:38.314 193 DEBUG tempest.lib.common.rest_client [req-ee24576e-a300-4a8f-8087-be021a4893af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server_group": {"name": "tempest-ServerGroupsRbacTest-Server-Group-1522970602", "policies": ["affinity"]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '185', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ee24576e-a300-4a8f-8087-be021a4893af', 'x-compute-request-id': 'req-ee24576e-a300-4a8f-8087-be021a4893af', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups'} Body: b'{"server_group": {"id": "7cf143fa-8aae-4bcf-8404-ba3b6670aeae", "name": "tempest-ServerGroupsRbacTest-Server-Group-1522970602", "policies": ["affinity"], "metadata": {}, "members": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:38.338 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:38.422 186 INFO tempest.lib.common.rest_client [req-e21b0750-396e-45fe-a4fc-ca4c15924a22 ] Request (SecurtiyGroupsRbacTest:test_list_security_groups_by_server): 200 GET http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9/os-security-groups 0.413s 2020-12-14 02:14:38.424 186 DEBUG tempest.lib.common.rest_client [req-e21b0750-396e-45fe-a4fc-ca4c15924a22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '707', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e21b0750-396e-45fe-a4fc-ca4c15924a22', 'x-compute-request-id': 'req-e21b0750-396e-45fe-a4fc-ca4c15924a22', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9/os-security-groups'} Body: b'{"security_groups": [{"id": "856d5e0e-ad39-4706-a837-a24f973d74c2", "description": "Default security group", "name": "default", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "rules": [{"id": "2e46a124-a08b-4340-86ec-3eae3df718cb", "parent_group_id": "856d5e0e-ad39-4706-a837-a24f973d74c2", "ip_protocol": null, "from_port": null, "to_port": null, "group": {"name": "default", "tenant_id": "6953bed3e9a64731a022421886bffdd1"}, "ip_range": {}}, {"id": "34ac479b-a549-4b74-83b6-a56ae74f36f8", "parent_group_id": "856d5e0e-ad39-4706-a837-a24f973d74c2", "ip_protocol": null, "from_port": null, "to_port": null, "group": {"name": "default", "tenant_id": "6953bed3e9a64731a022421886bffdd1"}, "ip_range": {}}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:38.457 193 INFO tempest.lib.common.rest_client [req-ec7d1116-332e-474c-8255-b49e0dd4cf40 ] Request (ServerGroupsRbacTest:test_show_server_group): 200 GET http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles 0.112s 2020-12-14 02:14:38.461 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:38.461 193 DEBUG tempest.lib.common.rest_client [req-ec7d1116-332e-474c-8255-b49e0dd4cf40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec7d1116-332e-474c-8255-b49e0dd4cf40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:38.515 197 INFO tempest.lib.common.rest_client [req-ab3c2abf-e2ff-46fa-bde0-0661c9597def ] Request (InstanceUsagesAuditLogRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885 0.234s 2020-12-14 02:14:38.518 197 DEBUG tempest.lib.common.rest_client [req-ab3c2abf-e2ff-46fa-bde0-0661c9597def ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ab3c2abf-e2ff-46fa-bde0-0661c9597def', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/20fa654695204d73b7055b8083732885'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:38.564 193 INFO tempest.lib.common.rest_client [req-66284226-d827-415b-aca1-85421b978fe0 ] Request (ServerGroupsRbacTest:test_show_server_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:14:38.567 193 DEBUG tempest.lib.common.rest_client [req-66284226-d827-415b-aca1-85421b978fe0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66284226-d827-415b-aca1-85421b978fe0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdfd1eebd9e34654a457e5b91abc3168", "name": "tempest-ServerGroupsRbacTest-697286629", "password_expires_at": null}, "audit_ids": ["wYF7PwzYSfaA5MIuMMOPeA"], "expires_at": "2020-12-14T03:14:38.000000Z", "issued_at": "2020-12-14T02:14:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "515736bf7b0647c594bd5fac4e74c348", "name": "tempest-ServerGroupsRbacTest-697286629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:38.579 186 INFO tempest.lib.common.rest_client [req-96d3559c-b3c1-44ed-aca3-6ddf0fffed56 ] Request (SecurtiyGroupsRbacTest:test_list_security_groups_by_server): 200 GET http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles 0.111s 2020-12-14 02:14:38.582 186 DEBUG tempest.lib.common.rest_client [req-96d3559c-b3c1-44ed-aca3-6ddf0fffed56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96d3559c-b3c1-44ed-aca3-6ddf0fffed56', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:38.588 197 INFO tempest.lib.common.rest_client [req-3ae8bd3c-3d2c-4eae-ad58-6e0bce68b58f ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:14:38.591 197 DEBUG tempest.lib.common.rest_client [req-3ae8bd3c-3d2c-4eae-ad58-6e0bce68b58f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ae8bd3c-3d2c-4eae-ad58-6e0bce68b58f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["vaJJT3QKSCCeRqdF52EUIA"], "expires_at": "2020-12-14T03:14:38.000000Z", "issued_at": "2020-12-14T02:14:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:38.677 186 INFO tempest.lib.common.rest_client [req-197ad21b-c5b4-4f68-9c01-a270368338e2 ] Request (SecurtiyGroupsRbacTest:test_list_security_groups_by_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:14:38.681 186 DEBUG tempest.lib.common.rest_client [req-197ad21b-c5b4-4f68-9c01-a270368338e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-197ad21b-c5b4-4f68-9c01-a270368338e2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d6454cbca87a43e4843df1863d9a4ee6", "name": "tempest-SecurtiyGroupsRbacTest-292399113", "password_expires_at": null}, "audit_ids": ["tWY_poH1TKGshLkoJi7vZg"], "expires_at": "2020-12-14T03:14:38.000000Z", "issued_at": "2020-12-14T02:14:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6953bed3e9a64731a022421886bffdd1", "name": "tempest-SecurtiyGroupsRbacTest-292399113"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:38.690 197 INFO tempest.lib.common.rest_client [req-818c5c75-941b-49a1-84e7-158dfc387e80 ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:14:38.693 197 DEBUG tempest.lib.common.rest_client [req-818c5c75-941b-49a1-84e7-158dfc387e80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-818c5c75-941b-49a1-84e7-158dfc387e80', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ZicojlxoS6qYBGOhNoyWCw"], "expires_at": "2020-12-14T03:14:38.000000Z", "issued_at": "2020-12-14T02:14:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:38.699 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:38.702 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.705 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.708 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.710 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.713 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.716 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.720 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.722 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.725 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.727 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.729 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.731 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.734 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.736 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.739 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.741 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.744 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.746 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.748 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.750 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.752 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.754 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.757 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.759 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.761 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.763 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.764 197 INFO tempest.lib.common.rest_client [req-62aedd25-a9df-4ce9-abb7-f2db2b00fb2f ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.062s 2020-12-14 02:14:38.765 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.767 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.767 197 DEBUG tempest.lib.common.rest_client [req-62aedd25-a9df-4ce9-abb7-f2db2b00fb2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-62aedd25-a9df-4ce9-abb7-f2db2b00fb2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:38.770 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.772 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.774 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.776 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.778 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.780 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.783 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.785 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.787 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.789 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.792 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.794 193 INFO tempest.lib.common.rest_client [req-ce1f357b-9474-4ff9-ae30-1a74f99b7907 ] Request (ServerGroupsRbacTest:test_show_server_group): 200 GET http://172.30.13.94/compute/v2.1/os-server-groups/7cf143fa-8aae-4bcf-8404-ba3b6670aeae 0.219s 2020-12-14 02:14:38.795 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.797 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.797 193 DEBUG tempest.lib.common.rest_client [req-ce1f357b-9474-4ff9-ae30-1a74f99b7907 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '185', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ce1f357b-9474-4ff9-ae30-1a74f99b7907', 'x-compute-request-id': 'req-ce1f357b-9474-4ff9-ae30-1a74f99b7907', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups/7cf143fa-8aae-4bcf-8404-ba3b6670aeae'} Body: b'{"server_group": {"id": "7cf143fa-8aae-4bcf-8404-ba3b6670aeae", "name": "tempest-ServerGroupsRbacTest-Server-Group-1522970602", "policies": ["affinity"], "metadata": {}, "members": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:38.799 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.802 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.804 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.807 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.809 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.811 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.813 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.815 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.817 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.819 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.822 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.821 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:38.824 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.826 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.829 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.831 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.836 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.838 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.840 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.843 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.845 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.847 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.849 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.851 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.851 197 INFO tempest.lib.common.rest_client [req-45108862-852c-4b23-9014-47174824baaf ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.075s 2020-12-14 02:14:38.853 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.855 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.854 197 DEBUG tempest.lib.common.rest_client [req-45108862-852c-4b23-9014-47174824baaf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-MigrationsRbacTest-1840260040-desc", "domain_id": "default", "name": "tempest-MigrationsRbacTest-1840260040"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '374', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45108862-852c-4b23-9014-47174824baaf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "0094b562e5454e179c51e1d35de89cec", "name": "tempest-MigrationsRbacTest-1840260040", "domain_id": "default", "description": "tempest-MigrationsRbacTest-1840260040-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:38.858 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.860 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.862 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.864 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.866 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:38.876 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:remove, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:38.955 193 INFO tempest.lib.common.rest_client [req-a7fdb26c-758d-42b9-b4cd-74893c0df66d ] Request (ServerGroupsRbacTest:test_show_server_group): 200 GET http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles 0.126s 2020-12-14 02:14:38.959 193 DEBUG tempest.lib.common.rest_client [req-a7fdb26c-758d-42b9-b4cd-74893c0df66d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7fdb26c-758d-42b9-b4cd-74893c0df66d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348/users/bdfd1eebd9e34654a457e5b91abc3168/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:38.993 197 INFO tempest.lib.common.rest_client [req-80eaa84a-2a27-4310-88bb-eb4322fba81d ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.128s 2020-12-14 02:14:38.995 197 DEBUG tempest.lib.common.rest_client [req-80eaa84a-2a27-4310-88bb-eb4322fba81d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-MigrationsRbacTest-1840260040", "password": "Q1#+Kc4no3a~JdX", "project_id": "0094b562e5454e179c51e1d35de89cec", "email": "tempest-MigrationsRbacTest-1969602182@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '392', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-80eaa84a-2a27-4310-88bb-eb4322fba81d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "0094b562e5454e179c51e1d35de89cec", "email": "tempest-MigrationsRbacTest-1969602182@example.com", "id": "26ea33ae0c2b48bf80d2f906e6731d25", "name": "tempest-MigrationsRbacTest-1840260040", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/26ea33ae0c2b48bf80d2f906e6731d25"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.052 197 INFO tempest.lib.common.rest_client [req-e55770e5-10c2-4cdb-8925-3235f6a37490 ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-12-14 02:14:39.055 197 DEBUG tempest.lib.common.rest_client [req-e55770e5-10c2-4cdb-8925-3235f6a37490 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e55770e5-10c2-4cdb-8925-3235f6a37490', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.057 193 INFO tempest.lib.common.rest_client [req-6d7bc076-c18f-4e88-8640-5359d60dd892 ] Request (ServerGroupsRbacTest:test_show_server_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:14:39.061 193 DEBUG tempest.lib.common.rest_client [req-6d7bc076-c18f-4e88-8640-5359d60dd892 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d7bc076-c18f-4e88-8640-5359d60dd892', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdfd1eebd9e34654a457e5b91abc3168", "name": "tempest-ServerGroupsRbacTest-697286629", "password_expires_at": null}, "audit_ids": ["JAD3MQ7rSOKR1yLQcc3wZg"], "expires_at": "2020-12-14T03:14:38.000000Z", "issued_at": "2020-12-14T02:14:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "515736bf7b0647c594bd5fac4e74c348", "name": "tempest-ServerGroupsRbacTest-697286629"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_515736bf7b0647c594bd5fac4e74c348", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.175 197 INFO tempest.lib.common.rest_client [req-141a867c-2c15-4bc7-852d-96fafe8ac946 ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.112s 2020-12-14 02:14:39.178 197 DEBUG tempest.lib.common.rest_client [req-141a867c-2c15-4bc7-852d-96fafe8ac946 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-141a867c-2c15-4bc7-852d-96fafe8ac946', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.278 189 INFO tempest.lib.common.rest_client [req-f338fb54-1c03-4aba-abd3-a9bc9f7a276a ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.205s 2020-12-14 02:14:39.282 189 DEBUG tempest.lib.common.rest_client [req-f338fb54-1c03-4aba-abd3-a9bc9f7a276a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f338fb54-1c03-4aba-abd3-a9bc9f7a276a', 'x-compute-request-id': 'req-f338fb54-1c03-4aba-abd3-a9bc9f7a276a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:36Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:27.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.301 197 INFO tempest.lib.common.rest_client [req-88141cac-56e5-436b-9a5b-1d723c54d0c0 ] Request (MigrationsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec/users/26ea33ae0c2b48bf80d2f906e6731d25/roles/72a4576c553448cd941b052c1ca0cf2d 0.116s 2020-12-14 02:14:39.304 197 DEBUG tempest.lib.common.rest_client [req-88141cac-56e5-436b-9a5b-1d723c54d0c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88141cac-56e5-436b-9a5b-1d723c54d0c0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec/users/26ea33ae0c2b48bf80d2f906e6731d25/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.307 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MigrationsRbacTest-1840260040', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0094b562e5454e179c51e1d35de89cec', 'project_name': 'tempest-MigrationsRbacTest-1840260040', 'tenant_id': '0094b562e5454e179c51e1d35de89cec', 'tenant_name': 'tempest-MigrationsRbacTest-1840260040', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '26ea33ae0c2b48bf80d2f906e6731d25'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:39.310 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MigrationsRbacTest-1840260040', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0094b562e5454e179c51e1d35de89cec', 'project_name': 'tempest-MigrationsRbacTest-1840260040', 'tenant_id': '0094b562e5454e179c51e1d35de89cec', 'tenant_name': 'tempest-MigrationsRbacTest-1840260040', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '26ea33ae0c2b48bf80d2f906e6731d25'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:39.345 193 INFO tempest.lib.common.rest_client [req-bddab5a0-3f4d-490d-b4a6-100263b7266c ] Request (ServerGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/os-server-groups/7cf143fa-8aae-4bcf-8404-ba3b6670aeae 0.252s 2020-12-14 02:14:39.348 193 DEBUG tempest.lib.common.rest_client [req-bddab5a0-3f4d-490d-b4a6-100263b7266c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bddab5a0-3f4d-490d-b4a6-100263b7266c', 'x-compute-request-id': 'req-bddab5a0-3f4d-490d-b4a6-100263b7266c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups/7cf143fa-8aae-4bcf-8404-ba3b6670aeae'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.396 193 INFO tempest.lib.common.rest_client [req-250c3167-7a0e-4801-b003-d561923a4eed ] Request (ServerGroupsRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/os-server-groups/c9fd2689-564b-420f-9448-739a1a692ca7 0.039s 2020-12-14 02:14:39.399 193 DEBUG tempest.lib.common.rest_client [req-250c3167-7a0e-4801-b003-d561923a4eed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '117', 'x-openstack-request-id': 'req-250c3167-7a0e-4801-b003-d561923a4eed', 'x-compute-request-id': 'req-250c3167-7a0e-4801-b003-d561923a4eed', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups/c9fd2689-564b-420f-9448-739a1a692ca7'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance group c9fd2689-564b-420f-9448-739a1a692ca7 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.469 193 INFO tempest.lib.common.rest_client [req-e2550514-56b6-4846-a38a-20d6cc8776b4 ] Request (ServerGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/os-server-groups/e42a7df6-8951-4fc6-adeb-9c65e6f02afa 0.061s 2020-12-14 02:14:39.472 193 DEBUG tempest.lib.common.rest_client [req-e2550514-56b6-4846-a38a-20d6cc8776b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e2550514-56b6-4846-a38a-20d6cc8776b4', 'x-compute-request-id': 'req-e2550514-56b6-4846-a38a-20d6cc8776b4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/os-server-groups/e42a7df6-8951-4fc6-adeb-9c65e6f02afa'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.497 186 INFO tempest.lib.common.rest_client [req-9fec6ad9-8eed-444c-a922-0df59da4654a ] Request (SecurtiyGroupsRbacTest:test_remove_security_group_from_server): 200 POST http://172.30.13.94/compute/v2.1/os-security-groups 0.614s 2020-12-14 02:14:39.501 186 DEBUG tempest.lib.common.rest_client [req-9fec6ad9-8eed-444c-a922-0df59da4654a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecurtiyGroupsRbacTest-securitygroup-1899887777", "description": "tempest-description-1486812794"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '244', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9fec6ad9-8eed-444c-a922-0df59da4654a', 'x-compute-request-id': 'req-9fec6ad9-8eed-444c-a922-0df59da4654a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups'} Body: b'{"security_group": {"id": "66b669b0-cd27-443c-9ebc-1ad6a65c5786", "description": "tempest-description-1486812794", "name": "tempest-SecurtiyGroupsRbacTest-securitygroup-1899887777", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "rules": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.515 197 INFO tempest.lib.common.rest_client [req-f77afd9a-bb26-4c0c-bd9d-736b207e62eb ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.137s 2020-12-14 02:14:39.518 197 DEBUG tempest.lib.common.rest_client [req-f77afd9a-bb26-4c0c-bd9d-736b207e62eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6567', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f77afd9a-bb26-4c0c-bd9d-736b207e62eb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "26ea33ae0c2b48bf80d2f906e6731d25", "name": "tempest-MigrationsRbacTest-1840260040", "password_expires_at": null}, "audit_ids": ["Lu5bDFHDSkSViCni6vRL5g"], "expires_at": "2020-12-14T03:14:39.000000Z", "issued_at": "2020-12-14T02:14:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0094b562e5454e179c51e1d35de89cec", "name": "tempest-MigrationsRbacTest-1840260040"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30. _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.574 197 INFO tempest.lib.common.rest_client [req-db38e34f-7c66-406f-aab7-34b2ce408f90 ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:14:39.576 197 DEBUG tempest.lib.common.rest_client [req-db38e34f-7c66-406f-aab7-34b2ce408f90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db38e34f-7c66-406f-aab7-34b2ce408f90', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["az8Hm9nFS7ux8sxUBBjOTg"], "expires_at": "2020-12-14T03:14:39.000000Z", "issued_at": "2020-12-14T02:14:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.672 193 INFO tempest.lib.common.rest_client [req-26e1f0d0-9773-4b83-9568-61f4e70ab0d5 ] Request (ServerGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/bdfd1eebd9e34654a457e5b91abc3168 0.191s 2020-12-14 02:14:39.674 193 DEBUG tempest.lib.common.rest_client [req-26e1f0d0-9773-4b83-9568-61f4e70ab0d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26e1f0d0-9773-4b83-9568-61f4e70ab0d5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/bdfd1eebd9e34654a457e5b91abc3168'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.750 197 INFO tempest.lib.common.rest_client [req-5e582603-cda9-4a3c-821f-c355328c1070 ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:14:39.754 197 DEBUG tempest.lib.common.rest_client [req-5e582603-cda9-4a3c-821f-c355328c1070 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e582603-cda9-4a3c-821f-c355328c1070', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ywRBRHTnQbuqtBrvSoED7Q"], "expires_at": "2020-12-14T03:14:39.000000Z", "issued_at": "2020-12-14T02:14:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.760 193 INFO tempest.lib.common.rest_client [req-a9a4740c-2a3d-4939-9ea7-315ab6a1c6b4 ] Request (ServerGroupsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-12-14 02:14:39.764 193 DEBUG tempest.lib.common.rest_client [req-a9a4740c-2a3d-4939-9ea7-315ab6a1c6b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9a4740c-2a3d-4939-9ea7-315ab6a1c6b4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["zG_1JWpqRQurNa5oxn1SQw"], "expires_at": "2020-12-14T03:14:39.000000Z", "issued_at": "2020-12-14T02:14:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.823 197 INFO tempest.lib.common.rest_client [req-b2389a89-5db3-407d-b24d-a6093f4fe4af ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.061s 2020-12-14 02:14:39.826 197 DEBUG tempest.lib.common.rest_client [req-b2389a89-5db3-407d-b24d-a6093f4fe4af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2389a89-5db3-407d-b24d-a6093f4fe4af', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.892 197 INFO tempest.lib.common.rest_client [req-ab4f3d0f-2c4c-47bd-a4d5-0e35e87cc1c8 ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:14:39.896 197 DEBUG tempest.lib.common.rest_client [req-ab4f3d0f-2c4c-47bd-a4d5-0e35e87cc1c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ab4f3d0f-2c4c-47bd-a4d5-0e35e87cc1c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:39.899 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:14:39.902 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:39.969 197 INFO tempest.lib.common.rest_client [req-b05be460-a24e-4bf9-85e5-1c6bac12306b ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec/users/26ea33ae0c2b48bf80d2f906e6731d25/roles 0.061s 2020-12-14 02:14:39.972 197 DEBUG tempest.lib.common.rest_client [req-b05be460-a24e-4bf9-85e5-1c6bac12306b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b05be460-a24e-4bf9-85e5-1c6bac12306b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec/users/26ea33ae0c2b48bf80d2f906e6731d25/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec/users/26ea33ae0c2b48bf80d2f906e6731d25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:40.046 197 INFO tempest.lib.common.rest_client [req-95e20596-7e65-4c09-b86a-8e02a24ac9cb ] Request (MigrationsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec/users/26ea33ae0c2b48bf80d2f906e6731d25/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-12-14 02:14:40.049 197 DEBUG tempest.lib.common.rest_client [req-95e20596-7e65-4c09-b86a-8e02a24ac9cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95e20596-7e65-4c09-b86a-8e02a24ac9cb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec/users/26ea33ae0c2b48bf80d2f906e6731d25/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:40.100 193 INFO tempest.lib.common.rest_client [req-944adde6-50ad-4686-acc6-010a290562df ] Request (ServerGroupsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=515736bf7b0647c594bd5fac4e74c348&name=default 0.329s 2020-12-14 02:14:40.103 193 DEBUG tempest.lib.common.rest_client [req-944adde6-50ad-4686-acc6-010a290562df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-944adde6-50ad-4686-acc6-010a290562df', 'date': 'Mon, 14 Dec 2020 02:14:40 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=515736bf7b0647c594bd5fac4e74c348&name=default'} Body: b'{"security_groups": [{"id": "cba757f3-5aa2-4f95-84a2-b7f6aa07d31a", "name": "default", "stateful": true, "tenant_id": "515736bf7b0647c594bd5fac4e74c348", "description": "Default security group", "security_group_rules": [{"id": "59b62adf-68c6-4218-a180-7b0c3657a8d1", "tenant_id": "515736bf7b0647c594bd5fac4e74c348", "security_group_id": "cba757f3-5aa2-4f95-84a2-b7f6aa07d31a", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:40Z", "updated_at": "2020-12-14T02:14:40Z", "revision_number": 0, "project_id": "515736bf7b0647c594bd5fac4e74c348"}, {"id": "8553a173-e476-4a54-b5c5-49b165382c2d", "tenant_id": "515736bf7b0647c594bd5fac4e74c348", "security_group_id": "cba757f3-5aa2-4f95-84a2-b7f6aa07d31a", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "cba757f3-5aa2-4f95-84a2-b7f6aa07d31a", "description": null, "tags": [], "created_at": "2020-12-14T02:14:40Z", "updated_at": "2020-12-14T02:14:40Z", "revision_number": 0, "project_id": "515736bf7b0647c594bd5fac4e74c348"}, {"id": "96d1c743-6771-4f34-b1fa-bbc14fa3a9d0", "tenant_id": "515736bf7b0647c594bd5fac4e74c348", "security_group_id": "cba757f3-5aa2-4f95-84a2-b7f6aa07d31a", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:40Z", "updated_at": "2020-12-14T02:14:40Z", "revision_number": 0, "project_id": "515736bf7b0647c594bd5fac4e74c348"}, {"id": "ba3ee4ba-4519-4d58-a5e9-1956f59da621", "tenant_id": "515736bf7b0647c594bd5fac4e74c348", "security_group_id": "cba757f3-5aa2-4f95-84a2-b7f6aa07d31a", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "cba757f3-5aa2-4f95-84a2-b7f6aa07d31a", "description": null, "tags": [], "created_at": "2020-12-14T02:14:40Z", "updated_at": "2020-12-14T02:14:40Z", "revision_number": 0, "project_id": "515736bf7b0647c594bd5fac4e74c348"}], "tags": [], "created_at": "2020-12-14T02:14:39Z", "updated_at": "2020-12-14T02:14:40Z", "revision_number": 1, "project_id": "515736bf7b0647c594bd5fac4e74c348"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:40.148 197 INFO tempest.lib.common.rest_client [req-29e6b384-c369-4d3b-924d-87de77bd6c76 ] Request (MigrationsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec/users/26ea33ae0c2b48bf80d2f906e6731d25/roles/a629c95d64b3416fb80ae90af4f69c05 0.091s 2020-12-14 02:14:40.150 197 DEBUG tempest.lib.common.rest_client [req-29e6b384-c369-4d3b-924d-87de77bd6c76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29e6b384-c369-4d3b-924d-87de77bd6c76', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec/users/26ea33ae0c2b48bf80d2f906e6731d25/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:40.251 186 INFO tempest.lib.common.rest_client [req-42005900-12fc-4544-9f13-dfe568aa85f4 ] Request (SecurtiyGroupsRbacTest:test_remove_security_group_from_server): 202 POST http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9/action 0.716s 2020-12-14 02:14:40.254 186 DEBUG tempest.lib.common.rest_client [req-42005900-12fc-4544-9f13-dfe568aa85f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addSecurityGroup": {"name": "tempest-SecurtiyGroupsRbacTest-securitygroup-1899887777"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-42005900-12fc-4544-9f13-dfe568aa85f4', 'x-compute-request-id': 'req-42005900-12fc-4544-9f13-dfe568aa85f4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:40.256 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:40.367 186 INFO tempest.lib.common.rest_client [req-9ab53e34-4409-49db-86e2-88738c246f51 ] Request (SecurtiyGroupsRbacTest:test_remove_security_group_from_server): 200 GET http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles 0.105s 2020-12-14 02:14:40.371 186 DEBUG tempest.lib.common.rest_client [req-9ab53e34-4409-49db-86e2-88738c246f51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ab53e34-4409-49db-86e2-88738c246f51', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:40.392 193 INFO tempest.lib.common.rest_client [req-217eebc3-7610-4c10-a493-00eef2ea8dd5 ] Request (ServerGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/cba757f3-5aa2-4f95-84a2-b7f6aa07d31a 0.282s 2020-12-14 02:14:40.395 193 DEBUG tempest.lib.common.rest_client [req-217eebc3-7610-4c10-a493-00eef2ea8dd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-217eebc3-7610-4c10-a493-00eef2ea8dd5', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:14:40 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/cba757f3-5aa2-4f95-84a2-b7f6aa07d31a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:40.467 186 INFO tempest.lib.common.rest_client [req-1ebe90fd-c46a-4295-89dd-5d7e06b36921 ] Request (SecurtiyGroupsRbacTest:test_remove_security_group_from_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:14:40.471 186 DEBUG tempest.lib.common.rest_client [req-1ebe90fd-c46a-4295-89dd-5d7e06b36921 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ebe90fd-c46a-4295-89dd-5d7e06b36921', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d6454cbca87a43e4843df1863d9a4ee6", "name": "tempest-SecurtiyGroupsRbacTest-292399113", "password_expires_at": null}, "audit_ids": ["zjkBeQTXR0mHTpyd91oPwQ"], "expires_at": "2020-12-14T03:14:40.000000Z", "issued_at": "2020-12-14T02:14:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6953bed3e9a64731a022421886bffdd1", "name": "tempest-SecurtiyGroupsRbacTest-292399113"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:40.533 193 INFO tempest.lib.common.rest_client [req-fe5c1d37-7ac3-44f6-a1b1-43eedef9ccef ] Request (ServerGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348 0.133s 2020-12-14 02:14:40.535 193 DEBUG tempest.lib.common.rest_client [req-fe5c1d37-7ac3-44f6-a1b1-43eedef9ccef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe5c1d37-7ac3-44f6-a1b1-43eedef9ccef', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/515736bf7b0647c594bd5fac4e74c348'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:40.651 193 INFO tempest.lib.common.rest_client [req-87a5ee22-9b94-4be2-9e68-740e3037aa93 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:14:40.655 193 DEBUG tempest.lib.common.rest_client [req-87a5ee22-9b94-4be2-9e68-740e3037aa93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87a5ee22-9b94-4be2-9e68-740e3037aa93', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["kvXGLJrhSHCkwC-uCzd5_w"], "expires_at": "2020-12-14T03:14:40.000000Z", "issued_at": "2020-12-14T02:14:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:40.680 189 INFO tempest.lib.common.rest_client [req-d099dcbf-90d2-4e4c-9fcd-e22d1399da63 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.290s 2020-12-14 02:14:40.683 189 DEBUG tempest.lib.common.rest_client [req-d099dcbf-90d2-4e4c-9fcd-e22d1399da63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d099dcbf-90d2-4e4c-9fcd-e22d1399da63', 'x-compute-request-id': 'req-d099dcbf-90d2-4e4c-9fcd-e22d1399da63', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:36Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:27.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:40.755 193 INFO tempest.lib.common.rest_client [req-3443ecb0-9d8e-446c-9d52-cc20df2f99fc ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:14:40.758 193 DEBUG tempest.lib.common.rest_client [req-3443ecb0-9d8e-446c-9d52-cc20df2f99fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3443ecb0-9d8e-446c-9d52-cc20df2f99fc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Chz90XQRSMudokhQanZv7A"], "expires_at": "2020-12-14T03:14:40.000000Z", "issued_at": "2020-12-14T02:14:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:40.826 193 INFO tempest.lib.common.rest_client [req-8613d3d0-cd82-466e-a653-85abaf7660b4 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.061s 2020-12-14 02:14:40.829 193 DEBUG tempest.lib.common.rest_client [req-8613d3d0-cd82-466e-a653-85abaf7660b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8613d3d0-cd82-466e-a653-85abaf7660b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:40.899 193 INFO tempest.lib.common.rest_client [req-58471b92-8297-4774-a623-48c8aa848816 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.062s 2020-12-14 02:14:40.902 193 DEBUG tempest.lib.common.rest_client [req-58471b92-8297-4774-a623-48c8aa848816 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerVolumeAttachmentRbacTest-823488585-desc", "domain_id": "default", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '396', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58471b92-8297-4774-a623-48c8aa848816', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "6eaa7aebfbc3432bbcb4a961a888a31a", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585", "domain_id": "default", "description": "tempest-ServerVolumeAttachmentRbacTest-823488585-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:41.024 193 INFO tempest.lib.common.rest_client [req-4dfa67aa-9d75-4141-b759-53b86668b04c ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.114s 2020-12-14 02:14:41.027 193 DEBUG tempest.lib.common.rest_client [req-4dfa67aa-9d75-4141-b759-53b86668b04c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerVolumeAttachmentRbacTest-823488585", "password": "W2*MIIK=!RsC2c*", "project_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "email": "tempest-ServerVolumeAttachmentRbacTest-313051445@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '414', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4dfa67aa-9d75-4141-b759-53b86668b04c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "email": "tempest-ServerVolumeAttachmentRbacTest-313051445@example.com", "id": "57d9a7612ecf4fb8b34c79c101f93eb4", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/57d9a7612ecf4fb8b34c79c101f93eb4"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:41.103 193 INFO tempest.lib.common.rest_client [req-9fb17115-3f50-40b9-b28c-26bea08083a6 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.068s 2020-12-14 02:14:41.105 193 DEBUG tempest.lib.common.rest_client [req-9fb17115-3f50-40b9-b28c-26bea08083a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9fb17115-3f50-40b9-b28c-26bea08083a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:41.167 193 INFO tempest.lib.common.rest_client [req-d87ce14e-25b3-439b-88fe-d6e052677c87 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-12-14 02:14:41.169 193 DEBUG tempest.lib.common.rest_client [req-d87ce14e-25b3-439b-88fe-d6e052677c87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d87ce14e-25b3-439b-88fe-d6e052677c87', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:41.253 193 INFO tempest.lib.common.rest_client [req-610d313d-72fb-4b5c-a003-9099ff6357f0 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles/72a4576c553448cd941b052c1ca0cf2d 0.076s 2020-12-14 02:14:41.256 193 DEBUG tempest.lib.common.rest_client [req-610d313d-72fb-4b5c-a003-9099ff6357f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-610d313d-72fb-4b5c-a003-9099ff6357f0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:41.257 197 INFO tempest.lib.common.rest_client [req-257e7846-2c74-4315-9730-209d35289c65 ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:14:41.259 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerVolumeAttachmentRbacTest-823488585', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6eaa7aebfbc3432bbcb4a961a888a31a', 'project_name': 'tempest-ServerVolumeAttachmentRbacTest-823488585', 'tenant_id': '6eaa7aebfbc3432bbcb4a961a888a31a', 'tenant_name': 'tempest-ServerVolumeAttachmentRbacTest-823488585', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '57d9a7612ecf4fb8b34c79c101f93eb4'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:41.260 197 DEBUG tempest.lib.common.rest_client [req-257e7846-2c74-4315-9730-209d35289c65 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-257e7846-2c74-4315-9730-209d35289c65', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "26ea33ae0c2b48bf80d2f906e6731d25", "name": "tempest-MigrationsRbacTest-1840260040", "password_expires_at": null}, "audit_ids": ["_XQWynauQKK-C2IaliaI8w"], "expires_at": "2020-12-14T03:14:41.000000Z", "issued_at": "2020-12-14T02:14:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0094b562e5454e179c51e1d35de89cec", "name": "tempest-MigrationsRbacTest-1840260040"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:41.273 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:41.280 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.285 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.290 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.295 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.301 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.307 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.315 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.320 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.324 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.328 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.333 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.337 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.342 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.346 186 INFO tempest.lib.common.rest_client [req-c28b1a9e-143f-4111-8f8e-ae9ecbd176ea ] Request (SecurtiyGroupsRbacTest:test_remove_security_group_from_server): 202 POST http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9/action 0.869s 2020-12-14 02:14:41.346 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.349 186 DEBUG tempest.lib.common.rest_client [req-c28b1a9e-143f-4111-8f8e-ae9ecbd176ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeSecurityGroup": {"name": "tempest-SecurtiyGroupsRbacTest-securitygroup-1899887777"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c28b1a9e-143f-4111-8f8e-ae9ecbd176ea', 'x-compute-request-id': 'req-c28b1a9e-143f-4111-8f8e-ae9ecbd176ea', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:41.351 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:41.352 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.357 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.361 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.366 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.370 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.373 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.375 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.378 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.381 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.384 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.387 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.390 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.392 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.395 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.398 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.401 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.403 193 INFO tempest.lib.common.rest_client [req-720fb252-70b8-4709-8033-764d4bd6bcb6 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.136s 2020-12-14 02:14:41.404 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.406 193 DEBUG tempest.lib.common.rest_client [req-720fb252-70b8-4709-8033-764d4bd6bcb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-720fb252-70b8-4709-8033-764d4bd6bcb6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["PxrYM3deSoG2wy3fwjuOzg"], "expires_at": "2020-12-14T03:14:41.000000Z", "issued_at": "2020-12-14T02:14:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:41.406 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.409 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.412 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.415 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.418 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.421 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.424 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.427 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.430 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.433 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.436 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.439 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.442 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.445 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.448 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.451 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.454 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.456 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.459 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.462 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.465 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.468 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.471 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.475 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.478 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.477 186 INFO tempest.lib.common.rest_client [req-00929316-dd55-4688-8332-478849804dc3 ] Request (SecurtiyGroupsRbacTest:test_remove_security_group_from_server): 200 GET http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles 0.119s 2020-12-14 02:14:41.481 186 DEBUG tempest.lib.common.rest_client [req-00929316-dd55-4688-8332-478849804dc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-00929316-dd55-4688-8332-478849804dc3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1/users/d6454cbca87a43e4843df1863d9a4ee6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:41.484 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.487 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.490 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.493 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.496 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.499 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.502 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.505 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.508 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.511 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.513 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.516 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.519 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.522 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.525 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:41.534 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-migrations:index, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:41.536 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:41.581 186 INFO tempest.lib.common.rest_client [req-8cbd7534-2987-4a3e-8a46-80f084de9b99 ] Request (SecurtiyGroupsRbacTest:test_remove_security_group_from_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:14:41.585 186 DEBUG tempest.lib.common.rest_client [req-8cbd7534-2987-4a3e-8a46-80f084de9b99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8cbd7534-2987-4a3e-8a46-80f084de9b99', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d6454cbca87a43e4843df1863d9a4ee6", "name": "tempest-SecurtiyGroupsRbacTest-292399113", "password_expires_at": null}, "audit_ids": ["2iV41ZJMRqSoF21BHJNYvQ"], "expires_at": "2020-12-14T03:14:41.000000Z", "issued_at": "2020-12-14T02:14:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6953bed3e9a64731a022421886bffdd1", "name": "tempest-SecurtiyGroupsRbacTest-292399113"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6953bed3e9a64731a022421886bffdd1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:41.608 197 INFO tempest.lib.common.rest_client [req-aa347b44-9fdd-4a99-b5f0-41d16dacea97 ] Request (MigrationsRbacTest:test_list_services): 200 GET http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec/users/26ea33ae0c2b48bf80d2f906e6731d25/roles 0.066s 2020-12-14 02:14:41.611 197 DEBUG tempest.lib.common.rest_client [req-aa347b44-9fdd-4a99-b5f0-41d16dacea97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa347b44-9fdd-4a99-b5f0-41d16dacea97', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec/users/26ea33ae0c2b48bf80d2f906e6731d25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec/users/26ea33ae0c2b48bf80d2f906e6731d25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:41.711 197 INFO tempest.lib.common.rest_client [req-18e236ae-86d2-4f7f-8f98-6233bdd3b53c ] Request (MigrationsRbacTest:test_list_services): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:14:41.714 197 DEBUG tempest.lib.common.rest_client [req-18e236ae-86d2-4f7f-8f98-6233bdd3b53c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-18e236ae-86d2-4f7f-8f98-6233bdd3b53c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "26ea33ae0c2b48bf80d2f906e6731d25", "name": "tempest-MigrationsRbacTest-1840260040", "password_expires_at": null}, "audit_ids": ["Mg_-BuQrRNOtaAq-Bt2SAQ"], "expires_at": "2020-12-14T03:14:41.000000Z", "issued_at": "2020-12-14T02:14:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0094b562e5454e179c51e1d35de89cec", "name": "tempest-MigrationsRbacTest-1840260040"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:41.821 197 INFO tempest.lib.common.rest_client [req-f29d49dd-ac48-49ae-931f-d8b793aa85f9 ] Request (MigrationsRbacTest:test_list_services): 200 GET http://172.30.13.94/compute/v2.1/os-migrations 0.099s 2020-12-14 02:14:41.824 197 DEBUG tempest.lib.common.rest_client [req-f29d49dd-ac48-49ae-931f-d8b793aa85f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '416', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f29d49dd-ac48-49ae-931f-d8b793aa85f9', 'x-compute-request-id': 'req-f29d49dd-ac48-49ae-931f-d8b793aa85f9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-migrations'} Body: b'{"migrations": [{"id": 6405, "source_compute": "lf-virtual8", "dest_compute": "lf-virtual9", "source_node": "lf-virtual8", "dest_node": "lf-virtual9", "dest_host": "172.30.13.94", "old_instance_type_id": 10461, "new_instance_type_id": 10462, "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "status": "post-migrating", "created_at": "2020-12-14T02:14:31.000000", "updated_at": "2020-12-14T02:14:36.000000"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:41.870 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:41.928 186 INFO tempest.lib.common.rest_client [req-24562116-9513-4e4c-aaef-729dd7c586ac ] Request (SecurtiyGroupsRbacTest:_run_cleanups): 404 POST http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9/action 0.334s 2020-12-14 02:14:41.931 186 DEBUG tempest.lib.common.rest_client [req-24562116-9513-4e4c-aaef-729dd7c586ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeSecurityGroup": {"name": "tempest-SecurtiyGroupsRbacTest-securitygroup-1899887777"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '186', 'x-openstack-request-id': 'req-24562116-9513-4e4c-aaef-729dd7c586ac', 'x-compute-request-id': 'req-24562116-9513-4e4c-aaef-729dd7c586ac', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9/action'} Body: b'{"itemNotFound": {"code": 404, "message": "Security group tempest-SecurtiyGroupsRbacTest-securitygroup-1899887777 not associated with the instance ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:41.940 197 INFO tempest.lib.common.rest_client [req-a175d31a-8a90-437e-997f-c736b1c89d68 ] Request (MigrationsRbacTest:test_list_services): 200 GET http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec/users/26ea33ae0c2b48bf80d2f906e6731d25/roles 0.063s 2020-12-14 02:14:41.944 197 DEBUG tempest.lib.common.rest_client [req-a175d31a-8a90-437e-997f-c736b1c89d68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a175d31a-8a90-437e-997f-c736b1c89d68', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec/users/26ea33ae0c2b48bf80d2f906e6731d25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec/users/26ea33ae0c2b48bf80d2f906e6731d25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:41.985 189 INFO tempest.lib.common.rest_client [req-0fe4f988-5048-4461-86d2-4b4ba945c53c ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.181s 2020-12-14 02:14:41.989 189 DEBUG tempest.lib.common.rest_client [req-0fe4f988-5048-4461-86d2-4b4ba945c53c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0fe4f988-5048-4461-86d2-4b4ba945c53c', 'x-compute-request-id': 'req-0fe4f988-5048-4461-86d2-4b4ba945c53c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:36Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:27.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:42.003 197 INFO tempest.lib.common.rest_client [req-b05bf03d-b412-4435-97b6-c31359e5f2d2 ] Request (MigrationsRbacTest:test_list_services): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:14:42.007 197 DEBUG tempest.lib.common.rest_client [req-b05bf03d-b412-4435-97b6-c31359e5f2d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b05bf03d-b412-4435-97b6-c31359e5f2d2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "26ea33ae0c2b48bf80d2f906e6731d25", "name": "tempest-MigrationsRbacTest-1840260040", "password_expires_at": null}, "audit_ids": ["fWSUfRbRSL6siz9iFOC_yQ"], "expires_at": "2020-12-14T03:14:41.000000Z", "issued_at": "2020-12-14T02:14:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0094b562e5454e179c51e1d35de89cec", "name": "tempest-MigrationsRbacTest-1840260040"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0094b562e5454e179c51e1d35de89cec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:42.200 186 INFO tempest.lib.common.rest_client [req-862948de-416f-4740-a8eb-942793d9100f ] Request (SecurtiyGroupsRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/os-security-groups/66b669b0-cd27-443c-9ebc-1ad6a65c5786 0.238s 2020-12-14 02:14:42.204 186 DEBUG tempest.lib.common.rest_client [req-862948de-416f-4740-a8eb-942793d9100f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-862948de-416f-4740-a8eb-942793d9100f', 'x-compute-request-id': 'req-862948de-416f-4740-a8eb-942793d9100f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/66b669b0-cd27-443c-9ebc-1ad6a65c5786'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:42.223 197 INFO tempest.lib.common.rest_client [req-219bbd5f-71b9-47dd-8d46-ad2a71fd1419 ] Request (MigrationsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/26ea33ae0c2b48bf80d2f906e6731d25 0.183s 2020-12-14 02:14:42.226 197 DEBUG tempest.lib.common.rest_client [req-219bbd5f-71b9-47dd-8d46-ad2a71fd1419 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-219bbd5f-71b9-47dd-8d46-ad2a71fd1419', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/26ea33ae0c2b48bf80d2f906e6731d25'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:42.251 193 INFO tempest.lib.common.rest_client [req-e6f6e998-fe12-4dd7-ae96-efd9c8df62da ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.839s 2020-12-14 02:14:42.253 193 DEBUG tempest.lib.common.rest_client [req-e6f6e998-fe12-4dd7-ae96-efd9c8df62da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerVolumeAttachmentRbacTest-184020563-network", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}} Response - Headers: {'content-type': 'application/json', 'content-length': '745', 'x-openstack-request-id': 'req-e6f6e998-fe12-4dd7-ae96-efd9c8df62da', 'date': 'Mon, 14 Dec 2020 02:14:42 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"00ec2ac2-db01-4df5-be67-85a1a2cd2f4e","name":"tempest-ServerVolumeAttachmentRbacTest-184020563-network","tenant_id":"6eaa7aebfbc3432bbcb4a961a888a31a","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"6eaa7aebfbc3432bbcb4a961a888a31a","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":29,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:14:42Z","updated_at":"2020-12-14T02:14:42Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:42.329 197 INFO tempest.lib.common.rest_client [req-aaf4842a-5dee-4006-802a-bfd072be33c8 ] Request (MigrationsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:14:42.332 197 DEBUG tempest.lib.common.rest_client [req-aaf4842a-5dee-4006-802a-bfd072be33c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aaf4842a-5dee-4006-802a-bfd072be33c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["drxu9_UASreuGOSr0tps8w"], "expires_at": "2020-12-14T03:14:42.000000Z", "issued_at": "2020-12-14T02:14:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:42.660 197 INFO tempest.lib.common.rest_client [req-7b2c951d-45c3-4cdc-b256-abd9378ca7e4 ] Request (MigrationsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0094b562e5454e179c51e1d35de89cec&name=default 0.322s 2020-12-14 02:14:42.663 197 DEBUG tempest.lib.common.rest_client [req-7b2c951d-45c3-4cdc-b256-abd9378ca7e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-7b2c951d-45c3-4cdc-b256-abd9378ca7e4', 'date': 'Mon, 14 Dec 2020 02:14:42 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0094b562e5454e179c51e1d35de89cec&name=default'} Body: b'{"security_groups": [{"id": "97c8f8bd-92dc-44f6-b939-c3b356038ad1", "name": "default", "stateful": true, "tenant_id": "0094b562e5454e179c51e1d35de89cec", "description": "Default security group", "security_group_rules": [{"id": "95c37682-80f5-4948-b4aa-001dc5462529", "tenant_id": "0094b562e5454e179c51e1d35de89cec", "security_group_id": "97c8f8bd-92dc-44f6-b939-c3b356038ad1", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "97c8f8bd-92dc-44f6-b939-c3b356038ad1", "description": null, "tags": [], "created_at": "2020-12-14T02:14:42Z", "updated_at": "2020-12-14T02:14:42Z", "revision_number": 0, "project_id": "0094b562e5454e179c51e1d35de89cec"}, {"id": "c381b818-0b24-4f5d-aa4e-9e25010cae1a", "tenant_id": "0094b562e5454e179c51e1d35de89cec", "security_group_id": "97c8f8bd-92dc-44f6-b939-c3b356038ad1", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:42Z", "updated_at": "2020-12-14T02:14:42Z", "revision_number": 0, "project_id": "0094b562e5454e179c51e1d35de89cec"}, {"id": "c6e8b363-dae3-44e3-96c0-b8e6e2d82a96", "tenant_id": "0094b562e5454e179c51e1d35de89cec", "security_group_id": "97c8f8bd-92dc-44f6-b939-c3b356038ad1", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:42Z", "updated_at": "2020-12-14T02:14:42Z", "revision_number": 0, "project_id": "0094b562e5454e179c51e1d35de89cec"}, {"id": "d5c01020-064c-4d08-943b-fe4c4c3e4316", "tenant_id": "0094b562e5454e179c51e1d35de89cec", "security_group_id": "97c8f8bd-92dc-44f6-b939-c3b356038ad1", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "97c8f8bd-92dc-44f6-b939-c3b356038ad1", "description": null, "tags": [], "created_at": "2020-12-14T02:14:42Z", "updated_at": "2020-12-14T02:14:42Z", "revision_number": 0, "project_id": "0094b562e5454e179c51e1d35de89cec"}], "tags": [], "created_at": "2020-12-14T02:14:42Z", "updated_at": "2020-12-14T02:14:42Z", "revision_number": 1, "project_id": "0094b562e5454e179c51e1d35de89cec"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:43.284 197 INFO tempest.lib.common.rest_client [req-fb5b0a87-5698-4507-b659-a2f9850e3e04 ] Request (MigrationsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/97c8f8bd-92dc-44f6-b939-c3b356038ad1 0.614s 2020-12-14 02:14:43.287 197 DEBUG tempest.lib.common.rest_client [req-fb5b0a87-5698-4507-b659-a2f9850e3e04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-fb5b0a87-5698-4507-b659-a2f9850e3e04', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:14:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/97c8f8bd-92dc-44f6-b939-c3b356038ad1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:43.319 189 INFO tempest.lib.common.rest_client [req-b46fcedd-2fcb-4c63-80fa-17eb9d325957 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.224s 2020-12-14 02:14:43.322 189 DEBUG tempest.lib.common.rest_client [req-b46fcedd-2fcb-4c63-80fa-17eb9d325957 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b46fcedd-2fcb-4c63-80fa-17eb9d325957', 'x-compute-request-id': 'req-b46fcedd-2fcb-4c63-80fa-17eb9d325957', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:36Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:27.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:43.342 193 INFO tempest.lib.common.rest_client [req-568fb3c2-2772-44a7-b385-fd59513dddda ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 1.079s 2020-12-14 02:14:43.345 193 DEBUG tempest.lib.common.rest_client [req-568fb3c2-2772-44a7-b385-fd59513dddda ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "00ec2ac2-db01-4df5-be67-85a1a2cd2f4e", "cidr": "192.168.120.0/28", "name": "tempest-ServerVolumeAttachmentRbacTest-184020563-subnet", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '717', 'x-openstack-request-id': 'req-568fb3c2-2772-44a7-b385-fd59513dddda', 'date': 'Mon, 14 Dec 2020 02:14:43 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"8f8fefc9-0e33-4848-87ca-04c0450cb894","name":"tempest-ServerVolumeAttachmentRbacTest-184020563-subnet","tenant_id":"6eaa7aebfbc3432bbcb4a961a888a31a","network_id":"00ec2ac2-db01-4df5-be67-85a1a2cd2f4e","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:14:42Z","updated_at":"2020-12-14T02:14:42Z","revision_number":0,"project_id":"6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:43.488 197 INFO tempest.lib.common.rest_client [req-c6b47e66-af8f-4ec5-b630-b232529cfb7f ] Request (MigrationsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec 0.193s 2020-12-14 02:14:43.491 197 DEBUG tempest.lib.common.rest_client [req-c6b47e66-af8f-4ec5-b630-b232529cfb7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6b47e66-af8f-4ec5-b630-b232529cfb7f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0094b562e5454e179c51e1d35de89cec'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:43.639 197 INFO tempest.lib.common.rest_client [req-dfb68f52-398a-4cae-ba13-ae4fdba41885 ] Request (MigrateServerV225RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.126s 2020-12-14 02:14:43.642 197 DEBUG tempest.lib.common.rest_client [req-dfb68f52-398a-4cae-ba13-ae4fdba41885 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dfb68f52-398a-4cae-ba13-ae4fdba41885', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["h939GELzQd-f_2iqBjmskg"], "expires_at": "2020-12-14T03:14:43.000000Z", "issued_at": "2020-12-14T02:14:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:43.741 197 INFO tempest.lib.common.rest_client [req-a9bafd5e-b701-4cf0-adbf-07fa420e60e3 ] Request (MigrateServerV225RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:14:43.744 197 DEBUG tempest.lib.common.rest_client [req-a9bafd5e-b701-4cf0-adbf-07fa420e60e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9bafd5e-b701-4cf0-adbf-07fa420e60e3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["HBdjhmUJQdi-11nHe1JImQ"], "expires_at": "2020-12-14T03:14:43.000000Z", "issued_at": "2020-12-14T02:14:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:43.818 197 INFO tempest.lib.common.rest_client [req-9856708e-697e-4f24-aef2-96aef9c28f07 ] Request (MigrateServerV225RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.066s 2020-12-14 02:14:43.821 197 DEBUG tempest.lib.common.rest_client [req-9856708e-697e-4f24-aef2-96aef9c28f07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9856708e-697e-4f24-aef2-96aef9c28f07', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:43.907 197 INFO tempest.lib.common.rest_client [req-231c0323-607f-4db7-bc6a-c2fe17fc63be ] Request (MigrateServerV225RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.077s 2020-12-14 02:14:43.910 197 DEBUG tempest.lib.common.rest_client [req-231c0323-607f-4db7-bc6a-c2fe17fc63be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-MigrateServerV225RbacTest-1341058279-desc", "domain_id": "default", "name": "tempest-MigrateServerV225RbacTest-1341058279"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-231c0323-607f-4db7-bc6a-c2fe17fc63be', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "403869bab90a46d29a65a37723cddc04", "name": "tempest-MigrateServerV225RbacTest-1341058279", "domain_id": "default", "description": "tempest-MigrateServerV225RbacTest-1341058279-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:44.033 197 INFO tempest.lib.common.rest_client [req-7ff168a8-ba91-45fb-9f95-5c6b926e6af2 ] Request (MigrateServerV225RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.115s 2020-12-14 02:14:44.036 197 DEBUG tempest.lib.common.rest_client [req-7ff168a8-ba91-45fb-9f95-5c6b926e6af2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-MigrateServerV225RbacTest-1341058279", "password": "G8+Z9UU!N8CV2Ie", "project_id": "403869bab90a46d29a65a37723cddc04", "email": "tempest-MigrateServerV225RbacTest-911136787@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '405', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ff168a8-ba91-45fb-9f95-5c6b926e6af2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "403869bab90a46d29a65a37723cddc04", "email": "tempest-MigrateServerV225RbacTest-911136787@example.com", "id": "18d3406b0a7a4d39a16154bd45a9d223", "name": "tempest-MigrateServerV225RbacTest-1341058279", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/18d3406b0a7a4d39a16154bd45a9d223"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:44.149 197 INFO tempest.lib.common.rest_client [req-6026646c-df7c-463d-829a-23dc09a860c6 ] Request (MigrateServerV225RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.105s 2020-12-14 02:14:44.152 197 DEBUG tempest.lib.common.rest_client [req-6026646c-df7c-463d-829a-23dc09a860c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6026646c-df7c-463d-829a-23dc09a860c6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:44.216 197 INFO tempest.lib.common.rest_client [req-b40a6511-0736-4edb-9ca6-8b0efb673a7b ] Request (MigrateServerV225RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:14:44.218 197 DEBUG tempest.lib.common.rest_client [req-b40a6511-0736-4edb-9ca6-8b0efb673a7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b40a6511-0736-4edb-9ca6-8b0efb673a7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:44.312 197 INFO tempest.lib.common.rest_client [req-ac41360f-639a-46f6-986a-d2c2e8a80c4a ] Request (MigrateServerV225RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles/72a4576c553448cd941b052c1ca0cf2d 0.085s 2020-12-14 02:14:44.314 197 DEBUG tempest.lib.common.rest_client [req-ac41360f-639a-46f6-986a-d2c2e8a80c4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac41360f-639a-46f6-986a-d2c2e8a80c4a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:44.317 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MigrateServerV225RbacTest-1341058279', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '403869bab90a46d29a65a37723cddc04', 'project_name': 'tempest-MigrateServerV225RbacTest-1341058279', 'tenant_id': '403869bab90a46d29a65a37723cddc04', 'tenant_name': 'tempest-MigrateServerV225RbacTest-1341058279', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '18d3406b0a7a4d39a16154bd45a9d223'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:44.319 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MigrateServerV225RbacTest-1341058279', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '403869bab90a46d29a65a37723cddc04', 'project_name': 'tempest-MigrateServerV225RbacTest-1341058279', 'tenant_id': '403869bab90a46d29a65a37723cddc04', 'tenant_name': 'tempest-MigrateServerV225RbacTest-1341058279', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '18d3406b0a7a4d39a16154bd45a9d223'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:44.498 197 INFO tempest.lib.common.rest_client [req-af81a92e-94c4-481d-89ad-94fe0a008320 ] Request (MigrateServerV225RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-12-14 02:14:44.501 197 DEBUG tempest.lib.common.rest_client [req-af81a92e-94c4-481d-89ad-94fe0a008320 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af81a92e-94c4-481d-89ad-94fe0a008320', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "18d3406b0a7a4d39a16154bd45a9d223", "name": "tempest-MigrateServerV225RbacTest-1341058279", "password_expires_at": null}, "audit_ids": ["uBhy5-1sSW6d8QcqaR8vGQ"], "expires_at": "2020-12-14T03:14:44.000000Z", "issued_at": "2020-12-14T02:14:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "403869bab90a46d29a65a37723cddc04", "name": "tempest-MigrateServerV225RbacTest-1341058279"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:44.610 197 INFO tempest.lib.common.rest_client [req-9aab1167-f9da-489e-a7c3-eab446883624 ] Request (MigrateServerV225RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:14:44.614 197 DEBUG tempest.lib.common.rest_client [req-9aab1167-f9da-489e-a7c3-eab446883624 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9aab1167-f9da-489e-a7c3-eab446883624', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["YPpAV_arT-Cz-4aIViNyZA"], "expires_at": "2020-12-14T03:14:44.000000Z", "issued_at": "2020-12-14T02:14:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:44.677 189 INFO tempest.lib.common.rest_client [req-abd13916-d402-4df1-9c13-c4147782e672 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.241s 2020-12-14 02:14:44.680 189 DEBUG tempest.lib.common.rest_client [req-abd13916-d402-4df1-9c13-c4147782e672 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1729', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-abd13916-d402-4df1-9c13-c4147782e672', 'x-compute-request-id': 'req-abd13916-d402-4df1-9c13-c4147782e672', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:43Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:27.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:44.726 197 INFO tempest.lib.common.rest_client [req-cd168f2f-5e55-4ee1-9231-94f1371c17e8 ] Request (MigrateServerV225RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:14:44.729 197 DEBUG tempest.lib.common.rest_client [req-cd168f2f-5e55-4ee1-9231-94f1371c17e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd168f2f-5e55-4ee1-9231-94f1371c17e8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["uOfNQv4eR6KcpCaiEyDYGg"], "expires_at": "2020-12-14T03:14:44.000000Z", "issued_at": "2020-12-14T02:14:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:44.783 189 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrated" ==> "RESIZE/resize_finish" after 14 second wait 2020-12-14 02:14:44.786 197 INFO tempest.lib.common.rest_client [req-0163dec1-a695-46bc-9f8a-9fc160229687 ] Request (MigrateServerV225RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.049s 2020-12-14 02:14:44.789 197 DEBUG tempest.lib.common.rest_client [req-0163dec1-a695-46bc-9f8a-9fc160229687 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0163dec1-a695-46bc-9f8a-9fc160229687', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:44.852 197 INFO tempest.lib.common.rest_client [req-05d6faa2-dcb7-4f1d-8c80-36a7b39f95b6 ] Request (MigrateServerV225RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:14:44.855 197 DEBUG tempest.lib.common.rest_client [req-05d6faa2-dcb7-4f1d-8c80-36a7b39f95b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05d6faa2-dcb7-4f1d-8c80-36a7b39f95b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:44.858 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:14:44.860 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:44.984 197 INFO tempest.lib.common.rest_client [req-58f69cdc-6083-4d2d-adfa-297e001a7179 ] Request (MigrateServerV225RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles 0.118s 2020-12-14 02:14:44.986 197 DEBUG tempest.lib.common.rest_client [req-58f69cdc-6083-4d2d-adfa-297e001a7179 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58f69cdc-6083-4d2d-adfa-297e001a7179', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:45.059 197 INFO tempest.lib.common.rest_client [req-ab2167e0-be27-4c8a-ab0c-8887e924e8cb ] Request (MigrateServerV225RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-12-14 02:14:45.061 197 DEBUG tempest.lib.common.rest_client [req-ab2167e0-be27-4c8a-ab0c-8887e924e8cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ab2167e0-be27-4c8a-ab0c-8887e924e8cb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:45.179 197 INFO tempest.lib.common.rest_client [req-fb598564-a01c-488f-af12-f1de07d11938 ] Request (MigrateServerV225RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles/a629c95d64b3416fb80ae90af4f69c05 0.111s 2020-12-14 02:14:45.182 197 DEBUG tempest.lib.common.rest_client [req-fb598564-a01c-488f-af12-f1de07d11938 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fb598564-a01c-488f-af12-f1de07d11938', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:46.019 189 INFO tempest.lib.common.rest_client [req-179970f4-063d-4c61-8606-5407e13c9ff1 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.228s 2020-12-14 02:14:46.022 189 DEBUG tempest.lib.common.rest_client [req-179970f4-063d-4c61-8606-5407e13c9ff1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1729', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-179970f4-063d-4c61-8606-5407e13c9ff1', 'x-compute-request-id': 'req-179970f4-063d-4c61-8606-5407e13c9ff1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:43Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:27.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:46.290 197 INFO tempest.lib.common.rest_client [req-f31f34e5-1468-4983-b89b-400dfb2077b3 ] Request (MigrateServerV225RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:14:46.293 197 DEBUG tempest.lib.common.rest_client [req-f31f34e5-1468-4983-b89b-400dfb2077b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f31f34e5-1468-4983-b89b-400dfb2077b3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "18d3406b0a7a4d39a16154bd45a9d223", "name": "tempest-MigrateServerV225RbacTest-1341058279", "password_expires_at": null}, "audit_ids": ["QtiAtETvSuiPclXc85VIZg"], "expires_at": "2020-12-14T03:14:46.000000Z", "issued_at": "2020-12-14T02:14:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "403869bab90a46d29a65a37723cddc04", "name": "tempest-MigrateServerV225RbacTest-1341058279"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:46.307 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:14:46.311 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.315 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.318 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.321 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.325 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.329 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.334 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.336 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.339 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.342 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.345 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.347 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.350 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.353 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.356 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.360 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.362 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.365 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.368 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.370 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.373 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.376 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.379 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.381 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.384 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.387 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.389 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.392 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.395 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.397 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.400 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.403 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.406 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.408 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.411 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.414 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.417 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.419 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.423 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.426 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.429 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.431 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.434 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.437 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.440 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.443 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.446 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.448 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.451 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.454 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.456 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.459 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.462 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.465 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.468 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.471 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.477 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.480 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.482 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.486 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.488 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.491 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.494 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.497 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.499 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.502 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.505 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.507 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.510 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.513 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.516 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:14:46.523 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-migrate-server:migrate, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:14:46.617 197 INFO tempest.lib.common.rest_client [req-2f440759-07b1-4906-b883-752be92a199e ] Request (MigrateServerV225RbacTest:test_cold_migration): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:14:46.619 197 DEBUG tempest.lib.common.rest_client [req-2f440759-07b1-4906-b883-752be92a199e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f440759-07b1-4906-b883-752be92a199e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "18d3406b0a7a4d39a16154bd45a9d223", "name": "tempest-MigrateServerV225RbacTest-1341058279", "password_expires_at": null}, "audit_ids": ["4MSbmyB_SqyzAi9teiWj1w"], "expires_at": "2020-12-14T03:14:46.000000Z", "issued_at": "2020-12-14T02:14:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "403869bab90a46d29a65a37723cddc04", "name": "tempest-MigrateServerV225RbacTest-1341058279"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:46.623 197 DEBUG tempest.lib.common.fixed_network [-] (MigrateServerV225RbacTest:test_cold_migration) No valid network provided or created, defaulting to fixed_network_name get_tenant_network /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/fixed_network.py:102 2020-12-14 02:14:46.653 193 INFO tempest.lib.common.rest_client [req-e2d06fe5-1891-4ee0-bbbf-c64471ef19c9 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 3.301s 2020-12-14 02:14:46.656 193 DEBUG tempest.lib.common.rest_client [req-e2d06fe5-1891-4ee0-bbbf-c64471ef19c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerVolumeAttachmentRbacTest-184020563-router", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '818', 'x-openstack-request-id': 'req-e2d06fe5-1891-4ee0-bbbf-c64471ef19c9', 'date': 'Mon, 14 Dec 2020 02:14:46 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "f6ac1877-ad40-41a4-9ad7-524c74146b3c", "name": "tempest-ServerVolumeAttachmentRbacTest-184020563-router", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.92"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::1d1"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:14:43Z", "updated_at": "2020-12-14T02:14:45Z", "revision_number": 3, "project_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:46.686 186 INFO tempest.lib.common.rest_client [req-5f784cd1-2e24-45c7-87e8-e27fbb774fad ] Request (SecurtiyGroupsRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/os-security-groups/8e3b4f40-10dc-4922-807d-e057737616f5 4.476s 2020-12-14 02:14:46.689 186 DEBUG tempest.lib.common.rest_client [req-5f784cd1-2e24-45c7-87e8-e27fbb774fad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5f784cd1-2e24-45c7-87e8-e27fbb774fad', 'x-compute-request-id': 'req-5f784cd1-2e24-45c7-87e8-e27fbb774fad', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups/8e3b4f40-10dc-4922-807d-e057737616f5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:46.888 186 INFO tempest.lib.common.rest_client [req-a40ed43f-b728-4d93-94d9-3201f7adfa9e ] Request (SecurtiyGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9 0.193s 2020-12-14 02:14:46.891 186 DEBUG tempest.lib.common.rest_client [req-a40ed43f-b728-4d93-94d9-3201f7adfa9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a40ed43f-b728-4d93-94d9-3201f7adfa9e', 'x-compute-request-id': 'req-a40ed43f-b728-4d93-94d9-3201f7adfa9e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:47.036 197 INFO tempest.lib.common.rest_client [req-25ba32df-b426-47c9-9cc9-f41622c85d35 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94:9696/v2.0/networks 0.407s 2020-12-14 02:14:47.041 197 DEBUG tempest.lib.common.rest_client [req-25ba32df-b426-47c9-9cc9-f41622c85d35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '50686', 'x-openstack-request-id': 'req-25ba32df-b426-47c9-9cc9-f41622c85d35', 'date': 'Mon, 14 Dec 2020 02:14:47 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"networks":[{"id":"00ec2ac2-db01-4df5-be67-85a1a2cd2f4e","name":"tempest-ServerVolumeAttachmentRbacTest-184020563-network","tenant_id":"6eaa7aebfbc3432bbcb4a961a888a31a","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["8f8fefc9-0e33-4848-87ca-04c0450cb894"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:14:42Z","updated_at":"2020-12-14T02:14:42Z","revision_number":2,"project_id":"6eaa7aebfbc3432bbcb4a961a888a31a","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":29},{"id":"0238966e-2ff5-45a9-a802-c7e41594a9d8","name":"tempest-SecurtiyGroupsRbacTest-14230347-network","tenant_id":"6953bed3e9a64731a022421886bffdd1","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["be5de3d1-91f7-43bb-97ca-ee82b79fbd1b"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:14:21Z","updated_at":"2020-12-14T02:14:22Z","revision_number":2,"project_id":"6953bed3e9a64731a022421886bffdd1","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":65},{"id":"0271f828-506d-471c-80e1-655c753a8b19","name":"tempest-MultipleCreateTestJSON-190587910-network","tenant_id":"8324c3ca97db4ac59b569d6bbbcffa09","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["de943adb-63ef-40f8-8985-a23207d72968"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-05T13:01:36Z","updated_at":"2020-12-05T13:01:36Z","revision_number":2,"project_id":"8324c3ca97db4ac59b569d6bbbcffa09","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":32},{"id":"063503db-115b-4919-a9a6-1f3519d69592","name":"tempest-test-network--1200798417","tenant_id":"2cdd20738a884c61a2383ca16c2d69c9","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"availability_zone_hints":[],"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-13T11:20:01Z","updated_at":"2020-12-13T11:20:01Z","revision_number":1,"project_id":"2cdd20738a884c61a2383ca16c2d69c9","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":67},{"id":"09616387-dfe6-4d1f-9c5a-0be30adf60e8","name":"tempest-MultipleCreateTestJSON-1784355696-network","tenant_id":"aecfcc6a08a941db927cdcc1561d2427","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["a48a10af-d181-472e-ab9d-2b3defb56fad"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-05T13:09:23Z","updated_at":"2020-12-05T13:09:24Z","revision_number":2,"project_id":"aecfcc6a08a941db927cdcc1561d2427","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":12},{"id":"0d133d7f-cfa3-406c-bf2e-9e2becbbe589","name":"tempest-MultipleCreateTestJSON-1880416163-network","tenant_id":"dc83be2a868748cc9397fd7cb6675c26","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["5f072df7-c9f6-4538-8ff5-cab14f8d28a9"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:47.065 197 INFO tempest.lib.common.fixed_network [-] (MigrateServerV225RbacTest:test_cold_migration) Found network {'id': '11e7deb5-beae-4249-9f34-285ba605afd2', 'name': 'patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f', 'tenant_id': '3cc32870ea9c4124a18f8824ceee8b29', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': ['410abf33-6f29-4217-ac80-d3f2fac8eea9'], 'shared': True, 'availability_zone_hints': [], 'availability_zones': ['nova'], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'router:external': False, 'description': '', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:05:16Z', 'updated_at': '2020-12-14T02:05:17Z', 'revision_number': 2, 'project_id': '3cc32870ea9c4124a18f8824ceee8b29', 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 56} available for tenant 2020-12-14 02:14:47.123 186 INFO tempest.lib.common.rest_client [req-08d08dcc-df71-43a7-ace1-102e82a4c185 ] Request (SecurtiyGroupsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9 0.227s 2020-12-14 02:14:47.126 186 DEBUG tempest.lib.common.rest_client [req-08d08dcc-df71-43a7-ace1-102e82a4c185 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-08d08dcc-df71-43a7-ace1-102e82a4c185', 'x-compute-request-id': 'req-08d08dcc-df71-43a7-ace1-102e82a4c185', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9'} Body: b'{"server": {"id": "ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9", "name": "tempest-SecurtiyGroupsRbacTest-server-1712569055", "status": "ACTIVE", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "user_id": "d6454cbca87a43e4843df1863d9a4ee6", "metadata": {}, "hostId": "636fddd831194c880400fb9230827e71d4afbe03e9540705de30335d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:25Z", "updated": "2020-12-14T02:14:47Z", "addresses": {"tempest-SecurtiyGroupsRbacTest-14230347-network": [{"version": 4, "addr": "192.168.120.10", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:9a:ba:ca"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:33.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc5", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:47.489 189 INFO tempest.lib.common.rest_client [req-ec318aa2-b761-4c88-96b5-5cc7f0da4f48 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.355s 2020-12-14 02:14:47.492 189 DEBUG tempest.lib.common.rest_client [req-ec318aa2-b761-4c88-96b5-5cc7f0da4f48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ec318aa2-b761-4c88-96b5-5cc7f0da4f48', 'x-compute-request-id': 'req-ec318aa2-b761-4c88-96b5-5cc7f0da4f48', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:47.598 189 INFO tempest.common.waiters [-] State transition "RESIZE/resize_finish" ==> "VERIFY_RESIZE/None" after 17 second wait 2020-12-14 02:14:47.601 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:47.723 189 INFO tempest.lib.common.rest_client [req-65207424-ef8a-4663-bff4-97a478645fd6 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.115s 2020-12-14 02:14:47.727 189 DEBUG tempest.lib.common.rest_client [req-65207424-ef8a-4663-bff4-97a478645fd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-65207424-ef8a-4663-bff4-97a478645fd6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:47.824 189 INFO tempest.lib.common.rest_client [req-a789229a-8234-4fcf-ab58-4c9455f3c656 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:14:47.828 189 DEBUG tempest.lib.common.rest_client [req-a789229a-8234-4fcf-ab58-4c9455f3c656 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a789229a-8234-4fcf-ab58-4c9455f3c656', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["MpSUGqOTR4iyGzzJYoVeqA"], "expires_at": "2020-12-14T03:14:47.000000Z", "issued_at": "2020-12-14T02:14:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:48.073 189 INFO tempest.lib.common.rest_client [req-f4b5dcb0-91dd-4c75-a3ac-ceb805becb83 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.236s 2020-12-14 02:14:48.078 189 DEBUG tempest.lib.common.rest_client [req-f4b5dcb0-91dd-4c75-a3ac-ceb805becb83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f4b5dcb0-91dd-4c75-a3ac-ceb805becb83', 'x-compute-request-id': 'req-f4b5dcb0-91dd-4c75-a3ac-ceb805becb83', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:48.168 197 INFO tempest.lib.common.rest_client [req-79f906cd-e9f9-4c6c-96e6-a015a95d0093 ] Request (MigrateServerV225RbacTest:test_cold_migration): 202 POST http://172.30.13.94/compute/v2.1/servers 1.093s 2020-12-14 02:14:48.171 197 DEBUG tempest.lib.common.rest_client [req-79f906cd-e9f9-4c6c-96e6-a015a95d0093 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-MigrateServerV225RbacTest-server-1036377634", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "11e7deb5-beae-4249-9f34-285ba605afd2"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-79f906cd-e9f9-4c6c-96e6-a015a95d0093', 'x-compute-request-id': 'req-79f906cd-e9f9-4c6c-96e6-a015a95d0093', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "gk3zAuCAoKS7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:48.331 197 INFO tempest.lib.common.rest_client [req-5db59763-8862-4936-88bb-a250b4da5283 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.128s 2020-12-14 02:14:48.335 197 DEBUG tempest.lib.common.rest_client [req-5db59763-8862-4936-88bb-a250b4da5283 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1768', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5db59763-8862-4936-88bb-a250b4da5283', 'x-compute-request-id': 'req-5db59763-8862-4936-88bb-a250b4da5283', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "BUILD", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:14:48Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-SRV-ATTR:reservation_id": "r-zussfc1t", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1036377634", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": null, "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:48.376 189 INFO tempest.lib.common.rest_client [req-be518634-641a-43f2-ba8b-d56f8245cb52 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 204 POST http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action 0.186s 2020-12-14 02:14:48.380 189 DEBUG tempest.lib.common.rest_client [req-be518634-641a-43f2-ba8b-d56f8245cb52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"confirmResize": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-be518634-641a-43f2-ba8b-d56f8245cb52', 'x-compute-request-id': 'req-be518634-641a-43f2-ba8b-d56f8245cb52', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:48.417 186 INFO tempest.lib.common.rest_client [req-1ba0f93e-c52e-4a76-b6f9-e96a59e2032c ] Request (SecurtiyGroupsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9 0.200s 2020-12-14 02:14:48.421 186 DEBUG tempest.lib.common.rest_client [req-1ba0f93e-c52e-4a76-b6f9-e96a59e2032c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1683', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1ba0f93e-c52e-4a76-b6f9-e96a59e2032c', 'x-compute-request-id': 'req-1ba0f93e-c52e-4a76-b6f9-e96a59e2032c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9'} Body: b'{"server": {"id": "ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9", "name": "tempest-SecurtiyGroupsRbacTest-server-1712569055", "status": "ACTIVE", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "user_id": "d6454cbca87a43e4843df1863d9a4ee6", "metadata": {}, "hostId": "636fddd831194c880400fb9230827e71d4afbe03e9540705de30335d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:25Z", "updated": "2020-12-14T02:14:48Z", "addresses": {"tempest-SecurtiyGroupsRbacTest-14230347-network": [{"version": 4, "addr": "192.168.120.10", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:9a:ba:ca"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:33.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc5", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:48.648 189 INFO tempest.lib.common.rest_client [req-afff2a3e-4594-4360-a530-79b380113062 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.259s 2020-12-14 02:14:48.651 189 DEBUG tempest.lib.common.rest_client [req-afff2a3e-4594-4360-a530-79b380113062 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-afff2a3e-4594-4360-a530-79b380113062', 'x-compute-request-id': 'req-afff2a3e-4594-4360-a530-79b380113062', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:49.333 193 INFO tempest.lib.common.rest_client [req-3eb39062-c5ac-44ed-984f-7e81926b67dc ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/f6ac1877-ad40-41a4-9ad7-524c74146b3c/add_router_interface 2.666s 2020-12-14 02:14:49.335 193 DEBUG tempest.lib.common.rest_client [req-3eb39062-c5ac-44ed-984f-7e81926b67dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "8f8fefc9-0e33-4848-87ca-04c0450cb894"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-3eb39062-c5ac-44ed-984f-7e81926b67dc', 'date': 'Mon, 14 Dec 2020 02:14:49 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/f6ac1877-ad40-41a4-9ad7-524c74146b3c/add_router_interface'} Body: b'{"id": "f6ac1877-ad40-41a4-9ad7-524c74146b3c", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "port_id": "6764d9b8-3589-479a-8346-d060f7920918", "network_id": "00ec2ac2-db01-4df5-be67-85a1a2cd2f4e", "subnet_id": "8f8fefc9-0e33-4848-87ca-04c0450cb894", "subnet_ids": ["8f8fefc9-0e33-4848-87ca-04c0450cb894"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:49.337 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerVolumeAttachmentRbacTest-823488585', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6eaa7aebfbc3432bbcb4a961a888a31a', 'project_name': 'tempest-ServerVolumeAttachmentRbacTest-823488585', 'tenant_id': '6eaa7aebfbc3432bbcb4a961a888a31a', 'tenant_name': 'tempest-ServerVolumeAttachmentRbacTest-823488585', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '57d9a7612ecf4fb8b34c79c101f93eb4'}, Network: {'id': '00ec2ac2-db01-4df5-be67-85a1a2cd2f4e', 'name': 'tempest-ServerVolumeAttachmentRbacTest-184020563-network', 'tenant_id': '6eaa7aebfbc3432bbcb4a961a888a31a', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '6eaa7aebfbc3432bbcb4a961a888a31a', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:14:42Z', 'updated_at': '2020-12-14T02:14:42Z', 'revision_number': 1}, Subnet: {'id': '8f8fefc9-0e33-4848-87ca-04c0450cb894', 'name': 'tempest-ServerVolumeAttachmentRbacTest-184020563-subnet', 'tenant_id': '6eaa7aebfbc3432bbcb4a961a888a31a', 'network_id': '00ec2ac2-db01-4df5-be67-85a1a2cd2f4e', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:42Z', 'updated_at': '2020-12-14T02:14:42Z', 'revision_number': 0, 'project_id': '6eaa7aebfbc3432bbcb4a961a888a31a'}, Router: {'id': 'f6ac1877-ad40-41a4-9ad7-524c74146b3c', 'name': 'tempest-ServerVolumeAttachmentRbacTest-184020563-router', 'tenant_id': '6eaa7aebfbc3432bbcb4a961a888a31a', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.92'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::1d1'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:43Z', 'updated_at': '2020-12-14T02:14:45Z', 'revision_number': 3, 'project_id': '6eaa7aebfbc3432bbcb4a961a888a31a'} 2020-12-14 02:14:49.525 193 INFO tempest.lib.common.rest_client [req-c56ee707-91c5-41df-9885-92efb943dbca ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.116s 2020-12-14 02:14:49.528 193 DEBUG tempest.lib.common.rest_client [req-c56ee707-91c5-41df-9885-92efb943dbca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6589', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c56ee707-91c5-41df-9885-92efb943dbca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "57d9a7612ecf4fb8b34c79c101f93eb4", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585", "password_expires_at": null}, "audit_ids": ["fDj0TIYvRxK6TbpI-7fyFQ"], "expires_at": "2020-12-14T03:14:49.000000Z", "issued_at": "2020-12-14T02:14:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6eaa7aebfbc3432bbcb4a961a888a31a", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:49.581 193 INFO tempest.lib.common.rest_client [req-2791d7bb-d4ae-439b-b4bf-e30aff52aa00 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:14:49.584 193 DEBUG tempest.lib.common.rest_client [req-2791d7bb-d4ae-439b-b4bf-e30aff52aa00 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2791d7bb-d4ae-439b-b4bf-e30aff52aa00', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["d8qqi_oST1iUtjJZmhHlUA"], "expires_at": "2020-12-14T03:14:49.000000Z", "issued_at": "2020-12-14T02:14:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:49.603 186 INFO tempest.lib.common.rest_client [req-04100d14-4407-4704-86ba-acf932182807 ] Request (SecurtiyGroupsRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9 0.076s 2020-12-14 02:14:49.606 186 DEBUG tempest.lib.common.rest_client [req-04100d14-4407-4704-86ba-acf932182807 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-04100d14-4407-4704-86ba-acf932182807', 'x-compute-request-id': 'req-04100d14-4407-4704-86ba-acf932182807', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance ab5e64b6-bd3e-4983-b9f2-e6470e49b8a9 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:49.609 186 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '0238966e-2ff5-45a9-a802-c7e41594a9d8', 'name': 'tempest-SecurtiyGroupsRbacTest-14230347-network', 'tenant_id': '6953bed3e9a64731a022421886bffdd1', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '6953bed3e9a64731a022421886bffdd1', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 65, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:14:21Z', 'updated_at': '2020-12-14T02:14:21Z', 'revision_number': 1}, subnet: {'id': 'be5de3d1-91f7-43bb-97ca-ee82b79fbd1b', 'name': 'tempest-SecurtiyGroupsRbacTest-14230347-subnet', 'tenant_id': '6953bed3e9a64731a022421886bffdd1', 'network_id': '0238966e-2ff5-45a9-a802-c7e41594a9d8', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:22Z', 'updated_at': '2020-12-14T02:14:22Z', 'revision_number': 0, 'project_id': '6953bed3e9a64731a022421886bffdd1'}, router: None _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:14:49.657 197 INFO tempest.lib.common.rest_client [req-1370aa0d-b094-46a3-b77e-770a3750a431 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.190s 2020-12-14 02:14:49.660 197 DEBUG tempest.lib.common.rest_client [req-1370aa0d-b094-46a3-b77e-770a3750a431 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1857', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1370aa0d-b094-46a3-b77e-770a3750a431', 'x-compute-request-id': 'req-1370aa0d-b094-46a3-b77e-770a3750a431', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "BUILD", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:14:49Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-zussfc1t", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1036377634", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": null, "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:49.693 193 INFO tempest.lib.common.rest_client [req-a5282fc0-7201-4fa9-b836-e915d068e759 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:14:49.695 193 DEBUG tempest.lib.common.rest_client [req-a5282fc0-7201-4fa9-b836-e915d068e759 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5282fc0-7201-4fa9-b836-e915d068e759', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["GvZAifNBTzmU4-2kE_28UA"], "expires_at": "2020-12-14T03:14:49.000000Z", "issued_at": "2020-12-14T02:14:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:49.761 193 INFO tempest.lib.common.rest_client [req-2abae7e3-6887-4c94-a2af-d25c05b07b92 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.058s 2020-12-14 02:14:49.763 193 DEBUG tempest.lib.common.rest_client [req-2abae7e3-6887-4c94-a2af-d25c05b07b92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2abae7e3-6887-4c94-a2af-d25c05b07b92', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:49.792 197 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 1 second wait 2020-12-14 02:14:49.825 193 INFO tempest.lib.common.rest_client [req-6e48e315-3358-442c-a0da-d4069d810dcf ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-14 02:14:49.828 193 DEBUG tempest.lib.common.rest_client [req-6e48e315-3358-442c-a0da-d4069d810dcf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e48e315-3358-442c-a0da-d4069d810dcf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:49.832 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:14:49.834 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:49.900 193 INFO tempest.lib.common.rest_client [req-28cd67a2-d691-4cf8-bd3b-9c3273fa171d ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles 0.060s 2020-12-14 02:14:49.903 193 DEBUG tempest.lib.common.rest_client [req-28cd67a2-d691-4cf8-bd3b-9c3273fa171d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28cd67a2-d691-4cf8-bd3b-9c3273fa171d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:49.990 193 INFO tempest.lib.common.rest_client [req-86d173de-0aea-4a8c-83a6-1aaaff287994 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles/72a4576c553448cd941b052c1ca0cf2d 0.079s 2020-12-14 02:14:49.993 193 DEBUG tempest.lib.common.rest_client [req-86d173de-0aea-4a8c-83a6-1aaaff287994 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-86d173de-0aea-4a8c-83a6-1aaaff287994', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:50.109 193 INFO tempest.lib.common.rest_client [req-5f2e286a-3b11-4c9a-a795-63d2f7cfe521 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles/a629c95d64b3416fb80ae90af4f69c05 0.109s 2020-12-14 02:14:50.112 193 DEBUG tempest.lib.common.rest_client [req-5f2e286a-3b11-4c9a-a795-63d2f7cfe521 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f2e286a-3b11-4c9a-a795-63d2f7cfe521', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:50.168 189 INFO tempest.lib.common.rest_client [req-ab8f635a-dc75-4993-8617-d805e3a68b58 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.381s 2020-12-14 02:14:50.171 189 DEBUG tempest.lib.common.rest_client [req-ab8f635a-dc75-4993-8617-d805e3a68b58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ab8f635a-dc75-4993-8617-d805e3a68b58', 'x-compute-request-id': 'req-ab8f635a-dc75-4993-8617-d805e3a68b58', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:50.175 186 INFO tempest.lib.common.rest_client [req-99e070fe-baa9-4d50-9223-df751fa4d14f ] Request (SecurtiyGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/be5de3d1-91f7-43bb-97ca-ee82b79fbd1b 0.558s 2020-12-14 02:14:50.178 186 DEBUG tempest.lib.common.rest_client [req-99e070fe-baa9-4d50-9223-df751fa4d14f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-99e070fe-baa9-4d50-9223-df751fa4d14f', 'date': 'Mon, 14 Dec 2020 02:14:50 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/be5de3d1-91f7-43bb-97ca-ee82b79fbd1b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:50.877 186 INFO tempest.lib.common.rest_client [req-ee3d5238-5aa0-4a15-adc8-2394e27a7240 ] Request (SecurtiyGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/0238966e-2ff5-45a9-a802-c7e41594a9d8 0.690s 2020-12-14 02:14:50.880 186 DEBUG tempest.lib.common.rest_client [req-ee3d5238-5aa0-4a15-adc8-2394e27a7240 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-ee3d5238-5aa0-4a15-adc8-2394e27a7240', 'date': 'Mon, 14 Dec 2020 02:14:50 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/0238966e-2ff5-45a9-a802-c7e41594a9d8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:51.025 197 INFO tempest.lib.common.rest_client [req-5541e116-e748-4d36-b9b0-4988e86ca515 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.224s 2020-12-14 02:14:51.028 197 DEBUG tempest.lib.common.rest_client [req-5541e116-e748-4d36-b9b0-4988e86ca515 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1911', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5541e116-e748-4d36-b9b0-4988e86ca515', 'x-compute-request-id': 'req-5541e116-e748-4d36-b9b0-4988e86ca515', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "BUILD", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:14:50Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-zussfc1t", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1036377634", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:51.077 186 INFO tempest.lib.common.rest_client [req-61daea18-93dc-4e35-8dde-a0aa946cb041 ] Request (SecurtiyGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/d6454cbca87a43e4843df1863d9a4ee6 0.189s 2020-12-14 02:14:51.080 186 DEBUG tempest.lib.common.rest_client [req-61daea18-93dc-4e35-8dde-a0aa946cb041 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61daea18-93dc-4e35-8dde-a0aa946cb041', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/d6454cbca87a43e4843df1863d9a4ee6'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:51.149 197 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 3 second wait 2020-12-14 02:14:51.210 193 INFO tempest.lib.common.rest_client [req-1b61e21e-6c55-41f1-9afd-24439c4a8a31 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:14:51.213 193 DEBUG tempest.lib.common.rest_client [req-1b61e21e-6c55-41f1-9afd-24439c4a8a31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b61e21e-6c55-41f1-9afd-24439c4a8a31', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "57d9a7612ecf4fb8b34c79c101f93eb4", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585", "password_expires_at": null}, "audit_ids": ["9UCqD-hWSbO619JtpbPtAg"], "expires_at": "2020-12-14T03:14:51.000000Z", "issued_at": "2020-12-14T02:14:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6eaa7aebfbc3432bbcb4a961a888a31a", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:51.234 186 INFO tempest.lib.common.rest_client [req-466973a2-a3eb-4407-aae7-06f0bd5c9dd1 ] Request (SecurtiyGroupsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6953bed3e9a64731a022421886bffdd1&name=default 0.146s 2020-12-14 02:14:51.237 186 DEBUG tempest.lib.common.rest_client [req-466973a2-a3eb-4407-aae7-06f0bd5c9dd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-466973a2-a3eb-4407-aae7-06f0bd5c9dd1', 'date': 'Mon, 14 Dec 2020 02:14:51 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6953bed3e9a64731a022421886bffdd1&name=default'} Body: b'{"security_groups": [{"id": "856d5e0e-ad39-4706-a837-a24f973d74c2", "name": "default", "stateful": true, "tenant_id": "6953bed3e9a64731a022421886bffdd1", "description": "Default security group", "security_group_rules": [{"id": "2e46a124-a08b-4340-86ec-3eae3df718cb", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "security_group_id": "856d5e0e-ad39-4706-a837-a24f973d74c2", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "856d5e0e-ad39-4706-a837-a24f973d74c2", "description": null, "tags": [], "created_at": "2020-12-14T02:14:21Z", "updated_at": "2020-12-14T02:14:21Z", "revision_number": 0, "project_id": "6953bed3e9a64731a022421886bffdd1"}, {"id": "34ac479b-a549-4b74-83b6-a56ae74f36f8", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "security_group_id": "856d5e0e-ad39-4706-a837-a24f973d74c2", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "856d5e0e-ad39-4706-a837-a24f973d74c2", "description": null, "tags": [], "created_at": "2020-12-14T02:14:21Z", "updated_at": "2020-12-14T02:14:21Z", "revision_number": 0, "project_id": "6953bed3e9a64731a022421886bffdd1"}, {"id": "43e0afde-3d23-4362-acde-ad51703b0da2", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "security_group_id": "856d5e0e-ad39-4706-a837-a24f973d74c2", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:21Z", "updated_at": "2020-12-14T02:14:21Z", "revision_number": 0, "project_id": "6953bed3e9a64731a022421886bffdd1"}, {"id": "df406b37-2951-4d7a-bdeb-f35998c35985", "tenant_id": "6953bed3e9a64731a022421886bffdd1", "security_group_id": "856d5e0e-ad39-4706-a837-a24f973d74c2", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:21Z", "updated_at": "2020-12-14T02:14:21Z", "revision_number": 0, "project_id": "6953bed3e9a64731a022421886bffdd1"}], "tags": [], "created_at": "2020-12-14T02:14:21Z", "updated_at": "2020-12-14T02:14:21Z", "revision_number": 1, "project_id": "6953bed3e9a64731a022421886bffdd1"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:51.326 193 INFO tempest.lib.common.rest_client [req-523c1f67-4760-4f47-bc07-8f996809b2e0 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:14:51.329 193 DEBUG tempest.lib.common.rest_client [req-523c1f67-4760-4f47-bc07-8f996809b2e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-523c1f67-4760-4f47-bc07-8f996809b2e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "57d9a7612ecf4fb8b34c79c101f93eb4", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585", "password_expires_at": null}, "audit_ids": ["ZlI9m73HQfecbRMcINF_Gg"], "expires_at": "2020-12-14T03:14:51.000000Z", "issued_at": "2020-12-14T02:14:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6eaa7aebfbc3432bbcb4a961a888a31a", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:51.334 193 INFO tempest.lib.common.fixed_network [-] (ServerVolumeAttachmentRbacTest:setUpClass) Found network {'id': '00ec2ac2-db01-4df5-be67-85a1a2cd2f4e', 'name': 'tempest-ServerVolumeAttachmentRbacTest-184020563-network', 'tenant_id': '6eaa7aebfbc3432bbcb4a961a888a31a', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '6eaa7aebfbc3432bbcb4a961a888a31a', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:14:42Z', 'updated_at': '2020-12-14T02:14:42Z', 'revision_number': 1} available for tenant 2020-12-14 02:14:51.398 186 INFO tempest.lib.common.rest_client [req-c5494cb9-ffa3-42da-a54e-e56baf2cd8a8 ] Request (SecurtiyGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/856d5e0e-ad39-4706-a837-a24f973d74c2 0.155s 2020-12-14 02:14:51.400 186 DEBUG tempest.lib.common.rest_client [req-c5494cb9-ffa3-42da-a54e-e56baf2cd8a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c5494cb9-ffa3-42da-a54e-e56baf2cd8a8', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:14:51 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/856d5e0e-ad39-4706-a837-a24f973d74c2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:51.528 189 INFO tempest.lib.common.rest_client [req-579e231c-1e52-4d73-b17b-a0f3bc2db19c ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.246s 2020-12-14 02:14:51.531 189 DEBUG tempest.lib.common.rest_client [req-579e231c-1e52-4d73-b17b-a0f3bc2db19c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-579e231c-1e52-4d73-b17b-a0f3bc2db19c', 'x-compute-request-id': 'req-579e231c-1e52-4d73-b17b-a0f3bc2db19c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:50Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:51.611 186 INFO tempest.lib.common.rest_client [req-3f21c2e3-2c6d-4377-a17e-bb56d6556609 ] Request (SecurtiyGroupsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1 0.202s 2020-12-14 02:14:51.614 186 DEBUG tempest.lib.common.rest_client [req-3f21c2e3-2c6d-4377-a17e-bb56d6556609 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f21c2e3-2c6d-4377-a17e-bb56d6556609', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6953bed3e9a64731a022421886bffdd1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:51.635 189 INFO tempest.common.waiters [-] State transition "VERIFY_RESIZE/None" ==> "ACTIVE/None" after 3 second wait 2020-12-14 02:14:51.638 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:51.746 186 INFO tempest.lib.common.rest_client [req-01bc6836-d681-4836-bf10-8edb6cf50b80 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-12-14 02:14:51.749 186 DEBUG tempest.lib.common.rest_client [req-01bc6836-d681-4836-bf10-8edb6cf50b80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01bc6836-d681-4836-bf10-8edb6cf50b80', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["oofKkvYZQLyI1aLMWORQhg"], "expires_at": "2020-12-14T03:14:51.000000Z", "issued_at": "2020-12-14T02:14:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:51.766 189 INFO tempest.lib.common.rest_client [req-0ed5bd5c-6edb-4c1d-ba6c-30c10ee8f925 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.121s 2020-12-14 02:14:51.768 189 DEBUG tempest.lib.common.rest_client [req-0ed5bd5c-6edb-4c1d-ba6c-30c10ee8f925 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ed5bd5c-6edb-4c1d-ba6c-30c10ee8f925', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:51.863 186 INFO tempest.lib.common.rest_client [req-b37c6b40-1624-48d9-b184-9ad3889dadb8 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:14:51.867 186 DEBUG tempest.lib.common.rest_client [req-b37c6b40-1624-48d9-b184-9ad3889dadb8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b37c6b40-1624-48d9-b184-9ad3889dadb8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["MsbyeiD4QpWs9_KnVNP0WQ"], "expires_at": "2020-12-14T03:14:51.000000Z", "issued_at": "2020-12-14T02:14:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:51.878 189 INFO tempest.lib.common.rest_client [req-05c9929e-d138-48e5-b3b7-1dddc740bc85 ] Request (ServerActionsRbacTest:test_confirm_resize_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:14:51.882 189 DEBUG tempest.lib.common.rest_client [req-05c9929e-d138-48e5-b3b7-1dddc740bc85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05c9929e-d138-48e5-b3b7-1dddc740bc85', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["qLd4cvNjR8GcI8SrWVArlQ"], "expires_at": "2020-12-14T03:14:51.000000Z", "issued_at": "2020-12-14T02:14:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:51.938 186 INFO tempest.lib.common.rest_client [req-d6503e60-9468-47ab-8b24-1493349875ae ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.064s 2020-12-14 02:14:51.940 186 DEBUG tempest.lib.common.rest_client [req-d6503e60-9468-47ab-8b24-1493349875ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6503e60-9468-47ab-8b24-1493349875ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:52.018 186 INFO tempest.lib.common.rest_client [req-d883e514-f912-4931-af57-2953d727c561 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.071s 2020-12-14 02:14:52.021 186 DEBUG tempest.lib.common.rest_client [req-d883e514-f912-4931-af57-2953d727c561 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerActionsV214RbacTest-1363200074-desc", "domain_id": "default", "name": "tempest-ServerActionsV214RbacTest-1363200074"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d883e514-f912-4931-af57-2953d727c561', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "0983fbbd1c274f8fb9df502bcf4d10dc", "name": "tempest-ServerActionsV214RbacTest-1363200074", "domain_id": "default", "description": "tempest-ServerActionsV214RbacTest-1363200074-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:52.126 186 INFO tempest.lib.common.rest_client [req-bd34acbb-5871-40b3-bd77-d7d9d3298fce ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.098s 2020-12-14 02:14:52.129 186 DEBUG tempest.lib.common.rest_client [req-bd34acbb-5871-40b3-bd77-d7d9d3298fce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerActionsV214RbacTest-1363200074", "password": "T6_*b+L8EftHH9#", "project_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "email": "tempest-ServerActionsV214RbacTest-1012630410@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '406', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd34acbb-5871-40b3-bd77-d7d9d3298fce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "email": "tempest-ServerActionsV214RbacTest-1012630410@example.com", "id": "9cd51d368197403da13a0eb5785c3256", "name": "tempest-ServerActionsV214RbacTest-1363200074", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/9cd51d368197403da13a0eb5785c3256"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:52.189 189 INFO tempest.lib.common.rest_client [req-94cf10e2-d779-4400-a107-1eb6ee054619 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.296s 2020-12-14 02:14:52.192 189 DEBUG tempest.lib.common.rest_client [req-94cf10e2-d779-4400-a107-1eb6ee054619 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-94cf10e2-d779-4400-a107-1eb6ee054619', 'x-compute-request-id': 'req-94cf10e2-d779-4400-a107-1eb6ee054619', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:50Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:52.193 186 INFO tempest.lib.common.rest_client [req-4399333b-7c89-4920-beb3-15f97deb425d ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:14:52.196 186 DEBUG tempest.lib.common.rest_client [req-4399333b-7c89-4920-beb3-15f97deb425d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4399333b-7c89-4920-beb3-15f97deb425d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:52.265 186 INFO tempest.lib.common.rest_client [req-a1f409d6-314a-498d-96d8-e4799b6cbbe2 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:14:52.267 186 DEBUG tempest.lib.common.rest_client [req-a1f409d6-314a-498d-96d8-e4799b6cbbe2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1f409d6-314a-498d-96d8-e4799b6cbbe2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:52.346 193 INFO tempest.lib.common.rest_client [req-b9829dd2-8308-4fac-ab97-b24e0584eb84 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 1.003s 2020-12-14 02:14:52.349 193 DEBUG tempest.lib.common.rest_client [req-b9829dd2-8308-4fac-ab97-b24e0584eb84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerVolumeAttachmentRbacTest-server-1834788050", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "00ec2ac2-db01-4df5-be67-85a1a2cd2f4e"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b9829dd2-8308-4fac-ab97-b24e0584eb84', 'x-compute-request-id': 'req-b9829dd2-8308-4fac-ab97-b24e0584eb84', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "24795eb2-68c3-4190-b564-494fe69f731f", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/24795eb2-68c3-4190-b564-494fe69f731f"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "5t7SG36D5Zms"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:52.351 186 INFO tempest.lib.common.rest_client [req-3b3aec21-fbd0-4438-b3e1-c4cff3c23b98 ] Request (ServerActionsV214RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc/users/9cd51d368197403da13a0eb5785c3256/roles/72a4576c553448cd941b052c1ca0cf2d 0.076s 2020-12-14 02:14:52.353 186 DEBUG tempest.lib.common.rest_client [req-3b3aec21-fbd0-4438-b3e1-c4cff3c23b98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b3aec21-fbd0-4438-b3e1-c4cff3c23b98', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc/users/9cd51d368197403da13a0eb5785c3256/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:52.356 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsV214RbacTest-1363200074', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0983fbbd1c274f8fb9df502bcf4d10dc', 'project_name': 'tempest-ServerActionsV214RbacTest-1363200074', 'tenant_id': '0983fbbd1c274f8fb9df502bcf4d10dc', 'tenant_name': 'tempest-ServerActionsV214RbacTest-1363200074', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9cd51d368197403da13a0eb5785c3256'}, Network: None, Subnet: None, Router: None 2020-12-14 02:14:52.465 186 INFO tempest.lib.common.rest_client [req-5245b8ce-8c83-441b-a9e4-8cb4831f4967 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:14:52.469 186 DEBUG tempest.lib.common.rest_client [req-5245b8ce-8c83-441b-a9e4-8cb4831f4967 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5245b8ce-8c83-441b-a9e4-8cb4831f4967', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["bGQi1USmSiicCj4dYBg-Ew"], "expires_at": "2020-12-14T03:14:52.000000Z", "issued_at": "2020-12-14T02:14:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:52.505 193 INFO tempest.lib.common.rest_client [req-98531df6-d343-4d22-a4e1-837c24ea8614 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f 0.125s 2020-12-14 02:14:52.509 193 DEBUG tempest.lib.common.rest_client [req-98531df6-d343-4d22-a4e1-837c24ea8614 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1406', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-98531df6-d343-4d22-a4e1-837c24ea8614', 'x-compute-request-id': 'req-98531df6-d343-4d22-a4e1-837c24ea8614', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f'} Body: b'{"server": {"id": "24795eb2-68c3-4190-b564-494fe69f731f", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1834788050", "status": "BUILD", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:52Z", "updated": "2020-12-14T02:14:52Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/24795eb2-68c3-4190-b564-494fe69f731f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:52.583 197 INFO tempest.lib.common.rest_client [req-83e8646d-fba7-4c35-8d1e-34830069112d ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.425s 2020-12-14 02:14:52.586 197 DEBUG tempest.lib.common.rest_client [req-83e8646d-fba7-4c35-8d1e-34830069112d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1911', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-83e8646d-fba7-4c35-8d1e-34830069112d', 'x-compute-request-id': 'req-83e8646d-fba7-4c35-8d1e-34830069112d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "BUILD", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:14:50Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-zussfc1t", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1036377634", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:52.594 189 INFO tempest.lib.common.rest_client [req-9fa76497-4be3-4e46-b4d9-3bfa0a4de769 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.291s 2020-12-14 02:14:52.596 189 DEBUG tempest.lib.common.rest_client [req-9fa76497-4be3-4e46-b4d9-3bfa0a4de769 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9fa76497-4be3-4e46-b4d9-3bfa0a4de769', 'x-compute-request-id': 'req-9fa76497-4be3-4e46-b4d9-3bfa0a4de769', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:50Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:53.055 189 INFO tempest.lib.common.rest_client [req-3161a3e5-a15c-450f-b8c0-53c992b7b9b2 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.350s 2020-12-14 02:14:53.059 189 DEBUG tempest.lib.common.rest_client [req-3161a3e5-a15c-450f-b8c0-53c992b7b9b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3161a3e5-a15c-450f-b8c0-53c992b7b9b2', 'x-compute-request-id': 'req-3161a3e5-a15c-450f-b8c0-53c992b7b9b2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:50Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:53.272 186 INFO tempest.lib.common.rest_client [req-5c7f7b58-97e9-4708-8ddd-963ab2249268 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.792s 2020-12-14 02:14:53.274 186 DEBUG tempest.lib.common.rest_client [req-5c7f7b58-97e9-4708-8ddd-963ab2249268 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerActionsV214RbacTest-69276485-network", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc"}} Response - Headers: {'content-type': 'application/json', 'content-length': '739', 'x-openstack-request-id': 'req-5c7f7b58-97e9-4708-8ddd-963ab2249268', 'date': 'Mon, 14 Dec 2020 02:14:53 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"4edfe25a-5ada-42db-9999-939648f21e45","name":"tempest-ServerActionsV214RbacTest-69276485-network","tenant_id":"0983fbbd1c274f8fb9df502bcf4d10dc","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"0983fbbd1c274f8fb9df502bcf4d10dc","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":65,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:14:53Z","updated_at":"2020-12-14T02:14:53Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:53.642 189 INFO tempest.lib.common.rest_client [req-03cc09e4-8eb0-4dd8-a12d-022f7f0433b8 ] Request (ServerActionsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action 0.472s 2020-12-14 02:14:53.644 189 DEBUG tempest.lib.common.rest_client [req-03cc09e4-8eb0-4dd8-a12d-022f7f0433b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"resize": {"flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-03cc09e4-8eb0-4dd8-a12d-022f7f0433b8', 'x-compute-request-id': 'req-03cc09e4-8eb0-4dd8-a12d-022f7f0433b8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:53.778 193 INFO tempest.lib.common.rest_client [req-ea5334bf-41d0-42e6-9f4a-1676500f78ca ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f 0.159s 2020-12-14 02:14:53.782 193 DEBUG tempest.lib.common.rest_client [req-ea5334bf-41d0-42e6-9f4a-1676500f78ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1499', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ea5334bf-41d0-42e6-9f4a-1676500f78ca', 'x-compute-request-id': 'req-ea5334bf-41d0-42e6-9f4a-1676500f78ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f'} Body: b'{"server": {"id": "24795eb2-68c3-4190-b564-494fe69f731f", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1834788050", "status": "BUILD", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "metadata": {}, "hostId": "ae18e3c318546a04a62c3c72d4975d4148b06c398cd0f19cef05659a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:52Z", "updated": "2020-12-14T02:14:54Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/24795eb2-68c3-4190-b564-494fe69f731f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:53.884 193 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/spawning" after 1 second wait 2020-12-14 02:14:53.925 189 INFO tempest.lib.common.rest_client [req-61235717-2d2a-4149-8468-9987143afd2f ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.273s 2020-12-14 02:14:53.928 189 DEBUG tempest.lib.common.rest_client [req-61235717-2d2a-4149-8468-9987143afd2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-61235717-2d2a-4149-8468-9987143afd2f', 'x-compute-request-id': 'req-61235717-2d2a-4149-8468-9987143afd2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:54Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:54.034 197 INFO tempest.lib.common.rest_client [req-cce4988e-f9af-4719-a4e9-724d41b64067 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.317s 2020-12-14 02:14:54.038 197 DEBUG tempest.lib.common.rest_client [req-cce4988e-f9af-4719-a4e9-724d41b64067 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1911', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cce4988e-f9af-4719-a4e9-724d41b64067', 'x-compute-request-id': 'req-cce4988e-f9af-4719-a4e9-724d41b64067', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "BUILD", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:14:50Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-zussfc1t", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1036377634", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:54.143 186 INFO tempest.lib.common.rest_client [req-9eafa768-62a5-4fe6-a800-838f965076cf ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.861s 2020-12-14 02:14:54.145 186 DEBUG tempest.lib.common.rest_client [req-9eafa768-62a5-4fe6-a800-838f965076cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "4edfe25a-5ada-42db-9999-939648f21e45", "cidr": "192.168.120.0/28", "name": "tempest-ServerActionsV214RbacTest-69276485-subnet", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '711', 'x-openstack-request-id': 'req-9eafa768-62a5-4fe6-a800-838f965076cf', 'date': 'Mon, 14 Dec 2020 02:14:54 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"94db8276-3e0d-40ba-b67c-7eeee41b1c3f","name":"tempest-ServerActionsV214RbacTest-69276485-subnet","tenant_id":"0983fbbd1c274f8fb9df502bcf4d10dc","network_id":"4edfe25a-5ada-42db-9999-939648f21e45","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:14:53Z","updated_at":"2020-12-14T02:14:53Z","revision_number":0,"project_id":"0983fbbd1c274f8fb9df502bcf4d10dc"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:55.131 193 INFO tempest.lib.common.rest_client [req-2699e839-ba93-48ed-9629-79d35514b6af ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f 0.239s 2020-12-14 02:14:55.134 193 DEBUG tempest.lib.common.rest_client [req-2699e839-ba93-48ed-9629-79d35514b6af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1541', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2699e839-ba93-48ed-9629-79d35514b6af', 'x-compute-request-id': 'req-2699e839-ba93-48ed-9629-79d35514b6af', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f'} Body: b'{"server": {"id": "24795eb2-68c3-4190-b564-494fe69f731f", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1834788050", "status": "BUILD", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "metadata": {}, "hostId": "ae18e3c318546a04a62c3c72d4975d4148b06c398cd0f19cef05659a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:52Z", "updated": "2020-12-14T02:14:54Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/24795eb2-68c3-4190-b564-494fe69f731f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:55.348 189 INFO tempest.lib.common.rest_client [req-41e2db3b-0e0e-4729-97fe-1d9bf3eb5c84 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.280s 2020-12-14 02:14:55.351 189 DEBUG tempest.lib.common.rest_client [req-41e2db3b-0e0e-4729-97fe-1d9bf3eb5c84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-41e2db3b-0e0e-4729-97fe-1d9bf3eb5c84', 'x-compute-request-id': 'req-41e2db3b-0e0e-4729-97fe-1d9bf3eb5c84', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:55Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:55.558 197 INFO tempest.lib.common.rest_client [req-d59776f3-a61c-4128-af09-6a7249c98968 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.379s 2020-12-14 02:14:55.562 197 DEBUG tempest.lib.common.rest_client [req-d59776f3-a61c-4128-af09-6a7249c98968 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1911', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d59776f3-a61c-4128-af09-6a7249c98968', 'x-compute-request-id': 'req-d59776f3-a61c-4128-af09-6a7249c98968', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "BUILD", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:14:50Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-zussfc1t", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1036377634", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:55.772 186 INFO tempest.lib.common.rest_client [req-968b3cc4-cc04-425b-ae57-e9eeb7be8fea ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.619s 2020-12-14 02:14:55.775 186 DEBUG tempest.lib.common.rest_client [req-968b3cc4-cc04-425b-ae57-e9eeb7be8fea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerActionsV214RbacTest-69276485-router", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '812', 'x-openstack-request-id': 'req-968b3cc4-cc04-425b-ae57-e9eeb7be8fea', 'date': 'Mon, 14 Dec 2020 02:14:55 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "19f0f175-de6d-4404-a2ff-59f154bba0a5", "name": "tempest-ServerActionsV214RbacTest-69276485-router", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.123"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::3f"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:14:54Z", "updated_at": "2020-12-14T02:14:55Z", "revision_number": 3, "project_id": "0983fbbd1c274f8fb9df502bcf4d10dc"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:56.442 193 INFO tempest.lib.common.rest_client [req-0283998d-c7cc-48f8-9867-adfc0c32da94 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f 0.202s 2020-12-14 02:14:56.446 193 DEBUG tempest.lib.common.rest_client [req-0283998d-c7cc-48f8-9867-adfc0c32da94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1541', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0283998d-c7cc-48f8-9867-adfc0c32da94', 'x-compute-request-id': 'req-0283998d-c7cc-48f8-9867-adfc0c32da94', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f'} Body: b'{"server": {"id": "24795eb2-68c3-4190-b564-494fe69f731f", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1834788050", "status": "BUILD", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "metadata": {}, "hostId": "ae18e3c318546a04a62c3c72d4975d4148b06c398cd0f19cef05659a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:52Z", "updated": "2020-12-14T02:14:54Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/24795eb2-68c3-4190-b564-494fe69f731f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:56.707 189 INFO tempest.lib.common.rest_client [req-e19b65e5-c4f9-4f3d-8183-5fd21dc10155 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.248s 2020-12-14 02:14:56.710 189 DEBUG tempest.lib.common.rest_client [req-e19b65e5-c4f9-4f3d-8183-5fd21dc10155 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e19b65e5-c4f9-4f3d-8183-5fd21dc10155', 'x-compute-request-id': 'req-e19b65e5-c4f9-4f3d-8183-5fd21dc10155', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:56Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:56.813 189 INFO tempest.common.waiters [-] State transition "RESIZE/resize_prep" ==> "RESIZE/resize_migrating" after 2 second wait 2020-12-14 02:14:57.021 197 INFO tempest.lib.common.rest_client [req-8f1404bf-81eb-4cd6-bb1f-2f7dc642ac16 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.334s 2020-12-14 02:14:57.025 197 DEBUG tempest.lib.common.rest_client [req-8f1404bf-81eb-4cd6-bb1f-2f7dc642ac16 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1911', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8f1404bf-81eb-4cd6-bb1f-2f7dc642ac16', 'x-compute-request-id': 'req-8f1404bf-81eb-4cd6-bb1f-2f7dc642ac16', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "BUILD", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:14:50Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-zussfc1t", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1036377634", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:57.811 193 INFO tempest.lib.common.rest_client [req-2b4e72ea-1073-4058-b876-7a98b0da0192 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f 0.258s 2020-12-14 02:14:57.815 193 DEBUG tempest.lib.common.rest_client [req-2b4e72ea-1073-4058-b876-7a98b0da0192 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1541', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2b4e72ea-1073-4058-b876-7a98b0da0192', 'x-compute-request-id': 'req-2b4e72ea-1073-4058-b876-7a98b0da0192', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f'} Body: b'{"server": {"id": "24795eb2-68c3-4190-b564-494fe69f731f", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1834788050", "status": "BUILD", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "metadata": {}, "hostId": "ae18e3c318546a04a62c3c72d4975d4148b06c398cd0f19cef05659a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:52Z", "updated": "2020-12-14T02:14:54Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/24795eb2-68c3-4190-b564-494fe69f731f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:57.852 186 INFO tempest.lib.common.rest_client [req-64c5b87a-02f4-4f80-9692-bb52e2df5920 ] Request (ServerActionsV214RbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/19f0f175-de6d-4404-a2ff-59f154bba0a5/add_router_interface 2.068s 2020-12-14 02:14:57.855 186 DEBUG tempest.lib.common.rest_client [req-64c5b87a-02f4-4f80-9692-bb52e2df5920 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "94db8276-3e0d-40ba-b67c-7eeee41b1c3f"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-64c5b87a-02f4-4f80-9692-bb52e2df5920', 'date': 'Mon, 14 Dec 2020 02:14:57 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/19f0f175-de6d-4404-a2ff-59f154bba0a5/add_router_interface'} Body: b'{"id": "19f0f175-de6d-4404-a2ff-59f154bba0a5", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "port_id": "45476355-4681-4ce1-b707-58c2cfaeb6c5", "network_id": "4edfe25a-5ada-42db-9999-939648f21e45", "subnet_id": "94db8276-3e0d-40ba-b67c-7eeee41b1c3f", "subnet_ids": ["94db8276-3e0d-40ba-b67c-7eeee41b1c3f"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:57.860 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsV214RbacTest-1363200074', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0983fbbd1c274f8fb9df502bcf4d10dc', 'project_name': 'tempest-ServerActionsV214RbacTest-1363200074', 'tenant_id': '0983fbbd1c274f8fb9df502bcf4d10dc', 'tenant_name': 'tempest-ServerActionsV214RbacTest-1363200074', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '9cd51d368197403da13a0eb5785c3256'}, Network: {'id': '4edfe25a-5ada-42db-9999-939648f21e45', 'name': 'tempest-ServerActionsV214RbacTest-69276485-network', 'tenant_id': '0983fbbd1c274f8fb9df502bcf4d10dc', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '0983fbbd1c274f8fb9df502bcf4d10dc', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 65, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:14:53Z', 'updated_at': '2020-12-14T02:14:53Z', 'revision_number': 1}, Subnet: {'id': '94db8276-3e0d-40ba-b67c-7eeee41b1c3f', 'name': 'tempest-ServerActionsV214RbacTest-69276485-subnet', 'tenant_id': '0983fbbd1c274f8fb9df502bcf4d10dc', 'network_id': '4edfe25a-5ada-42db-9999-939648f21e45', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:53Z', 'updated_at': '2020-12-14T02:14:53Z', 'revision_number': 0, 'project_id': '0983fbbd1c274f8fb9df502bcf4d10dc'}, Router: {'id': '19f0f175-de6d-4404-a2ff-59f154bba0a5', 'name': 'tempest-ServerActionsV214RbacTest-69276485-router', 'tenant_id': '0983fbbd1c274f8fb9df502bcf4d10dc', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.123'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::3f'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:54Z', 'updated_at': '2020-12-14T02:14:55Z', 'revision_number': 3, 'project_id': '0983fbbd1c274f8fb9df502bcf4d10dc'} 2020-12-14 02:14:58.025 186 INFO tempest.lib.common.rest_client [req-bf25ef5d-1ea6-4b70-91b8-d767daaf8c3c ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:14:58.025 189 INFO tempest.lib.common.rest_client [req-6204d1b2-a250-4e20-81cd-c3ab7b26eafd ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.202s 2020-12-14 02:14:58.027 186 DEBUG tempest.lib.common.rest_client [req-bf25ef5d-1ea6-4b70-91b8-d767daaf8c3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf25ef5d-1ea6-4b70-91b8-d767daaf8c3c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9cd51d368197403da13a0eb5785c3256", "name": "tempest-ServerActionsV214RbacTest-1363200074", "password_expires_at": null}, "audit_ids": ["syJdQs3kRQegsA5bM4Usng"], "expires_at": "2020-12-14T03:14:57.000000Z", "issued_at": "2020-12-14T02:14:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0983fbbd1c274f8fb9df502bcf4d10dc", "name": "tempest-ServerActionsV214RbacTest-1363200074"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:58.028 189 DEBUG tempest.lib.common.rest_client [req-6204d1b2-a250-4e20-81cd-c3ab7b26eafd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6204d1b2-a250-4e20-81cd-c3ab7b26eafd', 'x-compute-request-id': 'req-6204d1b2-a250-4e20-81cd-c3ab7b26eafd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:56Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:58.142 186 INFO tempest.lib.common.rest_client [req-74528457-d9e1-4aaf-8bd9-845d85453124 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:14:58.145 186 DEBUG tempest.lib.common.rest_client [req-74528457-d9e1-4aaf-8bd9-845d85453124 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74528457-d9e1-4aaf-8bd9-845d85453124', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["aj9YhLDiQn6rEuRfeoJarg"], "expires_at": "2020-12-14T03:14:58.000000Z", "issued_at": "2020-12-14T02:14:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:58.313 186 INFO tempest.lib.common.rest_client [req-b7dadfe7-ce74-434e-810b-ad794c04986e ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:14:58.316 186 DEBUG tempest.lib.common.rest_client [req-b7dadfe7-ce74-434e-810b-ad794c04986e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7dadfe7-ce74-434e-810b-ad794c04986e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["iow3WKCrRAOtd_4BZq0Fhw"], "expires_at": "2020-12-14T03:14:58.000000Z", "issued_at": "2020-12-14T02:14:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:58.400 197 INFO tempest.lib.common.rest_client [req-682eaf14-b78a-460b-8853-a452e946e44c ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.247s 2020-12-14 02:14:58.402 197 DEBUG tempest.lib.common.rest_client [req-682eaf14-b78a-460b-8853-a452e946e44c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2105', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-682eaf14-b78a-460b-8853-a452e946e44c', 'x-compute-request-id': 'req-682eaf14-b78a-460b-8853-a452e946e44c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "ACTIVE", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:14:58Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.50", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:7d:d2:6e"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:57.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-zussfc1t", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1036377634", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:58.444 186 INFO tempest.lib.common.rest_client [req-3fae6b08-89a5-4d8d-aaf4-b423b8fa19d7 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.121s 2020-12-14 02:14:58.447 186 DEBUG tempest.lib.common.rest_client [req-3fae6b08-89a5-4d8d-aaf4-b423b8fa19d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3fae6b08-89a5-4d8d-aaf4-b423b8fa19d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:58.522 186 INFO tempest.lib.common.rest_client [req-a4a8aff6-c1ef-458a-8c8a-69913ca120c3 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-12-14 02:14:58.525 186 DEBUG tempest.lib.common.rest_client [req-a4a8aff6-c1ef-458a-8c8a-69913ca120c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a4a8aff6-c1ef-458a-8c8a-69913ca120c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:58.530 197 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 10 second wait 2020-12-14 02:14:58.528 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:14:58.534 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:58.534 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:58.607 197 INFO tempest.lib.common.rest_client [req-0916c272-ac77-4849-8c89-69cbc2ad2a37 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles 0.066s 2020-12-14 02:14:58.611 197 DEBUG tempest.lib.common.rest_client [req-0916c272-ac77-4849-8c89-69cbc2ad2a37 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0916c272-ac77-4849-8c89-69cbc2ad2a37', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:58.613 186 INFO tempest.lib.common.rest_client [req-2b81792f-c0b7-49a3-86d4-d10e5f33cdf9 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc/users/9cd51d368197403da13a0eb5785c3256/roles 0.071s 2020-12-14 02:14:58.615 186 DEBUG tempest.lib.common.rest_client [req-2b81792f-c0b7-49a3-86d4-d10e5f33cdf9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b81792f-c0b7-49a3-86d4-d10e5f33cdf9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc/users/9cd51d368197403da13a0eb5785c3256/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc/users/9cd51d368197403da13a0eb5785c3256/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:58.702 186 INFO tempest.lib.common.rest_client [req-b87a4b03-3928-42c4-960e-26b5c2bf2e08 ] Request (ServerActionsV214RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc/users/9cd51d368197403da13a0eb5785c3256/roles/72a4576c553448cd941b052c1ca0cf2d 0.080s 2020-12-14 02:14:58.704 186 DEBUG tempest.lib.common.rest_client [req-b87a4b03-3928-42c4-960e-26b5c2bf2e08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b87a4b03-3928-42c4-960e-26b5c2bf2e08', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc/users/9cd51d368197403da13a0eb5785c3256/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:58.706 197 INFO tempest.lib.common.rest_client [req-191396af-96d9-4a43-9d85-e2495fec540c ] Request (MigrateServerV225RbacTest:test_cold_migration): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-14 02:14:58.710 197 DEBUG tempest.lib.common.rest_client [req-191396af-96d9-4a43-9d85-e2495fec540c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-191396af-96d9-4a43-9d85-e2495fec540c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "18d3406b0a7a4d39a16154bd45a9d223", "name": "tempest-MigrateServerV225RbacTest-1341058279", "password_expires_at": null}, "audit_ids": ["UqW-Adm0SmiX_Ofl1sKoeA"], "expires_at": "2020-12-14T03:14:58.000000Z", "issued_at": "2020-12-14T02:14:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "403869bab90a46d29a65a37723cddc04", "name": "tempest-MigrateServerV225RbacTest-1341058279"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:58.841 186 INFO tempest.lib.common.rest_client [req-832ee37b-b00b-4a84-bbae-a2ae6d7c2bed ] Request (ServerActionsV214RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc/users/9cd51d368197403da13a0eb5785c3256/roles/a629c95d64b3416fb80ae90af4f69c05 0.130s 2020-12-14 02:14:58.843 186 DEBUG tempest.lib.common.rest_client [req-832ee37b-b00b-4a84-bbae-a2ae6d7c2bed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-832ee37b-b00b-4a84-bbae-a2ae6d7c2bed', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc/users/9cd51d368197403da13a0eb5785c3256/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:59.160 193 INFO tempest.lib.common.rest_client [req-85eee296-7b55-4c2b-8dad-da88ba667292 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f 0.238s 2020-12-14 02:14:59.162 193 DEBUG tempest.lib.common.rest_client [req-85eee296-7b55-4c2b-8dad-da88ba667292 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1541', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-85eee296-7b55-4c2b-8dad-da88ba667292', 'x-compute-request-id': 'req-85eee296-7b55-4c2b-8dad-da88ba667292', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f'} Body: b'{"server": {"id": "24795eb2-68c3-4190-b564-494fe69f731f", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1834788050", "status": "BUILD", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "metadata": {}, "hostId": "ae18e3c318546a04a62c3c72d4975d4148b06c398cd0f19cef05659a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:52Z", "updated": "2020-12-14T02:14:54Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/24795eb2-68c3-4190-b564-494fe69f731f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:59.360 189 INFO tempest.lib.common.rest_client [req-fceb20d6-a01f-439e-9ba8-85e36e5fa46e ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.221s 2020-12-14 02:14:59.363 189 DEBUG tempest.lib.common.rest_client [req-fceb20d6-a01f-439e-9ba8-85e36e5fa46e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fceb20d6-a01f-439e-9ba8-85e36e5fa46e', 'x-compute-request-id': 'req-fceb20d6-a01f-439e-9ba8-85e36e5fa46e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:59Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:59.442 197 INFO tempest.lib.common.rest_client [req-c8c5aba2-3d26-4109-9e0a-19fe5bcbef80 ] Request (MigrateServerV225RbacTest:test_cold_migration): 202 POST http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730/action 0.723s 2020-12-14 02:14:59.444 197 DEBUG tempest.lib.common.rest_client [req-c8c5aba2-3d26-4109-9e0a-19fe5bcbef80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: {"migrate": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c8c5aba2-3d26-4109-9e0a-19fe5bcbef80', 'x-compute-request-id': 'req-c8c5aba2-3d26-4109-9e0a-19fe5bcbef80', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:59.447 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:14:59.469 189 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrating" ==> "RESIZE/resize_migrated" after 5 second wait 2020-12-14 02:14:59.568 197 INFO tempest.lib.common.rest_client [req-462f97cb-d002-4cb1-9ae8-78aedc3a63a4 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles 0.114s 2020-12-14 02:14:59.572 197 DEBUG tempest.lib.common.rest_client [req-462f97cb-d002-4cb1-9ae8-78aedc3a63a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-462f97cb-d002-4cb1-9ae8-78aedc3a63a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:59.670 197 INFO tempest.lib.common.rest_client [req-ac865ad0-d411-4928-95ba-d1bd1422ae62 ] Request (MigrateServerV225RbacTest:test_cold_migration): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:14:59.673 197 DEBUG tempest.lib.common.rest_client [req-ac865ad0-d411-4928-95ba-d1bd1422ae62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac865ad0-d411-4928-95ba-d1bd1422ae62', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "18d3406b0a7a4d39a16154bd45a9d223", "name": "tempest-MigrateServerV225RbacTest-1341058279", "password_expires_at": null}, "audit_ids": ["S9gCpR8bTiiP6myNw0eV_A"], "expires_at": "2020-12-14T03:14:59.000000Z", "issued_at": "2020-12-14T02:14:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "403869bab90a46d29a65a37723cddc04", "name": "tempest-MigrateServerV225RbacTest-1341058279"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:14:59.951 186 INFO tempest.lib.common.rest_client [req-f75b180f-6d42-45b2-9a43-347bb6363fc6 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:14:59.954 186 DEBUG tempest.lib.common.rest_client [req-f75b180f-6d42-45b2-9a43-347bb6363fc6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f75b180f-6d42-45b2-9a43-347bb6363fc6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9cd51d368197403da13a0eb5785c3256", "name": "tempest-ServerActionsV214RbacTest-1363200074", "password_expires_at": null}, "audit_ids": ["r1NEg1TfTIeHvsWtWrFo9w"], "expires_at": "2020-12-14T03:14:59.000000Z", "issued_at": "2020-12-14T02:14:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0983fbbd1c274f8fb9df502bcf4d10dc", "name": "tempest-ServerActionsV214RbacTest-1363200074"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:00.083 186 INFO tempest.lib.common.rest_client [req-5b6aea3e-150f-4dfe-9026-459b0b826d5d ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:15:00.086 186 DEBUG tempest.lib.common.rest_client [req-5b6aea3e-150f-4dfe-9026-459b0b826d5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b6aea3e-150f-4dfe-9026-459b0b826d5d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9cd51d368197403da13a0eb5785c3256", "name": "tempest-ServerActionsV214RbacTest-1363200074", "password_expires_at": null}, "audit_ids": ["MkTGw2N_SQGqLD8t0v1OzQ"], "expires_at": "2020-12-14T03:15:00.000000Z", "issued_at": "2020-12-14T02:15:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0983fbbd1c274f8fb9df502bcf4d10dc", "name": "tempest-ServerActionsV214RbacTest-1363200074"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:00.091 186 INFO tempest.lib.common.fixed_network [-] (ServerActionsV214RbacTest:setUpClass) Found network {'id': '4edfe25a-5ada-42db-9999-939648f21e45', 'name': 'tempest-ServerActionsV214RbacTest-69276485-network', 'tenant_id': '0983fbbd1c274f8fb9df502bcf4d10dc', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '0983fbbd1c274f8fb9df502bcf4d10dc', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 65, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:14:53Z', 'updated_at': '2020-12-14T02:14:53Z', 'revision_number': 1} available for tenant 2020-12-14 02:15:00.113 197 INFO tempest.lib.common.rest_client [req-2f22db79-7ecd-43a4-844b-28958606fe0c ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.433s 2020-12-14 02:15:00.116 197 DEBUG tempest.lib.common.rest_client [req-2f22db79-7ecd-43a4-844b-28958606fe0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:14:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2114', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2f22db79-7ecd-43a4-844b-28958606fe0c', 'x-compute-request-id': 'req-2f22db79-7ecd-43a4-844b-28958606fe0c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "RESIZE", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:14:59Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.50", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:7d:d2:6e"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:57.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-zussfc1t", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1036377634", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:00.516 193 INFO tempest.lib.common.rest_client [req-37e1ec49-314d-45ca-a854-11bbef900c56 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f 0.247s 2020-12-14 02:15:00.518 193 DEBUG tempest.lib.common.rest_client [req-37e1ec49-314d-45ca-a854-11bbef900c56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1541', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-37e1ec49-314d-45ca-a854-11bbef900c56', 'x-compute-request-id': 'req-37e1ec49-314d-45ca-a854-11bbef900c56', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f'} Body: b'{"server": {"id": "24795eb2-68c3-4190-b564-494fe69f731f", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1834788050", "status": "BUILD", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "metadata": {}, "hostId": "ae18e3c318546a04a62c3c72d4975d4148b06c398cd0f19cef05659a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:52Z", "updated": "2020-12-14T02:14:54Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/24795eb2-68c3-4190-b564-494fe69f731f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:00.713 189 INFO tempest.lib.common.rest_client [req-bba009f8-e64e-471e-b796-0c87d457c3e2 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.234s 2020-12-14 02:15:00.716 189 DEBUG tempest.lib.common.rest_client [req-bba009f8-e64e-471e-b796-0c87d457c3e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bba009f8-e64e-471e-b796-0c87d457c3e2', 'x-compute-request-id': 'req-bba009f8-e64e-471e-b796-0c87d457c3e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:14:59Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:00.994 186 INFO tempest.lib.common.rest_client [req-e9859cc2-8370-4064-b0c8-2c5baa3d1ff0 ] Request (ServerActionsV214RbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 0.893s 2020-12-14 02:15:00.997 186 DEBUG tempest.lib.common.rest_client [req-e9859cc2-8370-4064-b0c8-2c5baa3d1ff0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerActionsV214RbacTest-server-1017105635", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "4edfe25a-5ada-42db-9999-939648f21e45"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e9859cc2-8370-4064-b0c8-2c5baa3d1ff0', 'x-compute-request-id': 'req-e9859cc2-8370-4064-b0c8-2c5baa3d1ff0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "188706d4-1c4f-4f60-8c0c-bffc803cc3a8", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "6WdwaQkwj2Ch"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:01.129 186 INFO tempest.lib.common.rest_client [req-271cef91-80ba-42fa-a133-97d5b5865853 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8 0.101s 2020-12-14 02:15:01.133 186 DEBUG tempest.lib.common.rest_client [req-271cef91-80ba-42fa-a133-97d5b5865853 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1401', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-271cef91-80ba-42fa-a133-97d5b5865853', 'x-compute-request-id': 'req-271cef91-80ba-42fa-a133-97d5b5865853', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8'} Body: b'{"server": {"id": "188706d4-1c4f-4f60-8c0c-bffc803cc3a8", "name": "tempest-ServerActionsV214RbacTest-server-1017105635", "status": "BUILD", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "user_id": "9cd51d368197403da13a0eb5785c3256", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:01Z", "updated": "2020-12-14T02:15:01Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:01.597 197 INFO tempest.lib.common.rest_client [req-5a8ca109-05e8-41ce-83d9-b0bd78f87752 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.341s 2020-12-14 02:15:01.601 197 DEBUG tempest.lib.common.rest_client [req-5a8ca109-05e8-41ce-83d9-b0bd78f87752 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2114', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5a8ca109-05e8-41ce-83d9-b0bd78f87752', 'x-compute-request-id': 'req-5a8ca109-05e8-41ce-83d9-b0bd78f87752', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "RESIZE", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:15:00Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.50", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:7d:d2:6e"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:57.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-zussfc1t", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1036377634", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:01.891 193 INFO tempest.lib.common.rest_client [req-6f78d15d-6db3-4310-b7af-6727afc5dd10 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f 0.264s 2020-12-14 02:15:01.894 193 DEBUG tempest.lib.common.rest_client [req-6f78d15d-6db3-4310-b7af-6727afc5dd10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1735', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6f78d15d-6db3-4310-b7af-6727afc5dd10', 'x-compute-request-id': 'req-6f78d15d-6db3-4310-b7af-6727afc5dd10', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f'} Body: b'{"server": {"id": "24795eb2-68c3-4190-b564-494fe69f731f", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1834788050", "status": "ACTIVE", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "metadata": {}, "hostId": "ae18e3c318546a04a62c3c72d4975d4148b06c398cd0f19cef05659a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:52Z", "updated": "2020-12-14T02:15:01Z", "addresses": {"tempest-ServerVolumeAttachmentRbacTest-184020563-network": [{"version": 4, "addr": "192.168.120.9", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:b3:f9:c6"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/24795eb2-68c3-4190-b564-494fe69f731f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:01.977 193 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 9 second wait 2020-12-14 02:15:02.034 189 INFO tempest.lib.common.rest_client [req-19782062-6c6f-4146-8739-ee7efe88a724 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.204s 2020-12-14 02:15:02.038 189 DEBUG tempest.lib.common.rest_client [req-19782062-6c6f-4146-8739-ee7efe88a724 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1729', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-19782062-6c6f-4146-8739-ee7efe88a724', 'x-compute-request-id': 'req-19782062-6c6f-4146-8739-ee7efe88a724', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:01Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:02.150 189 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrated" ==> "RESIZE/resize_finish" after 8 second wait 2020-12-14 02:15:02.332 193 INFO tempest.lib.common.rest_client [req-cedd252e-47da-4b1e-8256-2c2742a552d6 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes 0.347s 2020-12-14 02:15:02.334 193 DEBUG tempest.lib.common.rest_client [req-cedd252e-47da-4b1e-8256-2c2742a552d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "display_name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-cedd252e-47da-4b1e-8256-2c2742a552d6', 'content-length': '850', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-cedd252e-47da-4b1e-8256-2c2742a552d6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": null, "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:02.397 186 INFO tempest.lib.common.rest_client [req-fafc3e48-2b32-432e-a524-a27ba206740a ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8 0.155s 2020-12-14 02:15:02.400 186 DEBUG tempest.lib.common.rest_client [req-fafc3e48-2b32-432e-a524-a27ba206740a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1506', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fafc3e48-2b32-432e-a524-a27ba206740a', 'x-compute-request-id': 'req-fafc3e48-2b32-432e-a524-a27ba206740a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8'} Body: b'{"server": {"id": "188706d4-1c4f-4f60-8c0c-bffc803cc3a8", "name": "tempest-ServerActionsV214RbacTest-server-1017105635", "status": "BUILD", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "user_id": "9cd51d368197403da13a0eb5785c3256", "metadata": {}, "hostId": "5ac6bc40470859732b5f05e7845dbd53e1305f14251b3e871b013a1a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:00Z", "updated": "2020-12-14T02:15:02Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "block_device_mapping", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:02.522 186 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/block_device_mapping" after 1 second wait 2020-12-14 02:15:02.553 193 INFO tempest.lib.common.rest_client [req-24c78dd8-1222-440f-97d7-5bf18fc76588 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.087s 2020-12-14 02:15:02.556 193 DEBUG tempest.lib.common.rest_client [req-24c78dd8-1222-440f-97d7-5bf18fc76588 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-24c78dd8-1222-440f-97d7-5bf18fc76588', 'content-length': '1072', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-24c78dd8-1222-440f-97d7-5bf18fc76588', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:02.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:03.254 197 INFO tempest.lib.common.rest_client [req-9b22c5b4-8877-49a9-95de-93f342349bac ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.520s 2020-12-14 02:15:03.259 197 DEBUG tempest.lib.common.rest_client [req-9b22c5b4-8877-49a9-95de-93f342349bac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2119', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9b22c5b4-8877-49a9-95de-93f342349bac', 'x-compute-request-id': 'req-9b22c5b4-8877-49a9-95de-93f342349bac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "RESIZE", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:15:02Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.50", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:7d:d2:6e"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:57.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-zussfc1t", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1036377634", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:03.394 197 INFO tempest.common.waiters [-] State transition "RESIZE/resize_prep" ==> "RESIZE/resize_migrating" after 3 second wait 2020-12-14 02:15:03.411 189 INFO tempest.lib.common.rest_client [req-cd085d7e-57e6-4962-988e-d9d3532e23ce ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.254s 2020-12-14 02:15:03.413 189 DEBUG tempest.lib.common.rest_client [req-cd085d7e-57e6-4962-988e-d9d3532e23ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1729', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cd085d7e-57e6-4962-988e-d9d3532e23ce', 'x-compute-request-id': 'req-cd085d7e-57e6-4962-988e-d9d3532e23ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:01Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:03.734 193 INFO tempest.lib.common.rest_client [req-07f4d6e3-af03-41b2-abdb-605c227d3cc9 ] Request (ServerVolumeAttachmentRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.092s 2020-12-14 02:15:03.737 193 DEBUG tempest.lib.common.rest_client [req-07f4d6e3-af03-41b2-abdb-605c227d3cc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-07f4d6e3-af03-41b2-abdb-605c227d3cc9', 'content-length': '1073', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-07f4d6e3-af03-41b2-abdb-605c227d3cc9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:03.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:03.766 186 INFO tempest.lib.common.rest_client [req-4e4f357b-ff24-4da9-a8ce-763425dca9c8 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8 0.236s 2020-12-14 02:15:03.769 186 DEBUG tempest.lib.common.rest_client [req-4e4f357b-ff24-4da9-a8ce-763425dca9c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4e4f357b-ff24-4da9-a8ce-763425dca9c8', 'x-compute-request-id': 'req-4e4f357b-ff24-4da9-a8ce-763425dca9c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8'} Body: b'{"server": {"id": "188706d4-1c4f-4f60-8c0c-bffc803cc3a8", "name": "tempest-ServerActionsV214RbacTest-server-1017105635", "status": "BUILD", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "user_id": "9cd51d368197403da13a0eb5785c3256", "metadata": {}, "hostId": "5ac6bc40470859732b5f05e7845dbd53e1305f14251b3e871b013a1a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:00Z", "updated": "2020-12-14T02:15:02Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:03.844 193 INFO tempest.common.waiters [-] volume 7f147637-4985-4c74-b8e8-feea8431bcd8 reached available after waiting for 1.843925 seconds 2020-12-14 02:15:03.869 186 INFO tempest.common.waiters [-] State transition "BUILD/block_device_mapping" ==> "BUILD/spawning" after 2 second wait 2020-12-14 02:15:03.937 193 INFO tempest.lib.common.rest_client [req-d4c21387-420b-4088-a2b8-3aa361d7dcdd ] Request (ServerVolumeAttachmentRbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.081s 2020-12-14 02:15:03.941 193 DEBUG tempest.lib.common.rest_client [req-d4c21387-420b-4088-a2b8-3aa361d7dcdd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d4c21387-420b-4088-a2b8-3aa361d7dcdd', 'content-length': '1073', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d4c21387-420b-4088-a2b8-3aa361d7dcdd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:03.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:04.016 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:04.020 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.022 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.025 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.027 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.030 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.033 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.037 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.039 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.041 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.044 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.046 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.048 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.051 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.053 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.055 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.058 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.060 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.062 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.065 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.067 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.069 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.071 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.073 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.075 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.078 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.080 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.082 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.084 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.086 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.089 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.091 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.093 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.095 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.097 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.100 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.102 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.104 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.106 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.109 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.111 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.114 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.116 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.118 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.121 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.124 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.126 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.128 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.131 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.133 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.136 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.138 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.141 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.143 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.145 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.148 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.150 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.155 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.157 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.159 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.162 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.164 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.166 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.169 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.171 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.173 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.175 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.177 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.179 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.181 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.183 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.186 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:04.194 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes-attachments:create, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:04.195 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:04.264 193 INFO tempest.lib.common.rest_client [req-90491ebf-559a-41e7-9dba-74e6c2572cf8 ] Request (ServerVolumeAttachmentRbacTest:test_create_volume_attachment): 200 GET http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles 0.062s 2020-12-14 02:15:04.266 193 DEBUG tempest.lib.common.rest_client [req-90491ebf-559a-41e7-9dba-74e6c2572cf8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90491ebf-559a-41e7-9dba-74e6c2572cf8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:04.361 193 INFO tempest.lib.common.rest_client [req-ed35b40e-ca12-4314-a0df-a82c6ed3958f ] Request (ServerVolumeAttachmentRbacTest:test_create_volume_attachment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:15:04.363 193 DEBUG tempest.lib.common.rest_client [req-ed35b40e-ca12-4314-a0df-a82c6ed3958f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed35b40e-ca12-4314-a0df-a82c6ed3958f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "57d9a7612ecf4fb8b34c79c101f93eb4", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585", "password_expires_at": null}, "audit_ids": ["rmo3HwiqTiiDrvXFQWWS8A"], "expires_at": "2020-12-14T03:15:04.000000Z", "issued_at": "2020-12-14T02:15:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6eaa7aebfbc3432bbcb4a961a888a31a", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:04.705 197 INFO tempest.lib.common.rest_client [req-421d63bf-7e1d-4c67-b145-621080497b14 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.302s 2020-12-14 02:15:04.710 197 DEBUG tempest.lib.common.rest_client [req-421d63bf-7e1d-4c67-b145-621080497b14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2119', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-421d63bf-7e1d-4c67-b145-621080497b14', 'x-compute-request-id': 'req-421d63bf-7e1d-4c67-b145-621080497b14', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "RESIZE", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:15:02Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.50", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:7d:d2:6e"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:57.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-zussfc1t", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1036377634", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:04.742 189 INFO tempest.lib.common.rest_client [req-7c25f8c7-96a4-46d9-b308-7dfe171066f3 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.240s 2020-12-14 02:15:04.745 189 DEBUG tempest.lib.common.rest_client [req-7c25f8c7-96a4-46d9-b308-7dfe171066f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7c25f8c7-96a4-46d9-b308-7dfe171066f3', 'x-compute-request-id': 'req-7c25f8c7-96a4-46d9-b308-7dfe171066f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:03Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:04.847 193 INFO tempest.lib.common.rest_client [req-0f72fc78-4771-4e81-95a1-117e03968242 ] Request (ServerVolumeAttachmentRbacTest:test_create_volume_attachment): 200 POST http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f/os-volume_attachments 0.477s 2020-12-14 02:15:04.848 189 INFO tempest.common.waiters [-] State transition "RESIZE/resize_finish" ==> "VERIFY_RESIZE/None" after 10 second wait 2020-12-14 02:15:04.850 193 DEBUG tempest.lib.common.rest_client [req-0f72fc78-4771-4e81-95a1-117e03968242 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volumeAttachment": {"volumeId": "7f147637-4985-4c74-b8e8-feea8431bcd8"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0f72fc78-4771-4e81-95a1-117e03968242', 'x-compute-request-id': 'req-0f72fc78-4771-4e81-95a1-117e03968242', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f/os-volume_attachments'} Body: b'{"volumeAttachment": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "serverId": "24795eb2-68c3-4190-b564-494fe69f731f", "volumeId": "7f147637-4985-4c74-b8e8-feea8431bcd8", "device": "/dev/sdb"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:04.870 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:04.941 193 INFO tempest.lib.common.rest_client [req-1e8b05d7-2787-4845-8827-4c3ce95dce9b ] Request (ServerVolumeAttachmentRbacTest:test_create_volume_attachment): 200 GET http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles 0.065s 2020-12-14 02:15:04.944 193 DEBUG tempest.lib.common.rest_client [req-1e8b05d7-2787-4845-8827-4c3ce95dce9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e8b05d7-2787-4845-8827-4c3ce95dce9b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:04.997 193 INFO tempest.lib.common.rest_client [req-46c3e9da-89fb-4f56-9cdd-e577b20c6e5b ] Request (ServerVolumeAttachmentRbacTest:test_create_volume_attachment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:15:05.000 193 DEBUG tempest.lib.common.rest_client [req-46c3e9da-89fb-4f56-9cdd-e577b20c6e5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46c3e9da-89fb-4f56-9cdd-e577b20c6e5b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "57d9a7612ecf4fb8b34c79c101f93eb4", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585", "password_expires_at": null}, "audit_ids": ["4-BhumFDQ1q31kHKk308Og"], "expires_at": "2020-12-14T03:15:04.000000Z", "issued_at": "2020-12-14T02:15:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6eaa7aebfbc3432bbcb4a961a888a31a", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:05.089 186 INFO tempest.lib.common.rest_client [req-2f237d67-22a3-495c-b89e-1ae6ae4b6f22 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8 0.211s 2020-12-14 02:15:05.093 186 DEBUG tempest.lib.common.rest_client [req-2f237d67-22a3-495c-b89e-1ae6ae4b6f22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2f237d67-22a3-495c-b89e-1ae6ae4b6f22', 'x-compute-request-id': 'req-2f237d67-22a3-495c-b89e-1ae6ae4b6f22', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8'} Body: b'{"server": {"id": "188706d4-1c4f-4f60-8c0c-bffc803cc3a8", "name": "tempest-ServerActionsV214RbacTest-server-1017105635", "status": "BUILD", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "user_id": "9cd51d368197403da13a0eb5785c3256", "metadata": {}, "hostId": "5ac6bc40470859732b5f05e7845dbd53e1305f14251b3e871b013a1a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:00Z", "updated": "2020-12-14T02:15:02Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:05.098 189 INFO tempest.lib.common.rest_client [req-0cba326b-8757-4248-a068-b04dd03cdc66 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.241s 2020-12-14 02:15:05.103 189 DEBUG tempest.lib.common.rest_client [req-0cba326b-8757-4248-a068-b04dd03cdc66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0cba326b-8757-4248-a068-b04dd03cdc66', 'x-compute-request-id': 'req-0cba326b-8757-4248-a068-b04dd03cdc66', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:03Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:05.193 193 INFO tempest.lib.common.rest_client [req-56ca97ab-b6af-4c50-8819-d90d650a13a5 ] Request (ServerVolumeAttachmentRbacTest:test_create_volume_attachment): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.186s 2020-12-14 02:15:05.197 193 DEBUG tempest.lib.common.rest_client [req-56ca97ab-b6af-4c50-8819-d90d650a13a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-56ca97ab-b6af-4c50-8819-d90d650a13a5', 'content-length': '1072', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-56ca97ab-b6af-4c50-8819-d90d650a13a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "reserved", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:05.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:05.335 189 INFO tempest.lib.common.rest_client [req-97d9be6c-d48e-46e4-8de2-85112f13f501 ] Request (ServerActionsRbacTest:_run_cleanups): 204 POST http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action 0.116s 2020-12-14 02:15:05.337 189 DEBUG tempest.lib.common.rest_client [req-97d9be6c-d48e-46e4-8de2-85112f13f501 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"confirmResize": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-97d9be6c-d48e-46e4-8de2-85112f13f501', 'x-compute-request-id': 'req-97d9be6c-d48e-46e4-8de2-85112f13f501', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:05.616 189 INFO tempest.lib.common.rest_client [req-7e0aa435-9d74-4b65-a22b-e9ca8c79ef37 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.270s 2020-12-14 02:15:05.619 189 DEBUG tempest.lib.common.rest_client [req-7e0aa435-9d74-4b65-a22b-e9ca8c79ef37 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7e0aa435-9d74-4b65-a22b-e9ca8c79ef37', 'x-compute-request-id': 'req-7e0aa435-9d74-4b65-a22b-e9ca8c79ef37', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:03Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:06.249 197 INFO tempest.lib.common.rest_client [req-8edb30fc-9239-4d36-b812-a7984d85bb9b ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.409s 2020-12-14 02:15:06.252 197 DEBUG tempest.lib.common.rest_client [req-8edb30fc-9239-4d36-b812-a7984d85bb9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2118', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8edb30fc-9239-4d36-b812-a7984d85bb9b', 'x-compute-request-id': 'req-8edb30fc-9239-4d36-b812-a7984d85bb9b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "RESIZE", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "ce30f2a8a9c0a201ad9e84efabeea37e52a1c1323cb23692d44d7abe", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:15:05Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.50", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:7d:d2:6e"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:57.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-zussfc1t", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1036377634", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:06.375 197 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrating" ==> "RESIZE/resize_migrated" after 6 second wait 2020-12-14 02:15:06.389 193 INFO tempest.lib.common.rest_client [req-08102bac-e07f-4472-bd57-1cc13c79be25 ] Request (ServerVolumeAttachmentRbacTest:test_create_volume_attachment): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.089s 2020-12-14 02:15:06.393 193 DEBUG tempest.lib.common.rest_client [req-08102bac-e07f-4472-bd57-1cc13c79be25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-08102bac-e07f-4472-bd57-1cc13c79be25', 'content-length': '1374', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-08102bac-e07f-4472-bd57-1cc13c79be25', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:06.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "attachment_id": "5c07b047-cd23-4099-a8b1-1b614f5b8db3", "volume_id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "server_id": "24795eb2-68c3-4190-b564-494fe69f731f", "host_name": "lf-virtual9", "device": "/dev/sdb", "attached_at": "2020-12-14T02:15:06.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:06.422 186 INFO tempest.lib.common.rest_client [req-d0861d95-7722-41a1-a752-3e1361e4016d ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8 0.228s 2020-12-14 02:15:06.425 186 DEBUG tempest.lib.common.rest_client [req-d0861d95-7722-41a1-a752-3e1361e4016d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d0861d95-7722-41a1-a752-3e1361e4016d', 'x-compute-request-id': 'req-d0861d95-7722-41a1-a752-3e1361e4016d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8'} Body: b'{"server": {"id": "188706d4-1c4f-4f60-8c0c-bffc803cc3a8", "name": "tempest-ServerActionsV214RbacTest-server-1017105635", "status": "BUILD", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "user_id": "9cd51d368197403da13a0eb5785c3256", "metadata": {}, "hostId": "5ac6bc40470859732b5f05e7845dbd53e1305f14251b3e871b013a1a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:00Z", "updated": "2020-12-14T02:15:02Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:06.494 193 INFO tempest.common.waiters [-] volume 7f147637-4985-4c74-b8e8-feea8431bcd8 reached in-use after waiting for 1.493753 seconds 2020-12-14 02:15:06.589 193 INFO tempest.lib.common.rest_client [req-8b1f5d20-fc83-4ac5-b9ba-655ffa4ebc95 ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.087s 2020-12-14 02:15:06.593 193 DEBUG tempest.lib.common.rest_client [req-8b1f5d20-fc83-4ac5-b9ba-655ffa4ebc95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8b1f5d20-fc83-4ac5-b9ba-655ffa4ebc95', 'content-length': '1374', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8b1f5d20-fc83-4ac5-b9ba-655ffa4ebc95', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:06.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "attachment_id": "5c07b047-cd23-4099-a8b1-1b614f5b8db3", "volume_id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "server_id": "24795eb2-68c3-4190-b564-494fe69f731f", "host_name": "lf-virtual9", "device": "/dev/sdb", "attached_at": "2020-12-14T02:15:06.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:06.929 193 INFO tempest.lib.common.rest_client [req-e95fa350-b406-41cb-aa2f-0a6d114e78a1 ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f/os-volume_attachments/7f147637-4985-4c74-b8e8-feea8431bcd8 0.240s 2020-12-14 02:15:06.932 193 DEBUG tempest.lib.common.rest_client [req-e95fa350-b406-41cb-aa2f-0a6d114e78a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e95fa350-b406-41cb-aa2f-0a6d114e78a1', 'x-compute-request-id': 'req-e95fa350-b406-41cb-aa2f-0a6d114e78a1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f/os-volume_attachments/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:06.966 189 INFO tempest.lib.common.rest_client [req-d8eb14df-dd01-412e-b1b7-de2268decf30 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.235s 2020-12-14 02:15:06.969 189 DEBUG tempest.lib.common.rest_client [req-d8eb14df-dd01-412e-b1b7-de2268decf30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d8eb14df-dd01-412e-b1b7-de2268decf30', 'x-compute-request-id': 'req-d8eb14df-dd01-412e-b1b7-de2268decf30', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:03Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:07.040 193 INFO tempest.lib.common.rest_client [req-6b7ee831-9640-445c-a5ae-196c2ff4908d ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.100s 2020-12-14 02:15:07.043 193 DEBUG tempest.lib.common.rest_client [req-6b7ee831-9640-445c-a5ae-196c2ff4908d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6b7ee831-9640-445c-a5ae-196c2ff4908d', 'content-length': '1377', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6b7ee831-9640-445c-a5ae-196c2ff4908d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "detaching", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:07.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "attachment_id": "5c07b047-cd23-4099-a8b1-1b614f5b8db3", "volume_id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "server_id": "24795eb2-68c3-4190-b564-494fe69f731f", "host_name": "lf-virtual9", "device": "/dev/sdb", "attached_at": "2020-12-14T02:15:06.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:07.654 197 INFO tempest.lib.common.rest_client [req-fd09ff50-1cbe-4901-bceb-281ea2e4e3cd ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.271s 2020-12-14 02:15:07.657 197 DEBUG tempest.lib.common.rest_client [req-fd09ff50-1cbe-4901-bceb-281ea2e4e3cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2116', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fd09ff50-1cbe-4901-bceb-281ea2e4e3cd', 'x-compute-request-id': 'req-fd09ff50-1cbe-4901-bceb-281ea2e4e3cd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "RESIZE", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "ce30f2a8a9c0a201ad9e84efabeea37e52a1c1323cb23692d44d7abe", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:15:07Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.50", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:7d:d2:6e"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:57.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-zussfc1t", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1036377634", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:07.781 197 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrated" ==> "RESIZE/resize_finish" after 7 second wait 2020-12-14 02:15:07.898 186 INFO tempest.lib.common.rest_client [req-1de52cd5-1cc9-440c-b452-39cd703e38e5 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8 0.368s 2020-12-14 02:15:07.901 186 DEBUG tempest.lib.common.rest_client [req-1de52cd5-1cc9-440c-b452-39cd703e38e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1de52cd5-1cc9-440c-b452-39cd703e38e5', 'x-compute-request-id': 'req-1de52cd5-1cc9-440c-b452-39cd703e38e5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8'} Body: b'{"server": {"id": "188706d4-1c4f-4f60-8c0c-bffc803cc3a8", "name": "tempest-ServerActionsV214RbacTest-server-1017105635", "status": "BUILD", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "user_id": "9cd51d368197403da13a0eb5785c3256", "metadata": {}, "hostId": "5ac6bc40470859732b5f05e7845dbd53e1305f14251b3e871b013a1a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:00Z", "updated": "2020-12-14T02:15:02Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:08.238 193 INFO tempest.lib.common.rest_client [req-86a9a200-1686-4d24-b538-194bba5be07d ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.090s 2020-12-14 02:15:08.241 193 DEBUG tempest.lib.common.rest_client [req-86a9a200-1686-4d24-b538-194bba5be07d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-86a9a200-1686-4d24-b538-194bba5be07d', 'content-length': '1073', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-86a9a200-1686-4d24-b538-194bba5be07d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:07.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:08.341 189 INFO tempest.lib.common.rest_client [req-3b972c5d-365b-4473-bc4a-c0b977b0663b ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.257s 2020-12-14 02:15:08.346 189 DEBUG tempest.lib.common.rest_client [req-3b972c5d-365b-4473-bc4a-c0b977b0663b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3b972c5d-365b-4473-bc4a-c0b977b0663b', 'x-compute-request-id': 'req-3b972c5d-365b-4473-bc4a-c0b977b0663b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:08Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:08.355 193 INFO tempest.common.waiters [-] volume 7f147637-4985-4c74-b8e8-feea8431bcd8 reached available after waiting for 1.355197 seconds 2020-12-14 02:15:08.463 189 INFO tempest.common.waiters [-] State transition "VERIFY_RESIZE/None" ==> "ACTIVE/None" after 3 second wait 2020-12-14 02:15:08.499 193 INFO tempest.lib.common.rest_client [req-86ff9c6b-6b59-40ef-9ce2-c00de58f7b33 ] Request (ServerVolumeAttachmentRbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.096s 2020-12-14 02:15:08.501 193 DEBUG tempest.lib.common.rest_client [req-86ff9c6b-6b59-40ef-9ce2-c00de58f7b33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-86ff9c6b-6b59-40ef-9ce2-c00de58f7b33', 'content-length': '1073', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-86ff9c6b-6b59-40ef-9ce2-c00de58f7b33', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:07.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:08.594 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:08.599 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.602 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.605 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.608 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.612 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.616 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.621 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.623 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.626 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.629 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.631 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.634 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.637 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.640 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.643 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.647 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.649 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.652 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.655 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.657 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.660 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.663 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.665 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.668 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.671 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.674 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.677 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.679 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.682 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.684 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.686 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.688 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.690 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.692 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.695 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.697 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.699 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.701 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.704 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.706 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.708 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.710 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.712 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.715 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.717 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.719 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.721 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.723 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.725 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.727 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.729 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.731 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.732 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.734 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.737 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.739 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.743 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.745 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.747 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.749 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.751 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.753 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.755 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.757 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.759 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.761 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.763 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.765 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.768 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.770 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.772 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.778 189 INFO tempest.lib.common.rest_client [req-f59c223f-1c31-4bb6-bbda-ef4c7d4022f6 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.195s 2020-12-14 02:15:08.780 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes-attachments:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:08.782 189 DEBUG tempest.lib.common.rest_client [req-f59c223f-1c31-4bb6-bbda-ef4c7d4022f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f59c223f-1c31-4bb6-bbda-ef4c7d4022f6', 'x-compute-request-id': 'req-f59c223f-1c31-4bb6-bbda-ef4c7d4022f6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:08Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:08.888 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:08.894 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.897 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.900 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.904 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.907 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.911 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.916 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.920 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.923 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.926 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.929 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.932 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.935 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.939 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.942 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.946 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.948 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.951 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.954 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.957 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.960 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.963 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.966 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.969 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.972 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.975 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.977 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.980 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.983 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.986 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.989 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.992 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.994 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:08.997 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.000 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.003 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.006 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.009 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.012 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.015 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.018 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.021 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.024 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.028 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.030 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.033 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.036 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.039 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.042 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.045 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.047 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.050 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.052 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.055 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.058 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.060 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.064 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.067 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.069 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.071 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.074 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.076 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.078 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.081 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.083 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.085 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.088 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.090 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.092 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.092 197 INFO tempest.lib.common.rest_client [req-7afe58ad-5992-4c7f-ab3c-dea6a7dde445 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.302s 2020-12-14 02:15:09.095 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.095 197 DEBUG tempest.lib.common.rest_client [req-7afe58ad-5992-4c7f-ab3c-dea6a7dde445 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2116', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7afe58ad-5992-4c7f-ab3c-dea6a7dde445', 'x-compute-request-id': 'req-7afe58ad-5992-4c7f-ab3c-dea6a7dde445', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "RESIZE", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "ce30f2a8a9c0a201ad9e84efabeea37e52a1c1323cb23692d44d7abe", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:15:07Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.50", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:7d:d2:6e"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:14:57.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-zussfc1t", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1036377634", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:09.097 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.106 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-create-backup, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:09.108 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:09.244 186 INFO tempest.lib.common.rest_client [req-5528a5a5-d38d-4c6d-9153-f27cdc1b43ad ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8 0.198s 2020-12-14 02:15:09.247 186 DEBUG tempest.lib.common.rest_client [req-5528a5a5-d38d-4c6d-9153-f27cdc1b43ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5528a5a5-d38d-4c6d-9153-f27cdc1b43ad', 'x-compute-request-id': 'req-5528a5a5-d38d-4c6d-9153-f27cdc1b43ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8'} Body: b'{"server": {"id": "188706d4-1c4f-4f60-8c0c-bffc803cc3a8", "name": "tempest-ServerActionsV214RbacTest-server-1017105635", "status": "ACTIVE", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "user_id": "9cd51d368197403da13a0eb5785c3256", "metadata": {}, "hostId": "5ac6bc40470859732b5f05e7845dbd53e1305f14251b3e871b013a1a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:00Z", "updated": "2020-12-14T02:15:08Z", "addresses": {"tempest-ServerActionsV214RbacTest-69276485-network": [{"version": 4, "addr": "192.168.120.12", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:78:a1:5a"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:09.267 189 INFO tempest.lib.common.rest_client [req-f9d709c1-e446-4377-9cc8-92ccfecff6e4 ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.153s 2020-12-14 02:15:09.270 189 DEBUG tempest.lib.common.rest_client [req-f9d709c1-e446-4377-9cc8-92ccfecff6e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9d709c1-e446-4377-9cc8-92ccfecff6e4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:09.312 193 INFO tempest.lib.common.rest_client [req-1aeea6ec-d88b-4e9a-abd6-ddb7bb70576d ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 200 POST http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f/os-volume_attachments 0.526s 2020-12-14 02:15:09.314 193 DEBUG tempest.lib.common.rest_client [req-1aeea6ec-d88b-4e9a-abd6-ddb7bb70576d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volumeAttachment": {"volumeId": "7f147637-4985-4c74-b8e8-feea8431bcd8"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1aeea6ec-d88b-4e9a-abd6-ddb7bb70576d', 'x-compute-request-id': 'req-1aeea6ec-d88b-4e9a-abd6-ddb7bb70576d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f/os-volume_attachments'} Body: b'{"volumeAttachment": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "serverId": "24795eb2-68c3-4190-b564-494fe69f731f", "volumeId": "7f147637-4985-4c74-b8e8-feea8431bcd8", "device": "/dev/sdb"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:09.366 186 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 8 second wait 2020-12-14 02:15:09.369 189 INFO tempest.lib.common.rest_client [req-621941d2-7fb1-4286-a7bf-d56f296d84d8 ] Request (ServerActionsRbacTest:test_create_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:15:09.371 189 DEBUG tempest.lib.common.rest_client [req-621941d2-7fb1-4286-a7bf-d56f296d84d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-621941d2-7fb1-4286-a7bf-d56f296d84d8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["RekXenJdTe6VjYXm2xD5cA"], "expires_at": "2020-12-14T03:15:09.000000Z", "issued_at": "2020-12-14T02:15:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:09.373 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:09.378 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.381 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.384 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.388 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.391 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.395 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.399 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.402 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.405 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.408 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.411 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.414 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.417 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.419 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.422 193 INFO tempest.lib.common.rest_client [req-4c3d5fa9-2563-4c96-b779-5e6d365e224e ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.086s 2020-12-14 02:15:09.422 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.424 193 DEBUG tempest.lib.common.rest_client [req-4c3d5fa9-2563-4c96-b779-5e6d365e224e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4c3d5fa9-2563-4c96-b779-5e6d365e224e', 'content-length': '1072', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4c3d5fa9-2563-4c96-b779-5e6d365e224e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "reserved", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:09.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:09.426 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.429 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.431 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.434 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.437 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.439 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.442 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.445 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.447 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.450 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.453 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.455 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.458 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.460 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.463 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.466 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.468 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.471 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.474 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.477 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.479 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.482 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.485 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.488 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.491 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.494 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.497 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.499 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.503 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.505 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.508 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.511 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.513 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.516 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.518 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.521 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.524 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.527 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.530 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.534 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.537 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.542 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.545 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.548 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.551 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.553 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.556 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.559 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.561 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.564 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.567 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.569 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.572 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.574 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.577 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.580 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:09.588 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-evacuate, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:09.590 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:09.657 186 INFO tempest.lib.common.rest_client [req-8e349b16-b843-4258-94ee-987dd95505d1 ] Request (ServerActionsV214RbacTest:test_evacuate_server): 200 GET http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc/users/9cd51d368197403da13a0eb5785c3256/roles 0.062s 2020-12-14 02:15:09.660 186 DEBUG tempest.lib.common.rest_client [req-8e349b16-b843-4258-94ee-987dd95505d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e349b16-b843-4258-94ee-987dd95505d1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc/users/9cd51d368197403da13a0eb5785c3256/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc/users/9cd51d368197403da13a0eb5785c3256/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:09.753 186 INFO tempest.lib.common.rest_client [req-27fdc900-3eeb-454e-b43e-ad7637a2df21 ] Request (ServerActionsV214RbacTest:test_evacuate_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-14 02:15:09.757 186 DEBUG tempest.lib.common.rest_client [req-27fdc900-3eeb-454e-b43e-ad7637a2df21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27fdc900-3eeb-454e-b43e-ad7637a2df21', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9cd51d368197403da13a0eb5785c3256", "name": "tempest-ServerActionsV214RbacTest-1363200074", "password_expires_at": null}, "audit_ids": ["pz9W74ueRTOqqGgq0bCRPg"], "expires_at": "2020-12-14T03:15:09.000000Z", "issued_at": "2020-12-14T02:15:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0983fbbd1c274f8fb9df502bcf4d10dc", "name": "tempest-ServerActionsV214RbacTest-1363200074"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:09.823 189 INFO tempest.lib.common.rest_client [req-9a8d38c1-00f4-4a7d-9ef3-e33a78ad0fb1 ] Request (ServerActionsRbacTest:test_create_backup): 202 POST http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action 0.446s 2020-12-14 02:15:09.826 189 DEBUG tempest.lib.common.rest_client [req-9a8d38c1-00f4-4a7d-9ef3-e33a78ad0fb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"createBackup": {"backup_type": "daily", "rotation": 1, "name": "tempest-ServerActionsRbacTest-Backup-2102099998"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'content-length': '0', 'location': 'http://172.30.13.94/compute/v2.1/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9a8d38c1-00f4-4a7d-9ef3-e33a78ad0fb1', 'x-compute-request-id': 'req-9a8d38c1-00f4-4a7d-9ef3-e33a78ad0fb1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:09.828 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:09.911 186 INFO tempest.lib.common.rest_client [req-d99114c3-dd62-46f6-9f3f-dce9cdea4000 ] Request (ServerActionsV214RbacTest:test_evacuate_server): 404 POST http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8/action 0.141s 2020-12-14 02:15:09.914 186 DEBUG tempest.lib.common.rest_client [req-d99114c3-dd62-46f6-9f3f-dce9cdea4000 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.14', 'X-Auth-Token': ''} Body: {"evacuate": {"host": "tempest-ServerActionsV214RbacTest-fake-host-919758122"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.14', 'x-openstack-nova-api-version': '2.14', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '123', 'x-openstack-request-id': 'req-d99114c3-dd62-46f6-9f3f-dce9cdea4000', 'x-compute-request-id': 'req-d99114c3-dd62-46f6-9f3f-dce9cdea4000', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8/action'} Body: b'{"itemNotFound": {"code": 404, "message": "Compute host tempest-ServerActionsV214RbacTest-fake-host-919758122 not found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:09.917 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:09.941 189 INFO tempest.lib.common.rest_client [req-48301477-9a61-49e3-a830-b6f3c4888aee ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.107s 2020-12-14 02:15:09.945 189 DEBUG tempest.lib.common.rest_client [req-48301477-9a61-49e3-a830-b6f3c4888aee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-48301477-9a61-49e3-a830-b6f3c4888aee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:09.982 186 INFO tempest.lib.common.rest_client [req-412af025-ff9c-4c93-baa7-5afe8d89cd1b ] Request (ServerActionsV214RbacTest:test_evacuate_server): 200 GET http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc/users/9cd51d368197403da13a0eb5785c3256/roles 0.060s 2020-12-14 02:15:09.984 186 DEBUG tempest.lib.common.rest_client [req-412af025-ff9c-4c93-baa7-5afe8d89cd1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-412af025-ff9c-4c93-baa7-5afe8d89cd1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc/users/9cd51d368197403da13a0eb5785c3256/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc/users/9cd51d368197403da13a0eb5785c3256/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:10.043 189 INFO tempest.lib.common.rest_client [req-fa118db6-e809-4b53-9214-75e8c27db19a ] Request (ServerActionsRbacTest:test_create_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:15:10.046 189 DEBUG tempest.lib.common.rest_client [req-fa118db6-e809-4b53-9214-75e8c27db19a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa118db6-e809-4b53-9214-75e8c27db19a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["k4O-5OSaSgGkM1k5qj-j7w"], "expires_at": "2020-12-14T03:15:09.000000Z", "issued_at": "2020-12-14T02:15:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:10.086 186 INFO tempest.lib.common.rest_client [req-50958917-5afc-4975-bbea-749355dd208e ] Request (ServerActionsV214RbacTest:test_evacuate_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:15:10.090 186 DEBUG tempest.lib.common.rest_client [req-50958917-5afc-4975-bbea-749355dd208e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-50958917-5afc-4975-bbea-749355dd208e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9cd51d368197403da13a0eb5785c3256", "name": "tempest-ServerActionsV214RbacTest-1363200074", "password_expires_at": null}, "audit_ids": ["GeHYGE2AQH6ar07g81Z03A"], "expires_at": "2020-12-14T03:15:10.000000Z", "issued_at": "2020-12-14T02:15:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0983fbbd1c274f8fb9df502bcf4d10dc", "name": "tempest-ServerActionsV214RbacTest-1363200074"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0983fbbd1c274f8fb9df502bcf4d10dc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:10.238 189 INFO tempest.lib.common.rest_client [req-7aeff349-a088-4aa7-88ee-16a9147a0ea2 ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4 0.184s 2020-12-14 02:15:10.242 189 DEBUG tempest.lib.common.rest_client [req-7aeff349-a088-4aa7-88ee-16a9147a0ea2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1351', 'content-type': 'application/json', 'x-openstack-request-id': 'req-7aeff349-a088-4aa7-88ee-16a9147a0ea2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4'} Body: b'{"backup_type": "daily", "base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "backup", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-Backup-2102099998", "disk_format": "qcow2", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "3400d8caa66043d0b7fa128b68a28ecc", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "created_at": "2020-12-14T02:15:10Z", "updated_at": "2020-12-14T02:15:10Z", "tags": [], "self": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "file": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:10.439 186 INFO tempest.lib.common.rest_client [req-02048de8-9dc9-436f-a58b-c82ddbd7eb0d ] Request (ServerActionsV214RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8 0.329s 2020-12-14 02:15:10.442 186 DEBUG tempest.lib.common.rest_client [req-02048de8-9dc9-436f-a58b-c82ddbd7eb0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-02048de8-9dc9-436f-a58b-c82ddbd7eb0d', 'x-compute-request-id': 'req-02048de8-9dc9-436f-a58b-c82ddbd7eb0d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:10.492 197 INFO tempest.lib.common.rest_client [req-f4267d2e-ea9c-4113-ba1b-fe07fc8c20c3 ] Request (MigrateServerV225RbacTest:test_cold_migration): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.270s 2020-12-14 02:15:10.495 197 DEBUG tempest.lib.common.rest_client [req-f4267d2e-ea9c-4113-ba1b-fe07fc8c20c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2113', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f4267d2e-ea9c-4113-ba1b-fe07fc8c20c3', 'x-compute-request-id': 'req-f4267d2e-ea9c-4113-ba1b-fe07fc8c20c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "VERIFY_RESIZE", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "ce30f2a8a9c0a201ad9e84efabeea37e52a1c1323cb23692d44d7abe", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:15:09Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.50", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:7d:d2:6e"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:09.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-zussfc1t", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-1036377634", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:10.595 193 INFO tempest.lib.common.rest_client [req-eabbc1fc-60fc-4549-bc64-c92e20dd6dfa ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.086s 2020-12-14 02:15:10.599 193 DEBUG tempest.lib.common.rest_client [req-eabbc1fc-60fc-4549-bc64-c92e20dd6dfa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-eabbc1fc-60fc-4549-bc64-c92e20dd6dfa', 'content-length': '1374', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-eabbc1fc-60fc-4549-bc64-c92e20dd6dfa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:10.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "attachment_id": "565fcb09-630c-49c3-92cf-121975307100", "volume_id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "server_id": "24795eb2-68c3-4190-b564-494fe69f731f", "host_name": "lf-virtual9", "device": "/dev/sdb", "attached_at": "2020-12-14T02:15:10.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:10.616 197 INFO tempest.common.waiters [-] State transition "RESIZE/resize_finish" ==> "VERIFY_RESIZE/None" after 10 second wait 2020-12-14 02:15:10.681 186 INFO tempest.lib.common.rest_client [req-9529944a-1d17-4d92-af45-667b947788e2 ] Request (ServerActionsV214RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8 0.234s 2020-12-14 02:15:10.685 186 DEBUG tempest.lib.common.rest_client [req-9529944a-1d17-4d92-af45-667b947788e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9529944a-1d17-4d92-af45-667b947788e2', 'x-compute-request-id': 'req-9529944a-1d17-4d92-af45-667b947788e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8'} Body: b'{"server": {"id": "188706d4-1c4f-4f60-8c0c-bffc803cc3a8", "name": "tempest-ServerActionsV214RbacTest-server-1017105635", "status": "ACTIVE", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "user_id": "9cd51d368197403da13a0eb5785c3256", "metadata": {}, "hostId": "5ac6bc40470859732b5f05e7845dbd53e1305f14251b3e871b013a1a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:00Z", "updated": "2020-12-14T02:15:10Z", "addresses": {"tempest-ServerActionsV214RbacTest-69276485-network": [{"version": 4, "addr": "192.168.120.12", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:78:a1:5a"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:07.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:10.696 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:10.698 193 INFO tempest.common.waiters [-] volume 7f147637-4985-4c74-b8e8-feea8431bcd8 reached in-use after waiting for 1.698558 seconds 2020-12-14 02:15:10.701 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.702 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:10.704 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.708 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.711 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.715 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.719 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.723 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.726 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.729 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.732 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.735 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.737 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.740 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.743 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.746 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.750 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.753 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.755 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.758 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.761 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.764 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.766 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.769 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.772 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.774 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.777 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.780 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.783 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.785 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.788 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.791 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.794 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.796 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.799 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.802 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.805 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.807 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.810 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.813 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.817 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.819 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.822 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.825 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.828 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.831 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.834 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.837 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.839 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.842 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.845 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.845 193 INFO tempest.lib.common.rest_client [req-cb9a2ecc-1430-4e32-b2f0-903db1236239 ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 200 GET http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles 0.135s 2020-12-14 02:15:10.848 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.848 193 DEBUG tempest.lib.common.rest_client [req-cb9a2ecc-1430-4e32-b2f0-903db1236239 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb9a2ecc-1430-4e32-b2f0-903db1236239', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:10.850 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.853 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.856 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.860 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.862 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.868 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.871 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.874 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.877 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.879 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.882 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.885 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.888 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.890 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.892 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.895 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.897 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.900 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.902 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.904 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:10.911 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-migrate-server:migrate_live, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:10.966 193 INFO tempest.lib.common.rest_client [req-371f033a-27e1-4cb7-b96a-44d93d4fc30b ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-12-14 02:15:10.970 193 DEBUG tempest.lib.common.rest_client [req-371f033a-27e1-4cb7-b96a-44d93d4fc30b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-371f033a-27e1-4cb7-b96a-44d93d4fc30b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "57d9a7612ecf4fb8b34c79c101f93eb4", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585", "password_expires_at": null}, "audit_ids": ["3NrMEBhASdSUm5H_Sv_R_w"], "expires_at": "2020-12-14T03:15:10.000000Z", "issued_at": "2020-12-14T02:15:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6eaa7aebfbc3432bbcb4a961a888a31a", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:11.071 197 INFO tempest.lib.common.rest_client [req-86fd1f1c-7c83-4d53-90a7-bd3320eee9d2 ] Request (MigrateServerV225RbacTest:test_migration_live): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-12-14 02:15:11.074 197 DEBUG tempest.lib.common.rest_client [req-86fd1f1c-7c83-4d53-90a7-bd3320eee9d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-86fd1f1c-7c83-4d53-90a7-bd3320eee9d2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "18d3406b0a7a4d39a16154bd45a9d223", "name": "tempest-MigrateServerV225RbacTest-1341058279", "password_expires_at": null}, "audit_ids": ["Za0YTe8rTxKb9fC6soy68g"], "expires_at": "2020-12-14T03:15:10.000000Z", "issued_at": "2020-12-14T02:15:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "403869bab90a46d29a65a37723cddc04", "name": "tempest-MigrateServerV225RbacTest-1341058279"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:11.079 197 DEBUG tempest.lib.common.fixed_network [-] (MigrateServerV225RbacTest:test_migration_live) No valid network provided or created, defaulting to fixed_network_name get_tenant_network /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/fixed_network.py:102 2020-12-14 02:15:11.287 189 INFO tempest.lib.common.rest_client [req-89745cdf-b38e-4207-9f6b-37c9462c4f2f ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4 0.037s 2020-12-14 02:15:11.289 189 DEBUG tempest.lib.common.rest_client [req-89745cdf-b38e-4207-9f6b-37c9462c4f2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1351', 'content-type': 'application/json', 'x-openstack-request-id': 'req-89745cdf-b38e-4207-9f6b-37c9462c4f2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4'} Body: b'{"backup_type": "daily", "base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "backup", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-Backup-2102099998", "disk_format": "qcow2", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "3400d8caa66043d0b7fa128b68a28ecc", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "created_at": "2020-12-14T02:15:10Z", "updated_at": "2020-12-14T02:15:10Z", "tags": [], "self": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "file": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:11.289 193 INFO tempest.lib.common.rest_client [req-e771a3fd-af9c-41d9-8087-4a9d3a3365b7 ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 202 DELETE http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f/os-volume_attachments/7f147637-4985-4c74-b8e8-feea8431bcd8 0.311s 2020-12-14 02:15:11.293 193 DEBUG tempest.lib.common.rest_client [req-e771a3fd-af9c-41d9-8087-4a9d3a3365b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e771a3fd-af9c-41d9-8087-4a9d3a3365b7', 'x-compute-request-id': 'req-e771a3fd-af9c-41d9-8087-4a9d3a3365b7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f/os-volume_attachments/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:11.296 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:11.378 193 INFO tempest.lib.common.rest_client [req-ddb098e0-e1f9-4529-b47e-3929507f267c ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 200 GET http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles 0.076s 2020-12-14 02:15:11.382 193 DEBUG tempest.lib.common.rest_client [req-ddb098e0-e1f9-4529-b47e-3929507f267c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ddb098e0-e1f9-4529-b47e-3929507f267c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:11.432 193 INFO tempest.lib.common.rest_client [req-57ab63ac-04af-41bc-90d5-b0a9d6b743a7 ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:15:11.435 193 DEBUG tempest.lib.common.rest_client [req-57ab63ac-04af-41bc-90d5-b0a9d6b743a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57ab63ac-04af-41bc-90d5-b0a9d6b743a7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "57d9a7612ecf4fb8b34c79c101f93eb4", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585", "password_expires_at": null}, "audit_ids": ["MQJO6bkoQnWqeGDyt-03Gw"], "expires_at": "2020-12-14T03:15:11.000000Z", "issued_at": "2020-12-14T02:15:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6eaa7aebfbc3432bbcb4a961a888a31a", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:11.594 193 INFO tempest.lib.common.rest_client [req-0bf51a7e-735c-4388-9919-8924bb3b2633 ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.150s 2020-12-14 02:15:11.598 193 DEBUG tempest.lib.common.rest_client [req-0bf51a7e-735c-4388-9919-8924bb3b2633 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0bf51a7e-735c-4388-9919-8924bb3b2633', 'content-length': '1377', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0bf51a7e-735c-4388-9919-8924bb3b2633', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "detaching", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:11.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "attachment_id": "565fcb09-630c-49c3-92cf-121975307100", "volume_id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "server_id": "24795eb2-68c3-4190-b564-494fe69f731f", "host_name": "lf-virtual9", "device": "/dev/sdb", "attached_at": "2020-12-14T02:15:10.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:11.944 186 INFO tempest.lib.common.rest_client [req-97d83a22-6a46-4d78-96ac-a54f11674daa ] Request (ServerActionsV214RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8 0.146s 2020-12-14 02:15:11.947 186 DEBUG tempest.lib.common.rest_client [req-97d83a22-6a46-4d78-96ac-a54f11674daa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1689', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-97d83a22-6a46-4d78-96ac-a54f11674daa', 'x-compute-request-id': 'req-97d83a22-6a46-4d78-96ac-a54f11674daa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8'} Body: b'{"server": {"id": "188706d4-1c4f-4f60-8c0c-bffc803cc3a8", "name": "tempest-ServerActionsV214RbacTest-server-1017105635", "status": "ACTIVE", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "user_id": "9cd51d368197403da13a0eb5785c3256", "metadata": {}, "hostId": "5ac6bc40470859732b5f05e7845dbd53e1305f14251b3e871b013a1a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:00Z", "updated": "2020-12-14T02:15:11Z", "addresses": {"tempest-ServerActionsV214RbacTest-69276485-network": [{"version": 4, "addr": "192.168.120.12", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:78:a1:5a"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:07.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:12.342 189 INFO tempest.lib.common.rest_client [req-8014fe26-e920-4589-b9f3-9b5a087e55eb ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4 0.042s 2020-12-14 02:15:12.346 189 DEBUG tempest.lib.common.rest_client [req-8014fe26-e920-4589-b9f3-9b5a087e55eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1351', 'content-type': 'application/json', 'x-openstack-request-id': 'req-8014fe26-e920-4589-b9f3-9b5a087e55eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4'} Body: b'{"backup_type": "daily", "base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "backup", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-Backup-2102099998", "disk_format": "qcow2", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "3400d8caa66043d0b7fa128b68a28ecc", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "created_at": "2020-12-14T02:15:10Z", "updated_at": "2020-12-14T02:15:10Z", "tags": [], "self": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "file": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:12.782 193 INFO tempest.lib.common.rest_client [req-6905c4a6-d827-4607-9d45-82552957e502 ] Request (ServerVolumeAttachmentRbacTest:test_delete_volume_attachment): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.079s 2020-12-14 02:15:12.785 193 DEBUG tempest.lib.common.rest_client [req-6905c4a6-d827-4607-9d45-82552957e502 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6905c4a6-d827-4607-9d45-82552957e502', 'content-length': '1073', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6905c4a6-d827-4607-9d45-82552957e502', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:12.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:12.885 193 INFO tempest.common.waiters [-] volume 7f147637-4985-4c74-b8e8-feea8431bcd8 reached available after waiting for 1.884690 seconds 2020-12-14 02:15:12.971 193 INFO tempest.lib.common.rest_client [req-8bb133f8-94a2-44fd-b97d-4f95a4bb7d99 ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.077s 2020-12-14 02:15:12.975 193 DEBUG tempest.lib.common.rest_client [req-8bb133f8-94a2-44fd-b97d-4f95a4bb7d99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8bb133f8-94a2-44fd-b97d-4f95a4bb7d99', 'content-length': '1073', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8bb133f8-94a2-44fd-b97d-4f95a4bb7d99', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:12.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:13.132 186 INFO tempest.lib.common.rest_client [req-dac54119-c36c-4d99-84c9-adb77f1eed90 ] Request (ServerActionsV214RbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8 0.078s 2020-12-14 02:15:13.135 186 DEBUG tempest.lib.common.rest_client [req-dac54119-c36c-4d99-84c9-adb77f1eed90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-dac54119-c36c-4d99-84c9-adb77f1eed90', 'x-compute-request-id': 'req-dac54119-c36c-4d99-84c9-adb77f1eed90', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/188706d4-1c4f-4f60-8c0c-bffc803cc3a8'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 188706d4-1c4f-4f60-8c0c-bffc803cc3a8 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:13.138 186 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '4edfe25a-5ada-42db-9999-939648f21e45', 'name': 'tempest-ServerActionsV214RbacTest-69276485-network', 'tenant_id': '0983fbbd1c274f8fb9df502bcf4d10dc', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '0983fbbd1c274f8fb9df502bcf4d10dc', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 65, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:14:53Z', 'updated_at': '2020-12-14T02:14:53Z', 'revision_number': 1}, subnet: {'id': '94db8276-3e0d-40ba-b67c-7eeee41b1c3f', 'name': 'tempest-ServerActionsV214RbacTest-69276485-subnet', 'tenant_id': '0983fbbd1c274f8fb9df502bcf4d10dc', 'network_id': '4edfe25a-5ada-42db-9999-939648f21e45', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:53Z', 'updated_at': '2020-12-14T02:14:53Z', 'revision_number': 0, 'project_id': '0983fbbd1c274f8fb9df502bcf4d10dc'}, router: {'id': '19f0f175-de6d-4404-a2ff-59f154bba0a5', 'name': 'tempest-ServerActionsV214RbacTest-69276485-router', 'tenant_id': '0983fbbd1c274f8fb9df502bcf4d10dc', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.123'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::3f'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:54Z', 'updated_at': '2020-12-14T02:14:55Z', 'revision_number': 3, 'project_id': '0983fbbd1c274f8fb9df502bcf4d10dc'} _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:15:13.196 193 INFO tempest.lib.common.rest_client [req-a51f7657-17a3-4d7c-b795-e1c9bf04b658 ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.088s 2020-12-14 02:15:13.200 193 DEBUG tempest.lib.common.rest_client [req-a51f7657-17a3-4d7c-b795-e1c9bf04b658 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a51f7657-17a3-4d7c-b795-e1c9bf04b658', 'content-length': '1073', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a51f7657-17a3-4d7c-b795-e1c9bf04b658', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:12.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:13.301 193 INFO tempest.common.waiters [-] volume 7f147637-4985-4c74-b8e8-feea8431bcd8 reached available after waiting for 0.301113 seconds 2020-12-14 02:15:13.393 189 INFO tempest.lib.common.rest_client [req-fd1cf5ca-06e0-4254-9a28-d8616b500427 ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4 0.038s 2020-12-14 02:15:13.396 189 DEBUG tempest.lib.common.rest_client [req-fd1cf5ca-06e0-4254-9a28-d8616b500427 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1351', 'content-type': 'application/json', 'x-openstack-request-id': 'req-fd1cf5ca-06e0-4254-9a28-d8616b500427', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4'} Body: b'{"backup_type": "daily", "base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "backup", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-Backup-2102099998", "disk_format": "qcow2", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "3400d8caa66043d0b7fa128b68a28ecc", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "created_at": "2020-12-14T02:15:10Z", "updated_at": "2020-12-14T02:15:10Z", "tags": [], "self": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "file": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:13.424 193 INFO tempest.lib.common.rest_client [req-e0e44a51-e05c-4101-8697-3e1f025b40bd ] Request (ServerVolumeAttachmentRbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.079s 2020-12-14 02:15:13.427 193 DEBUG tempest.lib.common.rest_client [req-e0e44a51-e05c-4101-8697-3e1f025b40bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e0e44a51-e05c-4101-8697-3e1f025b40bd', 'content-length': '1073', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e0e44a51-e05c-4101-8697-3e1f025b40bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:12.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:13.520 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:13.525 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.529 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.533 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.536 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.540 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.543 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.548 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.551 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.553 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.556 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.559 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.562 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.565 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.567 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.570 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.574 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.576 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.579 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.582 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.585 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.588 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.591 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.594 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.596 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.599 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.602 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.605 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.607 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.610 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.613 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.616 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.618 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.621 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.624 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.626 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.629 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.632 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.634 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.637 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.641 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.643 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.646 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.649 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.652 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.655 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.657 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.660 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.663 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.665 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.668 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.671 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.674 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.676 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.679 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.683 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.685 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.691 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.694 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.696 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.700 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.702 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.705 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.708 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.710 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.712 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.715 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.716 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.718 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.720 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.722 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.724 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:13.732 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes-attachments:index, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:13.734 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:13.789 193 INFO tempest.lib.common.rest_client [req-61d34a0c-18ba-47b4-ac91-9fcd5c703f0c ] Request (ServerVolumeAttachmentRbacTest:test_list_volume_attachments): 200 GET http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles 0.050s 2020-12-14 02:15:13.792 193 DEBUG tempest.lib.common.rest_client [req-61d34a0c-18ba-47b4-ac91-9fcd5c703f0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61d34a0c-18ba-47b4-ac91-9fcd5c703f0c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:13.840 193 INFO tempest.lib.common.rest_client [req-8333f247-26ef-44ce-8f4d-e0f476525724 ] Request (ServerVolumeAttachmentRbacTest:test_list_volume_attachments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:15:13.844 193 DEBUG tempest.lib.common.rest_client [req-8333f247-26ef-44ce-8f4d-e0f476525724 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8333f247-26ef-44ce-8f4d-e0f476525724', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "57d9a7612ecf4fb8b34c79c101f93eb4", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585", "password_expires_at": null}, "audit_ids": ["p-a5PRrpRu-87S5w5KBt8g"], "expires_at": "2020-12-14T03:15:13.000000Z", "issued_at": "2020-12-14T02:15:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6eaa7aebfbc3432bbcb4a961a888a31a", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:13.990 193 INFO tempest.lib.common.rest_client [req-700cf504-15f9-467b-9691-f12267e665f1 ] Request (ServerVolumeAttachmentRbacTest:test_list_volume_attachments): 200 GET http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f/os-volume_attachments 0.138s 2020-12-14 02:15:13.994 193 DEBUG tempest.lib.common.rest_client [req-700cf504-15f9-467b-9691-f12267e665f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '25', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-700cf504-15f9-467b-9691-f12267e665f1', 'x-compute-request-id': 'req-700cf504-15f9-467b-9691-f12267e665f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f/os-volume_attachments'} Body: b'{"volumeAttachments": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:14.008 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:14.074 193 INFO tempest.lib.common.rest_client [req-04e91bde-ef1b-4ec5-975e-f786f68ca288 ] Request (ServerVolumeAttachmentRbacTest:test_list_volume_attachments): 200 GET http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles 0.061s 2020-12-14 02:15:14.077 193 DEBUG tempest.lib.common.rest_client [req-04e91bde-ef1b-4ec5-975e-f786f68ca288 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04e91bde-ef1b-4ec5-975e-f786f68ca288', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:14.130 193 INFO tempest.lib.common.rest_client [req-6f95279d-06a3-4885-aea5-b5d016b09f8d ] Request (ServerVolumeAttachmentRbacTest:test_list_volume_attachments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:15:14.133 193 DEBUG tempest.lib.common.rest_client [req-6f95279d-06a3-4885-aea5-b5d016b09f8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f95279d-06a3-4885-aea5-b5d016b09f8d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "57d9a7612ecf4fb8b34c79c101f93eb4", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585", "password_expires_at": null}, "audit_ids": ["S7olXOXCQ16A94oZYQ5lEA"], "expires_at": "2020-12-14T03:15:14.000000Z", "issued_at": "2020-12-14T02:15:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6eaa7aebfbc3432bbcb4a961a888a31a", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:14.297 193 INFO tempest.lib.common.rest_client [req-45952973-ecd9-4149-9b6f-e1de37b7f048 ] Request (ServerVolumeAttachmentRbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.137s 2020-12-14 02:15:14.300 193 DEBUG tempest.lib.common.rest_client [req-45952973-ecd9-4149-9b6f-e1de37b7f048 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-45952973-ecd9-4149-9b6f-e1de37b7f048', 'content-length': '1073', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-45952973-ecd9-4149-9b6f-e1de37b7f048', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:12.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:14.371 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:14.374 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.377 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.379 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.382 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.384 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.387 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.391 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.393 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.395 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.397 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.399 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.402 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.404 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.406 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.409 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.411 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.413 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.415 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.417 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.420 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.422 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.424 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.426 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.428 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.430 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.432 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.434 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.436 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.438 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.440 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.442 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.444 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.447 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.449 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.449 189 INFO tempest.lib.common.rest_client [req-83c51195-9cfd-4e96-9b54-1d975c8c98cd ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4 0.041s 2020-12-14 02:15:14.451 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.453 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.453 189 DEBUG tempest.lib.common.rest_client [req-83c51195-9cfd-4e96-9b54-1d975c8c98cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1455', 'content-type': 'application/json', 'x-openstack-request-id': 'req-83c51195-9cfd-4e96-9b54-1d975c8c98cd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4'} Body: b'{"backup_type": "daily", "base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "backup", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_id": "3400d8caa66043d0b7fa128b68a28ecc", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-Backup-2102099998", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "3400d8caa66043d0b7fa128b68a28ecc", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "created_at": "2020-12-14T02:15:10Z", "updated_at": "2020-12-14T02:15:14Z", "tags": [], "self": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "file": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:14.455 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.457 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.459 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.462 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.464 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.466 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.468 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.471 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.473 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.475 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.477 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.479 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.481 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.483 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.485 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.487 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.489 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.491 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.494 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.496 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.500 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.502 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.504 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.507 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.509 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.511 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.512 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.515 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.517 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.519 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.522 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.525 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.527 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.529 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.531 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:14.540 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes-attachments:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:14.995 193 INFO tempest.lib.common.rest_client [req-65cbd987-da0f-44a0-a688-b2dfc05fe17e ] Request (ServerVolumeAttachmentRbacTest:test_show_volume_attachment): 200 POST http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f/os-volume_attachments 0.448s 2020-12-14 02:15:14.998 193 DEBUG tempest.lib.common.rest_client [req-65cbd987-da0f-44a0-a688-b2dfc05fe17e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volumeAttachment": {"volumeId": "7f147637-4985-4c74-b8e8-feea8431bcd8"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-65cbd987-da0f-44a0-a688-b2dfc05fe17e', 'x-compute-request-id': 'req-65cbd987-da0f-44a0-a688-b2dfc05fe17e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f/os-volume_attachments'} Body: b'{"volumeAttachment": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "serverId": "24795eb2-68c3-4190-b564-494fe69f731f", "volumeId": "7f147637-4985-4c74-b8e8-feea8431bcd8", "device": "/dev/sdb"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:15.099 193 INFO tempest.lib.common.rest_client [req-a2db2ac1-deb6-4f03-a79e-a1599e403770 ] Request (ServerVolumeAttachmentRbacTest:test_show_volume_attachment): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.082s 2020-12-14 02:15:15.102 193 DEBUG tempest.lib.common.rest_client [req-a2db2ac1-deb6-4f03-a79e-a1599e403770 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a2db2ac1-deb6-4f03-a79e-a1599e403770', 'content-length': '1072', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a2db2ac1-deb6-4f03-a79e-a1599e403770', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "reserved", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:15.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:15.502 189 INFO tempest.lib.common.rest_client [req-4144d15a-e87b-4d18-ac94-db0ff6be2cc5 ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4 0.038s 2020-12-14 02:15:15.505 189 DEBUG tempest.lib.common.rest_client [req-4144d15a-e87b-4d18-ac94-db0ff6be2cc5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1455', 'content-type': 'application/json', 'x-openstack-request-id': 'req-4144d15a-e87b-4d18-ac94-db0ff6be2cc5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4'} Body: b'{"backup_type": "daily", "base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "backup", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_id": "3400d8caa66043d0b7fa128b68a28ecc", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-Backup-2102099998", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "3400d8caa66043d0b7fa128b68a28ecc", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "created_at": "2020-12-14T02:15:10Z", "updated_at": "2020-12-14T02:15:14Z", "tags": [], "self": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "file": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:16.302 193 INFO tempest.lib.common.rest_client [req-f600deda-eef9-48f0-bdd5-3b02fcdff57b ] Request (ServerVolumeAttachmentRbacTest:test_show_volume_attachment): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.098s 2020-12-14 02:15:16.305 193 DEBUG tempest.lib.common.rest_client [req-f600deda-eef9-48f0-bdd5-3b02fcdff57b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f600deda-eef9-48f0-bdd5-3b02fcdff57b', 'content-length': '1374', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f600deda-eef9-48f0-bdd5-3b02fcdff57b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:16.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "attachment_id": "96525a3f-1dca-42b5-bfb0-46f2127ffc62", "volume_id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "server_id": "24795eb2-68c3-4190-b564-494fe69f731f", "host_name": "lf-virtual9", "device": "/dev/sdb", "attached_at": "2020-12-14T02:15:16.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:16.413 193 INFO tempest.common.waiters [-] volume 7f147637-4985-4c74-b8e8-feea8431bcd8 reached in-use after waiting for 1.412882 seconds 2020-12-14 02:15:16.415 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:16.440 197 INFO tempest.lib.common.rest_client [req-4fcb21eb-5c09-48af-809e-ae8818bdfd95 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94:9696/v2.0/networks 5.354s 2020-12-14 02:15:16.445 197 DEBUG tempest.lib.common.rest_client [req-4fcb21eb-5c09-48af-809e-ae8818bdfd95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '50689', 'x-openstack-request-id': 'req-4fcb21eb-5c09-48af-809e-ae8818bdfd95', 'date': 'Mon, 14 Dec 2020 02:15:16 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"networks":[{"id":"00ec2ac2-db01-4df5-be67-85a1a2cd2f4e","name":"tempest-ServerVolumeAttachmentRbacTest-184020563-network","tenant_id":"6eaa7aebfbc3432bbcb4a961a888a31a","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["8f8fefc9-0e33-4848-87ca-04c0450cb894"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:14:42Z","updated_at":"2020-12-14T02:14:42Z","revision_number":2,"project_id":"6eaa7aebfbc3432bbcb4a961a888a31a","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":29},{"id":"0271f828-506d-471c-80e1-655c753a8b19","name":"tempest-MultipleCreateTestJSON-190587910-network","tenant_id":"8324c3ca97db4ac59b569d6bbbcffa09","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["de943adb-63ef-40f8-8985-a23207d72968"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-05T13:01:36Z","updated_at":"2020-12-05T13:01:36Z","revision_number":2,"project_id":"8324c3ca97db4ac59b569d6bbbcffa09","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":32},{"id":"063503db-115b-4919-a9a6-1f3519d69592","name":"tempest-test-network--1200798417","tenant_id":"2cdd20738a884c61a2383ca16c2d69c9","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"availability_zone_hints":[],"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-13T11:20:01Z","updated_at":"2020-12-13T11:20:01Z","revision_number":1,"project_id":"2cdd20738a884c61a2383ca16c2d69c9","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":67},{"id":"09616387-dfe6-4d1f-9c5a-0be30adf60e8","name":"tempest-MultipleCreateTestJSON-1784355696-network","tenant_id":"aecfcc6a08a941db927cdcc1561d2427","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["a48a10af-d181-472e-ab9d-2b3defb56fad"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-05T13:09:23Z","updated_at":"2020-12-05T13:09:24Z","revision_number":2,"project_id":"aecfcc6a08a941db927cdcc1561d2427","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":12},{"id":"0d133d7f-cfa3-406c-bf2e-9e2becbbe589","name":"tempest-MultipleCreateTestJSON-1880416163-network","tenant_id":"dc83be2a868748cc9397fd7cb6675c26","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["5f072df7-c9f6-4538-8ff5-cab14f8d28a9"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-22T15:50:51Z","updated_at":"2020-11-22T15:50:51Z","revision_number":2,"project_id":"dc83be2a868748cc9397fd7cb6675c26","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":16},{"id":"11e7deb5-beae-4249-9f34-285ba605afd2","name":"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f","tenant_id":"3cc32870ea9c4124a18f8824ceee8b29","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["410abf33-6f29-4217-ac80-d3f2fac8eea9"],"shared":true,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scop _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:16.461 197 INFO tempest.lib.common.fixed_network [-] (MigrateServerV225RbacTest:test_migration_live) Found network {'id': '11e7deb5-beae-4249-9f34-285ba605afd2', 'name': 'patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f', 'tenant_id': '3cc32870ea9c4124a18f8824ceee8b29', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': ['410abf33-6f29-4217-ac80-d3f2fac8eea9'], 'shared': True, 'availability_zone_hints': [], 'availability_zones': ['nova'], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'router:external': False, 'description': '', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:05:16Z', 'updated_at': '2020-12-14T02:05:17Z', 'revision_number': 2, 'project_id': '3cc32870ea9c4124a18f8824ceee8b29', 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 56} available for tenant 2020-12-14 02:15:16.541 193 INFO tempest.lib.common.rest_client [req-ffb6f402-82e0-432c-a7a5-5e164a256aa1 ] Request (ServerVolumeAttachmentRbacTest:test_show_volume_attachment): 200 GET http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles 0.118s 2020-12-14 02:15:16.545 193 DEBUG tempest.lib.common.rest_client [req-ffb6f402-82e0-432c-a7a5-5e164a256aa1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ffb6f402-82e0-432c-a7a5-5e164a256aa1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:16.559 189 INFO tempest.lib.common.rest_client [req-00cab009-5ac0-4cd2-a0ac-ce99ae0093f5 ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4 0.043s 2020-12-14 02:15:16.562 189 DEBUG tempest.lib.common.rest_client [req-00cab009-5ac0-4cd2-a0ac-ce99ae0093f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1455', 'content-type': 'application/json', 'x-openstack-request-id': 'req-00cab009-5ac0-4cd2-a0ac-ce99ae0093f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4'} Body: b'{"backup_type": "daily", "base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "backup", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_id": "3400d8caa66043d0b7fa128b68a28ecc", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-Backup-2102099998", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "3400d8caa66043d0b7fa128b68a28ecc", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "created_at": "2020-12-14T02:15:10Z", "updated_at": "2020-12-14T02:15:14Z", "tags": [], "self": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "file": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:16.597 193 INFO tempest.lib.common.rest_client [req-0c87c8e0-1f51-485b-a7c0-1de0fbf2a133 ] Request (ServerVolumeAttachmentRbacTest:test_show_volume_attachment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:15:16.601 193 DEBUG tempest.lib.common.rest_client [req-0c87c8e0-1f51-485b-a7c0-1de0fbf2a133 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c87c8e0-1f51-485b-a7c0-1de0fbf2a133', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "57d9a7612ecf4fb8b34c79c101f93eb4", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585", "password_expires_at": null}, "audit_ids": ["1FITTQYYTkiI7WSZafIzhA"], "expires_at": "2020-12-14T03:15:16.000000Z", "issued_at": "2020-12-14T02:15:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6eaa7aebfbc3432bbcb4a961a888a31a", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:16.764 193 INFO tempest.lib.common.rest_client [req-aaca47d5-264e-473e-aad9-8a5d3090fbd5 ] Request (ServerVolumeAttachmentRbacTest:test_show_volume_attachment): 200 GET http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f/os-volume_attachments/7f147637-4985-4c74-b8e8-feea8431bcd8 0.155s 2020-12-14 02:15:16.768 193 DEBUG tempest.lib.common.rest_client [req-aaca47d5-264e-473e-aad9-8a5d3090fbd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aaca47d5-264e-473e-aad9-8a5d3090fbd5', 'x-compute-request-id': 'req-aaca47d5-264e-473e-aad9-8a5d3090fbd5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f/os-volume_attachments/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volumeAttachment": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "volumeId": "7f147637-4985-4c74-b8e8-feea8431bcd8", "serverId": "24795eb2-68c3-4190-b564-494fe69f731f", "device": "/dev/sdb"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:16.789 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:16.859 193 INFO tempest.lib.common.rest_client [req-5a9e0946-7547-4d2a-a998-7ba251550d82 ] Request (ServerVolumeAttachmentRbacTest:test_show_volume_attachment): 200 GET http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles 0.064s 2020-12-14 02:15:16.863 193 DEBUG tempest.lib.common.rest_client [req-5a9e0946-7547-4d2a-a998-7ba251550d82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a9e0946-7547-4d2a-a998-7ba251550d82', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a/users/57d9a7612ecf4fb8b34c79c101f93eb4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:16.917 193 INFO tempest.lib.common.rest_client [req-fa490944-afd7-460a-917e-d9b5e9b63907 ] Request (ServerVolumeAttachmentRbacTest:test_show_volume_attachment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:15:16.921 193 DEBUG tempest.lib.common.rest_client [req-fa490944-afd7-460a-917e-d9b5e9b63907 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa490944-afd7-460a-917e-d9b5e9b63907', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "57d9a7612ecf4fb8b34c79c101f93eb4", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585", "password_expires_at": null}, "audit_ids": ["ZhPmFsz9QvqcNIl8Ql9ToA"], "expires_at": "2020-12-14T03:15:16.000000Z", "issued_at": "2020-12-14T02:15:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6eaa7aebfbc3432bbcb4a961a888a31a", "name": "tempest-ServerVolumeAttachmentRbacTest-823488585"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6eaa7aebfbc3432bbcb4a961a888a31a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:17.078 193 INFO tempest.lib.common.rest_client [req-5c99006f-b8ca-4e8b-8f24-f04d2f4e1008 ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.147s 2020-12-14 02:15:17.082 193 DEBUG tempest.lib.common.rest_client [req-5c99006f-b8ca-4e8b-8f24-f04d2f4e1008 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5c99006f-b8ca-4e8b-8f24-f04d2f4e1008', 'content-length': '1374', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5c99006f-b8ca-4e8b-8f24-f04d2f4e1008', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:16.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "attachment_id": "96525a3f-1dca-42b5-bfb0-46f2127ffc62", "volume_id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "server_id": "24795eb2-68c3-4190-b564-494fe69f731f", "host_name": "lf-virtual9", "device": "/dev/sdb", "attached_at": "2020-12-14T02:15:16.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:17.143 197 INFO tempest.lib.common.rest_client [req-46bfb0b8-3fde-4dc3-b6fa-a879c82d8fb1 ] Request (MigrateServerV225RbacTest:test_migration_live): 202 POST http://172.30.13.94/compute/v2.1/servers 0.673s 2020-12-14 02:15:17.146 197 DEBUG tempest.lib.common.rest_client [req-46bfb0b8-3fde-4dc3-b6fa-a879c82d8fb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-MigrateServerV225RbacTest-server-779295718", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "11e7deb5-beae-4249-9f34-285ba605afd2"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-46bfb0b8-3fde-4dc3-b6fa-a879c82d8fb1', 'x-compute-request-id': 'req-46bfb0b8-3fde-4dc3-b6fa-a879c82d8fb1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "8Lefwtpv94HQ"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:17.301 197 INFO tempest.lib.common.rest_client [req-21d2ddde-0314-4558-86e9-637a43da73a5 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.124s 2020-12-14 02:15:17.304 197 DEBUG tempest.lib.common.rest_client [req-21d2ddde-0314-4558-86e9-637a43da73a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1766', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-21d2ddde-0314-4558-86e9-637a43da73a5', 'x-compute-request-id': 'req-21d2ddde-0314-4558-86e9-637a43da73a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "BUILD", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:17Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": null, "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:17.498 193 INFO tempest.lib.common.rest_client [req-d8d1d9e1-4adc-471c-9298-24fd71f386c9 ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f/os-volume_attachments/7f147637-4985-4c74-b8e8-feea8431bcd8 0.312s 2020-12-14 02:15:17.501 193 DEBUG tempest.lib.common.rest_client [req-d8d1d9e1-4adc-471c-9298-24fd71f386c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d8d1d9e1-4adc-471c-9298-24fd71f386c9', 'x-compute-request-id': 'req-d8d1d9e1-4adc-471c-9298-24fd71f386c9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f/os-volume_attachments/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:17.643 193 INFO tempest.lib.common.rest_client [req-6ed5f156-738f-4474-8e68-0b3c1a9aac71 ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.134s 2020-12-14 02:15:17.647 193 DEBUG tempest.lib.common.rest_client [req-6ed5f156-738f-4474-8e68-0b3c1a9aac71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6ed5f156-738f-4474-8e68-0b3c1a9aac71', 'content-length': '1377', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6ed5f156-738f-4474-8e68-0b3c1a9aac71', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "detaching", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:17.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "attachment_id": "96525a3f-1dca-42b5-bfb0-46f2127ffc62", "volume_id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "server_id": "24795eb2-68c3-4190-b564-494fe69f731f", "host_name": "lf-virtual9", "device": "/dev/sdb", "attached_at": "2020-12-14T02:15:16.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:17.705 189 INFO tempest.lib.common.rest_client [req-23295ade-bd64-40db-abfc-91604f8353af ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4 0.133s 2020-12-14 02:15:17.709 189 DEBUG tempest.lib.common.rest_client [req-23295ade-bd64-40db-abfc-91604f8353af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1455', 'content-type': 'application/json', 'x-openstack-request-id': 'req-23295ade-bd64-40db-abfc-91604f8353af', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4'} Body: b'{"backup_type": "daily", "base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "backup", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_id": "3400d8caa66043d0b7fa128b68a28ecc", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-Backup-2102099998", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "3400d8caa66043d0b7fa128b68a28ecc", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "created_at": "2020-12-14T02:15:10Z", "updated_at": "2020-12-14T02:15:14Z", "tags": [], "self": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "file": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:18.634 197 INFO tempest.lib.common.rest_client [req-41bd508f-4ae5-49a9-9b68-f432af1f8f7e ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.203s 2020-12-14 02:15:18.637 197 DEBUG tempest.lib.common.rest_client [req-41bd508f-4ae5-49a9-9b68-f432af1f8f7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1867', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-41bd508f-4ae5-49a9-9b68-f432af1f8f7e', 'x-compute-request-id': 'req-41bd508f-4ae5-49a9-9b68-f432af1f8f7e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "BUILD", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:18Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:18.759 197 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/spawning" after 1 second wait 2020-12-14 02:15:18.772 189 INFO tempest.lib.common.rest_client [req-e350c1cf-69aa-4dc6-b071-97147b505d93 ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4 0.052s 2020-12-14 02:15:18.775 189 DEBUG tempest.lib.common.rest_client [req-e350c1cf-69aa-4dc6-b071-97147b505d93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1455', 'content-type': 'application/json', 'x-openstack-request-id': 'req-e350c1cf-69aa-4dc6-b071-97147b505d93', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4'} Body: b'{"backup_type": "daily", "base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "backup", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_id": "3400d8caa66043d0b7fa128b68a28ecc", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-Backup-2102099998", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "3400d8caa66043d0b7fa128b68a28ecc", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "created_at": "2020-12-14T02:15:10Z", "updated_at": "2020-12-14T02:15:14Z", "tags": [], "self": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "file": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:18.847 193 INFO tempest.lib.common.rest_client [req-9f1463f9-762e-4e23-82b6-211664663c04 ] Request (ServerVolumeAttachmentRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.079s 2020-12-14 02:15:18.851 193 DEBUG tempest.lib.common.rest_client [req-9f1463f9-762e-4e23-82b6-211664663c04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9f1463f9-762e-4e23-82b6-211664663c04', 'content-length': '1073', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9f1463f9-762e-4e23-82b6-211664663c04', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:18.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:18.950 193 INFO tempest.common.waiters [-] volume 7f147637-4985-4c74-b8e8-feea8431bcd8 reached available after waiting for 1.949977 seconds 2020-12-14 02:15:19.089 193 INFO tempest.lib.common.rest_client [req-c95eead7-7a0d-499a-8234-9ad9302c6010 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.091s 2020-12-14 02:15:19.092 193 DEBUG tempest.lib.common.rest_client [req-c95eead7-7a0d-499a-8234-9ad9302c6010 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c95eead7-7a0d-499a-8234-9ad9302c6010', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:19.198 193 INFO tempest.lib.common.rest_client [req-ce8ae32d-4403-494f-88a9-0a82b4117f3b ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.099s 2020-12-14 02:15:19.201 193 DEBUG tempest.lib.common.rest_client [req-ce8ae32d-4403-494f-88a9-0a82b4117f3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ce8ae32d-4403-494f-88a9-0a82b4117f3b', 'content-length': '1072', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ce8ae32d-4403-494f-88a9-0a82b4117f3b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"volume": {"id": "7f147637-4985-4c74-b8e8-feea8431bcd8", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:02.000000", "updated_at": "2020-12-14T02:15:19.000000", "name": "tempest-ServerVolumeAttachmentRbacTest-volume-254451220", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8"}], "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:19.819 189 INFO tempest.lib.common.rest_client [req-1e95fcc3-9337-497a-86ab-d3ea22420b91 ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4 0.035s 2020-12-14 02:15:19.823 189 DEBUG tempest.lib.common.rest_client [req-1e95fcc3-9337-497a-86ab-d3ea22420b91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1455', 'content-type': 'application/json', 'x-openstack-request-id': 'req-1e95fcc3-9337-497a-86ab-d3ea22420b91', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4'} Body: b'{"backup_type": "daily", "base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "backup", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_id": "3400d8caa66043d0b7fa128b68a28ecc", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-Backup-2102099998", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "3400d8caa66043d0b7fa128b68a28ecc", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "created_at": "2020-12-14T02:15:10Z", "updated_at": "2020-12-14T02:15:14Z", "tags": [], "self": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "file": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:20.249 197 INFO tempest.lib.common.rest_client [req-275b318a-0761-4584-94bb-6a67e8441085 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.480s 2020-12-14 02:15:20.253 197 DEBUG tempest.lib.common.rest_client [req-275b318a-0761-4584-94bb-6a67e8441085 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1909', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-275b318a-0761-4584-94bb-6a67e8441085', 'x-compute-request-id': 'req-275b318a-0761-4584-94bb-6a67e8441085', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "BUILD", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:18Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:20.355 193 INFO tempest.lib.common.rest_client [req-743065e7-39db-4992-a19a-a286983b5ffc ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8 0.054s 2020-12-14 02:15:20.357 193 DEBUG tempest.lib.common.rest_client [req-743065e7-39db-4992-a19a-a286983b5ffc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-743065e7-39db-4992-a19a-a286983b5ffc', 'x-openstack-request-id': 'req-743065e7-39db-4992-a19a-a286983b5ffc', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/6eaa7aebfbc3432bbcb4a961a888a31a/volumes/7f147637-4985-4c74-b8e8-feea8431bcd8'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 7f147637-4985-4c74-b8e8-feea8431bcd8 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:20.555 193 INFO tempest.lib.common.rest_client [req-7d6ddf0a-83ce-4005-a7e6-6fda68f70052 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f 0.190s 2020-12-14 02:15:20.558 193 DEBUG tempest.lib.common.rest_client [req-7d6ddf0a-83ce-4005-a7e6-6fda68f70052 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7d6ddf0a-83ce-4005-a7e6-6fda68f70052', 'x-compute-request-id': 'req-7d6ddf0a-83ce-4005-a7e6-6fda68f70052', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:20.815 193 INFO tempest.lib.common.rest_client [req-53c2de0a-fc60-44d5-b581-b769a9331493 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f 0.249s 2020-12-14 02:15:20.818 193 DEBUG tempest.lib.common.rest_client [req-53c2de0a-fc60-44d5-b581-b769a9331493 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1741', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-53c2de0a-fc60-44d5-b581-b769a9331493', 'x-compute-request-id': 'req-53c2de0a-fc60-44d5-b581-b769a9331493', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f'} Body: b'{"server": {"id": "24795eb2-68c3-4190-b564-494fe69f731f", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1834788050", "status": "ACTIVE", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "metadata": {}, "hostId": "ae18e3c318546a04a62c3c72d4975d4148b06c398cd0f19cef05659a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:52Z", "updated": "2020-12-14T02:15:20Z", "addresses": {"tempest-ServerVolumeAttachmentRbacTest-184020563-network": [{"version": 4, "addr": "192.168.120.9", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:b3:f9:c6"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/24795eb2-68c3-4190-b564-494fe69f731f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:20.874 189 INFO tempest.lib.common.rest_client [req-f399bc0d-f4be-41d7-bc5c-ba29200d5e0c ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4 0.041s 2020-12-14 02:15:20.878 189 DEBUG tempest.lib.common.rest_client [req-f399bc0d-f4be-41d7-bc5c-ba29200d5e0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1455', 'content-type': 'application/json', 'x-openstack-request-id': 'req-f399bc0d-f4be-41d7-bc5c-ba29200d5e0c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4'} Body: b'{"backup_type": "daily", "base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "backup", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_id": "3400d8caa66043d0b7fa128b68a28ecc", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-Backup-2102099998", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 1, "owner": "3400d8caa66043d0b7fa128b68a28ecc", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "created_at": "2020-12-14T02:15:10Z", "updated_at": "2020-12-14T02:15:14Z", "tags": [], "self": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "file": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:21.156 186 INFO tempest.lib.common.rest_client [req-b4dbdf84-dd02-407b-af1f-171f1e5f250d ] Request (ServerActionsV214RbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/19f0f175-de6d-4404-a2ff-59f154bba0a5/remove_router_interface 8.009s 2020-12-14 02:15:21.160 186 DEBUG tempest.lib.common.rest_client [req-b4dbdf84-dd02-407b-af1f-171f1e5f250d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "94db8276-3e0d-40ba-b67c-7eeee41b1c3f"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-b4dbdf84-dd02-407b-af1f-171f1e5f250d', 'date': 'Mon, 14 Dec 2020 02:15:21 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/19f0f175-de6d-4404-a2ff-59f154bba0a5/remove_router_interface'} Body: b'{"id": "19f0f175-de6d-4404-a2ff-59f154bba0a5", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "port_id": "45476355-4681-4ce1-b707-58c2cfaeb6c5", "network_id": "4edfe25a-5ada-42db-9999-939648f21e45", "subnet_id": "94db8276-3e0d-40ba-b67c-7eeee41b1c3f", "subnet_ids": ["94db8276-3e0d-40ba-b67c-7eeee41b1c3f"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:21.818 197 INFO tempest.lib.common.rest_client [req-7b90ec0c-55a0-4981-8092-e8eaf578dcda ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.430s 2020-12-14 02:15:21.821 197 DEBUG tempest.lib.common.rest_client [req-7b90ec0c-55a0-4981-8092-e8eaf578dcda ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1909', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7b90ec0c-55a0-4981-8092-e8eaf578dcda', 'x-compute-request-id': 'req-7b90ec0c-55a0-4981-8092-e8eaf578dcda', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "BUILD", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:18Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:21.926 189 INFO tempest.lib.common.rest_client [req-060a1fe0-c953-4e8e-9b87-4cb749fe1093 ] Request (ServerActionsRbacTest:test_create_backup): 200 GET http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4 0.040s 2020-12-14 02:15:21.929 189 DEBUG tempest.lib.common.rest_client [req-060a1fe0-c953-4e8e-9b87-4cb749fe1093 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1627', 'content-type': 'application/json', 'x-openstack-request-id': 'req-060a1fe0-c953-4e8e-9b87-4cb749fe1093', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4'} Body: b'{"backup_type": "daily", "base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "backup", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_id": "3400d8caa66043d0b7fa128b68a28ecc", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-Backup-2102099998", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": 1073741824, "virtual_size": 1073741824, "status": "active", "checksum": "44bd7b1174306bd812a85dc536769714", "protected": false, "min_ram": 0, "min_disk": 1, "owner": "3400d8caa66043d0b7fa128b68a28ecc", "os_hidden": false, "os_hash_algo": "sha512", "os_hash_value": "d0c4659588826ca8a5327ff83b86cc6fe929030c81c21467cbb5afc6f887333a21766427269d8aaec860a41ec9e27e6a9f12e9de39f4ce090bf503b31d090ba2", "id": "aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "created_at": "2020-12-14T02:15:10Z", "updated_at": "2020-12-14T02:15:22Z", "tags": [], "self": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4", "file": "/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:22.087 193 INFO tempest.lib.common.rest_client [req-89f85492-c51f-4e7e-bd69-ede7a1b5f776 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f 0.157s 2020-12-14 02:15:22.090 193 DEBUG tempest.lib.common.rest_client [req-89f85492-c51f-4e7e-bd69-ede7a1b5f776 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1699', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-89f85492-c51f-4e7e-bd69-ede7a1b5f776', 'x-compute-request-id': 'req-89f85492-c51f-4e7e-bd69-ede7a1b5f776', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f'} Body: b'{"server": {"id": "24795eb2-68c3-4190-b564-494fe69f731f", "name": "tempest-ServerVolumeAttachmentRbacTest-server-1834788050", "status": "ACTIVE", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "user_id": "57d9a7612ecf4fb8b34c79c101f93eb4", "metadata": {}, "hostId": "ae18e3c318546a04a62c3c72d4975d4148b06c398cd0f19cef05659a", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:52Z", "updated": "2020-12-14T02:15:21Z", "addresses": {"tempest-ServerVolumeAttachmentRbacTest-184020563-network": [{"version": 4, "addr": "192.168.120.9", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:b3:f9:c6"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/24795eb2-68c3-4190-b564-494fe69f731f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:01.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:22.353 189 INFO tempest.lib.common.rest_client [req-e65532b2-8a6d-4fe5-9e29-71de8a3c0c50 ] Request (ServerActionsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4 0.414s 2020-12-14 02:15:22.357 189 DEBUG tempest.lib.common.rest_client [req-e65532b2-8a6d-4fe5-9e29-71de8a3c0c50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-e65532b2-8a6d-4fe5-9e29-71de8a3c0c50', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/aab4cffe-54f0-4ca2-9db2-f62f4539fce4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:22.438 186 INFO tempest.lib.common.rest_client [req-757cb3a2-4b97-4d5a-b02e-d82a36789fbe ] Request (ServerActionsV214RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/19f0f175-de6d-4404-a2ff-59f154bba0a5 1.269s 2020-12-14 02:15:22.442 186 DEBUG tempest.lib.common.rest_client [req-757cb3a2-4b97-4d5a-b02e-d82a36789fbe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-757cb3a2-4b97-4d5a-b02e-d82a36789fbe', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:15:22 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/19f0f175-de6d-4404-a2ff-59f154bba0a5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:22.650 189 INFO tempest.lib.common.rest_client [req-c2d31f28-8229-4915-996b-eb9385502a59 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.232s 2020-12-14 02:15:22.654 189 DEBUG tempest.lib.common.rest_client [req-c2d31f28-8229-4915-996b-eb9385502a59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c2d31f28-8229-4915-996b-eb9385502a59', 'x-compute-request-id': 'req-c2d31f28-8229-4915-996b-eb9385502a59', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:22Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:22.766 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:22.771 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.774 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.777 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.780 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.784 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.788 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.793 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.796 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.798 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.801 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.804 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.807 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.810 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.813 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.816 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.819 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.822 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.825 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.827 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.830 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.833 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.836 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.838 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.841 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.844 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.847 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.849 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.852 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.855 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.857 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.860 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.863 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.864 186 INFO tempest.lib.common.rest_client [req-269bc899-5f8e-4e20-8ff0-2ede90b1b8b9 ] Request (ServerActionsV214RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/94db8276-3e0d-40ba-b67c-7eeee41b1c3f 0.416s 2020-12-14 02:15:22.865 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.866 186 DEBUG tempest.lib.common.rest_client [req-269bc899-5f8e-4e20-8ff0-2ede90b1b8b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-269bc899-5f8e-4e20-8ff0-2ede90b1b8b9', 'date': 'Mon, 14 Dec 2020 02:15:22 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/94db8276-3e0d-40ba-b67c-7eeee41b1c3f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:22.868 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.871 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.874 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.876 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.879 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.882 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.886 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.888 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.891 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.894 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.897 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.900 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.903 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.905 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.908 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.911 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.914 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.916 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.919 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.922 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.924 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.928 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.931 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.937 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.940 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.942 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.946 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.948 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.951 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.954 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.956 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.959 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.962 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.965 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.968 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.970 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.973 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.976 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:22.988 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:create_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:22.990 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:23.058 189 INFO tempest.lib.common.rest_client [req-f67cffb0-781c-432b-8ba8-42777de77ba8 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.061s 2020-12-14 02:15:23.061 189 DEBUG tempest.lib.common.rest_client [req-f67cffb0-781c-432b-8ba8-42777de77ba8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f67cffb0-781c-432b-8ba8-42777de77ba8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:23.109 189 INFO tempest.lib.common.rest_client [req-0c810a81-1e41-4886-bb5d-693f04aa271f ] Request (ServerActionsRbacTest:test_create_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:15:23.112 189 DEBUG tempest.lib.common.rest_client [req-0c810a81-1e41-4886-bb5d-693f04aa271f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c810a81-1e41-4886-bb5d-693f04aa271f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["bMm9zQC3T82x3_yKZ7nzfA"], "expires_at": "2020-12-14T03:15:23.000000Z", "issued_at": "2020-12-14T02:15:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:23.278 193 INFO tempest.lib.common.rest_client [req-84049d97-8500-4797-a493-1888145bf13a ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f 0.069s 2020-12-14 02:15:23.280 193 DEBUG tempest.lib.common.rest_client [req-84049d97-8500-4797-a493-1888145bf13a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-84049d97-8500-4797-a493-1888145bf13a', 'x-compute-request-id': 'req-84049d97-8500-4797-a493-1888145bf13a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/24795eb2-68c3-4190-b564-494fe69f731f'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 24795eb2-68c3-4190-b564-494fe69f731f could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:23.283 193 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '00ec2ac2-db01-4df5-be67-85a1a2cd2f4e', 'name': 'tempest-ServerVolumeAttachmentRbacTest-184020563-network', 'tenant_id': '6eaa7aebfbc3432bbcb4a961a888a31a', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '6eaa7aebfbc3432bbcb4a961a888a31a', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:14:42Z', 'updated_at': '2020-12-14T02:14:42Z', 'revision_number': 1}, subnet: {'id': '8f8fefc9-0e33-4848-87ca-04c0450cb894', 'name': 'tempest-ServerVolumeAttachmentRbacTest-184020563-subnet', 'tenant_id': '6eaa7aebfbc3432bbcb4a961a888a31a', 'network_id': '00ec2ac2-db01-4df5-be67-85a1a2cd2f4e', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:42Z', 'updated_at': '2020-12-14T02:14:42Z', 'revision_number': 0, 'project_id': '6eaa7aebfbc3432bbcb4a961a888a31a'}, router: {'id': 'f6ac1877-ad40-41a4-9ad7-524c74146b3c', 'name': 'tempest-ServerVolumeAttachmentRbacTest-184020563-router', 'tenant_id': '6eaa7aebfbc3432bbcb4a961a888a31a', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.92'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::1d1'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:43Z', 'updated_at': '2020-12-14T02:14:45Z', 'revision_number': 3, 'project_id': '6eaa7aebfbc3432bbcb4a961a888a31a'} _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:15:23.411 197 INFO tempest.lib.common.rest_client [req-925fc924-ec6b-4a0a-a0ba-85a5083c4b9c ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.460s 2020-12-14 02:15:23.414 197 DEBUG tempest.lib.common.rest_client [req-925fc924-ec6b-4a0a-a0ba-85a5083c4b9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1909', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-925fc924-ec6b-4a0a-a0ba-85a5083c4b9c', 'x-compute-request-id': 'req-925fc924-ec6b-4a0a-a0ba-85a5083c4b9c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "BUILD", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:18Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:23.484 189 INFO tempest.lib.common.rest_client [req-5cfc77fb-8a49-4c33-91b3-a8f63dbfc743 ] Request (ServerActionsRbacTest:test_create_image): 202 POST http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action 0.364s 2020-12-14 02:15:23.488 189 DEBUG tempest.lib.common.rest_client [req-5cfc77fb-8a49-4c33-91b3-a8f63dbfc743 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"createImage": {"name": "tempest-ServerActionsRbacTest-image-657774757"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'content-length': '0', 'location': 'http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5cfc77fb-8a49-4c33-91b3-a8f63dbfc743', 'x-compute-request-id': 'req-5cfc77fb-8a49-4c33-91b3-a8f63dbfc743', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:23.586 189 INFO tempest.lib.common.rest_client [req-6898ca89-13eb-41bf-bcd9-702dae238804 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.072s 2020-12-14 02:15:23.589 189 DEBUG tempest.lib.common.rest_client [req-6898ca89-13eb-41bf-bcd9-702dae238804 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1606', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6898ca89-13eb-41bf-bcd9-702dae238804', 'x-compute-request-id': 'req-6898ca89-13eb-41bf-bcd9-702dae238804', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:23Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:23.743 186 INFO tempest.lib.common.rest_client [req-8dac2787-d02f-446d-818b-2d189526cc2e ] Request (ServerActionsV214RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/4edfe25a-5ada-42db-9999-939648f21e45 0.871s 2020-12-14 02:15:23.745 186 DEBUG tempest.lib.common.rest_client [req-8dac2787-d02f-446d-818b-2d189526cc2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-8dac2787-d02f-446d-818b-2d189526cc2e', 'date': 'Mon, 14 Dec 2020 02:15:23 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/4edfe25a-5ada-42db-9999-939648f21e45'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:23.958 186 INFO tempest.lib.common.rest_client [req-11c0c36d-6dbd-4c50-8459-05792c209fe4 ] Request (ServerActionsV214RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/9cd51d368197403da13a0eb5785c3256 0.207s 2020-12-14 02:15:23.961 186 DEBUG tempest.lib.common.rest_client [req-11c0c36d-6dbd-4c50-8459-05792c209fe4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-11c0c36d-6dbd-4c50-8459-05792c209fe4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/9cd51d368197403da13a0eb5785c3256'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:24.041 186 INFO tempest.lib.common.rest_client [req-688b7f4b-50ea-4d5d-8c07-cf32a76c7080 ] Request (ServerActionsV214RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0983fbbd1c274f8fb9df502bcf4d10dc&name=default 0.073s 2020-12-14 02:15:24.043 186 DEBUG tempest.lib.common.rest_client [req-688b7f4b-50ea-4d5d-8c07-cf32a76c7080 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-688b7f4b-50ea-4d5d-8c07-cf32a76c7080', 'date': 'Mon, 14 Dec 2020 02:15:24 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0983fbbd1c274f8fb9df502bcf4d10dc&name=default'} Body: b'{"security_groups": [{"id": "3651575a-5c84-4b2d-81f5-4d3f1659fbe1", "name": "default", "stateful": true, "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "description": "Default security group", "security_group_rules": [{"id": "4312f0ea-d650-477a-8b42-aa48e6950bb1", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "security_group_id": "3651575a-5c84-4b2d-81f5-4d3f1659fbe1", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "3651575a-5c84-4b2d-81f5-4d3f1659fbe1", "description": null, "tags": [], "created_at": "2020-12-14T02:14:53Z", "updated_at": "2020-12-14T02:14:53Z", "revision_number": 0, "project_id": "0983fbbd1c274f8fb9df502bcf4d10dc"}, {"id": "58301dc0-de21-4dfa-bae2-a6243c85c659", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "security_group_id": "3651575a-5c84-4b2d-81f5-4d3f1659fbe1", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:53Z", "updated_at": "2020-12-14T02:14:53Z", "revision_number": 0, "project_id": "0983fbbd1c274f8fb9df502bcf4d10dc"}, {"id": "6a9baeef-72e8-427f-af3a-99022bd91fc6", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "security_group_id": "3651575a-5c84-4b2d-81f5-4d3f1659fbe1", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:53Z", "updated_at": "2020-12-14T02:14:53Z", "revision_number": 0, "project_id": "0983fbbd1c274f8fb9df502bcf4d10dc"}, {"id": "a9671fe0-909b-4aaf-9172-ac77cfc0daf7", "tenant_id": "0983fbbd1c274f8fb9df502bcf4d10dc", "security_group_id": "3651575a-5c84-4b2d-81f5-4d3f1659fbe1", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "3651575a-5c84-4b2d-81f5-4d3f1659fbe1", "description": null, "tags": [], "created_at": "2020-12-14T02:14:53Z", "updated_at": "2020-12-14T02:14:53Z", "revision_number": 0, "project_id": "0983fbbd1c274f8fb9df502bcf4d10dc"}], "tags": [], "created_at": "2020-12-14T02:14:52Z", "updated_at": "2020-12-14T02:14:53Z", "revision_number": 1, "project_id": "0983fbbd1c274f8fb9df502bcf4d10dc"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:24.247 186 INFO tempest.lib.common.rest_client [req-6802dbbf-468b-4d21-a2c3-6de23a554bf3 ] Request (ServerActionsV214RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/3651575a-5c84-4b2d-81f5-4d3f1659fbe1 0.197s 2020-12-14 02:15:24.250 186 DEBUG tempest.lib.common.rest_client [req-6802dbbf-468b-4d21-a2c3-6de23a554bf3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6802dbbf-468b-4d21-a2c3-6de23a554bf3', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:15:24 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/3651575a-5c84-4b2d-81f5-4d3f1659fbe1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:24.551 186 INFO tempest.lib.common.rest_client [req-9ecf396b-7bbf-4865-b3cd-d11e56636600 ] Request (ServerActionsV214RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc 0.294s 2020-12-14 02:15:24.553 186 DEBUG tempest.lib.common.rest_client [req-9ecf396b-7bbf-4865-b3cd-d11e56636600 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ecf396b-7bbf-4865-b3cd-d11e56636600', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0983fbbd1c274f8fb9df502bcf4d10dc'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:24.691 186 INFO tempest.lib.common.rest_client [req-76e7305a-9553-41bb-a1e4-a55232f60662 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.119s 2020-12-14 02:15:24.693 186 DEBUG tempest.lib.common.rest_client [req-76e7305a-9553-41bb-a1e4-a55232f60662 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76e7305a-9553-41bb-a1e4-a55232f60662', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["MJUt419HQlSuTvBGa1dBCA"], "expires_at": "2020-12-14T03:15:24.000000Z", "issued_at": "2020-12-14T02:15:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:24.727 189 INFO tempest.lib.common.rest_client [req-0b4786ec-5d8c-44b3-9ec4-ff2947fa902b ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.085s 2020-12-14 02:15:24.730 189 DEBUG tempest.lib.common.rest_client [req-0b4786ec-5d8c-44b3-9ec4-ff2947fa902b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1606', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0b4786ec-5d8c-44b3-9ec4-ff2947fa902b', 'x-compute-request-id': 'req-0b4786ec-5d8c-44b3-9ec4-ff2947fa902b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:23Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:24.785 186 INFO tempest.lib.common.rest_client [req-dd0051e2-8b45-4650-bd51-d07ab200069e ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:15:24.787 186 DEBUG tempest.lib.common.rest_client [req-dd0051e2-8b45-4650-bd51-d07ab200069e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dd0051e2-8b45-4650-bd51-d07ab200069e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["yFnvAS6ORfmCgEKlSSxL7w"], "expires_at": "2020-12-14T03:15:24.000000Z", "issued_at": "2020-12-14T02:15:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:24.804 197 INFO tempest.lib.common.rest_client [req-c8265830-ca8f-4ea6-b48a-a1396ff2acc0 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.260s 2020-12-14 02:15:24.808 197 DEBUG tempest.lib.common.rest_client [req-c8265830-ca8f-4ea6-b48a-a1396ff2acc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2103', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c8265830-ca8f-4ea6-b48a-a1396ff2acc0', 'x-compute-request-id': 'req-c8265830-ca8f-4ea6-b48a-a1396ff2acc0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "ACTIVE", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:24Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:24.856 186 INFO tempest.lib.common.rest_client [req-06773c8c-b48f-4ed6-b10b-9efe42742b0d ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.062s 2020-12-14 02:15:24.859 186 DEBUG tempest.lib.common.rest_client [req-06773c8c-b48f-4ed6-b10b-9efe42742b0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06773c8c-b48f-4ed6-b10b-9efe42742b0d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:24.932 197 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 7 second wait 2020-12-14 02:15:24.989 186 INFO tempest.lib.common.rest_client [req-7345bffb-eb0a-49e8-aaa4-fe16d046dbca ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.123s 2020-12-14 02:15:24.991 186 DEBUG tempest.lib.common.rest_client [req-7345bffb-eb0a-49e8-aaa4-fe16d046dbca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerConsolesMaxV25RbacTest-444671140-desc", "domain_id": "default", "name": "tempest-ServerConsolesMaxV25RbacTest-444671140"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '392', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7345bffb-eb0a-49e8-aaa4-fe16d046dbca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "fd3f735a47fe4d66819714d36cf3c2bf", "name": "tempest-ServerConsolesMaxV25RbacTest-444671140", "domain_id": "default", "description": "tempest-ServerConsolesMaxV25RbacTest-444671140-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:25.111 186 INFO tempest.lib.common.rest_client [req-96a170e8-2122-433b-8824-df2ff86acfef ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.113s 2020-12-14 02:15:25.113 186 DEBUG tempest.lib.common.rest_client [req-96a170e8-2122-433b-8824-df2ff86acfef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerConsolesMaxV25RbacTest-444671140", "password": "P5@xhYa%F+jkOpN", "project_id": "fd3f735a47fe4d66819714d36cf3c2bf", "email": "tempest-ServerConsolesMaxV25RbacTest-1588758819@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96a170e8-2122-433b-8824-df2ff86acfef', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "fd3f735a47fe4d66819714d36cf3c2bf", "email": "tempest-ServerConsolesMaxV25RbacTest-1588758819@example.com", "id": "8da8a5505dcc4795bb2077f3dffc9316", "name": "tempest-ServerConsolesMaxV25RbacTest-444671140", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/8da8a5505dcc4795bb2077f3dffc9316"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:25.177 186 INFO tempest.lib.common.rest_client [req-0beb2d9c-cfcb-4779-a8bd-012f72af12f7 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:15:25.180 186 DEBUG tempest.lib.common.rest_client [req-0beb2d9c-cfcb-4779-a8bd-012f72af12f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0beb2d9c-cfcb-4779-a8bd-012f72af12f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:25.245 186 INFO tempest.lib.common.rest_client [req-3bc466ab-beb3-4d7c-9598-17f1767940e5 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:15:25.248 186 DEBUG tempest.lib.common.rest_client [req-3bc466ab-beb3-4d7c-9598-17f1767940e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3bc466ab-beb3-4d7c-9598-17f1767940e5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:25.283 197 INFO tempest.lib.common.rest_client [req-dfc41409-33c1-437a-93c3-dcb233fc9349 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.343s 2020-12-14 02:15:25.286 197 DEBUG tempest.lib.common.rest_client [req-dfc41409-33c1-437a-93c3-dcb233fc9349 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2103', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dfc41409-33c1-437a-93c3-dcb233fc9349', 'x-compute-request-id': 'req-dfc41409-33c1-437a-93c3-dcb233fc9349', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "ACTIVE", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:24Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:25.324 186 INFO tempest.lib.common.rest_client [req-a6412f06-aa57-4a46-9f10-63c11d8015e8 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf/users/8da8a5505dcc4795bb2077f3dffc9316/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-12-14 02:15:25.327 186 DEBUG tempest.lib.common.rest_client [req-a6412f06-aa57-4a46-9f10-63c11d8015e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a6412f06-aa57-4a46-9f10-63c11d8015e8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf/users/8da8a5505dcc4795bb2077f3dffc9316/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:25.330 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerConsolesMaxV25RbacTest-444671140', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'fd3f735a47fe4d66819714d36cf3c2bf', 'project_name': 'tempest-ServerConsolesMaxV25RbacTest-444671140', 'tenant_id': 'fd3f735a47fe4d66819714d36cf3c2bf', 'tenant_name': 'tempest-ServerConsolesMaxV25RbacTest-444671140', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '8da8a5505dcc4795bb2077f3dffc9316'}, Network: None, Subnet: None, Router: None 2020-12-14 02:15:25.423 186 INFO tempest.lib.common.rest_client [req-467fe5a2-9a56-4ff9-ae89-aca767383575 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-12-14 02:15:25.426 186 DEBUG tempest.lib.common.rest_client [req-467fe5a2-9a56-4ff9-ae89-aca767383575 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-467fe5a2-9a56-4ff9-ae89-aca767383575', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["lVn32gAjTey68kEn_mzlbQ"], "expires_at": "2020-12-14T03:15:25.000000Z", "issued_at": "2020-12-14T02:15:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:25.479 197 INFO tempest.lib.common.rest_client [req-750862ea-40e4-4c67-b38b-9dd5880a1519 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/os-hosts 0.064s 2020-12-14 02:15:25.482 197 DEBUG tempest.lib.common.rest_client [req-750862ea-40e4-4c67-b38b-9dd5880a1519 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '369', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-750862ea-40e4-4c67-b38b-9dd5880a1519', 'x-compute-request-id': 'req-750862ea-40e4-4c67-b38b-9dd5880a1519', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hosts'} Body: b'{"hosts": [{"host_name": "lf-virtual9", "service": "scheduler", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "conductor", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "conductor", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "compute", "zone": "nova"}, {"host_name": "lf-virtual8", "service": "compute", "zone": "nova"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:25.506 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:25.574 197 INFO tempest.lib.common.rest_client [req-9992d351-a812-4e06-b385-2fabdcc2d7d5 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles 0.061s 2020-12-14 02:15:25.577 197 DEBUG tempest.lib.common.rest_client [req-9992d351-a812-4e06-b385-2fabdcc2d7d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9992d351-a812-4e06-b385-2fabdcc2d7d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:25.639 193 INFO tempest.lib.common.rest_client [req-b00f1248-621c-41a7-8907-918b6038a817 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/f6ac1877-ad40-41a4-9ad7-524c74146b3c/remove_router_interface 2.349s 2020-12-14 02:15:25.643 193 DEBUG tempest.lib.common.rest_client [req-b00f1248-621c-41a7-8907-918b6038a817 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "8f8fefc9-0e33-4848-87ca-04c0450cb894"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-b00f1248-621c-41a7-8907-918b6038a817', 'date': 'Mon, 14 Dec 2020 02:15:25 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/f6ac1877-ad40-41a4-9ad7-524c74146b3c/remove_router_interface'} Body: b'{"id": "f6ac1877-ad40-41a4-9ad7-524c74146b3c", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "port_id": "6764d9b8-3589-479a-8346-d060f7920918", "network_id": "00ec2ac2-db01-4df5-be67-85a1a2cd2f4e", "subnet_id": "8f8fefc9-0e33-4848-87ca-04c0450cb894", "subnet_ids": ["8f8fefc9-0e33-4848-87ca-04c0450cb894"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:25.673 197 INFO tempest.lib.common.rest_client [req-f258e49c-251b-4dc1-a0bb-0c7452488318 ] Request (MigrateServerV225RbacTest:test_migration_live): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:15:25.677 197 DEBUG tempest.lib.common.rest_client [req-f258e49c-251b-4dc1-a0bb-0c7452488318 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f258e49c-251b-4dc1-a0bb-0c7452488318', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "18d3406b0a7a4d39a16154bd45a9d223", "name": "tempest-MigrateServerV225RbacTest-1341058279", "password_expires_at": null}, "audit_ids": ["YBFtVg0ITQW_mync6ZNmeQ"], "expires_at": "2020-12-14T03:15:25.000000Z", "issued_at": "2020-12-14T02:15:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "403869bab90a46d29a65a37723cddc04", "name": "tempest-MigrateServerV225RbacTest-1341058279"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:25.868 189 INFO tempest.lib.common.rest_client [req-38cf11de-34f8-4ee8-882d-e6d9e50fac10 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.082s 2020-12-14 02:15:25.871 189 DEBUG tempest.lib.common.rest_client [req-38cf11de-34f8-4ee8-882d-e6d9e50fac10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1606', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-38cf11de-34f8-4ee8-882d-e6d9e50fac10', 'x-compute-request-id': 'req-38cf11de-34f8-4ee8-882d-e6d9e50fac10', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:23Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:26.058 186 INFO tempest.lib.common.rest_client [req-7033d722-d05b-44d3-84db-b18e70ca4ad6 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.622s 2020-12-14 02:15:26.061 186 DEBUG tempest.lib.common.rest_client [req-7033d722-d05b-44d3-84db-b18e70ca4ad6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerConsolesMaxV25RbacTest-617886141-network", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf"}} Response - Headers: {'content-type': 'application/json', 'content-length': '743', 'x-openstack-request-id': 'req-7033d722-d05b-44d3-84db-b18e70ca4ad6', 'date': 'Mon, 14 Dec 2020 02:15:26 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"8add56e9-2f51-4160-a76e-c0cd82eb917a","name":"tempest-ServerConsolesMaxV25RbacTest-617886141-network","tenant_id":"fd3f735a47fe4d66819714d36cf3c2bf","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"fd3f735a47fe4d66819714d36cf3c2bf","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":65,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:15:25Z","updated_at":"2020-12-14T02:15:25Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:26.767 186 INFO tempest.lib.common.rest_client [req-2a253ac5-a01a-4e4f-9169-6d69c73249fe ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.698s 2020-12-14 02:15:26.769 186 DEBUG tempest.lib.common.rest_client [req-2a253ac5-a01a-4e4f-9169-6d69c73249fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "8add56e9-2f51-4160-a76e-c0cd82eb917a", "cidr": "192.168.120.0/28", "name": "tempest-ServerConsolesMaxV25RbacTest-617886141-subnet", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '715', 'x-openstack-request-id': 'req-2a253ac5-a01a-4e4f-9169-6d69c73249fe', 'date': 'Mon, 14 Dec 2020 02:15:26 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"0f6a0a10-fcec-4c1d-bfa6-c2aa14a7042f","name":"tempest-ServerConsolesMaxV25RbacTest-617886141-subnet","tenant_id":"fd3f735a47fe4d66819714d36cf3c2bf","network_id":"8add56e9-2f51-4160-a76e-c0cd82eb917a","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:15:26Z","updated_at":"2020-12-14T02:15:26Z","revision_number":0,"project_id":"fd3f735a47fe4d66819714d36cf3c2bf"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:26.876 193 INFO tempest.lib.common.rest_client [req-63ab6b6e-ca57-4b79-87dc-2231586b6cd4 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/f6ac1877-ad40-41a4-9ad7-524c74146b3c 1.223s 2020-12-14 02:15:26.880 193 DEBUG tempest.lib.common.rest_client [req-63ab6b6e-ca57-4b79-87dc-2231586b6cd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-63ab6b6e-ca57-4b79-87dc-2231586b6cd4', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:15:26 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/f6ac1877-ad40-41a4-9ad7-524c74146b3c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:26.997 189 INFO tempest.lib.common.rest_client [req-73f7af68-ddb1-45b1-8046-1a2e20f76451 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.070s 2020-12-14 02:15:27.001 189 DEBUG tempest.lib.common.rest_client [req-73f7af68-ddb1-45b1-8046-1a2e20f76451 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1606', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-73f7af68-ddb1-45b1-8046-1a2e20f76451', 'x-compute-request-id': 'req-73f7af68-ddb1-45b1-8046-1a2e20f76451', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:23Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:27.298 197 INFO tempest.lib.common.rest_client [req-2ce42770-a0d0-4591-8aa2-24971350f542 ] Request (MigrateServerV225RbacTest:test_migration_live): 202 POST http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4/action 1.611s 2020-12-14 02:15:27.301 197 DEBUG tempest.lib.common.rest_client [req-2ce42770-a0d0-4591-8aa2-24971350f542 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: {"os-migrateLive": {"host": "lf-virtual8", "block_migration": "auto"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2ce42770-a0d0-4591-8aa2-24971350f542', 'x-compute-request-id': 'req-2ce42770-a0d0-4591-8aa2-24971350f542', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:27.304 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:27.342 193 INFO tempest.lib.common.rest_client [req-3286a21f-b4d3-41ab-844a-5548ed436d86 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/8f8fefc9-0e33-4848-87ca-04c0450cb894 0.455s 2020-12-14 02:15:27.346 193 DEBUG tempest.lib.common.rest_client [req-3286a21f-b4d3-41ab-844a-5548ed436d86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-3286a21f-b4d3-41ab-844a-5548ed436d86', 'date': 'Mon, 14 Dec 2020 02:15:27 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/8f8fefc9-0e33-4848-87ca-04c0450cb894'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:27.382 197 INFO tempest.lib.common.rest_client [req-3f3c9c6e-0167-44bd-8ba9-9883892d4afd ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles 0.071s 2020-12-14 02:15:27.384 197 DEBUG tempest.lib.common.rest_client [req-3f3c9c6e-0167-44bd-8ba9-9883892d4afd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f3c9c6e-0167-44bd-8ba9-9883892d4afd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04/users/18d3406b0a7a4d39a16154bd45a9d223/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:27.436 197 INFO tempest.lib.common.rest_client [req-8e86bda9-4181-487f-9c53-d6d52c7c643a ] Request (MigrateServerV225RbacTest:test_migration_live): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:15:27.441 197 DEBUG tempest.lib.common.rest_client [req-8e86bda9-4181-487f-9c53-d6d52c7c643a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e86bda9-4181-487f-9c53-d6d52c7c643a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "18d3406b0a7a4d39a16154bd45a9d223", "name": "tempest-MigrateServerV225RbacTest-1341058279", "password_expires_at": null}, "audit_ids": ["oI0kLwG4SOCnqAoneDdZBg"], "expires_at": "2020-12-14T03:15:27.000000Z", "issued_at": "2020-12-14T02:15:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "403869bab90a46d29a65a37723cddc04", "name": "tempest-MigrateServerV225RbacTest-1341058279"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_403869bab90a46d29a65a37723cddc04", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:27.776 197 INFO tempest.lib.common.rest_client [req-11269a11-9f53-4363-a4e1-13bfb863aebf ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.327s 2020-12-14 02:15:27.779 197 DEBUG tempest.lib.common.rest_client [req-11269a11-9f53-4363-a4e1-13bfb863aebf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2113', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-11269a11-9f53-4363-a4e1-13bfb863aebf', 'x-compute-request-id': 'req-11269a11-9f53-4363-a4e1-13bfb863aebf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "MIGRATING", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:26Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:27.972 193 INFO tempest.lib.common.rest_client [req-12961d0b-0731-4bce-8504-98840fde17d4 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/00ec2ac2-db01-4df5-be67-85a1a2cd2f4e 0.617s 2020-12-14 02:15:27.975 193 DEBUG tempest.lib.common.rest_client [req-12961d0b-0731-4bce-8504-98840fde17d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-12961d0b-0731-4bce-8504-98840fde17d4', 'date': 'Mon, 14 Dec 2020 02:15:27 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/00ec2ac2-db01-4df5-be67-85a1a2cd2f4e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:28.129 193 INFO tempest.lib.common.rest_client [req-26920384-0f85-499d-b0ec-5805a73a4b64 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/57d9a7612ecf4fb8b34c79c101f93eb4 0.147s 2020-12-14 02:15:28.131 193 DEBUG tempest.lib.common.rest_client [req-26920384-0f85-499d-b0ec-5805a73a4b64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26920384-0f85-499d-b0ec-5805a73a4b64', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/57d9a7612ecf4fb8b34c79c101f93eb4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:28.141 189 INFO tempest.lib.common.rest_client [req-9eb881ff-58cd-4b81-9e76-e9ef288541c1 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.084s 2020-12-14 02:15:28.145 189 DEBUG tempest.lib.common.rest_client [req-9eb881ff-58cd-4b81-9e76-e9ef288541c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1606', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9eb881ff-58cd-4b81-9e76-e9ef288541c1', 'x-compute-request-id': 'req-9eb881ff-58cd-4b81-9e76-e9ef288541c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:23Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:28.201 193 INFO tempest.lib.common.rest_client [req-5026ab49-76dd-44a2-916f-8f31986bb258 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6eaa7aebfbc3432bbcb4a961a888a31a&name=default 0.063s 2020-12-14 02:15:28.203 193 DEBUG tempest.lib.common.rest_client [req-5026ab49-76dd-44a2-916f-8f31986bb258 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-5026ab49-76dd-44a2-916f-8f31986bb258', 'date': 'Mon, 14 Dec 2020 02:15:28 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6eaa7aebfbc3432bbcb4a961a888a31a&name=default'} Body: b'{"security_groups": [{"id": "4811c9cb-10e3-4b3f-85d5-0d7ea1e5c7d6", "name": "default", "stateful": true, "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "description": "Default security group", "security_group_rules": [{"id": "00ca681c-a11d-457a-9ce7-0a3f8b1ed670", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "security_group_id": "4811c9cb-10e3-4b3f-85d5-0d7ea1e5c7d6", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:41Z", "updated_at": "2020-12-14T02:14:41Z", "revision_number": 0, "project_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}, {"id": "55beb50e-e395-4090-a855-f098a1ee7950", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "security_group_id": "4811c9cb-10e3-4b3f-85d5-0d7ea1e5c7d6", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4811c9cb-10e3-4b3f-85d5-0d7ea1e5c7d6", "description": null, "tags": [], "created_at": "2020-12-14T02:14:41Z", "updated_at": "2020-12-14T02:14:41Z", "revision_number": 0, "project_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}, {"id": "7205d9f2-b793-4771-9d9a-09436622497b", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "security_group_id": "4811c9cb-10e3-4b3f-85d5-0d7ea1e5c7d6", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:41Z", "updated_at": "2020-12-14T02:14:41Z", "revision_number": 0, "project_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}, {"id": "b40e7056-0249-4f97-bbfd-0236787ade7e", "tenant_id": "6eaa7aebfbc3432bbcb4a961a888a31a", "security_group_id": "4811c9cb-10e3-4b3f-85d5-0d7ea1e5c7d6", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4811c9cb-10e3-4b3f-85d5-0d7ea1e5c7d6", "description": null, "tags": [], "created_at": "2020-12-14T02:14:41Z", "updated_at": "2020-12-14T02:14:41Z", "revision_number": 0, "project_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}], "tags": [], "created_at": "2020-12-14T02:14:41Z", "updated_at": "2020-12-14T02:14:41Z", "revision_number": 1, "project_id": "6eaa7aebfbc3432bbcb4a961a888a31a"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:28.224 186 INFO tempest.lib.common.rest_client [req-1f112b28-283e-481e-b860-6ae5bb3958a8 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.450s 2020-12-14 02:15:28.227 186 DEBUG tempest.lib.common.rest_client [req-1f112b28-283e-481e-b860-6ae5bb3958a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerConsolesMaxV25RbacTest-617886141-router", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '816', 'x-openstack-request-id': 'req-1f112b28-283e-481e-b860-6ae5bb3958a8', 'date': 'Mon, 14 Dec 2020 02:15:28 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "9656777b-26fd-4a7d-a956-fadaeb0fd22c", "name": "tempest-ServerConsolesMaxV25RbacTest-617886141-router", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.37"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::153"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:15:26Z", "updated_at": "2020-12-14T02:15:27Z", "revision_number": 3, "project_id": "fd3f735a47fe4d66819714d36cf3c2bf"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:28.337 193 INFO tempest.lib.common.rest_client [req-737ee65e-b51a-4fcf-abab-f089236675c0 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/4811c9cb-10e3-4b3f-85d5-0d7ea1e5c7d6 0.128s 2020-12-14 02:15:28.340 193 DEBUG tempest.lib.common.rest_client [req-737ee65e-b51a-4fcf-abab-f089236675c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-737ee65e-b51a-4fcf-abab-f089236675c0', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:15:28 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/4811c9cb-10e3-4b3f-85d5-0d7ea1e5c7d6'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:28.648 193 INFO tempest.lib.common.rest_client [req-edb819b5-a21e-4d59-a4dc-59d232ead155 ] Request (ServerVolumeAttachmentRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a 0.301s 2020-12-14 02:15:28.650 193 DEBUG tempest.lib.common.rest_client [req-edb819b5-a21e-4d59-a4dc-59d232ead155 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-edb819b5-a21e-4d59-a4dc-59d232ead155', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6eaa7aebfbc3432bbcb4a961a888a31a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:28.779 193 INFO tempest.lib.common.rest_client [req-5cd77989-e9fc-46fb-b190-44006161392a ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:15:28.782 193 DEBUG tempest.lib.common.rest_client [req-5cd77989-e9fc-46fb-b190-44006161392a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5cd77989-e9fc-46fb-b190-44006161392a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["wWWksMNxRkGnU0Tqjqq5iA"], "expires_at": "2020-12-14T03:15:28.000000Z", "issued_at": "2020-12-14T02:15:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:28.881 193 INFO tempest.lib.common.rest_client [req-42754457-c6f8-480a-8934-e2db6183ea2e ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:15:28.884 193 DEBUG tempest.lib.common.rest_client [req-42754457-c6f8-480a-8934-e2db6183ea2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42754457-c6f8-480a-8934-e2db6183ea2e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["pcgUnsVzS760ZxHXAGm30A"], "expires_at": "2020-12-14T03:15:28.000000Z", "issued_at": "2020-12-14T02:15:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:28.955 193 INFO tempest.lib.common.rest_client [req-d74cd8a9-48db-4fd5-ae0e-3ac9486478f1 ] Request (VirtualInterfacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.063s 2020-12-14 02:15:28.958 193 DEBUG tempest.lib.common.rest_client [req-d74cd8a9-48db-4fd5-ae0e-3ac9486478f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d74cd8a9-48db-4fd5-ae0e-3ac9486478f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:29.033 193 INFO tempest.lib.common.rest_client [req-af530c65-cd79-44ba-9a06-2e86b7950452 ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.066s 2020-12-14 02:15:29.035 193 DEBUG tempest.lib.common.rest_client [req-af530c65-cd79-44ba-9a06-2e86b7950452 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VirtualInterfacesRbacTest-824224035-desc", "domain_id": "default", "name": "tempest-VirtualInterfacesRbacTest-824224035"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af530c65-cd79-44ba-9a06-2e86b7950452', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "717ecfe7a9054975a0ebc5eb892e1195", "name": "tempest-VirtualInterfacesRbacTest-824224035", "domain_id": "default", "description": "tempest-VirtualInterfacesRbacTest-824224035-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/717ecfe7a9054975a0ebc5eb892e1195"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:29.167 193 INFO tempest.lib.common.rest_client [req-42bf8ce7-d2cf-4eb9-a5f8-955ea836ddc6 ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.121s 2020-12-14 02:15:29.170 193 DEBUG tempest.lib.common.rest_client [req-42bf8ce7-d2cf-4eb9-a5f8-955ea836ddc6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VirtualInterfacesRbacTest-824224035", "password": "P2_5!hIJL1p5rdQ", "project_id": "717ecfe7a9054975a0ebc5eb892e1195", "email": "tempest-VirtualInterfacesRbacTest-586503869@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '404', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42bf8ce7-d2cf-4eb9-a5f8-955ea836ddc6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "717ecfe7a9054975a0ebc5eb892e1195", "email": "tempest-VirtualInterfacesRbacTest-586503869@example.com", "id": "c06c9edd8e0a4608b34363e736bfb5f8", "name": "tempest-VirtualInterfacesRbacTest-824224035", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/c06c9edd8e0a4608b34363e736bfb5f8"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:29.171 197 INFO tempest.lib.common.rest_client [req-e0fb8a77-76c7-42df-ae53-ec554997551c ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.258s 2020-12-14 02:15:29.175 197 DEBUG tempest.lib.common.rest_client [req-e0fb8a77-76c7-42df-ae53-ec554997551c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2113', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e0fb8a77-76c7-42df-ae53-ec554997551c', 'x-compute-request-id': 'req-e0fb8a77-76c7-42df-ae53-ec554997551c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "MIGRATING", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:26Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:29.239 193 INFO tempest.lib.common.rest_client [req-bd5af5b5-cfe5-4b18-87ee-a8bb83831080 ] Request (VirtualInterfacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:15:29.241 193 DEBUG tempest.lib.common.rest_client [req-bd5af5b5-cfe5-4b18-87ee-a8bb83831080 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd5af5b5-cfe5-4b18-87ee-a8bb83831080', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:29.276 189 INFO tempest.lib.common.rest_client [req-8ae8a979-abf2-42c0-90b8-6f9829e31745 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.075s 2020-12-14 02:15:29.280 189 DEBUG tempest.lib.common.rest_client [req-8ae8a979-abf2-42c0-90b8-6f9829e31745 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1606', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8ae8a979-abf2-42c0-90b8-6f9829e31745', 'x-compute-request-id': 'req-8ae8a979-abf2-42c0-90b8-6f9829e31745', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:23Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:29.316 193 INFO tempest.lib.common.rest_client [req-3f8075f3-703a-4a07-8ce7-ff1b3424fc72 ] Request (VirtualInterfacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:15:29.320 193 DEBUG tempest.lib.common.rest_client [req-3f8075f3-703a-4a07-8ce7-ff1b3424fc72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f8075f3-703a-4a07-8ce7-ff1b3424fc72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:29.405 193 INFO tempest.lib.common.rest_client [req-f1f1d74a-1116-4466-9cd5-f071ca81e3ac ] Request (VirtualInterfacesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/717ecfe7a9054975a0ebc5eb892e1195/users/c06c9edd8e0a4608b34363e736bfb5f8/roles/72a4576c553448cd941b052c1ca0cf2d 0.077s 2020-12-14 02:15:29.409 193 DEBUG tempest.lib.common.rest_client [req-f1f1d74a-1116-4466-9cd5-f071ca81e3ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1f1d74a-1116-4466-9cd5-f071ca81e3ac', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/717ecfe7a9054975a0ebc5eb892e1195/users/c06c9edd8e0a4608b34363e736bfb5f8/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:29.411 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VirtualInterfacesRbacTest-824224035', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '717ecfe7a9054975a0ebc5eb892e1195', 'project_name': 'tempest-VirtualInterfacesRbacTest-824224035', 'tenant_id': '717ecfe7a9054975a0ebc5eb892e1195', 'tenant_name': 'tempest-VirtualInterfacesRbacTest-824224035', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c06c9edd8e0a4608b34363e736bfb5f8'}, Network: None, Subnet: None, Router: None 2020-12-14 02:15:29.510 193 INFO tempest.lib.common.rest_client [req-d86e4b5e-f152-401d-aefd-d045718d9b98 ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:15:29.512 193 DEBUG tempest.lib.common.rest_client [req-d86e4b5e-f152-401d-aefd-d045718d9b98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d86e4b5e-f152-401d-aefd-d045718d9b98', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["01u9h2OmSjyvLXQJX2M4JA"], "expires_at": "2020-12-14T03:15:29.000000Z", "issued_at": "2020-12-14T02:15:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:30.080 186 INFO tempest.lib.common.rest_client [req-a7913cc7-aa7d-49b7-875c-5fb9b7a8a4b5 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/9656777b-26fd-4a7d-a956-fadaeb0fd22c/add_router_interface 1.844s 2020-12-14 02:15:30.083 186 DEBUG tempest.lib.common.rest_client [req-a7913cc7-aa7d-49b7-875c-5fb9b7a8a4b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "0f6a0a10-fcec-4c1d-bfa6-c2aa14a7042f"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-a7913cc7-aa7d-49b7-875c-5fb9b7a8a4b5', 'date': 'Mon, 14 Dec 2020 02:15:30 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/9656777b-26fd-4a7d-a956-fadaeb0fd22c/add_router_interface'} Body: b'{"id": "9656777b-26fd-4a7d-a956-fadaeb0fd22c", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "port_id": "64568bdd-23e4-4eff-bdb9-11afd05e2720", "network_id": "8add56e9-2f51-4160-a76e-c0cd82eb917a", "subnet_id": "0f6a0a10-fcec-4c1d-bfa6-c2aa14a7042f", "subnet_ids": ["0f6a0a10-fcec-4c1d-bfa6-c2aa14a7042f"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:30.086 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerConsolesMaxV25RbacTest-444671140', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'fd3f735a47fe4d66819714d36cf3c2bf', 'project_name': 'tempest-ServerConsolesMaxV25RbacTest-444671140', 'tenant_id': 'fd3f735a47fe4d66819714d36cf3c2bf', 'tenant_name': 'tempest-ServerConsolesMaxV25RbacTest-444671140', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '8da8a5505dcc4795bb2077f3dffc9316'}, Network: {'id': '8add56e9-2f51-4160-a76e-c0cd82eb917a', 'name': 'tempest-ServerConsolesMaxV25RbacTest-617886141-network', 'tenant_id': 'fd3f735a47fe4d66819714d36cf3c2bf', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'fd3f735a47fe4d66819714d36cf3c2bf', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 65, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:15:25Z', 'updated_at': '2020-12-14T02:15:25Z', 'revision_number': 1}, Subnet: {'id': '0f6a0a10-fcec-4c1d-bfa6-c2aa14a7042f', 'name': 'tempest-ServerConsolesMaxV25RbacTest-617886141-subnet', 'tenant_id': 'fd3f735a47fe4d66819714d36cf3c2bf', 'network_id': '8add56e9-2f51-4160-a76e-c0cd82eb917a', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:15:26Z', 'updated_at': '2020-12-14T02:15:26Z', 'revision_number': 0, 'project_id': 'fd3f735a47fe4d66819714d36cf3c2bf'}, Router: {'id': '9656777b-26fd-4a7d-a956-fadaeb0fd22c', 'name': 'tempest-ServerConsolesMaxV25RbacTest-617886141-router', 'tenant_id': 'fd3f735a47fe4d66819714d36cf3c2bf', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.37'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::153'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:15:26Z', 'updated_at': '2020-12-14T02:15:27Z', 'revision_number': 3, 'project_id': 'fd3f735a47fe4d66819714d36cf3c2bf'} 2020-12-14 02:15:30.121 193 INFO tempest.lib.common.rest_client [req-e42ef858-b257-4ec6-9dbe-8e843332ca71 ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.600s 2020-12-14 02:15:30.125 193 DEBUG tempest.lib.common.rest_client [req-e42ef858-b257-4ec6-9dbe-8e843332ca71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-VirtualInterfacesRbacTest-657906573-network", "tenant_id": "717ecfe7a9054975a0ebc5eb892e1195"}} Response - Headers: {'content-type': 'application/json', 'content-length': '740', 'x-openstack-request-id': 'req-e42ef858-b257-4ec6-9dbe-8e843332ca71', 'date': 'Mon, 14 Dec 2020 02:15:30 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"0f59a4f6-e36b-4a85-bbe0-91a977c61692","name":"tempest-VirtualInterfacesRbacTest-657906573-network","tenant_id":"717ecfe7a9054975a0ebc5eb892e1195","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"717ecfe7a9054975a0ebc5eb892e1195","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":29,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:15:29Z","updated_at":"2020-12-14T02:15:30Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:30.252 186 INFO tempest.lib.common.rest_client [req-4bec32a8-f491-4b07-9297-8ce140667242 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:15:30.256 186 DEBUG tempest.lib.common.rest_client [req-4bec32a8-f491-4b07-9297-8ce140667242 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6585', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4bec32a8-f491-4b07-9297-8ce140667242', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8da8a5505dcc4795bb2077f3dffc9316", "name": "tempest-ServerConsolesMaxV25RbacTest-444671140", "password_expires_at": null}, "audit_ids": ["exP5TDzORkC5CEPK0OBq0w"], "expires_at": "2020-12-14T03:15:30.000000Z", "issued_at": "2020-12-14T02:15:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd3f735a47fe4d66819714d36cf3c2bf", "name": "tempest-ServerConsolesMaxV25RbacTest-444671140"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:30.315 186 INFO tempest.lib.common.rest_client [req-a176441c-a180-4ef8-868b-ae24b4451b0d ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:15:30.318 186 DEBUG tempest.lib.common.rest_client [req-a176441c-a180-4ef8-868b-ae24b4451b0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a176441c-a180-4ef8-868b-ae24b4451b0d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["7k7W1b5eRl-l5BI5087yDg"], "expires_at": "2020-12-14T03:15:30.000000Z", "issued_at": "2020-12-14T02:15:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:30.413 189 INFO tempest.lib.common.rest_client [req-cc751e18-0e66-4157-8170-619c0d42034a ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.079s 2020-12-14 02:15:30.417 189 DEBUG tempest.lib.common.rest_client [req-cc751e18-0e66-4157-8170-619c0d42034a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1606', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cc751e18-0e66-4157-8170-619c0d42034a', 'x-compute-request-id': 'req-cc751e18-0e66-4157-8170-619c0d42034a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:23Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:30.440 186 INFO tempest.lib.common.rest_client [req-1ed4f822-feaa-4ce2-879d-0be9abf920dd ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-12-14 02:15:30.443 186 DEBUG tempest.lib.common.rest_client [req-1ed4f822-feaa-4ce2-879d-0be9abf920dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ed4f822-feaa-4ce2-879d-0be9abf920dd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["syFcR3zqQB6mw9YgHiSLpQ"], "expires_at": "2020-12-14T03:15:30.000000Z", "issued_at": "2020-12-14T02:15:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:30.512 186 INFO tempest.lib.common.rest_client [req-3bc6a1db-71b8-4843-8daf-c92cdc315045 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.061s 2020-12-14 02:15:30.515 186 DEBUG tempest.lib.common.rest_client [req-3bc6a1db-71b8-4843-8daf-c92cdc315045 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3bc6a1db-71b8-4843-8daf-c92cdc315045', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:30.597 186 INFO tempest.lib.common.rest_client [req-4094acea-9697-40cb-8cf1-fae37c77af80 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.074s 2020-12-14 02:15:30.600 186 DEBUG tempest.lib.common.rest_client [req-4094acea-9697-40cb-8cf1-fae37c77af80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4094acea-9697-40cb-8cf1-fae37c77af80', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:30.603 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:15:30.605 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:30.634 197 INFO tempest.lib.common.rest_client [req-e5714839-14a1-4ca4-94c6-9a6f59c7fdc0 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.327s 2020-12-14 02:15:30.638 197 DEBUG tempest.lib.common.rest_client [req-e5714839-14a1-4ca4-94c6-9a6f59c7fdc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2113', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e5714839-14a1-4ca4-94c6-9a6f59c7fdc0', 'x-compute-request-id': 'req-e5714839-14a1-4ca4-94c6-9a6f59c7fdc0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "MIGRATING", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:26Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:30.672 186 INFO tempest.lib.common.rest_client [req-3450f672-fe85-4e1e-9112-731cbace2d54 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf/users/8da8a5505dcc4795bb2077f3dffc9316/roles 0.061s 2020-12-14 02:15:30.674 186 DEBUG tempest.lib.common.rest_client [req-3450f672-fe85-4e1e-9112-731cbace2d54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3450f672-fe85-4e1e-9112-731cbace2d54', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf/users/8da8a5505dcc4795bb2077f3dffc9316/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf/users/8da8a5505dcc4795bb2077f3dffc9316/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:30.760 186 INFO tempest.lib.common.rest_client [req-28bcbf4c-cc2e-43cc-b98d-b3053e44ef13 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf/users/8da8a5505dcc4795bb2077f3dffc9316/roles/72a4576c553448cd941b052c1ca0cf2d 0.078s 2020-12-14 02:15:30.764 186 DEBUG tempest.lib.common.rest_client [req-28bcbf4c-cc2e-43cc-b98d-b3053e44ef13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28bcbf4c-cc2e-43cc-b98d-b3053e44ef13', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf/users/8da8a5505dcc4795bb2077f3dffc9316/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:30.769 193 INFO tempest.lib.common.rest_client [req-2da12ea1-9763-4fcf-a476-ab2f41c49dee ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.634s 2020-12-14 02:15:30.771 193 DEBUG tempest.lib.common.rest_client [req-2da12ea1-9763-4fcf-a476-ab2f41c49dee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "0f59a4f6-e36b-4a85-bbe0-91a977c61692", "cidr": "192.168.120.0/28", "name": "tempest-VirtualInterfacesRbacTest-657906573-subnet", "tenant_id": "717ecfe7a9054975a0ebc5eb892e1195", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '712', 'x-openstack-request-id': 'req-2da12ea1-9763-4fcf-a476-ab2f41c49dee', 'date': 'Mon, 14 Dec 2020 02:15:30 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"6a9d0261-a783-4c64-81f6-7ad4ac45a806","name":"tempest-VirtualInterfacesRbacTest-657906573-subnet","tenant_id":"717ecfe7a9054975a0ebc5eb892e1195","network_id":"0f59a4f6-e36b-4a85-bbe0-91a977c61692","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:15:30Z","updated_at":"2020-12-14T02:15:30Z","revision_number":0,"project_id":"717ecfe7a9054975a0ebc5eb892e1195"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:30.774 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VirtualInterfacesRbacTest-824224035', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '717ecfe7a9054975a0ebc5eb892e1195', 'project_name': 'tempest-VirtualInterfacesRbacTest-824224035', 'tenant_id': '717ecfe7a9054975a0ebc5eb892e1195', 'tenant_name': 'tempest-VirtualInterfacesRbacTest-824224035', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c06c9edd8e0a4608b34363e736bfb5f8'}, Network: {'id': '0f59a4f6-e36b-4a85-bbe0-91a977c61692', 'name': 'tempest-VirtualInterfacesRbacTest-657906573-network', 'tenant_id': '717ecfe7a9054975a0ebc5eb892e1195', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '717ecfe7a9054975a0ebc5eb892e1195', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:15:29Z', 'updated_at': '2020-12-14T02:15:30Z', 'revision_number': 1}, Subnet: {'id': '6a9d0261-a783-4c64-81f6-7ad4ac45a806', 'name': 'tempest-VirtualInterfacesRbacTest-657906573-subnet', 'tenant_id': '717ecfe7a9054975a0ebc5eb892e1195', 'network_id': '0f59a4f6-e36b-4a85-bbe0-91a977c61692', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:15:30Z', 'updated_at': '2020-12-14T02:15:30Z', 'revision_number': 0, 'project_id': '717ecfe7a9054975a0ebc5eb892e1195'}, Router: None 2020-12-14 02:15:30.878 186 INFO tempest.lib.common.rest_client [req-dacc650e-4243-4b7b-b087-4103eb064b6c ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf/users/8da8a5505dcc4795bb2077f3dffc9316/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-12-14 02:15:30.880 186 DEBUG tempest.lib.common.rest_client [req-dacc650e-4243-4b7b-b087-4103eb064b6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dacc650e-4243-4b7b-b087-4103eb064b6c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf/users/8da8a5505dcc4795bb2077f3dffc9316/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:30.966 193 INFO tempest.lib.common.rest_client [req-eaab2083-3664-4bc3-8b03-8aa968c25ea2 ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.128s 2020-12-14 02:15:30.970 193 DEBUG tempest.lib.common.rest_client [req-eaab2083-3664-4bc3-8b03-8aa968c25ea2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eaab2083-3664-4bc3-8b03-8aa968c25ea2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c06c9edd8e0a4608b34363e736bfb5f8", "name": "tempest-VirtualInterfacesRbacTest-824224035", "password_expires_at": null}, "audit_ids": ["2_7NGJBBScu4GD0mEC7x6g"], "expires_at": "2020-12-14T03:15:30.000000Z", "issued_at": "2020-12-14T02:15:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "717ecfe7a9054975a0ebc5eb892e1195", "name": "tempest-VirtualInterfacesRbacTest-824224035"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/717ecfe7a9054975a0ebc5eb892e1195", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/717ecfe7a9054975a0ebc5eb892e1195", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/717ecfe7a9054975a0ebc5eb892e1195", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_717ecfe7a9054975a0ebc5eb892e1195", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_717ecfe7a9054975a0ebc5eb892e1195", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_717ecfe7a9054975a0ebc5eb892e1195", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:31.074 193 INFO tempest.lib.common.rest_client [req-2949fb4d-cf3f-4427-a73d-15207418f2a5 ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:15:31.078 193 DEBUG tempest.lib.common.rest_client [req-2949fb4d-cf3f-4427-a73d-15207418f2a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2949fb4d-cf3f-4427-a73d-15207418f2a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["4qcLdSktRFKtIRJcAkDi5Q"], "expires_at": "2020-12-14T03:15:31.000000Z", "issued_at": "2020-12-14T02:15:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:31.204 193 INFO tempest.lib.common.rest_client [req-b1c18205-9744-4856-80bf-fbafaa6f29c5 ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:15:31.207 193 DEBUG tempest.lib.common.rest_client [req-b1c18205-9744-4856-80bf-fbafaa6f29c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1c18205-9744-4856-80bf-fbafaa6f29c5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["YaOesFZoSye3yiLO_yly-Q"], "expires_at": "2020-12-14T03:15:31.000000Z", "issued_at": "2020-12-14T02:15:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:31.275 193 INFO tempest.lib.common.rest_client [req-ee18c5d3-9d22-43e8-8d83-9c889e4d9137 ] Request (VirtualInterfacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.061s 2020-12-14 02:15:31.279 193 DEBUG tempest.lib.common.rest_client [req-ee18c5d3-9d22-43e8-8d83-9c889e4d9137 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee18c5d3-9d22-43e8-8d83-9c889e4d9137', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:31.349 193 INFO tempest.lib.common.rest_client [req-d1bc7b5f-dcfd-488a-b48d-6968a07ea9f2 ] Request (VirtualInterfacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:15:31.353 193 DEBUG tempest.lib.common.rest_client [req-d1bc7b5f-dcfd-488a-b48d-6968a07ea9f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1bc7b5f-dcfd-488a-b48d-6968a07ea9f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:31.356 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:15:31.358 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:31.433 193 INFO tempest.lib.common.rest_client [req-f61eea81-e259-4ddc-abc6-36c8ccd5753b ] Request (VirtualInterfacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/717ecfe7a9054975a0ebc5eb892e1195/users/c06c9edd8e0a4608b34363e736bfb5f8/roles 0.069s 2020-12-14 02:15:31.437 193 DEBUG tempest.lib.common.rest_client [req-f61eea81-e259-4ddc-abc6-36c8ccd5753b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f61eea81-e259-4ddc-abc6-36c8ccd5753b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/717ecfe7a9054975a0ebc5eb892e1195/users/c06c9edd8e0a4608b34363e736bfb5f8/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/717ecfe7a9054975a0ebc5eb892e1195/users/c06c9edd8e0a4608b34363e736bfb5f8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:31.523 193 INFO tempest.lib.common.rest_client [req-2d6d5f22-bc9e-4cfb-9d27-97e186a7b183 ] Request (VirtualInterfacesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/717ecfe7a9054975a0ebc5eb892e1195/users/c06c9edd8e0a4608b34363e736bfb5f8/roles/72a4576c553448cd941b052c1ca0cf2d 0.078s 2020-12-14 02:15:31.525 193 DEBUG tempest.lib.common.rest_client [req-2d6d5f22-bc9e-4cfb-9d27-97e186a7b183 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2d6d5f22-bc9e-4cfb-9d27-97e186a7b183', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/717ecfe7a9054975a0ebc5eb892e1195/users/c06c9edd8e0a4608b34363e736bfb5f8/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:31.546 189 INFO tempest.lib.common.rest_client [req-00ada2e1-c0e6-4c33-bfbc-ddfac802eb21 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.076s 2020-12-14 02:15:31.550 189 DEBUG tempest.lib.common.rest_client [req-00ada2e1-c0e6-4c33-bfbc-ddfac802eb21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1606', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-00ada2e1-c0e6-4c33-bfbc-ddfac802eb21', 'x-compute-request-id': 'req-00ada2e1-c0e6-4c33-bfbc-ddfac802eb21', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:23Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:31.650 193 INFO tempest.lib.common.rest_client [req-bd17d49e-48cf-4465-b720-5d96965a6093 ] Request (VirtualInterfacesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/717ecfe7a9054975a0ebc5eb892e1195/users/c06c9edd8e0a4608b34363e736bfb5f8/roles/a629c95d64b3416fb80ae90af4f69c05 0.118s 2020-12-14 02:15:31.653 193 DEBUG tempest.lib.common.rest_client [req-bd17d49e-48cf-4465-b720-5d96965a6093 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd17d49e-48cf-4465-b720-5d96965a6093', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/717ecfe7a9054975a0ebc5eb892e1195/users/c06c9edd8e0a4608b34363e736bfb5f8/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:31.984 186 INFO tempest.lib.common.rest_client [req-a5533fa7-b35e-4d52-b8bd-d758c57bb7ac ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:15:31.987 186 DEBUG tempest.lib.common.rest_client [req-a5533fa7-b35e-4d52-b8bd-d758c57bb7ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5533fa7-b35e-4d52-b8bd-d758c57bb7ac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8da8a5505dcc4795bb2077f3dffc9316", "name": "tempest-ServerConsolesMaxV25RbacTest-444671140", "password_expires_at": null}, "audit_ids": ["z-uPv5V2S2CDgEFwloMeRg"], "expires_at": "2020-12-14T03:15:31.000000Z", "issued_at": "2020-12-14T02:15:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd3f735a47fe4d66819714d36cf3c2bf", "name": "tempest-ServerConsolesMaxV25RbacTest-444671140"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:32.041 197 INFO tempest.lib.common.rest_client [req-2088632b-d618-45b6-9170-1e164091e76b ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.273s 2020-12-14 02:15:32.044 197 DEBUG tempest.lib.common.rest_client [req-2088632b-d618-45b6-9170-1e164091e76b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2113', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2088632b-d618-45b6-9170-1e164091e76b', 'x-compute-request-id': 'req-2088632b-d618-45b6-9170-1e164091e76b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "MIGRATING", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:26Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:32.099 186 INFO tempest.lib.common.rest_client [req-4f4e193f-cad0-40db-8866-c76c7353a21e ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:15:32.103 186 DEBUG tempest.lib.common.rest_client [req-4f4e193f-cad0-40db-8866-c76c7353a21e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f4e193f-cad0-40db-8866-c76c7353a21e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8da8a5505dcc4795bb2077f3dffc9316", "name": "tempest-ServerConsolesMaxV25RbacTest-444671140", "password_expires_at": null}, "audit_ids": ["1Saov3B5SUyQpOpJzSbJRw"], "expires_at": "2020-12-14T03:15:32.000000Z", "issued_at": "2020-12-14T02:15:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd3f735a47fe4d66819714d36cf3c2bf", "name": "tempest-ServerConsolesMaxV25RbacTest-444671140"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:32.108 186 INFO tempest.lib.common.fixed_network [-] (ServerConsolesMaxV25RbacTest:setUpClass) Found network {'id': '8add56e9-2f51-4160-a76e-c0cd82eb917a', 'name': 'tempest-ServerConsolesMaxV25RbacTest-617886141-network', 'tenant_id': 'fd3f735a47fe4d66819714d36cf3c2bf', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'fd3f735a47fe4d66819714d36cf3c2bf', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 65, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:15:25Z', 'updated_at': '2020-12-14T02:15:25Z', 'revision_number': 1} available for tenant 2020-12-14 02:15:32.683 189 INFO tempest.lib.common.rest_client [req-ddae1f08-78fd-4db5-8005-081cb822440d ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.077s 2020-12-14 02:15:32.686 189 DEBUG tempest.lib.common.rest_client [req-ddae1f08-78fd-4db5-8005-081cb822440d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1606', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ddae1f08-78fd-4db5-8005-081cb822440d', 'x-compute-request-id': 'req-ddae1f08-78fd-4db5-8005-081cb822440d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:23Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:32.759 193 INFO tempest.lib.common.rest_client [req-db06b455-c85b-49b3-877f-e43b34839823 ] Request (VirtualInterfacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:15:32.762 193 DEBUG tempest.lib.common.rest_client [req-db06b455-c85b-49b3-877f-e43b34839823 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db06b455-c85b-49b3-877f-e43b34839823', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c06c9edd8e0a4608b34363e736bfb5f8", "name": "tempest-VirtualInterfacesRbacTest-824224035", "password_expires_at": null}, "audit_ids": ["Apdf4N7DRIyIxd0p-zpLdw"], "expires_at": "2020-12-14T03:15:32.000000Z", "issued_at": "2020-12-14T02:15:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "717ecfe7a9054975a0ebc5eb892e1195", "name": "tempest-VirtualInterfacesRbacTest-824224035"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/717ecfe7a9054975a0ebc5eb892e1195", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/717ecfe7a9054975a0ebc5eb892e1195", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/717ecfe7a9054975a0ebc5eb892e1195", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_717ecfe7a9054975a0ebc5eb892e1195", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_717ecfe7a9054975a0ebc5eb892e1195", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_717ecfe7a9054975a0ebc5eb892e1195", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:32.783 193 INFO tempest.lib.common.rest_client [-] Request (VirtualInterfacesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/ 0.014s 2020-12-14 02:15:32.785 193 DEBUG tempest.lib.common.rest_client [-] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '379', 'content-type': 'application/json', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/'} Body: b'{"versions": [{"id": "v2.0", "status": "SUPPORTED", "version": "", "min_version": "", "updated": "2011-01-21T11:33:21Z", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2/"}]}, {"id": "v2.1", "status": "CURRENT", "version": "2.87", "min_version": "2.1", "updated": "2013-07-23T11:33:21Z", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:32.819 193 INFO tempest.test [-] raised in VirtualInterfacesRbacTest.setUpClass. Invoking tearDownClass. 2020-12-14 02:15:32.821 193 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '0f59a4f6-e36b-4a85-bbe0-91a977c61692', 'name': 'tempest-VirtualInterfacesRbacTest-657906573-network', 'tenant_id': '717ecfe7a9054975a0ebc5eb892e1195', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '717ecfe7a9054975a0ebc5eb892e1195', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:15:29Z', 'updated_at': '2020-12-14T02:15:30Z', 'revision_number': 1}, subnet: {'id': '6a9d0261-a783-4c64-81f6-7ad4ac45a806', 'name': 'tempest-VirtualInterfacesRbacTest-657906573-subnet', 'tenant_id': '717ecfe7a9054975a0ebc5eb892e1195', 'network_id': '0f59a4f6-e36b-4a85-bbe0-91a977c61692', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:15:30Z', 'updated_at': '2020-12-14T02:15:30Z', 'revision_number': 0, 'project_id': '717ecfe7a9054975a0ebc5eb892e1195'}, router: None _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:15:33.039 186 INFO tempest.lib.common.rest_client [req-d7902ebb-27fd-465d-a894-aefd9633d968 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 0.921s 2020-12-14 02:15:33.043 186 DEBUG tempest.lib.common.rest_client [req-d7902ebb-27fd-465d-a894-aefd9633d968 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerConsolesMaxV25RbacTest-server-172490259", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "8add56e9-2f51-4160-a76e-c0cd82eb917a"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d7902ebb-27fd-465d-a894-aefd9633d968', 'x-compute-request-id': 'req-d7902ebb-27fd-465d-a894-aefd9633d968', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "b0a35f9c-edec-4bd3-9016-556dbec92938", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "cKTpd6EenABj"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:33.190 186 INFO tempest.lib.common.rest_client [req-45b5078f-c4ea-45b6-a9d3-e4a1e116a482 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938 0.116s 2020-12-14 02:15:33.193 186 DEBUG tempest.lib.common.rest_client [req-45b5078f-c4ea-45b6-a9d3-e4a1e116a482 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1403', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-45b5078f-c4ea-45b6-a9d3-e4a1e116a482', 'x-compute-request-id': 'req-45b5078f-c4ea-45b6-a9d3-e4a1e116a482', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938'} Body: b'{"server": {"id": "b0a35f9c-edec-4bd3-9016-556dbec92938", "name": "tempest-ServerConsolesMaxV25RbacTest-server-172490259", "status": "BUILD", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "user_id": "8da8a5505dcc4795bb2077f3dffc9316", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:33Z", "updated": "2020-12-14T02:15:33Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:33.330 193 INFO tempest.lib.common.rest_client [req-5cf5aad3-6fb3-485e-b096-bcb232d900d1 ] Request (VirtualInterfacesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/6a9d0261-a783-4c64-81f6-7ad4ac45a806 0.503s 2020-12-14 02:15:33.332 193 DEBUG tempest.lib.common.rest_client [req-5cf5aad3-6fb3-485e-b096-bcb232d900d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-5cf5aad3-6fb3-485e-b096-bcb232d900d1', 'date': 'Mon, 14 Dec 2020 02:15:33 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/6a9d0261-a783-4c64-81f6-7ad4ac45a806'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:33.420 197 INFO tempest.lib.common.rest_client [req-5e7e7634-5b0f-4ef1-b209-ca407a6fd9a2 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.243s 2020-12-14 02:15:33.425 197 DEBUG tempest.lib.common.rest_client [req-5e7e7634-5b0f-4ef1-b209-ca407a6fd9a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2113', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5e7e7634-5b0f-4ef1-b209-ca407a6fd9a2', 'x-compute-request-id': 'req-5e7e7634-5b0f-4ef1-b209-ca407a6fd9a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "MIGRATING", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:26Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:33.814 189 INFO tempest.lib.common.rest_client [req-5d57ed78-1fd5-4798-b577-9688eb99a6a1 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.074s 2020-12-14 02:15:33.817 189 DEBUG tempest.lib.common.rest_client [req-5d57ed78-1fd5-4798-b577-9688eb99a6a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1606', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5d57ed78-1fd5-4798-b577-9688eb99a6a1', 'x-compute-request-id': 'req-5d57ed78-1fd5-4798-b577-9688eb99a6a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:23Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:34.036 193 INFO tempest.lib.common.rest_client [req-0c1be52d-5459-4ec8-b90a-870145ab643d ] Request (VirtualInterfacesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/0f59a4f6-e36b-4a85-bbe0-91a977c61692 0.697s 2020-12-14 02:15:34.040 193 DEBUG tempest.lib.common.rest_client [req-0c1be52d-5459-4ec8-b90a-870145ab643d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-0c1be52d-5459-4ec8-b90a-870145ab643d', 'date': 'Mon, 14 Dec 2020 02:15:34 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/0f59a4f6-e36b-4a85-bbe0-91a977c61692'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:34.273 193 INFO tempest.lib.common.rest_client [req-641ba28f-3bdb-42ab-aaed-572471065101 ] Request (VirtualInterfacesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/c06c9edd8e0a4608b34363e736bfb5f8 0.227s 2020-12-14 02:15:34.275 193 DEBUG tempest.lib.common.rest_client [req-641ba28f-3bdb-42ab-aaed-572471065101 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-641ba28f-3bdb-42ab-aaed-572471065101', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/c06c9edd8e0a4608b34363e736bfb5f8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:34.351 193 INFO tempest.lib.common.rest_client [req-f709c6f1-6a35-42db-b8b9-f2fb662d4c6a ] Request (VirtualInterfacesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=717ecfe7a9054975a0ebc5eb892e1195&name=default 0.072s 2020-12-14 02:15:34.353 193 DEBUG tempest.lib.common.rest_client [req-f709c6f1-6a35-42db-b8b9-f2fb662d4c6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-f709c6f1-6a35-42db-b8b9-f2fb662d4c6a', 'date': 'Mon, 14 Dec 2020 02:15:34 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=717ecfe7a9054975a0ebc5eb892e1195&name=default'} Body: b'{"security_groups": [{"id": "2bb4b5f0-d77e-402c-8a7d-9d8798520ecc", "name": "default", "stateful": true, "tenant_id": "717ecfe7a9054975a0ebc5eb892e1195", "description": "Default security group", "security_group_rules": [{"id": "5e53aab9-d7d7-4d33-b141-a97b2c69967e", "tenant_id": "717ecfe7a9054975a0ebc5eb892e1195", "security_group_id": "2bb4b5f0-d77e-402c-8a7d-9d8798520ecc", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:15:29Z", "updated_at": "2020-12-14T02:15:29Z", "revision_number": 0, "project_id": "717ecfe7a9054975a0ebc5eb892e1195"}, {"id": "629bfee0-7975-4c7d-8113-57351d8cd9d9", "tenant_id": "717ecfe7a9054975a0ebc5eb892e1195", "security_group_id": "2bb4b5f0-d77e-402c-8a7d-9d8798520ecc", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2bb4b5f0-d77e-402c-8a7d-9d8798520ecc", "description": null, "tags": [], "created_at": "2020-12-14T02:15:29Z", "updated_at": "2020-12-14T02:15:29Z", "revision_number": 0, "project_id": "717ecfe7a9054975a0ebc5eb892e1195"}, {"id": "a7e36aec-956a-448b-8376-59806a06cf19", "tenant_id": "717ecfe7a9054975a0ebc5eb892e1195", "security_group_id": "2bb4b5f0-d77e-402c-8a7d-9d8798520ecc", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2bb4b5f0-d77e-402c-8a7d-9d8798520ecc", "description": null, "tags": [], "created_at": "2020-12-14T02:15:29Z", "updated_at": "2020-12-14T02:15:29Z", "revision_number": 0, "project_id": "717ecfe7a9054975a0ebc5eb892e1195"}, {"id": "ea7b60fa-e57d-41ad-b2e8-d1a2f7841f8a", "tenant_id": "717ecfe7a9054975a0ebc5eb892e1195", "security_group_id": "2bb4b5f0-d77e-402c-8a7d-9d8798520ecc", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:15:29Z", "updated_at": "2020-12-14T02:15:29Z", "revision_number": 0, "project_id": "717ecfe7a9054975a0ebc5eb892e1195"}], "tags": [], "created_at": "2020-12-14T02:15:29Z", "updated_at": "2020-12-14T02:15:29Z", "revision_number": 1, "project_id": "717ecfe7a9054975a0ebc5eb892e1195"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:34.456 186 INFO tempest.lib.common.rest_client [req-aabf6613-af8d-4749-bcac-3be8cb2d52f0 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938 0.155s 2020-12-14 02:15:34.459 186 DEBUG tempest.lib.common.rest_client [req-aabf6613-af8d-4749-bcac-3be8cb2d52f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1490', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aabf6613-af8d-4749-bcac-3be8cb2d52f0', 'x-compute-request-id': 'req-aabf6613-af8d-4749-bcac-3be8cb2d52f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938'} Body: b'{"server": {"id": "b0a35f9c-edec-4bd3-9016-556dbec92938", "name": "tempest-ServerConsolesMaxV25RbacTest-server-172490259", "status": "BUILD", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "user_id": "8da8a5505dcc4795bb2077f3dffc9316", "metadata": {}, "hostId": "2612188b9771d58d67f39056a6d34b234fb21eb3edf0d60e19c72a06", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:33Z", "updated": "2020-12-14T02:15:34Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:34.502 193 INFO tempest.lib.common.rest_client [req-f45f6dea-e203-4e21-946c-d7edba3bb6af ] Request (VirtualInterfacesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/2bb4b5f0-d77e-402c-8a7d-9d8798520ecc 0.143s 2020-12-14 02:15:34.506 193 DEBUG tempest.lib.common.rest_client [req-f45f6dea-e203-4e21-946c-d7edba3bb6af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f45f6dea-e203-4e21-946c-d7edba3bb6af', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:15:34 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/2bb4b5f0-d77e-402c-8a7d-9d8798520ecc'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:34.572 186 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 1 second wait 2020-12-14 02:15:34.711 193 INFO tempest.lib.common.rest_client [req-9766050c-89e0-434b-970c-8b5b3974b43e ] Request (VirtualInterfacesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/717ecfe7a9054975a0ebc5eb892e1195 0.197s 2020-12-14 02:15:34.713 193 DEBUG tempest.lib.common.rest_client [req-9766050c-89e0-434b-970c-8b5b3974b43e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9766050c-89e0-434b-970c-8b5b3974b43e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/717ecfe7a9054975a0ebc5eb892e1195'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:34.824 197 INFO tempest.lib.common.rest_client [req-9fcea51a-8a99-4147-a4ec-188918594964 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.273s 2020-12-14 02:15:34.826 197 DEBUG tempest.lib.common.rest_client [req-9fcea51a-8a99-4147-a4ec-188918594964 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2113', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9fcea51a-8a99-4147-a4ec-188918594964', 'x-compute-request-id': 'req-9fcea51a-8a99-4147-a4ec-188918594964', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "MIGRATING", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:26Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:34.836 193 INFO tempest.lib.common.rest_client [req-c7597df6-7442-4477-8678-a1e1bc5f31fe ] Request (VolumeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:15:34.840 193 DEBUG tempest.lib.common.rest_client [req-c7597df6-7442-4477-8678-a1e1bc5f31fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7597df6-7442-4477-8678-a1e1bc5f31fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ViEZ5rfxRtKcZvw8P7kgtQ"], "expires_at": "2020-12-14T03:15:34.000000Z", "issued_at": "2020-12-14T02:15:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:34.949 193 INFO tempest.lib.common.rest_client [req-5a3793d2-2577-4c6d-b6fe-7a153e657bb5 ] Request (VolumeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:15:34.949 189 INFO tempest.lib.common.rest_client [req-946364de-6bc3-46f1-87dd-6466d3994c13 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.077s 2020-12-14 02:15:34.952 193 DEBUG tempest.lib.common.rest_client [req-5a3793d2-2577-4c6d-b6fe-7a153e657bb5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a3793d2-2577-4c6d-b6fe-7a153e657bb5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["JxLki_CvSSa12Jh5MOuOoA"], "expires_at": "2020-12-14T03:15:34.000000Z", "issued_at": "2020-12-14T02:15:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:34.953 189 DEBUG tempest.lib.common.rest_client [req-946364de-6bc3-46f1-87dd-6466d3994c13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1606', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-946364de-6bc3-46f1-87dd-6466d3994c13', 'x-compute-request-id': 'req-946364de-6bc3-46f1-87dd-6466d3994c13', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:23Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:35.024 193 INFO tempest.lib.common.rest_client [req-0aba4342-1dcf-42fa-9cff-c1c33f069bae ] Request (VolumeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.063s 2020-12-14 02:15:35.027 193 DEBUG tempest.lib.common.rest_client [req-0aba4342-1dcf-42fa-9cff-c1c33f069bae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0aba4342-1dcf-42fa-9cff-c1c33f069bae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:35.118 193 INFO tempest.lib.common.rest_client [req-03c0b861-96eb-44cf-b757-8558798c44d7 ] Request (VolumeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.083s 2020-12-14 02:15:35.120 193 DEBUG tempest.lib.common.rest_client [req-03c0b861-96eb-44cf-b757-8558798c44d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeRbacTest-407265222-desc", "domain_id": "default", "name": "tempest-VolumeRbacTest-407265222"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '364', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-03c0b861-96eb-44cf-b757-8558798c44d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222", "domain_id": "default", "description": "tempest-VolumeRbacTest-407265222-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:35.272 193 INFO tempest.lib.common.rest_client [req-8a1836ef-324f-4f28-8f85-a5f8c347e83b ] Request (VolumeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.140s 2020-12-14 02:15:35.274 193 DEBUG tempest.lib.common.rest_client [req-8a1836ef-324f-4f28-8f85-a5f8c347e83b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeRbacTest-407265222", "password": "B9!ADi4+tXy1z#s", "project_id": "d8830a62e0b440359acf2a0f4aa2d615", "email": "tempest-VolumeRbacTest-1045485820@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '383', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a1836ef-324f-4f28-8f85-a5f8c347e83b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "d8830a62e0b440359acf2a0f4aa2d615", "email": "tempest-VolumeRbacTest-1045485820@example.com", "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/89853a5e7af04daf9c245bb1d721ddc6"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:35.349 193 INFO tempest.lib.common.rest_client [req-7892a3c1-152c-4546-aa01-8caa0536c7a0 ] Request (VolumeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:15:35.351 193 DEBUG tempest.lib.common.rest_client [req-7892a3c1-152c-4546-aa01-8caa0536c7a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7892a3c1-152c-4546-aa01-8caa0536c7a0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:35.428 193 INFO tempest.lib.common.rest_client [req-5600d33d-78a9-4ccf-9b47-19b08e06cde9 ] Request (VolumeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.068s 2020-12-14 02:15:35.431 193 DEBUG tempest.lib.common.rest_client [req-5600d33d-78a9-4ccf-9b47-19b08e06cde9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5600d33d-78a9-4ccf-9b47-19b08e06cde9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:35.562 193 INFO tempest.lib.common.rest_client [req-70dfc1d5-8e82-454f-96cb-6e9e7a749211 ] Request (VolumeRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles/72a4576c553448cd941b052c1ca0cf2d 0.112s 2020-12-14 02:15:35.565 193 DEBUG tempest.lib.common.rest_client [req-70dfc1d5-8e82-454f-96cb-6e9e7a749211 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70dfc1d5-8e82-454f-96cb-6e9e7a749211', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:35.568 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeRbacTest-407265222', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd8830a62e0b440359acf2a0f4aa2d615', 'project_name': 'tempest-VolumeRbacTest-407265222', 'tenant_id': 'd8830a62e0b440359acf2a0f4aa2d615', 'tenant_name': 'tempest-VolumeRbacTest-407265222', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '89853a5e7af04daf9c245bb1d721ddc6'}, Network: None, Subnet: None, Router: None 2020-12-14 02:15:35.570 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeRbacTest-407265222', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd8830a62e0b440359acf2a0f4aa2d615', 'project_name': 'tempest-VolumeRbacTest-407265222', 'tenant_id': 'd8830a62e0b440359acf2a0f4aa2d615', 'tenant_name': 'tempest-VolumeRbacTest-407265222', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '89853a5e7af04daf9c245bb1d721ddc6'}, Network: None, Subnet: None, Router: None 2020-12-14 02:15:35.760 186 INFO tempest.lib.common.rest_client [req-24f086bd-33ca-4d90-8a56-5634885f4a2f ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938 0.179s 2020-12-14 02:15:35.763 186 DEBUG tempest.lib.common.rest_client [req-24f086bd-33ca-4d90-8a56-5634885f4a2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1496', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-24f086bd-33ca-4d90-8a56-5634885f4a2f', 'x-compute-request-id': 'req-24f086bd-33ca-4d90-8a56-5634885f4a2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938'} Body: b'{"server": {"id": "b0a35f9c-edec-4bd3-9016-556dbec92938", "name": "tempest-ServerConsolesMaxV25RbacTest-server-172490259", "status": "BUILD", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "user_id": "8da8a5505dcc4795bb2077f3dffc9316", "metadata": {}, "hostId": "2612188b9771d58d67f39056a6d34b234fb21eb3edf0d60e19c72a06", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:33Z", "updated": "2020-12-14T02:15:35Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:35.775 193 INFO tempest.lib.common.rest_client [req-18be55b5-f5e7-4988-962f-806c40715fc5 ] Request (VolumeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.135s 2020-12-14 02:15:35.780 193 DEBUG tempest.lib.common.rest_client [req-18be55b5-f5e7-4988-962f-806c40715fc5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6557', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-18be55b5-f5e7-4988-962f-806c40715fc5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["YaLr7-MeTYerV0VTx8_TJQ"], "expires_at": "2020-12-14T03:15:35.000000Z", "issued_at": "2020-12-14T02:15:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/imag _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:35.863 186 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 2 second wait 2020-12-14 02:15:35.900 193 INFO tempest.lib.common.rest_client [req-dad7c041-50ca-4fc2-b90e-0c6c5e2c966b ] Request (VolumeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:15:35.903 193 DEBUG tempest.lib.common.rest_client [req-dad7c041-50ca-4fc2-b90e-0c6c5e2c966b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dad7c041-50ca-4fc2-b90e-0c6c5e2c966b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["DaxXtEA9QMKEf-FCzI1QGw"], "expires_at": "2020-12-14T03:15:35.000000Z", "issued_at": "2020-12-14T02:15:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:36.026 193 INFO tempest.lib.common.rest_client [req-cc85ef11-58a8-4481-9562-7fe8716d8a02 ] Request (VolumeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:15:36.029 193 DEBUG tempest.lib.common.rest_client [req-cc85ef11-58a8-4481-9562-7fe8716d8a02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cc85ef11-58a8-4481-9562-7fe8716d8a02', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["TxMC7PvsTd6h7vqJ6kQ2lg"], "expires_at": "2020-12-14T03:15:36.000000Z", "issued_at": "2020-12-14T02:15:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:36.095 189 INFO tempest.lib.common.rest_client [req-299ba558-55c4-407a-9dfc-a8efdc3c9c4f ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.083s 2020-12-14 02:15:36.099 189 DEBUG tempest.lib.common.rest_client [req-299ba558-55c4-407a-9dfc-a8efdc3c9c4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-299ba558-55c4-407a-9dfc-a8efdc3c9c4f', 'x-compute-request-id': 'req-299ba558-55c4-407a-9dfc-a8efdc3c9c4f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_id": "3400d8caa66043d0b7fa128b68a28ecc", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:35Z", "status": "SAVING", "progress": 50, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:36.109 193 INFO tempest.lib.common.rest_client [req-6754dfd5-2972-4bfc-83b9-d7d8b0f3430a ] Request (VolumeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.073s 2020-12-14 02:15:36.113 193 DEBUG tempest.lib.common.rest_client [req-6754dfd5-2972-4bfc-83b9-d7d8b0f3430a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6754dfd5-2972-4bfc-83b9-d7d8b0f3430a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:36.174 193 INFO tempest.lib.common.rest_client [req-b17df54b-0e15-44b5-af56-0de04d7f800a ] Request (VolumeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-12-14 02:15:36.177 193 DEBUG tempest.lib.common.rest_client [req-b17df54b-0e15-44b5-af56-0de04d7f800a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b17df54b-0e15-44b5-af56-0de04d7f800a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:36.180 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:15:36.182 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:36.216 197 INFO tempest.lib.common.rest_client [req-805704c0-0fcf-4420-b3dc-d931a9982e4e ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.265s 2020-12-14 02:15:36.218 197 DEBUG tempest.lib.common.rest_client [req-805704c0-0fcf-4420-b3dc-d931a9982e4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2113', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-805704c0-0fcf-4420-b3dc-d931a9982e4e', 'x-compute-request-id': 'req-805704c0-0fcf-4420-b3dc-d931a9982e4e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "MIGRATING", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:26Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:36.256 193 INFO tempest.lib.common.rest_client [req-67352401-e821-4835-b930-1eb8c2e79b9c ] Request (VolumeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.068s 2020-12-14 02:15:36.259 193 DEBUG tempest.lib.common.rest_client [req-67352401-e821-4835-b930-1eb8c2e79b9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67352401-e821-4835-b930-1eb8c2e79b9c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:36.356 193 INFO tempest.lib.common.rest_client [req-81b867a9-9fb0-4702-ab61-9ab6f085cc09 ] Request (VolumeRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles/72a4576c553448cd941b052c1ca0cf2d 0.090s 2020-12-14 02:15:36.360 193 DEBUG tempest.lib.common.rest_client [req-81b867a9-9fb0-4702-ab61-9ab6f085cc09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81b867a9-9fb0-4702-ab61-9ab6f085cc09', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:36.525 193 INFO tempest.lib.common.rest_client [req-74673d34-b9b9-4761-ae34-ac1264440e39 ] Request (VolumeRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles/a629c95d64b3416fb80ae90af4f69c05 0.156s 2020-12-14 02:15:36.526 193 DEBUG tempest.lib.common.rest_client [req-74673d34-b9b9-4761-ae34-ac1264440e39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74673d34-b9b9-4761-ae34-ac1264440e39', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:37.237 189 INFO tempest.lib.common.rest_client [req-bbb7fec3-8ebd-4f54-9e21-7fe86f005b9c ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.082s 2020-12-14 02:15:37.240 189 DEBUG tempest.lib.common.rest_client [req-bbb7fec3-8ebd-4f54-9e21-7fe86f005b9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bbb7fec3-8ebd-4f54-9e21-7fe86f005b9c', 'x-compute-request-id': 'req-bbb7fec3-8ebd-4f54-9e21-7fe86f005b9c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_id": "3400d8caa66043d0b7fa128b68a28ecc", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:35Z", "status": "SAVING", "progress": 50, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:37.610 197 INFO tempest.lib.common.rest_client [req-d8270e49-4582-494c-9c59-0067d140a8a9 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.268s 2020-12-14 02:15:37.614 197 DEBUG tempest.lib.common.rest_client [req-d8270e49-4582-494c-9c59-0067d140a8a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2113', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d8270e49-4582-494c-9c59-0067d140a8a9', 'x-compute-request-id': 'req-d8270e49-4582-494c-9c59-0067d140a8a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "MIGRATING", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:37Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:37.639 193 INFO tempest.lib.common.rest_client [req-14a43943-f25b-4029-b2a7-0e4af462c5aa ] Request (VolumeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:15:37.643 193 DEBUG tempest.lib.common.rest_client [req-14a43943-f25b-4029-b2a7-0e4af462c5aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14a43943-f25b-4029-b2a7-0e4af462c5aa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["Y0shPp7oRpaWj3Z6Fuq4jw"], "expires_at": "2020-12-14T03:15:37.000000Z", "issued_at": "2020-12-14T02:15:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:38.297 193 INFO tempest.lib.common.rest_client [req-45794d0f-5e0f-46f7-8e24-f12fa8b4a22f ] Request (VolumeRbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes 0.637s 2020-12-14 02:15:38.299 193 DEBUG tempest.lib.common.rest_client [req-45794d0f-5e0f-46f7-8e24-f12fa8b4a22f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "display_name": "tempest-VolumeRbacTest-volume-933373985"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-45794d0f-5e0f-46f7-8e24-f12fa8b4a22f', 'content-length': '834', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-45794d0f-5e0f-46f7-8e24-f12fa8b4a22f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes'} Body: b'{"volume": {"id": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:38.000000", "updated_at": null, "name": "tempest-VolumeRbacTest-volume-933373985", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8"}], "user_id": "89853a5e7af04daf9c245bb1d721ddc6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:38.375 189 INFO tempest.lib.common.rest_client [req-14a56f74-81b3-4548-b4b4-fcc839cc172c ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.081s 2020-12-14 02:15:38.378 189 DEBUG tempest.lib.common.rest_client [req-14a56f74-81b3-4548-b4b4-fcc839cc172c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-14a56f74-81b3-4548-b4b4-fcc839cc172c', 'x-compute-request-id': 'req-14a56f74-81b3-4548-b4b4-fcc839cc172c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_id": "3400d8caa66043d0b7fa128b68a28ecc", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:35Z", "status": "SAVING", "progress": 50, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:38.452 193 INFO tempest.lib.common.rest_client [req-83f72446-1633-4490-babd-4e1fbfb6ed27 ] Request (VolumeRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8 0.079s 2020-12-14 02:15:38.455 193 DEBUG tempest.lib.common.rest_client [req-83f72446-1633-4490-babd-4e1fbfb6ed27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-83f72446-1633-4490-babd-4e1fbfb6ed27', 'content-length': '1056', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-83f72446-1633-4490-babd-4e1fbfb6ed27', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8'} Body: b'{"volume": {"id": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:38.000000", "updated_at": "2020-12-14T02:15:38.000000", "name": "tempest-VolumeRbacTest-volume-933373985", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8"}], "user_id": "89853a5e7af04daf9c245bb1d721ddc6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "d8830a62e0b440359acf2a0f4aa2d615"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:39.027 197 INFO tempest.lib.common.rest_client [req-975b77ed-997e-4b09-b745-cb79d65b1ed5 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.271s 2020-12-14 02:15:39.030 197 DEBUG tempest.lib.common.rest_client [req-975b77ed-997e-4b09-b745-cb79d65b1ed5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2113', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-975b77ed-997e-4b09-b745-cb79d65b1ed5', 'x-compute-request-id': 'req-975b77ed-997e-4b09-b745-cb79d65b1ed5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "MIGRATING", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:37Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:39.507 189 INFO tempest.lib.common.rest_client [req-6fd8013a-2709-4c4d-9007-2fd5f7800040 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.075s 2020-12-14 02:15:39.510 189 DEBUG tempest.lib.common.rest_client [req-6fd8013a-2709-4c4d-9007-2fd5f7800040 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6fd8013a-2709-4c4d-9007-2fd5f7800040', 'x-compute-request-id': 'req-6fd8013a-2709-4c4d-9007-2fd5f7800040', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_id": "3400d8caa66043d0b7fa128b68a28ecc", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:35Z", "status": "SAVING", "progress": 50, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:39.630 193 INFO tempest.lib.common.rest_client [req-ecb065ca-c4ac-4085-9016-ad32ce7e51a4 ] Request (VolumeRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8 0.090s 2020-12-14 02:15:39.632 193 DEBUG tempest.lib.common.rest_client [req-ecb065ca-c4ac-4085-9016-ad32ce7e51a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ecb065ca-c4ac-4085-9016-ad32ce7e51a4', 'content-length': '1057', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ecb065ca-c4ac-4085-9016-ad32ce7e51a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8'} Body: b'{"volume": {"id": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:38.000000", "updated_at": "2020-12-14T02:15:39.000000", "name": "tempest-VolumeRbacTest-volume-933373985", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8"}], "user_id": "89853a5e7af04daf9c245bb1d721ddc6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "d8830a62e0b440359acf2a0f4aa2d615"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:39.710 193 INFO tempest.common.waiters [-] volume 1ca786b1-db65-4553-84b9-659e54a784b8 reached available after waiting for 1.710473 seconds 2020-12-14 02:15:39.719 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:39.723 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.726 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.729 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.732 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.736 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.739 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.743 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.746 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.748 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.750 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.753 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.755 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.758 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.760 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.763 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.766 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.768 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.771 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.773 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.775 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.777 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.779 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.782 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.784 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.786 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.788 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.791 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.793 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.795 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.798 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.800 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.802 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.805 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.807 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.809 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.812 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.814 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.816 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.819 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.822 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.824 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.827 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.829 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.832 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.835 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.837 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.839 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.841 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.844 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.846 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.848 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.850 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.853 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.855 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.858 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.860 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.867 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.869 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.871 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.874 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.876 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.878 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.881 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.883 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.885 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.887 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.890 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.892 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.895 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.897 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.899 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:39.909 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes:snapshots:create, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:39.911 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:40.042 193 INFO tempest.lib.common.rest_client [req-0b109015-02ff-488b-86b9-aab69a6082c4 ] Request (VolumeRbacTest:test_create_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.125s 2020-12-14 02:15:40.044 193 DEBUG tempest.lib.common.rest_client [req-0b109015-02ff-488b-86b9-aab69a6082c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b109015-02ff-488b-86b9-aab69a6082c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:40.095 193 INFO tempest.lib.common.rest_client [req-342a6aa5-d461-4627-869e-cc878dba8c01 ] Request (VolumeRbacTest:test_create_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:15:40.099 193 DEBUG tempest.lib.common.rest_client [req-342a6aa5-d461-4627-869e-cc878dba8c01 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-342a6aa5-d461-4627-869e-cc878dba8c01', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["zt5xnETQQ_yD4qUCaqotkQ"], "expires_at": "2020-12-14T03:15:40.000000Z", "issued_at": "2020-12-14T02:15:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:40.590 193 INFO tempest.lib.common.rest_client [req-9793bc40-888e-4803-8a5f-bef066e7506e ] Request (VolumeRbacTest:test_create_snapshot): 200 POST http://172.30.13.94/compute/v2.1/os-snapshots 0.484s 2020-12-14 02:15:40.593 193 DEBUG tempest.lib.common.rest_client [req-9793bc40-888e-4803-8a5f-bef066e7506e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "1ca786b1-db65-4553-84b9-659e54a784b8", "display_name": "tempest-VolumeRbacTest-Snapshot-1424989411"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '277', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9793bc40-888e-4803-8a5f-bef066e7506e', 'x-compute-request-id': 'req-9793bc40-888e-4803-8a5f-bef066e7506e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots'} Body: b'{"snapshot": {"id": "692e0573-ac17-4ac3-bf4f-b59953555ff4", "volumeId": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "creating", "size": 1, "createdAt": "2020-12-14T02:15:40.498931", "displayName": "tempest-VolumeRbacTest-Snapshot-1424989411", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:40.597 197 INFO tempest.lib.common.rest_client [req-d0d39b95-1304-400e-82db-0abe50b427e2 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.436s 2020-12-14 02:15:40.601 197 DEBUG tempest.lib.common.rest_client [req-d0d39b95-1304-400e-82db-0abe50b427e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2113', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d0d39b95-1304-400e-82db-0abe50b427e2', 'x-compute-request-id': 'req-d0d39b95-1304-400e-82db-0abe50b427e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "MIGRATING", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:37Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:40.616 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:40.642 189 INFO tempest.lib.common.rest_client [req-99bb4086-7860-4f74-bfaf-eb5f93f821aa ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.074s 2020-12-14 02:15:40.645 189 DEBUG tempest.lib.common.rest_client [req-99bb4086-7860-4f74-bfaf-eb5f93f821aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-99bb4086-7860-4f74-bfaf-eb5f93f821aa', 'x-compute-request-id': 'req-99bb4086-7860-4f74-bfaf-eb5f93f821aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_id": "3400d8caa66043d0b7fa128b68a28ecc", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:35Z", "status": "SAVING", "progress": 50, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:40.686 193 INFO tempest.lib.common.rest_client [req-fae34404-126a-4442-a37c-87afd60c3347 ] Request (VolumeRbacTest:test_create_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.065s 2020-12-14 02:15:40.688 193 DEBUG tempest.lib.common.rest_client [req-fae34404-126a-4442-a37c-87afd60c3347 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fae34404-126a-4442-a37c-87afd60c3347', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:40.735 193 INFO tempest.lib.common.rest_client [req-1a950216-7c3d-4da6-b2f4-0eb9bf1c6693 ] Request (VolumeRbacTest:test_create_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:15:40.738 193 DEBUG tempest.lib.common.rest_client [req-1a950216-7c3d-4da6-b2f4-0eb9bf1c6693 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a950216-7c3d-4da6-b2f4-0eb9bf1c6693', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["ES5xdnyJRiK9T_U8kzU0gw"], "expires_at": "2020-12-14T03:15:40.000000Z", "issued_at": "2020-12-14T02:15:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:40.872 193 INFO tempest.lib.common.rest_client [req-d1fba188-d2b4-432d-9ad7-8df4090f4358 ] Request (VolumeRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/692e0573-ac17-4ac3-bf4f-b59953555ff4 0.127s 2020-12-14 02:15:40.874 193 DEBUG tempest.lib.common.rest_client [req-d1fba188-d2b4-432d-9ad7-8df4090f4358 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '277', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d1fba188-d2b4-432d-9ad7-8df4090f4358', 'x-compute-request-id': 'req-d1fba188-d2b4-432d-9ad7-8df4090f4358', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/692e0573-ac17-4ac3-bf4f-b59953555ff4'} Body: b'{"snapshot": {"id": "692e0573-ac17-4ac3-bf4f-b59953555ff4", "volumeId": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "creating", "size": 1, "createdAt": "2020-12-14T02:15:40.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-1424989411", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:41.596 186 INFO tempest.lib.common.rest_client [req-b69b6bac-1d3f-40fb-8642-f4740a9c6ea3 ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938 4.724s 2020-12-14 02:15:41.599 186 DEBUG tempest.lib.common.rest_client [req-b69b6bac-1d3f-40fb-8642-f4740a9c6ea3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1538', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b69b6bac-1d3f-40fb-8642-f4740a9c6ea3', 'x-compute-request-id': 'req-b69b6bac-1d3f-40fb-8642-f4740a9c6ea3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938'} Body: b'{"server": {"id": "b0a35f9c-edec-4bd3-9016-556dbec92938", "name": "tempest-ServerConsolesMaxV25RbacTest-server-172490259", "status": "BUILD", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "user_id": "8da8a5505dcc4795bb2077f3dffc9316", "metadata": {}, "hostId": "2612188b9771d58d67f39056a6d34b234fb21eb3edf0d60e19c72a06", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:33Z", "updated": "2020-12-14T02:15:35Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:41.783 189 INFO tempest.lib.common.rest_client [req-8a32815a-292d-4529-9d2f-7d51a752e688 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.079s 2020-12-14 02:15:41.785 189 DEBUG tempest.lib.common.rest_client [req-8a32815a-292d-4529-9d2f-7d51a752e688 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8a32815a-292d-4529-9d2f-7d51a752e688', 'x-compute-request-id': 'req-8a32815a-292d-4529-9d2f-7d51a752e688', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_id": "3400d8caa66043d0b7fa128b68a28ecc", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:35Z", "status": "SAVING", "progress": 50, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:41.972 197 INFO tempest.lib.common.rest_client [req-00c31e91-dc51-46aa-b6a6-eb8c5326e328 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.243s 2020-12-14 02:15:41.975 197 DEBUG tempest.lib.common.rest_client [req-00c31e91-dc51-46aa-b6a6-eb8c5326e328 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2113', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-00c31e91-dc51-46aa-b6a6-eb8c5326e328', 'x-compute-request-id': 'req-00c31e91-dc51-46aa-b6a6-eb8c5326e328', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "MIGRATING", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:37Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:41.987 193 INFO tempest.lib.common.rest_client [req-05a55e24-45f3-4de6-8172-2c8ac2842a1b ] Request (VolumeRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/692e0573-ac17-4ac3-bf4f-b59953555ff4 0.077s 2020-12-14 02:15:41.990 193 DEBUG tempest.lib.common.rest_client [req-05a55e24-45f3-4de6-8172-2c8ac2842a1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '278', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-05a55e24-45f3-4de6-8172-2c8ac2842a1b', 'x-compute-request-id': 'req-05a55e24-45f3-4de6-8172-2c8ac2842a1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/692e0573-ac17-4ac3-bf4f-b59953555ff4'} Body: b'{"snapshot": {"id": "692e0573-ac17-4ac3-bf4f-b59953555ff4", "volumeId": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "available", "size": 1, "createdAt": "2020-12-14T02:15:40.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-1424989411", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:42.014 193 INFO tempest.common.waiters [-] snapshot 692e0573-ac17-4ac3-bf4f-b59953555ff4 reached available after waiting for 2.014074 seconds 2020-12-14 02:15:42.164 193 INFO tempest.lib.common.rest_client [req-0b20454e-1337-4461-86f0-c28b4a005291 ] Request (VolumeRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/os-snapshots/692e0573-ac17-4ac3-bf4f-b59953555ff4 0.142s 2020-12-14 02:15:42.168 193 DEBUG tempest.lib.common.rest_client [req-0b20454e-1337-4461-86f0-c28b4a005291 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0b20454e-1337-4461-86f0-c28b4a005291', 'x-compute-request-id': 'req-0b20454e-1337-4461-86f0-c28b4a005291', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/692e0573-ac17-4ac3-bf4f-b59953555ff4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:42.257 193 INFO tempest.lib.common.rest_client [req-987badc7-7ee7-45d9-9b63-dd429b2070b8 ] Request (VolumeRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/692e0573-ac17-4ac3-bf4f-b59953555ff4 0.079s 2020-12-14 02:15:42.260 193 DEBUG tempest.lib.common.rest_client [req-987badc7-7ee7-45d9-9b63-dd429b2070b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '277', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-987badc7-7ee7-45d9-9b63-dd429b2070b8', 'x-compute-request-id': 'req-987badc7-7ee7-45d9-9b63-dd429b2070b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/692e0573-ac17-4ac3-bf4f-b59953555ff4'} Body: b'{"snapshot": {"id": "692e0573-ac17-4ac3-bf4f-b59953555ff4", "volumeId": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "deleting", "size": 1, "createdAt": "2020-12-14T02:15:40.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-1424989411", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:42.913 189 INFO tempest.lib.common.rest_client [req-86279074-f26e-400c-9190-61b2c96510b9 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.074s 2020-12-14 02:15:42.917 189 DEBUG tempest.lib.common.rest_client [req-86279074-f26e-400c-9190-61b2c96510b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1722', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-86279074-f26e-400c-9190-61b2c96510b9', 'x-compute-request-id': 'req-86279074-f26e-400c-9190-61b2c96510b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_id": "3400d8caa66043d0b7fa128b68a28ecc", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:42Z", "status": "ACTIVE", "progress": 100, "OS-EXT-IMG-SIZE:size": 1073741824, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:43.045 189 INFO tempest.lib.common.rest_client [req-fc114fef-10e5-4054-9ea7-6b7433c00ec5 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.078s 2020-12-14 02:15:43.048 189 DEBUG tempest.lib.common.rest_client [req-fc114fef-10e5-4054-9ea7-6b7433c00ec5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1722', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fc114fef-10e5-4054-9ea7-6b7433c00ec5', 'x-compute-request-id': 'req-fc114fef-10e5-4054-9ea7-6b7433c00ec5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'{"image": {"id": "bf373ca7-1be1-45ed-8b48-f5993213a7b4", "name": "tempest-ServerActionsRbacTest-image-657774757", "minRam": 0, "minDisk": 1, "metadata": {"base_image_ref": "cd332004-33aa-4c81-9e50-54766a6df097", "boot_roles": "admin,member,reader", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "instance_uuid": "8a964bf0-ede1-4949-849b-ad52455f93cf", "owner_id": "3400d8caa66043d0b7fa128b68a28ecc", "owner_project_name": "tempest-ServerActionsRbacTest-1901705202", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_user_name": "tempest-ServerActionsRbacTest-1901705202", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}, "created": "2020-12-14T02:15:23Z", "updated": "2020-12-14T02:15:42Z", "status": "ACTIVE", "progress": 100, "OS-EXT-IMG-SIZE:size": 1073741824, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4"}], "server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}]}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:43.058 186 INFO tempest.lib.common.rest_client [req-456f0951-58a7-41e8-9730-0342ef55c38d ] Request (ServerConsolesMaxV25RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938 0.353s 2020-12-14 02:15:43.062 186 DEBUG tempest.lib.common.rest_client [req-456f0951-58a7-41e8-9730-0342ef55c38d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1730', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-456f0951-58a7-41e8-9730-0342ef55c38d', 'x-compute-request-id': 'req-456f0951-58a7-41e8-9730-0342ef55c38d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938'} Body: b'{"server": {"id": "b0a35f9c-edec-4bd3-9016-556dbec92938", "name": "tempest-ServerConsolesMaxV25RbacTest-server-172490259", "status": "ACTIVE", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "user_id": "8da8a5505dcc4795bb2077f3dffc9316", "metadata": {}, "hostId": "2612188b9771d58d67f39056a6d34b234fb21eb3edf0d60e19c72a06", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:33Z", "updated": "2020-12-14T02:15:41Z", "addresses": {"tempest-ServerConsolesMaxV25RbacTest-617886141-network": [{"version": 4, "addr": "192.168.120.4", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:e8:9a:76"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:40.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:43.183 186 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 10 second wait 2020-12-14 02:15:43.190 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:43.195 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.199 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.202 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.205 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.208 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.212 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.217 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.219 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.222 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.225 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.228 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.230 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.233 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.236 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.239 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.242 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.244 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.246 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.248 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.250 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.252 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.254 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.256 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.258 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.260 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.262 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.264 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.266 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.268 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.270 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.272 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.274 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.276 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.278 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.280 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.282 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.284 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.286 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.288 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.291 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.293 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.295 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.297 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.300 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.302 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.304 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.306 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.308 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.310 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.312 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.314 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.316 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.318 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.320 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.323 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.325 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.330 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.332 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.334 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.337 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.339 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.341 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.343 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.346 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.348 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.350 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.352 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.355 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.357 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.359 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.361 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.362 197 INFO tempest.lib.common.rest_client [req-154a80eb-53c5-42a0-8acf-ce09b6dafdf5 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.261s 2020-12-14 02:15:43.365 197 DEBUG tempest.lib.common.rest_client [req-154a80eb-53c5-42a0-8acf-ce09b6dafdf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2113', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-154a80eb-53c5-42a0-8acf-ce09b6dafdf5', 'x-compute-request-id': 'req-154a80eb-53c5-42a0-8acf-ce09b6dafdf5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "MIGRATING", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "0d15c4a0b6cc3d20111e4bb425b540164cba8f7bafdd34bd5f40c03b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:42Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": "migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:43.367 193 INFO tempest.lib.common.rest_client [req-15d05c63-0fd6-4872-b345-0b9d3c78f83b ] Request (VolumeRbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/os-snapshots/692e0573-ac17-4ac3-bf4f-b59953555ff4 0.076s 2020-12-14 02:15:43.370 193 DEBUG tempest.lib.common.rest_client [req-15d05c63-0fd6-4872-b345-0b9d3c78f83b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-15d05c63-0fd6-4872-b345-0b9d3c78f83b', 'x-compute-request-id': 'req-15d05c63-0fd6-4872-b345-0b9d3c78f83b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/692e0573-ac17-4ac3-bf4f-b59953555ff4'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 692e0573-ac17-4ac3-bf4f-b59953555ff4 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:43.371 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-remote-consoles, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:43.372 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:43.399 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:43.404 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.407 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.410 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.413 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.417 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.421 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.425 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.428 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.431 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.434 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.436 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.439 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.442 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.445 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.447 186 INFO tempest.lib.common.rest_client [req-78aacb96-e5f5-465c-af1e-926706799402 ] Request (ServerConsolesMaxV25RbacTest:test_get_vnc_console_output): 200 GET http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf/users/8da8a5505dcc4795bb2077f3dffc9316/roles 0.069s 2020-12-14 02:15:43.448 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.450 186 DEBUG tempest.lib.common.rest_client [req-78aacb96-e5f5-465c-af1e-926706799402 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78aacb96-e5f5-465c-af1e-926706799402', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf/users/8da8a5505dcc4795bb2077f3dffc9316/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf/users/8da8a5505dcc4795bb2077f3dffc9316/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:43.451 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.454 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.456 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.459 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.462 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.465 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.467 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.470 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.473 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.476 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.478 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.481 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.484 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.486 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.489 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.492 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.494 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.497 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.500 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.503 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.505 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.508 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.510 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.514 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.517 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.519 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.522 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.525 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.528 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.530 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.532 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.534 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.536 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.539 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.541 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.543 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.545 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.547 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.549 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.552 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.554 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.556 186 INFO tempest.lib.common.rest_client [req-a93c212d-cb2e-44c0-8485-494418c77d16 ] Request (ServerConsolesMaxV25RbacTest:test_get_vnc_console_output): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:15:43.559 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.561 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.560 186 DEBUG tempest.lib.common.rest_client [req-a93c212d-cb2e-44c0-8485-494418c77d16 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a93c212d-cb2e-44c0-8485-494418c77d16', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8da8a5505dcc4795bb2077f3dffc9316", "name": "tempest-ServerConsolesMaxV25RbacTest-444671140", "password_expires_at": null}, "audit_ids": ["z93ykI_4TASZVIF7cg1GWw"], "expires_at": "2020-12-14T03:15:43.000000Z", "issued_at": "2020-12-14T02:15:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd3f735a47fe4d66819714d36cf3c2bf", "name": "tempest-ServerConsolesMaxV25RbacTest-444671140"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:43.563 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.565 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.567 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.569 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.571 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.574 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.576 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.578 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.580 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.582 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.584 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.586 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.588 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:43.597 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes:create, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:43.599 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:43.672 193 INFO tempest.lib.common.rest_client [req-6e396296-48f5-4672-888a-b9712433600d ] Request (VolumeRbacTest:test_create_volume): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.067s 2020-12-14 02:15:43.675 193 DEBUG tempest.lib.common.rest_client [req-6e396296-48f5-4672-888a-b9712433600d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e396296-48f5-4672-888a-b9712433600d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:43.726 193 INFO tempest.lib.common.rest_client [req-d4f16428-d630-458b-8b8a-f59e2a24a9b2 ] Request (VolumeRbacTest:test_create_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:15:43.729 193 DEBUG tempest.lib.common.rest_client [req-d4f16428-d630-458b-8b8a-f59e2a24a9b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4f16428-d630-458b-8b8a-f59e2a24a9b2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["nFmY_R94RGuIYGFuyuKueQ"], "expires_at": "2020-12-14T03:15:43.000000Z", "issued_at": "2020-12-14T02:15:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:43.753 186 INFO tempest.lib.common.rest_client [req-57fedb16-efda-4e76-963e-97f7fc67788d ] Request (ServerConsolesMaxV25RbacTest:test_get_vnc_console_output): 200 POST http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938/action 0.187s 2020-12-14 02:15:43.756 186 DEBUG tempest.lib.common.rest_client [req-57fedb16-efda-4e76-963e-97f7fc67788d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-getVNCConsole": {"type": "novnc"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '132', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-57fedb16-efda-4e76-963e-97f7fc67788d', 'x-compute-request-id': 'req-57fedb16-efda-4e76-963e-97f7fc67788d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938/action'} Body: b'{"console": {"type": "novnc", "url": "http://172.30.13.94:6080/vnc_auto.html?path=%3Ftoken%3D1e12636f-b2a4-4fef-9198-dc0993bca894"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:43.770 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:43.841 186 INFO tempest.lib.common.rest_client [req-aa54760c-c119-437a-8427-36c035fc77f8 ] Request (ServerConsolesMaxV25RbacTest:test_get_vnc_console_output): 200 GET http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf/users/8da8a5505dcc4795bb2077f3dffc9316/roles 0.066s 2020-12-14 02:15:43.844 186 DEBUG tempest.lib.common.rest_client [req-aa54760c-c119-437a-8427-36c035fc77f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa54760c-c119-437a-8427-36c035fc77f8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf/users/8da8a5505dcc4795bb2077f3dffc9316/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf/users/8da8a5505dcc4795bb2077f3dffc9316/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:43.895 186 INFO tempest.lib.common.rest_client [req-150d3772-937b-4009-a1e7-367685bc0ec4 ] Request (ServerConsolesMaxV25RbacTest:test_get_vnc_console_output): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:15:43.898 186 DEBUG tempest.lib.common.rest_client [req-150d3772-937b-4009-a1e7-367685bc0ec4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-150d3772-937b-4009-a1e7-367685bc0ec4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "8da8a5505dcc4795bb2077f3dffc9316", "name": "tempest-ServerConsolesMaxV25RbacTest-444671140", "password_expires_at": null}, "audit_ids": ["ukkceCB1QCyqvfi3wwjDOQ"], "expires_at": "2020-12-14T03:15:43.000000Z", "issued_at": "2020-12-14T02:15:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd3f735a47fe4d66819714d36cf3c2bf", "name": "tempest-ServerConsolesMaxV25RbacTest-444671140"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd3f735a47fe4d66819714d36cf3c2bf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:44.178 186 INFO tempest.lib.common.rest_client [req-c61c3a79-56f6-4ba7-abcb-b89013e55b0a ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938 0.253s 2020-12-14 02:15:44.181 186 DEBUG tempest.lib.common.rest_client [req-c61c3a79-56f6-4ba7-abcb-b89013e55b0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c61c3a79-56f6-4ba7-abcb-b89013e55b0a', 'x-compute-request-id': 'req-c61c3a79-56f6-4ba7-abcb-b89013e55b0a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:44.226 193 INFO tempest.lib.common.rest_client [req-92439ce2-41d2-4d2b-8b1b-cbd77616822a ] Request (VolumeRbacTest:test_create_volume): 200 POST http://172.30.13.94/compute/v2.1/os-volumes 0.490s 2020-12-14 02:15:44.229 193 DEBUG tempest.lib.common.rest_client [req-92439ce2-41d2-4d2b-8b1b-cbd77616822a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '290', 'location': 'http://172.30.13.94/compute/v2.1/os-volumes/54490541-2479-4a9b-a7e9-6a8870d30209', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-92439ce2-41d2-4d2b-8b1b-cbd77616822a', 'x-compute-request-id': 'req-92439ce2-41d2-4d2b-8b1b-cbd77616822a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-volumes'} Body: b'{"volume": {"id": "54490541-2479-4a9b-a7e9-6a8870d30209", "status": "creating", "size": 1, "availabilityZone": "nova", "createdAt": "2020-12-14T02:15:44.000000", "attachments": [{}], "displayName": null, "displayDescription": null, "volumeType": "ceph", "snapshotId": null, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:44.268 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:44.343 193 INFO tempest.lib.common.rest_client [req-51f655ae-d4b9-48c3-9d54-5445c3b1444d ] Request (VolumeRbacTest:test_create_volume): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.067s 2020-12-14 02:15:44.347 193 DEBUG tempest.lib.common.rest_client [req-51f655ae-d4b9-48c3-9d54-5445c3b1444d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51f655ae-d4b9-48c3-9d54-5445c3b1444d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:44.397 193 INFO tempest.lib.common.rest_client [req-0f79d339-ccf5-4977-899a-6a5447c50bf1 ] Request (VolumeRbacTest:test_create_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:15:44.400 193 DEBUG tempest.lib.common.rest_client [req-0f79d339-ccf5-4977-899a-6a5447c50bf1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f79d339-ccf5-4977-899a-6a5447c50bf1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["hKyRWmQBR9-WcW3WnEvRNw"], "expires_at": "2020-12-14T03:15:44.000000Z", "issued_at": "2020-12-14T02:15:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:44.402 186 INFO tempest.lib.common.rest_client [req-dd60c42e-cdab-4c8a-b470-3981e572863d ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938 0.214s 2020-12-14 02:15:44.405 186 DEBUG tempest.lib.common.rest_client [req-dd60c42e-cdab-4c8a-b470-3981e572863d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1736', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dd60c42e-cdab-4c8a-b470-3981e572863d', 'x-compute-request-id': 'req-dd60c42e-cdab-4c8a-b470-3981e572863d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938'} Body: b'{"server": {"id": "b0a35f9c-edec-4bd3-9016-556dbec92938", "name": "tempest-ServerConsolesMaxV25RbacTest-server-172490259", "status": "ACTIVE", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "user_id": "8da8a5505dcc4795bb2077f3dffc9316", "metadata": {}, "hostId": "2612188b9771d58d67f39056a6d34b234fb21eb3edf0d60e19c72a06", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:33Z", "updated": "2020-12-14T02:15:44Z", "addresses": {"tempest-ServerConsolesMaxV25RbacTest-617886141-network": [{"version": 4, "addr": "192.168.120.4", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:e8:9a:76"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:40.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:44.528 193 INFO tempest.lib.common.rest_client [req-3a16ac4c-b25f-4c8b-9c2e-8e31ac2d0d5e ] Request (VolumeRbacTest:test_create_volume): 200 GET http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/54490541-2479-4a9b-a7e9-6a8870d30209 0.120s 2020-12-14 02:15:44.531 193 DEBUG tempest.lib.common.rest_client [req-3a16ac4c-b25f-4c8b-9c2e-8e31ac2d0d5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3a16ac4c-b25f-4c8b-9c2e-8e31ac2d0d5e', 'content-length': '1020', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3a16ac4c-b25f-4c8b-9c2e-8e31ac2d0d5e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/54490541-2479-4a9b-a7e9-6a8870d30209'} Body: b'{"volume": {"id": "54490541-2479-4a9b-a7e9-6a8870d30209", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:44.000000", "updated_at": "2020-12-14T02:15:44.000000", "name": null, "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/54490541-2479-4a9b-a7e9-6a8870d30209"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/d8830a62e0b440359acf2a0f4aa2d615/volumes/54490541-2479-4a9b-a7e9-6a8870d30209"}], "user_id": "89853a5e7af04daf9c245bb1d721ddc6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "d8830a62e0b440359acf2a0f4aa2d615"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:44.621 193 INFO tempest.common.waiters [-] volume 54490541-2479-4a9b-a7e9-6a8870d30209 reached available after waiting for 0.621350 seconds 2020-12-14 02:15:44.707 193 INFO tempest.lib.common.rest_client [req-bbf1eeb2-1d12-4017-9175-017ca468245d ] Request (VolumeRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/54490541-2479-4a9b-a7e9-6a8870d30209 0.079s 2020-12-14 02:15:44.710 193 DEBUG tempest.lib.common.rest_client [req-bbf1eeb2-1d12-4017-9175-017ca468245d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bbf1eeb2-1d12-4017-9175-017ca468245d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/54490541-2479-4a9b-a7e9-6a8870d30209'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:44.741 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:44.746 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.749 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.752 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.755 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.758 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.762 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.767 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.769 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.772 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.775 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.777 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.780 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.783 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.787 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.791 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.795 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.798 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.801 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.804 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.807 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.809 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.813 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.815 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.818 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.821 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.824 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.826 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.829 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.832 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.834 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.837 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.839 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.841 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.843 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.846 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.848 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.850 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.852 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.855 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.858 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.861 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.863 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.866 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.869 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.872 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.877 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.880 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.883 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.885 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.895 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.898 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.901 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.905 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.908 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.912 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.915 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.921 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.924 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.927 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.931 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.934 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.937 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.947 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.950 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.953 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.955 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.957 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.960 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.962 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.964 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.966 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:44.976 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes:snapshots:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:45.209 193 INFO tempest.lib.common.rest_client [req-564ea9f8-8293-46e8-9ed0-81d49ec5f250 ] Request (VolumeRbacTest:test_delete_snapshot): 200 POST http://172.30.13.94/compute/v2.1/os-snapshots 0.226s 2020-12-14 02:15:45.213 193 DEBUG tempest.lib.common.rest_client [req-564ea9f8-8293-46e8-9ed0-81d49ec5f250 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "1ca786b1-db65-4553-84b9-659e54a784b8", "display_name": "tempest-VolumeRbacTest-Snapshot-1288059243"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '277', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-564ea9f8-8293-46e8-9ed0-81d49ec5f250', 'x-compute-request-id': 'req-564ea9f8-8293-46e8-9ed0-81d49ec5f250', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots'} Body: b'{"snapshot": {"id": "23164dd3-7587-4c8f-a231-bed73978dc5a", "volumeId": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "creating", "size": 1, "createdAt": "2020-12-14T02:15:45.132227", "displayName": "tempest-VolumeRbacTest-Snapshot-1288059243", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:45.312 193 INFO tempest.lib.common.rest_client [req-21614de7-7de0-4546-913b-f71a7410bcd8 ] Request (VolumeRbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/23164dd3-7587-4c8f-a231-bed73978dc5a 0.067s 2020-12-14 02:15:45.315 193 DEBUG tempest.lib.common.rest_client [req-21614de7-7de0-4546-913b-f71a7410bcd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '277', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-21614de7-7de0-4546-913b-f71a7410bcd8', 'x-compute-request-id': 'req-21614de7-7de0-4546-913b-f71a7410bcd8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/23164dd3-7587-4c8f-a231-bed73978dc5a'} Body: b'{"snapshot": {"id": "23164dd3-7587-4c8f-a231-bed73978dc5a", "volumeId": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "creating", "size": 1, "createdAt": "2020-12-14T02:15:45.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-1288059243", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:45.408 189 INFO tempest.lib.common.rest_client [req-c1a1014e-451b-46eb-8213-ac1e131e90c9 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 2.310s 2020-12-14 02:15:45.411 189 DEBUG tempest.lib.common.rest_client [req-c1a1014e-451b-46eb-8213-ac1e131e90c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c1a1014e-451b-46eb-8213-ac1e131e90c9', 'x-compute-request-id': 'req-c1a1014e-451b-46eb-8213-ac1e131e90c9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:43Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:45.448 197 INFO tempest.lib.common.rest_client [req-a2789d16-e175-4921-831e-e9ae65941b91 ] Request (MigrateServerV225RbacTest:test_migration_live): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.956s 2020-12-14 02:15:45.451 197 DEBUG tempest.lib.common.rest_client [req-a2789d16-e175-4921-831e-e9ae65941b91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.25', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2103', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.25', 'x-openstack-nova-api-version': '2.25', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a2789d16-e175-4921-831e-e9ae65941b91', 'x-compute-request-id': 'req-a2789d16-e175-4921-831e-e9ae65941b91', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "ACTIVE", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "ce30f2a8a9c0a201ad9e84efabeea37e52a1c1323cb23692d44d7abe", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:43Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-SRV-ATTR:reservation_id": "r-u9n02jkf", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-migrateserverv225rbactest-server-779295718", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false, "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:45.515 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:45.575 197 INFO tempest.common.waiters [-] State transition "MIGRATING/migrating" ==> "ACTIVE/None" after 18 second wait 2020-12-14 02:15:45.589 189 INFO tempest.lib.common.rest_client [req-85f5fc83-1246-4ab3-b226-f9568b5bc373 ] Request (ServerActionsRbacTest:test_create_image): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.069s 2020-12-14 02:15:45.592 189 DEBUG tempest.lib.common.rest_client [req-85f5fc83-1246-4ab3-b226-f9568b5bc373 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85f5fc83-1246-4ab3-b226-f9568b5bc373', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:45.696 189 INFO tempest.lib.common.rest_client [req-0fb666d7-f4c8-494a-93f8-bc7ecf255219 ] Request (ServerActionsRbacTest:test_create_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:15:45.699 189 DEBUG tempest.lib.common.rest_client [req-0fb666d7-f4c8-494a-93f8-bc7ecf255219 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0fb666d7-f4c8-494a-93f8-bc7ecf255219', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["fvlXJSXFRFugifBlTTGm3w"], "expires_at": "2020-12-14T03:15:45.000000Z", "issued_at": "2020-12-14T02:15:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:45.719 186 INFO tempest.lib.common.rest_client [req-953f0e81-30a2-41c0-9911-e6c856693fa3 ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938 0.205s 2020-12-14 02:15:45.722 186 DEBUG tempest.lib.common.rest_client [req-953f0e81-30a2-41c0-9911-e6c856693fa3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1694', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-953f0e81-30a2-41c0-9911-e6c856693fa3', 'x-compute-request-id': 'req-953f0e81-30a2-41c0-9911-e6c856693fa3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938'} Body: b'{"server": {"id": "b0a35f9c-edec-4bd3-9016-556dbec92938", "name": "tempest-ServerConsolesMaxV25RbacTest-server-172490259", "status": "ACTIVE", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "user_id": "8da8a5505dcc4795bb2077f3dffc9316", "metadata": {}, "hostId": "2612188b9771d58d67f39056a6d34b234fb21eb3edf0d60e19c72a06", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:33Z", "updated": "2020-12-14T02:15:45Z", "addresses": {"tempest-ServerConsolesMaxV25RbacTest-617886141-network": [{"version": 4, "addr": "192.168.120.4", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:e8:9a:76"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:40.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:45.874 197 INFO tempest.lib.common.rest_client [req-7dcc82d9-b2b2-48a5-85ec-52c65175343b ] Request (MigrateServerV225RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.203s 2020-12-14 02:15:45.878 197 DEBUG tempest.lib.common.rest_client [req-7dcc82d9-b2b2-48a5-85ec-52c65175343b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7dcc82d9-b2b2-48a5-85ec-52c65175343b', 'x-compute-request-id': 'req-7dcc82d9-b2b2-48a5-85ec-52c65175343b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:46.068 189 INFO tempest.lib.common.rest_client [req-87b48553-ce8d-47c7-ae5e-963f9374255c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.283s 2020-12-14 02:15:46.071 189 DEBUG tempest.lib.common.rest_client [req-87b48553-ce8d-47c7-ae5e-963f9374255c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-87b48553-ce8d-47c7-ae5e-963f9374255c', 'x-compute-request-id': 'req-87b48553-ce8d-47c7-ae5e-963f9374255c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:43Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:46.115 197 INFO tempest.lib.common.rest_client [req-36e32d62-f645-4dd7-b964-b427f15e18a7 ] Request (MigrateServerV225RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.232s 2020-12-14 02:15:46.118 197 DEBUG tempest.lib.common.rest_client [req-36e32d62-f645-4dd7-b964-b427f15e18a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1735', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-36e32d62-f645-4dd7-b964-b427f15e18a7', 'x-compute-request-id': 'req-36e32d62-f645-4dd7-b964-b427f15e18a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "ACTIVE", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "ce30f2a8a9c0a201ad9e84efabeea37e52a1c1323cb23692d44d7abe", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:46Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:46.175 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:46.178 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.181 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.183 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.186 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.188 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.191 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.195 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.197 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.199 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.201 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.203 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.206 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.208 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.210 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.212 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.215 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.217 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.219 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.221 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.223 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.225 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.227 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.229 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.231 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.233 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.235 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.238 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.240 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.242 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.244 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.246 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.248 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.250 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.252 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.254 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.255 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.258 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.259 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.262 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.264 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.266 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.268 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.270 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.272 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.274 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.276 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.278 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.280 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.282 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.284 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.286 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.288 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.290 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.291 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.294 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.296 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.300 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.302 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.304 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.306 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.308 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.310 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.312 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.314 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.316 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.318 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.320 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.322 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.324 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.326 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.328 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:46.336 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-pause-server:pause, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:46.338 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:46.412 189 INFO tempest.lib.common.rest_client [req-1f7f7b4b-e572-435e-b6dd-a2bbb80f1f06 ] Request (ServerActionsRbacTest:test_pause_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.069s 2020-12-14 02:15:46.415 189 DEBUG tempest.lib.common.rest_client [req-1f7f7b4b-e572-435e-b6dd-a2bbb80f1f06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f7f7b4b-e572-435e-b6dd-a2bbb80f1f06', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:46.420 193 INFO tempest.lib.common.rest_client [req-2fd0a629-403d-4ab8-95a3-14a06cd4264b ] Request (VolumeRbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/23164dd3-7587-4c8f-a231-bed73978dc5a 0.076s 2020-12-14 02:15:46.424 193 DEBUG tempest.lib.common.rest_client [req-2fd0a629-403d-4ab8-95a3-14a06cd4264b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '278', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2fd0a629-403d-4ab8-95a3-14a06cd4264b', 'x-compute-request-id': 'req-2fd0a629-403d-4ab8-95a3-14a06cd4264b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/23164dd3-7587-4c8f-a231-bed73978dc5a'} Body: b'{"snapshot": {"id": "23164dd3-7587-4c8f-a231-bed73978dc5a", "volumeId": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "available", "size": 1, "createdAt": "2020-12-14T02:15:45.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-1288059243", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:46.449 193 INFO tempest.common.waiters [-] snapshot 23164dd3-7587-4c8f-a231-bed73978dc5a reached available after waiting for 1.448774 seconds 2020-12-14 02:15:46.451 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:46.464 189 INFO tempest.lib.common.rest_client [req-15c767f8-b396-40d9-bd3b-8519f6953b17 ] Request (ServerActionsRbacTest:test_pause_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:15:46.466 189 DEBUG tempest.lib.common.rest_client [req-15c767f8-b396-40d9-bd3b-8519f6953b17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15c767f8-b396-40d9-bd3b-8519f6953b17', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["iWRpJQJwQ46-t6_JrdvSWw"], "expires_at": "2020-12-14T03:15:46.000000Z", "issued_at": "2020-12-14T02:15:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:46.524 193 INFO tempest.lib.common.rest_client [req-86da6520-6318-4228-98cf-42c9da68c687 ] Request (VolumeRbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.067s 2020-12-14 02:15:46.529 193 DEBUG tempest.lib.common.rest_client [req-86da6520-6318-4228-98cf-42c9da68c687 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-86da6520-6318-4228-98cf-42c9da68c687', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:46.580 193 INFO tempest.lib.common.rest_client [req-c7d5952a-417c-40c8-9c8b-9d98fb8d10a4 ] Request (VolumeRbacTest:test_delete_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:15:46.585 193 DEBUG tempest.lib.common.rest_client [req-c7d5952a-417c-40c8-9c8b-9d98fb8d10a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7d5952a-417c-40c8-9c8b-9d98fb8d10a4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["k93Eo3_vSNabMfvUR6zTLQ"], "expires_at": "2020-12-14T03:15:46.000000Z", "issued_at": "2020-12-14T02:15:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:46.730 189 INFO tempest.lib.common.rest_client [req-5d5e4ac0-bd02-4848-927c-5ae8bc5fe7f8 ] Request (ServerActionsRbacTest:test_pause_server): 202 POST http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action 0.258s 2020-12-14 02:15:46.733 189 DEBUG tempest.lib.common.rest_client [req-5d5e4ac0-bd02-4848-927c-5ae8bc5fe7f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"pause": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5d5e4ac0-bd02-4848-927c-5ae8bc5fe7f8', 'x-compute-request-id': 'req-5d5e4ac0-bd02-4848-927c-5ae8bc5fe7f8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:46.764 193 INFO tempest.lib.common.rest_client [req-4dae904a-b423-4bd6-a525-4c859f439573 ] Request (VolumeRbacTest:test_delete_snapshot): 202 DELETE http://172.30.13.94/compute/v2.1/os-snapshots/23164dd3-7587-4c8f-a231-bed73978dc5a 0.174s 2020-12-14 02:15:46.767 193 DEBUG tempest.lib.common.rest_client [req-4dae904a-b423-4bd6-a525-4c859f439573 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4dae904a-b423-4bd6-a525-4c859f439573', 'x-compute-request-id': 'req-4dae904a-b423-4bd6-a525-4c859f439573', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/23164dd3-7587-4c8f-a231-bed73978dc5a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:46.770 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:46.833 193 INFO tempest.lib.common.rest_client [req-bce9833a-b72c-41ca-8ff0-55e012988ced ] Request (VolumeRbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.058s 2020-12-14 02:15:46.835 193 DEBUG tempest.lib.common.rest_client [req-bce9833a-b72c-41ca-8ff0-55e012988ced ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bce9833a-b72c-41ca-8ff0-55e012988ced', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:46.882 193 INFO tempest.lib.common.rest_client [req-fdc77765-8af1-4b1b-ad63-6bc7e898bbe6 ] Request (VolumeRbacTest:test_delete_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:15:46.886 193 DEBUG tempest.lib.common.rest_client [req-fdc77765-8af1-4b1b-ad63-6bc7e898bbe6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fdc77765-8af1-4b1b-ad63-6bc7e898bbe6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["HLl3XtPrRPWuL5iRc4ZfMw"], "expires_at": "2020-12-14T03:15:46.000000Z", "issued_at": "2020-12-14T02:15:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:46.976 189 INFO tempest.lib.common.rest_client [req-1de0814d-08b3-4a63-baa2-46793a1e5355 ] Request (ServerActionsRbacTest:test_pause_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.237s 2020-12-14 02:15:46.981 189 DEBUG tempest.lib.common.rest_client [req-1de0814d-08b3-4a63-baa2-46793a1e5355 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1de0814d-08b3-4a63-baa2-46793a1e5355', 'x-compute-request-id': 'req-1de0814d-08b3-4a63-baa2-46793a1e5355', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "pausing", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:46.996 186 INFO tempest.lib.common.rest_client [req-3ba3cbca-1ab5-4d21-b75d-58e3d690a2c4 ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938 0.156s 2020-12-14 02:15:46.998 186 DEBUG tempest.lib.common.rest_client [req-3ba3cbca-1ab5-4d21-b75d-58e3d690a2c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1524', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3ba3cbca-1ab5-4d21-b75d-58e3d690a2c4', 'x-compute-request-id': 'req-3ba3cbca-1ab5-4d21-b75d-58e3d690a2c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938'} Body: b'{"server": {"id": "b0a35f9c-edec-4bd3-9016-556dbec92938", "name": "tempest-ServerConsolesMaxV25RbacTest-server-172490259", "status": "DELETED", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "user_id": "8da8a5505dcc4795bb2077f3dffc9316", "metadata": {}, "hostId": "2612188b9771d58d67f39056a6d34b234fb21eb3edf0d60e19c72a06", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:33Z", "updated": "2020-12-14T02:15:46Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b0a35f9c-edec-4bd3-9016-556dbec92938"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:40.000000", "OS-SRV-USG:terminated_at": "2020-12-14T02:15:45.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:47.017 193 INFO tempest.lib.common.rest_client [req-0724ad52-aba3-4e12-8160-e34954f54b7a ] Request (VolumeRbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/23164dd3-7587-4c8f-a231-bed73978dc5a 0.123s 2020-12-14 02:15:47.020 193 DEBUG tempest.lib.common.rest_client [req-0724ad52-aba3-4e12-8160-e34954f54b7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '277', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0724ad52-aba3-4e12-8160-e34954f54b7a', 'x-compute-request-id': 'req-0724ad52-aba3-4e12-8160-e34954f54b7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/23164dd3-7587-4c8f-a231-bed73978dc5a'} Body: b'{"snapshot": {"id": "23164dd3-7587-4c8f-a231-bed73978dc5a", "volumeId": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "deleting", "size": 1, "createdAt": "2020-12-14T02:15:45.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-1288059243", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:47.097 186 INFO tempest.common.waiters [-] State transition "ACTIVE/deleting" ==> "DELETED/None" after 3 second wait 2020-12-14 02:15:47.494 197 INFO tempest.lib.common.rest_client [req-21b4b1d5-9424-45d6-a185-425f27fc057a ] Request (MigrateServerV225RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.266s 2020-12-14 02:15:47.497 197 DEBUG tempest.lib.common.rest_client [req-21b4b1d5-9424-45d6-a185-425f27fc057a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1735', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-21b4b1d5-9424-45d6-a185-425f27fc057a', 'x-compute-request-id': 'req-21b4b1d5-9424-45d6-a185-425f27fc057a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"server": {"id": "6d402a23-57e6-4ceb-905c-32d9e938c1a4", "name": "tempest-MigrateServerV225RbacTest-server-779295718", "status": "ACTIVE", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "ce30f2a8a9c0a201ad9e84efabeea37e52a1c1323cb23692d44d7abe", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:15:17Z", "updated": "2020-12-14T02:15:47Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.95", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:1c:69:50"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:24.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcb", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:48.124 193 INFO tempest.lib.common.rest_client [req-abfd3237-c10e-4984-8b3f-812b25c673a0 ] Request (VolumeRbacTest:test_delete_snapshot): 404 GET http://172.30.13.94/compute/v2.1/os-snapshots/23164dd3-7587-4c8f-a231-bed73978dc5a 0.071s 2020-12-14 02:15:48.128 193 DEBUG tempest.lib.common.rest_client [req-abfd3237-c10e-4984-8b3f-812b25c673a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-abfd3237-c10e-4984-8b3f-812b25c673a0', 'x-compute-request-id': 'req-abfd3237-c10e-4984-8b3f-812b25c673a0', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/23164dd3-7587-4c8f-a231-bed73978dc5a'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 23164dd3-7587-4c8f-a231-bed73978dc5a could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:48.177 186 INFO tempest.lib.common.rest_client [req-0afda951-4d06-4453-ad51-ecd941878551 ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938 0.072s 2020-12-14 02:15:48.179 186 DEBUG tempest.lib.common.rest_client [req-0afda951-4d06-4453-ad51-ecd941878551 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-0afda951-4d06-4453-ad51-ecd941878551', 'x-compute-request-id': 'req-0afda951-4d06-4453-ad51-ecd941878551', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b0a35f9c-edec-4bd3-9016-556dbec92938'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance b0a35f9c-edec-4bd3-9016-556dbec92938 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:48.182 186 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '8add56e9-2f51-4160-a76e-c0cd82eb917a', 'name': 'tempest-ServerConsolesMaxV25RbacTest-617886141-network', 'tenant_id': 'fd3f735a47fe4d66819714d36cf3c2bf', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'fd3f735a47fe4d66819714d36cf3c2bf', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 65, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:15:25Z', 'updated_at': '2020-12-14T02:15:25Z', 'revision_number': 1}, subnet: {'id': '0f6a0a10-fcec-4c1d-bfa6-c2aa14a7042f', 'name': 'tempest-ServerConsolesMaxV25RbacTest-617886141-subnet', 'tenant_id': 'fd3f735a47fe4d66819714d36cf3c2bf', 'network_id': '8add56e9-2f51-4160-a76e-c0cd82eb917a', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:15:26Z', 'updated_at': '2020-12-14T02:15:26Z', 'revision_number': 0, 'project_id': 'fd3f735a47fe4d66819714d36cf3c2bf'}, router: {'id': '9656777b-26fd-4a7d-a956-fadaeb0fd22c', 'name': 'tempest-ServerConsolesMaxV25RbacTest-617886141-router', 'tenant_id': 'fd3f735a47fe4d66819714d36cf3c2bf', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.37'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::153'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:15:26Z', 'updated_at': '2020-12-14T02:15:27Z', 'revision_number': 3, 'project_id': 'fd3f735a47fe4d66819714d36cf3c2bf'} _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:15:48.201 193 INFO tempest.lib.common.rest_client [req-ca7cae45-76e3-42cd-b581-1353eb399b3b ] Request (VolumeRbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/os-snapshots/23164dd3-7587-4c8f-a231-bed73978dc5a 0.064s 2020-12-14 02:15:48.203 193 DEBUG tempest.lib.common.rest_client [req-ca7cae45-76e3-42cd-b581-1353eb399b3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-ca7cae45-76e3-42cd-b581-1353eb399b3b', 'x-compute-request-id': 'req-ca7cae45-76e3-42cd-b581-1353eb399b3b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/23164dd3-7587-4c8f-a231-bed73978dc5a'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 23164dd3-7587-4c8f-a231-bed73978dc5a could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:48.235 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:48.240 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.242 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.245 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.247 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.250 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.253 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.257 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.259 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.261 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.264 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.266 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.268 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.271 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.273 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.276 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.278 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.281 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.283 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.285 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.287 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.289 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.291 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.293 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.295 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.297 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.299 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.301 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.303 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.305 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.307 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.309 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.312 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.314 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.316 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.318 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.320 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.322 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.324 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.327 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.329 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.331 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.333 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.335 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.338 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.340 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.342 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.344 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.346 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.348 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.351 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.353 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.355 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.356 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.359 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.361 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.360 189 INFO tempest.lib.common.rest_client [req-ec7dfc9e-fd98-443c-8233-58ed9b230bc1 ] Request (ServerActionsRbacTest:test_pause_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.271s 2020-12-14 02:15:48.363 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.363 189 DEBUG tempest.lib.common.rest_client [req-ec7dfc9e-fd98-443c-8233-58ed9b230bc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1703', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ec7dfc9e-fd98-443c-8233-58ed9b230bc1', 'x-compute-request-id': 'req-ec7dfc9e-fd98-443c-8233-58ed9b230bc1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "PAUSED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "paused", "OS-EXT-STS:power_state": 3, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:48.367 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.369 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.371 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.374 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.375 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.377 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.379 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.382 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.384 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.387 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.389 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.391 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.393 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.395 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.397 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:48.407 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:48.450 189 INFO tempest.common.waiters [-] State transition "ACTIVE/pausing" ==> "PAUSED/None" after 1 second wait 2020-12-14 02:15:48.452 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:48.518 189 INFO tempest.lib.common.rest_client [req-312f04f6-a6a8-4414-b706-5a0e0ecf1078 ] Request (ServerActionsRbacTest:test_pause_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.060s 2020-12-14 02:15:48.521 189 DEBUG tempest.lib.common.rest_client [req-312f04f6-a6a8-4414-b706-5a0e0ecf1078 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-312f04f6-a6a8-4414-b706-5a0e0ecf1078', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:48.569 189 INFO tempest.lib.common.rest_client [req-0fe03a49-322c-4afa-b382-b925ac1506f6 ] Request (ServerActionsRbacTest:test_pause_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:15:48.572 189 DEBUG tempest.lib.common.rest_client [req-0fe03a49-322c-4afa-b382-b925ac1506f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0fe03a49-322c-4afa-b382-b925ac1506f6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["quJwSDu-Q6S0UZzNZwL-1Q"], "expires_at": "2020-12-14T03:15:48.000000Z", "issued_at": "2020-12-14T02:15:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:48.696 197 INFO tempest.lib.common.rest_client [req-152f8f06-e9dc-42d0-9123-88cacf171fae ] Request (MigrateServerV225RbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4 0.093s 2020-12-14 02:15:48.699 197 DEBUG tempest.lib.common.rest_client [req-152f8f06-e9dc-42d0-9123-88cacf171fae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-152f8f06-e9dc-42d0-9123-88cacf171fae', 'x-compute-request-id': 'req-152f8f06-e9dc-42d0-9123-88cacf171fae', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6d402a23-57e6-4ceb-905c-32d9e938c1a4'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 6d402a23-57e6-4ceb-905c-32d9e938c1a4 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:48.765 193 INFO tempest.lib.common.rest_client [req-32d63e48-e74a-4024-955b-6966d7407b53 ] Request (VolumeRbacTest:test_delete_volume): 202 POST http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes 0.352s 2020-12-14 02:15:48.769 193 DEBUG tempest.lib.common.rest_client [req-32d63e48-e74a-4024-955b-6966d7407b53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "display_name": "tempest-VolumeRbacTest-volume-183815139"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-32d63e48-e74a-4024-955b-6966d7407b53', 'content-length': '834', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-32d63e48-e74a-4024-955b-6966d7407b53', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes'} Body: b'{"volume": {"id": "32290993-cf83-4106-916c-69cfbd7b778b", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:49.000000", "updated_at": null, "name": "tempest-VolumeRbacTest-volume-183815139", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/32290993-cf83-4106-916c-69cfbd7b778b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/d8830a62e0b440359acf2a0f4aa2d615/volumes/32290993-cf83-4106-916c-69cfbd7b778b"}], "user_id": "89853a5e7af04daf9c245bb1d721ddc6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:48.959 189 INFO tempest.lib.common.rest_client [req-2a9a3b2e-d17e-4a0d-903c-0c4a58af777d ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.378s 2020-12-14 02:15:48.959 193 INFO tempest.lib.common.rest_client [req-12b5e8f0-57e1-40f1-ab9b-089e2e00e2fc ] Request (VolumeRbacTest:test_delete_volume): 200 GET http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/32290993-cf83-4106-916c-69cfbd7b778b 0.089s 2020-12-14 02:15:48.963 189 DEBUG tempest.lib.common.rest_client [req-2a9a3b2e-d17e-4a0d-903c-0c4a58af777d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1703', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2a9a3b2e-d17e-4a0d-903c-0c4a58af777d', 'x-compute-request-id': 'req-2a9a3b2e-d17e-4a0d-903c-0c4a58af777d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "PAUSED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "paused", "OS-EXT-STS:power_state": 3, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:48.964 193 DEBUG tempest.lib.common.rest_client [req-12b5e8f0-57e1-40f1-ab9b-089e2e00e2fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-12b5e8f0-57e1-40f1-ab9b-089e2e00e2fc', 'content-length': '1056', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-12b5e8f0-57e1-40f1-ab9b-089e2e00e2fc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/32290993-cf83-4106-916c-69cfbd7b778b'} Body: b'{"volume": {"id": "32290993-cf83-4106-916c-69cfbd7b778b", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:49.000000", "updated_at": "2020-12-14T02:15:49.000000", "name": "tempest-VolumeRbacTest-volume-183815139", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/32290993-cf83-4106-916c-69cfbd7b778b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/d8830a62e0b440359acf2a0f4aa2d615/volumes/32290993-cf83-4106-916c-69cfbd7b778b"}], "user_id": "89853a5e7af04daf9c245bb1d721ddc6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "d8830a62e0b440359acf2a0f4aa2d615"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:49.255 189 INFO tempest.lib.common.rest_client [req-244d4ff1-06f6-4542-8579-86625b667543 ] Request (ServerActionsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action 0.172s 2020-12-14 02:15:49.259 189 DEBUG tempest.lib.common.rest_client [req-244d4ff1-06f6-4542-8579-86625b667543 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unpause": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-244d4ff1-06f6-4542-8579-86625b667543', 'x-compute-request-id': 'req-244d4ff1-06f6-4542-8579-86625b667543', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:49.582 189 INFO tempest.lib.common.rest_client [req-c3464df5-cf39-400f-9961-3658f017ab7a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.285s 2020-12-14 02:15:49.586 189 DEBUG tempest.lib.common.rest_client [req-c3464df5-cf39-400f-9961-3658f017ab7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1710', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c3464df5-cf39-400f-9961-3658f017ab7a', 'x-compute-request-id': 'req-c3464df5-cf39-400f-9961-3658f017ab7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "PAUSED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:49Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "unpausing", "OS-EXT-STS:vm_state": "paused", "OS-EXT-STS:power_state": 3, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:50.178 193 INFO tempest.lib.common.rest_client [req-b5bbd9e5-6318-4ab9-9e31-fc62315f6249 ] Request (VolumeRbacTest:test_delete_volume): 200 GET http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/32290993-cf83-4106-916c-69cfbd7b778b 0.086s 2020-12-14 02:15:50.182 193 DEBUG tempest.lib.common.rest_client [req-b5bbd9e5-6318-4ab9-9e31-fc62315f6249 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b5bbd9e5-6318-4ab9-9e31-fc62315f6249', 'content-length': '1057', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b5bbd9e5-6318-4ab9-9e31-fc62315f6249', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/32290993-cf83-4106-916c-69cfbd7b778b'} Body: b'{"volume": {"id": "32290993-cf83-4106-916c-69cfbd7b778b", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:49.000000", "updated_at": "2020-12-14T02:15:49.000000", "name": "tempest-VolumeRbacTest-volume-183815139", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/32290993-cf83-4106-916c-69cfbd7b778b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/d8830a62e0b440359acf2a0f4aa2d615/volumes/32290993-cf83-4106-916c-69cfbd7b778b"}], "user_id": "89853a5e7af04daf9c245bb1d721ddc6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "d8830a62e0b440359acf2a0f4aa2d615"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:50.272 193 INFO tempest.common.waiters [-] volume 32290993-cf83-4106-916c-69cfbd7b778b reached available after waiting for 1.272669 seconds 2020-12-14 02:15:50.274 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:50.299 186 INFO tempest.lib.common.rest_client [req-69570344-51b9-412f-96a1-b30ead182263 ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/9656777b-26fd-4a7d-a956-fadaeb0fd22c/remove_router_interface 2.110s 2020-12-14 02:15:50.301 186 DEBUG tempest.lib.common.rest_client [req-69570344-51b9-412f-96a1-b30ead182263 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "0f6a0a10-fcec-4c1d-bfa6-c2aa14a7042f"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-69570344-51b9-412f-96a1-b30ead182263', 'date': 'Mon, 14 Dec 2020 02:15:50 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/9656777b-26fd-4a7d-a956-fadaeb0fd22c/remove_router_interface'} Body: b'{"id": "9656777b-26fd-4a7d-a956-fadaeb0fd22c", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "port_id": "64568bdd-23e4-4eff-bdb9-11afd05e2720", "network_id": "8add56e9-2f51-4160-a76e-c0cd82eb917a", "subnet_id": "0f6a0a10-fcec-4c1d-bfa6-c2aa14a7042f", "subnet_ids": ["0f6a0a10-fcec-4c1d-bfa6-c2aa14a7042f"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:50.356 193 INFO tempest.lib.common.rest_client [req-bef09d92-ade7-40cd-922c-75e1e8ec5bc8 ] Request (VolumeRbacTest:test_delete_volume): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.075s 2020-12-14 02:15:50.359 193 DEBUG tempest.lib.common.rest_client [req-bef09d92-ade7-40cd-922c-75e1e8ec5bc8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bef09d92-ade7-40cd-922c-75e1e8ec5bc8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:50.415 193 INFO tempest.lib.common.rest_client [req-d55b52cd-6110-41e0-9181-0b227af1ef56 ] Request (VolumeRbacTest:test_delete_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:15:50.419 193 DEBUG tempest.lib.common.rest_client [req-d55b52cd-6110-41e0-9181-0b227af1ef56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d55b52cd-6110-41e0-9181-0b227af1ef56', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["sNbIy6JwQ5GYlq8jl2xsuQ"], "expires_at": "2020-12-14T03:15:50.000000Z", "issued_at": "2020-12-14T02:15:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:50.591 193 INFO tempest.lib.common.rest_client [req-65125443-07f2-4a72-b3b6-b554b4f04f25 ] Request (VolumeRbacTest:test_delete_volume): 202 DELETE http://172.30.13.94/compute/v2.1/os-volumes/32290993-cf83-4106-916c-69cfbd7b778b 0.164s 2020-12-14 02:15:50.594 193 DEBUG tempest.lib.common.rest_client [req-65125443-07f2-4a72-b3b6-b554b4f04f25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-65125443-07f2-4a72-b3b6-b554b4f04f25', 'x-compute-request-id': 'req-65125443-07f2-4a72-b3b6-b554b4f04f25', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-volumes/32290993-cf83-4106-916c-69cfbd7b778b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:50.597 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:50.676 193 INFO tempest.lib.common.rest_client [req-7061c6b7-67e2-4d5a-8291-c8c2449e3c86 ] Request (VolumeRbacTest:test_delete_volume): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.074s 2020-12-14 02:15:50.679 193 DEBUG tempest.lib.common.rest_client [req-7061c6b7-67e2-4d5a-8291-c8c2449e3c86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7061c6b7-67e2-4d5a-8291-c8c2449e3c86', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:50.732 193 INFO tempest.lib.common.rest_client [req-9e72fd7a-1f84-4e0e-878f-3948dbcd1fb2 ] Request (VolumeRbacTest:test_delete_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:15:50.736 193 DEBUG tempest.lib.common.rest_client [req-9e72fd7a-1f84-4e0e-878f-3948dbcd1fb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e72fd7a-1f84-4e0e-878f-3948dbcd1fb2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["Yuq9oPBcTpGGSgn9GJrN_Q"], "expires_at": "2020-12-14T03:15:50.000000Z", "issued_at": "2020-12-14T02:15:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:50.770 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:50.775 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.779 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.782 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.785 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.789 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.792 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.796 197 INFO tempest.lib.common.rest_client [req-39cf8bc7-0599-4ae7-a50f-8aad9a1c7f67 ] Request (MigrateServerV225RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 2.089s 2020-12-14 02:15:50.797 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.798 197 DEBUG tempest.lib.common.rest_client [req-39cf8bc7-0599-4ae7-a50f-8aad9a1c7f67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-39cf8bc7-0599-4ae7-a50f-8aad9a1c7f67', 'x-compute-request-id': 'req-39cf8bc7-0599-4ae7-a50f-8aad9a1c7f67', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:50.800 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.802 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.805 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.808 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.810 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.813 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.816 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.819 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.822 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.825 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.828 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.830 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.833 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.836 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.838 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.841 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.844 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.846 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.849 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.852 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.854 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.857 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.860 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.862 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.865 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.867 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.870 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.873 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.875 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.878 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.881 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.885 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.888 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.891 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.893 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.896 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.899 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.902 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.905 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.908 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.910 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.913 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.915 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.918 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.921 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.923 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.926 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.929 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.932 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.938 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.940 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.943 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.946 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.949 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.952 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.954 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.957 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.960 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.962 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.965 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.968 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.970 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.973 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.976 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:50.987 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes:snapshots:list, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:50.990 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:51.018 197 INFO tempest.lib.common.rest_client [req-ce8a4e08-7f68-485a-8d8b-6eb2b90fd316 ] Request (MigrateServerV225RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.213s 2020-12-14 02:15:51.021 197 DEBUG tempest.lib.common.rest_client [req-ce8a4e08-7f68-485a-8d8b-6eb2b90fd316 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1730', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ce8a4e08-7f68-485a-8d8b-6eb2b90fd316', 'x-compute-request-id': 'req-ce8a4e08-7f68-485a-8d8b-6eb2b90fd316', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "ACTIVE", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "ce30f2a8a9c0a201ad9e84efabeea37e52a1c1323cb23692d44d7abe", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:15:51Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.50", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:7d:d2:6e"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:09.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:51.053 193 INFO tempest.lib.common.rest_client [req-c12c87b4-6c4a-47f2-af20-04e4384d9c17 ] Request (VolumeRbacTest:test_list_snapshots): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.057s 2020-12-14 02:15:51.056 193 DEBUG tempest.lib.common.rest_client [req-c12c87b4-6c4a-47f2-af20-04e4384d9c17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c12c87b4-6c4a-47f2-af20-04e4384d9c17', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:51.106 193 INFO tempest.lib.common.rest_client [req-7ecff059-9e8a-46bd-ba16-d8bccbb00e1c ] Request (VolumeRbacTest:test_list_snapshots): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:15:51.109 189 INFO tempest.lib.common.rest_client [req-353412ca-171f-47ab-9e4e-4256b785e160 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.412s 2020-12-14 02:15:51.110 193 DEBUG tempest.lib.common.rest_client [req-7ecff059-9e8a-46bd-ba16-d8bccbb00e1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ecff059-9e8a-46bd-ba16-d8bccbb00e1c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["VdMw9oEKQHa0dLEqsfhuMw"], "expires_at": "2020-12-14T03:15:51.000000Z", "issued_at": "2020-12-14T02:15:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:51.113 189 DEBUG tempest.lib.common.rest_client [req-353412ca-171f-47ab-9e4e-4256b785e160 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-353412ca-171f-47ab-9e4e-4256b785e160', 'x-compute-request-id': 'req-353412ca-171f-47ab-9e4e-4256b785e160', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:49Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:51.219 189 INFO tempest.common.waiters [-] State transition "PAUSED/unpausing" ==> "ACTIVE/None" after 2 second wait 2020-12-14 02:15:51.222 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:51.227 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.230 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.231 193 INFO tempest.lib.common.rest_client [req-2c1d559c-9da4-4a7a-b7f9-33fe58ec8c09 ] Request (VolumeRbacTest:test_list_snapshots): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots 0.114s 2020-12-14 02:15:51.233 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.234 193 DEBUG tempest.lib.common.rest_client [req-2c1d559c-9da4-4a7a-b7f9-33fe58ec8c09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '17', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2c1d559c-9da4-4a7a-b7f9-33fe58ec8c09', 'x-compute-request-id': 'req-2c1d559c-9da4-4a7a-b7f9-33fe58ec8c09', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots'} Body: b'{"snapshots": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:51.236 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.240 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.244 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.249 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.252 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.254 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.257 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.258 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:51.260 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.263 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.266 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.268 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.272 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.275 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.278 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.281 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.283 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.286 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.289 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.291 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.294 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.297 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.300 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.302 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.304 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.307 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.309 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.311 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.313 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.315 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.317 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.320 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.322 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.324 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.326 193 INFO tempest.lib.common.rest_client [req-078c2134-27e5-446c-a5e6-ac312bea9c6c ] Request (VolumeRbacTest:test_list_snapshots): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.061s 2020-12-14 02:15:51.326 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.328 193 DEBUG tempest.lib.common.rest_client [req-078c2134-27e5-446c-a5e6-ac312bea9c6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-078c2134-27e5-446c-a5e6-ac312bea9c6c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:51.329 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.331 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.334 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.336 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.338 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.340 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.343 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.345 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.347 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.349 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.351 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.354 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.356 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.358 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.360 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.362 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.364 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.368 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.370 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.374 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.376 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.379 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.379 193 INFO tempest.lib.common.rest_client [req-ef660fa9-45ef-40b8-b030-6e64d136546a ] Request (VolumeRbacTest:test_list_snapshots): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:15:51.381 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.383 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.383 193 DEBUG tempest.lib.common.rest_client [req-ef660fa9-45ef-40b8-b030-6e64d136546a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef660fa9-45ef-40b8-b030-6e64d136546a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["5K-Qd9CYTwG1v_DDZnerPg"], "expires_at": "2020-12-14T03:15:51.000000Z", "issued_at": "2020-12-14T02:15:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:51.386 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.388 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.390 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.392 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.394 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.397 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.399 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.402 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.404 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.406 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.408 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:51.412 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.415 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.415 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:reboot, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:51.417 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:51.418 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.421 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.425 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.428 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.433 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.436 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.439 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.441 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.444 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.447 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.450 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.452 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.455 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.459 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.463 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.467 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.469 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.472 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.475 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.477 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.480 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.480 189 INFO tempest.lib.common.rest_client [req-e11231a7-c56e-4eb2-ba76-1b3bcfb403b6 ] Request (ServerActionsRbacTest:test_reboot_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.058s 2020-12-14 02:15:51.483 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.483 189 DEBUG tempest.lib.common.rest_client [req-e11231a7-c56e-4eb2-ba76-1b3bcfb403b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e11231a7-c56e-4eb2-ba76-1b3bcfb403b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:51.485 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.488 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.491 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.493 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.496 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.499 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.501 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.504 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.507 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.509 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.512 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.515 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.517 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.520 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.523 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.526 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.526 189 INFO tempest.lib.common.rest_client [req-4ee9a69b-4b21-41f4-b49a-fae80a347040 ] Request (ServerActionsRbacTest:test_reboot_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-12-14 02:15:51.529 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.529 189 DEBUG tempest.lib.common.rest_client [req-4ee9a69b-4b21-41f4-b49a-fae80a347040 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ee9a69b-4b21-41f4-b49a-fae80a347040', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["003m8nBkQDKPdVctiCfbVQ"], "expires_at": "2020-12-14T03:15:51.000000Z", "issued_at": "2020-12-14T02:15:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:51.531 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.534 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.537 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.540 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.543 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.545 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.548 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.551 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.553 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.556 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.559 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.561 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.564 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.568 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.570 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.576 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.579 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.581 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.584 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.587 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.590 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.592 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.595 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.597 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.600 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.603 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.605 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.608 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.610 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.613 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:51.626 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes:list, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:51.628 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:51.691 193 INFO tempest.lib.common.rest_client [req-70412a73-a5d6-4c8a-b43a-c1b00ca6c423 ] Request (VolumeRbacTest:test_list_volumes): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.058s 2020-12-14 02:15:51.693 193 DEBUG tempest.lib.common.rest_client [req-70412a73-a5d6-4c8a-b43a-c1b00ca6c423 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70412a73-a5d6-4c8a-b43a-c1b00ca6c423', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:51.740 193 INFO tempest.lib.common.rest_client [req-ec7534df-5c52-4f9d-8f03-02cc5e8c5701 ] Request (VolumeRbacTest:test_list_volumes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:15:51.741 189 INFO tempest.lib.common.rest_client [req-d25d0f89-893f-46c4-9580-8780f92bbd72 ] Request (ServerActionsRbacTest:test_reboot_server): 202 POST http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action 0.203s 2020-12-14 02:15:51.743 193 DEBUG tempest.lib.common.rest_client [req-ec7534df-5c52-4f9d-8f03-02cc5e8c5701 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec7534df-5c52-4f9d-8f03-02cc5e8c5701', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["GWsgQ9q3SZe78amMu7nstg"], "expires_at": "2020-12-14T03:15:51.000000Z", "issued_at": "2020-12-14T02:15:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:51.744 189 DEBUG tempest.lib.common.rest_client [req-d25d0f89-893f-46c4-9580-8780f92bbd72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"reboot": {"type": "HARD"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d25d0f89-893f-46c4-9580-8780f92bbd72', 'x-compute-request-id': 'req-d25d0f89-893f-46c4-9580-8780f92bbd72', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:51.747 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:51.805 189 INFO tempest.lib.common.rest_client [req-8921bf14-d046-4a5d-a42b-2c9c36daf5f8 ] Request (ServerActionsRbacTest:test_reboot_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.054s 2020-12-14 02:15:51.808 189 DEBUG tempest.lib.common.rest_client [req-8921bf14-d046-4a5d-a42b-2c9c36daf5f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8921bf14-d046-4a5d-a42b-2c9c36daf5f8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:51.854 189 INFO tempest.lib.common.rest_client [req-b8e88ac5-1f12-40d9-87b9-0dfe4bdd0f82 ] Request (ServerActionsRbacTest:test_reboot_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:15:51.858 189 DEBUG tempest.lib.common.rest_client [req-b8e88ac5-1f12-40d9-87b9-0dfe4bdd0f82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8e88ac5-1f12-40d9-87b9-0dfe4bdd0f82', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["7T1spgxvQDixnJxENGR7Gg"], "expires_at": "2020-12-14T03:15:51.000000Z", "issued_at": "2020-12-14T02:15:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:51.902 193 INFO tempest.lib.common.rest_client [req-0863d927-1f39-46f7-8560-05fedc4fc739 ] Request (VolumeRbacTest:test_list_volumes): 200 GET http://172.30.13.94/compute/v2.1/os-volumes 0.151s 2020-12-14 02:15:51.905 193 DEBUG tempest.lib.common.rest_client [req-0863d927-1f39-46f7-8560-05fedc4fc739 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '331', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0863d927-1f39-46f7-8560-05fedc4fc739', 'x-compute-request-id': 'req-0863d927-1f39-46f7-8560-05fedc4fc739', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-volumes'} Body: b'{"volumes": [{"id": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "available", "size": 1, "availabilityZone": "nova", "createdAt": "2020-12-14T02:15:38.000000", "attachments": [{}], "displayName": "tempest-VolumeRbacTest-volume-933373985", "displayDescription": null, "volumeType": "ceph", "snapshotId": null, "metadata": {}}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:51.935 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:51.994 193 INFO tempest.lib.common.rest_client [req-384c19cd-7fb1-4668-9975-16f827f109d1 ] Request (VolumeRbacTest:test_list_volumes): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.055s 2020-12-14 02:15:51.997 193 DEBUG tempest.lib.common.rest_client [req-384c19cd-7fb1-4668-9975-16f827f109d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-384c19cd-7fb1-4668-9975-16f827f109d1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:52.042 193 INFO tempest.lib.common.rest_client [req-14b48ae7-76e5-4710-a2ae-26dd91cc1d97 ] Request (VolumeRbacTest:test_list_volumes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:15:52.045 193 DEBUG tempest.lib.common.rest_client [req-14b48ae7-76e5-4710-a2ae-26dd91cc1d97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14b48ae7-76e5-4710-a2ae-26dd91cc1d97', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["SwjIAGi4SB2no8ncbEHC8w"], "expires_at": "2020-12-14T03:15:52.000000Z", "issued_at": "2020-12-14T02:15:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:52.067 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:52.070 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.073 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.075 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.077 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.080 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.083 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.087 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.089 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.091 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.094 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.096 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.098 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.100 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.102 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.105 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.107 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.109 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.112 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.114 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.116 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.118 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.120 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.122 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.125 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.127 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.129 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.131 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.132 189 INFO tempest.lib.common.rest_client [req-51cd28cb-6e59-40d1-a137-1bcb5ce3b988 ] Request (ServerActionsRbacTest:test_reboot_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.266s 2020-12-14 02:15:52.133 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.134 189 DEBUG tempest.lib.common.rest_client [req-51cd28cb-6e59-40d1-a137-1bcb5ce3b988 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1720', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-51cd28cb-6e59-40d1-a137-1bcb5ce3b988', 'x-compute-request-id': 'req-51cd28cb-6e59-40d1-a137-1bcb5ce3b988', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "HARD_REBOOT", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:52Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "rebooting_hard", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:52.135 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.137 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.139 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.141 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.143 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.146 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.148 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.150 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.152 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.154 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.156 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.159 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.161 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.163 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.165 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.167 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.170 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.172 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.174 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.176 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.178 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.180 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.182 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.184 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.186 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.188 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.191 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.193 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.198 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.200 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.202 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.204 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.206 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.208 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.211 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.213 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.215 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.217 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.219 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.221 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.223 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.225 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.227 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:52.236 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes:snapshots:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:52.324 197 INFO tempest.lib.common.rest_client [req-2b030cea-e794-4a59-b31d-b1d6c80e0f86 ] Request (MigrateServerV225RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.193s 2020-12-14 02:15:52.325 186 INFO tempest.lib.common.rest_client [req-977e2d64-47af-4eea-a469-5f2975225326 ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/9656777b-26fd-4a7d-a956-fadaeb0fd22c 2.012s 2020-12-14 02:15:52.328 186 DEBUG tempest.lib.common.rest_client [req-977e2d64-47af-4eea-a469-5f2975225326 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-977e2d64-47af-4eea-a469-5f2975225326', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:15:52 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/9656777b-26fd-4a7d-a956-fadaeb0fd22c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:52.327 197 DEBUG tempest.lib.common.rest_client [req-2b030cea-e794-4a59-b31d-b1d6c80e0f86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1688', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2b030cea-e794-4a59-b31d-b1d6c80e0f86', 'x-compute-request-id': 'req-2b030cea-e794-4a59-b31d-b1d6c80e0f86', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"server": {"id": "4fc07fc7-f3d3-4b87-9a89-62643cc36730", "name": "tempest-MigrateServerV225RbacTest-server-1036377634", "status": "ACTIVE", "tenant_id": "403869bab90a46d29a65a37723cddc04", "user_id": "18d3406b0a7a4d39a16154bd45a9d223", "metadata": {}, "hostId": "ce30f2a8a9c0a201ad9e84efabeea37e52a1c1323cb23692d44d7abe", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:48Z", "updated": "2020-12-14T02:15:52Z", "addresses": {"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f": [{"version": 4, "addr": "192.168.120.50", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:7d:d2:6e"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:09.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:52.521 193 INFO tempest.lib.common.rest_client [req-48bb20e1-a354-417e-8822-a157ef0e2190 ] Request (VolumeRbacTest:test_show_snapshot): 200 POST http://172.30.13.94/compute/v2.1/os-snapshots 0.279s 2020-12-14 02:15:52.523 193 DEBUG tempest.lib.common.rest_client [req-48bb20e1-a354-417e-8822-a157ef0e2190 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "1ca786b1-db65-4553-84b9-659e54a784b8", "display_name": "tempest-VolumeRbacTest-Snapshot-1948294731"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '277', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-48bb20e1-a354-417e-8822-a157ef0e2190', 'x-compute-request-id': 'req-48bb20e1-a354-417e-8822-a157ef0e2190', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots'} Body: b'{"snapshot": {"id": "db1a3d7e-f4f6-4671-9e84-2833f84bf59b", "volumeId": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "creating", "size": 1, "createdAt": "2020-12-14T02:15:52.436502", "displayName": "tempest-VolumeRbacTest-Snapshot-1948294731", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:52.544 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:52.619 193 INFO tempest.lib.common.rest_client [req-6e508630-b5b7-4003-8427-e5408f13eb38 ] Request (VolumeRbacTest:test_show_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.069s 2020-12-14 02:15:52.622 193 DEBUG tempest.lib.common.rest_client [req-6e508630-b5b7-4003-8427-e5408f13eb38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e508630-b5b7-4003-8427-e5408f13eb38', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:52.678 193 INFO tempest.lib.common.rest_client [req-7384364b-b2b2-46a4-b8ea-31c46e42ccde ] Request (VolumeRbacTest:test_show_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:15:52.682 193 DEBUG tempest.lib.common.rest_client [req-7384364b-b2b2-46a4-b8ea-31c46e42ccde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7384364b-b2b2-46a4-b8ea-31c46e42ccde', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["1ZZoru0ETD632gGhuhkK-A"], "expires_at": "2020-12-14T03:15:52.000000Z", "issued_at": "2020-12-14T02:15:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:52.785 186 INFO tempest.lib.common.rest_client [req-fb766d72-e32c-4fd7-a842-f8c4eea14f0a ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/0f6a0a10-fcec-4c1d-bfa6-c2aa14a7042f 0.450s 2020-12-14 02:15:52.787 186 DEBUG tempest.lib.common.rest_client [req-fb766d72-e32c-4fd7-a842-f8c4eea14f0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-fb766d72-e32c-4fd7-a842-f8c4eea14f0a', 'date': 'Mon, 14 Dec 2020 02:15:52 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/0f6a0a10-fcec-4c1d-bfa6-c2aa14a7042f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:52.812 193 INFO tempest.lib.common.rest_client [req-8589f36c-de2f-493f-8333-2caed977472b ] Request (VolumeRbacTest:test_show_snapshot): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/db1a3d7e-f4f6-4671-9e84-2833f84bf59b 0.122s 2020-12-14 02:15:52.815 193 DEBUG tempest.lib.common.rest_client [req-8589f36c-de2f-493f-8333-2caed977472b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '277', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8589f36c-de2f-493f-8333-2caed977472b', 'x-compute-request-id': 'req-8589f36c-de2f-493f-8333-2caed977472b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/db1a3d7e-f4f6-4671-9e84-2833f84bf59b'} Body: b'{"snapshot": {"id": "db1a3d7e-f4f6-4671-9e84-2833f84bf59b", "volumeId": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "creating", "size": 1, "createdAt": "2020-12-14T02:15:52.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-1948294731", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:52.840 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:52.907 193 INFO tempest.lib.common.rest_client [req-aa8cc773-27a7-42ad-8f52-134f646ca4c6 ] Request (VolumeRbacTest:test_show_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.061s 2020-12-14 02:15:52.911 193 DEBUG tempest.lib.common.rest_client [req-aa8cc773-27a7-42ad-8f52-134f646ca4c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa8cc773-27a7-42ad-8f52-134f646ca4c6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:52.963 193 INFO tempest.lib.common.rest_client [req-aa74b716-74d1-43f1-a752-3f9b13c404b3 ] Request (VolumeRbacTest:test_show_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:15:52.967 193 DEBUG tempest.lib.common.rest_client [req-aa74b716-74d1-43f1-a752-3f9b13c404b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa74b716-74d1-43f1-a752-3f9b13c404b3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["ZfNo_mknQmmk8BjHIsHhLQ"], "expires_at": "2020-12-14T03:15:52.000000Z", "issued_at": "2020-12-14T02:15:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:53.095 193 INFO tempest.lib.common.rest_client [req-579b8001-7997-4ce4-a6d3-1d08670de434 ] Request (VolumeRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/db1a3d7e-f4f6-4671-9e84-2833f84bf59b 0.118s 2020-12-14 02:15:53.098 193 DEBUG tempest.lib.common.rest_client [req-579b8001-7997-4ce4-a6d3-1d08670de434 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '278', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-579b8001-7997-4ce4-a6d3-1d08670de434', 'x-compute-request-id': 'req-579b8001-7997-4ce4-a6d3-1d08670de434', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/db1a3d7e-f4f6-4671-9e84-2833f84bf59b'} Body: b'{"snapshot": {"id": "db1a3d7e-f4f6-4671-9e84-2833f84bf59b", "volumeId": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "available", "size": 1, "createdAt": "2020-12-14T02:15:52.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-1948294731", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:53.125 193 INFO tempest.common.waiters [-] snapshot db1a3d7e-f4f6-4671-9e84-2833f84bf59b reached available after waiting for 0.125713 seconds 2020-12-14 02:15:53.250 193 INFO tempest.lib.common.rest_client [req-edcb14c6-d184-4c84-b15b-36bd0e6b4b85 ] Request (VolumeRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/os-snapshots/db1a3d7e-f4f6-4671-9e84-2833f84bf59b 0.118s 2020-12-14 02:15:53.254 193 DEBUG tempest.lib.common.rest_client [req-edcb14c6-d184-4c84-b15b-36bd0e6b4b85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-edcb14c6-d184-4c84-b15b-36bd0e6b4b85', 'x-compute-request-id': 'req-edcb14c6-d184-4c84-b15b-36bd0e6b4b85', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/db1a3d7e-f4f6-4671-9e84-2833f84bf59b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:53.337 193 INFO tempest.lib.common.rest_client [req-84a62cd2-9e4f-42af-8248-feed88497faf ] Request (VolumeRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/os-snapshots/db1a3d7e-f4f6-4671-9e84-2833f84bf59b 0.076s 2020-12-14 02:15:53.340 193 DEBUG tempest.lib.common.rest_client [req-84a62cd2-9e4f-42af-8248-feed88497faf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '277', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-84a62cd2-9e4f-42af-8248-feed88497faf', 'x-compute-request-id': 'req-84a62cd2-9e4f-42af-8248-feed88497faf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/db1a3d7e-f4f6-4671-9e84-2833f84bf59b'} Body: b'{"snapshot": {"id": "db1a3d7e-f4f6-4671-9e84-2833f84bf59b", "volumeId": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "deleting", "size": 1, "createdAt": "2020-12-14T02:15:52.000000", "displayName": "tempest-VolumeRbacTest-Snapshot-1948294731", "displayDescription": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:53.425 186 INFO tempest.lib.common.rest_client [req-ada5b997-fad2-4c39-b1f0-a24815028e50 ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/8add56e9-2f51-4160-a76e-c0cd82eb917a 0.632s 2020-12-14 02:15:53.428 186 DEBUG tempest.lib.common.rest_client [req-ada5b997-fad2-4c39-b1f0-a24815028e50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-ada5b997-fad2-4c39-b1f0-a24815028e50', 'date': 'Mon, 14 Dec 2020 02:15:53 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/8add56e9-2f51-4160-a76e-c0cd82eb917a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:53.432 189 INFO tempest.lib.common.rest_client [req-fd897591-1138-46a8-97bf-794107a2ac42 ] Request (ServerActionsRbacTest:test_reboot_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.205s 2020-12-14 02:15:53.435 189 DEBUG tempest.lib.common.rest_client [req-fd897591-1138-46a8-97bf-794107a2ac42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fd897591-1138-46a8-97bf-794107a2ac42', 'x-compute-request-id': 'req-fd897591-1138-46a8-97bf-794107a2ac42', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "HARD_REBOOT", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:53Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "reboot_started_hard", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:53.499 197 INFO tempest.lib.common.rest_client [req-471c1230-fb82-439c-860f-f2ae4838c283 ] Request (MigrateServerV225RbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730 0.078s 2020-12-14 02:15:53.502 197 DEBUG tempest.lib.common.rest_client [req-471c1230-fb82-439c-860f-f2ae4838c283 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-471c1230-fb82-439c-860f-f2ae4838c283', 'x-compute-request-id': 'req-471c1230-fb82-439c-860f-f2ae4838c283', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/4fc07fc7-f3d3-4b87-9a89-62643cc36730'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 4fc07fc7-f3d3-4b87-9a89-62643cc36730 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:53.542 189 INFO tempest.common.waiters [-] State transition "HARD_REBOOT/rebooting_hard" ==> "HARD_REBOOT/reboot_started_hard" after 1 second wait 2020-12-14 02:15:53.571 186 INFO tempest.lib.common.rest_client [req-017e24a1-3d71-4374-bf82-7b18981a8511 ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/8da8a5505dcc4795bb2077f3dffc9316 0.136s 2020-12-14 02:15:53.575 186 DEBUG tempest.lib.common.rest_client [req-017e24a1-3d71-4374-bf82-7b18981a8511 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-017e24a1-3d71-4374-bf82-7b18981a8511', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/8da8a5505dcc4795bb2077f3dffc9316'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:53.681 186 INFO tempest.lib.common.rest_client [req-f77e27f8-464f-45ee-aa09-08c911404006 ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=fd3f735a47fe4d66819714d36cf3c2bf&name=default 0.099s 2020-12-14 02:15:53.684 186 DEBUG tempest.lib.common.rest_client [req-f77e27f8-464f-45ee-aa09-08c911404006 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-f77e27f8-464f-45ee-aa09-08c911404006', 'date': 'Mon, 14 Dec 2020 02:15:53 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=fd3f735a47fe4d66819714d36cf3c2bf&name=default'} Body: b'{"security_groups": [{"id": "ccb01579-c1ff-4239-9da2-d699e0c67a78", "name": "default", "stateful": true, "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "description": "Default security group", "security_group_rules": [{"id": "05a6a500-10cb-4826-969f-16893cb0c8bf", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "security_group_id": "ccb01579-c1ff-4239-9da2-d699e0c67a78", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:15:25Z", "updated_at": "2020-12-14T02:15:25Z", "revision_number": 0, "project_id": "fd3f735a47fe4d66819714d36cf3c2bf"}, {"id": "7112e681-84e2-4918-9855-26cf911da5ca", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "security_group_id": "ccb01579-c1ff-4239-9da2-d699e0c67a78", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "ccb01579-c1ff-4239-9da2-d699e0c67a78", "description": null, "tags": [], "created_at": "2020-12-14T02:15:25Z", "updated_at": "2020-12-14T02:15:25Z", "revision_number": 0, "project_id": "fd3f735a47fe4d66819714d36cf3c2bf"}, {"id": "bea6968a-a10b-498b-b1e8-f83ec1833256", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "security_group_id": "ccb01579-c1ff-4239-9da2-d699e0c67a78", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:15:25Z", "updated_at": "2020-12-14T02:15:25Z", "revision_number": 0, "project_id": "fd3f735a47fe4d66819714d36cf3c2bf"}, {"id": "c4d2e3f7-3d28-46e2-acb2-80d30d9d9ae6", "tenant_id": "fd3f735a47fe4d66819714d36cf3c2bf", "security_group_id": "ccb01579-c1ff-4239-9da2-d699e0c67a78", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "ccb01579-c1ff-4239-9da2-d699e0c67a78", "description": null, "tags": [], "created_at": "2020-12-14T02:15:25Z", "updated_at": "2020-12-14T02:15:25Z", "revision_number": 0, "project_id": "fd3f735a47fe4d66819714d36cf3c2bf"}], "tags": [], "created_at": "2020-12-14T02:15:25Z", "updated_at": "2020-12-14T02:15:25Z", "revision_number": 1, "project_id": "fd3f735a47fe4d66819714d36cf3c2bf"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:53.680 197 INFO tempest.lib.common.rest_client [req-00563e7b-53c6-45b8-a9c8-a1b98f9b9d4c ] Request (MigrateServerV225RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/18d3406b0a7a4d39a16154bd45a9d223 0.171s 2020-12-14 02:15:53.687 197 DEBUG tempest.lib.common.rest_client [req-00563e7b-53c6-45b8-a9c8-a1b98f9b9d4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-00563e7b-53c6-45b8-a9c8-a1b98f9b9d4c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/18d3406b0a7a4d39a16154bd45a9d223'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:53.795 197 INFO tempest.lib.common.rest_client [req-edb31145-69b2-4d89-8c83-11017f6bcf8d ] Request (MigrateServerV225RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:15:53.797 197 DEBUG tempest.lib.common.rest_client [req-edb31145-69b2-4d89-8c83-11017f6bcf8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-edb31145-69b2-4d89-8c83-11017f6bcf8d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["dilw9JGISbmz3mucBbNQPw"], "expires_at": "2020-12-14T03:15:53.000000Z", "issued_at": "2020-12-14T02:15:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:53.878 186 INFO tempest.lib.common.rest_client [req-1a2199ef-1e22-4f1d-b2d3-730616764765 ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/ccb01579-c1ff-4239-9da2-d699e0c67a78 0.188s 2020-12-14 02:15:53.881 186 DEBUG tempest.lib.common.rest_client [req-1a2199ef-1e22-4f1d-b2d3-730616764765 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-1a2199ef-1e22-4f1d-b2d3-730616764765', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:15:53 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/ccb01579-c1ff-4239-9da2-d699e0c67a78'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.000 197 INFO tempest.lib.common.rest_client [req-43d66998-8c24-460b-a122-0c9414eeac47 ] Request (MigrateServerV225RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=403869bab90a46d29a65a37723cddc04&name=default 0.196s 2020-12-14 02:15:54.002 197 DEBUG tempest.lib.common.rest_client [req-43d66998-8c24-460b-a122-0c9414eeac47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-43d66998-8c24-460b-a122-0c9414eeac47', 'date': 'Mon, 14 Dec 2020 02:15:53 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=403869bab90a46d29a65a37723cddc04&name=default'} Body: b'{"security_groups": [{"id": "f8adb616-b3a7-488d-88b2-3dbd93f10b12", "name": "default", "stateful": true, "tenant_id": "403869bab90a46d29a65a37723cddc04", "description": "Default security group", "security_group_rules": [{"id": "27cd4720-3a58-4c88-a500-730908b12c11", "tenant_id": "403869bab90a46d29a65a37723cddc04", "security_group_id": "f8adb616-b3a7-488d-88b2-3dbd93f10b12", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f8adb616-b3a7-488d-88b2-3dbd93f10b12", "description": null, "tags": [], "created_at": "2020-12-14T02:14:50Z", "updated_at": "2020-12-14T02:14:50Z", "revision_number": 0, "project_id": "403869bab90a46d29a65a37723cddc04"}, {"id": "364c4722-0d30-4934-91e2-9b6b051c49c3", "tenant_id": "403869bab90a46d29a65a37723cddc04", "security_group_id": "f8adb616-b3a7-488d-88b2-3dbd93f10b12", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:50Z", "updated_at": "2020-12-14T02:14:50Z", "revision_number": 0, "project_id": "403869bab90a46d29a65a37723cddc04"}, {"id": "5fb89a2b-8079-4e5a-adf1-0e47a9f72beb", "tenant_id": "403869bab90a46d29a65a37723cddc04", "security_group_id": "f8adb616-b3a7-488d-88b2-3dbd93f10b12", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:50Z", "updated_at": "2020-12-14T02:14:50Z", "revision_number": 0, "project_id": "403869bab90a46d29a65a37723cddc04"}, {"id": "98cd68a0-109a-4f47-8255-cbdc9a32f8d1", "tenant_id": "403869bab90a46d29a65a37723cddc04", "security_group_id": "f8adb616-b3a7-488d-88b2-3dbd93f10b12", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f8adb616-b3a7-488d-88b2-3dbd93f10b12", "description": null, "tags": [], "created_at": "2020-12-14T02:14:50Z", "updated_at": "2020-12-14T02:14:50Z", "revision_number": 0, "project_id": "403869bab90a46d29a65a37723cddc04"}], "tags": [], "created_at": "2020-12-14T02:14:50Z", "updated_at": "2020-12-14T02:14:50Z", "revision_number": 1, "project_id": "403869bab90a46d29a65a37723cddc04"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.040 186 INFO tempest.lib.common.rest_client [req-06ee95c1-dc89-4fdd-a64b-30577f1295cc ] Request (ServerConsolesMaxV25RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf 0.153s 2020-12-14 02:15:54.044 186 DEBUG tempest.lib.common.rest_client [req-06ee95c1-dc89-4fdd-a64b-30577f1295cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06ee95c1-dc89-4fdd-a64b-30577f1295cc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd3f735a47fe4d66819714d36cf3c2bf'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.121 197 INFO tempest.lib.common.rest_client [req-6d93ba71-de00-4237-9631-b3bbaf4d49d3 ] Request (MigrateServerV225RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/f8adb616-b3a7-488d-88b2-3dbd93f10b12 0.112s 2020-12-14 02:15:54.125 197 DEBUG tempest.lib.common.rest_client [req-6d93ba71-de00-4237-9631-b3bbaf4d49d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6d93ba71-de00-4237-9631-b3bbaf4d49d3', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/f8adb616-b3a7-488d-88b2-3dbd93f10b12'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.173 186 INFO tempest.lib.common.rest_client [req-c68c83c7-4454-4766-86e7-13b3af0b9185 ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:15:54.175 186 DEBUG tempest.lib.common.rest_client [req-c68c83c7-4454-4766-86e7-13b3af0b9185 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c68c83c7-4454-4766-86e7-13b3af0b9185', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["rD3w9TgrSOKNCo6wzBSCDQ"], "expires_at": "2020-12-14T03:15:54.000000Z", "issued_at": "2020-12-14T02:15:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.317 197 INFO tempest.lib.common.rest_client [req-cee6fde1-cd0d-44a5-8cc4-d713c0e531da ] Request (MigrateServerV225RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04 0.185s 2020-12-14 02:15:54.321 197 DEBUG tempest.lib.common.rest_client [req-cee6fde1-cd0d-44a5-8cc4-d713c0e531da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cee6fde1-cd0d-44a5-8cc4-d713c0e531da', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/403869bab90a46d29a65a37723cddc04'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.326 186 INFO tempest.lib.common.rest_client [req-206cd002-05f0-4d54-8728-5ae32733699c ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:15:54.329 186 DEBUG tempest.lib.common.rest_client [req-206cd002-05f0-4d54-8728-5ae32733699c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-206cd002-05f0-4d54-8728-5ae32733699c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["kGwRu5xWQ6iZdrOHM_VXOA"], "expires_at": "2020-12-14T03:15:54.000000Z", "issued_at": "2020-12-14T02:15:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.400 186 INFO tempest.lib.common.rest_client [req-90b5f4e4-59b2-4d78-8b75-a7e26e03a9fe ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.064s 2020-12-14 02:15:54.403 186 DEBUG tempest.lib.common.rest_client [req-90b5f4e4-59b2-4d78-8b75-a7e26e03a9fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90b5f4e4-59b2-4d78-8b75-a7e26e03a9fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.403 197 INFO tempest.lib.common.rest_client [req-91f803a8-5df6-48a6-aed3-2dd70d9b5951 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.057s 2020-12-14 02:15:54.406 197 DEBUG tempest.lib.common.rest_client [req-91f803a8-5df6-48a6-aed3-2dd70d9b5951 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-91f803a8-5df6-48a6-aed3-2dd70d9b5951', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["MJfe4jGjSUet2BZeoiY_kQ"], "expires_at": "2020-12-14T03:15:54.000000Z", "issued_at": "2020-12-14T02:15:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.446 193 INFO tempest.lib.common.rest_client [req-678f6902-ffde-4712-8eb4-1cd8a5490bce ] Request (VolumeRbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/os-snapshots/db1a3d7e-f4f6-4671-9e84-2833f84bf59b 0.074s 2020-12-14 02:15:54.449 193 DEBUG tempest.lib.common.rest_client [req-678f6902-ffde-4712-8eb4-1cd8a5490bce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-678f6902-ffde-4712-8eb4-1cd8a5490bce', 'x-compute-request-id': 'req-678f6902-ffde-4712-8eb4-1cd8a5490bce', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-snapshots/db1a3d7e-f4f6-4671-9e84-2833f84bf59b'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot db1a3d7e-f4f6-4671-9e84-2833f84bf59b could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.477 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:54.481 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.483 186 INFO tempest.lib.common.rest_client [req-41c3b8aa-6c7f-4ec0-89e3-f6894fa6cef3 ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.073s 2020-12-14 02:15:54.485 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.486 186 DEBUG tempest.lib.common.rest_client [req-41c3b8aa-6c7f-4ec0-89e3-f6894fa6cef3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerConsolesV26RbacTest-382930008-desc", "domain_id": "default", "name": "tempest-ServerConsolesV26RbacTest-382930008"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41c3b8aa-6c7f-4ec0-89e3-f6894fa6cef3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "3af73cfc094a498ab90faa59c2482336", "name": "tempest-ServerConsolesV26RbacTest-382930008", "domain_id": "default", "description": "tempest-ServerConsolesV26RbacTest-382930008-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.488 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.491 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.495 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.499 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.504 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.506 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.509 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.512 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.515 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.517 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.520 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.523 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.526 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.529 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.532 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.535 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.537 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.540 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.542 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.545 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.548 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.550 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.553 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.556 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.556 197 INFO tempest.lib.common.rest_client [req-66f4d189-fd74-4663-93fd-9eac2979510d ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:15:54.558 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.559 197 DEBUG tempest.lib.common.rest_client [req-66f4d189-fd74-4663-93fd-9eac2979510d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66f4d189-fd74-4663-93fd-9eac2979510d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["syM-tTH7ROiUdnbkmMmxvA"], "expires_at": "2020-12-14T03:15:54.000000Z", "issued_at": "2020-12-14T02:15:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.561 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.564 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.566 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.569 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.572 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.574 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.577 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.580 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.583 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.585 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.588 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.592 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.595 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.597 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.600 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.603 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.606 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.608 186 INFO tempest.lib.common.rest_client [req-2309331d-5262-467f-a7d0-efcba32653cf ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.115s 2020-12-14 02:15:54.609 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.611 186 DEBUG tempest.lib.common.rest_client [req-2309331d-5262-467f-a7d0-efcba32653cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerConsolesV26RbacTest-382930008", "password": "D1+SjHf^edt2bur", "project_id": "3af73cfc094a498ab90faa59c2482336", "email": "tempest-ServerConsolesV26RbacTest-4304564@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '402', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2309331d-5262-467f-a7d0-efcba32653cf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "3af73cfc094a498ab90faa59c2482336", "email": "tempest-ServerConsolesV26RbacTest-4304564@example.com", "id": "735d932f2baa406eb3a0c1b7e094dee0", "name": "tempest-ServerConsolesV26RbacTest-382930008", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/735d932f2baa406eb3a0c1b7e094dee0"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.612 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.615 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.617 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.620 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.623 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.625 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.625 197 INFO tempest.lib.common.rest_client [req-1cc4beb8-0174-433d-a1cf-5dd4a9f08442 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.058s 2020-12-14 02:15:54.628 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.627 197 DEBUG tempest.lib.common.rest_client [req-1cc4beb8-0174-433d-a1cf-5dd4a9f08442 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1cc4beb8-0174-433d-a1cf-5dd4a9f08442', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.631 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.634 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.637 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.640 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.648 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.652 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.656 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.662 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.666 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.670 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.674 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.676 186 INFO tempest.lib.common.rest_client [req-56ef94b1-ec6d-4419-b1f1-6cfa4d5b834b ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-12-14 02:15:54.679 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.679 186 DEBUG tempest.lib.common.rest_client [req-56ef94b1-ec6d-4419-b1f1-6cfa4d5b834b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56ef94b1-ec6d-4419-b1f1-6cfa4d5b834b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.683 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.687 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.691 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.696 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.700 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.704 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.709 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:54.728 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-volumes:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:54.731 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:54.744 186 INFO tempest.lib.common.rest_client [req-35531605-9224-406e-9ca5-3d9801b84f46 ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:15:54.746 186 DEBUG tempest.lib.common.rest_client [req-35531605-9224-406e-9ca5-3d9801b84f46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-35531605-9224-406e-9ca5-3d9801b84f46', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.748 197 INFO tempest.lib.common.rest_client [req-6ea43f64-e36d-44b0-8a95-36aea5c64436 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.111s 2020-12-14 02:15:54.751 197 DEBUG tempest.lib.common.rest_client [req-6ea43f64-e36d-44b0-8a95-36aea5c64436 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-MiscPolicyActionsRbacTest-354750584-desc", "domain_id": "default", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ea43f64-e36d-44b0-8a95-36aea5c64436', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "domain_id": "default", "description": "tempest-MiscPolicyActionsRbacTest-354750584-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.757 189 INFO tempest.lib.common.rest_client [req-826b1f86-6a2e-469d-8166-9a1e53c38fc9 ] Request (ServerActionsRbacTest:test_reboot_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.206s 2020-12-14 02:15:54.760 189 DEBUG tempest.lib.common.rest_client [req-826b1f86-6a2e-469d-8166-9a1e53c38fc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-826b1f86-6a2e-469d-8166-9a1e53c38fc9', 'x-compute-request-id': 'req-826b1f86-6a2e-469d-8166-9a1e53c38fc9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "HARD_REBOOT", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:53Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "reboot_started_hard", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.863 197 INFO tempest.lib.common.rest_client [req-8168532a-d374-4e28-82c4-e19f85af8459 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.103s 2020-12-14 02:15:54.866 197 DEBUG tempest.lib.common.rest_client [req-8168532a-d374-4e28-82c4-e19f85af8459 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-MiscPolicyActionsRbacTest-354750584", "password": "D0%GnzM_#PAA@Qu", "project_id": "a836f1fb2f90434abc04b768f968fb5b", "email": "tempest-MiscPolicyActionsRbacTest-1343733352@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '405', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8168532a-d374-4e28-82c4-e19f85af8459', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "a836f1fb2f90434abc04b768f968fb5b", "email": "tempest-MiscPolicyActionsRbacTest-1343733352@example.com", "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/22a3021b60e04e5e8566c3079b0174a5"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.887 186 INFO tempest.lib.common.rest_client [req-c78ed230-acf6-48c4-a9a6-20806f26dceb ] Request (ServerConsolesV26RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336/users/735d932f2baa406eb3a0c1b7e094dee0/roles/72a4576c553448cd941b052c1ca0cf2d 0.132s 2020-12-14 02:15:54.890 186 DEBUG tempest.lib.common.rest_client [req-c78ed230-acf6-48c4-a9a6-20806f26dceb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c78ed230-acf6-48c4-a9a6-20806f26dceb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336/users/735d932f2baa406eb3a0c1b7e094dee0/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.893 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerConsolesV26RbacTest-382930008', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3af73cfc094a498ab90faa59c2482336', 'project_name': 'tempest-ServerConsolesV26RbacTest-382930008', 'tenant_id': '3af73cfc094a498ab90faa59c2482336', 'tenant_name': 'tempest-ServerConsolesV26RbacTest-382930008', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '735d932f2baa406eb3a0c1b7e094dee0'}, Network: None, Subnet: None, Router: None 2020-12-14 02:15:54.898 193 INFO tempest.lib.common.rest_client [req-86aa4b1b-ae64-4c03-aae0-6b1adf4b56f3 ] Request (VolumeRbacTest:test_show_volume): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.159s 2020-12-14 02:15:54.902 193 DEBUG tempest.lib.common.rest_client [req-86aa4b1b-ae64-4c03-aae0-6b1adf4b56f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-86aa4b1b-ae64-4c03-aae0-6b1adf4b56f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.980 197 INFO tempest.lib.common.rest_client [req-73c8c063-e185-4dc1-8d12-f4d2670ff914 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.104s 2020-12-14 02:15:54.982 197 DEBUG tempest.lib.common.rest_client [req-73c8c063-e185-4dc1-8d12-f4d2670ff914 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73c8c063-e185-4dc1-8d12-f4d2670ff914', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.991 193 INFO tempest.lib.common.rest_client [req-210e58d1-3d27-4a07-909b-b715e6f18714 ] Request (VolumeRbacTest:test_show_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-12-14 02:15:54.994 193 DEBUG tempest.lib.common.rest_client [req-210e58d1-3d27-4a07-909b-b715e6f18714 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-210e58d1-3d27-4a07-909b-b715e6f18714', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["ponddKMITeWs1Mr2EDzqFQ"], "expires_at": "2020-12-14T03:15:54.000000Z", "issued_at": "2020-12-14T02:15:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:54.999 186 INFO tempest.lib.common.rest_client [req-6909d08f-aac4-49a0-a536-14aa59dd84af ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:15:55.003 186 DEBUG tempest.lib.common.rest_client [req-6909d08f-aac4-49a0-a536-14aa59dd84af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6909d08f-aac4-49a0-a536-14aa59dd84af', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ZfR5Ol-9TjWQcJYRNvmegg"], "expires_at": "2020-12-14T03:15:54.000000Z", "issued_at": "2020-12-14T02:15:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:55.054 197 INFO tempest.lib.common.rest_client [req-57580dea-9b4f-4aca-85d4-70c0deb913f1 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:15:55.057 197 DEBUG tempest.lib.common.rest_client [req-57580dea-9b4f-4aca-85d4-70c0deb913f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57580dea-9b4f-4aca-85d4-70c0deb913f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:55.149 197 INFO tempest.lib.common.rest_client [req-1738ae29-01ac-48ae-b3f6-4f3b09f34b90 ] Request (MiscPolicyActionsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles/72a4576c553448cd941b052c1ca0cf2d 0.084s 2020-12-14 02:15:55.151 197 DEBUG tempest.lib.common.rest_client [req-1738ae29-01ac-48ae-b3f6-4f3b09f34b90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1738ae29-01ac-48ae-b3f6-4f3b09f34b90', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:55.154 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MiscPolicyActionsRbacTest-354750584', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a836f1fb2f90434abc04b768f968fb5b', 'project_name': 'tempest-MiscPolicyActionsRbacTest-354750584', 'tenant_id': 'a836f1fb2f90434abc04b768f968fb5b', 'tenant_name': 'tempest-MiscPolicyActionsRbacTest-354750584', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '22a3021b60e04e5e8566c3079b0174a5'}, Network: None, Subnet: None, Router: None 2020-12-14 02:15:55.230 193 INFO tempest.lib.common.rest_client [req-098ffd4f-64d9-4441-be43-c002255eeed1 ] Request (VolumeRbacTest:test_show_volume): 200 GET http://172.30.13.94/compute/v2.1/os-volumes/1ca786b1-db65-4553-84b9-659e54a784b8 0.228s 2020-12-14 02:15:55.234 193 DEBUG tempest.lib.common.rest_client [req-098ffd4f-64d9-4441-be43-c002255eeed1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '328', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-098ffd4f-64d9-4441-be43-c002255eeed1', 'x-compute-request-id': 'req-098ffd4f-64d9-4441-be43-c002255eeed1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-volumes/1ca786b1-db65-4553-84b9-659e54a784b8'} Body: b'{"volume": {"id": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "available", "size": 1, "availabilityZone": "nova", "createdAt": "2020-12-14T02:15:38.000000", "attachments": [{}], "displayName": "tempest-VolumeRbacTest-volume-933373985", "displayDescription": null, "volumeType": "ceph", "snapshotId": null, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:55.279 197 INFO tempest.lib.common.rest_client [req-9f1793b1-42b2-4bcd-8c1a-5a570bd1d455 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.118s 2020-12-14 02:15:55.282 197 DEBUG tempest.lib.common.rest_client [req-9f1793b1-42b2-4bcd-8c1a-5a570bd1d455 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f1793b1-42b2-4bcd-8c1a-5a570bd1d455', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Vz3zPXYfTg2jk55ushMN0w"], "expires_at": "2020-12-14T03:15:55.000000Z", "issued_at": "2020-12-14T02:15:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:55.285 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:55.359 193 INFO tempest.lib.common.rest_client [req-63f36758-e1f3-4300-b9f7-15e7c8d86db5 ] Request (VolumeRbacTest:test_show_volume): 200 GET http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles 0.066s 2020-12-14 02:15:55.362 193 DEBUG tempest.lib.common.rest_client [req-63f36758-e1f3-4300-b9f7-15e7c8d86db5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63f36758-e1f3-4300-b9f7-15e7c8d86db5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615/users/89853a5e7af04daf9c245bb1d721ddc6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:55.488 193 INFO tempest.lib.common.rest_client [req-300d8d5f-7eec-4eff-a809-3021e0839650 ] Request (VolumeRbacTest:test_show_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.118s 2020-12-14 02:15:55.491 193 DEBUG tempest.lib.common.rest_client [req-300d8d5f-7eec-4eff-a809-3021e0839650 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-300d8d5f-7eec-4eff-a809-3021e0839650', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "89853a5e7af04daf9c245bb1d721ddc6", "name": "tempest-VolumeRbacTest-407265222", "password_expires_at": null}, "audit_ids": ["AXGCK5NHRVaDW9LGPCaYXw"], "expires_at": "2020-12-14T03:15:55.000000Z", "issued_at": "2020-12-14T02:15:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d8830a62e0b440359acf2a0f4aa2d615", "name": "tempest-VolumeRbacTest-407265222"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d8830a62e0b440359acf2a0f4aa2d615", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:55.698 186 INFO tempest.lib.common.rest_client [req-9e8ca0aa-2d19-4424-a644-19e0f7e08e7b ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.685s 2020-12-14 02:15:55.701 186 DEBUG tempest.lib.common.rest_client [req-9e8ca0aa-2d19-4424-a644-19e0f7e08e7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerConsolesV26RbacTest-1100921850-network", "tenant_id": "3af73cfc094a498ab90faa59c2482336"}} Response - Headers: {'content-type': 'application/json', 'content-length': '741', 'x-openstack-request-id': 'req-9e8ca0aa-2d19-4424-a644-19e0f7e08e7b', 'date': 'Mon, 14 Dec 2020 02:15:55 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"7518d59b-b42b-4ec0-ae63-9dfd1a11bd25","name":"tempest-ServerConsolesV26RbacTest-1100921850-network","tenant_id":"3af73cfc094a498ab90faa59c2482336","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"3af73cfc094a498ab90faa59c2482336","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":29,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:15:55Z","updated_at":"2020-12-14T02:15:55Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:55.703 193 INFO tempest.lib.common.rest_client [req-3d6587a4-9fcd-4420-97c1-93f67a4a4656 ] Request (VolumeRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/32290993-cf83-4106-916c-69cfbd7b778b 0.168s 2020-12-14 02:15:55.706 193 DEBUG tempest.lib.common.rest_client [req-3d6587a4-9fcd-4420-97c1-93f67a4a4656 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-3d6587a4-9fcd-4420-97c1-93f67a4a4656', 'x-openstack-request-id': 'req-3d6587a4-9fcd-4420-97c1-93f67a4a4656', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/32290993-cf83-4106-916c-69cfbd7b778b'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 32290993-cf83-4106-916c-69cfbd7b778b could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:55.770 193 INFO tempest.lib.common.rest_client [req-b84a7b95-ace4-4922-b57f-f4a0e9743364 ] Request (VolumeRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/32290993-cf83-4106-916c-69cfbd7b778b 0.056s 2020-12-14 02:15:55.773 193 DEBUG tempest.lib.common.rest_client [req-b84a7b95-ace4-4922-b57f-f4a0e9743364 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-b84a7b95-ace4-4922-b57f-f4a0e9743364', 'x-openstack-request-id': 'req-b84a7b95-ace4-4922-b57f-f4a0e9743364', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/32290993-cf83-4106-916c-69cfbd7b778b'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 32290993-cf83-4106-916c-69cfbd7b778b could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:55.864 193 INFO tempest.lib.common.rest_client [req-fd443213-3150-4945-9198-c8da7fe1baaa ] Request (VolumeRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8 0.084s 2020-12-14 02:15:55.868 193 DEBUG tempest.lib.common.rest_client [req-fd443213-3150-4945-9198-c8da7fe1baaa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fd443213-3150-4945-9198-c8da7fe1baaa', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:55.957 193 INFO tempest.lib.common.rest_client [req-766008d2-54cd-4a8a-af5e-0d7fcd978e3a ] Request (VolumeRbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8 0.084s 2020-12-14 02:15:55.959 193 DEBUG tempest.lib.common.rest_client [req-766008d2-54cd-4a8a-af5e-0d7fcd978e3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-766008d2-54cd-4a8a-af5e-0d7fcd978e3a', 'content-length': '1056', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-766008d2-54cd-4a8a-af5e-0d7fcd978e3a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8'} Body: b'{"volume": {"id": "1ca786b1-db65-4553-84b9-659e54a784b8", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:15:38.000000", "updated_at": "2020-12-14T02:15:56.000000", "name": "tempest-VolumeRbacTest-volume-933373985", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8"}], "user_id": "89853a5e7af04daf9c245bb1d721ddc6", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "d8830a62e0b440359acf2a0f4aa2d615"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:56.020 197 INFO tempest.lib.common.rest_client [req-a49ba177-bb37-4a01-ab6e-1c231c98a248 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.731s 2020-12-14 02:15:56.022 197 DEBUG tempest.lib.common.rest_client [req-a49ba177-bb37-4a01-ab6e-1c231c98a248 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-MiscPolicyActionsRbacTest-2031429312-network", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b"}} Response - Headers: {'content-type': 'application/json', 'content-length': '741', 'x-openstack-request-id': 'req-a49ba177-bb37-4a01-ab6e-1c231c98a248', 'date': 'Mon, 14 Dec 2020 02:15:56 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"25a7ce63-636c-4fcd-bf14-ab20366f9481","name":"tempest-MiscPolicyActionsRbacTest-2031429312-network","tenant_id":"a836f1fb2f90434abc04b768f968fb5b","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"a836f1fb2f90434abc04b768f968fb5b","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":65,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:15:55Z","updated_at":"2020-12-14T02:15:55Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:56.333 189 INFO tempest.lib.common.rest_client [req-aba1485e-156b-4b28-9056-fca146813fee ] Request (ServerActionsRbacTest:test_reboot_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.458s 2020-12-14 02:15:56.335 189 DEBUG tempest.lib.common.rest_client [req-aba1485e-156b-4b28-9056-fca146813fee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aba1485e-156b-4b28-9056-fca146813fee', 'x-compute-request-id': 'req-aba1485e-156b-4b28-9056-fca146813fee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:55Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:56.439 189 INFO tempest.common.waiters [-] State transition "HARD_REBOOT/reboot_started_hard" ==> "ACTIVE/None" after 4 second wait 2020-12-14 02:15:56.578 186 INFO tempest.lib.common.rest_client [req-06880848-9ae4-4c4d-ae6f-d40c114f535d ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.869s 2020-12-14 02:15:56.579 186 DEBUG tempest.lib.common.rest_client [req-06880848-9ae4-4c4d-ae6f-d40c114f535d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "7518d59b-b42b-4ec0-ae63-9dfd1a11bd25", "cidr": "192.168.120.0/28", "name": "tempest-ServerConsolesV26RbacTest-1100921850-subnet", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '713', 'x-openstack-request-id': 'req-06880848-9ae4-4c4d-ae6f-d40c114f535d', 'date': 'Mon, 14 Dec 2020 02:15:56 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"7467099a-db3f-484d-9602-af405e69c233","name":"tempest-ServerConsolesV26RbacTest-1100921850-subnet","tenant_id":"3af73cfc094a498ab90faa59c2482336","network_id":"7518d59b-b42b-4ec0-ae63-9dfd1a11bd25","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:15:56Z","updated_at":"2020-12-14T02:15:56Z","revision_number":0,"project_id":"3af73cfc094a498ab90faa59c2482336"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:56.691 189 INFO tempest.lib.common.rest_client [req-07d93366-06fa-4bc6-a7ff-c0566ac4710f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.212s 2020-12-14 02:15:56.694 189 DEBUG tempest.lib.common.rest_client [req-07d93366-06fa-4bc6-a7ff-c0566ac4710f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-07d93366-06fa-4bc6-a7ff-c0566ac4710f', 'x-compute-request-id': 'req-07d93366-06fa-4bc6-a7ff-c0566ac4710f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:55Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:56.796 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:15:56.801 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.804 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.806 197 INFO tempest.lib.common.rest_client [req-e51ed688-4e08-4599-b3ca-750f9055ae6c ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.772s 2020-12-14 02:15:56.808 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.811 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.810 197 DEBUG tempest.lib.common.rest_client [req-e51ed688-4e08-4599-b3ca-750f9055ae6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "25a7ce63-636c-4fcd-bf14-ab20366f9481", "cidr": "192.168.120.0/28", "name": "tempest-MiscPolicyActionsRbacTest-2031429312-subnet", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '713', 'x-openstack-request-id': 'req-e51ed688-4e08-4599-b3ca-750f9055ae6c', 'date': 'Mon, 14 Dec 2020 02:15:56 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"f7cd92f9-1f7e-458a-9182-fbfbe2b2082b","name":"tempest-MiscPolicyActionsRbacTest-2031429312-subnet","tenant_id":"a836f1fb2f90434abc04b768f968fb5b","network_id":"25a7ce63-636c-4fcd-bf14-ab20366f9481","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:15:56Z","updated_at":"2020-12-14T02:15:56Z","revision_number":0,"project_id":"a836f1fb2f90434abc04b768f968fb5b"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:56.815 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.818 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.823 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.826 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.829 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.831 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.834 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.837 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.840 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.843 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.846 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.849 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.852 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.855 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.857 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.860 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.863 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.866 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.868 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.871 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.874 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.876 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.879 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.882 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.884 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.887 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.890 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.893 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.895 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.898 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.900 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.902 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.904 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.906 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.909 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.911 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.913 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.915 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.918 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.920 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.923 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.925 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.927 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.929 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.931 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.933 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.935 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.937 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.939 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.942 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.945 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.947 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.951 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.954 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.956 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.958 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.960 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.963 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.965 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.967 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.969 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.971 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.973 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.975 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.978 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.980 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.982 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:15:56.992 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:rebuild, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:15:56.994 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:57.055 189 INFO tempest.lib.common.rest_client [req-fcc76142-277b-4fcf-8328-1d293157768a ] Request (ServerActionsRbacTest:test_rebuild_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.055s 2020-12-14 02:15:57.058 189 DEBUG tempest.lib.common.rest_client [req-fcc76142-277b-4fcf-8328-1d293157768a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fcc76142-277b-4fcf-8328-1d293157768a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:57.146 193 INFO tempest.lib.common.rest_client [req-e6826230-a3c1-46a1-94d5-4e4a872f4cbf ] Request (VolumeRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8 0.083s 2020-12-14 02:15:57.149 193 DEBUG tempest.lib.common.rest_client [req-e6826230-a3c1-46a1-94d5-4e4a872f4cbf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-e6826230-a3c1-46a1-94d5-4e4a872f4cbf', 'x-openstack-request-id': 'req-e6826230-a3c1-46a1-94d5-4e4a872f4cbf', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/d8830a62e0b440359acf2a0f4aa2d615/volumes/1ca786b1-db65-4553-84b9-659e54a784b8'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 1ca786b1-db65-4553-84b9-659e54a784b8 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:57.161 189 INFO tempest.lib.common.rest_client [req-b462e881-6f15-4830-9812-7b209e5fe907 ] Request (ServerActionsRbacTest:test_rebuild_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:15:57.166 189 DEBUG tempest.lib.common.rest_client [req-b462e881-6f15-4830-9812-7b209e5fe907 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b462e881-6f15-4830-9812-7b209e5fe907', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["7FhwnQbBQOuFVkBFjBFcQQ"], "expires_at": "2020-12-14T03:15:57.000000Z", "issued_at": "2020-12-14T02:15:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:57.315 193 INFO tempest.lib.common.rest_client [req-15379ea7-a1f0-4af3-8cc9-ea51fb8be52c ] Request (VolumeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/89853a5e7af04daf9c245bb1d721ddc6 0.159s 2020-12-14 02:15:57.319 193 DEBUG tempest.lib.common.rest_client [req-15379ea7-a1f0-4af3-8cc9-ea51fb8be52c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15379ea7-a1f0-4af3-8cc9-ea51fb8be52c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/89853a5e7af04daf9c245bb1d721ddc6'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:57.430 193 INFO tempest.lib.common.rest_client [req-6e68c546-3f0d-434a-845f-933ba857d6d4 ] Request (VolumeRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-14 02:15:57.433 193 DEBUG tempest.lib.common.rest_client [req-6e68c546-3f0d-434a-845f-933ba857d6d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e68c546-3f0d-434a-845f-933ba857d6d4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["tLJ2ln86S4ymjeBB3jLOlw"], "expires_at": "2020-12-14T03:15:57.000000Z", "issued_at": "2020-12-14T02:15:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:57.576 189 INFO tempest.lib.common.rest_client [req-07af65a4-4745-46a3-bb69-affe675f310f ] Request (ServerActionsRbacTest:test_rebuild_server): 202 POST http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action 0.402s 2020-12-14 02:15:57.579 189 DEBUG tempest.lib.common.rest_client [req-07af65a4-4745-46a3-bb69-affe675f310f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"rebuild": {"imageRef": "cd332004-33aa-4c81-9e50-54766a6df097"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1179', 'location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-07af65a4-4745-46a3-bb69-affe675f310f', 'x-compute-request-id': 'req-07af65a4-4745-46a3-bb69-affe675f310f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "REBUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:57Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "adminPass": "uPQyM4t5Vrgh"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:57.647 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:57.717 189 INFO tempest.lib.common.rest_client [req-8bf116e8-cea4-4bd5-b0ab-77cd69d18dce ] Request (ServerActionsRbacTest:test_rebuild_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.064s 2020-12-14 02:15:57.720 189 DEBUG tempest.lib.common.rest_client [req-8bf116e8-cea4-4bd5-b0ab-77cd69d18dce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8bf116e8-cea4-4bd5-b0ab-77cd69d18dce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:57.747 193 INFO tempest.lib.common.rest_client [req-aa45dc69-945a-409c-8ba4-41e7689cced5 ] Request (VolumeRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d8830a62e0b440359acf2a0f4aa2d615&name=default 0.307s 2020-12-14 02:15:57.749 193 DEBUG tempest.lib.common.rest_client [req-aa45dc69-945a-409c-8ba4-41e7689cced5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-aa45dc69-945a-409c-8ba4-41e7689cced5', 'date': 'Mon, 14 Dec 2020 02:15:57 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d8830a62e0b440359acf2a0f4aa2d615&name=default'} Body: b'{"security_groups": [{"id": "18eab44b-c39a-4c41-9247-60816bbbc025", "name": "default", "stateful": true, "tenant_id": "d8830a62e0b440359acf2a0f4aa2d615", "description": "Default security group", "security_group_rules": [{"id": "0f62db12-4c25-4698-9d01-4ad753e27c87", "tenant_id": "d8830a62e0b440359acf2a0f4aa2d615", "security_group_id": "18eab44b-c39a-4c41-9247-60816bbbc025", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:15:57Z", "updated_at": "2020-12-14T02:15:57Z", "revision_number": 0, "project_id": "d8830a62e0b440359acf2a0f4aa2d615"}, {"id": "1015324e-1264-4bcc-aa1c-68541b0bc237", "tenant_id": "d8830a62e0b440359acf2a0f4aa2d615", "security_group_id": "18eab44b-c39a-4c41-9247-60816bbbc025", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "18eab44b-c39a-4c41-9247-60816bbbc025", "description": null, "tags": [], "created_at": "2020-12-14T02:15:57Z", "updated_at": "2020-12-14T02:15:57Z", "revision_number": 0, "project_id": "d8830a62e0b440359acf2a0f4aa2d615"}, {"id": "c50d429c-d497-4fe1-b981-da4efc174c8c", "tenant_id": "d8830a62e0b440359acf2a0f4aa2d615", "security_group_id": "18eab44b-c39a-4c41-9247-60816bbbc025", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:15:57Z", "updated_at": "2020-12-14T02:15:57Z", "revision_number": 0, "project_id": "d8830a62e0b440359acf2a0f4aa2d615"}, {"id": "f8470fa1-039e-44e1-9cd2-0f9d4f05b58c", "tenant_id": "d8830a62e0b440359acf2a0f4aa2d615", "security_group_id": "18eab44b-c39a-4c41-9247-60816bbbc025", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "18eab44b-c39a-4c41-9247-60816bbbc025", "description": null, "tags": [], "created_at": "2020-12-14T02:15:57Z", "updated_at": "2020-12-14T02:15:57Z", "revision_number": 0, "project_id": "d8830a62e0b440359acf2a0f4aa2d615"}], "tags": [], "created_at": "2020-12-14T02:15:57Z", "updated_at": "2020-12-14T02:15:57Z", "revision_number": 1, "project_id": "d8830a62e0b440359acf2a0f4aa2d615"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:57.824 189 INFO tempest.lib.common.rest_client [req-ba4521f6-0319-4044-8196-9a9d5c935aad ] Request (ServerActionsRbacTest:test_rebuild_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:15:57.829 189 DEBUG tempest.lib.common.rest_client [req-ba4521f6-0319-4044-8196-9a9d5c935aad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba4521f6-0319-4044-8196-9a9d5c935aad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["QvO0aYkbQVSjLhH_jxye2g"], "expires_at": "2020-12-14T03:15:57.000000Z", "issued_at": "2020-12-14T02:15:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:58.160 189 INFO tempest.lib.common.rest_client [req-f0773e39-09aa-4d0e-8557-e5d1b8d7f870 ] Request (ServerActionsRbacTest:test_rebuild_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.324s 2020-12-14 02:15:58.163 189 DEBUG tempest.lib.common.rest_client [req-f0773e39-09aa-4d0e-8557-e5d1b8d7f870 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f0773e39-09aa-4d0e-8557-e5d1b8d7f870', 'x-compute-request-id': 'req-f0773e39-09aa-4d0e-8557-e5d1b8d7f870', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "REBUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:58Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "rebuilding", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:58.176 193 INFO tempest.lib.common.rest_client [req-8228b25c-077f-414a-a52a-7e5337657694 ] Request (VolumeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/18eab44b-c39a-4c41-9247-60816bbbc025 0.420s 2020-12-14 02:15:58.180 193 DEBUG tempest.lib.common.rest_client [req-8228b25c-077f-414a-a52a-7e5337657694 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8228b25c-077f-414a-a52a-7e5337657694', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:15:58 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/18eab44b-c39a-4c41-9247-60816bbbc025'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:58.215 186 INFO tempest.lib.common.rest_client [req-79243ab9-863b-4dd1-8d05-691da6abcfe7 ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.628s 2020-12-14 02:15:58.220 186 DEBUG tempest.lib.common.rest_client [req-79243ab9-863b-4dd1-8d05-691da6abcfe7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerConsolesV26RbacTest-1100921850-router", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '814', 'x-openstack-request-id': 'req-79243ab9-863b-4dd1-8d05-691da6abcfe7', 'date': 'Mon, 14 Dec 2020 02:15:58 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "344d4ded-971b-4c65-b457-abaeaf9959c1", "name": "tempest-ServerConsolesV26RbacTest-1100921850-router", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.54"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::34a"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:15:56Z", "updated_at": "2020-12-14T02:15:57Z", "revision_number": 3, "project_id": "3af73cfc094a498ab90faa59c2482336"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:58.347 193 INFO tempest.lib.common.rest_client [req-966328af-6ab1-487f-a8d8-48e356897eae ] Request (VolumeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615 0.161s 2020-12-14 02:15:58.350 193 DEBUG tempest.lib.common.rest_client [req-966328af-6ab1-487f-a8d8-48e356897eae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-966328af-6ab1-487f-a8d8-48e356897eae', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d8830a62e0b440359acf2a0f4aa2d615'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:58.463 193 INFO tempest.lib.common.rest_client [req-b8d5177d-0a5d-451c-bee5-ec2bb6e5e494 ] Request (ImageNamespacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:15:58.466 193 DEBUG tempest.lib.common.rest_client [req-b8d5177d-0a5d-451c-bee5-ec2bb6e5e494 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8d5177d-0a5d-451c-bee5-ec2bb6e5e494', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["jKkwmDCgQ8quExMR7dBQcw"], "expires_at": "2020-12-14T03:15:58.000000Z", "issued_at": "2020-12-14T02:15:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:58.574 193 INFO tempest.lib.common.rest_client [req-78827c09-8429-472c-945e-d6c5bf6b7e1a ] Request (ImageNamespacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.057s 2020-12-14 02:15:58.577 193 DEBUG tempest.lib.common.rest_client [req-78827c09-8429-472c-945e-d6c5bf6b7e1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78827c09-8429-472c-945e-d6c5bf6b7e1a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["bJarRChQQ0OSTj3kcZt8tg"], "expires_at": "2020-12-14T03:15:58.000000Z", "issued_at": "2020-12-14T02:15:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:58.620 197 INFO tempest.lib.common.rest_client [req-7c45bf8a-1452-4896-8f50-0e07316b7f1c ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.798s 2020-12-14 02:15:58.623 197 DEBUG tempest.lib.common.rest_client [req-7c45bf8a-1452-4896-8f50-0e07316b7f1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-MiscPolicyActionsRbacTest-2031429312-router", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '814', 'x-openstack-request-id': 'req-7c45bf8a-1452-4896-8f50-0e07316b7f1c', 'date': 'Mon, 14 Dec 2020 02:15:58 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "91571816-e8eb-4403-9b91-8f8d1fcef93b", "name": "tempest-MiscPolicyActionsRbacTest-2031429312-router", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.72"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::11a"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:15:57Z", "updated_at": "2020-12-14T02:15:58Z", "revision_number": 3, "project_id": "a836f1fb2f90434abc04b768f968fb5b"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:58.651 193 INFO tempest.lib.common.rest_client [req-fbd13dec-d65f-4a28-99cd-648c57f9a855 ] Request (ImageNamespacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.066s 2020-12-14 02:15:58.653 193 DEBUG tempest.lib.common.rest_client [req-fbd13dec-d65f-4a28-99cd-648c57f9a855 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fbd13dec-d65f-4a28-99cd-648c57f9a855', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:58.739 193 INFO tempest.lib.common.rest_client [req-afa7e452-88b3-4343-be84-5701c1119ac7 ] Request (ImageNamespacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.078s 2020-12-14 02:15:58.741 193 DEBUG tempest.lib.common.rest_client [req-afa7e452-88b3-4343-be84-5701c1119ac7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImageNamespacesRbacTest-1338336480-desc", "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-1338336480"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-afa7e452-88b3-4343-be84-5701c1119ac7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "1505fa9a77c04287bc4e1d0c6a677744", "name": "tempest-ImageNamespacesRbacTest-1338336480", "domain_id": "default", "description": "tempest-ImageNamespacesRbacTest-1338336480-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:58.885 193 INFO tempest.lib.common.rest_client [req-88e203ed-5b62-4e0e-aee1-58b3fbe04c71 ] Request (ImageNamespacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.136s 2020-12-14 02:15:58.887 193 DEBUG tempest.lib.common.rest_client [req-88e203ed-5b62-4e0e-aee1-58b3fbe04c71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImageNamespacesRbacTest-1338336480", "password": "A6*8wjI6N#8X~y8", "project_id": "1505fa9a77c04287bc4e1d0c6a677744", "email": "tempest-ImageNamespacesRbacTest-626945894@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '401', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88e203ed-5b62-4e0e-aee1-58b3fbe04c71', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "1505fa9a77c04287bc4e1d0c6a677744", "email": "tempest-ImageNamespacesRbacTest-626945894@example.com", "id": "bdbd6e019dc34863b1e0301ab0512284", "name": "tempest-ImageNamespacesRbacTest-1338336480", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/bdbd6e019dc34863b1e0301ab0512284"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:58.957 193 INFO tempest.lib.common.rest_client [req-7440662d-e3a1-43ff-b12c-3536d6a06123 ] Request (ImageNamespacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.064s 2020-12-14 02:15:58.960 193 DEBUG tempest.lib.common.rest_client [req-7440662d-e3a1-43ff-b12c-3536d6a06123 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7440662d-e3a1-43ff-b12c-3536d6a06123', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:59.039 193 INFO tempest.lib.common.rest_client [req-ff0f989c-8e8b-4219-b688-8f3c4efd0b7c ] Request (ImageNamespacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.072s 2020-12-14 02:15:59.042 193 DEBUG tempest.lib.common.rest_client [req-ff0f989c-8e8b-4219-b688-8f3c4efd0b7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff0f989c-8e8b-4219-b688-8f3c4efd0b7c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:59.137 193 INFO tempest.lib.common.rest_client [req-4b754472-eef5-4b99-96f0-e192b3b727cb ] Request (ImageNamespacesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles/72a4576c553448cd941b052c1ca0cf2d 0.086s 2020-12-14 02:15:59.139 193 DEBUG tempest.lib.common.rest_client [req-4b754472-eef5-4b99-96f0-e192b3b727cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b754472-eef5-4b99-96f0-e192b3b727cb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:59.141 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageNamespacesRbacTest-1338336480', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1505fa9a77c04287bc4e1d0c6a677744', 'project_name': 'tempest-ImageNamespacesRbacTest-1338336480', 'tenant_id': '1505fa9a77c04287bc4e1d0c6a677744', 'tenant_name': 'tempest-ImageNamespacesRbacTest-1338336480', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'bdbd6e019dc34863b1e0301ab0512284'}, Network: None, Subnet: None, Router: None 2020-12-14 02:15:59.143 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageNamespacesRbacTest-1338336480', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1505fa9a77c04287bc4e1d0c6a677744', 'project_name': 'tempest-ImageNamespacesRbacTest-1338336480', 'tenant_id': '1505fa9a77c04287bc4e1d0c6a677744', 'tenant_name': 'tempest-ImageNamespacesRbacTest-1338336480', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'bdbd6e019dc34863b1e0301ab0512284'}, Network: None, Subnet: None, Router: None 2020-12-14 02:15:59.322 193 INFO tempest.lib.common.rest_client [req-60d5d744-b5c6-47cd-b594-d3e9602ab957 ] Request (ImageNamespacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.122s 2020-12-14 02:15:59.326 193 DEBUG tempest.lib.common.rest_client [req-60d5d744-b5c6-47cd-b594-d3e9602ab957 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60d5d744-b5c6-47cd-b594-d3e9602ab957', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdbd6e019dc34863b1e0301ab0512284", "name": "tempest-ImageNamespacesRbacTest-1338336480", "password_expires_at": null}, "audit_ids": ["6zTjNCaNSHSeLUKALvowqQ"], "expires_at": "2020-12-14T03:15:59.000000Z", "issued_at": "2020-12-14T02:15:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1505fa9a77c04287bc4e1d0c6a677744", "name": "tempest-ImageNamespacesRbacTest-1338336480"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:59.448 193 INFO tempest.lib.common.rest_client [req-16f437d0-c352-4012-a924-12502dd1ac05 ] Request (ImageNamespacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-12-14 02:15:59.452 193 DEBUG tempest.lib.common.rest_client [req-16f437d0-c352-4012-a924-12502dd1ac05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16f437d0-c352-4012-a924-12502dd1ac05', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["nyZL0w4xQmao30zBtu00eA"], "expires_at": "2020-12-14T03:15:59.000000Z", "issued_at": "2020-12-14T02:15:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:59.481 189 INFO tempest.lib.common.rest_client [req-c25eb005-9881-491f-8aa0-1c7448f6862c ] Request (ServerActionsRbacTest:test_rebuild_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.229s 2020-12-14 02:15:59.484 189 DEBUG tempest.lib.common.rest_client [req-c25eb005-9881-491f-8aa0-1c7448f6862c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1733', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c25eb005-9881-491f-8aa0-1c7448f6862c', 'x-compute-request-id': 'req-c25eb005-9881-491f-8aa0-1c7448f6862c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "REBUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:59Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "rebuild_spawning", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:59.568 189 INFO tempest.common.waiters [-] State transition "REBUILD/rebuilding" ==> "REBUILD/rebuild_spawning" after 1 second wait 2020-12-14 02:15:59.598 193 INFO tempest.lib.common.rest_client [req-d9df4460-bc23-4e25-9ce8-d5c77f2cc878 ] Request (ImageNamespacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:15:59.602 193 DEBUG tempest.lib.common.rest_client [req-d9df4460-bc23-4e25-9ce8-d5c77f2cc878 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9df4460-bc23-4e25-9ce8-d5c77f2cc878', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["YZw3s_n1ThuzF-pUcnrWYA"], "expires_at": "2020-12-14T03:15:59.000000Z", "issued_at": "2020-12-14T02:15:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:59.677 193 INFO tempest.lib.common.rest_client [req-a7a1d81e-e3fb-4d15-91f7-8b8c08d6eff1 ] Request (ImageNamespacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.066s 2020-12-14 02:15:59.680 193 DEBUG tempest.lib.common.rest_client [req-a7a1d81e-e3fb-4d15-91f7-8b8c08d6eff1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7a1d81e-e3fb-4d15-91f7-8b8c08d6eff1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:59.754 193 INFO tempest.lib.common.rest_client [req-f6f8f17f-2604-4f92-8aca-a89089cd0076 ] Request (ImageNamespacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:15:59.757 193 DEBUG tempest.lib.common.rest_client [req-f6f8f17f-2604-4f92-8aca-a89089cd0076 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6f8f17f-2604-4f92-8aca-a89089cd0076', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:59.760 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:15:59.763 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:15:59.831 193 INFO tempest.lib.common.rest_client [req-52c9ec65-b059-46e2-af71-2f685cc18049 ] Request (ImageNamespacesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles 0.062s 2020-12-14 02:15:59.834 193 DEBUG tempest.lib.common.rest_client [req-52c9ec65-b059-46e2-af71-2f685cc18049 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52c9ec65-b059-46e2-af71-2f685cc18049', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:15:59.922 193 INFO tempest.lib.common.rest_client [req-1c188dba-c8d5-47a3-8d2b-15c253704ec0 ] Request (ImageNamespacesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles/72a4576c553448cd941b052c1ca0cf2d 0.081s 2020-12-14 02:15:59.926 193 DEBUG tempest.lib.common.rest_client [req-1c188dba-c8d5-47a3-8d2b-15c253704ec0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c188dba-c8d5-47a3-8d2b-15c253704ec0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:00.033 193 INFO tempest.lib.common.rest_client [req-a7c8ee01-c241-4c42-b85e-0c93025a6f35 ] Request (ImageNamespacesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles/a629c95d64b3416fb80ae90af4f69c05 0.100s 2020-12-14 02:16:00.035 193 DEBUG tempest.lib.common.rest_client [req-a7c8ee01-c241-4c42-b85e-0c93025a6f35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:15:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7c8ee01-c241-4c42-b85e-0c93025a6f35', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:00.473 186 INFO tempest.lib.common.rest_client [req-0f42f17c-83e3-4450-b61d-117744df81b6 ] Request (ServerConsolesV26RbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/344d4ded-971b-4c65-b457-abaeaf9959c1/add_router_interface 2.243s 2020-12-14 02:16:00.476 186 DEBUG tempest.lib.common.rest_client [req-0f42f17c-83e3-4450-b61d-117744df81b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "7467099a-db3f-484d-9602-af405e69c233"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-0f42f17c-83e3-4450-b61d-117744df81b6', 'date': 'Mon, 14 Dec 2020 02:16:00 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/344d4ded-971b-4c65-b457-abaeaf9959c1/add_router_interface'} Body: b'{"id": "344d4ded-971b-4c65-b457-abaeaf9959c1", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "port_id": "640efe20-66bd-45d0-be1f-96ff681e1f20", "network_id": "7518d59b-b42b-4ec0-ae63-9dfd1a11bd25", "subnet_id": "7467099a-db3f-484d-9602-af405e69c233", "subnet_ids": ["7467099a-db3f-484d-9602-af405e69c233"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:00.478 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerConsolesV26RbacTest-382930008', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3af73cfc094a498ab90faa59c2482336', 'project_name': 'tempest-ServerConsolesV26RbacTest-382930008', 'tenant_id': '3af73cfc094a498ab90faa59c2482336', 'tenant_name': 'tempest-ServerConsolesV26RbacTest-382930008', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '735d932f2baa406eb3a0c1b7e094dee0'}, Network: {'id': '7518d59b-b42b-4ec0-ae63-9dfd1a11bd25', 'name': 'tempest-ServerConsolesV26RbacTest-1100921850-network', 'tenant_id': '3af73cfc094a498ab90faa59c2482336', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3af73cfc094a498ab90faa59c2482336', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:15:55Z', 'updated_at': '2020-12-14T02:15:55Z', 'revision_number': 1}, Subnet: {'id': '7467099a-db3f-484d-9602-af405e69c233', 'name': 'tempest-ServerConsolesV26RbacTest-1100921850-subnet', 'tenant_id': '3af73cfc094a498ab90faa59c2482336', 'network_id': '7518d59b-b42b-4ec0-ae63-9dfd1a11bd25', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:15:56Z', 'updated_at': '2020-12-14T02:15:56Z', 'revision_number': 0, 'project_id': '3af73cfc094a498ab90faa59c2482336'}, Router: {'id': '344d4ded-971b-4c65-b457-abaeaf9959c1', 'name': 'tempest-ServerConsolesV26RbacTest-1100921850-router', 'tenant_id': '3af73cfc094a498ab90faa59c2482336', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.54'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::34a'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:15:56Z', 'updated_at': '2020-12-14T02:15:57Z', 'revision_number': 3, 'project_id': '3af73cfc094a498ab90faa59c2482336'} 2020-12-14 02:16:00.642 186 INFO tempest.lib.common.rest_client [req-d6d8dbe6-e76d-49ef-b320-257bef749a9d ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:16:00.645 186 DEBUG tempest.lib.common.rest_client [req-d6d8dbe6-e76d-49ef-b320-257bef749a9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6d8dbe6-e76d-49ef-b320-257bef749a9d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "735d932f2baa406eb3a0c1b7e094dee0", "name": "tempest-ServerConsolesV26RbacTest-382930008", "password_expires_at": null}, "audit_ids": ["F8V3m4d4RmqYN7IoBBx4LQ"], "expires_at": "2020-12-14T03:16:00.000000Z", "issued_at": "2020-12-14T02:16:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3af73cfc094a498ab90faa59c2482336", "name": "tempest-ServerConsolesV26RbacTest-382930008"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:00.766 186 INFO tempest.lib.common.rest_client [req-c8dbee64-1a66-485f-8f1c-a5e51ac96b8c ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-12-14 02:16:00.768 186 DEBUG tempest.lib.common.rest_client [req-c8dbee64-1a66-485f-8f1c-a5e51ac96b8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8dbee64-1a66-485f-8f1c-a5e51ac96b8c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["UPbTb3z_T92gDB3U1mFG3w"], "expires_at": "2020-12-14T03:16:00.000000Z", "issued_at": "2020-12-14T02:16:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:00.792 189 INFO tempest.lib.common.rest_client [req-9df66dcb-c688-49ca-a43e-725e2cd550b1 ] Request (ServerActionsRbacTest:test_rebuild_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.216s 2020-12-14 02:16:00.795 189 DEBUG tempest.lib.common.rest_client [req-9df66dcb-c688-49ca-a43e-725e2cd550b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1733', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9df66dcb-c688-49ca-a43e-725e2cd550b1', 'x-compute-request-id': 'req-9df66dcb-c688-49ca-a43e-725e2cd550b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "REBUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:15:59Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:15:03.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "rebuild_spawning", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:00.887 186 INFO tempest.lib.common.rest_client [req-fc00116b-7b2c-4d9a-ae1b-f92bfac03fda ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:16:00.890 186 DEBUG tempest.lib.common.rest_client [req-fc00116b-7b2c-4d9a-ae1b-f92bfac03fda ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc00116b-7b2c-4d9a-ae1b-f92bfac03fda', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["yrMz9U_nTj6BprqAxEa8Yw"], "expires_at": "2020-12-14T03:16:00.000000Z", "issued_at": "2020-12-14T02:16:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:00.954 186 INFO tempest.lib.common.rest_client [req-d58b047a-3c9d-4832-898f-8036e92d026e ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.056s 2020-12-14 02:16:00.957 186 DEBUG tempest.lib.common.rest_client [req-d58b047a-3c9d-4832-898f-8036e92d026e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d58b047a-3c9d-4832-898f-8036e92d026e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:01.030 186 INFO tempest.lib.common.rest_client [req-ad1b657a-b51e-4d81-9622-1071c663130a ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.065s 2020-12-14 02:16:01.032 186 DEBUG tempest.lib.common.rest_client [req-ad1b657a-b51e-4d81-9622-1071c663130a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad1b657a-b51e-4d81-9622-1071c663130a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:01.035 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:16:01.037 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:01.108 186 INFO tempest.lib.common.rest_client [req-0099ec80-5e32-453b-aedd-127c0f7d7690 ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336/users/735d932f2baa406eb3a0c1b7e094dee0/roles 0.065s 2020-12-14 02:16:01.111 186 DEBUG tempest.lib.common.rest_client [req-0099ec80-5e32-453b-aedd-127c0f7d7690 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0099ec80-5e32-453b-aedd-127c0f7d7690', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336/users/735d932f2baa406eb3a0c1b7e094dee0/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336/users/735d932f2baa406eb3a0c1b7e094dee0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:01.146 193 INFO tempest.lib.common.rest_client [req-d3b173a0-03d2-4785-a316-b9ec12a75f6c ] Request (ImageNamespacesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:16:01.149 193 DEBUG tempest.lib.common.rest_client [req-d3b173a0-03d2-4785-a316-b9ec12a75f6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3b173a0-03d2-4785-a316-b9ec12a75f6c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdbd6e019dc34863b1e0301ab0512284", "name": "tempest-ImageNamespacesRbacTest-1338336480", "password_expires_at": null}, "audit_ids": ["E8g3HAqGTquZQsoYVgxDeQ"], "expires_at": "2020-12-14T03:16:01.000000Z", "issued_at": "2020-12-14T02:16:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1505fa9a77c04287bc4e1d0c6a677744", "name": "tempest-ImageNamespacesRbacTest-1338336480"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:01.159 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:01.184 186 INFO tempest.lib.common.rest_client [req-9b762963-c70a-44bd-99eb-b856964a3698 ] Request (ServerConsolesV26RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336/users/735d932f2baa406eb3a0c1b7e094dee0/roles/72a4576c553448cd941b052c1ca0cf2d 0.067s 2020-12-14 02:16:01.186 186 DEBUG tempest.lib.common.rest_client [req-9b762963-c70a-44bd-99eb-b856964a3698 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b762963-c70a-44bd-99eb-b856964a3698', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336/users/735d932f2baa406eb3a0c1b7e094dee0/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:01.199 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:01.208 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_metadef_namespace, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:01.211 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:01.327 186 INFO tempest.lib.common.rest_client [req-3760fec9-2628-40a4-8c17-e9a9529a6aae ] Request (ServerConsolesV26RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336/users/735d932f2baa406eb3a0c1b7e094dee0/roles/a629c95d64b3416fb80ae90af4f69c05 0.134s 2020-12-14 02:16:01.329 186 DEBUG tempest.lib.common.rest_client [req-3760fec9-2628-40a4-8c17-e9a9529a6aae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3760fec9-2628-40a4-8c17-e9a9529a6aae', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336/users/735d932f2baa406eb3a0c1b7e094dee0/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:01.336 193 INFO tempest.lib.common.rest_client [req-0d869983-c32b-4395-9dc5-ebc922db6ec5 ] Request (ImageNamespacesRbacTest:test_create_metadef_namespace): 200 GET http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles 0.120s 2020-12-14 02:16:01.339 193 DEBUG tempest.lib.common.rest_client [req-0d869983-c32b-4395-9dc5-ebc922db6ec5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d869983-c32b-4395-9dc5-ebc922db6ec5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:01.446 193 INFO tempest.lib.common.rest_client [req-2c9956db-441c-4ea1-a580-045de0830bb8 ] Request (ImageNamespacesRbacTest:test_create_metadef_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:16:01.449 193 DEBUG tempest.lib.common.rest_client [req-2c9956db-441c-4ea1-a580-045de0830bb8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2c9956db-441c-4ea1-a580-045de0830bb8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdbd6e019dc34863b1e0301ab0512284", "name": "tempest-ImageNamespacesRbacTest-1338336480", "password_expires_at": null}, "audit_ids": ["a-JWkb4pQUCqZI0oahMZQw"], "expires_at": "2020-12-14T03:16:01.000000Z", "issued_at": "2020-12-14T02:16:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1505fa9a77c04287bc4e1d0c6a677744", "name": "tempest-ImageNamespacesRbacTest-1338336480"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:01.665 193 INFO tempest.lib.common.rest_client [req-98e0adac-67a4-44b2-8ca3-e492f575bfe9 ] Request (ImageNamespacesRbacTest:test_create_metadef_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.204s 2020-12-14 02:16:01.668 193 DEBUG tempest.lib.common.rest_client [req-98e0adac-67a4-44b2-8ca3-e492f575bfe9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-ImageNamespacesRbacTest-test-ns-683969302", "protected": false} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '361', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-683969302', 'x-openstack-request-id': 'req-98e0adac-67a4-44b2-8ca3-e492f575bfe9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-ImageNamespacesRbacTest-test-ns-683969302", "visibility": "private", "protected": false, "owner": "1505fa9a77c04287bc4e1d0c6a677744", "created_at": "2020-12-14T02:16:01Z", "updated_at": "2020-12-14T02:16:01Z", "self": "/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-683969302", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:01.672 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:01.800 193 INFO tempest.lib.common.rest_client [req-cd33e2ae-1125-46be-9494-993c69194664 ] Request (ImageNamespacesRbacTest:test_create_metadef_namespace): 200 GET http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles 0.120s 2020-12-14 02:16:01.803 193 DEBUG tempest.lib.common.rest_client [req-cd33e2ae-1125-46be-9494-993c69194664 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd33e2ae-1125-46be-9494-993c69194664', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:01.855 193 INFO tempest.lib.common.rest_client [req-7931ce3e-3f69-492e-858c-3a5794954bf9 ] Request (ImageNamespacesRbacTest:test_create_metadef_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:16:01.859 193 DEBUG tempest.lib.common.rest_client [req-7931ce3e-3f69-492e-858c-3a5794954bf9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7931ce3e-3f69-492e-858c-3a5794954bf9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdbd6e019dc34863b1e0301ab0512284", "name": "tempest-ImageNamespacesRbacTest-1338336480", "password_expires_at": null}, "audit_ids": ["19nZREXnSjW8gW0_HW4P9Q"], "expires_at": "2020-12-14T03:16:01.000000Z", "issued_at": "2020-12-14T02:16:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1505fa9a77c04287bc4e1d0c6a677744", "name": "tempest-ImageNamespacesRbacTest-1338336480"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:01.978 193 INFO tempest.lib.common.rest_client [req-e1e2903c-057f-4632-bba0-8a511d3993d8 ] Request (ImageNamespacesRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-683969302 0.108s 2020-12-14 02:16:01.982 193 DEBUG tempest.lib.common.rest_client [req-e1e2903c-057f-4632-bba0-8a511d3993d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-e1e2903c-057f-4632-bba0-8a511d3993d8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-683969302'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:01.993 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:01.997 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.006 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_metadef_namespaces, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:02.008 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:02.078 193 INFO tempest.lib.common.rest_client [req-58621b39-483b-409f-ae34-6a6c8738a867 ] Request (ImageNamespacesRbacTest:test_list_metadef_namespaces): 200 GET http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles 0.064s 2020-12-14 02:16:02.080 193 DEBUG tempest.lib.common.rest_client [req-58621b39-483b-409f-ae34-6a6c8738a867 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58621b39-483b-409f-ae34-6a6c8738a867', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:02.131 189 INFO tempest.lib.common.rest_client [req-f9051b02-e9d1-4312-a958-979a1ffcf6f2 ] Request (ServerActionsRbacTest:test_rebuild_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.247s 2020-12-14 02:16:02.131 193 INFO tempest.lib.common.rest_client [req-b02ed62b-56dd-4e69-9e07-ceaaa97f4e17 ] Request (ImageNamespacesRbacTest:test_list_metadef_namespaces): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:16:02.135 193 DEBUG tempest.lib.common.rest_client [req-b02ed62b-56dd-4e69-9e07-ceaaa97f4e17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b02ed62b-56dd-4e69-9e07-ceaaa97f4e17', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdbd6e019dc34863b1e0301ab0512284", "name": "tempest-ImageNamespacesRbacTest-1338336480", "password_expires_at": null}, "audit_ids": ["TrT0ZnO9ROOiY-iLRTZCqg"], "expires_at": "2020-12-14T03:16:02.000000Z", "issued_at": "2020-12-14T02:16:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1505fa9a77c04287bc4e1d0c6a677744", "name": "tempest-ImageNamespacesRbacTest-1338336480"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:02.134 189 DEBUG tempest.lib.common.rest_client [req-f9051b02-e9d1-4312-a958-979a1ffcf6f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f9051b02-e9d1-4312-a958-979a1ffcf6f2', 'x-compute-request-id': 'req-f9051b02-e9d1-4312-a958-979a1ffcf6f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:02Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:02.257 189 INFO tempest.common.waiters [-] State transition "REBUILD/rebuild_spawning" ==> "ACTIVE/None" after 4 second wait 2020-12-14 02:16:02.428 193 INFO tempest.lib.common.rest_client [req-67fb2723-aab5-4b71-a495-3f601de50a51 ] Request (ImageNamespacesRbacTest:test_list_metadef_namespaces): 200 GET http://172.30.13.94/image/v2/metadefs/namespaces 0.286s 2020-12-14 02:16:02.434 193 DEBUG tempest.lib.common.rest_client [req-67fb2723-aab5-4b71-a495-3f601de50a51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '20023', 'content-type': 'application/json', 'x-openstack-request-id': 'req-67fb2723-aab5-4b71-a495-3f601de50a51', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespaces": [{"namespace": "OS::Compute::VMwareFlavor", "display_name": "VMware Driver Options for Flavors", "description": "VMware Driver Options for Flavors may be used to customize and manage Nova Flavors. These are properties specific to VMWare compute drivers and will only have an effect if the VMWare compute driver is enabled in Nova. See: http://docs.openstack.org/admin-guide/compute-flavors.html", "visibility": "public", "protected": true, "owner": "admin", "created_at": "2020-10-07T11:58:00Z", "resource_type_associations": [{"name": "OS::Nova::Flavor", "created_at": "2020-10-07T11:58:00Z"}], "self": "/v2/metadefs/namespaces/OS::Compute::VMwareFlavor", "schema": "/v2/schemas/metadefs/namespace"}, {"namespace": "OS::Cinder::Volumetype", "display_name": "Cinder Volume Type", "description": "The Cinder volume type configuration option. Volume type assignment provides a mechanism not only to provide scheduling to a specific storage back-end, but also can be used to specify specific information for a back-end storage device to act upon.", "visibility": "public", "protected": true, "owner": "admin", "created_at": "2020-10-07T11:58:00Z", "resource_type_associations": [{"name": "OS::Glance::Image", "prefix": "cinder_", "created_at": "2020-10-07T11:58:00Z"}], "self": "/v2/metadefs/namespaces/OS::Cinder::Volumetype", "schema": "/v2/schemas/metadefs/namespace"}, {"namespace": "OS::Compute::HostCapabilities", "display_name": "Compute Host Capabilities", "description": "Hardware capabilities provided by the compute host. This provides the ability to fine tune the hardware specification required when an instance is requested. The ComputeCapabilitiesFilter should be enabled in the Nova scheduler to use these properties. When enabled, this filter checks that the capabilities provided by the compute host satisfy any extra specifications requested. Only hosts that can provide the requested capabilities will be eligible for hosting the instance.", "visibility": "public", "protected": true, "owner": "admin", "created_at": "2020-10-07T11:57:59Z", "resource_type_associations": [{"name": "OS::Nova::Flavor", "prefix": "capabilities:", "created_at": "2020-10-07T11:58:00Z"}, {"name": "OS::Nova::Aggregate", "prefix": "aggregate_instance_extra_specs:", "created_at": "2020-10-07T11:58:00Z"}], "self": "/v2/metadefs/namespaces/OS::Compute::HostCapabilities", "schema": "/v2/schemas/metadefs/namespace"}, {"namespace": "OS::Compute::VirtCPUTopology", "display_name": "Virtual CPU Topology", "description": "This provides the preferred socket/core/thread counts for the virtual CPU instance exposed to guests. This enables the ability to avoid hitting limitations on vCPU topologies that OS vendors place on their products. See also: https://opendev.org/openstack/nova-specs/src/branch/master/specs/juno/implemented/virt-driver-vcpu-topology.rst", "visibility": "public", "protected": true, "owner": "admin", "created_at": "2020-10-07T11:57:59Z", "resource_type_associations": [{"name": "OS::Glance::Image", "prefix": "hw_", "created_at": "2020-10-07T11:57:59Z"}, {"name": "OS::Cinder::Volume", "prefix": "hw_", "properties_target": "image", "created_at": "2020-10-07T11:57:59Z"}, {"name": "OS::Nova::Flavor", "prefix": "hw:", "created_at": "2020-10-07T11:57:59Z"}], "self": "/v2/metadefs/namespaces/OS::Compute::VirtCPUTopology", "schema": "/v2/schemas/metadefs/namespace"}, {"namespace": "OS::Compute::Libvirt", "display_name": "libvirt Driver Options", "description": "The libvirt compute driver options. \\n\\nThese are properties that affect the libvirt compute driver and may be specified on flavors and images. For a list of all hypervisors, see here: https://wiki.openstack.org/wiki/HypervisorSupportMatrix.", "visibility": "public", "protected": true, "owner": "admin", "created_at": "2020-10-07T11:57:59Z", "resource_type_associations": [{"name": "OS::Glance::Image", "prefix": "hw_", "created_at": "2020-10-07T11:57:59Z"}, {"name": "OS::Nova::Flavor", "prefix": "hw:", "created_at": "2020-10-07T11:57:59Z"}], "self": "/v2/metadefs/namespaces/OS::Compute::Libvir _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:02.437 186 INFO tempest.lib.common.rest_client [req-601a1403-c1a6-4541-8aed-cb6049322b31 ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:16:02.439 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:02.440 186 DEBUG tempest.lib.common.rest_client [req-601a1403-c1a6-4541-8aed-cb6049322b31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-601a1403-c1a6-4541-8aed-cb6049322b31', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "735d932f2baa406eb3a0c1b7e094dee0", "name": "tempest-ServerConsolesV26RbacTest-382930008", "password_expires_at": null}, "audit_ids": ["UVAg2hh1SQS0WB5DhpwWdw"], "expires_at": "2020-12-14T03:16:02.000000Z", "issued_at": "2020-12-14T02:16:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3af73cfc094a498ab90faa59c2482336", "name": "tempest-ServerConsolesV26RbacTest-382930008"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:02.508 193 INFO tempest.lib.common.rest_client [req-046c1956-d378-4a08-8a2b-45fbb016fe47 ] Request (ImageNamespacesRbacTest:test_list_metadef_namespaces): 200 GET http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles 0.063s 2020-12-14 02:16:02.511 193 DEBUG tempest.lib.common.rest_client [req-046c1956-d378-4a08-8a2b-45fbb016fe47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-046c1956-d378-4a08-8a2b-45fbb016fe47', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:02.563 193 INFO tempest.lib.common.rest_client [req-54a96e0f-21bc-46be-8f3d-a3fe93cff323 ] Request (ImageNamespacesRbacTest:test_list_metadef_namespaces): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:16:02.565 186 INFO tempest.lib.common.rest_client [req-ff1f4720-e041-4127-8f80-c72df3f4769d ] Request (ServerConsolesV26RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:16:02.566 193 DEBUG tempest.lib.common.rest_client [req-54a96e0f-21bc-46be-8f3d-a3fe93cff323 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-54a96e0f-21bc-46be-8f3d-a3fe93cff323', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdbd6e019dc34863b1e0301ab0512284", "name": "tempest-ImageNamespacesRbacTest-1338336480", "password_expires_at": null}, "audit_ids": ["AUTlTdwLQ4yisW3avSXiDQ"], "expires_at": "2020-12-14T03:16:02.000000Z", "issued_at": "2020-12-14T02:16:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1505fa9a77c04287bc4e1d0c6a677744", "name": "tempest-ImageNamespacesRbacTest-1338336480"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:02.567 186 DEBUG tempest.lib.common.rest_client [req-ff1f4720-e041-4127-8f80-c72df3f4769d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff1f4720-e041-4127-8f80-c72df3f4769d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "735d932f2baa406eb3a0c1b7e094dee0", "name": "tempest-ServerConsolesV26RbacTest-382930008", "password_expires_at": null}, "audit_ids": ["KvU8p7jsQ-y91BaKkLzpGg"], "expires_at": "2020-12-14T03:16:02.000000Z", "issued_at": "2020-12-14T02:16:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3af73cfc094a498ab90faa59c2482336", "name": "tempest-ServerConsolesV26RbacTest-382930008"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:02.572 186 INFO tempest.lib.common.fixed_network [-] (ServerConsolesV26RbacTest:setUpClass) Found network {'id': '7518d59b-b42b-4ec0-ae63-9dfd1a11bd25', 'name': 'tempest-ServerConsolesV26RbacTest-1100921850-network', 'tenant_id': '3af73cfc094a498ab90faa59c2482336', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3af73cfc094a498ab90faa59c2482336', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:15:55Z', 'updated_at': '2020-12-14T02:15:55Z', 'revision_number': 1} available for tenant 2020-12-14 02:16:02.572 189 INFO tempest.lib.common.rest_client [req-0f70bd97-8117-48ae-af96-5e7de72ebab5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.273s 2020-12-14 02:16:02.576 189 DEBUG tempest.lib.common.rest_client [req-0f70bd97-8117-48ae-af96-5e7de72ebab5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0f70bd97-8117-48ae-af96-5e7de72ebab5', 'x-compute-request-id': 'req-0f70bd97-8117-48ae-af96-5e7de72ebab5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:02Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:02.580 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:02.584 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.592 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_metadef_namespace, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:02.680 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:02.684 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.688 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.691 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.694 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.698 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.698 193 INFO tempest.lib.common.rest_client [req-3d4f0e15-a108-40f4-a8c4-f1ed5bb496e6 ] Request (ImageNamespacesRbacTest:test_modify_metadef_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.100s 2020-12-14 02:16:02.700 193 DEBUG tempest.lib.common.rest_client [req-3d4f0e15-a108-40f4-a8c4-f1ed5bb496e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-ImageNamespacesRbacTest-test-ns-476453970", "protected": false} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '361', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-476453970', 'x-openstack-request-id': 'req-3d4f0e15-a108-40f4-a8c4-f1ed5bb496e6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-ImageNamespacesRbacTest-test-ns-476453970", "visibility": "private", "protected": false, "owner": "1505fa9a77c04287bc4e1d0c6a677744", "created_at": "2020-12-14T02:16:02Z", "updated_at": "2020-12-14T02:16:02Z", "self": "/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-476453970", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:02.701 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.703 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:02.706 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.709 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.712 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.714 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.717 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.720 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.723 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.726 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.729 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.732 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.735 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.738 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.741 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.743 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.746 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.749 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.752 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.754 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.757 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.760 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.762 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.765 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.768 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.770 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.773 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.776 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.778 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.781 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.782 193 INFO tempest.lib.common.rest_client [req-e5d81541-2ff3-4c24-b7b4-852eefda2ff8 ] Request (ImageNamespacesRbacTest:test_modify_metadef_namespace): 200 GET http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles 0.072s 2020-12-14 02:16:02.784 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.786 193 DEBUG tempest.lib.common.rest_client [req-e5d81541-2ff3-4c24-b7b4-852eefda2ff8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5d81541-2ff3-4c24-b7b4-852eefda2ff8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:02.787 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.790 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.792 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.796 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.799 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.801 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.804 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.807 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.810 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.813 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.816 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.819 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.821 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.824 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.827 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.830 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.832 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.835 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.838 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.841 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.844 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.843 193 INFO tempest.lib.common.rest_client [req-eec9e5a0-461b-4825-bba6-474e3cfc4414 ] Request (ImageNamespacesRbacTest:test_modify_metadef_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:16:02.847 193 DEBUG tempest.lib.common.rest_client [req-eec9e5a0-461b-4825-bba6-474e3cfc4414 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eec9e5a0-461b-4825-bba6-474e3cfc4414', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdbd6e019dc34863b1e0301ab0512284", "name": "tempest-ImageNamespacesRbacTest-1338336480", "password_expires_at": null}, "audit_ids": ["Uv3V5gXmQ3SjfCRSBDA1gA"], "expires_at": "2020-12-14T03:16:02.000000Z", "issued_at": "2020-12-14T02:16:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1505fa9a77c04287bc4e1d0c6a677744", "name": "tempest-ImageNamespacesRbacTest-1338336480"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:02.850 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.852 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.855 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.858 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.861 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.864 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.867 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.869 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.872 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.875 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.877 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.880 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.883 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.886 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.888 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:02.899 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:resize, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:02.901 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:02.951 193 INFO tempest.lib.common.rest_client [req-44e18663-66e1-4dab-936f-0e716b2d948d ] Request (ImageNamespacesRbacTest:test_modify_metadef_namespace): 200 PUT http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-476453970 0.097s 2020-12-14 02:16:02.955 193 DEBUG tempest.lib.common.rest_client [req-44e18663-66e1-4dab-936f-0e716b2d948d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-ImageNamespacesRbacTest-test-ns-476453970", "description": "My new description"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '398', 'content-type': 'application/json', 'x-openstack-request-id': 'req-44e18663-66e1-4dab-936f-0e716b2d948d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-476453970'} Body: b'{"namespace": "tempest-ImageNamespacesRbacTest-test-ns-476453970", "description": "My new description", "visibility": "private", "protected": false, "owner": "1505fa9a77c04287bc4e1d0c6a677744", "created_at": "2020-12-14T02:16:03Z", "updated_at": "2020-12-14T02:16:03Z", "self": "/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-476453970", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:02.959 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:02.972 189 INFO tempest.lib.common.rest_client [req-bd2fe48a-4857-41f4-9964-3133bde2b2ae ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.064s 2020-12-14 02:16:02.975 189 DEBUG tempest.lib.common.rest_client [req-bd2fe48a-4857-41f4-9964-3133bde2b2ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd2fe48a-4857-41f4-9964-3133bde2b2ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:03.025 193 INFO tempest.lib.common.rest_client [req-2cc08417-c702-4db2-a999-740f9f19ebce ] Request (ImageNamespacesRbacTest:test_modify_metadef_namespace): 200 GET http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles 0.060s 2020-12-14 02:16:03.029 193 DEBUG tempest.lib.common.rest_client [req-2cc08417-c702-4db2-a999-740f9f19ebce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2cc08417-c702-4db2-a999-740f9f19ebce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744/users/bdbd6e019dc34863b1e0301ab0512284/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:03.059 189 INFO tempest.lib.common.rest_client [req-8cca84b2-5ee5-4361-ae5b-2daa371900c9 ] Request (ServerActionsRbacTest:test_resize_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-12-14 02:16:03.062 189 DEBUG tempest.lib.common.rest_client [req-8cca84b2-5ee5-4361-ae5b-2daa371900c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8cca84b2-5ee5-4361-ae5b-2daa371900c9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["NFExS-ECQ7yx0oXwFNS3-w"], "expires_at": "2020-12-14T03:16:03.000000Z", "issued_at": "2020-12-14T02:16:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:03.080 193 INFO tempest.lib.common.rest_client [req-c569dde9-9d58-4542-b489-ebeb30a99b1f ] Request (ImageNamespacesRbacTest:test_modify_metadef_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:16:03.083 193 DEBUG tempest.lib.common.rest_client [req-c569dde9-9d58-4542-b489-ebeb30a99b1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c569dde9-9d58-4542-b489-ebeb30a99b1f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bdbd6e019dc34863b1e0301ab0512284", "name": "tempest-ImageNamespacesRbacTest-1338336480", "password_expires_at": null}, "audit_ids": ["RKj-cqamT6-ozESVmQ03Og"], "expires_at": "2020-12-14T03:16:03.000000Z", "issued_at": "2020-12-14T02:16:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1505fa9a77c04287bc4e1d0c6a677744", "name": "tempest-ImageNamespacesRbacTest-1338336480"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1505fa9a77c04287bc4e1d0c6a677744", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:03.207 193 INFO tempest.lib.common.rest_client [req-ea93c504-2139-4e40-861c-74f0a39430ca ] Request (ImageNamespacesRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-476453970 0.114s 2020-12-14 02:16:03.211 193 DEBUG tempest.lib.common.rest_client [req-ea93c504-2139-4e40-861c-74f0a39430ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-ea93c504-2139-4e40-861c-74f0a39430ca', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageNamespacesRbacTest-test-ns-476453970'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:03.283 189 INFO tempest.lib.common.rest_client [req-bfa39a61-2876-43f3-8526-fd23faa4547e ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.213s 2020-12-14 02:16:03.286 189 DEBUG tempest.lib.common.rest_client [req-bfa39a61-2876-43f3-8526-fd23faa4547e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bfa39a61-2876-43f3-8526-fd23faa4547e', 'x-compute-request-id': 'req-bfa39a61-2876-43f3-8526-fd23faa4547e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:02Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:03.375 193 INFO tempest.lib.common.rest_client [req-2bcdd2b8-b264-4ee9-96aa-fdb5e0cd0a59 ] Request (ImageNamespacesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/bdbd6e019dc34863b1e0301ab0512284 0.150s 2020-12-14 02:16:03.378 193 DEBUG tempest.lib.common.rest_client [req-2bcdd2b8-b264-4ee9-96aa-fdb5e0cd0a59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2bcdd2b8-b264-4ee9-96aa-fdb5e0cd0a59', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/bdbd6e019dc34863b1e0301ab0512284'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:03.477 193 INFO tempest.lib.common.rest_client [req-6203b9af-ef7a-4d9f-90ee-e4e363274dc2 ] Request (ImageNamespacesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:16:03.481 193 DEBUG tempest.lib.common.rest_client [req-6203b9af-ef7a-4d9f-90ee-e4e363274dc2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6203b9af-ef7a-4d9f-90ee-e4e363274dc2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["uq90OqprQeOc-RDIA94DXg"], "expires_at": "2020-12-14T03:16:03.000000Z", "issued_at": "2020-12-14T02:16:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:03.778 186 INFO tempest.lib.common.rest_client [req-8d580612-9e0c-4d6d-ab81-5da98aec5c56 ] Request (ServerConsolesV26RbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 1.196s 2020-12-14 02:16:03.782 186 DEBUG tempest.lib.common.rest_client [req-8d580612-9e0c-4d6d-ab81-5da98aec5c56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerConsolesV26RbacTest-server-209335578", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "7518d59b-b42b-4ec0-ae63-9dfd1a11bd25"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8d580612-9e0c-4d6d-ab81-5da98aec5c56', 'x-compute-request-id': 'req-8d580612-9e0c-4d6d-ab81-5da98aec5c56', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "CyFMzWG9XxH5"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:03.828 193 INFO tempest.lib.common.rest_client [req-99ecd74e-0a90-48b4-b94b-4eb165ca0b89 ] Request (ImageNamespacesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1505fa9a77c04287bc4e1d0c6a677744&name=default 0.340s 2020-12-14 02:16:03.831 193 DEBUG tempest.lib.common.rest_client [req-99ecd74e-0a90-48b4-b94b-4eb165ca0b89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-99ecd74e-0a90-48b4-b94b-4eb165ca0b89', 'date': 'Mon, 14 Dec 2020 02:16:03 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1505fa9a77c04287bc4e1d0c6a677744&name=default'} Body: b'{"security_groups": [{"id": "67a591da-e9d9-47c1-816a-fcf79017bb4a", "name": "default", "stateful": true, "tenant_id": "1505fa9a77c04287bc4e1d0c6a677744", "description": "Default security group", "security_group_rules": [{"id": "424c1a77-b70b-48a4-8085-0cc1104bc5b3", "tenant_id": "1505fa9a77c04287bc4e1d0c6a677744", "security_group_id": "67a591da-e9d9-47c1-816a-fcf79017bb4a", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:16:03Z", "updated_at": "2020-12-14T02:16:03Z", "revision_number": 0, "project_id": "1505fa9a77c04287bc4e1d0c6a677744"}, {"id": "b8435679-8829-42dc-b88a-ce6bce8c9d28", "tenant_id": "1505fa9a77c04287bc4e1d0c6a677744", "security_group_id": "67a591da-e9d9-47c1-816a-fcf79017bb4a", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:16:03Z", "updated_at": "2020-12-14T02:16:03Z", "revision_number": 0, "project_id": "1505fa9a77c04287bc4e1d0c6a677744"}, {"id": "d20d3c55-8187-4bdd-9d6f-c916171b16ff", "tenant_id": "1505fa9a77c04287bc4e1d0c6a677744", "security_group_id": "67a591da-e9d9-47c1-816a-fcf79017bb4a", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "67a591da-e9d9-47c1-816a-fcf79017bb4a", "description": null, "tags": [], "created_at": "2020-12-14T02:16:03Z", "updated_at": "2020-12-14T02:16:03Z", "revision_number": 0, "project_id": "1505fa9a77c04287bc4e1d0c6a677744"}, {"id": "d6a67144-93ee-43c7-aaf6-78a2521d07c8", "tenant_id": "1505fa9a77c04287bc4e1d0c6a677744", "security_group_id": "67a591da-e9d9-47c1-816a-fcf79017bb4a", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "67a591da-e9d9-47c1-816a-fcf79017bb4a", "description": null, "tags": [], "created_at": "2020-12-14T02:16:03Z", "updated_at": "2020-12-14T02:16:03Z", "revision_number": 0, "project_id": "1505fa9a77c04287bc4e1d0c6a677744"}], "tags": [], "created_at": "2020-12-14T02:16:03Z", "updated_at": "2020-12-14T02:16:03Z", "revision_number": 1, "project_id": "1505fa9a77c04287bc4e1d0c6a677744"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:03.867 189 INFO tempest.lib.common.rest_client [req-fcc92e59-d6cc-4103-bb1b-050919b7964f ] Request (ServerActionsRbacTest:test_resize_server): 202 POST http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action 0.495s 2020-12-14 02:16:03.870 189 DEBUG tempest.lib.common.rest_client [req-fcc92e59-d6cc-4103-bb1b-050919b7964f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"resize": {"flavorRef": "8a56823e-8563-423c-896d-50c73f98dd64"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fcc92e59-d6cc-4103-bb1b-050919b7964f', 'x-compute-request-id': 'req-fcc92e59-d6cc-4103-bb1b-050919b7964f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:03.937 186 INFO tempest.lib.common.rest_client [req-ab873137-1a7f-4f46-8538-6938514080d0 ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1 0.125s 2020-12-14 02:16:03.940 186 DEBUG tempest.lib.common.rest_client [req-ab873137-1a7f-4f46-8538-6938514080d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1400', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ab873137-1a7f-4f46-8538-6938514080d0', 'x-compute-request-id': 'req-ab873137-1a7f-4f46-8538-6938514080d0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1'} Body: b'{"server": {"id": "b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1", "name": "tempest-ServerConsolesV26RbacTest-server-209335578", "status": "BUILD", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "user_id": "735d932f2baa406eb3a0c1b7e094dee0", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:04Z", "updated": "2020-12-14T02:16:03Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:03.993 193 INFO tempest.lib.common.rest_client [req-b0d54e99-474c-47a0-94ec-d1510b59bf84 ] Request (ImageNamespacesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/67a591da-e9d9-47c1-816a-fcf79017bb4a 0.154s 2020-12-14 02:16:03.997 193 DEBUG tempest.lib.common.rest_client [req-b0d54e99-474c-47a0-94ec-d1510b59bf84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-b0d54e99-474c-47a0-94ec-d1510b59bf84', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:16:03 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/67a591da-e9d9-47c1-816a-fcf79017bb4a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:04.087 189 INFO tempest.lib.common.rest_client [req-87747500-4285-4760-b755-20d1c0d6bbae ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.212s 2020-12-14 02:16:04.090 189 DEBUG tempest.lib.common.rest_client [req-87747500-4285-4760-b755-20d1c0d6bbae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-87747500-4285-4760-b755-20d1c0d6bbae', 'x-compute-request-id': 'req-87747500-4285-4760-b755-20d1c0d6bbae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:04Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:04.167 193 INFO tempest.lib.common.rest_client [req-b2180ad8-3a08-4fa8-9a28-9bcced6d9dda ] Request (ImageNamespacesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744 0.164s 2020-12-14 02:16:04.169 193 DEBUG tempest.lib.common.rest_client [req-b2180ad8-3a08-4fa8-9a28-9bcced6d9dda ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2180ad8-3a08-4fa8-9a28-9bcced6d9dda', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1505fa9a77c04287bc4e1d0c6a677744'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:04.293 193 INFO tempest.lib.common.rest_client [req-2c7294a8-6bba-4caa-b68a-7c156d576e04 ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:16:04.295 193 DEBUG tempest.lib.common.rest_client [req-2c7294a8-6bba-4caa-b68a-7c156d576e04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2c7294a8-6bba-4caa-b68a-7c156d576e04', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["e1H3_HEwRy2mQXZG6A7r1g"], "expires_at": "2020-12-14T03:16:04.000000Z", "issued_at": "2020-12-14T02:16:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:04.378 193 INFO tempest.lib.common.rest_client [req-59fef3df-a358-4c49-b33f-9389769517e4 ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:16:04.381 193 DEBUG tempest.lib.common.rest_client [req-59fef3df-a358-4c49-b33f-9389769517e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59fef3df-a358-4c49-b33f-9389769517e4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["VKI2MzDHTg6zZhj0viriXg"], "expires_at": "2020-12-14T03:16:04.000000Z", "issued_at": "2020-12-14T02:16:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:04.456 193 INFO tempest.lib.common.rest_client [req-796a1f48-3047-4524-b750-67b2c8535f49 ] Request (NamespaceTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.067s 2020-12-14 02:16:04.459 193 DEBUG tempest.lib.common.rest_client [req-796a1f48-3047-4524-b750-67b2c8535f49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-796a1f48-3047-4524-b750-67b2c8535f49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:04.547 193 INFO tempest.lib.common.rest_client [req-9d4a41c4-eb3e-4d7c-8906-1ead89158bb8 ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.081s 2020-12-14 02:16:04.550 193 DEBUG tempest.lib.common.rest_client [req-9d4a41c4-eb3e-4d7c-8906-1ead89158bb8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-NamespaceTagsRbacTest-1603612674-desc", "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1603612674"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9d4a41c4-eb3e-4d7c-8906-1ead89158bb8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "fd932f34f4b148c784e47b7d9dd5668a", "name": "tempest-NamespaceTagsRbacTest-1603612674", "domain_id": "default", "description": "tempest-NamespaceTagsRbacTest-1603612674-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:04.690 193 INFO tempest.lib.common.rest_client [req-bdd3ebf0-3fce-472e-9fdb-901d509fb563 ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.132s 2020-12-14 02:16:04.693 193 DEBUG tempest.lib.common.rest_client [req-bdd3ebf0-3fce-472e-9fdb-901d509fb563 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-NamespaceTagsRbacTest-1603612674", "password": "X9+A&a*f5#ZXU+4", "project_id": "fd932f34f4b148c784e47b7d9dd5668a", "email": "tempest-NamespaceTagsRbacTest-900305993@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '397', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bdd3ebf0-3fce-472e-9fdb-901d509fb563', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "fd932f34f4b148c784e47b7d9dd5668a", "email": "tempest-NamespaceTagsRbacTest-900305993@example.com", "id": "e81b0f6f16364e63b3e39cf4d9a3197b", "name": "tempest-NamespaceTagsRbacTest-1603612674", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/e81b0f6f16364e63b3e39cf4d9a3197b"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:04.762 193 INFO tempest.lib.common.rest_client [req-3d3a2176-22ca-4750-8a39-3471438a25e8 ] Request (NamespaceTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:16:04.766 193 DEBUG tempest.lib.common.rest_client [req-3d3a2176-22ca-4750-8a39-3471438a25e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d3a2176-22ca-4750-8a39-3471438a25e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:04.827 193 INFO tempest.lib.common.rest_client [req-ab3c5e1a-85b8-4b1e-8976-518570488e93 ] Request (NamespaceTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-12-14 02:16:04.830 193 DEBUG tempest.lib.common.rest_client [req-ab3c5e1a-85b8-4b1e-8976-518570488e93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ab3c5e1a-85b8-4b1e-8976-518570488e93', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:04.922 193 INFO tempest.lib.common.rest_client [req-252bcc45-bcd8-42b0-b5a4-bfb91cbe4714 ] Request (NamespaceTagsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles/72a4576c553448cd941b052c1ca0cf2d 0.084s 2020-12-14 02:16:04.925 193 DEBUG tempest.lib.common.rest_client [req-252bcc45-bcd8-42b0-b5a4-bfb91cbe4714 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-252bcc45-bcd8-42b0-b5a4-bfb91cbe4714', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:04.928 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NamespaceTagsRbacTest-1603612674', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'fd932f34f4b148c784e47b7d9dd5668a', 'project_name': 'tempest-NamespaceTagsRbacTest-1603612674', 'tenant_id': 'fd932f34f4b148c784e47b7d9dd5668a', 'tenant_name': 'tempest-NamespaceTagsRbacTest-1603612674', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'e81b0f6f16364e63b3e39cf4d9a3197b'}, Network: None, Subnet: None, Router: None 2020-12-14 02:16:04.931 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NamespaceTagsRbacTest-1603612674', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'fd932f34f4b148c784e47b7d9dd5668a', 'project_name': 'tempest-NamespaceTagsRbacTest-1603612674', 'tenant_id': 'fd932f34f4b148c784e47b7d9dd5668a', 'tenant_name': 'tempest-NamespaceTagsRbacTest-1603612674', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'e81b0f6f16364e63b3e39cf4d9a3197b'}, Network: None, Subnet: None, Router: None 2020-12-14 02:16:05.107 193 INFO tempest.lib.common.rest_client [req-4e7d12ee-4e0a-4e99-b6ac-b4b5d6b3eeb4 ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:16:05.110 193 DEBUG tempest.lib.common.rest_client [req-4e7d12ee-4e0a-4e99-b6ac-b4b5d6b3eeb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6573', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e7d12ee-4e0a-4e99-b6ac-b4b5d6b3eeb4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e81b0f6f16364e63b3e39cf4d9a3197b", "name": "tempest-NamespaceTagsRbacTest-1603612674", "password_expires_at": null}, "audit_ids": ["YT6Go3dTQcOPcmZOaaOvRA"], "expires_at": "2020-12-14T03:16:05.000000Z", "issued_at": "2020-12-14T02:16:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd932f34f4b148c784e47b7d9dd5668a", "name": "tempest-NamespaceTagsRbacTest-1603612674"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://1 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:05.199 193 INFO tempest.lib.common.rest_client [req-155e0b38-7b4c-413c-bfaa-a84a69b2013b ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-12-14 02:16:05.202 193 DEBUG tempest.lib.common.rest_client [req-155e0b38-7b4c-413c-bfaa-a84a69b2013b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-155e0b38-7b4c-413c-bfaa-a84a69b2013b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["FGWBh_ToTg6qoZeLRjS1CA"], "expires_at": "2020-12-14T03:16:05.000000Z", "issued_at": "2020-12-14T02:16:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:05.216 186 INFO tempest.lib.common.rest_client [req-ed3aae2a-91ed-4636-aaaf-8ca357766e31 ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1 0.162s 2020-12-14 02:16:05.219 186 DEBUG tempest.lib.common.rest_client [req-ed3aae2a-91ed-4636-aaaf-8ca357766e31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1505', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ed3aae2a-91ed-4636-aaaf-8ca357766e31', 'x-compute-request-id': 'req-ed3aae2a-91ed-4636-aaaf-8ca357766e31', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1'} Body: b'{"server": {"id": "b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1", "name": "tempest-ServerConsolesV26RbacTest-server-209335578", "status": "BUILD", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "user_id": "735d932f2baa406eb3a0c1b7e094dee0", "metadata": {}, "hostId": "8b441e9973257d0dccd7078c23f7888d7c6528b6c539cdb1c8250cad", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:03Z", "updated": "2020-12-14T02:16:05Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "block_device_mapping", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:05.307 193 INFO tempest.lib.common.rest_client [req-8e7043fd-c569-406d-950e-3f8f8b3a4c3a ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:16:05.309 193 DEBUG tempest.lib.common.rest_client [req-8e7043fd-c569-406d-950e-3f8f8b3a4c3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e7043fd-c569-406d-950e-3f8f8b3a4c3a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["dYnCq7CyR2qWyE9dN-jC9A"], "expires_at": "2020-12-14T03:16:05.000000Z", "issued_at": "2020-12-14T02:16:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:05.320 186 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/block_device_mapping" after 1 second wait 2020-12-14 02:16:05.376 193 INFO tempest.lib.common.rest_client [req-30fd7e1d-a23e-45f9-b393-a857ebf465fd ] Request (NamespaceTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.060s 2020-12-14 02:16:05.380 193 DEBUG tempest.lib.common.rest_client [req-30fd7e1d-a23e-45f9-b393-a857ebf465fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30fd7e1d-a23e-45f9-b393-a857ebf465fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:05.409 189 INFO tempest.lib.common.rest_client [req-03acbe45-0438-4d2a-8dae-e5237db4f670 ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.226s 2020-12-14 02:16:05.413 189 DEBUG tempest.lib.common.rest_client [req-03acbe45-0438-4d2a-8dae-e5237db4f670 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-03acbe45-0438-4d2a-8dae-e5237db4f670', 'x-compute-request-id': 'req-03acbe45-0438-4d2a-8dae-e5237db4f670', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:05Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:05.436 197 INFO tempest.lib.common.rest_client [req-07fc191e-30d1-4ec7-bdeb-9a234466ad7c ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/91571816-e8eb-4403-9b91-8f8d1fcef93b/add_router_interface 6.805s 2020-12-14 02:16:05.438 197 DEBUG tempest.lib.common.rest_client [req-07fc191e-30d1-4ec7-bdeb-9a234466ad7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "f7cd92f9-1f7e-458a-9182-fbfbe2b2082b"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-07fc191e-30d1-4ec7-bdeb-9a234466ad7c', 'date': 'Mon, 14 Dec 2020 02:16:05 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/91571816-e8eb-4403-9b91-8f8d1fcef93b/add_router_interface'} Body: b'{"id": "91571816-e8eb-4403-9b91-8f8d1fcef93b", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "port_id": "5a6bab9e-ead0-4e74-8e9b-fbc3cc0eb284", "network_id": "25a7ce63-636c-4fcd-bf14-ab20366f9481", "subnet_id": "f7cd92f9-1f7e-458a-9182-fbfbe2b2082b", "subnet_ids": ["f7cd92f9-1f7e-458a-9182-fbfbe2b2082b"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:05.441 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MiscPolicyActionsRbacTest-354750584', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a836f1fb2f90434abc04b768f968fb5b', 'project_name': 'tempest-MiscPolicyActionsRbacTest-354750584', 'tenant_id': 'a836f1fb2f90434abc04b768f968fb5b', 'tenant_name': 'tempest-MiscPolicyActionsRbacTest-354750584', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '22a3021b60e04e5e8566c3079b0174a5'}, Network: {'id': '25a7ce63-636c-4fcd-bf14-ab20366f9481', 'name': 'tempest-MiscPolicyActionsRbacTest-2031429312-network', 'tenant_id': 'a836f1fb2f90434abc04b768f968fb5b', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'a836f1fb2f90434abc04b768f968fb5b', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 65, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:15:55Z', 'updated_at': '2020-12-14T02:15:55Z', 'revision_number': 1}, Subnet: {'id': 'f7cd92f9-1f7e-458a-9182-fbfbe2b2082b', 'name': 'tempest-MiscPolicyActionsRbacTest-2031429312-subnet', 'tenant_id': 'a836f1fb2f90434abc04b768f968fb5b', 'network_id': '25a7ce63-636c-4fcd-bf14-ab20366f9481', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:15:56Z', 'updated_at': '2020-12-14T02:15:56Z', 'revision_number': 0, 'project_id': 'a836f1fb2f90434abc04b768f968fb5b'}, Router: {'id': '91571816-e8eb-4403-9b91-8f8d1fcef93b', 'name': 'tempest-MiscPolicyActionsRbacTest-2031429312-router', 'tenant_id': 'a836f1fb2f90434abc04b768f968fb5b', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.72'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::11a'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:15:57Z', 'updated_at': '2020-12-14T02:15:58Z', 'revision_number': 3, 'project_id': 'a836f1fb2f90434abc04b768f968fb5b'} 2020-12-14 02:16:05.443 193 INFO tempest.lib.common.rest_client [req-10b3c59f-1879-4659-8429-8efdf2474090 ] Request (NamespaceTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:16:05.445 193 DEBUG tempest.lib.common.rest_client [req-10b3c59f-1879-4659-8429-8efdf2474090 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10b3c59f-1879-4659-8429-8efdf2474090', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:05.448 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:16:05.450 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:05.510 193 INFO tempest.lib.common.rest_client [req-263ca7f9-885b-413e-b066-de7a90e03149 ] Request (NamespaceTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles 0.054s 2020-12-14 02:16:05.514 193 DEBUG tempest.lib.common.rest_client [req-263ca7f9-885b-413e-b066-de7a90e03149 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-263ca7f9-885b-413e-b066-de7a90e03149', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:05.598 193 INFO tempest.lib.common.rest_client [req-cfbfc19b-03f0-4472-b031-13975abd3676 ] Request (NamespaceTagsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles/72a4576c553448cd941b052c1ca0cf2d 0.075s 2020-12-14 02:16:05.600 193 DEBUG tempest.lib.common.rest_client [req-cfbfc19b-03f0-4472-b031-13975abd3676 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfbfc19b-03f0-4472-b031-13975abd3676', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:05.631 197 INFO tempest.lib.common.rest_client [req-cea31f8e-1fce-42a8-9fd0-2a7645fdafef ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.123s 2020-12-14 02:16:05.635 197 DEBUG tempest.lib.common.rest_client [req-cea31f8e-1fce-42a8-9fd0-2a7645fdafef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cea31f8e-1fce-42a8-9fd0-2a7645fdafef', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["va17Rdq8RdG0mW0mfULkXA"], "expires_at": "2020-12-14T03:16:05.000000Z", "issued_at": "2020-12-14T02:16:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:05.712 193 INFO tempest.lib.common.rest_client [req-427dbc8b-f046-4a1a-b831-f3ba160cf792 ] Request (NamespaceTagsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles/a629c95d64b3416fb80ae90af4f69c05 0.105s 2020-12-14 02:16:05.715 193 DEBUG tempest.lib.common.rest_client [req-427dbc8b-f046-4a1a-b831-f3ba160cf792 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-427dbc8b-f046-4a1a-b831-f3ba160cf792', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:05.769 197 INFO tempest.lib.common.rest_client [req-d0b740de-5f35-4420-b8db-76758512d6f4 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.122s 2020-12-14 02:16:05.774 197 DEBUG tempest.lib.common.rest_client [req-d0b740de-5f35-4420-b8db-76758512d6f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-MiscPolicyActionsRbacTest-1205860986-desc", "domain_id": "default", "name": "tempest-MiscPolicyActionsRbacTest-1205860986"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0b740de-5f35-4420-b8db-76758512d6f4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "13e063fab0044afeafaff2049f9b1404", "name": "tempest-MiscPolicyActionsRbacTest-1205860986", "domain_id": "default", "description": "tempest-MiscPolicyActionsRbacTest-1205860986-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/13e063fab0044afeafaff2049f9b1404"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:05.884 197 INFO tempest.lib.common.rest_client [req-b6b3cfe8-ddbd-42c6-a1bf-f0615d48a292 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.100s 2020-12-14 02:16:05.887 197 DEBUG tempest.lib.common.rest_client [req-b6b3cfe8-ddbd-42c6-a1bf-f0615d48a292 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-MiscPolicyActionsRbacTest-1205860986", "password": "G9=qyknLtFOxQw3", "project_id": "13e063fab0044afeafaff2049f9b1404", "email": "tempest-MiscPolicyActionsRbacTest-1300668973@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '406', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6b3cfe8-ddbd-42c6-a1bf-f0615d48a292', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "13e063fab0044afeafaff2049f9b1404", "email": "tempest-MiscPolicyActionsRbacTest-1300668973@example.com", "id": "7792aa6a9e6448e784708264bc9c7c58", "name": "tempest-MiscPolicyActionsRbacTest-1205860986", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/7792aa6a9e6448e784708264bc9c7c58"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:05.972 197 INFO tempest.lib.common.rest_client [req-9bb645cd-3c77-4293-9b98-50fa040bab0a ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.074s 2020-12-14 02:16:05.975 197 DEBUG tempest.lib.common.rest_client [req-9bb645cd-3c77-4293-9b98-50fa040bab0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9bb645cd-3c77-4293-9b98-50fa040bab0a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:06.067 197 INFO tempest.lib.common.rest_client [req-28265087-becd-4d9a-9492-efa727e3006c ] Request (MiscPolicyActionsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/13e063fab0044afeafaff2049f9b1404/users/7792aa6a9e6448e784708264bc9c7c58/roles/a629c95d64b3416fb80ae90af4f69c05 0.084s 2020-12-14 02:16:06.070 197 DEBUG tempest.lib.common.rest_client [req-28265087-becd-4d9a-9492-efa727e3006c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28265087-becd-4d9a-9492-efa727e3006c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/13e063fab0044afeafaff2049f9b1404/users/7792aa6a9e6448e784708264bc9c7c58/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:06.074 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MiscPolicyActionsRbacTest-1205860986', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '13e063fab0044afeafaff2049f9b1404', 'project_name': 'tempest-MiscPolicyActionsRbacTest-1205860986', 'tenant_id': '13e063fab0044afeafaff2049f9b1404', 'tenant_name': 'tempest-MiscPolicyActionsRbacTest-1205860986', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '7792aa6a9e6448e784708264bc9c7c58'}, Network: None, Subnet: None, Router: None 2020-12-14 02:16:06.468 197 INFO tempest.lib.common.rest_client [req-01b91075-a63a-4dbc-b050-c0dbf405330b ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.386s 2020-12-14 02:16:06.470 197 DEBUG tempest.lib.common.rest_client [req-01b91075-a63a-4dbc-b050-c0dbf405330b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-MiscPolicyActionsRbacTest-1381669334-network", "tenant_id": "13e063fab0044afeafaff2049f9b1404"}} Response - Headers: {'content-type': 'application/json', 'content-length': '741', 'x-openstack-request-id': 'req-01b91075-a63a-4dbc-b050-c0dbf405330b', 'date': 'Mon, 14 Dec 2020 02:16:06 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"84bc7718-06c3-4f50-bdeb-4d3ec777c9b0","name":"tempest-MiscPolicyActionsRbacTest-1381669334-network","tenant_id":"13e063fab0044afeafaff2049f9b1404","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"13e063fab0044afeafaff2049f9b1404","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":68,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:16:06Z","updated_at":"2020-12-14T02:16:06Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:06.567 186 INFO tempest.lib.common.rest_client [req-17ffaa8c-8511-4644-ab6b-6f037a7a2d7e ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1 0.237s 2020-12-14 02:16:06.571 186 DEBUG tempest.lib.common.rest_client [req-17ffaa8c-8511-4644-ab6b-6f037a7a2d7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-17ffaa8c-8511-4644-ab6b-6f037a7a2d7e', 'x-compute-request-id': 'req-17ffaa8c-8511-4644-ab6b-6f037a7a2d7e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1'} Body: b'{"server": {"id": "b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1", "name": "tempest-ServerConsolesV26RbacTest-server-209335578", "status": "BUILD", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "user_id": "735d932f2baa406eb3a0c1b7e094dee0", "metadata": {}, "hostId": "8b441e9973257d0dccd7078c23f7888d7c6528b6c539cdb1c8250cad", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:03Z", "updated": "2020-12-14T02:16:05Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:06.671 186 INFO tempest.common.waiters [-] State transition "BUILD/block_device_mapping" ==> "BUILD/spawning" after 2 second wait 2020-12-14 02:16:06.839 193 INFO tempest.lib.common.rest_client [req-a7f54173-9de8-479a-8b9b-e9b64ab6f0aa ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.116s 2020-12-14 02:16:06.843 193 DEBUG tempest.lib.common.rest_client [req-a7f54173-9de8-479a-8b9b-e9b64ab6f0aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7f54173-9de8-479a-8b9b-e9b64ab6f0aa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e81b0f6f16364e63b3e39cf4d9a3197b", "name": "tempest-NamespaceTagsRbacTest-1603612674", "password_expires_at": null}, "audit_ids": ["NoQTgKoGSBC0yo-uRxhE0w"], "expires_at": "2020-12-14T03:16:06.000000Z", "issued_at": "2020-12-14T02:16:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd932f34f4b148c784e47b7d9dd5668a", "name": "tempest-NamespaceTagsRbacTest-1603612674"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:07.019 189 INFO tempest.lib.common.rest_client [req-202e7561-98f2-4696-9bf6-2648c76d40dd ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.485s 2020-12-14 02:16:07.022 189 DEBUG tempest.lib.common.rest_client [req-202e7561-98f2-4696-9bf6-2648c76d40dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-202e7561-98f2-4696-9bf6-2648c76d40dd', 'x-compute-request-id': 'req-202e7561-98f2-4696-9bf6-2648c76d40dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:06Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:07.054 193 INFO tempest.lib.common.rest_client [req-942e4634-0ae3-4e9c-9207-d2889d7fa22d ] Request (NamespaceTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.200s 2020-12-14 02:16:07.057 193 DEBUG tempest.lib.common.rest_client [req-942e4634-0ae3-4e9c-9207-d2889d7fa22d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-NamespaceTagsRbacTest-namespace-456886064"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '361', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064', 'x-openstack-request-id': 'req-942e4634-0ae3-4e9c-9207-d2889d7fa22d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-NamespaceTagsRbacTest-namespace-456886064", "visibility": "private", "protected": false, "owner": "fd932f34f4b148c784e47b7d9dd5668a", "created_at": "2020-12-14T02:16:07Z", "updated_at": "2020-12-14T02:16:07Z", "self": "/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:07.065 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:07.069 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:07.077 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_metadef_tag, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:07.079 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:07.120 197 INFO tempest.lib.common.rest_client [req-bf07c4c8-a7dd-4496-983a-38ea4e097297 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.641s 2020-12-14 02:16:07.124 197 DEBUG tempest.lib.common.rest_client [req-bf07c4c8-a7dd-4496-983a-38ea4e097297 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "84bc7718-06c3-4f50-bdeb-4d3ec777c9b0", "cidr": "192.168.120.0/28", "name": "tempest-MiscPolicyActionsRbacTest-1381669334-subnet", "tenant_id": "13e063fab0044afeafaff2049f9b1404", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '713', 'x-openstack-request-id': 'req-bf07c4c8-a7dd-4496-983a-38ea4e097297', 'date': 'Mon, 14 Dec 2020 02:16:07 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"cd9c7c45-cb13-4156-afae-7bf82ff6ac9c","name":"tempest-MiscPolicyActionsRbacTest-1381669334-subnet","tenant_id":"13e063fab0044afeafaff2049f9b1404","network_id":"84bc7718-06c3-4f50-bdeb-4d3ec777c9b0","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:16:06Z","updated_at":"2020-12-14T02:16:06Z","revision_number":0,"project_id":"13e063fab0044afeafaff2049f9b1404"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:07.125 189 INFO tempest.common.waiters [-] State transition "RESIZE/resize_prep" ==> "RESIZE/resize_migrating" after 3 second wait 2020-12-14 02:16:07.204 193 INFO tempest.lib.common.rest_client [req-215fee7c-8e5a-4ce6-85c3-a696ac39d127 ] Request (NamespaceTagsRbacTest:test_create_namespace_tag): 200 GET http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles 0.118s 2020-12-14 02:16:07.208 193 DEBUG tempest.lib.common.rest_client [req-215fee7c-8e5a-4ce6-85c3-a696ac39d127 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-215fee7c-8e5a-4ce6-85c3-a696ac39d127', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:07.263 193 INFO tempest.lib.common.rest_client [req-269b2ce4-fcff-41ac-9347-8a19315fab99 ] Request (NamespaceTagsRbacTest:test_create_namespace_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:16:07.267 193 DEBUG tempest.lib.common.rest_client [req-269b2ce4-fcff-41ac-9347-8a19315fab99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-269b2ce4-fcff-41ac-9347-8a19315fab99', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e81b0f6f16364e63b3e39cf4d9a3197b", "name": "tempest-NamespaceTagsRbacTest-1603612674", "password_expires_at": null}, "audit_ids": ["n7kqPCE7R4-NhaQO0tSoVw"], "expires_at": "2020-12-14T03:16:07.000000Z", "issued_at": "2020-12-14T02:16:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd932f34f4b148c784e47b7d9dd5668a", "name": "tempest-NamespaceTagsRbacTest-1603612674"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:07.387 193 INFO tempest.lib.common.rest_client [req-dd837064-e539-4b10-8a9b-d6a2aa234016 ] Request (NamespaceTagsRbacTest:test_create_namespace_tag): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags/tempest-NamespaceTagsRbacTest-tag-1094174529 0.113s 2020-12-14 02:16:07.390 193 DEBUG tempest.lib.common.rest_client [req-dd837064-e539-4b10-8a9b-d6a2aa234016 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '132', 'content-type': 'application/json', 'x-openstack-request-id': 'req-dd837064-e539-4b10-8a9b-d6a2aa234016', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags/tempest-NamespaceTagsRbacTest-tag-1094174529'} Body: b'{"name": "tempest-NamespaceTagsRbacTest-tag-1094174529", "created_at": "2020-12-14T02:16:07Z", "updated_at": "2020-12-14T02:16:07Z"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:07.393 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:07.471 193 INFO tempest.lib.common.rest_client [req-d29b84f1-f3a9-4789-bf56-e92c17cf177f ] Request (NamespaceTagsRbacTest:test_create_namespace_tag): 200 GET http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles 0.073s 2020-12-14 02:16:07.474 193 DEBUG tempest.lib.common.rest_client [req-d29b84f1-f3a9-4789-bf56-e92c17cf177f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d29b84f1-f3a9-4789-bf56-e92c17cf177f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:07.519 193 INFO tempest.lib.common.rest_client [req-44fa5603-cb6e-420c-934d-86e8bec92c7f ] Request (NamespaceTagsRbacTest:test_create_namespace_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:16:07.522 193 DEBUG tempest.lib.common.rest_client [req-44fa5603-cb6e-420c-934d-86e8bec92c7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-44fa5603-cb6e-420c-934d-86e8bec92c7f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e81b0f6f16364e63b3e39cf4d9a3197b", "name": "tempest-NamespaceTagsRbacTest-1603612674", "password_expires_at": null}, "audit_ids": ["_-YWSw0pRt6WB5nN96LuXg"], "expires_at": "2020-12-14T03:16:07.000000Z", "issued_at": "2020-12-14T02:16:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd932f34f4b148c784e47b7d9dd5668a", "name": "tempest-NamespaceTagsRbacTest-1603612674"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:07.621 193 INFO tempest.lib.common.rest_client [req-7c65239f-cd4b-45ad-9e20-32778b8a1d1b ] Request (NamespaceTagsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags 0.090s 2020-12-14 02:16:07.624 193 DEBUG tempest.lib.common.rest_client [req-7c65239f-cd4b-45ad-9e20-32778b8a1d1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-7c65239f-cd4b-45ad-9e20-32778b8a1d1b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:07.635 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:07.639 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:07.648 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_metadef_tags, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:07.650 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:07.715 193 INFO tempest.lib.common.rest_client [req-02f90d39-0759-459c-8367-8b77a6b20a68 ] Request (NamespaceTagsRbacTest:test_create_namespace_tags): 200 GET http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles 0.059s 2020-12-14 02:16:07.719 193 DEBUG tempest.lib.common.rest_client [req-02f90d39-0759-459c-8367-8b77a6b20a68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02f90d39-0759-459c-8367-8b77a6b20a68', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:07.768 193 INFO tempest.lib.common.rest_client [req-1f106360-8e51-46e0-ba0a-3498a4c189f8 ] Request (NamespaceTagsRbacTest:test_create_namespace_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:16:07.771 193 DEBUG tempest.lib.common.rest_client [req-1f106360-8e51-46e0-ba0a-3498a4c189f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f106360-8e51-46e0-ba0a-3498a4c189f8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e81b0f6f16364e63b3e39cf4d9a3197b", "name": "tempest-NamespaceTagsRbacTest-1603612674", "password_expires_at": null}, "audit_ids": ["Cr9ls5jxR2iOAcjxCKxHrA"], "expires_at": "2020-12-14T03:16:07.000000Z", "issued_at": "2020-12-14T02:16:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd932f34f4b148c784e47b7d9dd5668a", "name": "tempest-NamespaceTagsRbacTest-1603612674"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:07.873 193 INFO tempest.lib.common.rest_client [req-9f821c9a-d3c7-4aac-8136-f52937a24c00 ] Request (NamespaceTagsRbacTest:test_create_namespace_tags): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags 0.094s 2020-12-14 02:16:07.876 193 DEBUG tempest.lib.common.rest_client [req-9f821c9a-d3c7-4aac-8136-f52937a24c00 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"tags": [{"name": "tempest-NamespaceTagsRbacTest-tag-1124879370"}, {"name": "tempest-NamespaceTagsRbacTest-tag-1781536504"}]} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '126', 'content-type': 'application/json', 'x-openstack-request-id': 'req-9f821c9a-d3c7-4aac-8136-f52937a24c00', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags'} Body: b'{"tags": [{"name": "tempest-NamespaceTagsRbacTest-tag-1124879370"}, {"name": "tempest-NamespaceTagsRbacTest-tag-1781536504"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:07.879 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:07.886 186 INFO tempest.lib.common.rest_client [req-2a58d8a7-622e-450b-9fca-bb0faef1a21a ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1 0.206s 2020-12-14 02:16:07.890 186 DEBUG tempest.lib.common.rest_client [req-2a58d8a7-622e-450b-9fca-bb0faef1a21a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2a58d8a7-622e-450b-9fca-bb0faef1a21a', 'x-compute-request-id': 'req-2a58d8a7-622e-450b-9fca-bb0faef1a21a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1'} Body: b'{"server": {"id": "b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1", "name": "tempest-ServerConsolesV26RbacTest-server-209335578", "status": "BUILD", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "user_id": "735d932f2baa406eb3a0c1b7e094dee0", "metadata": {}, "hostId": "8b441e9973257d0dccd7078c23f7888d7c6528b6c539cdb1c8250cad", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:03Z", "updated": "2020-12-14T02:16:05Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:07.945 193 INFO tempest.lib.common.rest_client [req-092667c4-353e-4bb5-8dcf-f44c2d407a26 ] Request (NamespaceTagsRbacTest:test_create_namespace_tags): 200 GET http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles 0.060s 2020-12-14 02:16:07.949 193 DEBUG tempest.lib.common.rest_client [req-092667c4-353e-4bb5-8dcf-f44c2d407a26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-092667c4-353e-4bb5-8dcf-f44c2d407a26', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:07.998 193 INFO tempest.lib.common.rest_client [req-f4acaa0e-952b-4287-afe0-c252f5fc6fd1 ] Request (NamespaceTagsRbacTest:test_create_namespace_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:16:08.000 193 DEBUG tempest.lib.common.rest_client [req-f4acaa0e-952b-4287-afe0-c252f5fc6fd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4acaa0e-952b-4287-afe0-c252f5fc6fd1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e81b0f6f16364e63b3e39cf4d9a3197b", "name": "tempest-NamespaceTagsRbacTest-1603612674", "password_expires_at": null}, "audit_ids": ["mu1NYFgJRISgJSjOibG0cw"], "expires_at": "2020-12-14T03:16:07.000000Z", "issued_at": "2020-12-14T02:16:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd932f34f4b148c784e47b7d9dd5668a", "name": "tempest-NamespaceTagsRbacTest-1603612674"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:08.102 193 INFO tempest.lib.common.rest_client [req-cbf7004d-baa7-43e8-9a67-b7bfa083b971 ] Request (NamespaceTagsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags 0.092s 2020-12-14 02:16:08.106 193 DEBUG tempest.lib.common.rest_client [req-cbf7004d-baa7-43e8-9a67-b7bfa083b971 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-cbf7004d-baa7-43e8-9a67-b7bfa083b971', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:08.117 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:08.121 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:08.131 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_metadef_tags, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:08.133 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:08.204 193 INFO tempest.lib.common.rest_client [req-bfa12958-a2d5-4855-b516-568e1e5ec480 ] Request (NamespaceTagsRbacTest:test_list_namespace_tags): 200 GET http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles 0.065s 2020-12-14 02:16:08.208 193 DEBUG tempest.lib.common.rest_client [req-bfa12958-a2d5-4855-b516-568e1e5ec480 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bfa12958-a2d5-4855-b516-568e1e5ec480', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:08.268 193 INFO tempest.lib.common.rest_client [req-8a6f76fd-c0a3-46d1-9756-07ac38d7c633 ] Request (NamespaceTagsRbacTest:test_list_namespace_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:16:08.271 193 DEBUG tempest.lib.common.rest_client [req-8a6f76fd-c0a3-46d1-9756-07ac38d7c633 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a6f76fd-c0a3-46d1-9756-07ac38d7c633', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e81b0f6f16364e63b3e39cf4d9a3197b", "name": "tempest-NamespaceTagsRbacTest-1603612674", "password_expires_at": null}, "audit_ids": ["fWSRDWsZQsy3NyvH2LHV8g"], "expires_at": "2020-12-14T03:16:08.000000Z", "issued_at": "2020-12-14T02:16:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd932f34f4b148c784e47b7d9dd5668a", "name": "tempest-NamespaceTagsRbacTest-1603612674"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:08.369 189 INFO tempest.lib.common.rest_client [req-0d756101-5223-4cb6-ae79-daca25c77c14 ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.235s 2020-12-14 02:16:08.371 189 DEBUG tempest.lib.common.rest_client [req-0d756101-5223-4cb6-ae79-daca25c77c14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0d756101-5223-4cb6-ae79-daca25c77c14', 'x-compute-request-id': 'req-0d756101-5223-4cb6-ae79-daca25c77c14', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:06Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:08.381 193 INFO tempest.lib.common.rest_client [req-37fa63a6-7528-496c-bbd4-fe0ca16943a4 ] Request (NamespaceTagsRbacTest:test_list_namespace_tags): 200 GET http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags 0.101s 2020-12-14 02:16:08.384 193 DEBUG tempest.lib.common.rest_client [req-37fa63a6-7528-496c-bbd4-fe0ca16943a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '12', 'content-type': 'application/json', 'x-openstack-request-id': 'req-37fa63a6-7528-496c-bbd4-fe0ca16943a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags'} Body: b'{"tags": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:08.387 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:08.459 193 INFO tempest.lib.common.rest_client [req-872aeb7f-04a9-4d4f-89bd-42a10e58afa5 ] Request (NamespaceTagsRbacTest:test_list_namespace_tags): 200 GET http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles 0.064s 2020-12-14 02:16:08.462 193 DEBUG tempest.lib.common.rest_client [req-872aeb7f-04a9-4d4f-89bd-42a10e58afa5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-872aeb7f-04a9-4d4f-89bd-42a10e58afa5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:08.517 193 INFO tempest.lib.common.rest_client [req-7a6dfa99-ca4d-4f37-89d1-f16499779bb1 ] Request (NamespaceTagsRbacTest:test_list_namespace_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:16:08.521 193 DEBUG tempest.lib.common.rest_client [req-7a6dfa99-ca4d-4f37-89d1-f16499779bb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a6dfa99-ca4d-4f37-89d1-f16499779bb1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e81b0f6f16364e63b3e39cf4d9a3197b", "name": "tempest-NamespaceTagsRbacTest-1603612674", "password_expires_at": null}, "audit_ids": ["2ZF5khxWQmCz9pfI21yvaQ"], "expires_at": "2020-12-14T03:16:08.000000Z", "issued_at": "2020-12-14T02:16:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd932f34f4b148c784e47b7d9dd5668a", "name": "tempest-NamespaceTagsRbacTest-1603612674"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:08.534 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:08.538 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:08.546 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_metadef_tag, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:08.599 197 INFO tempest.lib.common.rest_client [req-4ca9e61e-a6f4-45e1-b81f-cf5c631befec ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.466s 2020-12-14 02:16:08.602 197 DEBUG tempest.lib.common.rest_client [req-4ca9e61e-a6f4-45e1-b81f-cf5c631befec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-MiscPolicyActionsRbacTest-1381669334-router", "tenant_id": "13e063fab0044afeafaff2049f9b1404", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '815', 'x-openstack-request-id': 'req-4ca9e61e-a6f4-45e1-b81f-cf5c631befec', 'date': 'Mon, 14 Dec 2020 02:16:08 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "3c679a5a-15a2-4715-9812-f5f53c6676ad", "name": "tempest-MiscPolicyActionsRbacTest-1381669334-router", "tenant_id": "13e063fab0044afeafaff2049f9b1404", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.197"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::157"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:16:07Z", "updated_at": "2020-12-14T02:16:08Z", "revision_number": 3, "project_id": "13e063fab0044afeafaff2049f9b1404"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:08.654 193 INFO tempest.lib.common.rest_client [req-1ce4fe49-1f36-4944-9f44-43596fa2edfb ] Request (NamespaceTagsRbacTest:test_show_namespace_tag): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags/tempest-NamespaceTagsRbacTest-tag-1182043265 0.102s 2020-12-14 02:16:08.658 193 DEBUG tempest.lib.common.rest_client [req-1ce4fe49-1f36-4944-9f44-43596fa2edfb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '132', 'content-type': 'application/json', 'x-openstack-request-id': 'req-1ce4fe49-1f36-4944-9f44-43596fa2edfb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags/tempest-NamespaceTagsRbacTest-tag-1182043265'} Body: b'{"name": "tempest-NamespaceTagsRbacTest-tag-1182043265", "created_at": "2020-12-14T02:16:08Z", "updated_at": "2020-12-14T02:16:08Z"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:08.662 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:08.735 193 INFO tempest.lib.common.rest_client [req-77970e57-fe24-4081-900b-aa6a2b19821d ] Request (NamespaceTagsRbacTest:test_show_namespace_tag): 200 GET http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles 0.067s 2020-12-14 02:16:08.739 193 DEBUG tempest.lib.common.rest_client [req-77970e57-fe24-4081-900b-aa6a2b19821d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-77970e57-fe24-4081-900b-aa6a2b19821d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:08.790 193 INFO tempest.lib.common.rest_client [req-cba4c6b0-849f-44f5-ab37-5e91633dd808 ] Request (NamespaceTagsRbacTest:test_show_namespace_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:16:08.792 193 DEBUG tempest.lib.common.rest_client [req-cba4c6b0-849f-44f5-ab37-5e91633dd808 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cba4c6b0-849f-44f5-ab37-5e91633dd808', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e81b0f6f16364e63b3e39cf4d9a3197b", "name": "tempest-NamespaceTagsRbacTest-1603612674", "password_expires_at": null}, "audit_ids": ["RkOweejKSlix7RhjN4lyMw"], "expires_at": "2020-12-14T03:16:08.000000Z", "issued_at": "2020-12-14T02:16:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd932f34f4b148c784e47b7d9dd5668a", "name": "tempest-NamespaceTagsRbacTest-1603612674"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:08.898 193 INFO tempest.lib.common.rest_client [req-1d2867ea-cff9-47ee-adf1-b48fbbdf53e6 ] Request (NamespaceTagsRbacTest:test_show_namespace_tag): 200 GET http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags/tempest-NamespaceTagsRbacTest-tag-1182043265 0.098s 2020-12-14 02:16:08.901 193 DEBUG tempest.lib.common.rest_client [req-1d2867ea-cff9-47ee-adf1-b48fbbdf53e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '132', 'content-type': 'application/json', 'x-openstack-request-id': 'req-1d2867ea-cff9-47ee-adf1-b48fbbdf53e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags/tempest-NamespaceTagsRbacTest-tag-1182043265'} Body: b'{"name": "tempest-NamespaceTagsRbacTest-tag-1182043265", "created_at": "2020-12-14T02:16:09Z", "updated_at": "2020-12-14T02:16:09Z"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:08.903 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:08.979 193 INFO tempest.lib.common.rest_client [req-3071789a-e059-4b60-8291-ff9c273accff ] Request (NamespaceTagsRbacTest:test_show_namespace_tag): 200 GET http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles 0.068s 2020-12-14 02:16:08.982 193 DEBUG tempest.lib.common.rest_client [req-3071789a-e059-4b60-8291-ff9c273accff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3071789a-e059-4b60-8291-ff9c273accff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:09.038 193 INFO tempest.lib.common.rest_client [req-147e11fc-4f49-4f92-b34b-d60b9204f782 ] Request (NamespaceTagsRbacTest:test_show_namespace_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:16:09.042 193 DEBUG tempest.lib.common.rest_client [req-147e11fc-4f49-4f92-b34b-d60b9204f782 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-147e11fc-4f49-4f92-b34b-d60b9204f782', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e81b0f6f16364e63b3e39cf4d9a3197b", "name": "tempest-NamespaceTagsRbacTest-1603612674", "password_expires_at": null}, "audit_ids": ["VualZAo_RTG-wwspFAMubQ"], "expires_at": "2020-12-14T03:16:09.000000Z", "issued_at": "2020-12-14T02:16:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd932f34f4b148c784e47b7d9dd5668a", "name": "tempest-NamespaceTagsRbacTest-1603612674"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:09.154 193 INFO tempest.lib.common.rest_client [req-a04ff338-8d19-4556-ae45-461453fd8d78 ] Request (NamespaceTagsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags 0.102s 2020-12-14 02:16:09.157 193 DEBUG tempest.lib.common.rest_client [req-a04ff338-8d19-4556-ae45-461453fd8d78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-a04ff338-8d19-4556-ae45-461453fd8d78', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:09.169 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:09.173 193 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:09.181 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_metadef_tag, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:09.226 193 INFO tempest.lib.common.rest_client [req-3ef698da-fd74-492b-b0cb-8f3cfb3739a2 ] Request (NamespaceTagsRbacTest:test_update_namespace_tag): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags/tempest-NamespaceTagsRbacTest-tag-1095204268 0.038s 2020-12-14 02:16:09.229 193 DEBUG tempest.lib.common.rest_client [req-3ef698da-fd74-492b-b0cb-8f3cfb3739a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '132', 'content-type': 'application/json', 'x-openstack-request-id': 'req-3ef698da-fd74-492b-b0cb-8f3cfb3739a2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags/tempest-NamespaceTagsRbacTest-tag-1095204268'} Body: b'{"name": "tempest-NamespaceTagsRbacTest-tag-1095204268", "created_at": "2020-12-14T02:16:09Z", "updated_at": "2020-12-14T02:16:09Z"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:09.232 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:09.265 186 INFO tempest.lib.common.rest_client [req-271de80d-1373-467b-bb6b-858a64529844 ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1 0.268s 2020-12-14 02:16:09.269 186 DEBUG tempest.lib.common.rest_client [req-271de80d-1373-467b-bb6b-858a64529844 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-271de80d-1373-467b-bb6b-858a64529844', 'x-compute-request-id': 'req-271de80d-1373-467b-bb6b-858a64529844', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1'} Body: b'{"server": {"id": "b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1", "name": "tempest-ServerConsolesV26RbacTest-server-209335578", "status": "BUILD", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "user_id": "735d932f2baa406eb3a0c1b7e094dee0", "metadata": {}, "hostId": "8b441e9973257d0dccd7078c23f7888d7c6528b6c539cdb1c8250cad", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:03Z", "updated": "2020-12-14T02:16:05Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:09.301 193 INFO tempest.lib.common.rest_client [req-0384b042-817b-41eb-993e-ec069a2ab76e ] Request (NamespaceTagsRbacTest:test_update_namespace_tag): 200 GET http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles 0.063s 2020-12-14 02:16:09.304 193 DEBUG tempest.lib.common.rest_client [req-0384b042-817b-41eb-993e-ec069a2ab76e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0384b042-817b-41eb-993e-ec069a2ab76e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:09.352 193 INFO tempest.lib.common.rest_client [req-485e5d81-de87-40f8-bf7d-e8975825794e ] Request (NamespaceTagsRbacTest:test_update_namespace_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:16:09.355 193 DEBUG tempest.lib.common.rest_client [req-485e5d81-de87-40f8-bf7d-e8975825794e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-485e5d81-de87-40f8-bf7d-e8975825794e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e81b0f6f16364e63b3e39cf4d9a3197b", "name": "tempest-NamespaceTagsRbacTest-1603612674", "password_expires_at": null}, "audit_ids": ["9SymoSElSZaME3RlLSCh8A"], "expires_at": "2020-12-14T03:16:09.000000Z", "issued_at": "2020-12-14T02:16:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd932f34f4b148c784e47b7d9dd5668a", "name": "tempest-NamespaceTagsRbacTest-1603612674"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:09.461 193 INFO tempest.lib.common.rest_client [req-cac2d67e-7165-41d1-b78a-a4fe6898c01c ] Request (NamespaceTagsRbacTest:test_update_namespace_tag): 200 PUT http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags/tempest-NamespaceTagsRbacTest-tag-1095204268 0.098s 2020-12-14 02:16:09.464 193 DEBUG tempest.lib.common.rest_client [req-cac2d67e-7165-41d1-b78a-a4fe6898c01c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-NamespaceTagsRbacTest-tag-864828640"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '131', 'content-type': 'application/json', 'x-openstack-request-id': 'req-cac2d67e-7165-41d1-b78a-a4fe6898c01c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags/tempest-NamespaceTagsRbacTest-tag-1095204268'} Body: b'{"name": "tempest-NamespaceTagsRbacTest-tag-864828640", "created_at": "2020-12-14T02:16:09Z", "updated_at": "2020-12-14T02:16:09Z"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:09.466 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:09.538 193 INFO tempest.lib.common.rest_client [req-8c4c6ae0-32fc-4e0b-b095-e408d4ac174d ] Request (NamespaceTagsRbacTest:test_update_namespace_tag): 200 GET http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles 0.065s 2020-12-14 02:16:09.542 193 DEBUG tempest.lib.common.rest_client [req-8c4c6ae0-32fc-4e0b-b095-e408d4ac174d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c4c6ae0-32fc-4e0b-b095-e408d4ac174d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a/users/e81b0f6f16364e63b3e39cf4d9a3197b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:09.599 193 INFO tempest.lib.common.rest_client [req-6c9bd06d-4c22-4418-b847-6e718277d5f3 ] Request (NamespaceTagsRbacTest:test_update_namespace_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:16:09.603 193 DEBUG tempest.lib.common.rest_client [req-6c9bd06d-4c22-4418-b847-6e718277d5f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c9bd06d-4c22-4418-b847-6e718277d5f3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e81b0f6f16364e63b3e39cf4d9a3197b", "name": "tempest-NamespaceTagsRbacTest-1603612674", "password_expires_at": null}, "audit_ids": ["iL8rmuBoQVyLw-RNwglePg"], "expires_at": "2020-12-14T03:16:09.000000Z", "issued_at": "2020-12-14T02:16:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd932f34f4b148c784e47b7d9dd5668a", "name": "tempest-NamespaceTagsRbacTest-1603612674"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd932f34f4b148c784e47b7d9dd5668a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:09.708 193 INFO tempest.lib.common.rest_client [req-b2d548be-9cd7-4820-b0b4-7623eb980043 ] Request (NamespaceTagsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags 0.096s 2020-12-14 02:16:09.711 193 DEBUG tempest.lib.common.rest_client [req-b2d548be-9cd7-4820-b0b4-7623eb980043 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-b2d548be-9cd7-4820-b0b4-7623eb980043', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064/tags'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:09.779 193 INFO tempest.lib.common.rest_client [req-07ab1549-799c-4336-acf1-f25d8cb63930 ] Request (NamespaceTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064 0.051s 2020-12-14 02:16:09.782 193 DEBUG tempest.lib.common.rest_client [req-07ab1549-799c-4336-acf1-f25d8cb63930 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-07ab1549-799c-4336-acf1-f25d8cb63930', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-NamespaceTagsRbacTest-namespace-456886064'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:09.798 189 INFO tempest.lib.common.rest_client [req-ac8aae4f-f792-4400-8e80-049f7e14e263 ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.316s 2020-12-14 02:16:09.801 189 DEBUG tempest.lib.common.rest_client [req-ac8aae4f-f792-4400-8e80-049f7e14e263 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ac8aae4f-f792-4400-8e80-049f7e14e263', 'x-compute-request-id': 'req-ac8aae4f-f792-4400-8e80-049f7e14e263', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:06Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:09.950 193 INFO tempest.lib.common.rest_client [req-b08874a1-6018-4ba9-9946-07178a78b88f ] Request (NamespaceTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/e81b0f6f16364e63b3e39cf4d9a3197b 0.161s 2020-12-14 02:16:09.953 193 DEBUG tempest.lib.common.rest_client [req-b08874a1-6018-4ba9-9946-07178a78b88f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b08874a1-6018-4ba9-9946-07178a78b88f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/e81b0f6f16364e63b3e39cf4d9a3197b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:10.059 193 INFO tempest.lib.common.rest_client [req-79ba6be9-81d5-4407-94fb-84f7c7cd2093 ] Request (NamespaceTagsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:16:10.062 193 DEBUG tempest.lib.common.rest_client [req-79ba6be9-81d5-4407-94fb-84f7c7cd2093 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79ba6be9-81d5-4407-94fb-84f7c7cd2093', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Kfdl_BHbTG-Ihtagw63jFw"], "expires_at": "2020-12-14T03:16:09.000000Z", "issued_at": "2020-12-14T02:16:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:10.364 193 INFO tempest.lib.common.rest_client [req-aa6063e7-08b8-4947-8926-c5de7beef3f9 ] Request (NamespaceTagsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=fd932f34f4b148c784e47b7d9dd5668a&name=default 0.296s 2020-12-14 02:16:10.368 193 DEBUG tempest.lib.common.rest_client [req-aa6063e7-08b8-4947-8926-c5de7beef3f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-aa6063e7-08b8-4947-8926-c5de7beef3f9', 'date': 'Mon, 14 Dec 2020 02:16:10 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=fd932f34f4b148c784e47b7d9dd5668a&name=default'} Body: b'{"security_groups": [{"id": "d6f0f565-47f1-40e7-9261-503fad155e53", "name": "default", "stateful": true, "tenant_id": "fd932f34f4b148c784e47b7d9dd5668a", "description": "Default security group", "security_group_rules": [{"id": "53a71aab-8eec-4154-987b-d4c3938cfafc", "tenant_id": "fd932f34f4b148c784e47b7d9dd5668a", "security_group_id": "d6f0f565-47f1-40e7-9261-503fad155e53", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d6f0f565-47f1-40e7-9261-503fad155e53", "description": null, "tags": [], "created_at": "2020-12-14T02:16:10Z", "updated_at": "2020-12-14T02:16:10Z", "revision_number": 0, "project_id": "fd932f34f4b148c784e47b7d9dd5668a"}, {"id": "b1830e3d-cb32-4d77-aa59-3ec922c6b16b", "tenant_id": "fd932f34f4b148c784e47b7d9dd5668a", "security_group_id": "d6f0f565-47f1-40e7-9261-503fad155e53", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d6f0f565-47f1-40e7-9261-503fad155e53", "description": null, "tags": [], "created_at": "2020-12-14T02:16:10Z", "updated_at": "2020-12-14T02:16:10Z", "revision_number": 0, "project_id": "fd932f34f4b148c784e47b7d9dd5668a"}, {"id": "d70798ef-5bde-4184-b6fd-06aa6d583ffa", "tenant_id": "fd932f34f4b148c784e47b7d9dd5668a", "security_group_id": "d6f0f565-47f1-40e7-9261-503fad155e53", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:16:10Z", "updated_at": "2020-12-14T02:16:10Z", "revision_number": 0, "project_id": "fd932f34f4b148c784e47b7d9dd5668a"}, {"id": "f791c877-418b-42a5-a2a5-ab579c4e5059", "tenant_id": "fd932f34f4b148c784e47b7d9dd5668a", "security_group_id": "d6f0f565-47f1-40e7-9261-503fad155e53", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:16:10Z", "updated_at": "2020-12-14T02:16:10Z", "revision_number": 0, "project_id": "fd932f34f4b148c784e47b7d9dd5668a"}], "tags": [], "created_at": "2020-12-14T02:16:10Z", "updated_at": "2020-12-14T02:16:10Z", "revision_number": 1, "project_id": "fd932f34f4b148c784e47b7d9dd5668a"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:10.551 197 INFO tempest.lib.common.rest_client [req-fd202eb8-5ed7-4dce-aa48-6eed089ae740 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/3c679a5a-15a2-4715-9812-f5f53c6676ad/add_router_interface 1.941s 2020-12-14 02:16:10.555 197 DEBUG tempest.lib.common.rest_client [req-fd202eb8-5ed7-4dce-aa48-6eed089ae740 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "cd9c7c45-cb13-4156-afae-7bf82ff6ac9c"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-fd202eb8-5ed7-4dce-aa48-6eed089ae740', 'date': 'Mon, 14 Dec 2020 02:16:10 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/3c679a5a-15a2-4715-9812-f5f53c6676ad/add_router_interface'} Body: b'{"id": "3c679a5a-15a2-4715-9812-f5f53c6676ad", "tenant_id": "13e063fab0044afeafaff2049f9b1404", "port_id": "44815307-3e66-4473-8b9d-a55aacfbc458", "network_id": "84bc7718-06c3-4f50-bdeb-4d3ec777c9b0", "subnet_id": "cd9c7c45-cb13-4156-afae-7bf82ff6ac9c", "subnet_ids": ["cd9c7c45-cb13-4156-afae-7bf82ff6ac9c"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:10.558 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MiscPolicyActionsRbacTest-1205860986', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '13e063fab0044afeafaff2049f9b1404', 'project_name': 'tempest-MiscPolicyActionsRbacTest-1205860986', 'tenant_id': '13e063fab0044afeafaff2049f9b1404', 'tenant_name': 'tempest-MiscPolicyActionsRbacTest-1205860986', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '7792aa6a9e6448e784708264bc9c7c58'}, Network: {'id': '84bc7718-06c3-4f50-bdeb-4d3ec777c9b0', 'name': 'tempest-MiscPolicyActionsRbacTest-1381669334-network', 'tenant_id': '13e063fab0044afeafaff2049f9b1404', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '13e063fab0044afeafaff2049f9b1404', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 68, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:16:06Z', 'updated_at': '2020-12-14T02:16:06Z', 'revision_number': 1}, Subnet: {'id': 'cd9c7c45-cb13-4156-afae-7bf82ff6ac9c', 'name': 'tempest-MiscPolicyActionsRbacTest-1381669334-subnet', 'tenant_id': '13e063fab0044afeafaff2049f9b1404', 'network_id': '84bc7718-06c3-4f50-bdeb-4d3ec777c9b0', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:16:06Z', 'updated_at': '2020-12-14T02:16:06Z', 'revision_number': 0, 'project_id': '13e063fab0044afeafaff2049f9b1404'}, Router: {'id': '3c679a5a-15a2-4715-9812-f5f53c6676ad', 'name': 'tempest-MiscPolicyActionsRbacTest-1381669334-router', 'tenant_id': '13e063fab0044afeafaff2049f9b1404', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.197'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::157'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:16:07Z', 'updated_at': '2020-12-14T02:16:08Z', 'revision_number': 3, 'project_id': '13e063fab0044afeafaff2049f9b1404'} 2020-12-14 02:16:10.589 193 INFO tempest.lib.common.rest_client [req-90004ce0-4f96-4735-8300-1a1a8b323975 ] Request (NamespaceTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/d6f0f565-47f1-40e7-9261-503fad155e53 0.211s 2020-12-14 02:16:10.594 193 DEBUG tempest.lib.common.rest_client [req-90004ce0-4f96-4735-8300-1a1a8b323975 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-90004ce0-4f96-4735-8300-1a1a8b323975', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:16:10 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/d6f0f565-47f1-40e7-9261-503fad155e53'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:10.620 186 INFO tempest.lib.common.rest_client [req-cbf98ffb-e693-4210-b706-545889bf5a0d ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1 0.242s 2020-12-14 02:16:10.622 186 DEBUG tempest.lib.common.rest_client [req-cbf98ffb-e693-4210-b706-545889bf5a0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cbf98ffb-e693-4210-b706-545889bf5a0d', 'x-compute-request-id': 'req-cbf98ffb-e693-4210-b706-545889bf5a0d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1'} Body: b'{"server": {"id": "b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1", "name": "tempest-ServerConsolesV26RbacTest-server-209335578", "status": "BUILD", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "user_id": "735d932f2baa406eb3a0c1b7e094dee0", "metadata": {}, "hostId": "8b441e9973257d0dccd7078c23f7888d7c6528b6c539cdb1c8250cad", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:03Z", "updated": "2020-12-14T02:16:05Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:10.740 193 INFO tempest.lib.common.rest_client [req-140fe096-ae3c-42b0-9394-181efeaa9eda ] Request (NamespaceTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a 0.139s 2020-12-14 02:16:10.742 193 DEBUG tempest.lib.common.rest_client [req-140fe096-ae3c-42b0-9394-181efeaa9eda ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-140fe096-ae3c-42b0-9394-181efeaa9eda', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd932f34f4b148c784e47b7d9dd5668a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:10.754 197 INFO tempest.lib.common.rest_client [req-fcb06902-349d-4ef6-99d7-2746d3123cc8 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.122s 2020-12-14 02:16:10.757 197 DEBUG tempest.lib.common.rest_client [req-fcb06902-349d-4ef6-99d7-2746d3123cc8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fcb06902-349d-4ef6-99d7-2746d3123cc8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7792aa6a9e6448e784708264bc9c7c58", "name": "tempest-MiscPolicyActionsRbacTest-1205860986", "password_expires_at": null}, "audit_ids": ["ybvB2oaUTsKTp6FPOIbySw"], "expires_at": "2020-12-14T03:16:10.000000Z", "issued_at": "2020-12-14T02:16:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "13e063fab0044afeafaff2049f9b1404", "name": "tempest-MiscPolicyActionsRbacTest-1205860986"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/13e063fab0044afeafaff2049f9b1404", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/13e063fab0044afeafaff2049f9b1404", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/13e063fab0044afeafaff2049f9b1404", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_13e063fab0044afeafaff2049f9b1404", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_13e063fab0044afeafaff2049f9b1404", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_13e063fab0044afeafaff2049f9b1404", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:10.854 193 INFO tempest.lib.common.rest_client [req-0dc2cff3-71b7-48cd-a39b-5825082be971 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:16:10.858 193 DEBUG tempest.lib.common.rest_client [req-0dc2cff3-71b7-48cd-a39b-5825082be971 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0dc2cff3-71b7-48cd-a39b-5825082be971', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["l2J5V-KiREywnIKDwI8YQA"], "expires_at": "2020-12-14T03:16:10.000000Z", "issued_at": "2020-12-14T02:16:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:10.899 197 INFO tempest.lib.common.rest_client [req-b818eaa6-e124-4b94-aafd-23f5cfb91a23 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.132s 2020-12-14 02:16:10.902 197 DEBUG tempest.lib.common.rest_client [req-b818eaa6-e124-4b94-aafd-23f5cfb91a23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b818eaa6-e124-4b94-aafd-23f5cfb91a23', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["nuVFKmcdSOKVfCo6uo0w8g"], "expires_at": "2020-12-14T03:16:10.000000Z", "issued_at": "2020-12-14T02:16:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:10.950 193 INFO tempest.lib.common.rest_client [req-bfc2f4cd-e3c9-46b7-8a14-dea513694d09 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:16:10.953 193 DEBUG tempest.lib.common.rest_client [req-bfc2f4cd-e3c9-46b7-8a14-dea513694d09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bfc2f4cd-e3c9-46b7-8a14-dea513694d09', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["iqEWxISWQpeAOU_1meBqiQ"], "expires_at": "2020-12-14T03:16:10.000000Z", "issued_at": "2020-12-14T02:16:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.018 193 INFO tempest.lib.common.rest_client [req-1a64bf6e-accb-48cb-afac-c4a0edea182e ] Request (AvailabilityZoneExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.058s 2020-12-14 02:16:11.021 193 DEBUG tempest.lib.common.rest_client [req-1a64bf6e-accb-48cb-afac-c4a0edea182e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a64bf6e-accb-48cb-afac-c4a0edea182e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.103 193 INFO tempest.lib.common.rest_client [req-b4d95e6d-42ad-4a9f-a281-fbc379ad83d2 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.074s 2020-12-14 02:16:11.106 193 DEBUG tempest.lib.common.rest_client [req-b4d95e6d-42ad-4a9f-a281-fbc379ad83d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-AvailabilityZoneExtRbacTest-1258248979-desc", "domain_id": "default", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '392', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4d95e6d-42ad-4a9f-a281-fbc379ad83d2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "573b1180f3af43deb41cd790e8c2c46c", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979", "domain_id": "default", "description": "tempest-AvailabilityZoneExtRbacTest-1258248979-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.134 189 INFO tempest.lib.common.rest_client [req-ac2f6c15-819d-4f0a-b00b-de4517c87b83 ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.221s 2020-12-14 02:16:11.136 189 DEBUG tempest.lib.common.rest_client [req-ac2f6c15-819d-4f0a-b00b-de4517c87b83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ac2f6c15-819d-4f0a-b00b-de4517c87b83', 'x-compute-request-id': 'req-ac2f6c15-819d-4f0a-b00b-de4517c87b83', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:10Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.221 189 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrating" ==> "RESIZE/resize_migrated" after 7 second wait 2020-12-14 02:16:11.227 193 INFO tempest.lib.common.rest_client [req-fb66525d-eae3-4a3c-8e73-d1587d0caa42 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.114s 2020-12-14 02:16:11.229 193 DEBUG tempest.lib.common.rest_client [req-fb66525d-eae3-4a3c-8e73-d1587d0caa42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-AvailabilityZoneExtRbacTest-1258248979", "password": "C2~!7lD%l4%pn6D", "project_id": "573b1180f3af43deb41cd790e8c2c46c", "email": "tempest-AvailabilityZoneExtRbacTest-545152376@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '409', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fb66525d-eae3-4a3c-8e73-d1587d0caa42', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "573b1180f3af43deb41cd790e8c2c46c", "email": "tempest-AvailabilityZoneExtRbacTest-545152376@example.com", "id": "556f254b1bd14556b328e133848f0d4b", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/556f254b1bd14556b328e133848f0d4b"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.296 193 INFO tempest.lib.common.rest_client [req-1d148781-d0c5-4845-aca9-57a2e2a154b2 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:16:11.298 193 DEBUG tempest.lib.common.rest_client [req-1d148781-d0c5-4845-aca9-57a2e2a154b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d148781-d0c5-4845-aca9-57a2e2a154b2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.372 193 INFO tempest.lib.common.rest_client [req-84f7e9d2-18f8-422b-8885-ebb214f9c8ae ] Request (AvailabilityZoneExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.068s 2020-12-14 02:16:11.375 193 DEBUG tempest.lib.common.rest_client [req-84f7e9d2-18f8-422b-8885-ebb214f9c8ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84f7e9d2-18f8-422b-8885-ebb214f9c8ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.427 197 INFO tempest.lib.common.rest_client [req-81a1cd19-ba8b-4a50-b010-9a5ce5c08d8c ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.059s 2020-12-14 02:16:11.430 197 DEBUG tempest.lib.common.rest_client [req-81a1cd19-ba8b-4a50-b010-9a5ce5c08d8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81a1cd19-ba8b-4a50-b010-9a5ce5c08d8c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["cjpr3WisSfmL31ZgwoBh0g"], "expires_at": "2020-12-14T03:16:11.000000Z", "issued_at": "2020-12-14T02:16:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.458 193 INFO tempest.lib.common.rest_client [req-431b57e6-606c-4de3-b0f2-916396e528e5 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c/users/556f254b1bd14556b328e133848f0d4b/roles/72a4576c553448cd941b052c1ca0cf2d 0.074s 2020-12-14 02:16:11.461 193 DEBUG tempest.lib.common.rest_client [req-431b57e6-606c-4de3-b0f2-916396e528e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-431b57e6-606c-4de3-b0f2-916396e528e5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c/users/556f254b1bd14556b328e133848f0d4b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.463 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AvailabilityZoneExtRbacTest-1258248979', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '573b1180f3af43deb41cd790e8c2c46c', 'project_name': 'tempest-AvailabilityZoneExtRbacTest-1258248979', 'tenant_id': '573b1180f3af43deb41cd790e8c2c46c', 'tenant_name': 'tempest-AvailabilityZoneExtRbacTest-1258248979', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '556f254b1bd14556b328e133848f0d4b'}, Network: None, Subnet: None, Router: None 2020-12-14 02:16:11.465 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AvailabilityZoneExtRbacTest-1258248979', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '573b1180f3af43deb41cd790e8c2c46c', 'project_name': 'tempest-AvailabilityZoneExtRbacTest-1258248979', 'tenant_id': '573b1180f3af43deb41cd790e8c2c46c', 'tenant_name': 'tempest-AvailabilityZoneExtRbacTest-1258248979', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '556f254b1bd14556b328e133848f0d4b'}, Network: None, Subnet: None, Router: None 2020-12-14 02:16:11.528 197 INFO tempest.lib.common.rest_client [req-a8cf5e5a-7774-4591-b56f-3b895300a31d ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.091s 2020-12-14 02:16:11.531 197 DEBUG tempest.lib.common.rest_client [req-a8cf5e5a-7774-4591-b56f-3b895300a31d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8cf5e5a-7774-4591-b56f-3b895300a31d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.595 197 INFO tempest.lib.common.rest_client [req-e355a740-15b2-4f75-bec2-ae6511cc2142 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:16:11.598 197 DEBUG tempest.lib.common.rest_client [req-e355a740-15b2-4f75-bec2-ae6511cc2142 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e355a740-15b2-4f75-bec2-ae6511cc2142', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.602 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:16:11.604 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:11.638 193 INFO tempest.lib.common.rest_client [req-92f5d433-8607-45ba-a18d-0764bbe14464 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.123s 2020-12-14 02:16:11.642 193 DEBUG tempest.lib.common.rest_client [req-92f5d433-8607-45ba-a18d-0764bbe14464 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6585', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92f5d433-8607-45ba-a18d-0764bbe14464', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "556f254b1bd14556b328e133848f0d4b", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979", "password_expires_at": null}, "audit_ids": ["6GljrKGUSFC2_ZPbv_JYkg"], "expires_at": "2020-12-14T03:16:11.000000Z", "issued_at": "2020-12-14T02:16:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "573b1180f3af43deb41cd790e8c2c46c", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.645 193 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-12-14 02:16:11.671 197 INFO tempest.lib.common.rest_client [req-456cadb2-dfcd-481c-bc92-0b5d847616e5 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.061s 2020-12-14 02:16:11.674 197 DEBUG tempest.lib.common.rest_client [req-456cadb2-dfcd-481c-bc92-0b5d847616e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-456cadb2-dfcd-481c-bc92-0b5d847616e5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.715 193 INFO tempest.lib.common.rest_client [req-9121bdb8-52ac-427c-9426-4de50c7c6456 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:16:11.718 193 DEBUG tempest.lib.common.rest_client [req-9121bdb8-52ac-427c-9426-4de50c7c6456 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9121bdb8-52ac-427c-9426-4de50c7c6456', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["RfH15VHCRIGFDqcwMXRMYQ"], "expires_at": "2020-12-14T03:16:11.000000Z", "issued_at": "2020-12-14T02:16:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.747 197 INFO tempest.lib.common.rest_client [req-503a6c45-cf21-4334-aa7c-e6e7e42da1e7 ] Request (MiscPolicyActionsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles/72a4576c553448cd941b052c1ca0cf2d 0.067s 2020-12-14 02:16:11.750 197 DEBUG tempest.lib.common.rest_client [req-503a6c45-cf21-4334-aa7c-e6e7e42da1e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-503a6c45-cf21-4334-aa7c-e6e7e42da1e7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.857 197 INFO tempest.lib.common.rest_client [req-be8bf018-1d6c-457b-8e9c-1a89b61482d8 ] Request (MiscPolicyActionsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles/a629c95d64b3416fb80ae90af4f69c05 0.100s 2020-12-14 02:16:11.859 197 DEBUG tempest.lib.common.rest_client [req-be8bf018-1d6c-457b-8e9c-1a89b61482d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be8bf018-1d6c-457b-8e9c-1a89b61482d8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.862 193 INFO tempest.lib.common.rest_client [req-fa949e18-f96e-4fc8-bb60-29ede755f23c ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:16:11.865 193 DEBUG tempest.lib.common.rest_client [req-fa949e18-f96e-4fc8-bb60-29ede755f23c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa949e18-f96e-4fc8-bb60-29ede755f23c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Krf1cMoATOKItWBQQpQqqw"], "expires_at": "2020-12-14T03:16:11.000000Z", "issued_at": "2020-12-14T02:16:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.957 186 INFO tempest.lib.common.rest_client [req-ac1d725a-427d-4737-b721-e9e23fdbc120 ] Request (ServerConsolesV26RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1 0.226s 2020-12-14 02:16:11.960 193 INFO tempest.lib.common.rest_client [req-e77446f3-f3af-4410-b3e0-881cfd6a57f9 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.088s 2020-12-14 02:16:11.961 186 DEBUG tempest.lib.common.rest_client [req-ac1d725a-427d-4737-b721-e9e23fdbc120 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ac1d725a-427d-4737-b721-e9e23fdbc120', 'x-compute-request-id': 'req-ac1d725a-427d-4737-b721-e9e23fdbc120', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1'} Body: b'{"server": {"id": "b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1", "name": "tempest-ServerConsolesV26RbacTest-server-209335578", "status": "ACTIVE", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "user_id": "735d932f2baa406eb3a0c1b7e094dee0", "metadata": {}, "hostId": "8b441e9973257d0dccd7078c23f7888d7c6528b6c539cdb1c8250cad", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:03Z", "updated": "2020-12-14T02:16:11Z", "addresses": {"tempest-ServerConsolesV26RbacTest-1100921850-network": [{"version": 4, "addr": "192.168.120.10", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:0f:e2:bd"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:10.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:11.963 193 DEBUG tempest.lib.common.rest_client [req-e77446f3-f3af-4410-b3e0-881cfd6a57f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e77446f3-f3af-4410-b3e0-881cfd6a57f9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:12.024 193 INFO tempest.lib.common.rest_client [req-a4630b50-a7db-4e92-a705-0f3cde7b78c1 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-14 02:16:12.026 193 DEBUG tempest.lib.common.rest_client [req-a4630b50-a7db-4e92-a705-0f3cde7b78c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a4630b50-a7db-4e92-a705-0f3cde7b78c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:12.028 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:16:12.030 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:12.064 186 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 8 second wait 2020-12-14 02:16:12.072 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:12.077 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.080 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.084 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.087 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.091 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.094 193 INFO tempest.lib.common.rest_client [req-f2e6f84e-b677-4aa3-abbe-444d02811634 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c/users/556f254b1bd14556b328e133848f0d4b/roles 0.059s 2020-12-14 02:16:12.095 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.097 193 DEBUG tempest.lib.common.rest_client [req-f2e6f84e-b677-4aa3-abbe-444d02811634 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2e6f84e-b677-4aa3-abbe-444d02811634', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c/users/556f254b1bd14556b328e133848f0d4b/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c/users/556f254b1bd14556b328e133848f0d4b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:12.100 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.103 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.106 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.108 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.111 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.114 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.117 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.120 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.124 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.129 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.132 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.134 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.137 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.140 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.143 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.146 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.148 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.151 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.154 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.157 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.160 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.162 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.165 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.165 193 INFO tempest.lib.common.rest_client [req-1d679ef1-a62e-4337-bbe3-d2c27f4fef91 ] Request (AvailabilityZoneExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c/users/556f254b1bd14556b328e133848f0d4b/roles/72a4576c553448cd941b052c1ca0cf2d 0.063s 2020-12-14 02:16:12.167 193 DEBUG tempest.lib.common.rest_client [req-1d679ef1-a62e-4337-bbe3-d2c27f4fef91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d679ef1-a62e-4337-bbe3-d2c27f4fef91', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c/users/556f254b1bd14556b328e133848f0d4b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:12.168 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.171 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.173 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.175 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.177 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.179 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.181 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.183 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.185 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.188 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.190 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.192 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.194 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.196 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.198 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.200 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.202 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.204 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.206 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.208 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.210 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.212 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.214 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.217 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.219 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.222 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.224 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.229 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.231 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.233 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.236 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.238 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.240 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.242 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.245 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.247 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.249 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.251 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.253 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.255 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.257 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.259 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:12.268 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-remote-consoles, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:12.270 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:12.280 193 INFO tempest.lib.common.rest_client [req-242fb60f-29c1-46a8-aea4-a5b5dc9d1c0e ] Request (AvailabilityZoneExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c/users/556f254b1bd14556b328e133848f0d4b/roles/a629c95d64b3416fb80ae90af4f69c05 0.106s 2020-12-14 02:16:12.282 193 DEBUG tempest.lib.common.rest_client [req-242fb60f-29c1-46a8-aea4-a5b5dc9d1c0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-242fb60f-29c1-46a8-aea4-a5b5dc9d1c0e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c/users/556f254b1bd14556b328e133848f0d4b/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:12.385 186 INFO tempest.lib.common.rest_client [req-ce774b36-8e37-4db8-813f-a180c2aebabf ] Request (ServerConsolesV26RbacTest:test_get_remote_console_output): 200 GET http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336/users/735d932f2baa406eb3a0c1b7e094dee0/roles 0.109s 2020-12-14 02:16:12.388 186 DEBUG tempest.lib.common.rest_client [req-ce774b36-8e37-4db8-813f-a180c2aebabf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce774b36-8e37-4db8-813f-a180c2aebabf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336/users/735d932f2baa406eb3a0c1b7e094dee0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336/users/735d932f2baa406eb3a0c1b7e094dee0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:12.455 189 INFO tempest.lib.common.rest_client [req-938207a2-181f-468e-ab75-e6ae6c65cd6c ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.226s 2020-12-14 02:16:12.458 189 DEBUG tempest.lib.common.rest_client [req-938207a2-181f-468e-ab75-e6ae6c65cd6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1729', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-938207a2-181f-468e-ab75-e6ae6c65cd6c', 'x-compute-request-id': 'req-938207a2-181f-468e-ab75-e6ae6c65cd6c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:11Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:12.477 186 INFO tempest.lib.common.rest_client [req-f25ab74f-311b-4dfd-8ab7-edf3294a6cf5 ] Request (ServerConsolesV26RbacTest:test_get_remote_console_output): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-12-14 02:16:12.479 186 DEBUG tempest.lib.common.rest_client [req-f25ab74f-311b-4dfd-8ab7-edf3294a6cf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f25ab74f-311b-4dfd-8ab7-edf3294a6cf5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "735d932f2baa406eb3a0c1b7e094dee0", "name": "tempest-ServerConsolesV26RbacTest-382930008", "password_expires_at": null}, "audit_ids": ["GnJnMDfjT3mh1YTUOsHO4Q"], "expires_at": "2020-12-14T03:16:12.000000Z", "issued_at": "2020-12-14T02:16:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3af73cfc094a498ab90faa59c2482336", "name": "tempest-ServerConsolesV26RbacTest-382930008"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:12.537 189 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrated" ==> "RESIZE/resize_finish" after 8 second wait 2020-12-14 02:16:12.735 186 INFO tempest.lib.common.rest_client [req-fdc073b0-d463-40e0-921d-2b20d684f11f ] Request (ServerConsolesV26RbacTest:test_get_remote_console_output): 200 POST http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1/remote-consoles 0.249s 2020-12-14 02:16:12.738 186 DEBUG tempest.lib.common.rest_client [req-fdc073b0-d463-40e0-921d-2b20d684f11f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.6', 'X-Auth-Token': ''} Body: {"remote_console": {"type": "novnc", "protocol": "vnc"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '158', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.6', 'x-openstack-nova-api-version': '2.6', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fdc073b0-d463-40e0-921d-2b20d684f11f', 'x-compute-request-id': 'req-fdc073b0-d463-40e0-921d-2b20d684f11f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1/remote-consoles'} Body: b'{"remote_console": {"protocol": "vnc", "type": "novnc", "url": "http://172.30.13.94:6080/vnc_auto.html?path=%3Ftoken%3D6357580d-aba5-4889-9305-d575d706ec3c"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:12.752 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:12.839 186 INFO tempest.lib.common.rest_client [req-1aedac5f-db35-4965-9df2-07d1ca33f26f ] Request (ServerConsolesV26RbacTest:test_get_remote_console_output): 200 GET http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336/users/735d932f2baa406eb3a0c1b7e094dee0/roles 0.082s 2020-12-14 02:16:12.843 186 DEBUG tempest.lib.common.rest_client [req-1aedac5f-db35-4965-9df2-07d1ca33f26f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1aedac5f-db35-4965-9df2-07d1ca33f26f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336/users/735d932f2baa406eb3a0c1b7e094dee0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336/users/735d932f2baa406eb3a0c1b7e094dee0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:12.893 186 INFO tempest.lib.common.rest_client [req-717ab2e1-f0bb-4821-ab01-cb272a5c0a22 ] Request (ServerConsolesV26RbacTest:test_get_remote_console_output): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:16:12.897 186 DEBUG tempest.lib.common.rest_client [req-717ab2e1-f0bb-4821-ab01-cb272a5c0a22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-717ab2e1-f0bb-4821-ab01-cb272a5c0a22', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "735d932f2baa406eb3a0c1b7e094dee0", "name": "tempest-ServerConsolesV26RbacTest-382930008", "password_expires_at": null}, "audit_ids": ["nowm8sHjRduiNOUQoXudpA"], "expires_at": "2020-12-14T03:16:12.000000Z", "issued_at": "2020-12-14T02:16:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3af73cfc094a498ab90faa59c2482336", "name": "tempest-ServerConsolesV26RbacTest-382930008"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3af73cfc094a498ab90faa59c2482336", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:12.963 197 INFO tempest.lib.common.rest_client [req-4ece5c21-1182-4912-9368-898a86d7244b ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:16:12.966 197 DEBUG tempest.lib.common.rest_client [req-4ece5c21-1182-4912-9368-898a86d7244b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ece5c21-1182-4912-9368-898a86d7244b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["-rLAS0WVRaCksv91y19Bag"], "expires_at": "2020-12-14T03:16:12.000000Z", "issued_at": "2020-12-14T02:16:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:13.049 197 INFO tempest.lib.common.rest_client [req-3f61f1bb-83c2-4d8d-9c3b-a9705b780975 ] Request (MiscPolicyActionsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-12-14 02:16:13.051 197 DEBUG tempest.lib.common.rest_client [req-3f61f1bb-83c2-4d8d-9c3b-a9705b780975 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f61f1bb-83c2-4d8d-9c3b-a9705b780975', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["rNnImjHPQeamu3G0hfT7ww"], "expires_at": "2020-12-14T03:16:13.000000Z", "issued_at": "2020-12-14T02:16:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:13.055 197 INFO tempest.lib.common.fixed_network [-] (MiscPolicyActionsRbacTest:setUpClass) Found network {'id': '25a7ce63-636c-4fcd-bf14-ab20366f9481', 'name': 'tempest-MiscPolicyActionsRbacTest-2031429312-network', 'tenant_id': 'a836f1fb2f90434abc04b768f968fb5b', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'a836f1fb2f90434abc04b768f968fb5b', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 65, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:15:55Z', 'updated_at': '2020-12-14T02:15:55Z', 'revision_number': 1} available for tenant 2020-12-14 02:16:13.324 186 INFO tempest.lib.common.rest_client [req-66a60641-6831-4ab5-8a9b-4a9f72fd644c ] Request (ServerConsolesV26RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1 0.406s 2020-12-14 02:16:13.326 186 DEBUG tempest.lib.common.rest_client [req-66a60641-6831-4ab5-8a9b-4a9f72fd644c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-66a60641-6831-4ab5-8a9b-4a9f72fd644c', 'x-compute-request-id': 'req-66a60641-6831-4ab5-8a9b-4a9f72fd644c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:13.388 193 INFO tempest.lib.common.rest_client [req-c48a15d9-a682-4dee-b062-c41afdb65b0e ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:16:13.390 193 DEBUG tempest.lib.common.rest_client [req-c48a15d9-a682-4dee-b062-c41afdb65b0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c48a15d9-a682-4dee-b062-c41afdb65b0e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "556f254b1bd14556b328e133848f0d4b", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979", "password_expires_at": null}, "audit_ids": ["ivXwrjUaRuiv_5f_WR66iw"], "expires_at": "2020-12-14T03:16:13.000000Z", "issued_at": "2020-12-14T02:16:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "573b1180f3af43deb41cd790e8c2c46c", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:13.437 193 INFO tempest.lib.common.rest_client [req-b1c2b480-6d1c-49cf-bca4-b41e679d359e ] Request (AvailabilityZoneExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:16:13.440 193 DEBUG tempest.lib.common.rest_client [req-b1c2b480-6d1c-49cf-bca4-b41e679d359e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1c2b480-6d1c-49cf-bca4-b41e679d359e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "556f254b1bd14556b328e133848f0d4b", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979", "password_expires_at": null}, "audit_ids": ["nxQjdXBnTMOkOGxEUgc_6g"], "expires_at": "2020-12-14T03:16:13.000000Z", "issued_at": "2020-12-14T02:16:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "573b1180f3af43deb41cd790e8c2c46c", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:13.451 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:13.595 186 INFO tempest.lib.common.rest_client [req-9a6e25d0-be47-41d4-8a28-a7e0ba307d1c ] Request (ServerConsolesV26RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1 0.263s 2020-12-14 02:16:13.598 186 DEBUG tempest.lib.common.rest_client [req-9a6e25d0-be47-41d4-8a28-a7e0ba307d1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9a6e25d0-be47-41d4-8a28-a7e0ba307d1c', 'x-compute-request-id': 'req-9a6e25d0-be47-41d4-8a28-a7e0ba307d1c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1'} Body: b'{"server": {"id": "b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1", "name": "tempest-ServerConsolesV26RbacTest-server-209335578", "status": "ACTIVE", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "user_id": "735d932f2baa406eb3a0c1b7e094dee0", "metadata": {}, "hostId": "8b441e9973257d0dccd7078c23f7888d7c6528b6c539cdb1c8250cad", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:03Z", "updated": "2020-12-14T02:16:13Z", "addresses": {"tempest-ServerConsolesV26RbacTest-1100921850-network": [{"version": 4, "addr": "192.168.120.10", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:0f:e2:bd"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:10.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:13.700 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_availability_zone, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:13.827 193 INFO tempest.lib.common.rest_client [req-f0386ec0-18d7-4f9e-9bad-e044b8475a63 ] Request (AvailabilityZoneExtRbacTest:test_list_availability_zone_rbac): 200 GET http://172.30.13.94:9696/v2.0/availability_zones 0.122s 2020-12-14 02:16:13.830 193 DEBUG tempest.lib.common.rest_client [req-f0386ec0-18d7-4f9e-9bad-e044b8475a63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '149', 'x-openstack-request-id': 'req-f0386ec0-18d7-4f9e-9bad-e044b8475a63', 'date': 'Mon, 14 Dec 2020 02:16:13 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/availability_zones'} Body: b'{"availability_zones": [{"state": "available", "name": "nova", "resource": "router"}, {"state": "available", "name": "nova", "resource": "network"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:13.833 189 INFO tempest.lib.common.rest_client [req-95628dac-61c7-41d7-913e-ebf34249ac3c ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.287s 2020-12-14 02:16:13.834 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:13.835 189 DEBUG tempest.lib.common.rest_client [req-95628dac-61c7-41d7-913e-ebf34249ac3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1729', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-95628dac-61c7-41d7-913e-ebf34249ac3c', 'x-compute-request-id': 'req-95628dac-61c7-41d7-913e-ebf34249ac3c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:11Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:13.899 193 INFO tempest.lib.common.rest_client [req-94a4ca2d-314e-46ab-8a0b-4c5a553fa0a6 ] Request (AvailabilityZoneExtRbacTest:test_list_availability_zone_rbac): 200 GET http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c/users/556f254b1bd14556b328e133848f0d4b/roles 0.060s 2020-12-14 02:16:13.902 193 DEBUG tempest.lib.common.rest_client [req-94a4ca2d-314e-46ab-8a0b-4c5a553fa0a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94a4ca2d-314e-46ab-8a0b-4c5a553fa0a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c/users/556f254b1bd14556b328e133848f0d4b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c/users/556f254b1bd14556b328e133848f0d4b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:13.955 193 INFO tempest.lib.common.rest_client [req-407e20b3-9d78-4e2d-8911-5f7ff36a05bb ] Request (AvailabilityZoneExtRbacTest:test_list_availability_zone_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:16:13.959 193 DEBUG tempest.lib.common.rest_client [req-407e20b3-9d78-4e2d-8911-5f7ff36a05bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-407e20b3-9d78-4e2d-8911-5f7ff36a05bb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "556f254b1bd14556b328e133848f0d4b", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979", "password_expires_at": null}, "audit_ids": ["ob4hjN1AR5GPY933LI-W5g"], "expires_at": "2020-12-14T03:16:13.000000Z", "issued_at": "2020-12-14T02:16:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "573b1180f3af43deb41cd790e8c2c46c", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:14.013 193 INFO tempest.lib.common.rest_client [req-86db703d-3747-4a27-836f-cc5c2fdbb708 ] Request (AvailabilityZoneExtRbacTest:test_list_availability_zone_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:16:14.016 193 DEBUG tempest.lib.common.rest_client [req-86db703d-3747-4a27-836f-cc5c2fdbb708 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-86db703d-3747-4a27-836f-cc5c2fdbb708', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "556f254b1bd14556b328e133848f0d4b", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979", "password_expires_at": null}, "audit_ids": ["qdU4eCxXQqCoJ_clqMae6A"], "expires_at": "2020-12-14T03:16:13.000000Z", "issued_at": "2020-12-14T02:16:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "573b1180f3af43deb41cd790e8c2c46c", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:14.018 197 INFO tempest.lib.common.rest_client [req-e0e58e02-152b-4b54-b6df-579b6f655d26 ] Request (MiscPolicyActionsRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 0.956s 2020-12-14 02:16:14.020 197 DEBUG tempest.lib.common.rest_client [req-e0e58e02-152b-4b54-b6df-579b6f655d26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-MiscPolicyActionsRbacTest-server-798543618", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "25a7ce63-636c-4fcd-bf14-ab20366f9481"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e0e58e02-152b-4b54-b6df-579b6f655d26', 'x-compute-request-id': 'req-e0e58e02-152b-4b54-b6df-579b6f655d26', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "1dfd0497-187a-402a-923e-b825fcf8b081", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "c9fx98TMMNCM"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:14.114 193 INFO tempest.lib.common.rest_client [req-cb3be5a9-f951-496b-b7da-90288b34d841 ] Request (AvailabilityZoneExtRbacTest:test_list_availability_zone_rbac): 200 GET http://172.30.13.94:9696/v2.0/availability_zones 0.088s 2020-12-14 02:16:14.118 193 DEBUG tempest.lib.common.rest_client [req-cb3be5a9-f951-496b-b7da-90288b34d841 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '149', 'x-openstack-request-id': 'req-cb3be5a9-f951-496b-b7da-90288b34d841', 'date': 'Mon, 14 Dec 2020 02:16:14 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/availability_zones'} Body: b'{"availability_zones": [{"state": "available", "name": "nova", "resource": "router"}, {"state": "available", "name": "nova", "resource": "network"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:14.121 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:14.162 197 INFO tempest.lib.common.rest_client [req-c3e41a92-ebac-4bca-a80a-7146084c8e29 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.110s 2020-12-14 02:16:14.165 197 DEBUG tempest.lib.common.rest_client [req-c3e41a92-ebac-4bca-a80a-7146084c8e29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1400', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c3e41a92-ebac-4bca-a80a-7146084c8e29', 'x-compute-request-id': 'req-c3e41a92-ebac-4bca-a80a-7146084c8e29', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"server": {"id": "1dfd0497-187a-402a-923e-b825fcf8b081", "name": "tempest-MiscPolicyActionsRbacTest-server-798543618", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:14Z", "updated": "2020-12-14T02:16:14Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:14.200 193 INFO tempest.lib.common.rest_client [req-56eb7fab-d60c-48e8-901e-5f83b19fe1a5 ] Request (AvailabilityZoneExtRbacTest:test_list_availability_zone_rbac): 200 GET http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c/users/556f254b1bd14556b328e133848f0d4b/roles 0.071s 2020-12-14 02:16:14.203 193 DEBUG tempest.lib.common.rest_client [req-56eb7fab-d60c-48e8-901e-5f83b19fe1a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56eb7fab-d60c-48e8-901e-5f83b19fe1a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c/users/556f254b1bd14556b328e133848f0d4b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c/users/556f254b1bd14556b328e133848f0d4b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:14.255 193 INFO tempest.lib.common.rest_client [req-92f55547-6edf-4a00-9990-e15818838c2c ] Request (AvailabilityZoneExtRbacTest:test_list_availability_zone_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:16:14.257 193 DEBUG tempest.lib.common.rest_client [req-92f55547-6edf-4a00-9990-e15818838c2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92f55547-6edf-4a00-9990-e15818838c2c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "556f254b1bd14556b328e133848f0d4b", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979", "password_expires_at": null}, "audit_ids": ["H-y1O_PPRmKd0vRr1X5lsQ"], "expires_at": "2020-12-14T03:16:14.000000Z", "issued_at": "2020-12-14T02:16:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "573b1180f3af43deb41cd790e8c2c46c", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:14.315 193 INFO tempest.lib.common.rest_client [req-fe928e0e-1bd0-44f6-8775-e5e8a59e04a3 ] Request (AvailabilityZoneExtRbacTest:test_list_availability_zone_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:16:14.317 193 DEBUG tempest.lib.common.rest_client [req-fe928e0e-1bd0-44f6-8775-e5e8a59e04a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe928e0e-1bd0-44f6-8775-e5e8a59e04a3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "556f254b1bd14556b328e133848f0d4b", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979", "password_expires_at": null}, "audit_ids": ["BZugAUC1QruuHFiZIyZHiQ"], "expires_at": "2020-12-14T03:16:14.000000Z", "issued_at": "2020-12-14T02:16:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "573b1180f3af43deb41cd790e8c2c46c", "name": "tempest-AvailabilityZoneExtRbacTest-1258248979"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_573b1180f3af43deb41cd790e8c2c46c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:14.526 193 INFO tempest.lib.common.rest_client [req-f06aec41-446f-405a-bdc8-0da67634f360 ] Request (AvailabilityZoneExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/556f254b1bd14556b328e133848f0d4b 0.185s 2020-12-14 02:16:14.529 193 DEBUG tempest.lib.common.rest_client [req-f06aec41-446f-405a-bdc8-0da67634f360 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f06aec41-446f-405a-bdc8-0da67634f360', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/556f254b1bd14556b328e133848f0d4b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:14.624 193 INFO tempest.lib.common.rest_client [req-2bef2ee5-b032-41e7-b0bd-d0a185b883d2 ] Request (AvailabilityZoneExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-14 02:16:14.627 193 DEBUG tempest.lib.common.rest_client [req-2bef2ee5-b032-41e7-b0bd-d0a185b883d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2bef2ee5-b032-41e7-b0bd-d0a185b883d2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["7VgipZILSMeDQMHf6NICuA"], "expires_at": "2020-12-14T03:16:14.000000Z", "issued_at": "2020-12-14T02:16:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:14.863 186 INFO tempest.lib.common.rest_client [req-8f0aca3a-03da-457d-8276-1c919051c6a4 ] Request (ServerConsolesV26RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1 0.178s 2020-12-14 02:16:14.865 186 DEBUG tempest.lib.common.rest_client [req-8f0aca3a-03da-457d-8276-1c919051c6a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1690', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8f0aca3a-03da-457d-8276-1c919051c6a4', 'x-compute-request-id': 'req-8f0aca3a-03da-457d-8276-1c919051c6a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1'} Body: b'{"server": {"id": "b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1", "name": "tempest-ServerConsolesV26RbacTest-server-209335578", "status": "ACTIVE", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "user_id": "735d932f2baa406eb3a0c1b7e094dee0", "metadata": {}, "hostId": "8b441e9973257d0dccd7078c23f7888d7c6528b6c539cdb1c8250cad", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:03Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerConsolesV26RbacTest-1100921850-network": [{"version": 4, "addr": "192.168.120.10", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:0f:e2:bd"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:10.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbcd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:15.092 193 INFO tempest.lib.common.rest_client [req-443c69a5-f446-4b2d-b3a3-995df7dfd85f ] Request (AvailabilityZoneExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=573b1180f3af43deb41cd790e8c2c46c&name=default 0.459s 2020-12-14 02:16:15.094 193 DEBUG tempest.lib.common.rest_client [req-443c69a5-f446-4b2d-b3a3-995df7dfd85f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-443c69a5-f446-4b2d-b3a3-995df7dfd85f', 'date': 'Mon, 14 Dec 2020 02:16:15 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=573b1180f3af43deb41cd790e8c2c46c&name=default'} Body: b'{"security_groups": [{"id": "550dc04a-d105-460c-ae3a-9e4ef910f683", "name": "default", "stateful": true, "tenant_id": "573b1180f3af43deb41cd790e8c2c46c", "description": "Default security group", "security_group_rules": [{"id": "19bee203-0968-4084-90f3-d0cd7eed4935", "tenant_id": "573b1180f3af43deb41cd790e8c2c46c", "security_group_id": "550dc04a-d105-460c-ae3a-9e4ef910f683", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "550dc04a-d105-460c-ae3a-9e4ef910f683", "description": null, "tags": [], "created_at": "2020-12-14T02:16:14Z", "updated_at": "2020-12-14T02:16:14Z", "revision_number": 0, "project_id": "573b1180f3af43deb41cd790e8c2c46c"}, {"id": "1d6c3766-ee9f-420e-9c0e-6d205b7d8729", "tenant_id": "573b1180f3af43deb41cd790e8c2c46c", "security_group_id": "550dc04a-d105-460c-ae3a-9e4ef910f683", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:16:14Z", "updated_at": "2020-12-14T02:16:14Z", "revision_number": 0, "project_id": "573b1180f3af43deb41cd790e8c2c46c"}, {"id": "64e7ded8-3b6a-4d38-ba8c-5a9ff79b5aa4", "tenant_id": "573b1180f3af43deb41cd790e8c2c46c", "security_group_id": "550dc04a-d105-460c-ae3a-9e4ef910f683", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:16:14Z", "updated_at": "2020-12-14T02:16:14Z", "revision_number": 0, "project_id": "573b1180f3af43deb41cd790e8c2c46c"}, {"id": "e128972a-54e7-42b9-9224-f9d94d456a57", "tenant_id": "573b1180f3af43deb41cd790e8c2c46c", "security_group_id": "550dc04a-d105-460c-ae3a-9e4ef910f683", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "550dc04a-d105-460c-ae3a-9e4ef910f683", "description": null, "tags": [], "created_at": "2020-12-14T02:16:14Z", "updated_at": "2020-12-14T02:16:14Z", "revision_number": 0, "project_id": "573b1180f3af43deb41cd790e8c2c46c"}], "tags": [], "created_at": "2020-12-14T02:16:14Z", "updated_at": "2020-12-14T02:16:14Z", "revision_number": 1, "project_id": "573b1180f3af43deb41cd790e8c2c46c"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:15.186 189 INFO tempest.lib.common.rest_client [req-4a2a18dc-1047-4d55-b083-59edfa3941a1 ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.242s 2020-12-14 02:16:15.190 189 DEBUG tempest.lib.common.rest_client [req-4a2a18dc-1047-4d55-b083-59edfa3941a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4a2a18dc-1047-4d55-b083-59edfa3941a1', 'x-compute-request-id': 'req-4a2a18dc-1047-4d55-b083-59edfa3941a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:15.271 193 INFO tempest.lib.common.rest_client [req-0df1a9fb-07bd-46b3-bb8d-0a7dac99bad0 ] Request (AvailabilityZoneExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/550dc04a-d105-460c-ae3a-9e4ef910f683 0.169s 2020-12-14 02:16:15.274 193 DEBUG tempest.lib.common.rest_client [req-0df1a9fb-07bd-46b3-bb8d-0a7dac99bad0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-0df1a9fb-07bd-46b3-bb8d-0a7dac99bad0', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:16:15 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/550dc04a-d105-460c-ae3a-9e4ef910f683'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:15.292 189 INFO tempest.common.waiters [-] State transition "RESIZE/resize_finish" ==> "VERIFY_RESIZE/None" after 11 second wait 2020-12-14 02:16:15.294 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:15.363 189 INFO tempest.lib.common.rest_client [req-d446a624-12d6-4fa8-a241-2fde2eb08bd3 ] Request (ServerActionsRbacTest:test_resize_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.062s 2020-12-14 02:16:15.366 189 DEBUG tempest.lib.common.rest_client [req-d446a624-12d6-4fa8-a241-2fde2eb08bd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d446a624-12d6-4fa8-a241-2fde2eb08bd3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:15.413 193 INFO tempest.lib.common.rest_client [req-f1ef094a-10d6-41e1-adef-6206429270a3 ] Request (AvailabilityZoneExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c 0.131s 2020-12-14 02:16:15.417 193 DEBUG tempest.lib.common.rest_client [req-f1ef094a-10d6-41e1-adef-6206429270a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1ef094a-10d6-41e1-adef-6206429270a3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/573b1180f3af43deb41cd790e8c2c46c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:15.452 197 INFO tempest.lib.common.rest_client [req-90564aa6-eae3-449f-9d69-84764f93be03 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.178s 2020-12-14 02:16:15.455 197 DEBUG tempest.lib.common.rest_client [req-90564aa6-eae3-449f-9d69-84764f93be03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1495', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-90564aa6-eae3-449f-9d69-84764f93be03', 'x-compute-request-id': 'req-90564aa6-eae3-449f-9d69-84764f93be03', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"server": {"id": "1dfd0497-187a-402a-923e-b825fcf8b081", "name": "tempest-MiscPolicyActionsRbacTest-server-798543618", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:13Z", "updated": "2020-12-14T02:16:15Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:15.464 189 INFO tempest.lib.common.rest_client [req-e5d75863-ede5-4b4c-b79c-a6bea3a7a3f0 ] Request (ServerActionsRbacTest:test_resize_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:16:15.467 189 DEBUG tempest.lib.common.rest_client [req-e5d75863-ede5-4b4c-b79c-a6bea3a7a3f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5d75863-ede5-4b4c-b79c-a6bea3a7a3f0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["5f0YBozySEK3w_kM_V5RMw"], "expires_at": "2020-12-14T03:16:15.000000Z", "issued_at": "2020-12-14T02:16:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:15.513 193 INFO tempest.lib.common.rest_client [req-0f1ddc13-ac94-46ce-8778-4c8a573e8f80 ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-12-14 02:16:15.515 193 DEBUG tempest.lib.common.rest_client [req-0f1ddc13-ac94-46ce-8778-4c8a573e8f80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f1ddc13-ac94-46ce-8778-4c8a573e8f80', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["B6oOzT5nRYK_qMFAPq2iMg"], "expires_at": "2020-12-14T03:16:15.000000Z", "issued_at": "2020-12-14T02:16:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:15.554 197 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/networking" after 1 second wait 2020-12-14 02:16:15.611 193 INFO tempest.lib.common.rest_client [req-6738374e-aa07-43fe-ad3b-52b85edbc769 ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:16:15.614 193 DEBUG tempest.lib.common.rest_client [req-6738374e-aa07-43fe-ad3b-52b85edbc769 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6738374e-aa07-43fe-ad3b-52b85edbc769', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["udpwhQK6RgeT1V16ej0GWA"], "expires_at": "2020-12-14T03:16:15.000000Z", "issued_at": "2020-12-14T02:16:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:15.699 193 INFO tempest.lib.common.rest_client [req-f849f596-f107-47ec-9d3e-484c03800f6a ] Request (PortsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.078s 2020-12-14 02:16:15.702 193 DEBUG tempest.lib.common.rest_client [req-f849f596-f107-47ec-9d3e-484c03800f6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f849f596-f107-47ec-9d3e-484c03800f6a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:15.782 193 INFO tempest.lib.common.rest_client [req-a0891f5b-293d-4529-9a41-db4a7e7d5b83 ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.072s 2020-12-14 02:16:15.785 193 DEBUG tempest.lib.common.rest_client [req-a0891f5b-293d-4529-9a41-db4a7e7d5b83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-PortsRbacTest-43811559-desc", "domain_id": "default", "name": "tempest-PortsRbacTest-43811559"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '360', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0891f5b-293d-4529-9a41-db4a7e7d5b83', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559", "domain_id": "default", "description": "tempest-PortsRbacTest-43811559-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:15.917 193 INFO tempest.lib.common.rest_client [req-f6986583-d7ce-4eec-a136-587654276f4f ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.122s 2020-12-14 02:16:15.920 193 DEBUG tempest.lib.common.rest_client [req-f6986583-d7ce-4eec-a136-587654276f4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-PortsRbacTest-43811559", "password": "I7#Jd5B9C%U%Zhe", "project_id": "5d2b22c24509439eb518838e24b766b7", "email": "tempest-PortsRbacTest-319148366@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '379', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6986583-d7ce-4eec-a136-587654276f4f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "5d2b22c24509439eb518838e24b766b7", "email": "tempest-PortsRbacTest-319148366@example.com", "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/993a9cf13c1c49e4acd7b4dc5ecdbe37"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:15.955 189 INFO tempest.lib.common.rest_client [req-322388bf-a346-487a-a4fa-b8f23e200fe2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.425s 2020-12-14 02:16:15.958 189 DEBUG tempest.lib.common.rest_client [req-322388bf-a346-487a-a4fa-b8f23e200fe2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-322388bf-a346-487a-a4fa-b8f23e200fe2', 'x-compute-request-id': 'req-322388bf-a346-487a-a4fa-b8f23e200fe2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:15.994 193 INFO tempest.lib.common.rest_client [req-f63613a9-7389-4256-bea1-72f962017188 ] Request (PortsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-12-14 02:16:15.997 193 DEBUG tempest.lib.common.rest_client [req-f63613a9-7389-4256-bea1-72f962017188 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f63613a9-7389-4256-bea1-72f962017188', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:16.034 186 INFO tempest.lib.common.rest_client [req-2cdf8b74-a857-4ee7-a2a2-e9b9178f1fb5 ] Request (ServerConsolesV26RbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1 0.082s 2020-12-14 02:16:16.036 186 DEBUG tempest.lib.common.rest_client [req-2cdf8b74-a857-4ee7-a2a2-e9b9178f1fb5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-2cdf8b74-a857-4ee7-a2a2-e9b9178f1fb5', 'x-compute-request-id': 'req-2cdf8b74-a857-4ee7-a2a2-e9b9178f1fb5', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance b81cc5ea-ac3d-436a-9ec4-64ef4967b6a1 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:16.038 186 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '7518d59b-b42b-4ec0-ae63-9dfd1a11bd25', 'name': 'tempest-ServerConsolesV26RbacTest-1100921850-network', 'tenant_id': '3af73cfc094a498ab90faa59c2482336', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3af73cfc094a498ab90faa59c2482336', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:15:55Z', 'updated_at': '2020-12-14T02:15:55Z', 'revision_number': 1}, subnet: {'id': '7467099a-db3f-484d-9602-af405e69c233', 'name': 'tempest-ServerConsolesV26RbacTest-1100921850-subnet', 'tenant_id': '3af73cfc094a498ab90faa59c2482336', 'network_id': '7518d59b-b42b-4ec0-ae63-9dfd1a11bd25', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:15:56Z', 'updated_at': '2020-12-14T02:15:56Z', 'revision_number': 0, 'project_id': '3af73cfc094a498ab90faa59c2482336'}, router: {'id': '344d4ded-971b-4c65-b457-abaeaf9959c1', 'name': 'tempest-ServerConsolesV26RbacTest-1100921850-router', 'tenant_id': '3af73cfc094a498ab90faa59c2482336', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.54'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::34a'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:15:56Z', 'updated_at': '2020-12-14T02:15:57Z', 'revision_number': 3, 'project_id': '3af73cfc094a498ab90faa59c2482336'} _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:16:16.065 193 INFO tempest.lib.common.rest_client [req-3971e4a8-4a69-4219-97fc-78e700d269d8 ] Request (PortsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:16:16.069 193 DEBUG tempest.lib.common.rest_client [req-3971e4a8-4a69-4219-97fc-78e700d269d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3971e4a8-4a69-4219-97fc-78e700d269d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:16.157 193 INFO tempest.lib.common.rest_client [req-745310c2-4a4b-4ba8-9970-11c34f5f43e2 ] Request (PortsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles/72a4576c553448cd941b052c1ca0cf2d 0.080s 2020-12-14 02:16:16.160 193 DEBUG tempest.lib.common.rest_client [req-745310c2-4a4b-4ba8-9970-11c34f5f43e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-745310c2-4a4b-4ba8-9970-11c34f5f43e2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:16.163 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-PortsRbacTest-43811559', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5d2b22c24509439eb518838e24b766b7', 'project_name': 'tempest-PortsRbacTest-43811559', 'tenant_id': '5d2b22c24509439eb518838e24b766b7', 'tenant_name': 'tempest-PortsRbacTest-43811559', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '993a9cf13c1c49e4acd7b4dc5ecdbe37'}, Network: None, Subnet: None, Router: None 2020-12-14 02:16:16.166 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-PortsRbacTest-43811559', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5d2b22c24509439eb518838e24b766b7', 'project_name': 'tempest-PortsRbacTest-43811559', 'tenant_id': '5d2b22c24509439eb518838e24b766b7', 'tenant_name': 'tempest-PortsRbacTest-43811559', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '993a9cf13c1c49e4acd7b4dc5ecdbe37'}, Network: None, Subnet: None, Router: None 2020-12-14 02:16:16.340 193 INFO tempest.lib.common.rest_client [req-9255ca68-6e0a-4783-8131-4b948270c0a0 ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-12-14 02:16:16.342 193 DEBUG tempest.lib.common.rest_client [req-9255ca68-6e0a-4783-8131-4b948270c0a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6553', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9255ca68-6e0a-4783-8131-4b948270c0a0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["N4Jvr-YqShmdl1P5u5ovFA"], "expires_at": "2020-12-14T03:16:16.000000Z", "issued_at": "2020-12-14T02:16:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/image", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:16.444 193 INFO tempest.lib.common.rest_client [req-727e3544-bd6d-40be-b9ab-d1a715fec506 ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:16:16.447 193 DEBUG tempest.lib.common.rest_client [req-727e3544-bd6d-40be-b9ab-d1a715fec506 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-727e3544-bd6d-40be-b9ab-d1a715fec506', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["6UrkfQhfTfaDzB-y83dGLQ"], "expires_at": "2020-12-14T03:16:16.000000Z", "issued_at": "2020-12-14T02:16:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:16.793 197 INFO tempest.lib.common.rest_client [req-e427239a-564b-4fe6-9050-8407fd574265 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.230s 2020-12-14 02:16:16.795 197 DEBUG tempest.lib.common.rest_client [req-e427239a-564b-4fe6-9050-8407fd574265 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1493', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e427239a-564b-4fe6-9050-8407fd574265', 'x-compute-request-id': 'req-e427239a-564b-4fe6-9050-8407fd574265', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"server": {"id": "1dfd0497-187a-402a-923e-b825fcf8b081", "name": "tempest-MiscPolicyActionsRbacTest-server-798543618", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:13Z", "updated": "2020-12-14T02:16:15Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:16.896 197 INFO tempest.common.waiters [-] State transition "BUILD/networking" ==> "BUILD/spawning" after 2 second wait 2020-12-14 02:16:17.036 193 INFO tempest.lib.common.rest_client [req-e914040b-9985-47ef-b879-0da743716e14 ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:16:17.038 193 DEBUG tempest.lib.common.rest_client [req-e914040b-9985-47ef-b879-0da743716e14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e914040b-9985-47ef-b879-0da743716e14', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["YjqLIZzPTlitIZ_7B6i9Ug"], "expires_at": "2020-12-14T03:16:17.000000Z", "issued_at": "2020-12-14T02:16:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:17.097 193 INFO tempest.lib.common.rest_client [req-26da5536-e6c8-4273-89e6-406453542a4c ] Request (PortsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.053s 2020-12-14 02:16:17.100 193 DEBUG tempest.lib.common.rest_client [req-26da5536-e6c8-4273-89e6-406453542a4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26da5536-e6c8-4273-89e6-406453542a4c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:17.161 193 INFO tempest.lib.common.rest_client [req-9f835a50-541b-4544-92c7-a42fdd0927f0 ] Request (PortsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-14 02:16:17.164 193 DEBUG tempest.lib.common.rest_client [req-9f835a50-541b-4544-92c7-a42fdd0927f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f835a50-541b-4544-92c7-a42fdd0927f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:17.168 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:16:17.170 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:17.227 193 INFO tempest.lib.common.rest_client [req-1d30f585-77ef-48a4-aef2-b262da894d5e ] Request (PortsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.053s 2020-12-14 02:16:17.230 193 DEBUG tempest.lib.common.rest_client [req-1d30f585-77ef-48a4-aef2-b262da894d5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d30f585-77ef-48a4-aef2-b262da894d5e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:17.302 193 INFO tempest.lib.common.rest_client [req-ab6c3c35-7a2b-4fa2-be2e-82f843cbd0f6 ] Request (PortsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-12-14 02:16:17.305 193 DEBUG tempest.lib.common.rest_client [req-ab6c3c35-7a2b-4fa2-be2e-82f843cbd0f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ab6c3c35-7a2b-4fa2-be2e-82f843cbd0f6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:17.371 189 INFO tempest.lib.common.rest_client [req-9995d4b4-8a1c-4c33-8e7f-9c4490fb5127 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.300s 2020-12-14 02:16:17.375 189 DEBUG tempest.lib.common.rest_client [req-9995d4b4-8a1c-4c33-8e7f-9c4490fb5127 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9995d4b4-8a1c-4c33-8e7f-9c4490fb5127', 'x-compute-request-id': 'req-9995d4b4-8a1c-4c33-8e7f-9c4490fb5127', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:17.433 193 INFO tempest.lib.common.rest_client [req-38d8519a-6ab6-4e04-9508-44e509b9ea97 ] Request (PortsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles/a629c95d64b3416fb80ae90af4f69c05 0.122s 2020-12-14 02:16:17.436 193 DEBUG tempest.lib.common.rest_client [req-38d8519a-6ab6-4e04-9508-44e509b9ea97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-38d8519a-6ab6-4e04-9508-44e509b9ea97', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:18.053 197 INFO tempest.lib.common.rest_client [req-a351c224-f288-4f75-ad7e-4eede02ac005 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.147s 2020-12-14 02:16:18.055 197 DEBUG tempest.lib.common.rest_client [req-a351c224-f288-4f75-ad7e-4eede02ac005 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1493', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a351c224-f288-4f75-ad7e-4eede02ac005', 'x-compute-request-id': 'req-a351c224-f288-4f75-ad7e-4eede02ac005', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"server": {"id": "1dfd0497-187a-402a-923e-b825fcf8b081", "name": "tempest-MiscPolicyActionsRbacTest-server-798543618", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:13Z", "updated": "2020-12-14T02:16:15Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:18.546 193 INFO tempest.lib.common.rest_client [req-2f0b3d1e-f9f2-461c-aaa9-610871db16ba ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:16:18.550 193 DEBUG tempest.lib.common.rest_client [req-2f0b3d1e-f9f2-461c-aaa9-610871db16ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f0b3d1e-f9f2-461c-aaa9-610871db16ba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["jIumvRrJTB6txRe0twe3VA"], "expires_at": "2020-12-14T03:16:18.000000Z", "issued_at": "2020-12-14T02:16:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:18.859 189 INFO tempest.lib.common.rest_client [req-3d20b9f1-fb42-4486-bcaf-dbb3faac8d22 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.370s 2020-12-14 02:16:18.861 189 DEBUG tempest.lib.common.rest_client [req-3d20b9f1-fb42-4486-bcaf-dbb3faac8d22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3d20b9f1-fb42-4486-bcaf-dbb3faac8d22', 'x-compute-request-id': 'req-3d20b9f1-fb42-4486-bcaf-dbb3faac8d22', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:19.319 197 INFO tempest.lib.common.rest_client [req-a73e1c2d-97db-4229-a756-595a4a560afe ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.157s 2020-12-14 02:16:19.322 197 DEBUG tempest.lib.common.rest_client [req-a73e1c2d-97db-4229-a756-595a4a560afe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1493', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a73e1c2d-97db-4229-a756-595a4a560afe', 'x-compute-request-id': 'req-a73e1c2d-97db-4229-a756-595a4a560afe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"server": {"id": "1dfd0497-187a-402a-923e-b825fcf8b081", "name": "tempest-MiscPolicyActionsRbacTest-server-798543618", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:13Z", "updated": "2020-12-14T02:16:15Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:19.369 193 INFO tempest.lib.common.rest_client [req-001b9e8c-f0b2-4387-8777-eab0fc71affd ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.808s 2020-12-14 02:16:19.372 193 DEBUG tempest.lib.common.rest_client [req-001b9e8c-f0b2-4387-8777-eab0fc71affd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-PortsRbacTest-test-network-2094489098"}} Response - Headers: {'content-type': 'application/json', 'content-length': '734', 'x-openstack-request-id': 'req-001b9e8c-f0b2-4387-8777-eab0fc71affd', 'date': 'Mon, 14 Dec 2020 02:16:19 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","name":"tempest-PortsRbacTest-test-network-2094489098","tenant_id":"5d2b22c24509439eb518838e24b766b7","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"5d2b22c24509439eb518838e24b766b7","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":69,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:16:19Z","updated_at":"2020-12-14T02:16:19Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:20.058 193 INFO tempest.lib.common.rest_client [req-6316e1e1-7d5a-4965-8568-6754c376e40d ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.678s 2020-12-14 02:16:20.060 193 DEBUG tempest.lib.common.rest_client [req-6316e1e1-7d5a-4965-8568-6754c376e40d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "cidr": "192.168.120.0/24", "ip_version": 4, "gateway_ip": "192.168.120.1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '662', 'x-openstack-request-id': 'req-6316e1e1-7d5a-4965-8568-6754c376e40d', 'date': 'Mon, 14 Dec 2020 02:16:20 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"5804389f-c655-4f7f-855c-f96ce18290fc","name":"","tenant_id":"5d2b22c24509439eb518838e24b766b7","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/24","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:16:19Z","updated_at":"2020-12-14T02:16:19Z","revision_number":0,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:20.196 189 INFO tempest.lib.common.rest_client [req-b1315a08-8f87-4226-81fd-dc2d35cb1c7c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.224s 2020-12-14 02:16:20.199 189 DEBUG tempest.lib.common.rest_client [req-b1315a08-8f87-4226-81fd-dc2d35cb1c7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b1315a08-8f87-4226-81fd-dc2d35cb1c7c', 'x-compute-request-id': 'req-b1315a08-8f87-4226-81fd-dc2d35cb1c7c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:20.582 197 INFO tempest.lib.common.rest_client [req-a0af3096-d91e-4649-895f-5f871ec0aae0 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.152s 2020-12-14 02:16:20.585 197 DEBUG tempest.lib.common.rest_client [req-a0af3096-d91e-4649-895f-5f871ec0aae0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1493', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a0af3096-d91e-4649-895f-5f871ec0aae0', 'x-compute-request-id': 'req-a0af3096-d91e-4649-895f-5f871ec0aae0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"server": {"id": "1dfd0497-187a-402a-923e-b825fcf8b081", "name": "tempest-MiscPolicyActionsRbacTest-server-798543618", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:13Z", "updated": "2020-12-14T02:16:15Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:21.098 193 INFO tempest.lib.common.rest_client [req-96e9dfce-29c5-4201-b5e3-d26d2c44b279 ] Request (PortsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/ports 1.030s 2020-12-14 02:16:21.101 193 DEBUG tempest.lib.common.rest_client [req-96e9dfce-29c5-4201-b5e3-d26d2c44b279 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "name": "tempest-PortsRbacTest-629263402"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1090', 'x-openstack-request-id': 'req-96e9dfce-29c5-4201-b5e3-d26d2c44b279', 'date': 'Mon, 14 Dec 2020 02:16:21 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"af66f967-0722-4f89-8e19-d04d4339ee1d","name":"tempest-PortsRbacTest-629263402","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:86:e0:d7","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.21"}],"project_id":"5d2b22c24509439eb518838e24b766b7","port_security_enabled":true,"qos_policy_id":null,"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.21","hostname":"host-192-168-120-21","fqdn":"host-192-168-120-21.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:20Z","updated_at":"2020-12-14T02:16:20Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:21.112 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:21.137 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:21.140 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:21.260 193 INFO tempest.lib.common.rest_client [req-a299b294-2667-4825-8ebb-8e9494604265 ] Request (PortsRbacTest:test_create_port): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.113s 2020-12-14 02:16:21.263 193 DEBUG tempest.lib.common.rest_client [req-a299b294-2667-4825-8ebb-8e9494604265 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a299b294-2667-4825-8ebb-8e9494604265', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:21.313 193 INFO tempest.lib.common.rest_client [req-3d6271df-85ea-4f6a-806e-0e87f5fef37c ] Request (PortsRbacTest:test_create_port): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:16:21.316 193 DEBUG tempest.lib.common.rest_client [req-3d6271df-85ea-4f6a-806e-0e87f5fef37c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d6271df-85ea-4f6a-806e-0e87f5fef37c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["lskzMCXSQD2q-C0V4Drk1A"], "expires_at": "2020-12-14T03:16:21.000000Z", "issued_at": "2020-12-14T02:16:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:21.755 189 INFO tempest.lib.common.rest_client [req-d425bb38-9347-45ac-a49a-b2fb918cd7f4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.446s 2020-12-14 02:16:21.759 189 DEBUG tempest.lib.common.rest_client [req-d425bb38-9347-45ac-a49a-b2fb918cd7f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d425bb38-9347-45ac-a49a-b2fb918cd7f4', 'x-compute-request-id': 'req-d425bb38-9347-45ac-a49a-b2fb918cd7f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:21.963 197 INFO tempest.lib.common.rest_client [req-d7a00851-fa54-4619-af4c-91e2e3c6b658 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.273s 2020-12-14 02:16:21.966 197 DEBUG tempest.lib.common.rest_client [req-d7a00851-fa54-4619-af4c-91e2e3c6b658 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d7a00851-fa54-4619-af4c-91e2e3c6b658', 'x-compute-request-id': 'req-d7a00851-fa54-4619-af4c-91e2e3c6b658', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"server": {"id": "1dfd0497-187a-402a-923e-b825fcf8b081", "name": "tempest-MiscPolicyActionsRbacTest-server-798543618", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:13Z", "updated": "2020-12-14T02:16:15Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:22.207 193 INFO tempest.lib.common.rest_client [req-802b0ec2-bc57-443d-8c65-d27dd51bb164 ] Request (PortsRbacTest:test_create_port): 201 POST http://172.30.13.94:9696/v2.0/ports 0.883s 2020-12-14 02:16:22.211 193 DEBUG tempest.lib.common.rest_client [req-802b0ec2-bc57-443d-8c65-d27dd51bb164 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "name": "tempest-PortsRbacTest-995936573"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1094', 'x-openstack-request-id': 'req-802b0ec2-bc57-443d-8c65-d27dd51bb164', 'date': 'Mon, 14 Dec 2020 02:16:22 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"5e40c58a-f307-4ed6-8cb9-bbf0907e938b","name":"tempest-PortsRbacTest-995936573","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:5c:1b:1b","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.213"}],"project_id":"5d2b22c24509439eb518838e24b766b7","port_security_enabled":true,"qos_policy_id":null,"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.213","hostname":"host-192-168-120-213","fqdn":"host-192-168-120-213.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:21Z","updated_at":"2020-12-14T02:16:21Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:22.216 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:22.287 193 INFO tempest.lib.common.rest_client [req-28f5f80c-fa36-46c9-becc-43048c9b8162 ] Request (PortsRbacTest:test_create_port): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.064s 2020-12-14 02:16:22.289 193 DEBUG tempest.lib.common.rest_client [req-28f5f80c-fa36-46c9-becc-43048c9b8162 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28f5f80c-fa36-46c9-becc-43048c9b8162', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:22.335 193 INFO tempest.lib.common.rest_client [req-55a9c45c-1716-4e52-b01b-3d936f7d6927 ] Request (PortsRbacTest:test_create_port): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:16:22.339 193 DEBUG tempest.lib.common.rest_client [req-55a9c45c-1716-4e52-b01b-3d936f7d6927 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55a9c45c-1716-4e52-b01b-3d936f7d6927', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["dpruILPjSpS2_dwlk4wPTQ"], "expires_at": "2020-12-14T03:16:22.000000Z", "issued_at": "2020-12-14T02:16:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:22.353 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:22.375 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:22.377 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:22.399 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port:allowed_address_pairs, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:22.402 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:22.469 193 INFO tempest.lib.common.rest_client [req-2b25e8a8-8aa1-4ddb-8840-e4b6ce4050d3 ] Request (PortsRbacTest:test_create_port_allowed_address_pairs): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.062s 2020-12-14 02:16:22.472 193 DEBUG tempest.lib.common.rest_client [req-2b25e8a8-8aa1-4ddb-8840-e4b6ce4050d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b25e8a8-8aa1-4ddb-8840-e4b6ce4050d3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:22.525 193 INFO tempest.lib.common.rest_client [req-a0c40343-ad7f-46a8-a503-8e4251a83c8c ] Request (PortsRbacTest:test_create_port_allowed_address_pairs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:16:22.529 193 DEBUG tempest.lib.common.rest_client [req-a0c40343-ad7f-46a8-a503-8e4251a83c8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0c40343-ad7f-46a8-a503-8e4251a83c8c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["tolHDc2DTRKTERJNzNxq0w"], "expires_at": "2020-12-14T03:16:22.000000Z", "issued_at": "2020-12-14T02:16:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:22.895 186 INFO tempest.lib.common.rest_client [req-b72bb08c-53d2-4d2a-91bc-cc7300adddd0 ] Request (ServerConsolesV26RbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/344d4ded-971b-4c65-b457-abaeaf9959c1/remove_router_interface 6.850s 2020-12-14 02:16:22.899 186 DEBUG tempest.lib.common.rest_client [req-b72bb08c-53d2-4d2a-91bc-cc7300adddd0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "7467099a-db3f-484d-9602-af405e69c233"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-b72bb08c-53d2-4d2a-91bc-cc7300adddd0', 'date': 'Mon, 14 Dec 2020 02:16:22 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/344d4ded-971b-4c65-b457-abaeaf9959c1/remove_router_interface'} Body: b'{"id": "344d4ded-971b-4c65-b457-abaeaf9959c1", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "port_id": "640efe20-66bd-45d0-be1f-96ff681e1f20", "network_id": "7518d59b-b42b-4ec0-ae63-9dfd1a11bd25", "subnet_id": "7467099a-db3f-484d-9602-af405e69c233", "subnet_ids": ["7467099a-db3f-484d-9602-af405e69c233"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:23.202 189 INFO tempest.lib.common.rest_client [req-8eefde2b-3418-43fd-875a-a1f2e5fe6cc7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.335s 2020-12-14 02:16:23.205 189 DEBUG tempest.lib.common.rest_client [req-8eefde2b-3418-43fd-875a-a1f2e5fe6cc7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8eefde2b-3418-43fd-875a-a1f2e5fe6cc7', 'x-compute-request-id': 'req-8eefde2b-3418-43fd-875a-a1f2e5fe6cc7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:23.284 197 INFO tempest.lib.common.rest_client [req-6d67740e-b7d9-49fc-ac46-b1d7201edf2e ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.213s 2020-12-14 02:16:23.286 197 DEBUG tempest.lib.common.rest_client [req-6d67740e-b7d9-49fc-ac46-b1d7201edf2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6d67740e-b7d9-49fc-ac46-b1d7201edf2e', 'x-compute-request-id': 'req-6d67740e-b7d9-49fc-ac46-b1d7201edf2e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"server": {"id": "1dfd0497-187a-402a-923e-b825fcf8b081", "name": "tempest-MiscPolicyActionsRbacTest-server-798543618", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:13Z", "updated": "2020-12-14T02:16:15Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:23.595 193 INFO tempest.lib.common.rest_client [req-1d40a045-726f-4ab8-8040-6a7d38404187 ] Request (PortsRbacTest:test_create_port_allowed_address_pairs): 201 POST http://172.30.13.94:9696/v2.0/ports 1.059s 2020-12-14 02:16:23.598 193 DEBUG tempest.lib.common.rest_client [req-1d40a045-726f-4ab8-8040-6a7d38404187 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "allowed_address_pairs": [{"ip_address": "192.168.120.21", "mac_address": "fa:16:3e:86:e0:d7"}], "name": "tempest-PortsRbacTest-732589155"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1155', 'x-openstack-request-id': 'req-1d40a045-726f-4ab8-8040-6a7d38404187', 'date': 'Mon, 14 Dec 2020 02:16:23 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"88f7ee0e-3b50-42d5-adf0-e3d4a9c0ce38","name":"tempest-PortsRbacTest-732589155","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:82:f6:d5","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.29"}],"project_id":"5d2b22c24509439eb518838e24b766b7","port_security_enabled":true,"qos_policy_id":null,"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[{"mac_address":"fa:16:3e:86:e0:d7","ip_address":"192.168.120.21"}],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.29","hostname":"host-192-168-120-29","fqdn":"host-192-168-120-29.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:23Z","updated_at":"2020-12-14T02:16:23Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:23.602 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:23.665 193 INFO tempest.lib.common.rest_client [req-37dff309-020e-4629-a17b-7bf0cb586158 ] Request (PortsRbacTest:test_create_port_allowed_address_pairs): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.057s 2020-12-14 02:16:23.668 193 DEBUG tempest.lib.common.rest_client [req-37dff309-020e-4629-a17b-7bf0cb586158 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-37dff309-020e-4629-a17b-7bf0cb586158', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:23.717 193 INFO tempest.lib.common.rest_client [req-475be3db-759a-4f53-b641-2026c7bddcea ] Request (PortsRbacTest:test_create_port_allowed_address_pairs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:16:23.720 193 DEBUG tempest.lib.common.rest_client [req-475be3db-759a-4f53-b641-2026c7bddcea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-475be3db-759a-4f53-b641-2026c7bddcea', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["VYAp3g2EQ4mQiq-Vz8jDwA"], "expires_at": "2020-12-14T03:16:23.000000Z", "issued_at": "2020-12-14T02:16:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:23.734 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:23.756 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:23.759 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:23.781 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port:binding:host_id, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:23.783 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:23.859 193 INFO tempest.lib.common.rest_client [req-7e6daaeb-4e7e-47d5-bc8b-71defe9f453d ] Request (PortsRbacTest:test_create_port_binding_host_id): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.068s 2020-12-14 02:16:23.862 193 DEBUG tempest.lib.common.rest_client [req-7e6daaeb-4e7e-47d5-bc8b-71defe9f453d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e6daaeb-4e7e-47d5-bc8b-71defe9f453d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:23.914 193 INFO tempest.lib.common.rest_client [req-8fc0cfcd-2d0e-4ad6-97d7-7f2b8988230e ] Request (PortsRbacTest:test_create_port_binding_host_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:16:23.918 193 DEBUG tempest.lib.common.rest_client [req-8fc0cfcd-2d0e-4ad6-97d7-7f2b8988230e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8fc0cfcd-2d0e-4ad6-97d7-7f2b8988230e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["dImDKGc6SPycuyG4u-udiQ"], "expires_at": "2020-12-14T03:16:23.000000Z", "issued_at": "2020-12-14T02:16:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:24.123 186 INFO tempest.lib.common.rest_client [req-6f8c644d-66e4-4ffb-b3dc-22685da20dc8 ] Request (ServerConsolesV26RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/344d4ded-971b-4c65-b457-abaeaf9959c1 1.217s 2020-12-14 02:16:24.126 186 DEBUG tempest.lib.common.rest_client [req-6f8c644d-66e4-4ffb-b3dc-22685da20dc8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6f8c644d-66e4-4ffb-b3dc-22685da20dc8', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:16:24 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/344d4ded-971b-4c65-b457-abaeaf9959c1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:24.524 189 INFO tempest.lib.common.rest_client [req-aeb32d31-511d-48da-8c94-46f34dc07867 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.206s 2020-12-14 02:16:24.527 189 DEBUG tempest.lib.common.rest_client [req-aeb32d31-511d-48da-8c94-46f34dc07867 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aeb32d31-511d-48da-8c94-46f34dc07867', 'x-compute-request-id': 'req-aeb32d31-511d-48da-8c94-46f34dc07867', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:24.625 197 INFO tempest.lib.common.rest_client [req-435ac1ae-fb8f-4430-9473-84da2d51a29b ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.233s 2020-12-14 02:16:24.627 197 DEBUG tempest.lib.common.rest_client [req-435ac1ae-fb8f-4430-9473-84da2d51a29b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-435ac1ae-fb8f-4430-9473-84da2d51a29b', 'x-compute-request-id': 'req-435ac1ae-fb8f-4430-9473-84da2d51a29b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"server": {"id": "1dfd0497-187a-402a-923e-b825fcf8b081", "name": "tempest-MiscPolicyActionsRbacTest-server-798543618", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:13Z", "updated": "2020-12-14T02:16:15Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:24.694 186 INFO tempest.lib.common.rest_client [req-90ededbe-f1ed-4b7e-8f55-ed519c60aa70 ] Request (ServerConsolesV26RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/7467099a-db3f-484d-9602-af405e69c233 0.561s 2020-12-14 02:16:24.696 186 DEBUG tempest.lib.common.rest_client [req-90ededbe-f1ed-4b7e-8f55-ed519c60aa70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-90ededbe-f1ed-4b7e-8f55-ed519c60aa70', 'date': 'Mon, 14 Dec 2020 02:16:24 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/7467099a-db3f-484d-9602-af405e69c233'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:25.979 197 INFO tempest.lib.common.rest_client [req-26503ee7-fa2f-4a26-a508-28146e82cc3f ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.223s 2020-12-14 02:16:25.982 197 DEBUG tempest.lib.common.rest_client [req-26503ee7-fa2f-4a26-a508-28146e82cc3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-26503ee7-fa2f-4a26-a508-28146e82cc3f', 'x-compute-request-id': 'req-26503ee7-fa2f-4a26-a508-28146e82cc3f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"server": {"id": "1dfd0497-187a-402a-923e-b825fcf8b081", "name": "tempest-MiscPolicyActionsRbacTest-server-798543618", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:13Z", "updated": "2020-12-14T02:16:15Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:27.323 197 INFO tempest.lib.common.rest_client [req-480b333a-2eb3-44c9-9764-f68040db65d2 ] Request (MiscPolicyActionsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.236s 2020-12-14 02:16:27.325 197 DEBUG tempest.lib.common.rest_client [req-480b333a-2eb3-44c9-9764-f68040db65d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-480b333a-2eb3-44c9-9764-f68040db65d2', 'x-compute-request-id': 'req-480b333a-2eb3-44c9-9764-f68040db65d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"server": {"id": "1dfd0497-187a-402a-923e-b825fcf8b081", "name": "tempest-MiscPolicyActionsRbacTest-server-798543618", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:13Z", "updated": "2020-12-14T02:16:27Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.12", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:de:62:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:27.406 197 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 13 second wait 2020-12-14 02:16:27.698 197 INFO tempest.lib.common.rest_client [req-0fe3fc62-afd6-47b2-b26c-0d2c52bc6ba7 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.279s 2020-12-14 02:16:27.702 197 DEBUG tempest.lib.common.rest_client [req-0fe3fc62-afd6-47b2-b26c-0d2c52bc6ba7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0fe3fc62-afd6-47b2-b26c-0d2c52bc6ba7', 'x-compute-request-id': 'req-0fe3fc62-afd6-47b2-b26c-0d2c52bc6ba7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"server": {"id": "1dfd0497-187a-402a-923e-b825fcf8b081", "name": "tempest-MiscPolicyActionsRbacTest-server-798543618", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:13Z", "updated": "2020-12-14T02:16:27Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.12", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:de:62:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:27.782 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:27.786 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.789 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.792 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.794 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.797 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.800 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.804 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.806 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.808 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.810 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.813 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.815 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.817 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.819 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.822 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.825 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.827 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.829 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.831 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.833 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.835 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.837 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.840 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.842 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.844 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.846 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.848 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.850 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.852 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.855 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.857 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.859 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.861 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.863 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.866 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.868 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.870 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.872 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.875 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.877 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.879 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.881 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.884 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.886 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.889 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.891 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.893 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.895 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.897 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.899 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.901 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.904 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.906 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.908 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.911 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.913 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.918 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.920 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.922 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.925 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.927 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.929 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.931 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.933 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.935 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.937 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.939 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.941 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.944 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.946 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.948 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:27.957 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-password:clear, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:27.959 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:28.025 197 INFO tempest.lib.common.rest_client [req-329484da-35ef-49ba-9788-c24a1d7317a2 ] Request (MiscPolicyActionsRbacTest:test_delete_server_password): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.060s 2020-12-14 02:16:28.028 197 DEBUG tempest.lib.common.rest_client [req-329484da-35ef-49ba-9788-c24a1d7317a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-329484da-35ef-49ba-9788-c24a1d7317a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:28.130 197 INFO tempest.lib.common.rest_client [req-2d37dc0b-6174-47a7-8c2b-cda70a60373b ] Request (MiscPolicyActionsRbacTest:test_delete_server_password): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:16:28.132 197 DEBUG tempest.lib.common.rest_client [req-2d37dc0b-6174-47a7-8c2b-cda70a60373b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2d37dc0b-6174-47a7-8c2b-cda70a60373b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["2ZyqR2dUTFiJo5YUN4Anog"], "expires_at": "2020-12-14T03:16:28.000000Z", "issued_at": "2020-12-14T02:16:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:28.374 197 INFO tempest.lib.common.rest_client [req-0e936e33-3d52-47d6-9d8e-d454cebfe89f ] Request (MiscPolicyActionsRbacTest:test_delete_server_password): 204 DELETE http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081/os-server-password 0.235s 2020-12-14 02:16:28.377 197 DEBUG tempest.lib.common.rest_client [req-0e936e33-3d52-47d6-9d8e-d454cebfe89f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0e936e33-3d52-47d6-9d8e-d454cebfe89f', 'x-compute-request-id': 'req-0e936e33-3d52-47d6-9d8e-d454cebfe89f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081/os-server-password'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:28.379 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:28.444 197 INFO tempest.lib.common.rest_client [req-e2516225-bd95-47bb-b7cb-1fc29056c7a6 ] Request (MiscPolicyActionsRbacTest:test_delete_server_password): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.059s 2020-12-14 02:16:28.447 197 DEBUG tempest.lib.common.rest_client [req-e2516225-bd95-47bb-b7cb-1fc29056c7a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2516225-bd95-47bb-b7cb-1fc29056c7a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:28.495 197 INFO tempest.lib.common.rest_client [req-9e118fc3-0e01-451c-a45f-a0283fc08e95 ] Request (MiscPolicyActionsRbacTest:test_delete_server_password): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:16:28.498 197 DEBUG tempest.lib.common.rest_client [req-9e118fc3-0e01-451c-a45f-a0283fc08e95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e118fc3-0e01-451c-a45f-a0283fc08e95', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["exMaXPAsStWIQk3tI2fzIg"], "expires_at": "2020-12-14T03:16:28.000000Z", "issued_at": "2020-12-14T02:16:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:28.858 197 INFO tempest.lib.common.rest_client [req-2a613291-2b0e-4427-9f9b-04ccbd9031d6 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.330s 2020-12-14 02:16:28.862 197 DEBUG tempest.lib.common.rest_client [req-2a613291-2b0e-4427-9f9b-04ccbd9031d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2a613291-2b0e-4427-9f9b-04ccbd9031d6', 'x-compute-request-id': 'req-2a613291-2b0e-4427-9f9b-04ccbd9031d6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"server": {"id": "1dfd0497-187a-402a-923e-b825fcf8b081", "name": "tempest-MiscPolicyActionsRbacTest-server-798543618", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:13Z", "updated": "2020-12-14T02:16:28Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.12", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:de:62:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:28.943 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:28.947 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.950 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.952 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.955 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.958 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.961 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.964 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.966 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.968 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.971 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.973 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.975 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.977 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.979 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.982 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.984 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.986 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.988 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.991 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.993 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.995 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.997 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:28.999 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.001 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.003 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.006 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.008 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.010 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.012 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.014 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.016 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.018 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.020 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.022 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.024 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.027 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.029 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.031 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.033 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.036 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.038 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.040 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.042 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.045 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.047 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.049 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.051 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.054 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.056 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.058 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.060 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.062 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.064 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.066 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.069 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.072 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.076 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.078 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.080 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.083 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.085 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.087 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.089 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.092 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.094 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.096 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.098 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.100 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.102 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.104 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.107 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:29.117 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-deferred-delete:force, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:29.119 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:29.184 197 INFO tempest.lib.common.rest_client [req-910b5147-af26-40f8-8f99-7d7648ca5f68 ] Request (MiscPolicyActionsRbacTest:test_force_delete_server): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.060s 2020-12-14 02:16:29.187 197 DEBUG tempest.lib.common.rest_client [req-910b5147-af26-40f8-8f99-7d7648ca5f68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-910b5147-af26-40f8-8f99-7d7648ca5f68', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:29.235 197 INFO tempest.lib.common.rest_client [req-efc1371c-e9f1-4779-b9eb-dfac112a1f8b ] Request (MiscPolicyActionsRbacTest:test_force_delete_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:16:29.238 197 DEBUG tempest.lib.common.rest_client [req-efc1371c-e9f1-4779-b9eb-dfac112a1f8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-efc1371c-e9f1-4779-b9eb-dfac112a1f8b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["BOgCFBh2RVWdt47Ou-AYZw"], "expires_at": "2020-12-14T03:16:29.000000Z", "issued_at": "2020-12-14T02:16:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:29.509 197 INFO tempest.lib.common.rest_client [req-12e21d3d-dd74-4ead-98bc-10671aed13d1 ] Request (MiscPolicyActionsRbacTest:test_force_delete_server): 202 POST http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081/action 0.263s 2020-12-14 02:16:29.512 197 DEBUG tempest.lib.common.rest_client [req-12e21d3d-dd74-4ead-98bc-10671aed13d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"forceDelete": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-12e21d3d-dd74-4ead-98bc-10671aed13d1', 'x-compute-request-id': 'req-12e21d3d-dd74-4ead-98bc-10671aed13d1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:29.515 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:29.593 186 INFO tempest.lib.common.rest_client [req-b1c24745-0e1e-42b9-a4fc-52cd746eeddf ] Request (ServerConsolesV26RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/7518d59b-b42b-4ec0-ae63-9dfd1a11bd25 4.891s 2020-12-14 02:16:29.595 186 DEBUG tempest.lib.common.rest_client [req-b1c24745-0e1e-42b9-a4fc-52cd746eeddf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-b1c24745-0e1e-42b9-a4fc-52cd746eeddf', 'date': 'Mon, 14 Dec 2020 02:16:29 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/7518d59b-b42b-4ec0-ae63-9dfd1a11bd25'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:29.596 197 INFO tempest.lib.common.rest_client [req-bc4f4419-6da6-416c-9d32-13fad6ece686 ] Request (MiscPolicyActionsRbacTest:test_force_delete_server): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.075s 2020-12-14 02:16:29.599 197 DEBUG tempest.lib.common.rest_client [req-bc4f4419-6da6-416c-9d32-13fad6ece686 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc4f4419-6da6-416c-9d32-13fad6ece686', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:29.654 189 INFO tempest.lib.common.rest_client [req-06f11eaf-f6ab-4e68-a672-503a93156472 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 4.016s 2020-12-14 02:16:29.655 197 INFO tempest.lib.common.rest_client [req-7a23cf83-1a76-436a-8794-a3fb6aa80875 ] Request (MiscPolicyActionsRbacTest:test_force_delete_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:16:29.658 189 DEBUG tempest.lib.common.rest_client [req-06f11eaf-f6ab-4e68-a672-503a93156472 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-06f11eaf-f6ab-4e68-a672-503a93156472', 'x-compute-request-id': 'req-06f11eaf-f6ab-4e68-a672-503a93156472', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:29.658 197 DEBUG tempest.lib.common.rest_client [req-7a23cf83-1a76-436a-8794-a3fb6aa80875 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a23cf83-1a76-436a-8794-a3fb6aa80875', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["FSBYp_FlT2qWwm53sKVQ4g"], "expires_at": "2020-12-14T03:16:29.000000Z", "issued_at": "2020-12-14T02:16:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:29.757 186 INFO tempest.lib.common.rest_client [req-b4089d5a-8655-4522-b632-c2fce991d20f ] Request (ServerConsolesV26RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/735d932f2baa406eb3a0c1b7e094dee0 0.155s 2020-12-14 02:16:29.759 186 DEBUG tempest.lib.common.rest_client [req-b4089d5a-8655-4522-b632-c2fce991d20f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4089d5a-8655-4522-b632-c2fce991d20f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/735d932f2baa406eb3a0c1b7e094dee0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:29.841 186 INFO tempest.lib.common.rest_client [req-3661ed0d-a7b5-4cd0-ba2d-dc8c3bb1ee9f ] Request (ServerConsolesV26RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3af73cfc094a498ab90faa59c2482336&name=default 0.076s 2020-12-14 02:16:29.843 186 DEBUG tempest.lib.common.rest_client [req-3661ed0d-a7b5-4cd0-ba2d-dc8c3bb1ee9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-3661ed0d-a7b5-4cd0-ba2d-dc8c3bb1ee9f', 'date': 'Mon, 14 Dec 2020 02:16:29 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3af73cfc094a498ab90faa59c2482336&name=default'} Body: b'{"security_groups": [{"id": "c0cb1074-2418-4953-8272-1e0e0665583c", "name": "default", "stateful": true, "tenant_id": "3af73cfc094a498ab90faa59c2482336", "description": "Default security group", "security_group_rules": [{"id": "17a4cba0-6f35-4e29-9563-8c1e2e8c2c22", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "security_group_id": "c0cb1074-2418-4953-8272-1e0e0665583c", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:15:55Z", "updated_at": "2020-12-14T02:15:55Z", "revision_number": 0, "project_id": "3af73cfc094a498ab90faa59c2482336"}, {"id": "1c64f4ee-7f3c-4a31-8243-a79d0e75307c", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "security_group_id": "c0cb1074-2418-4953-8272-1e0e0665583c", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c0cb1074-2418-4953-8272-1e0e0665583c", "description": null, "tags": [], "created_at": "2020-12-14T02:15:55Z", "updated_at": "2020-12-14T02:15:55Z", "revision_number": 0, "project_id": "3af73cfc094a498ab90faa59c2482336"}, {"id": "2c347f86-99b8-4777-b8de-fe0a33941164", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "security_group_id": "c0cb1074-2418-4953-8272-1e0e0665583c", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c0cb1074-2418-4953-8272-1e0e0665583c", "description": null, "tags": [], "created_at": "2020-12-14T02:15:55Z", "updated_at": "2020-12-14T02:15:55Z", "revision_number": 0, "project_id": "3af73cfc094a498ab90faa59c2482336"}, {"id": "2ceec623-ac39-46e6-86e7-d792ad62cd11", "tenant_id": "3af73cfc094a498ab90faa59c2482336", "security_group_id": "c0cb1074-2418-4953-8272-1e0e0665583c", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:15:55Z", "updated_at": "2020-12-14T02:15:55Z", "revision_number": 0, "project_id": "3af73cfc094a498ab90faa59c2482336"}], "tags": [], "created_at": "2020-12-14T02:15:55Z", "updated_at": "2020-12-14T02:15:55Z", "revision_number": 1, "project_id": "3af73cfc094a498ab90faa59c2482336"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:29.965 197 INFO tempest.lib.common.rest_client [req-88e1ab07-b5ed-458f-9bee-f9c37364ffcb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.277s 2020-12-14 02:16:29.969 197 DEBUG tempest.lib.common.rest_client [req-88e1ab07-b5ed-458f-9bee-f9c37364ffcb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-88e1ab07-b5ed-458f-9bee-f9c37364ffcb', 'x-compute-request-id': 'req-88e1ab07-b5ed-458f-9bee-f9c37364ffcb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"server": {"id": "1dfd0497-187a-402a-923e-b825fcf8b081", "name": "tempest-MiscPolicyActionsRbacTest-server-798543618", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:13Z", "updated": "2020-12-14T02:16:29Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.12", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:de:62:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:30.040 193 INFO tempest.lib.common.rest_client [req-35cfb2b2-3644-4da9-9ea6-551bce2d0186 ] Request (PortsRbacTest:test_create_port_binding_host_id): 201 POST http://172.30.13.94:9696/v2.0/ports 6.114s 2020-12-14 02:16:30.044 193 DEBUG tempest.lib.common.rest_client [req-35cfb2b2-3644-4da9-9ea6-551bce2d0186 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "binding:host_id": "rbac_test_host", "name": "tempest-PortsRbacTest-875917120"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1111', 'x-openstack-request-id': 'req-35cfb2b2-3644-4da9-9ea6-551bce2d0186', 'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"1424d9a0-aa2a-498b-912a-6e620e14fdca","name":"tempest-PortsRbacTest-875917120","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:73:e6:3a","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.75"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"rbac_test_host","binding:vif_type":"binding_failed","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.75","hostname":"host-192-168-120-75","fqdn":"host-192-168-120-75.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:24Z","updated_at":"2020-12-14T02:16:24Z","revision_number":1,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:30.047 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:30.061 186 INFO tempest.lib.common.rest_client [req-f6f51be9-629f-4b0a-9cad-faf32d86a0b9 ] Request (ServerConsolesV26RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/c0cb1074-2418-4953-8272-1e0e0665583c 0.211s 2020-12-14 02:16:30.065 186 DEBUG tempest.lib.common.rest_client [req-f6f51be9-629f-4b0a-9cad-faf32d86a0b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f6f51be9-629f-4b0a-9cad-faf32d86a0b9', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/c0cb1074-2418-4953-8272-1e0e0665583c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:30.168 193 INFO tempest.lib.common.rest_client [req-c3b50a34-0763-4424-8bea-5a82f72816c3 ] Request (PortsRbacTest:test_create_port_binding_host_id): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.115s 2020-12-14 02:16:30.172 193 DEBUG tempest.lib.common.rest_client [req-c3b50a34-0763-4424-8bea-5a82f72816c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c3b50a34-0763-4424-8bea-5a82f72816c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:30.257 186 INFO tempest.lib.common.rest_client [req-587954b2-37cd-4ce4-988e-afa6f3fa3ad4 ] Request (ServerConsolesV26RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336 0.186s 2020-12-14 02:16:30.261 186 DEBUG tempest.lib.common.rest_client [req-587954b2-37cd-4ce4-988e-afa6f3fa3ad4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-587954b2-37cd-4ce4-988e-afa6f3fa3ad4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3af73cfc094a498ab90faa59c2482336'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:30.267 193 INFO tempest.lib.common.rest_client [req-33d87244-8669-439a-bb96-76071b0a6004 ] Request (PortsRbacTest:test_create_port_binding_host_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:16:30.271 193 DEBUG tempest.lib.common.rest_client [req-33d87244-8669-439a-bb96-76071b0a6004 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33d87244-8669-439a-bb96-76071b0a6004', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["ScmB_blUTpyp7WJbnRNd4g"], "expires_at": "2020-12-14T03:16:30.000000Z", "issued_at": "2020-12-14T02:16:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:30.286 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:30.304 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:30.306 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:30.324 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port:binding:profile, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:30.326 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:30.373 186 INFO tempest.lib.common.rest_client [req-da8c422c-ac1c-405c-98bd-2c2844e4462e ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:16:30.375 186 DEBUG tempest.lib.common.rest_client [req-da8c422c-ac1c-405c-98bd-2c2844e4462e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da8c422c-ac1c-405c-98bd-2c2844e4462e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["YlvZbGKeScCe0g-ko7dxLg"], "expires_at": "2020-12-14T03:16:30.000000Z", "issued_at": "2020-12-14T02:16:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:30.437 193 INFO tempest.lib.common.rest_client [req-20db60c7-4502-4b9c-b164-f4fc68ea7ece ] Request (PortsRbacTest:test_create_port_binding_profile): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.106s 2020-12-14 02:16:30.440 193 DEBUG tempest.lib.common.rest_client [req-20db60c7-4502-4b9c-b164-f4fc68ea7ece ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20db60c7-4502-4b9c-b164-f4fc68ea7ece', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:30.472 186 INFO tempest.lib.common.rest_client [req-ddcbd3fd-9b7e-452a-8b73-7a3280def0c1 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:16:30.476 186 DEBUG tempest.lib.common.rest_client [req-ddcbd3fd-9b7e-452a-8b73-7a3280def0c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ddcbd3fd-9b7e-452a-8b73-7a3280def0c1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["z6nKVL9HSc2bNUHsSA6bPA"], "expires_at": "2020-12-14T03:16:30.000000Z", "issued_at": "2020-12-14T02:16:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:30.488 193 INFO tempest.lib.common.rest_client [req-07b3d6a4-e4e7-4310-adcc-a6c7131cf74f ] Request (PortsRbacTest:test_create_port_binding_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:16:30.491 193 DEBUG tempest.lib.common.rest_client [req-07b3d6a4-e4e7-4310-adcc-a6c7131cf74f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07b3d6a4-e4e7-4310-adcc-a6c7131cf74f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["spSWDu_tS3md0BnhcCgu3Q"], "expires_at": "2020-12-14T03:16:30.000000Z", "issued_at": "2020-12-14T02:16:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:30.541 186 INFO tempest.lib.common.rest_client [req-08c02362-26b1-4a7c-b898-310cfad76383 ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.057s 2020-12-14 02:16:30.543 186 DEBUG tempest.lib.common.rest_client [req-08c02362-26b1-4a7c-b898-310cfad76383 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-08c02362-26b1-4a7c-b898-310cfad76383', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:30.621 186 INFO tempest.lib.common.rest_client [req-6580ba6d-f51e-4775-bb04-077ce873cb0e ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.069s 2020-12-14 02:16:30.624 186 DEBUG tempest.lib.common.rest_client [req-6580ba6d-f51e-4775-bb04-077ce873cb0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerMetadataRbacTest-1730955355-desc", "domain_id": "default", "name": "tempest-ServerMetadataRbacTest-1730955355"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6580ba6d-f51e-4775-bb04-077ce873cb0e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "1ef7d365f8304c6c871d57337acc5adf", "name": "tempest-ServerMetadataRbacTest-1730955355", "domain_id": "default", "description": "tempest-ServerMetadataRbacTest-1730955355-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:30.744 186 INFO tempest.lib.common.rest_client [req-6969ad3c-6c9a-408b-9672-284ddc96c5d1 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.113s 2020-12-14 02:16:30.746 186 DEBUG tempest.lib.common.rest_client [req-6969ad3c-6c9a-408b-9672-284ddc96c5d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerMetadataRbacTest-1730955355", "password": "F2#4@2S5b6VfY=9", "project_id": "1ef7d365f8304c6c871d57337acc5adf", "email": "tempest-ServerMetadataRbacTest-1655289808@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '400', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6969ad3c-6c9a-408b-9672-284ddc96c5d1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "1ef7d365f8304c6c871d57337acc5adf", "email": "tempest-ServerMetadataRbacTest-1655289808@example.com", "id": "fdd4aec086bf411486f075e6837bc36c", "name": "tempest-ServerMetadataRbacTest-1730955355", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/fdd4aec086bf411486f075e6837bc36c"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:30.822 186 INFO tempest.lib.common.rest_client [req-78950e8f-bf91-4342-92af-2ae56b0aa3f1 ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.068s 2020-12-14 02:16:30.825 186 DEBUG tempest.lib.common.rest_client [req-78950e8f-bf91-4342-92af-2ae56b0aa3f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78950e8f-bf91-4342-92af-2ae56b0aa3f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:30.895 186 INFO tempest.lib.common.rest_client [req-3223d93a-a8ec-4419-87f8-dfbd0cfdc9cc ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:16:30.898 186 DEBUG tempest.lib.common.rest_client [req-3223d93a-a8ec-4419-87f8-dfbd0cfdc9cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3223d93a-a8ec-4419-87f8-dfbd0cfdc9cc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:30.974 186 INFO tempest.lib.common.rest_client [req-7b38c369-4950-4ec6-b137-6cd31b640816 ] Request (ServerMetadataRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-12-14 02:16:30.977 186 DEBUG tempest.lib.common.rest_client [req-7b38c369-4950-4ec6-b137-6cd31b640816 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7b38c369-4950-4ec6-b137-6cd31b640816', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:30.980 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerMetadataRbacTest-1730955355', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1ef7d365f8304c6c871d57337acc5adf', 'project_name': 'tempest-ServerMetadataRbacTest-1730955355', 'tenant_id': '1ef7d365f8304c6c871d57337acc5adf', 'tenant_name': 'tempest-ServerMetadataRbacTest-1730955355', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'fdd4aec086bf411486f075e6837bc36c'}, Network: None, Subnet: None, Router: None 2020-12-14 02:16:31.059 189 INFO tempest.lib.common.rest_client [req-c072477a-a0e5-4da5-ba18-1412a841914a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.276s 2020-12-14 02:16:31.062 189 DEBUG tempest.lib.common.rest_client [req-c072477a-a0e5-4da5-ba18-1412a841914a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c072477a-a0e5-4da5-ba18-1412a841914a', 'x-compute-request-id': 'req-c072477a-a0e5-4da5-ba18-1412a841914a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:31.075 186 INFO tempest.lib.common.rest_client [req-bedc7e6f-a26d-4541-844c-b9ffec141265 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:16:31.078 186 DEBUG tempest.lib.common.rest_client [req-bedc7e6f-a26d-4541-844c-b9ffec141265 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bedc7e6f-a26d-4541-844c-b9ffec141265', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["WDvKJV9URH2Ea5PqwgCMsg"], "expires_at": "2020-12-14T03:16:31.000000Z", "issued_at": "2020-12-14T02:16:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:31.325 197 INFO tempest.lib.common.rest_client [req-886f6c0b-6c26-4667-9797-72af59aacefe ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.243s 2020-12-14 02:16:31.328 197 DEBUG tempest.lib.common.rest_client [req-886f6c0b-6c26-4667-9797-72af59aacefe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-886f6c0b-6c26-4667-9797-72af59aacefe', 'x-compute-request-id': 'req-886f6c0b-6c26-4667-9797-72af59aacefe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"server": {"id": "1dfd0497-187a-402a-923e-b825fcf8b081", "name": "tempest-MiscPolicyActionsRbacTest-server-798543618", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:13Z", "updated": "2020-12-14T02:16:31Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.12", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:de:62:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/1dfd0497-187a-402a-923e-b825fcf8b081"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:26.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbce", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:31.918 193 INFO tempest.lib.common.rest_client [req-3212605a-f27c-4919-9adf-52c4476abeec ] Request (PortsRbacTest:test_create_port_binding_profile): 201 POST http://172.30.13.94:9696/v2.0/ports 1.420s 2020-12-14 02:16:31.921 193 DEBUG tempest.lib.common.rest_client [req-3212605a-f27c-4919-9adf-52c4476abeec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "binding:profile": {"foo": "1"}, "name": "tempest-PortsRbacTest-961917646"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1099', 'x-openstack-request-id': 'req-3212605a-f27c-4919-9adf-52c4476abeec', 'date': 'Mon, 14 Dec 2020 02:16:31 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"4c371891-cf40-4a45-b3fa-aaea3f8815aa","name":"tempest-PortsRbacTest-961917646","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:bc:89:a6","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.79"}],"project_id":"5d2b22c24509439eb518838e24b766b7","port_security_enabled":true,"qos_policy_id":null,"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"binding:vnic_type":"normal","binding:profile":{"foo":"1"},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.79","hostname":"host-192-168-120-79","fqdn":"host-192-168-120-79.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:31Z","updated_at":"2020-12-14T02:16:31Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:31.924 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:31.928 186 INFO tempest.lib.common.rest_client [req-7535fd3e-f82b-4a89-833d-5768d3265e23 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.842s 2020-12-14 02:16:31.932 186 DEBUG tempest.lib.common.rest_client [req-7535fd3e-f82b-4a89-833d-5768d3265e23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerMetadataRbacTest-1809872202-network", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf"}} Response - Headers: {'content-type': 'application/json', 'content-length': '738', 'x-openstack-request-id': 'req-7535fd3e-f82b-4a89-833d-5768d3265e23', 'date': 'Mon, 14 Dec 2020 02:16:31 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"fb2e3a54-e8a8-4643-b148-3f3bf1953bf4","name":"tempest-ServerMetadataRbacTest-1809872202-network","tenant_id":"1ef7d365f8304c6c871d57337acc5adf","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"1ef7d365f8304c6c871d57337acc5adf","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":29,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:16:31Z","updated_at":"2020-12-14T02:16:31Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:31.994 193 INFO tempest.lib.common.rest_client [req-0b68fd75-5552-46e1-b8e0-b644d0572974 ] Request (PortsRbacTest:test_create_port_binding_profile): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.064s 2020-12-14 02:16:31.997 193 DEBUG tempest.lib.common.rest_client [req-0b68fd75-5552-46e1-b8e0-b644d0572974 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b68fd75-5552-46e1-b8e0-b644d0572974', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:32.088 193 INFO tempest.lib.common.rest_client [req-26f1f2d5-07ff-409e-94f7-489c3d99eac4 ] Request (PortsRbacTest:test_create_port_binding_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-12-14 02:16:32.092 193 DEBUG tempest.lib.common.rest_client [req-26f1f2d5-07ff-409e-94f7-489c3d99eac4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26f1f2d5-07ff-409e-94f7-489c3d99eac4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["YaDafAAEQkShXY3cv62fhA"], "expires_at": "2020-12-14T03:16:32.000000Z", "issued_at": "2020-12-14T02:16:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:32.105 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:32.128 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:32.131 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:32.155 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port:device_owner, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:32.157 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:32.223 193 INFO tempest.lib.common.rest_client [req-53770182-85eb-485a-b1af-f15efe4d2c41 ] Request (PortsRbacTest:test_create_port_device_owner): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.061s 2020-12-14 02:16:32.226 193 DEBUG tempest.lib.common.rest_client [req-53770182-85eb-485a-b1af-f15efe4d2c41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53770182-85eb-485a-b1af-f15efe4d2c41', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:32.275 193 INFO tempest.lib.common.rest_client [req-6e1b89e0-e731-463c-9deb-675f675b8f7f ] Request (PortsRbacTest:test_create_port_device_owner): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:16:32.277 193 DEBUG tempest.lib.common.rest_client [req-6e1b89e0-e731-463c-9deb-675f675b8f7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e1b89e0-e731-463c-9deb-675f675b8f7f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["wcLsobMWTu2AyF0G1cyWKw"], "expires_at": "2020-12-14T03:16:32.000000Z", "issued_at": "2020-12-14T02:16:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:32.397 189 INFO tempest.lib.common.rest_client [req-8dbb148a-e462-4dc7-9b0b-b5faaa426257 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.225s 2020-12-14 02:16:32.401 189 DEBUG tempest.lib.common.rest_client [req-8dbb148a-e462-4dc7-9b0b-b5faaa426257 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8dbb148a-e462-4dc7-9b0b-b5faaa426257', 'x-compute-request-id': 'req-8dbb148a-e462-4dc7-9b0b-b5faaa426257', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:32.521 197 INFO tempest.lib.common.rest_client [req-c6b30bc5-9e0c-4354-912f-1706bb784402 ] Request (MiscPolicyActionsRbacTest:setUp): 404 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.081s 2020-12-14 02:16:32.525 197 DEBUG tempest.lib.common.rest_client [req-c6b30bc5-9e0c-4354-912f-1706bb784402 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-c6b30bc5-9e0c-4354-912f-1706bb784402', 'x-compute-request-id': 'req-c6b30bc5-9e0c-4354-912f-1706bb784402', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 1dfd0497-187a-402a-923e-b825fcf8b081 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:32.695 186 INFO tempest.lib.common.rest_client [req-3ca77975-e8df-475c-a0a7-7e60ca9abb8b ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.754s 2020-12-14 02:16:32.698 186 DEBUG tempest.lib.common.rest_client [req-3ca77975-e8df-475c-a0a7-7e60ca9abb8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "fb2e3a54-e8a8-4643-b148-3f3bf1953bf4", "cidr": "192.168.120.0/28", "name": "tempest-ServerMetadataRbacTest-1809872202-subnet", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '710', 'x-openstack-request-id': 'req-3ca77975-e8df-475c-a0a7-7e60ca9abb8b', 'date': 'Mon, 14 Dec 2020 02:16:32 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"5627aefa-babe-41d1-83ef-cb14c2b63cb4","name":"tempest-ServerMetadataRbacTest-1809872202-subnet","tenant_id":"1ef7d365f8304c6c871d57337acc5adf","network_id":"fb2e3a54-e8a8-4643-b148-3f3bf1953bf4","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:16:32Z","updated_at":"2020-12-14T02:16:32Z","revision_number":0,"project_id":"1ef7d365f8304c6c871d57337acc5adf"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:32.706 197 INFO tempest.lib.common.rest_client [req-d673ed8b-97fd-4a40-9492-4d6f09a44eed ] Request (MiscPolicyActionsRbacTest:setUp): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:16:32.710 197 DEBUG tempest.lib.common.rest_client [req-d673ed8b-97fd-4a40-9492-4d6f09a44eed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d673ed8b-97fd-4a40-9492-4d6f09a44eed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["CG6dTUkES9SEpnxMCevxFQ"], "expires_at": "2020-12-14T03:16:32.000000Z", "issued_at": "2020-12-14T02:16:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:32.715 197 INFO tempest.lib.common.fixed_network [-] (MiscPolicyActionsRbacTest:setUp) Found network {'id': '25a7ce63-636c-4fcd-bf14-ab20366f9481', 'name': 'tempest-MiscPolicyActionsRbacTest-2031429312-network', 'tenant_id': 'a836f1fb2f90434abc04b768f968fb5b', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'a836f1fb2f90434abc04b768f968fb5b', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 65, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:15:55Z', 'updated_at': '2020-12-14T02:15:55Z', 'revision_number': 1} available for tenant 2020-12-14 02:16:33.737 189 INFO tempest.lib.common.rest_client [req-a4b8bafc-a651-44fd-99f3-93573ea7c7a1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.225s 2020-12-14 02:16:33.741 189 DEBUG tempest.lib.common.rest_client [req-a4b8bafc-a651-44fd-99f3-93573ea7c7a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a4b8bafc-a651-44fd-99f3-93573ea7c7a1', 'x-compute-request-id': 'req-a4b8bafc-a651-44fd-99f3-93573ea7c7a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:33.751 193 INFO tempest.lib.common.rest_client [req-afcec6ba-a934-4856-b5a3-1805cf696048 ] Request (PortsRbacTest:test_create_port_device_owner): 201 POST http://172.30.13.94:9696/v2.0/ports 1.466s 2020-12-14 02:16:33.754 193 DEBUG tempest.lib.common.rest_client [req-afcec6ba-a934-4856-b5a3-1805cf696048 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "device_owner": "network:router_interface", "name": "tempest-PortsRbacTest-114394266"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1077', 'x-openstack-request-id': 'req-afcec6ba-a934-4856-b5a3-1805cf696048', 'date': 'Mon, 14 Dec 2020 02:16:33 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"4e22be47-89e8-48cc-838e-169a4fe51394","name":"tempest-PortsRbacTest-114394266","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:64:09:72","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"network:router_interface","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.73"}],"project_id":"5d2b22c24509439eb518838e24b766b7","port_security_enabled":false,"qos_policy_id":null,"security_groups":[],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.73","hostname":"host-192-168-120-73","fqdn":"host-192-168-120-73.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:32Z","updated_at":"2020-12-14T02:16:32Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:33.757 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:33.820 197 INFO tempest.lib.common.rest_client [req-99cbbe2d-d795-4868-ae02-fcf11f127d77 ] Request (MiscPolicyActionsRbacTest:setUp): 202 POST http://172.30.13.94/compute/v2.1/servers 1.094s 2020-12-14 02:16:33.823 197 DEBUG tempest.lib.common.rest_client [req-99cbbe2d-d795-4868-ae02-fcf11f127d77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "25a7ce63-636c-4fcd-bf14-ab20366f9481"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-99cbbe2d-d795-4868-ae02-fcf11f127d77', 'x-compute-request-id': 'req-99cbbe2d-d795-4868-ae02-fcf11f127d77', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "4b2VRFaLfceY"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:33.826 193 INFO tempest.lib.common.rest_client [req-399a9d18-1dd3-4916-a4e2-b8d42d11e717 ] Request (PortsRbacTest:test_create_port_device_owner): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.063s 2020-12-14 02:16:33.829 193 DEBUG tempest.lib.common.rest_client [req-399a9d18-1dd3-4916-a4e2-b8d42d11e717 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-399a9d18-1dd3-4916-a4e2-b8d42d11e717', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:33.889 193 INFO tempest.lib.common.rest_client [req-959651d2-7239-4f30-99d3-dd0c5176282f ] Request (PortsRbacTest:test_create_port_device_owner): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:16:33.892 193 DEBUG tempest.lib.common.rest_client [req-959651d2-7239-4f30-99d3-dd0c5176282f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-959651d2-7239-4f30-99d3-dd0c5176282f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["HvR4D4DwQdCbUAFxzFY4Tw"], "expires_at": "2020-12-14T03:16:33.000000Z", "issued_at": "2020-12-14T02:16:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:33.905 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:33.929 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:33.931 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:33.960 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port:fixed_ips:ip_address, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:34.030 197 INFO tempest.lib.common.rest_client [req-e3d88cd9-8b73-45c8-b6e4-bda33a3d6fa9 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.170s 2020-12-14 02:16:34.033 197 DEBUG tempest.lib.common.rest_client [req-e3d88cd9-8b73-45c8-b6e4-bda33a3d6fa9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1400', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e3d88cd9-8b73-45c8-b6e4-bda33a3d6fa9', 'x-compute-request-id': 'req-e3d88cd9-8b73-45c8-b6e4-bda33a3d6fa9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:34Z", "updated": "2020-12-14T02:16:33Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:34.179 193 INFO tempest.lib.common.rest_client [req-fbf71e72-cf87-4724-bf14-19fc20225b22 ] Request (PortsRbacTest:test_create_port_fixed_ips_ip_address): 200 GET http://172.30.13.94:9696/v2.0/ports?network_id=9b3f8864-8a15-49e7-9e20-d2c6badb1cd4 0.212s 2020-12-14 02:16:34.185 193 DEBUG tempest.lib.common.rest_client [req-fbf71e72-cf87-4724-bf14-19fc20225b22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '7807', 'x-openstack-request-id': 'req-fbf71e72-cf87-4724-bf14-19fc20225b22', 'date': 'Mon, 14 Dec 2020 02:16:34 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?network_id=9b3f8864-8a15-49e7-9e20-d2c6badb1cd4'} Body: b'{"ports":[{"id":"1424d9a0-aa2a-498b-912a-6e620e14fdca","name":"tempest-PortsRbacTest-875917120","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:73:e6:3a","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.75"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"rbac_test_host","binding:vif_type":"binding_failed","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.75","hostname":"host-192-168-120-75","fqdn":"host-192-168-120-75.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:24Z","updated_at":"2020-12-14T02:16:29Z","revision_number":2,"project_id":"5d2b22c24509439eb518838e24b766b7"},{"id":"4c371891-cf40-4a45-b3fa-aaea3f8815aa","name":"tempest-PortsRbacTest-961917646","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:bc:89:a6","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.79"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{"foo":"1"},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.79","hostname":"host-192-168-120-79","fqdn":"host-192-168-120-79.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:31Z","updated_at":"2020-12-14T02:16:31Z","revision_number":1,"project_id":"5d2b22c24509439eb518838e24b766b7"},{"id":"4e22be47-89e8-48cc-838e-169a4fe51394","name":"tempest-PortsRbacTest-114394266","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:64:09:72","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"network:router_interface","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.73"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":[],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":false,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.73","hostname":"host-192-168-120-73","fqdn":"host-192-168-120-73.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:32Z","updated_at":"2020-12-14T02:16:32Z","revision_number":1,"project_id":"5d2b22c24509439eb518838e24b766b7"},{"id":"5e40c58a-f307-4ed6-8cb9-bbf0907e938b","name":"tempest-PortsRbacTest-995936573","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:5c:1b:1b","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.213"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.213","hostname":"host-192-168-120-213","fqdn": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:34.280 193 INFO tempest.lib.common.rest_client [req-f52f9bcf-9ace-4240-ab84-8ce744471dee ] Request (PortsRbacTest:test_create_port_fixed_ips_ip_address): 200 GET http://172.30.13.94:9696/v2.0/subnets/5804389f-c655-4f7f-855c-f96ce18290fc 0.087s 2020-12-14 02:16:34.283 193 DEBUG tempest.lib.common.rest_client [req-f52f9bcf-9ace-4240-ab84-8ce744471dee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '662', 'x-openstack-request-id': 'req-f52f9bcf-9ace-4240-ab84-8ce744471dee', 'date': 'Mon, 14 Dec 2020 02:16:34 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/5804389f-c655-4f7f-855c-f96ce18290fc'} Body: b'{"subnet":{"id":"5804389f-c655-4f7f-855c-f96ce18290fc","name":"","tenant_id":"5d2b22c24509439eb518838e24b766b7","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/24","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:16:19Z","updated_at":"2020-12-14T02:16:19Z","revision_number":0,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:34.415 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:34.427 186 INFO tempest.lib.common.rest_client [req-da8efab2-2fc1-4134-85ec-7aefe0ce1f4b ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.720s 2020-12-14 02:16:34.430 186 DEBUG tempest.lib.common.rest_client [req-da8efab2-2fc1-4134-85ec-7aefe0ce1f4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerMetadataRbacTest-1809872202-router", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '811', 'x-openstack-request-id': 'req-da8efab2-2fc1-4134-85ec-7aefe0ce1f4b', 'date': 'Mon, 14 Dec 2020 02:16:34 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "a25c06fc-2a9a-4336-bb93-e4f100dff742", "name": "tempest-ServerMetadataRbacTest-1809872202-router", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.164"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::a3"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:16:32Z", "updated_at": "2020-12-14T02:16:33Z", "revision_number": 3, "project_id": "1ef7d365f8304c6c871d57337acc5adf"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:34.486 193 INFO tempest.lib.common.rest_client [req-477dc20e-a2c9-481d-92a5-00f26347c9b6 ] Request (PortsRbacTest:test_create_port_fixed_ips_ip_address): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.064s 2020-12-14 02:16:34.489 193 DEBUG tempest.lib.common.rest_client [req-477dc20e-a2c9-481d-92a5-00f26347c9b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-477dc20e-a2c9-481d-92a5-00f26347c9b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:34.541 193 INFO tempest.lib.common.rest_client [req-cac0892a-75e2-4f49-b378-754444545b5f ] Request (PortsRbacTest:test_create_port_fixed_ips_ip_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:16:34.546 193 DEBUG tempest.lib.common.rest_client [req-cac0892a-75e2-4f49-b378-754444545b5f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cac0892a-75e2-4f49-b378-754444545b5f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["a3c3QHdLRoioeTgeNWVo7w"], "expires_at": "2020-12-14T03:16:34.000000Z", "issued_at": "2020-12-14T02:16:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:35.104 189 INFO tempest.lib.common.rest_client [req-6836f397-4916-487e-9df2-63b1ae6f382f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.253s 2020-12-14 02:16:35.107 189 DEBUG tempest.lib.common.rest_client [req-6836f397-4916-487e-9df2-63b1ae6f382f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6836f397-4916-487e-9df2-63b1ae6f382f', 'x-compute-request-id': 'req-6836f397-4916-487e-9df2-63b1ae6f382f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:35.332 197 INFO tempest.lib.common.rest_client [req-6f8dcfe7-f8fa-45d0-be74-e54d5f25022d ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.177s 2020-12-14 02:16:35.336 197 DEBUG tempest.lib.common.rest_client [req-6f8dcfe7-f8fa-45d0-be74-e54d5f25022d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1493', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6f8dcfe7-f8fa-45d0-be74-e54d5f25022d', 'x-compute-request-id': 'req-6f8dcfe7-f8fa-45d0-be74-e54d5f25022d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:35Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:35.476 197 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/spawning" after 1 second wait 2020-12-14 02:16:35.707 193 INFO tempest.lib.common.rest_client [req-6c1bea5d-ca2a-4cf4-a2d3-477c11b52bd6 ] Request (PortsRbacTest:test_create_port_fixed_ips_ip_address): 201 POST http://172.30.13.94:9696/v2.0/ports 1.153s 2020-12-14 02:16:35.711 193 DEBUG tempest.lib.common.rest_client [req-6c1bea5d-ca2a-4cf4-a2d3-477c11b52bd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "fixed_ips": [{"ip_address": "192.168.120.254"}, {"subnet_id": "5804389f-c655-4f7f-855c-f96ce18290fc"}], "name": "tempest-PortsRbacTest-30878614"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1295', 'x-openstack-request-id': 'req-6c1bea5d-ca2a-4cf4-a2d3-477c11b52bd6', 'date': 'Mon, 14 Dec 2020 02:16:35 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"e489a3cb-e74a-4f4e-acfc-066e32897bbb","name":"tempest-PortsRbacTest-30878614","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:c0:5c:7d","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.121"},{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.254"}],"project_id":"5d2b22c24509439eb518838e24b766b7","port_security_enabled":true,"qos_policy_id":null,"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.121","hostname":"host-192-168-120-121","fqdn":"host-192-168-120-121.openstackgate.local."},{"ip_address":"192.168.120.254","hostname":"host-192-168-120-254","fqdn":"host-192-168-120-254.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:35Z","updated_at":"2020-12-14T02:16:35Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:35.715 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:35.780 193 INFO tempest.lib.common.rest_client [req-54f94688-1dfc-410c-9422-34b5c65c753b ] Request (PortsRbacTest:test_create_port_fixed_ips_ip_address): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.059s 2020-12-14 02:16:35.784 193 DEBUG tempest.lib.common.rest_client [req-54f94688-1dfc-410c-9422-34b5c65c753b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-54f94688-1dfc-410c-9422-34b5c65c753b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:35.833 193 INFO tempest.lib.common.rest_client [req-841270dc-61c6-426f-81b5-951359d997b1 ] Request (PortsRbacTest:test_create_port_fixed_ips_ip_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:16:35.837 193 DEBUG tempest.lib.common.rest_client [req-841270dc-61c6-426f-81b5-951359d997b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-841270dc-61c6-426f-81b5-951359d997b1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["XpFyX-1YSUqMl3Q7c8nboQ"], "expires_at": "2020-12-14T03:16:35.000000Z", "issued_at": "2020-12-14T02:16:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:35.853 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:35.875 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:35.878 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:35.907 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port:mac_address, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:35.909 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:35.982 193 INFO tempest.lib.common.rest_client [req-afa51880-e7d5-4d98-9a72-0bbb000c8ba6 ] Request (PortsRbacTest:test_create_port_mac_address): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.067s 2020-12-14 02:16:35.986 193 DEBUG tempest.lib.common.rest_client [req-afa51880-e7d5-4d98-9a72-0bbb000c8ba6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-afa51880-e7d5-4d98-9a72-0bbb000c8ba6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:36.035 193 INFO tempest.lib.common.rest_client [req-e771ca34-0379-4987-a2b7-417a179d463a ] Request (PortsRbacTest:test_create_port_mac_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:16:36.038 193 DEBUG tempest.lib.common.rest_client [req-e771ca34-0379-4987-a2b7-417a179d463a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e771ca34-0379-4987-a2b7-417a179d463a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["Yz1aNOJpTpCCAWse3vRMqQ"], "expires_at": "2020-12-14T03:16:36.000000Z", "issued_at": "2020-12-14T02:16:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:36.401 186 INFO tempest.lib.common.rest_client [req-a3b34dd8-b976-4fa7-b257-2fe56abc1cc2 ] Request (ServerMetadataRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/a25c06fc-2a9a-4336-bb93-e4f100dff742/add_router_interface 1.963s 2020-12-14 02:16:36.403 186 DEBUG tempest.lib.common.rest_client [req-a3b34dd8-b976-4fa7-b257-2fe56abc1cc2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "5627aefa-babe-41d1-83ef-cb14c2b63cb4"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-a3b34dd8-b976-4fa7-b257-2fe56abc1cc2', 'date': 'Mon, 14 Dec 2020 02:16:36 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/a25c06fc-2a9a-4336-bb93-e4f100dff742/add_router_interface'} Body: b'{"id": "a25c06fc-2a9a-4336-bb93-e4f100dff742", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "port_id": "887cff29-bb90-4707-b224-2cf7690b9631", "network_id": "fb2e3a54-e8a8-4643-b148-3f3bf1953bf4", "subnet_id": "5627aefa-babe-41d1-83ef-cb14c2b63cb4", "subnet_ids": ["5627aefa-babe-41d1-83ef-cb14c2b63cb4"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:36.406 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerMetadataRbacTest-1730955355', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1ef7d365f8304c6c871d57337acc5adf', 'project_name': 'tempest-ServerMetadataRbacTest-1730955355', 'tenant_id': '1ef7d365f8304c6c871d57337acc5adf', 'tenant_name': 'tempest-ServerMetadataRbacTest-1730955355', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'fdd4aec086bf411486f075e6837bc36c'}, Network: {'id': 'fb2e3a54-e8a8-4643-b148-3f3bf1953bf4', 'name': 'tempest-ServerMetadataRbacTest-1809872202-network', 'tenant_id': '1ef7d365f8304c6c871d57337acc5adf', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '1ef7d365f8304c6c871d57337acc5adf', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:16:31Z', 'updated_at': '2020-12-14T02:16:31Z', 'revision_number': 1}, Subnet: {'id': '5627aefa-babe-41d1-83ef-cb14c2b63cb4', 'name': 'tempest-ServerMetadataRbacTest-1809872202-subnet', 'tenant_id': '1ef7d365f8304c6c871d57337acc5adf', 'network_id': 'fb2e3a54-e8a8-4643-b148-3f3bf1953bf4', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:16:32Z', 'updated_at': '2020-12-14T02:16:32Z', 'revision_number': 0, 'project_id': '1ef7d365f8304c6c871d57337acc5adf'}, Router: {'id': 'a25c06fc-2a9a-4336-bb93-e4f100dff742', 'name': 'tempest-ServerMetadataRbacTest-1809872202-router', 'tenant_id': '1ef7d365f8304c6c871d57337acc5adf', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.164'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::a3'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:16:32Z', 'updated_at': '2020-12-14T02:16:33Z', 'revision_number': 3, 'project_id': '1ef7d365f8304c6c871d57337acc5adf'} 2020-12-14 02:16:36.472 189 INFO tempest.lib.common.rest_client [req-99fb59a6-5958-4b4f-a9ff-70a45102bece ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.251s 2020-12-14 02:16:36.475 189 DEBUG tempest.lib.common.rest_client [req-99fb59a6-5958-4b4f-a9ff-70a45102bece ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-99fb59a6-5958-4b4f-a9ff-70a45102bece', 'x-compute-request-id': 'req-99fb59a6-5958-4b4f-a9ff-70a45102bece', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:36.593 186 INFO tempest.lib.common.rest_client [req-96424934-9179-4248-8312-cff02777ddf7 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.117s 2020-12-14 02:16:36.597 186 DEBUG tempest.lib.common.rest_client [req-96424934-9179-4248-8312-cff02777ddf7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96424934-9179-4248-8312-cff02777ddf7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fdd4aec086bf411486f075e6837bc36c", "name": "tempest-ServerMetadataRbacTest-1730955355", "password_expires_at": null}, "audit_ids": ["4jIPXHv0RvS7BpTyJaVSXg"], "expires_at": "2020-12-14T03:16:36.000000Z", "issued_at": "2020-12-14T02:16:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ef7d365f8304c6c871d57337acc5adf", "name": "tempest-ServerMetadataRbacTest-1730955355"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:36.650 186 INFO tempest.lib.common.rest_client [req-b1f8fede-4e6a-4fa5-ab3c-a006bcd7f563 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:16:36.652 186 DEBUG tempest.lib.common.rest_client [req-b1f8fede-4e6a-4fa5-ab3c-a006bcd7f563 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1f8fede-4e6a-4fa5-ab3c-a006bcd7f563', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["XI4xqhiaQiu9jVyckiYnXw"], "expires_at": "2020-12-14T03:16:36.000000Z", "issued_at": "2020-12-14T02:16:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:36.734 197 INFO tempest.lib.common.rest_client [req-6b59cf4a-90a8-406e-95d5-981d42aea3c3 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.247s 2020-12-14 02:16:36.739 197 DEBUG tempest.lib.common.rest_client [req-6b59cf4a-90a8-406e-95d5-981d42aea3c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6b59cf4a-90a8-406e-95d5-981d42aea3c3', 'x-compute-request-id': 'req-6b59cf4a-90a8-406e-95d5-981d42aea3c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:35Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:36.779 186 INFO tempest.lib.common.rest_client [req-79e04560-e539-405c-ac29-eabeb177729c ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.061s 2020-12-14 02:16:36.782 186 DEBUG tempest.lib.common.rest_client [req-79e04560-e539-405c-ac29-eabeb177729c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79e04560-e539-405c-ac29-eabeb177729c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["W3fEjbuNQ5mVai0Q-c1NmQ"], "expires_at": "2020-12-14T03:16:36.000000Z", "issued_at": "2020-12-14T02:16:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:36.851 186 INFO tempest.lib.common.rest_client [req-337bf7bc-cacc-4d52-be03-6da2125d0929 ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.061s 2020-12-14 02:16:36.855 186 DEBUG tempest.lib.common.rest_client [req-337bf7bc-cacc-4d52-be03-6da2125d0929 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-337bf7bc-cacc-4d52-be03-6da2125d0929', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:36.927 186 INFO tempest.lib.common.rest_client [req-b882fa5f-55c6-4770-ba3b-17ecaba0bf91 ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:16:36.930 186 DEBUG tempest.lib.common.rest_client [req-b882fa5f-55c6-4770-ba3b-17ecaba0bf91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b882fa5f-55c6-4770-ba3b-17ecaba0bf91', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:36.934 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:16:36.936 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:36.948 193 INFO tempest.lib.common.rest_client [req-a15a8108-285f-40c5-b192-83bbb17a0dd0 ] Request (PortsRbacTest:test_create_port_mac_address): 201 POST http://172.30.13.94:9696/v2.0/ports 0.902s 2020-12-14 02:16:36.952 193 DEBUG tempest.lib.common.rest_client [req-a15a8108-285f-40c5-b192-83bbb17a0dd0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "mac_address": "fa:16:3e:f0:5a:a0", "name": "tempest-PortsRbacTest-1282087528"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1095', 'x-openstack-request-id': 'req-a15a8108-285f-40c5-b192-83bbb17a0dd0', 'date': 'Mon, 14 Dec 2020 02:16:36 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"3cce41bf-5406-433d-9e31-d145f5caa075","name":"tempest-PortsRbacTest-1282087528","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:f0:5a:a0","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.127"}],"project_id":"5d2b22c24509439eb518838e24b766b7","port_security_enabled":true,"qos_policy_id":null,"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.127","hostname":"host-192-168-120-127","fqdn":"host-192-168-120-127.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:36Z","updated_at":"2020-12-14T02:16:36Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:36.956 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:37.002 186 INFO tempest.lib.common.rest_client [req-fcfc19af-c06f-4330-9fd5-ee668e0d060e ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles 0.060s 2020-12-14 02:16:37.005 186 DEBUG tempest.lib.common.rest_client [req-fcfc19af-c06f-4330-9fd5-ee668e0d060e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fcfc19af-c06f-4330-9fd5-ee668e0d060e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:37.020 193 INFO tempest.lib.common.rest_client [req-508d0117-3370-49ec-8e66-944c29c5a593 ] Request (PortsRbacTest:test_create_port_mac_address): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.059s 2020-12-14 02:16:37.023 193 DEBUG tempest.lib.common.rest_client [req-508d0117-3370-49ec-8e66-944c29c5a593 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-508d0117-3370-49ec-8e66-944c29c5a593', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:37.070 193 INFO tempest.lib.common.rest_client [req-cfcda53c-6f53-4237-91b3-c15898986549 ] Request (PortsRbacTest:test_create_port_mac_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:16:37.073 193 DEBUG tempest.lib.common.rest_client [req-cfcda53c-6f53-4237-91b3-c15898986549 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfcda53c-6f53-4237-91b3-c15898986549', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["54-fCHx1SHytSDBAGhvqXg"], "expires_at": "2020-12-14T03:16:37.000000Z", "issued_at": "2020-12-14T02:16:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:37.074 186 INFO tempest.lib.common.rest_client [req-674fdbc2-d540-472c-b3dd-e91e868347f9 ] Request (ServerMetadataRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles/72a4576c553448cd941b052c1ca0cf2d 0.061s 2020-12-14 02:16:37.077 186 DEBUG tempest.lib.common.rest_client [req-674fdbc2-d540-472c-b3dd-e91e868347f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-674fdbc2-d540-472c-b3dd-e91e868347f9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:37.086 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:37.109 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:37.111 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:37.140 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_port:port_security_enabled, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:37.143 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:37.207 186 INFO tempest.lib.common.rest_client [req-f80696ef-35f8-4d9c-907c-55c20397ddf4 ] Request (ServerMetadataRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles/a629c95d64b3416fb80ae90af4f69c05 0.123s 2020-12-14 02:16:37.211 186 DEBUG tempest.lib.common.rest_client [req-f80696ef-35f8-4d9c-907c-55c20397ddf4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f80696ef-35f8-4d9c-907c-55c20397ddf4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:37.222 193 INFO tempest.lib.common.rest_client [req-1e4f5072-1d15-4a2d-9950-f1a2df084539 ] Request (PortsRbacTest:test_create_port_security_enabled): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.073s 2020-12-14 02:16:37.225 193 DEBUG tempest.lib.common.rest_client [req-1e4f5072-1d15-4a2d-9950-f1a2df084539 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e4f5072-1d15-4a2d-9950-f1a2df084539', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:37.321 193 INFO tempest.lib.common.rest_client [req-22ffd68d-8de0-434d-b58c-68a23c695f43 ] Request (PortsRbacTest:test_create_port_security_enabled): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:16:37.325 193 DEBUG tempest.lib.common.rest_client [req-22ffd68d-8de0-434d-b58c-68a23c695f43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-22ffd68d-8de0-434d-b58c-68a23c695f43', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["JFq4h2StTbCc3pq_rw3Dkg"], "expires_at": "2020-12-14T03:16:37.000000Z", "issued_at": "2020-12-14T02:16:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:37.955 189 INFO tempest.lib.common.rest_client [req-60202c02-98e3-4aab-8ac9-69e07a2381cc ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.334s 2020-12-14 02:16:37.957 189 DEBUG tempest.lib.common.rest_client [req-60202c02-98e3-4aab-8ac9-69e07a2381cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-60202c02-98e3-4aab-8ac9-69e07a2381cc', 'x-compute-request-id': 'req-60202c02-98e3-4aab-8ac9-69e07a2381cc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:38.129 197 INFO tempest.lib.common.rest_client [req-d7e7568e-c766-4df5-a931-defaf6dd17a3 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.263s 2020-12-14 02:16:38.132 197 DEBUG tempest.lib.common.rest_client [req-d7e7568e-c766-4df5-a931-defaf6dd17a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d7e7568e-c766-4df5-a931-defaf6dd17a3', 'x-compute-request-id': 'req-d7e7568e-c766-4df5-a931-defaf6dd17a3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:35Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:38.311 186 INFO tempest.lib.common.rest_client [req-ea3d5e3f-43dc-4542-91f6-1e73d6efce36 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:16:38.314 186 DEBUG tempest.lib.common.rest_client [req-ea3d5e3f-43dc-4542-91f6-1e73d6efce36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea3d5e3f-43dc-4542-91f6-1e73d6efce36', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fdd4aec086bf411486f075e6837bc36c", "name": "tempest-ServerMetadataRbacTest-1730955355", "password_expires_at": null}, "audit_ids": ["DLTzyDxISV2vl2x6EJrbzw"], "expires_at": "2020-12-14T03:16:38.000000Z", "issued_at": "2020-12-14T02:16:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ef7d365f8304c6c871d57337acc5adf", "name": "tempest-ServerMetadataRbacTest-1730955355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:38.427 186 INFO tempest.lib.common.rest_client [req-019ef1dd-4707-4d7d-a297-ae6b3c85fab2 ] Request (ServerMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:16:38.430 186 DEBUG tempest.lib.common.rest_client [req-019ef1dd-4707-4d7d-a297-ae6b3c85fab2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-019ef1dd-4707-4d7d-a297-ae6b3c85fab2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fdd4aec086bf411486f075e6837bc36c", "name": "tempest-ServerMetadataRbacTest-1730955355", "password_expires_at": null}, "audit_ids": ["_I2SVVsnT_e6wv64CT5u0w"], "expires_at": "2020-12-14T03:16:38.000000Z", "issued_at": "2020-12-14T02:16:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ef7d365f8304c6c871d57337acc5adf", "name": "tempest-ServerMetadataRbacTest-1730955355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:38.435 186 INFO tempest.lib.common.fixed_network [-] (ServerMetadataRbacTest:setUpClass) Found network {'id': 'fb2e3a54-e8a8-4643-b148-3f3bf1953bf4', 'name': 'tempest-ServerMetadataRbacTest-1809872202-network', 'tenant_id': '1ef7d365f8304c6c871d57337acc5adf', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '1ef7d365f8304c6c871d57337acc5adf', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:16:31Z', 'updated_at': '2020-12-14T02:16:31Z', 'revision_number': 1} available for tenant 2020-12-14 02:16:39.519 197 INFO tempest.lib.common.rest_client [req-05f50f6d-f080-4646-9d2a-629e135d11ff ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.265s 2020-12-14 02:16:39.523 197 DEBUG tempest.lib.common.rest_client [req-05f50f6d-f080-4646-9d2a-629e135d11ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-05f50f6d-f080-4646-9d2a-629e135d11ff', 'x-compute-request-id': 'req-05f50f6d-f080-4646-9d2a-629e135d11ff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:35Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:40.879 197 INFO tempest.lib.common.rest_client [req-6eb519c0-93a1-447c-aa1d-f002f12adbd4 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.241s 2020-12-14 02:16:40.884 197 DEBUG tempest.lib.common.rest_client [req-6eb519c0-93a1-447c-aa1d-f002f12adbd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6eb519c0-93a1-447c-aa1d-f002f12adbd4', 'x-compute-request-id': 'req-6eb519c0-93a1-447c-aa1d-f002f12adbd4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:35Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:42.232 197 INFO tempest.lib.common.rest_client [req-198d6bcb-d110-43ba-884b-69fa02f620eb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.230s 2020-12-14 02:16:42.235 197 DEBUG tempest.lib.common.rest_client [req-198d6bcb-d110-43ba-884b-69fa02f620eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-198d6bcb-d110-43ba-884b-69fa02f620eb', 'x-compute-request-id': 'req-198d6bcb-d110-43ba-884b-69fa02f620eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:35Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:42.359 189 INFO tempest.lib.common.rest_client [req-c0bf5fda-52b6-466d-98bc-5af20bb24c2f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 3.289s 2020-12-14 02:16:42.362 189 DEBUG tempest.lib.common.rest_client [req-c0bf5fda-52b6-466d-98bc-5af20bb24c2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c0bf5fda-52b6-466d-98bc-5af20bb24c2f', 'x-compute-request-id': 'req-c0bf5fda-52b6-466d-98bc-5af20bb24c2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:42.759 193 INFO tempest.lib.common.rest_client [req-c47270bc-77bb-468a-9899-dbd2424d3c79 ] Request (PortsRbacTest:test_create_port_security_enabled): 201 POST http://172.30.13.94:9696/v2.0/ports 5.427s 2020-12-14 02:16:42.762 193 DEBUG tempest.lib.common.rest_client [req-c47270bc-77bb-468a-9899-dbd2424d3c79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "port_security_enabled": true, "name": "tempest-PortsRbacTest-209437603"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1090', 'x-openstack-request-id': 'req-c47270bc-77bb-468a-9899-dbd2424d3c79', 'date': 'Mon, 14 Dec 2020 02:16:42 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"2274dcfa-e06d-468c-bd1c-19d95731a8c8","name":"tempest-PortsRbacTest-209437603","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:1f:c3:e8","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.80"}],"project_id":"5d2b22c24509439eb518838e24b766b7","port_security_enabled":true,"qos_policy_id":null,"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.80","hostname":"host-192-168-120-80","fqdn":"host-192-168-120-80.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:37Z","updated_at":"2020-12-14T02:16:42Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:42.764 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:42.886 186 INFO tempest.lib.common.rest_client [req-0b69f6c8-8f1c-4561-b6c1-473f84a20a30 ] Request (ServerMetadataRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 4.441s 2020-12-14 02:16:42.889 186 DEBUG tempest.lib.common.rest_client [req-0b69f6c8-8f1c-4561-b6c1-473f84a20a30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerMetadataRbacTest-server-1866062397", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "metadata": {}, "networks": [{"uuid": "fb2e3a54-e8a8-4643-b148-3f3bf1953bf4"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0b69f6c8-8f1c-4561-b6c1-473f84a20a30', 'x-compute-request-id': 'req-0b69f6c8-8f1c-4561-b6c1-473f84a20a30', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "913e8d28-6913-44af-85b7-801bbbe2420c", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "tQb73fYoRFit"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:42.895 193 INFO tempest.lib.common.rest_client [req-2d563ffe-4016-4371-aa7c-2053a2c1248e ] Request (PortsRbacTest:test_create_port_security_enabled): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.125s 2020-12-14 02:16:42.898 193 DEBUG tempest.lib.common.rest_client [req-2d563ffe-4016-4371-aa7c-2053a2c1248e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2d563ffe-4016-4371-aa7c-2053a2c1248e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:42.952 193 INFO tempest.lib.common.rest_client [req-2aa7ec02-ba92-4a85-9306-f97d562a1313 ] Request (PortsRbacTest:test_create_port_security_enabled): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:16:42.956 193 DEBUG tempest.lib.common.rest_client [req-2aa7ec02-ba92-4a85-9306-f97d562a1313 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2aa7ec02-ba92-4a85-9306-f97d562a1313', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["aMuSZxVUQ6-d8uTgTk18pw"], "expires_at": "2020-12-14T03:16:42.000000Z", "issued_at": "2020-12-14T02:16:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:42.972 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:43.004 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:43.006 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:43.032 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:43.064 186 INFO tempest.lib.common.rest_client [req-ef96b9dc-3835-41a9-af5b-992dc3b1efcf ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c 0.144s 2020-12-14 02:16:43.066 186 DEBUG tempest.lib.common.rest_client [req-ef96b9dc-3835-41a9-af5b-992dc3b1efcf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1398', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ef96b9dc-3835-41a9-af5b-992dc3b1efcf', 'x-compute-request-id': 'req-ef96b9dc-3835-41a9-af5b-992dc3b1efcf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c'} Body: b'{"server": {"id": "913e8d28-6913-44af-85b7-801bbbe2420c", "name": "tempest-ServerMetadataRbacTest-server-1866062397", "status": "BUILD", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "user_id": "fdd4aec086bf411486f075e6837bc36c", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:43Z", "updated": "2020-12-14T02:16:42Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:43.609 197 INFO tempest.lib.common.rest_client [req-eb784557-140f-4aae-baea-12001c71adcb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.252s 2020-12-14 02:16:43.612 197 DEBUG tempest.lib.common.rest_client [req-eb784557-140f-4aae-baea-12001c71adcb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eb784557-140f-4aae-baea-12001c71adcb', 'x-compute-request-id': 'req-eb784557-140f-4aae-baea-12001c71adcb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:43Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:42.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:43.724 197 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 9 second wait 2020-12-14 02:16:43.728 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:43.732 189 INFO tempest.lib.common.rest_client [req-e333992d-e11d-45c9-b719-fb96003b7d4d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.261s 2020-12-14 02:16:43.733 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.736 189 DEBUG tempest.lib.common.rest_client [req-e333992d-e11d-45c9-b719-fb96003b7d4d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e333992d-e11d-45c9-b719-fb96003b7d4d', 'x-compute-request-id': 'req-e333992d-e11d-45c9-b719-fb96003b7d4d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:43.737 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.740 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.743 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.747 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.751 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.756 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.759 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.761 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.764 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.767 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.770 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.773 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.775 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.779 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.782 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.785 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.788 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.790 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.793 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.796 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.799 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.801 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.804 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.807 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.810 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.812 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.815 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.818 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.821 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.824 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.827 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.829 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.832 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.835 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.838 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.841 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.843 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.847 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.850 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.853 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.856 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.858 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.862 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.865 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.868 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.870 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.873 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.876 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.879 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.882 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.884 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.887 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.890 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.894 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.896 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.903 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.905 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.908 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.910 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.913 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.915 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.917 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.920 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.922 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.924 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.926 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.929 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.931 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.934 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.936 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:43.947 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-password:show, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:43.949 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:43.974 193 INFO tempest.lib.common.rest_client [req-b934327f-047a-4113-9ba0-83f75fb7d470 ] Request (PortsRbacTest:test_delete_port): 201 POST http://172.30.13.94:9696/v2.0/ports 0.936s 2020-12-14 02:16:43.977 193 DEBUG tempest.lib.common.rest_client [req-b934327f-047a-4113-9ba0-83f75fb7d470 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "name": "tempest-PortsRbacTest-536388572"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1090', 'x-openstack-request-id': 'req-b934327f-047a-4113-9ba0-83f75fb7d470', 'date': 'Mon, 14 Dec 2020 02:16:43 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"72d22f36-30f2-4a1d-8a7c-b7ebe2dc6805","name":"tempest-PortsRbacTest-536388572","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:d9:c6:74","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.10"}],"project_id":"5d2b22c24509439eb518838e24b766b7","port_security_enabled":true,"qos_policy_id":null,"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.10","hostname":"host-192-168-120-10","fqdn":"host-192-168-120-10.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:43Z","updated_at":"2020-12-14T02:16:43Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:43.980 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:44.032 197 INFO tempest.lib.common.rest_client [req-27557cd1-4d95-4b45-ac35-5ac21c5b257c ] Request (MiscPolicyActionsRbacTest:test_get_server_password): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.077s 2020-12-14 02:16:44.037 197 DEBUG tempest.lib.common.rest_client [req-27557cd1-4d95-4b45-ac35-5ac21c5b257c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27557cd1-4d95-4b45-ac35-5ac21c5b257c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:44.048 193 INFO tempest.lib.common.rest_client [req-1f468f86-2fde-4caa-820b-c906176a6c29 ] Request (PortsRbacTest:test_delete_port): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.063s 2020-12-14 02:16:44.051 193 DEBUG tempest.lib.common.rest_client [req-1f468f86-2fde-4caa-820b-c906176a6c29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f468f86-2fde-4caa-820b-c906176a6c29', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:44.111 193 INFO tempest.lib.common.rest_client [req-c9d02b0e-4e63-44a2-a139-b362fdc2b0c4 ] Request (PortsRbacTest:test_delete_port): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:16:44.115 193 DEBUG tempest.lib.common.rest_client [req-c9d02b0e-4e63-44a2-a139-b362fdc2b0c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9d02b0e-4e63-44a2-a139-b362fdc2b0c4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["SlhGxv3fReKgFWcozcjesA"], "expires_at": "2020-12-14T03:16:44.000000Z", "issued_at": "2020-12-14T02:16:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:44.139 197 INFO tempest.lib.common.rest_client [req-f8386986-a386-4171-a14e-67c42b98dcc3 ] Request (MiscPolicyActionsRbacTest:test_get_server_password): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:16:44.142 197 DEBUG tempest.lib.common.rest_client [req-f8386986-a386-4171-a14e-67c42b98dcc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8386986-a386-4171-a14e-67c42b98dcc3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["P2Kz-CobSc-YUZ5yHj8A0Q"], "expires_at": "2020-12-14T03:16:44.000000Z", "issued_at": "2020-12-14T02:16:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:44.326 197 INFO tempest.lib.common.rest_client [req-9d023b10-04b2-4eb5-ac64-1b2047b8d9d5 ] Request (MiscPolicyActionsRbacTest:test_get_server_password): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6/os-server-password 0.175s 2020-12-14 02:16:44.331 197 DEBUG tempest.lib.common.rest_client [req-9d023b10-04b2-4eb5-ac64-1b2047b8d9d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '16', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9d023b10-04b2-4eb5-ac64-1b2047b8d9d5', 'x-compute-request-id': 'req-9d023b10-04b2-4eb5-ac64-1b2047b8d9d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6/os-server-password'} Body: b'{"password": ""}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:44.349 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:44.356 186 INFO tempest.lib.common.rest_client [req-cdd273e3-ac8c-40ee-88ab-227c4a1bcfed ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c 0.183s 2020-12-14 02:16:44.359 186 DEBUG tempest.lib.common.rest_client [req-cdd273e3-ac8c-40ee-88ab-227c4a1bcfed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1491', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cdd273e3-ac8c-40ee-88ab-227c4a1bcfed', 'x-compute-request-id': 'req-cdd273e3-ac8c-40ee-88ab-227c4a1bcfed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c'} Body: b'{"server": {"id": "913e8d28-6913-44af-85b7-801bbbe2420c", "name": "tempest-ServerMetadataRbacTest-server-1866062397", "status": "BUILD", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "user_id": "fdd4aec086bf411486f075e6837bc36c", "metadata": {}, "hostId": "a86b3682a2bad9876385865ce13b3a0a046ab9c3a9a6655ec666a8ec", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:42Z", "updated": "2020-12-14T02:16:44Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:44.419 197 INFO tempest.lib.common.rest_client [req-51f4ece3-8ceb-4abc-a671-09800a13507e ] Request (MiscPolicyActionsRbacTest:test_get_server_password): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.062s 2020-12-14 02:16:44.422 197 DEBUG tempest.lib.common.rest_client [req-51f4ece3-8ceb-4abc-a671-09800a13507e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51f4ece3-8ceb-4abc-a671-09800a13507e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:44.459 186 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/spawning" after 1 second wait 2020-12-14 02:16:44.483 197 INFO tempest.lib.common.rest_client [req-937b2f54-c004-4629-83c1-8a2bf038f304 ] Request (MiscPolicyActionsRbacTest:test_get_server_password): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:16:44.487 197 DEBUG tempest.lib.common.rest_client [req-937b2f54-c004-4629-83c1-8a2bf038f304 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-937b2f54-c004-4629-83c1-8a2bf038f304', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["1iylaysaTdOfikwXzOueBA"], "expires_at": "2020-12-14T03:16:44.000000Z", "issued_at": "2020-12-14T02:16:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:44.878 197 INFO tempest.lib.common.rest_client [req-770b8296-b812-41ec-847d-f177a10abadb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.328s 2020-12-14 02:16:44.881 197 DEBUG tempest.lib.common.rest_client [req-770b8296-b812-41ec-847d-f177a10abadb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-770b8296-b812-41ec-847d-f177a10abadb', 'x-compute-request-id': 'req-770b8296-b812-41ec-847d-f177a10abadb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:43Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:42.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:44.933 193 INFO tempest.lib.common.rest_client [req-46491ce5-721b-4703-a820-c33b1fbb1460 ] Request (PortsRbacTest:test_delete_port): 204 DELETE http://172.30.13.94:9696/v2.0/ports/72d22f36-30f2-4a1d-8a7c-b7ebe2dc6805 0.810s 2020-12-14 02:16:44.936 193 DEBUG tempest.lib.common.rest_client [req-46491ce5-721b-4703-a820-c33b1fbb1460 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-46491ce5-721b-4703-a820-c33b1fbb1460', 'date': 'Mon, 14 Dec 2020 02:16:44 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/72d22f36-30f2-4a1d-8a7c-b7ebe2dc6805'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:44.939 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:44.985 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:44.990 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:44.993 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:44.996 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:44.999 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.003 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.004 193 INFO tempest.lib.common.rest_client [req-916d4aa5-1fd7-47d8-97ec-f93521597a7a ] Request (PortsRbacTest:test_delete_port): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.059s 2020-12-14 02:16:45.006 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.007 193 DEBUG tempest.lib.common.rest_client [req-916d4aa5-1fd7-47d8-97ec-f93521597a7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-916d4aa5-1fd7-47d8-97ec-f93521597a7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.011 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.014 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.016 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.019 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.022 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.025 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.028 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.030 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.033 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.037 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.039 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.042 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.045 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.048 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.050 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.053 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.056 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.058 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.058 193 INFO tempest.lib.common.rest_client [req-1e657f25-5ad1-49b8-b8de-b8bf7d6039f1 ] Request (PortsRbacTest:test_delete_port): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:16:45.061 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.061 193 DEBUG tempest.lib.common.rest_client [req-1e657f25-5ad1-49b8-b8de-b8bf7d6039f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e657f25-5ad1-49b8-b8de-b8bf7d6039f1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["FQ2hVgQrRsKG50HLGVNvEA"], "expires_at": "2020-12-14T03:16:45.000000Z", "issued_at": "2020-12-14T02:16:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.064 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.067 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.069 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.072 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.074 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:45.075 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.077 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.077 189 INFO tempest.lib.common.rest_client [req-2f0b61d6-e8c6-4320-9aac-fbe040750041 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.231s 2020-12-14 02:16:45.080 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.081 189 DEBUG tempest.lib.common.rest_client [req-2f0b61d6-e8c6-4320-9aac-fbe040750041 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2f0b61d6-e8c6-4320-9aac-fbe040750041', 'x-compute-request-id': 'req-2f0b61d6-e8c6-4320-9aac-fbe040750041', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.082 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.085 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.088 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.091 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.093 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.096 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.099 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.100 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:45.102 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.102 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:45.105 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.108 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.110 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.114 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.116 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.119 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.122 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.126 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.129 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.132 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.136 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.139 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.142 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.146 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.150 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.152 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.158 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.161 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.164 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.167 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.170 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.170 193 INFO tempest.lib.common.rest_client [req-f1b241be-02c7-4786-ad45-273a63788cd7 ] Request (PortsRbacTest:test_list_ports): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.062s 2020-12-14 02:16:45.172 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.174 193 DEBUG tempest.lib.common.rest_client [req-f1b241be-02c7-4786-ad45-273a63788cd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1b241be-02c7-4786-ad45-273a63788cd7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.175 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.178 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.180 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.183 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.185 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.188 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.191 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.193 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.196 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.203 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-admin-actions:inject_network_info, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:45.205 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:45.219 193 INFO tempest.lib.common.rest_client [req-736f3f3f-4c9a-4043-999d-ea0c64fecc8b ] Request (PortsRbacTest:test_list_ports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:16:45.223 193 DEBUG tempest.lib.common.rest_client [req-736f3f3f-4c9a-4043-999d-ea0c64fecc8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-736f3f3f-4c9a-4043-999d-ea0c64fecc8b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["WoqqImbxS3qWApzX0D9pSw"], "expires_at": "2020-12-14T03:16:45.000000Z", "issued_at": "2020-12-14T02:16:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.263 197 INFO tempest.lib.common.rest_client [req-d3802f42-ad40-4ff7-95af-3425cbe858a5 ] Request (MiscPolicyActionsRbacTest:test_inject_network_info): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.053s 2020-12-14 02:16:45.265 197 DEBUG tempest.lib.common.rest_client [req-d3802f42-ad40-4ff7-95af-3425cbe858a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3802f42-ad40-4ff7-95af-3425cbe858a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.313 197 INFO tempest.lib.common.rest_client [req-08de9407-4c56-4e62-b409-b9526e8e7942 ] Request (MiscPolicyActionsRbacTest:test_inject_network_info): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:16:45.315 197 DEBUG tempest.lib.common.rest_client [req-08de9407-4c56-4e62-b409-b9526e8e7942 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-08de9407-4c56-4e62-b409-b9526e8e7942', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["oeY-QmsCQYGbAgfaT-Zkzw"], "expires_at": "2020-12-14T03:16:45.000000Z", "issued_at": "2020-12-14T02:16:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.423 193 INFO tempest.lib.common.rest_client [req-53a9ae3d-a490-40f0-8d60-7b1dd8b6daad ] Request (PortsRbacTest:test_list_ports): 200 GET http://172.30.13.94:9696/v2.0/ports?id=af66f967-0722-4f89-8e19-d04d4339ee1d 0.192s 2020-12-14 02:16:45.428 193 DEBUG tempest.lib.common.rest_client [req-53a9ae3d-a490-40f0-8d60-7b1dd8b6daad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1093', 'x-openstack-request-id': 'req-53a9ae3d-a490-40f0-8d60-7b1dd8b6daad', 'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?id=af66f967-0722-4f89-8e19-d04d4339ee1d'} Body: b'{"ports":[{"id":"af66f967-0722-4f89-8e19-d04d4339ee1d","name":"tempest-PortsRbacTest-629263402","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:86:e0:d7","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.21"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.21","hostname":"host-192-168-120-21","fqdn":"host-192-168-120-21.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:20Z","updated_at":"2020-12-14T02:16:20Z","revision_number":1,"project_id":"5d2b22c24509439eb518838e24b766b7"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.431 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:45.460 197 INFO tempest.lib.common.rest_client [req-7cc597b5-1cd1-4924-98d4-5aa2853e9f71 ] Request (MiscPolicyActionsRbacTest:test_inject_network_info): 202 POST http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6/action 0.138s 2020-12-14 02:16:45.463 197 DEBUG tempest.lib.common.rest_client [req-7cc597b5-1cd1-4924-98d4-5aa2853e9f71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"injectNetworkInfo": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7cc597b5-1cd1-4924-98d4-5aa2853e9f71', 'x-compute-request-id': 'req-7cc597b5-1cd1-4924-98d4-5aa2853e9f71', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.466 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:45.498 193 INFO tempest.lib.common.rest_client [req-197c45fc-064c-4f1b-8c0e-15268c9e54e3 ] Request (PortsRbacTest:test_list_ports): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.061s 2020-12-14 02:16:45.502 193 DEBUG tempest.lib.common.rest_client [req-197c45fc-064c-4f1b-8c0e-15268c9e54e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-197c45fc-064c-4f1b-8c0e-15268c9e54e3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.530 197 INFO tempest.lib.common.rest_client [req-c64949e8-a5ae-4979-abd0-d09539c73fa9 ] Request (MiscPolicyActionsRbacTest:test_inject_network_info): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.058s 2020-12-14 02:16:45.533 197 DEBUG tempest.lib.common.rest_client [req-c64949e8-a5ae-4979-abd0-d09539c73fa9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c64949e8-a5ae-4979-abd0-d09539c73fa9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.550 193 INFO tempest.lib.common.rest_client [req-053d400d-6446-48c6-b9ca-a1ca906594e1 ] Request (PortsRbacTest:test_list_ports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:16:45.553 193 DEBUG tempest.lib.common.rest_client [req-053d400d-6446-48c6-b9ca-a1ca906594e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-053d400d-6446-48c6-b9ca-a1ca906594e1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["yzW7i3DIQMKOyJdnKYZODA"], "expires_at": "2020-12-14T03:16:45.000000Z", "issued_at": "2020-12-14T02:16:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.566 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:45.581 197 INFO tempest.lib.common.rest_client [req-9eaab5eb-9ce9-4856-a4b7-5dcf7896c174 ] Request (MiscPolicyActionsRbacTest:test_inject_network_info): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:16:45.584 197 DEBUG tempest.lib.common.rest_client [req-9eaab5eb-9ce9-4856-a4b7-5dcf7896c174 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9eaab5eb-9ce9-4856-a4b7-5dcf7896c174', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["XtIKv8FzRF6aOjzB7EZh7Q"], "expires_at": "2020-12-14T03:16:45.000000Z", "issued_at": "2020-12-14T02:16:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.593 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:45.595 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:45.659 193 INFO tempest.lib.common.rest_client [req-71ee74a8-a692-4f7d-9a82-d897eabbb3fd ] Request (PortsRbacTest:test_show_port): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.059s 2020-12-14 02:16:45.663 193 DEBUG tempest.lib.common.rest_client [req-71ee74a8-a692-4f7d-9a82-d897eabbb3fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-71ee74a8-a692-4f7d-9a82-d897eabbb3fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.697 186 INFO tempest.lib.common.rest_client [req-dd21a23a-6c74-4b10-a3d4-4dafff98b7cd ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c 0.228s 2020-12-14 02:16:45.699 186 DEBUG tempest.lib.common.rest_client [req-dd21a23a-6c74-4b10-a3d4-4dafff98b7cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1533', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dd21a23a-6c74-4b10-a3d4-4dafff98b7cd', 'x-compute-request-id': 'req-dd21a23a-6c74-4b10-a3d4-4dafff98b7cd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c'} Body: b'{"server": {"id": "913e8d28-6913-44af-85b7-801bbbe2420c", "name": "tempest-ServerMetadataRbacTest-server-1866062397", "status": "BUILD", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "user_id": "fdd4aec086bf411486f075e6837bc36c", "metadata": {}, "hostId": "a86b3682a2bad9876385865ce13b3a0a046ab9c3a9a6655ec666a8ec", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:42Z", "updated": "2020-12-14T02:16:44Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.714 193 INFO tempest.lib.common.rest_client [req-44a5674f-edf3-4e35-8390-9468c6a883f0 ] Request (PortsRbacTest:test_show_port): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:16:45.717 193 DEBUG tempest.lib.common.rest_client [req-44a5674f-edf3-4e35-8390-9468c6a883f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-44a5674f-edf3-4e35-8390-9468c6a883f0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["WJL8jUkkTS-UwfoG3U5g1A"], "expires_at": "2020-12-14T03:16:45.000000Z", "issued_at": "2020-12-14T02:16:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.862 197 INFO tempest.lib.common.rest_client [req-b670808e-bc22-40be-aef9-5e771324ddf7 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.254s 2020-12-14 02:16:45.864 197 DEBUG tempest.lib.common.rest_client [req-b670808e-bc22-40be-aef9-5e771324ddf7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b670808e-bc22-40be-aef9-5e771324ddf7', 'x-compute-request-id': 'req-b670808e-bc22-40be-aef9-5e771324ddf7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:43Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:42.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.869 193 INFO tempest.lib.common.rest_client [req-a78e8bae-1af6-46ee-877d-295335366b7b ] Request (PortsRbacTest:test_show_port): 200 GET http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d 0.144s 2020-12-14 02:16:45.873 193 DEBUG tempest.lib.common.rest_client [req-a78e8bae-1af6-46ee-877d-295335366b7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1090', 'x-openstack-request-id': 'req-a78e8bae-1af6-46ee-877d-295335366b7b', 'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d'} Body: b'{"port":{"id":"af66f967-0722-4f89-8e19-d04d4339ee1d","name":"tempest-PortsRbacTest-629263402","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:86:e0:d7","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.21"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.21","hostname":"host-192-168-120-21","fqdn":"host-192-168-120-21.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:20Z","updated_at":"2020-12-14T02:16:20Z","revision_number":1,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.876 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:45.958 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:45.962 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.965 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.968 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.968 193 INFO tempest.lib.common.rest_client [req-7ab3bb6f-09a5-427a-8053-6471cbb55763 ] Request (PortsRbacTest:test_show_port): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.086s 2020-12-14 02:16:45.971 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.971 193 DEBUG tempest.lib.common.rest_client [req-7ab3bb6f-09a5-427a-8053-6471cbb55763 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ab3bb6f-09a5-427a-8053-6471cbb55763', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:45.974 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.977 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.982 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.984 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.987 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.989 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.991 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.994 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.996 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:45.999 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.002 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.004 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.007 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.009 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.012 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.014 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.016 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.019 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.021 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.024 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.023 193 INFO tempest.lib.common.rest_client [req-3bce1e41-67a8-4526-a908-bc330ddc1e04 ] Request (PortsRbacTest:test_show_port): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:16:46.026 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.027 193 DEBUG tempest.lib.common.rest_client [req-3bce1e41-67a8-4526-a908-bc330ddc1e04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3bce1e41-67a8-4526-a908-bc330ddc1e04', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["zVLNe8o-R8yQ6cFlXJTRBw"], "expires_at": "2020-12-14T03:16:46.000000Z", "issued_at": "2020-12-14T02:16:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:46.028 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.031 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.033 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.036 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.038 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.041 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.041 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:46.043 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.045 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.048 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.050 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.052 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.055 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.057 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.060 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.063 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.065 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.068 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.068 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:46.070 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.071 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:46.073 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.076 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.078 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.081 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.083 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.086 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.088 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.091 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.093 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.094 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port:binding:host_id, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:46.096 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.098 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.101 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.103 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.108 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.110 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.112 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.115 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.117 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.119 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.122 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.125 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.129 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.133 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.137 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.140 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.144 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.147 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.151 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:46.166 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-instance-actions:list, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:46.169 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:46.260 197 INFO tempest.lib.common.rest_client [req-cba35a4b-61ad-45a7-8c9b-b32d34fd7429 ] Request (MiscPolicyActionsRbacTest:test_list_instance_actions): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.086s 2020-12-14 02:16:46.263 197 DEBUG tempest.lib.common.rest_client [req-cba35a4b-61ad-45a7-8c9b-b32d34fd7429 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cba35a4b-61ad-45a7-8c9b-b32d34fd7429', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:46.319 197 INFO tempest.lib.common.rest_client [req-dacf7aaa-b691-4cdb-81d4-4810596a18b2 ] Request (MiscPolicyActionsRbacTest:test_list_instance_actions): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:16:46.323 197 DEBUG tempest.lib.common.rest_client [req-dacf7aaa-b691-4cdb-81d4-4810596a18b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dacf7aaa-b691-4cdb-81d4-4810596a18b2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["PAbXo0VzROeDunC9QSfinw"], "expires_at": "2020-12-14T03:16:46.000000Z", "issued_at": "2020-12-14T02:16:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:46.398 189 INFO tempest.lib.common.rest_client [req-41befeda-7eed-433b-ac9b-1cdc44cec5f7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.228s 2020-12-14 02:16:46.401 189 DEBUG tempest.lib.common.rest_client [req-41befeda-7eed-433b-ac9b-1cdc44cec5f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-41befeda-7eed-433b-ac9b-1cdc44cec5f7', 'x-compute-request-id': 'req-41befeda-7eed-433b-ac9b-1cdc44cec5f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:46.481 197 INFO tempest.lib.common.rest_client [req-d168b90b-c0b5-4ada-a9cb-dce019208d4a ] Request (MiscPolicyActionsRbacTest:test_list_instance_actions): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6/os-instance-actions 0.151s 2020-12-14 02:16:46.484 197 DEBUG tempest.lib.common.rest_client [req-d168b90b-c0b5-4ada-a9cb-dce019208d4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '316', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d168b90b-c0b5-4ada-a9cb-dce019208d4a', 'x-compute-request-id': 'req-d168b90b-c0b5-4ada-a9cb-dce019208d4a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6/os-instance-actions'} Body: b'{"instanceActions": [{"action": "create", "instance_uuid": "6f32b799-3a71-4df3-a397-802b4088c9c6", "request_id": "req-99cbbe2d-d795-4868-ae02-fcf11f127d77", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "project_id": "a836f1fb2f90434abc04b768f968fb5b", "start_time": "2020-12-14T02:16:33.000000", "message": null}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:46.509 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:46.577 197 INFO tempest.lib.common.rest_client [req-d139df3f-c028-4170-b5a9-f4cc9bf58b41 ] Request (MiscPolicyActionsRbacTest:test_list_instance_actions): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.062s 2020-12-14 02:16:46.580 197 DEBUG tempest.lib.common.rest_client [req-d139df3f-c028-4170-b5a9-f4cc9bf58b41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d139df3f-c028-4170-b5a9-f4cc9bf58b41', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:46.625 197 INFO tempest.lib.common.rest_client [req-7de52289-3aa1-4b82-9ce3-b74cc292d0cb ] Request (MiscPolicyActionsRbacTest:test_list_instance_actions): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:16:46.628 197 DEBUG tempest.lib.common.rest_client [req-7de52289-3aa1-4b82-9ce3-b74cc292d0cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7de52289-3aa1-4b82-9ce3-b74cc292d0cb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["trMP8SywSZGTLtlXZJgbjA"], "expires_at": "2020-12-14T03:16:46.000000Z", "issued_at": "2020-12-14T02:16:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:47.003 197 INFO tempest.lib.common.rest_client [req-373d72bf-56a0-4d72-ad30-f5a2b99fe320 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.321s 2020-12-14 02:16:47.005 197 DEBUG tempest.lib.common.rest_client [req-373d72bf-56a0-4d72-ad30-f5a2b99fe320 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-373d72bf-56a0-4d72-ad30-f5a2b99fe320', 'x-compute-request-id': 'req-373d72bf-56a0-4d72-ad30-f5a2b99fe320', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:43Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:42.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:47.044 186 INFO tempest.lib.common.rest_client [req-9e42b929-fee9-4c1a-8667-90d893b9ba19 ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c 0.241s 2020-12-14 02:16:47.048 186 DEBUG tempest.lib.common.rest_client [req-9e42b929-fee9-4c1a-8667-90d893b9ba19 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1533', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9e42b929-fee9-4c1a-8667-90d893b9ba19', 'x-compute-request-id': 'req-9e42b929-fee9-4c1a-8667-90d893b9ba19', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c'} Body: b'{"server": {"id": "913e8d28-6913-44af-85b7-801bbbe2420c", "name": "tempest-ServerMetadataRbacTest-server-1866062397", "status": "BUILD", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "user_id": "fdd4aec086bf411486f075e6837bc36c", "metadata": {}, "hostId": "a86b3682a2bad9876385865ce13b3a0a046ab9c3a9a6655ec666a8ec", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:42Z", "updated": "2020-12-14T02:16:44Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:47.111 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:47.115 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.118 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.122 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.126 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.130 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.134 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.139 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.142 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.145 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.148 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.151 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.153 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.157 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.159 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.163 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.166 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.169 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.172 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.174 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.177 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.180 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.183 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.185 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.188 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.191 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.193 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.196 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.199 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.201 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.204 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.206 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.209 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.211 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.213 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.215 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.218 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.220 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.222 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.224 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.227 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.229 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.231 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.233 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.236 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.238 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.241 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.243 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.245 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.247 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.249 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.251 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.253 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.256 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.258 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.261 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.263 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.268 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.270 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.272 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.274 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.277 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.279 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.281 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.283 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.285 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.287 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.290 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.292 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.294 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.296 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.298 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:47.306 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-simple-tenant-usage:list, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:47.307 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:47.380 197 INFO tempest.lib.common.rest_client [req-dc5d2be0-b8e0-488e-aa0f-5f97cf982e81 ] Request (MiscPolicyActionsRbacTest:test_list_simple_tenant_usages): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.067s 2020-12-14 02:16:47.385 197 DEBUG tempest.lib.common.rest_client [req-dc5d2be0-b8e0-488e-aa0f-5f97cf982e81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc5d2be0-b8e0-488e-aa0f-5f97cf982e81', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:47.439 197 INFO tempest.lib.common.rest_client [req-a21267d9-edee-43c5-9d48-a701ba78d277 ] Request (MiscPolicyActionsRbacTest:test_list_simple_tenant_usages): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:16:47.443 197 DEBUG tempest.lib.common.rest_client [req-a21267d9-edee-43c5-9d48-a701ba78d277 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a21267d9-edee-43c5-9d48-a701ba78d277', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["xv24hU1IRKuI_t47xI4HYg"], "expires_at": "2020-12-14T03:16:47.000000Z", "issued_at": "2020-12-14T02:16:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:47.495 193 INFO tempest.lib.common.rest_client [req-399e5166-164e-4d60-9fc1-277b0521faf8 ] Request (PortsRbacTest:test_show_port_binding_host_id): 201 POST http://172.30.13.94:9696/v2.0/ports 1.394s 2020-12-14 02:16:47.499 193 DEBUG tempest.lib.common.rest_client [req-399e5166-164e-4d60-9fc1-277b0521faf8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "binding:host_id": "tempest-host-id-1724978570", "name": "tempest-PortsRbacTest-630088657"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1127', 'x-openstack-request-id': 'req-399e5166-164e-4d60-9fc1-277b0521faf8', 'date': 'Mon, 14 Dec 2020 02:16:47 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"c35fd9b5-df94-499c-a600-92492c2588ab","name":"tempest-PortsRbacTest-630088657","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:df:ad:95","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.206"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"tempest-host-id-1724978570","binding:vif_type":"binding_failed","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.206","hostname":"host-192-168-120-206","fqdn":"host-192-168-120-206.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:46Z","updated_at":"2020-12-14T02:16:46Z","revision_number":1,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:47.503 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:47.578 193 INFO tempest.lib.common.rest_client [req-19f48415-66d5-410b-9ce9-cfa174c25dba ] Request (PortsRbacTest:test_show_port_binding_host_id): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.068s 2020-12-14 02:16:47.583 197 INFO tempest.lib.common.rest_client [req-e0322d4b-bca9-4803-93f9-8e7062d0a460 ] Request (MiscPolicyActionsRbacTest:test_list_simple_tenant_usages): 200 GET http://172.30.13.94/compute/v2.1/os-simple-tenant-usage 0.132s 2020-12-14 02:16:47.584 193 DEBUG tempest.lib.common.rest_client [req-19f48415-66d5-410b-9ce9-cfa174c25dba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19f48415-66d5-410b-9ce9-cfa174c25dba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:47.586 197 DEBUG tempest.lib.common.rest_client [req-e0322d4b-bca9-4803-93f9-8e7062d0a460 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '946', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e0322d4b-bca9-4803-93f9-8e7062d0a460', 'x-compute-request-id': 'req-e0322d4b-bca9-4803-93f9-8e7062d0a460', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-simple-tenant-usage'} Body: b'{"tenant_usages": [{"tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "total_local_gb_usage": 3.3333333333333334e-09, "total_vcpus_usage": 3.3333333333333334e-09, "total_memory_mb_usage": 3.4133333333333334e-06, "total_hours": 3.3333333333333334e-09, "start": "2020-12-14T02:16:47.540213", "stop": "2020-12-14T02:16:47.540225"}, {"tenant_id": "8902aa05bbca4b55ac6f711d1a59a3ef", "total_local_gb_usage": 3.3333333333333334e-09, "total_vcpus_usage": 3.3333333333333334e-09, "total_memory_mb_usage": 1.7066666666666667e-06, "total_hours": 3.3333333333333334e-09, "start": "2020-12-14T02:16:47.540213", "stop": "2020-12-14T02:16:47.540225"}, {"tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "total_local_gb_usage": 3.3333333333333334e-09, "total_vcpus_usage": 3.3333333333333334e-09, "total_memory_mb_usage": 1.7066666666666667e-06, "total_hours": 3.3333333333333334e-09, "start": "2020-12-14T02:16:47.540213", "stop": "2020-12-14T02:16:47.540225"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:47.632 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:47.641 193 INFO tempest.lib.common.rest_client [req-f3fe3829-6dd6-46b2-97af-bd2c8a67dbe9 ] Request (PortsRbacTest:test_show_port_binding_host_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:16:47.643 193 DEBUG tempest.lib.common.rest_client [req-f3fe3829-6dd6-46b2-97af-bd2c8a67dbe9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3fe3829-6dd6-46b2-97af-bd2c8a67dbe9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["dkcg6hpISMC2eY-Lqg41eQ"], "expires_at": "2020-12-14T03:16:47.000000Z", "issued_at": "2020-12-14T02:16:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:47.705 197 INFO tempest.lib.common.rest_client [req-dc849c38-1ae2-47d3-9f94-1102e0222aaa ] Request (MiscPolicyActionsRbacTest:test_list_simple_tenant_usages): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.067s 2020-12-14 02:16:47.707 197 DEBUG tempest.lib.common.rest_client [req-dc849c38-1ae2-47d3-9f94-1102e0222aaa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc849c38-1ae2-47d3-9f94-1102e0222aaa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:47.748 189 INFO tempest.lib.common.rest_client [req-d6cd4f58-2356-48c4-9fae-2ee0d46f0c87 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.239s 2020-12-14 02:16:47.751 189 DEBUG tempest.lib.common.rest_client [req-d6cd4f58-2356-48c4-9fae-2ee0d46f0c87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d6cd4f58-2356-48c4-9fae-2ee0d46f0c87', 'x-compute-request-id': 'req-d6cd4f58-2356-48c4-9fae-2ee0d46f0c87', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:47.761 197 INFO tempest.lib.common.rest_client [req-1abd89c0-ab0a-4926-bf7d-4a70947977a9 ] Request (MiscPolicyActionsRbacTest:test_list_simple_tenant_usages): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:16:47.765 197 DEBUG tempest.lib.common.rest_client [req-1abd89c0-ab0a-4926-bf7d-4a70947977a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1abd89c0-ab0a-4926-bf7d-4a70947977a9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["QvlqJR41SByuJDVSzc8HdQ"], "expires_at": "2020-12-14T03:16:47.000000Z", "issued_at": "2020-12-14T02:16:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:47.778 193 INFO tempest.lib.common.rest_client [req-2909dcae-afed-4ee6-9a55-1aff3ee014fb ] Request (PortsRbacTest:test_show_port_binding_host_id): 200 GET http://172.30.13.94:9696/v2.0/ports/c35fd9b5-df94-499c-a600-92492c2588ab?fields=binding%3Ahost_id 0.127s 2020-12-14 02:16:47.780 193 DEBUG tempest.lib.common.rest_client [req-2909dcae-afed-4ee6-9a55-1aff3ee014fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '57', 'x-openstack-request-id': 'req-2909dcae-afed-4ee6-9a55-1aff3ee014fb', 'date': 'Mon, 14 Dec 2020 02:16:47 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/c35fd9b5-df94-499c-a600-92492c2588ab?fields=binding%3Ahost_id'} Body: b'{"port":{"binding:host_id":"tempest-host-id-1724978570"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:47.783 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:47.854 193 INFO tempest.lib.common.rest_client [req-708b3290-b347-4913-b456-33a6e2210776 ] Request (PortsRbacTest:test_show_port_binding_host_id): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.065s 2020-12-14 02:16:47.856 193 DEBUG tempest.lib.common.rest_client [req-708b3290-b347-4913-b456-33a6e2210776 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-708b3290-b347-4913-b456-33a6e2210776', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:47.908 193 INFO tempest.lib.common.rest_client [req-77533d47-8e7e-47a9-a477-6f9d12404d77 ] Request (PortsRbacTest:test_show_port_binding_host_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:16:47.913 193 DEBUG tempest.lib.common.rest_client [req-77533d47-8e7e-47a9-a477-6f9d12404d77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-77533d47-8e7e-47a9-a477-6f9d12404d77', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["lgNsJebESkum_n8RogxgzQ"], "expires_at": "2020-12-14T03:16:47.000000Z", "issued_at": "2020-12-14T02:16:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:47.934 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:47.984 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:47.988 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:48.011 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port:binding:profile, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:48.144 197 INFO tempest.lib.common.rest_client [req-99db4e06-c9c9-4bb1-a043-6d1073baa83d ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.348s 2020-12-14 02:16:48.147 197 DEBUG tempest.lib.common.rest_client [req-99db4e06-c9c9-4bb1-a043-6d1073baa83d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-99db4e06-c9c9-4bb1-a043-6d1073baa83d', 'x-compute-request-id': 'req-99db4e06-c9c9-4bb1-a043-6d1073baa83d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:43Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:42.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:48.249 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:48.254 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.257 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.260 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.263 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.266 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.270 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.275 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.277 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.280 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.282 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.285 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.288 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.291 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.293 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.296 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.299 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.302 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.305 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.307 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.310 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.312 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.315 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.318 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.320 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.323 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.325 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.328 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.331 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.333 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.336 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.339 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.341 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.344 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.347 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.350 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.352 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.355 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.358 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.361 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.364 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.367 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.369 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.372 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.375 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.378 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.380 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.385 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.389 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.393 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.394 186 INFO tempest.lib.common.rest_client [req-ece9655b-4f2f-4342-9788-c4d8825ee26b ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c 0.237s 2020-12-14 02:16:48.397 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.397 186 DEBUG tempest.lib.common.rest_client [req-ece9655b-4f2f-4342-9788-c4d8825ee26b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1533', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ece9655b-4f2f-4342-9788-c4d8825ee26b', 'x-compute-request-id': 'req-ece9655b-4f2f-4342-9788-c4d8825ee26b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c'} Body: b'{"server": {"id": "913e8d28-6913-44af-85b7-801bbbe2420c", "name": "tempest-ServerMetadataRbacTest-server-1866062397", "status": "BUILD", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "user_id": "fdd4aec086bf411486f075e6837bc36c", "metadata": {}, "hostId": "a86b3682a2bad9876385865ce13b3a0a046ab9c3a9a6655ec666a8ec", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:42Z", "updated": "2020-12-14T02:16:44Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:48.401 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.405 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.409 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.412 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.417 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.420 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.428 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.431 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.434 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.438 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.441 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.445 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.448 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.451 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.454 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.457 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.460 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.463 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.466 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.470 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.472 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:48.483 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-lock-server:lock, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:48.484 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:48.556 197 INFO tempest.lib.common.rest_client [req-0dacf7dc-3502-4e4e-a5e4-46c047119606 ] Request (MiscPolicyActionsRbacTest:test_lock_server): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.066s 2020-12-14 02:16:48.559 197 DEBUG tempest.lib.common.rest_client [req-0dacf7dc-3502-4e4e-a5e4-46c047119606 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0dacf7dc-3502-4e4e-a5e4-46c047119606', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:48.612 197 INFO tempest.lib.common.rest_client [req-ed67f43a-4dbf-4b6c-8dd5-839ca4d9e556 ] Request (MiscPolicyActionsRbacTest:test_lock_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:16:48.615 197 DEBUG tempest.lib.common.rest_client [req-ed67f43a-4dbf-4b6c-8dd5-839ca4d9e556 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed67f43a-4dbf-4b6c-8dd5-839ca4d9e556', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["xZsSxvjLSeOVwxVnMBmTbQ"], "expires_at": "2020-12-14T03:16:48.000000Z", "issued_at": "2020-12-14T02:16:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:48.868 197 INFO tempest.lib.common.rest_client [req-d0b7417c-30b3-4d8d-87c2-cff02987b91e ] Request (MiscPolicyActionsRbacTest:test_lock_server): 202 POST http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6/action 0.245s 2020-12-14 02:16:48.871 197 DEBUG tempest.lib.common.rest_client [req-d0b7417c-30b3-4d8d-87c2-cff02987b91e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"lock": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d0b7417c-30b3-4d8d-87c2-cff02987b91e', 'x-compute-request-id': 'req-d0b7417c-30b3-4d8d-87c2-cff02987b91e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:48.874 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:48.957 197 INFO tempest.lib.common.rest_client [req-8159f646-edb2-49fc-8de6-72bdd90f7c42 ] Request (MiscPolicyActionsRbacTest:test_lock_server): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.077s 2020-12-14 02:16:48.961 197 DEBUG tempest.lib.common.rest_client [req-8159f646-edb2-49fc-8de6-72bdd90f7c42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8159f646-edb2-49fc-8de6-72bdd90f7c42', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:49.020 197 INFO tempest.lib.common.rest_client [req-bcb6916f-9287-4b2b-ab07-41020bbd31ba ] Request (MiscPolicyActionsRbacTest:test_lock_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:16:49.024 197 DEBUG tempest.lib.common.rest_client [req-bcb6916f-9287-4b2b-ab07-41020bbd31ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bcb6916f-9287-4b2b-ab07-41020bbd31ba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["Rge6Ov2vSSKcBT3iMcTJHQ"], "expires_at": "2020-12-14T03:16:49.000000Z", "issued_at": "2020-12-14T02:16:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:49.160 189 INFO tempest.lib.common.rest_client [req-8bfdb780-c569-443c-ac3d-049eee8d4018 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.300s 2020-12-14 02:16:49.163 189 DEBUG tempest.lib.common.rest_client [req-8bfdb780-c569-443c-ac3d-049eee8d4018 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8bfdb780-c569-443c-ac3d-049eee8d4018', 'x-compute-request-id': 'req-8bfdb780-c569-443c-ac3d-049eee8d4018', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:49.182 193 INFO tempest.lib.common.rest_client [req-5476a936-a403-4c6e-8d0d-39e12c43d9c3 ] Request (PortsRbacTest:test_show_port_binding_profile): 201 POST http://172.30.13.94:9696/v2.0/ports 1.165s 2020-12-14 02:16:49.185 193 DEBUG tempest.lib.common.rest_client [req-5476a936-a403-4c6e-8d0d-39e12c43d9c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "binding:profile": {"foo": "1"}, "name": "tempest-PortsRbacTest-1423094589"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1100', 'x-openstack-request-id': 'req-5476a936-a403-4c6e-8d0d-39e12c43d9c3', 'date': 'Mon, 14 Dec 2020 02:16:49 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"6c479c2d-2a9b-4676-b8ba-f08a174b4c6c","name":"tempest-PortsRbacTest-1423094589","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:71:7a:a2","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.38"}],"project_id":"5d2b22c24509439eb518838e24b766b7","port_security_enabled":true,"qos_policy_id":null,"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"binding:vnic_type":"normal","binding:profile":{"foo":"1"},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.38","hostname":"host-192-168-120-38","fqdn":"host-192-168-120-38.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:48Z","updated_at":"2020-12-14T02:16:48Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:49.188 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:49.258 193 INFO tempest.lib.common.rest_client [req-f8f08552-475b-422d-9c19-d6b122e0f68f ] Request (PortsRbacTest:test_show_port_binding_profile): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.064s 2020-12-14 02:16:49.260 193 DEBUG tempest.lib.common.rest_client [req-f8f08552-475b-422d-9c19-d6b122e0f68f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8f08552-475b-422d-9c19-d6b122e0f68f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:49.305 197 INFO tempest.lib.common.rest_client [req-333a1291-7dac-4637-9b7e-6785d6d7733c ] Request (MiscPolicyActionsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6/action 0.271s 2020-12-14 02:16:49.308 197 DEBUG tempest.lib.common.rest_client [req-333a1291-7dac-4637-9b7e-6785d6d7733c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unlock": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-333a1291-7dac-4637-9b7e-6785d6d7733c', 'x-compute-request-id': 'req-333a1291-7dac-4637-9b7e-6785d6d7733c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:49.312 193 INFO tempest.lib.common.rest_client [req-c0cb569b-9029-4a3b-8490-cc1f14f70e74 ] Request (PortsRbacTest:test_show_port_binding_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:16:49.316 193 DEBUG tempest.lib.common.rest_client [req-c0cb569b-9029-4a3b-8490-cc1f14f70e74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c0cb569b-9029-4a3b-8490-cc1f14f70e74', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["by5t7z2vRv6GRs25GMarIA"], "expires_at": "2020-12-14T03:16:49.000000Z", "issued_at": "2020-12-14T02:16:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:49.486 193 INFO tempest.lib.common.rest_client [req-c1ac7bc0-f98d-4771-a161-9cf07fca2b51 ] Request (PortsRbacTest:test_show_port_binding_profile): 200 GET http://172.30.13.94:9696/v2.0/ports/6c479c2d-2a9b-4676-b8ba-f08a174b4c6c?fields=binding%3Aprofile 0.161s 2020-12-14 02:16:49.491 193 DEBUG tempest.lib.common.rest_client [req-c1ac7bc0-f98d-4771-a161-9cf07fca2b51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '40', 'x-openstack-request-id': 'req-c1ac7bc0-f98d-4771-a161-9cf07fca2b51', 'date': 'Mon, 14 Dec 2020 02:16:49 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/6c479c2d-2a9b-4676-b8ba-f08a174b4c6c?fields=binding%3Aprofile'} Body: b'{"port":{"binding:profile":{"foo":"1"}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:49.495 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:49.560 197 INFO tempest.lib.common.rest_client [req-d8895d44-9a1d-4203-add5-2067dc755b17 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.222s 2020-12-14 02:16:49.563 197 DEBUG tempest.lib.common.rest_client [req-d8895d44-9a1d-4203-add5-2067dc755b17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d8895d44-9a1d-4203-add5-2067dc755b17', 'x-compute-request-id': 'req-d8895d44-9a1d-4203-add5-2067dc755b17', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:49Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:42.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:49.575 193 INFO tempest.lib.common.rest_client [req-ebd1fc56-ec91-43dd-aff8-e0a108518f8b ] Request (PortsRbacTest:test_show_port_binding_profile): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.074s 2020-12-14 02:16:49.578 193 DEBUG tempest.lib.common.rest_client [req-ebd1fc56-ec91-43dd-aff8-e0a108518f8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ebd1fc56-ec91-43dd-aff8-e0a108518f8b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:49.628 193 INFO tempest.lib.common.rest_client [req-2fd9408d-2341-477d-8202-109314b42b67 ] Request (PortsRbacTest:test_show_port_binding_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:16:49.631 193 DEBUG tempest.lib.common.rest_client [req-2fd9408d-2341-477d-8202-109314b42b67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2fd9408d-2341-477d-8202-109314b42b67', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["S3lE3BZKSgKdgcj-YYsa7w"], "expires_at": "2020-12-14T03:16:49.000000Z", "issued_at": "2020-12-14T02:16:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:49.645 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:49.667 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:49.671 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.674 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:49.674 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.676 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:49.677 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.681 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.685 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.688 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.693 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.696 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.698 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port:binding:vif_details, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:49.698 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.700 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:49.701 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.704 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.707 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.709 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.712 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.715 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.719 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.721 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.724 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.726 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.729 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.732 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.735 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.737 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.740 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.742 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.745 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.747 186 INFO tempest.lib.common.rest_client [req-5c5a8184-a0a8-47e0-b69f-b95b95e7e988 ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c 0.229s 2020-12-14 02:16:49.748 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.750 186 DEBUG tempest.lib.common.rest_client [req-5c5a8184-a0a8-47e0-b69f-b95b95e7e988 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1533', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5c5a8184-a0a8-47e0-b69f-b95b95e7e988', 'x-compute-request-id': 'req-5c5a8184-a0a8-47e0-b69f-b95b95e7e988', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c'} Body: b'{"server": {"id": "913e8d28-6913-44af-85b7-801bbbe2420c", "name": "tempest-ServerMetadataRbacTest-server-1866062397", "status": "BUILD", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "user_id": "fdd4aec086bf411486f075e6837bc36c", "metadata": {}, "hostId": "a86b3682a2bad9876385865ce13b3a0a046ab9c3a9a6655ec666a8ec", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:42Z", "updated": "2020-12-14T02:16:44Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:49.751 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.753 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.756 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.759 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.761 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.764 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.767 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.769 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.772 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.775 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.775 193 INFO tempest.lib.common.rest_client [req-a0877c46-a3bf-4063-be77-7e28ce08ef63 ] Request (PortsRbacTest:test_show_port_binding_vif_details): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.068s 2020-12-14 02:16:49.778 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.778 193 DEBUG tempest.lib.common.rest_client [req-a0877c46-a3bf-4063-be77-7e28ce08ef63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0877c46-a3bf-4063-be77-7e28ce08ef63', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:49.781 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.784 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.787 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.790 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.793 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.796 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.799 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.802 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.804 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.807 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.810 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.813 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.815 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.818 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.821 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.823 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.827 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.829 193 INFO tempest.lib.common.rest_client [req-6163af0f-c335-48d1-83db-9e914785b7f5 ] Request (PortsRbacTest:test_show_port_binding_vif_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:16:49.830 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.832 193 DEBUG tempest.lib.common.rest_client [req-6163af0f-c335-48d1-83db-9e914785b7f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6163af0f-c335-48d1-83db-9e914785b7f5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["7zf_Mw9cTdaOBRRRjx-f7g"], "expires_at": "2020-12-14T03:16:49.000000Z", "issued_at": "2020-12-14T02:16:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:49.836 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.838 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.841 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.844 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.847 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.849 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.852 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.855 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.857 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.860 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.863 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.865 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.868 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.870 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.873 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:49.884 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-rescue, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:49.887 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:49.958 197 INFO tempest.lib.common.rest_client [req-7d059d88-1158-4761-82b3-9ea3ae7e9180 ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.066s 2020-12-14 02:16:49.961 197 DEBUG tempest.lib.common.rest_client [req-7d059d88-1158-4761-82b3-9ea3ae7e9180 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d059d88-1158-4761-82b3-9ea3ae7e9180', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:50.011 197 INFO tempest.lib.common.rest_client [req-bc16a746-3d25-4b16-af59-0433cc80478b ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:16:50.012 193 INFO tempest.lib.common.rest_client [req-bbf11983-af4b-4e0e-9b14-7be8b832ba97 ] Request (PortsRbacTest:test_show_port_binding_vif_details): 200 GET http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d?fields=binding%3Avif_details 0.171s 2020-12-14 02:16:50.014 197 DEBUG tempest.lib.common.rest_client [req-bc16a746-3d25-4b16-af59-0433cc80478b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc16a746-3d25-4b16-af59-0433cc80478b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["tRiKi5IfTcGPFOaYPuQJXg"], "expires_at": "2020-12-14T03:16:49.000000Z", "issued_at": "2020-12-14T02:16:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:50.016 193 DEBUG tempest.lib.common.rest_client [req-bbf11983-af4b-4e0e-9b14-7be8b832ba97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '35', 'x-openstack-request-id': 'req-bbf11983-af4b-4e0e-9b14-7be8b832ba97', 'date': 'Mon, 14 Dec 2020 02:16:50 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d?fields=binding%3Avif_details'} Body: b'{"port":{"binding:vif_details":{}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:50.019 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:50.092 193 INFO tempest.lib.common.rest_client [req-58d7d90d-2b6b-4856-bcc9-136618b4738c ] Request (PortsRbacTest:test_show_port_binding_vif_details): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.067s 2020-12-14 02:16:50.094 193 DEBUG tempest.lib.common.rest_client [req-58d7d90d-2b6b-4856-bcc9-136618b4738c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58d7d90d-2b6b-4856-bcc9-136618b4738c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:50.150 193 INFO tempest.lib.common.rest_client [req-67473916-7dda-495a-95e8-a6987b991a8a ] Request (PortsRbacTest:test_show_port_binding_vif_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:16:50.153 193 DEBUG tempest.lib.common.rest_client [req-67473916-7dda-495a-95e8-a6987b991a8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67473916-7dda-495a-95e8-a6987b991a8a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["GwnT6RFwRmaVGCvzglioYw"], "expires_at": "2020-12-14T03:16:50.000000Z", "issued_at": "2020-12-14T02:16:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:50.166 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:50.193 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:50.195 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:50.218 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port:binding:vif_type, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:50.220 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:50.266 197 INFO tempest.lib.common.rest_client [req-dfa5e808-ed12-4d6e-9ac0-3cff7f0b4bf6 ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 200 POST http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6/action 0.245s 2020-12-14 02:16:50.269 197 DEBUG tempest.lib.common.rest_client [req-dfa5e808-ed12-4d6e-9ac0-3cff7f0b4bf6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"rescue": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '29', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dfa5e808-ed12-4d6e-9ac0-3cff7f0b4bf6', 'x-compute-request-id': 'req-dfa5e808-ed12-4d6e-9ac0-3cff7f0b4bf6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6/action'} Body: b'{"adminPass": "ze8y9Kt9KCyG"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:50.282 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:50.282 193 INFO tempest.lib.common.rest_client [req-688b0c29-cd89-4a80-8d95-1ce2fb8fba60 ] Request (PortsRbacTest:test_show_port_binding_vif_type): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.055s 2020-12-14 02:16:50.285 193 DEBUG tempest.lib.common.rest_client [req-688b0c29-cd89-4a80-8d95-1ce2fb8fba60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-688b0c29-cd89-4a80-8d95-1ce2fb8fba60', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:50.338 193 INFO tempest.lib.common.rest_client [req-46231b7a-29b9-4c5c-88b5-abb7420ff6d4 ] Request (PortsRbacTest:test_show_port_binding_vif_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:16:50.342 193 DEBUG tempest.lib.common.rest_client [req-46231b7a-29b9-4c5c-88b5-abb7420ff6d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46231b7a-29b9-4c5c-88b5-abb7420ff6d4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["9defR8R8Sfu2CsRK6A6JJA"], "expires_at": "2020-12-14T03:16:50.000000Z", "issued_at": "2020-12-14T02:16:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:50.350 197 INFO tempest.lib.common.rest_client [req-0d4b8155-f87e-42de-8166-4d8df3a17c4b ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.061s 2020-12-14 02:16:50.352 197 DEBUG tempest.lib.common.rest_client [req-0d4b8155-f87e-42de-8166-4d8df3a17c4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d4b8155-f87e-42de-8166-4d8df3a17c4b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:50.404 197 INFO tempest.lib.common.rest_client [req-545cf373-ae6e-437a-a85e-02046f992c94 ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:16:50.409 197 DEBUG tempest.lib.common.rest_client [req-545cf373-ae6e-437a-a85e-02046f992c94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-545cf373-ae6e-437a-a85e-02046f992c94', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["E8h8mNAxSQyR51J9I4efWg"], "expires_at": "2020-12-14T03:16:50.000000Z", "issued_at": "2020-12-14T02:16:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:50.523 193 INFO tempest.lib.common.rest_client [req-c39692cf-21ef-4fbb-b7f4-666d5c874b69 ] Request (PortsRbacTest:test_show_port_binding_vif_type): 200 GET http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d?fields=binding%3Avif_type 0.172s 2020-12-14 02:16:50.527 193 DEBUG tempest.lib.common.rest_client [req-c39692cf-21ef-4fbb-b7f4-666d5c874b69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '39', 'x-openstack-request-id': 'req-c39692cf-21ef-4fbb-b7f4-666d5c874b69', 'date': 'Mon, 14 Dec 2020 02:16:50 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d?fields=binding%3Avif_type'} Body: b'{"port":{"binding:vif_type":"unbound"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:50.530 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:50.587 189 INFO tempest.lib.common.rest_client [req-86a92848-727d-4296-be78-9877a44890aa ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.314s 2020-12-14 02:16:50.590 189 DEBUG tempest.lib.common.rest_client [req-86a92848-727d-4296-be78-9877a44890aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-86a92848-727d-4296-be78-9877a44890aa', 'x-compute-request-id': 'req-86a92848-727d-4296-be78-9877a44890aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:50.591 193 INFO tempest.lib.common.rest_client [req-55b9dd6a-3338-4a04-a904-58a9c8884746 ] Request (PortsRbacTest:test_show_port_binding_vif_type): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.054s 2020-12-14 02:16:50.594 193 DEBUG tempest.lib.common.rest_client [req-55b9dd6a-3338-4a04-a904-58a9c8884746 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55b9dd6a-3338-4a04-a904-58a9c8884746', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:50.645 193 INFO tempest.lib.common.rest_client [req-07ef4f5d-3b4a-43ad-8e0a-2cce16aaedde ] Request (PortsRbacTest:test_show_port_binding_vif_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:16:50.647 193 DEBUG tempest.lib.common.rest_client [req-07ef4f5d-3b4a-43ad-8e0a-2cce16aaedde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07ef4f5d-3b4a-43ad-8e0a-2cce16aaedde', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["oBciLzlzRCSPpWphQW64iQ"], "expires_at": "2020-12-14T03:16:50.000000Z", "issued_at": "2020-12-14T02:16:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:50.660 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:50.686 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:50.689 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:50.713 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:50.715 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:50.799 193 INFO tempest.lib.common.rest_client [req-642fa2b1-1a56-4b1e-be1e-075d2e1ed229 ] Request (PortsRbacTest:test_update_port): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.079s 2020-12-14 02:16:50.802 193 DEBUG tempest.lib.common.rest_client [req-642fa2b1-1a56-4b1e-be1e-075d2e1ed229 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-642fa2b1-1a56-4b1e-be1e-075d2e1ed229', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:50.850 193 INFO tempest.lib.common.rest_client [req-be1cac6b-a301-42b8-8252-a6580d19d92d ] Request (PortsRbacTest:test_update_port): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:16:50.854 193 DEBUG tempest.lib.common.rest_client [req-be1cac6b-a301-42b8-8252-a6580d19d92d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be1cac6b-a301-42b8-8252-a6580d19d92d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["gD8gCwl9S2yuQTIv4YaXdg"], "expires_at": "2020-12-14T03:16:50.000000Z", "issued_at": "2020-12-14T02:16:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:51.106 186 INFO tempest.lib.common.rest_client [req-829a7519-a8df-4c0a-966b-14035019b74b ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c 0.242s 2020-12-14 02:16:51.109 186 DEBUG tempest.lib.common.rest_client [req-829a7519-a8df-4c0a-966b-14035019b74b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1533', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-829a7519-a8df-4c0a-966b-14035019b74b', 'x-compute-request-id': 'req-829a7519-a8df-4c0a-966b-14035019b74b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c'} Body: b'{"server": {"id": "913e8d28-6913-44af-85b7-801bbbe2420c", "name": "tempest-ServerMetadataRbacTest-server-1866062397", "status": "BUILD", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "user_id": "fdd4aec086bf411486f075e6837bc36c", "metadata": {}, "hostId": "a86b3682a2bad9876385865ce13b3a0a046ab9c3a9a6655ec666a8ec", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:42Z", "updated": "2020-12-14T02:16:44Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:51.523 193 INFO tempest.lib.common.rest_client [req-70255676-c199-4605-a226-457e177dd298 ] Request (PortsRbacTest:test_update_port): 200 PUT http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d 0.661s 2020-12-14 02:16:51.526 193 DEBUG tempest.lib.common.rest_client [req-70255676-c199-4605-a226-457e177dd298 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"admin_state_up": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '1091', 'x-openstack-request-id': 'req-70255676-c199-4605-a226-457e177dd298', 'date': 'Mon, 14 Dec 2020 02:16:51 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d'} Body: b'{"port":{"id":"af66f967-0722-4f89-8e19-d04d4339ee1d","name":"tempest-PortsRbacTest-629263402","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:86:e0:d7","admin_state_up":false,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.21"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.21","hostname":"host-192-168-120-21","fqdn":"host-192-168-120-21.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:20Z","updated_at":"2020-12-14T02:16:51Z","revision_number":2,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:51.529 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:51.595 193 INFO tempest.lib.common.rest_client [req-d3ee6130-9cc3-4ccb-89d1-ffe0cd6865a7 ] Request (PortsRbacTest:test_update_port): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.060s 2020-12-14 02:16:51.598 193 DEBUG tempest.lib.common.rest_client [req-d3ee6130-9cc3-4ccb-89d1-ffe0cd6865a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3ee6130-9cc3-4ccb-89d1-ffe0cd6865a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:51.648 193 INFO tempest.lib.common.rest_client [req-0c9f521c-6088-4a36-bf0b-777dbc584dc7 ] Request (PortsRbacTest:test_update_port): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:16:51.651 193 DEBUG tempest.lib.common.rest_client [req-0c9f521c-6088-4a36-bf0b-777dbc584dc7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c9f521c-6088-4a36-bf0b-777dbc584dc7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["ZrnXsxUASTe9WEvxDLxX4w"], "expires_at": "2020-12-14T03:16:51.000000Z", "issued_at": "2020-12-14T02:16:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:51.978 189 INFO tempest.lib.common.rest_client [req-ff958168-e50d-4aff-a23c-015151e5280f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.281s 2020-12-14 02:16:51.981 189 DEBUG tempest.lib.common.rest_client [req-ff958168-e50d-4aff-a23c-015151e5280f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ff958168-e50d-4aff-a23c-015151e5280f', 'x-compute-request-id': 'req-ff958168-e50d-4aff-a23c-015151e5280f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:52.286 193 INFO tempest.lib.common.rest_client [req-ca05dec8-0f14-4538-a4a0-52f2f7e0ea79 ] Request (PortsRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d 0.624s 2020-12-14 02:16:52.289 193 DEBUG tempest.lib.common.rest_client [req-ca05dec8-0f14-4538-a4a0-52f2f7e0ea79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"admin_state_up": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '1090', 'x-openstack-request-id': 'req-ca05dec8-0f14-4538-a4a0-52f2f7e0ea79', 'date': 'Mon, 14 Dec 2020 02:16:52 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d'} Body: b'{"port":{"id":"af66f967-0722-4f89-8e19-d04d4339ee1d","name":"tempest-PortsRbacTest-629263402","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:86:e0:d7","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.21"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.21","hostname":"host-192-168-120-21","fqdn":"host-192-168-120-21.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:20Z","updated_at":"2020-12-14T02:16:51Z","revision_number":3,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:52.301 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:52.327 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:52.330 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:52.354 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:52.356 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:52.380 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port:allowed_address_pairs, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:52.449 186 INFO tempest.lib.common.rest_client [req-d1b539e6-c9c4-4758-a4ce-535517db2b1a ] Request (ServerMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c 0.232s 2020-12-14 02:16:52.451 186 DEBUG tempest.lib.common.rest_client [req-d1b539e6-c9c4-4758-a4ce-535517db2b1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1720', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d1b539e6-c9c4-4758-a4ce-535517db2b1a', 'x-compute-request-id': 'req-d1b539e6-c9c4-4758-a4ce-535517db2b1a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c'} Body: b'{"server": {"id": "913e8d28-6913-44af-85b7-801bbbe2420c", "name": "tempest-ServerMetadataRbacTest-server-1866062397", "status": "ACTIVE", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "user_id": "fdd4aec086bf411486f075e6837bc36c", "metadata": {}, "hostId": "a86b3682a2bad9876385865ce13b3a0a046ab9c3a9a6655ec666a8ec", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:42Z", "updated": "2020-12-14T02:16:51Z", "addresses": {"tempest-ServerMetadataRbacTest-1809872202-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:7f:96:5c"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:52.552 186 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 9 second wait 2020-12-14 02:16:52.554 193 INFO tempest.lib.common.rest_client [req-7859b482-5b1d-4680-93f7-36be6e41f1ad ] Request (PortsRbacTest:test_update_port_allowed_address_pairs): 200 GET http://172.30.13.94:9696/v2.0/ports?network_id=9b3f8864-8a15-49e7-9e20-d2c6badb1cd4 0.168s 2020-12-14 02:16:52.560 193 DEBUG tempest.lib.common.rest_client [req-7859b482-5b1d-4680-93f7-36be6e41f1ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '13474', 'x-openstack-request-id': 'req-7859b482-5b1d-4680-93f7-36be6e41f1ad', 'date': 'Mon, 14 Dec 2020 02:16:52 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?network_id=9b3f8864-8a15-49e7-9e20-d2c6badb1cd4'} Body: b'{"ports":[{"id":"1424d9a0-aa2a-498b-912a-6e620e14fdca","name":"tempest-PortsRbacTest-875917120","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:73:e6:3a","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.75"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"rbac_test_host","binding:vif_type":"binding_failed","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.75","hostname":"host-192-168-120-75","fqdn":"host-192-168-120-75.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:24Z","updated_at":"2020-12-14T02:16:29Z","revision_number":2,"project_id":"5d2b22c24509439eb518838e24b766b7"},{"id":"2274dcfa-e06d-468c-bd1c-19d95731a8c8","name":"tempest-PortsRbacTest-209437603","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:1f:c3:e8","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.80"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.80","hostname":"host-192-168-120-80","fqdn":"host-192-168-120-80.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:37Z","updated_at":"2020-12-14T02:16:42Z","revision_number":1,"project_id":"5d2b22c24509439eb518838e24b766b7"},{"id":"3cce41bf-5406-433d-9e31-d145f5caa075","name":"tempest-PortsRbacTest-1282087528","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:f0:5a:a0","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.127"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.127","hostname":"host-192-168-120-127","fqdn":"host-192-168-120-127.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:36Z","updated_at":"2020-12-14T02:16:36Z","revision_number":1,"project_id":"5d2b22c24509439eb518838e24b766b7"},{"id":"4c371891-cf40-4a45-b3fa-aaea3f8815aa","name":"tempest-PortsRbacTest-961917646","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:bc:89:a6","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.79"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{"foo":"1"},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.79","hostname":"host-192-168- _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:52.629 193 INFO tempest.lib.common.rest_client [req-2136a2c0-5944-4a09-ba8e-6ff4a4f0e559 ] Request (PortsRbacTest:test_update_port_allowed_address_pairs): 200 GET http://172.30.13.94:9696/v2.0/subnets/5804389f-c655-4f7f-855c-f96ce18290fc 0.060s 2020-12-14 02:16:52.632 193 DEBUG tempest.lib.common.rest_client [req-2136a2c0-5944-4a09-ba8e-6ff4a4f0e559 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '662', 'x-openstack-request-id': 'req-2136a2c0-5944-4a09-ba8e-6ff4a4f0e559', 'date': 'Mon, 14 Dec 2020 02:16:52 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/5804389f-c655-4f7f-855c-f96ce18290fc'} Body: b'{"subnet":{"id":"5804389f-c655-4f7f-855c-f96ce18290fc","name":"","tenant_id":"5d2b22c24509439eb518838e24b766b7","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/24","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:16:19Z","updated_at":"2020-12-14T02:16:19Z","revision_number":0,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:52.766 186 INFO tempest.lib.common.rest_client [req-8796e733-64e7-4057-b6da-d8fae4753112 ] Request (ServerMetadataRbacTest:setUp): 200 PUT http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata 0.204s 2020-12-14 02:16:52.770 186 DEBUG tempest.lib.common.rest_client [req-8796e733-64e7-4057-b6da-d8fae4753112 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"default_key": "value1", "delete_key": "value2"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '63', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8796e733-64e7-4057-b6da-d8fae4753112', 'x-compute-request-id': 'req-8796e733-64e7-4057-b6da-d8fae4753112', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata'} Body: b'{"metadata": {"default_key": "value1", "delete_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:52.789 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:52.795 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.799 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.802 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.806 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.811 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.815 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.821 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.824 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.828 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.831 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.834 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.836 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.838 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.840 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.843 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.845 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.847 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.849 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.852 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.854 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.856 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.858 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.860 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.862 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.864 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.866 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.868 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.870 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.872 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.875 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.877 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.879 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.881 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.883 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.886 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.888 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.890 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.892 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.895 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.898 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.900 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.902 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.904 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.907 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.910 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.912 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.914 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.917 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.919 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.921 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.923 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.925 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.928 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.930 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.933 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.935 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.940 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.942 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.944 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.947 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.950 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.952 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.954 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.957 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.959 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.961 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.964 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.966 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.968 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.970 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.973 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:52.982 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:server-metadata:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:52.984 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:53.050 186 INFO tempest.lib.common.rest_client [req-9a78b387-4404-42b0-8afb-f1bb5bdedae8 ] Request (ServerMetadataRbacTest:test_delete_server_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles 0.060s 2020-12-14 02:16:53.054 186 DEBUG tempest.lib.common.rest_client [req-9a78b387-4404-42b0-8afb-f1bb5bdedae8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9a78b387-4404-42b0-8afb-f1bb5bdedae8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:53.097 186 INFO tempest.lib.common.rest_client [req-4e88fc80-5d46-432a-9c47-ed51d65dbe66 ] Request (ServerMetadataRbacTest:test_delete_server_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:16:53.100 186 DEBUG tempest.lib.common.rest_client [req-4e88fc80-5d46-432a-9c47-ed51d65dbe66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e88fc80-5d46-432a-9c47-ed51d65dbe66', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fdd4aec086bf411486f075e6837bc36c", "name": "tempest-ServerMetadataRbacTest-1730955355", "password_expires_at": null}, "audit_ids": ["lFHefAJARJ2Rc6jlSvHXbg"], "expires_at": "2020-12-14T03:16:53.000000Z", "issued_at": "2020-12-14T02:16:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ef7d365f8304c6c871d57337acc5adf", "name": "tempest-ServerMetadataRbacTest-1730955355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:53.339 186 INFO tempest.lib.common.rest_client [req-7a95a304-512a-4cf3-a014-d436d5e804cc ] Request (ServerMetadataRbacTest:test_delete_server_metadata_item): 204 DELETE http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata/delete_key 0.232s 2020-12-14 02:16:53.342 186 DEBUG tempest.lib.common.rest_client [req-7a95a304-512a-4cf3-a014-d436d5e804cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7a95a304-512a-4cf3-a014-d436d5e804cc', 'x-compute-request-id': 'req-7a95a304-512a-4cf3-a014-d436d5e804cc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata/delete_key'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:53.344 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:53.356 189 INFO tempest.lib.common.rest_client [req-35ac4a4e-43ab-4a8d-8f3b-d1ee401b40f7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.270s 2020-12-14 02:16:53.360 189 DEBUG tempest.lib.common.rest_client [req-35ac4a4e-43ab-4a8d-8f3b-d1ee401b40f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-35ac4a4e-43ab-4a8d-8f3b-d1ee401b40f7', 'x-compute-request-id': 'req-35ac4a4e-43ab-4a8d-8f3b-d1ee401b40f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:53.409 186 INFO tempest.lib.common.rest_client [req-9e657d30-4907-4ff6-b9ed-f9d6f2f925cc ] Request (ServerMetadataRbacTest:test_delete_server_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles 0.059s 2020-12-14 02:16:53.411 186 DEBUG tempest.lib.common.rest_client [req-9e657d30-4907-4ff6-b9ed-f9d6f2f925cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e657d30-4907-4ff6-b9ed-f9d6f2f925cc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:53.459 186 INFO tempest.lib.common.rest_client [req-bca6805c-5d28-4745-bf92-b72ddd309bbd ] Request (ServerMetadataRbacTest:test_delete_server_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:16:53.463 186 DEBUG tempest.lib.common.rest_client [req-bca6805c-5d28-4745-bf92-b72ddd309bbd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bca6805c-5d28-4745-bf92-b72ddd309bbd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fdd4aec086bf411486f075e6837bc36c", "name": "tempest-ServerMetadataRbacTest-1730955355", "password_expires_at": null}, "audit_ids": ["UX2EEZ1zTnWcJF_Ti0XwtQ"], "expires_at": "2020-12-14T03:16:53.000000Z", "issued_at": "2020-12-14T02:16:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ef7d365f8304c6c871d57337acc5adf", "name": "tempest-ServerMetadataRbacTest-1730955355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:53.730 193 INFO tempest.lib.common.rest_client [req-ccf5b3f6-b619-43da-8bba-3e731650a1c8 ] Request (PortsRbacTest:test_update_port_allowed_address_pairs): 201 POST http://172.30.13.94:9696/v2.0/ports 0.906s 2020-12-14 02:16:53.733 193 DEBUG tempest.lib.common.rest_client [req-ccf5b3f6-b619-43da-8bba-3e731650a1c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "name": "tempest-PortsRbacTest-559294540"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1090', 'x-openstack-request-id': 'req-ccf5b3f6-b619-43da-8bba-3e731650a1c8', 'date': 'Mon, 14 Dec 2020 02:16:53 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"3b467498-f923-45f2-b704-0474df7e1268","name":"tempest-PortsRbacTest-559294540","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:d9:f3:ec","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.60"}],"project_id":"5d2b22c24509439eb518838e24b766b7","port_security_enabled":true,"qos_policy_id":null,"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.60","hostname":"host-192-168-120-60","fqdn":"host-192-168-120-60.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:53Z","updated_at":"2020-12-14T02:16:53Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:53.736 186 INFO tempest.lib.common.rest_client [req-10452a49-2ff7-42d0-a1e4-a0012551d91e ] Request (ServerMetadataRbacTest:setUp): 200 PUT http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata 0.243s 2020-12-14 02:16:53.736 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:53.739 186 DEBUG tempest.lib.common.rest_client [req-10452a49-2ff7-42d0-a1e4-a0012551d91e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"default_key": "value1", "delete_key": "value2"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '63', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-10452a49-2ff7-42d0-a1e4-a0012551d91e', 'x-compute-request-id': 'req-10452a49-2ff7-42d0-a1e4-a0012551d91e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata'} Body: b'{"metadata": {"default_key": "value1", "delete_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:53.753 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:53.758 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.761 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.764 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.767 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.771 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.774 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.779 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.782 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.784 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.787 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.790 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.792 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.796 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.798 193 INFO tempest.lib.common.rest_client [req-d827f710-a201-4dbe-afc9-738c55045823 ] Request (PortsRbacTest:test_update_port_allowed_address_pairs): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.056s 2020-12-14 02:16:53.798 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.800 193 DEBUG tempest.lib.common.rest_client [req-d827f710-a201-4dbe-afc9-738c55045823 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d827f710-a201-4dbe-afc9-738c55045823', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:53.801 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.805 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.807 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.810 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.814 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.818 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.822 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.827 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.831 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.835 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.839 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.843 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.847 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.851 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.855 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.858 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.860 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.863 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.866 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.866 193 INFO tempest.lib.common.rest_client [req-b44a8e18-ac17-4916-bab9-def0960df01a ] Request (PortsRbacTest:test_update_port_allowed_address_pairs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.059s 2020-12-14 02:16:53.868 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.870 193 DEBUG tempest.lib.common.rest_client [req-b44a8e18-ac17-4916-bab9-def0960df01a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b44a8e18-ac17-4916-bab9-def0960df01a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["vnd5mDIhQ7-b1ITbbVk8VA"], "expires_at": "2020-12-14T03:16:53.000000Z", "issued_at": "2020-12-14T02:16:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:53.871 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.874 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.876 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.882 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.885 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.888 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.891 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.893 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.896 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.899 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.902 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.905 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.908 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.910 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.913 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.916 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.919 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.921 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.924 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.927 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.930 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.933 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.939 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.942 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.944 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.947 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.950 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.953 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.955 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.958 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.961 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.963 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.966 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.968 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.971 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.973 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.975 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:53.984 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:server-metadata:index, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:53.986 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:54.051 186 INFO tempest.lib.common.rest_client [req-43853e20-2474-42fe-b516-2136b2fc2a69 ] Request (ServerMetadataRbacTest:test_list_server_metadata): 200 GET http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles 0.060s 2020-12-14 02:16:54.054 186 DEBUG tempest.lib.common.rest_client [req-43853e20-2474-42fe-b516-2136b2fc2a69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43853e20-2474-42fe-b516-2136b2fc2a69', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:54.104 186 INFO tempest.lib.common.rest_client [req-f6def7ff-782e-4683-98e7-b2e7df1758ca ] Request (ServerMetadataRbacTest:test_list_server_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:16:54.107 186 DEBUG tempest.lib.common.rest_client [req-f6def7ff-782e-4683-98e7-b2e7df1758ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6def7ff-782e-4683-98e7-b2e7df1758ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fdd4aec086bf411486f075e6837bc36c", "name": "tempest-ServerMetadataRbacTest-1730955355", "password_expires_at": null}, "audit_ids": ["mFkKuWl1TZuISpd1bVsprg"], "expires_at": "2020-12-14T03:16:54.000000Z", "issued_at": "2020-12-14T02:16:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ef7d365f8304c6c871d57337acc5adf", "name": "tempest-ServerMetadataRbacTest-1730955355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:54.284 186 INFO tempest.lib.common.rest_client [req-5e0a4088-e7ab-4fa7-86c0-60d390c7d3d1 ] Request (ServerMetadataRbacTest:test_list_server_metadata): 200 GET http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata 0.170s 2020-12-14 02:16:54.288 186 DEBUG tempest.lib.common.rest_client [req-5e0a4088-e7ab-4fa7-86c0-60d390c7d3d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '63', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5e0a4088-e7ab-4fa7-86c0-60d390c7d3d1', 'x-compute-request-id': 'req-5e0a4088-e7ab-4fa7-86c0-60d390c7d3d1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata'} Body: b'{"metadata": {"default_key": "value1", "delete_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:54.302 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:54.372 186 INFO tempest.lib.common.rest_client [req-8781ef79-c8cc-4316-b378-7e8bfcecd12f ] Request (ServerMetadataRbacTest:test_list_server_metadata): 200 GET http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles 0.064s 2020-12-14 02:16:54.374 186 DEBUG tempest.lib.common.rest_client [req-8781ef79-c8cc-4316-b378-7e8bfcecd12f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8781ef79-c8cc-4316-b378-7e8bfcecd12f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:54.426 186 INFO tempest.lib.common.rest_client [req-f883f1b6-bd1c-41ad-b282-f09ce6c42a58 ] Request (ServerMetadataRbacTest:test_list_server_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:16:54.429 186 DEBUG tempest.lib.common.rest_client [req-f883f1b6-bd1c-41ad-b282-f09ce6c42a58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f883f1b6-bd1c-41ad-b282-f09ce6c42a58', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fdd4aec086bf411486f075e6837bc36c", "name": "tempest-ServerMetadataRbacTest-1730955355", "password_expires_at": null}, "audit_ids": ["kvR24DosTtOty42KBk8zTw"], "expires_at": "2020-12-14T03:16:54.000000Z", "issued_at": "2020-12-14T02:16:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ef7d365f8304c6c871d57337acc5adf", "name": "tempest-ServerMetadataRbacTest-1730955355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:54.596 193 INFO tempest.lib.common.rest_client [req-aed52c78-cfec-45e7-801c-3e0bd0362281 ] Request (PortsRbacTest:test_update_port_allowed_address_pairs): 200 PUT http://172.30.13.94:9696/v2.0/ports/3b467498-f923-45f2-b704-0474df7e1268 0.719s 2020-12-14 02:16:54.601 193 DEBUG tempest.lib.common.rest_client [req-aed52c78-cfec-45e7-801c-3e0bd0362281 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"allowed_address_pairs": [{"ip_address": "192.168.120.253", "mac_address": "fa:16:3e:a5:5c:d3"}]}} Response - Headers: {'content-type': 'application/json', 'content-length': '1156', 'x-openstack-request-id': 'req-aed52c78-cfec-45e7-801c-3e0bd0362281', 'date': 'Mon, 14 Dec 2020 02:16:54 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/3b467498-f923-45f2-b704-0474df7e1268'} Body: b'{"port":{"id":"3b467498-f923-45f2-b704-0474df7e1268","name":"tempest-PortsRbacTest-559294540","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:d9:f3:ec","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.60"}],"allowed_address_pairs":[{"mac_address":"fa:16:3e:a5:5c:d3","ip_address":"192.168.120.253"}],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.60","hostname":"host-192-168-120-60","fqdn":"host-192-168-120-60.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:53Z","updated_at":"2020-12-14T02:16:54Z","revision_number":2,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:54.606 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:54.690 193 INFO tempest.lib.common.rest_client [req-42652c12-250d-41f0-a3ce-3108f36d17af ] Request (PortsRbacTest:test_update_port_allowed_address_pairs): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.075s 2020-12-14 02:16:54.694 193 DEBUG tempest.lib.common.rest_client [req-42652c12-250d-41f0-a3ce-3108f36d17af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42652c12-250d-41f0-a3ce-3108f36d17af', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:54.735 186 INFO tempest.lib.common.rest_client [req-51c820de-4d2c-4312-a53f-e03e42824ec8 ] Request (ServerMetadataRbacTest:setUp): 200 PUT http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata 0.278s 2020-12-14 02:16:54.739 186 DEBUG tempest.lib.common.rest_client [req-51c820de-4d2c-4312-a53f-e03e42824ec8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"default_key": "value1", "delete_key": "value2"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '63', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-51c820de-4d2c-4312-a53f-e03e42824ec8', 'x-compute-request-id': 'req-51c820de-4d2c-4312-a53f-e03e42824ec8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata'} Body: b'{"metadata": {"default_key": "value1", "delete_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:54.738 189 INFO tempest.lib.common.rest_client [req-51ee9e69-ddec-4a10-9721-3b16692e54ca ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.258s 2020-12-14 02:16:54.742 189 DEBUG tempest.lib.common.rest_client [req-51ee9e69-ddec-4a10-9721-3b16692e54ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-51ee9e69-ddec-4a10-9721-3b16692e54ca', 'x-compute-request-id': 'req-51ee9e69-ddec-4a10-9721-3b16692e54ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:54.752 193 INFO tempest.lib.common.rest_client [req-719b1c15-a261-44b1-89d3-420553bfb483 ] Request (PortsRbacTest:test_update_port_allowed_address_pairs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:16:54.753 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:54.755 193 DEBUG tempest.lib.common.rest_client [req-719b1c15-a261-44b1-89d3-420553bfb483 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-719b1c15-a261-44b1-89d3-420553bfb483', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["zckKESO6TWewF6r6FwqiHQ"], "expires_at": "2020-12-14T03:16:54.000000Z", "issued_at": "2020-12-14T02:16:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:54.757 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.761 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.764 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.767 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.771 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.771 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:54.775 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.779 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.782 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.785 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.788 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.791 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.793 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.796 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.798 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:54.799 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.800 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:54.802 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.805 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.808 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.811 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.814 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.816 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.819 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.822 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.824 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.824 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:54.827 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.827 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:54.830 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.832 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.835 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.838 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.840 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.843 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.846 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.849 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.849 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port:binding:host_id, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:54.851 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.854 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.857 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.860 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.862 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.865 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.868 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.872 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.875 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.877 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.880 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.883 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.886 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.888 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.890 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.893 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.895 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.897 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.899 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.901 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.903 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.905 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.908 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.910 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.915 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.917 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.919 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.922 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.924 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.926 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.928 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.930 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.932 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.934 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.936 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.938 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.940 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.942 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.944 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:54.953 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:server-metadata:update_all, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:54.955 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:55.025 186 INFO tempest.lib.common.rest_client [req-338fa414-41c8-4f5e-ac3c-098557c5c925 ] Request (ServerMetadataRbacTest:test_set_server_metadata): 200 GET http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles 0.066s 2020-12-14 02:16:55.028 186 DEBUG tempest.lib.common.rest_client [req-338fa414-41c8-4f5e-ac3c-098557c5c925 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-338fa414-41c8-4f5e-ac3c-098557c5c925', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:55.081 186 INFO tempest.lib.common.rest_client [req-f2b320ff-b294-4660-b3df-769d62eeba1d ] Request (ServerMetadataRbacTest:test_set_server_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:16:55.085 186 DEBUG tempest.lib.common.rest_client [req-f2b320ff-b294-4660-b3df-769d62eeba1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2b320ff-b294-4660-b3df-769d62eeba1d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fdd4aec086bf411486f075e6837bc36c", "name": "tempest-ServerMetadataRbacTest-1730955355", "password_expires_at": null}, "audit_ids": ["J9apdE7QRJGAGYZ5gK-9nw"], "expires_at": "2020-12-14T03:16:55.000000Z", "issued_at": "2020-12-14T02:16:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ef7d365f8304c6c871d57337acc5adf", "name": "tempest-ServerMetadataRbacTest-1730955355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:55.123 197 INFO tempest.lib.common.rest_client [req-4338b02e-c2c0-4202-ab60-c41694446d31 ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 4.707s 2020-12-14 02:16:55.127 197 DEBUG tempest.lib.common.rest_client [req-4338b02e-c2c0-4202-ab60-c41694446d31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4338b02e-c2c0-4202-ab60-c41694446d31', 'x-compute-request-id': 'req-4338b02e-c2c0-4202-ab60-c41694446d31', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:50Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:42.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "rescuing", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:55.338 186 INFO tempest.lib.common.rest_client [req-8b61f02b-0254-4f92-99d1-eac4fb397426 ] Request (ServerMetadataRbacTest:test_set_server_metadata): 200 PUT http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata 0.244s 2020-12-14 02:16:55.341 186 DEBUG tempest.lib.common.rest_client [req-8b61f02b-0254-4f92-99d1-eac4fb397426 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '16', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8b61f02b-0254-4f92-99d1-eac4fb397426', 'x-compute-request-id': 'req-8b61f02b-0254-4f92-99d1-eac4fb397426', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata'} Body: b'{"metadata": {}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:55.351 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:55.414 186 INFO tempest.lib.common.rest_client [req-2d3e108c-f0c7-4536-8ef2-e72522c9c472 ] Request (ServerMetadataRbacTest:test_set_server_metadata): 200 GET http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles 0.059s 2020-12-14 02:16:55.416 186 DEBUG tempest.lib.common.rest_client [req-2d3e108c-f0c7-4536-8ef2-e72522c9c472 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2d3e108c-f0c7-4536-8ef2-e72522c9c472', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:55.462 186 INFO tempest.lib.common.rest_client [req-5b167cd3-ec3c-4d0f-ae56-6fb48b7b8f91 ] Request (ServerMetadataRbacTest:test_set_server_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:16:55.464 186 DEBUG tempest.lib.common.rest_client [req-5b167cd3-ec3c-4d0f-ae56-6fb48b7b8f91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b167cd3-ec3c-4d0f-ae56-6fb48b7b8f91', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fdd4aec086bf411486f075e6837bc36c", "name": "tempest-ServerMetadataRbacTest-1730955355", "password_expires_at": null}, "audit_ids": ["uxoa293aRMCg_vzW5pnvtg"], "expires_at": "2020-12-14T03:16:55.000000Z", "issued_at": "2020-12-14T02:16:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ef7d365f8304c6c871d57337acc5adf", "name": "tempest-ServerMetadataRbacTest-1730955355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:55.744 186 INFO tempest.lib.common.rest_client [req-fbda0fff-233a-4046-805e-7218ec9965e0 ] Request (ServerMetadataRbacTest:setUp): 200 PUT http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata 0.252s 2020-12-14 02:16:55.748 186 DEBUG tempest.lib.common.rest_client [req-fbda0fff-233a-4046-805e-7218ec9965e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"default_key": "value1", "delete_key": "value2"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '63', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fbda0fff-233a-4046-805e-7218ec9965e0', 'x-compute-request-id': 'req-fbda0fff-233a-4046-805e-7218ec9965e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata'} Body: b'{"metadata": {"default_key": "value1", "delete_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:55.759 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:55.763 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.765 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.768 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.770 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.773 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.776 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.780 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.782 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.784 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.787 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.789 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.791 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.794 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.796 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.798 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.801 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.803 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.805 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.808 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.810 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.813 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.815 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.817 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.819 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.821 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.823 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.825 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.827 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.830 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.832 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.834 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.836 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.838 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.840 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.842 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.845 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.847 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.849 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.852 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.855 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.857 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.859 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.861 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.865 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.867 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.869 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.871 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.874 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.876 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.878 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.881 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.884 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.886 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.889 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.892 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.894 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.899 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.901 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.903 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.906 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.908 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.910 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.912 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.915 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.917 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.919 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.922 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.924 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.927 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.929 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.931 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:55.944 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:server-metadata:update, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:55.946 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:56.019 186 INFO tempest.lib.common.rest_client [req-66e52fc8-c816-4fa3-8f17-3f1fb42a7df5 ] Request (ServerMetadataRbacTest:test_set_server_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles 0.067s 2020-12-14 02:16:56.022 186 DEBUG tempest.lib.common.rest_client [req-66e52fc8-c816-4fa3-8f17-3f1fb42a7df5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66e52fc8-c816-4fa3-8f17-3f1fb42a7df5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:56.076 186 INFO tempest.lib.common.rest_client [req-afd7b296-4d25-437b-b28e-23f23dccae18 ] Request (ServerMetadataRbacTest:test_set_server_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:16:56.079 186 DEBUG tempest.lib.common.rest_client [req-afd7b296-4d25-437b-b28e-23f23dccae18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-afd7b296-4d25-437b-b28e-23f23dccae18', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fdd4aec086bf411486f075e6837bc36c", "name": "tempest-ServerMetadataRbacTest-1730955355", "password_expires_at": null}, "audit_ids": ["e3Hj8taXQwirpzYLJdAQXQ"], "expires_at": "2020-12-14T03:16:56.000000Z", "issued_at": "2020-12-14T02:16:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ef7d365f8304c6c871d57337acc5adf", "name": "tempest-ServerMetadataRbacTest-1730955355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:56.082 189 INFO tempest.lib.common.rest_client [req-928124ac-57aa-4164-b26e-9e58ebf2e8b8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.232s 2020-12-14 02:16:56.085 189 DEBUG tempest.lib.common.rest_client [req-928124ac-57aa-4164-b26e-9e58ebf2e8b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-928124ac-57aa-4164-b26e-9e58ebf2e8b8', 'x-compute-request-id': 'req-928124ac-57aa-4164-b26e-9e58ebf2e8b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:56.342 186 INFO tempest.lib.common.rest_client [req-3c619ab7-e007-4418-9e8a-fda070d1a1d2 ] Request (ServerMetadataRbacTest:test_set_server_metadata_item): 200 PUT http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata/default_key 0.255s 2020-12-14 02:16:56.346 186 DEBUG tempest.lib.common.rest_client [req-3c619ab7-e007-4418-9e8a-fda070d1a1d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"meta": {"default_key": "value2"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '35', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3c619ab7-e007-4418-9e8a-fda070d1a1d2', 'x-compute-request-id': 'req-3c619ab7-e007-4418-9e8a-fda070d1a1d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata/default_key'} Body: b'{"meta": {"default_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:56.360 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:56.428 186 INFO tempest.lib.common.rest_client [req-e07b8bab-6855-49f1-95cb-543de2405410 ] Request (ServerMetadataRbacTest:test_set_server_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles 0.062s 2020-12-14 02:16:56.432 186 DEBUG tempest.lib.common.rest_client [req-e07b8bab-6855-49f1-95cb-543de2405410 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e07b8bab-6855-49f1-95cb-543de2405410', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:56.485 186 INFO tempest.lib.common.rest_client [req-51d25058-d019-4806-b56a-f0915f315dd5 ] Request (ServerMetadataRbacTest:test_set_server_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:16:56.487 186 DEBUG tempest.lib.common.rest_client [req-51d25058-d019-4806-b56a-f0915f315dd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51d25058-d019-4806-b56a-f0915f315dd5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fdd4aec086bf411486f075e6837bc36c", "name": "tempest-ServerMetadataRbacTest-1730955355", "password_expires_at": null}, "audit_ids": ["yowuZyHxQVCL8JlPyYtmrw"], "expires_at": "2020-12-14T03:16:56.000000Z", "issued_at": "2020-12-14T02:16:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ef7d365f8304c6c871d57337acc5adf", "name": "tempest-ServerMetadataRbacTest-1730955355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:56.547 197 INFO tempest.lib.common.rest_client [req-012bdd58-ee70-41bb-9f6d-eff09ae5d6dc ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.300s 2020-12-14 02:16:56.550 197 DEBUG tempest.lib.common.rest_client [req-012bdd58-ee70-41bb-9f6d-eff09ae5d6dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-012bdd58-ee70-41bb-9f6d-eff09ae5d6dc', 'x-compute-request-id': 'req-012bdd58-ee70-41bb-9f6d-eff09ae5d6dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:50Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:42.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "rescuing", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:56.566 193 INFO tempest.lib.common.rest_client [req-900eb4b4-5778-4368-9f1e-90a465fb5da5 ] Request (PortsRbacTest:test_update_port_binding_host_id): 201 POST http://172.30.13.94:9696/v2.0/ports 1.711s 2020-12-14 02:16:56.570 193 DEBUG tempest.lib.common.rest_client [req-900eb4b4-5778-4368-9f1e-90a465fb5da5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "binding:host_id": "rbac_test_host", "name": "tempest-PortsRbacTest-1191815735"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1112', 'x-openstack-request-id': 'req-900eb4b4-5778-4368-9f1e-90a465fb5da5', 'date': 'Mon, 14 Dec 2020 02:16:56 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"df84afbf-b6a3-4f70-b97b-6a860a8e20a7","name":"tempest-PortsRbacTest-1191815735","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:0b:40:0d","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.99"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"rbac_test_host","binding:vif_type":"binding_failed","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.99","hostname":"host-192-168-120-99","fqdn":"host-192-168-120-99.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:55Z","updated_at":"2020-12-14T02:16:55Z","revision_number":1,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:56.573 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:56.634 193 INFO tempest.lib.common.rest_client [req-6afd2c61-c5cd-4f54-bd3c-0629a289960d ] Request (PortsRbacTest:test_update_port_binding_host_id): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.056s 2020-12-14 02:16:56.637 193 DEBUG tempest.lib.common.rest_client [req-6afd2c61-c5cd-4f54-bd3c-0629a289960d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6afd2c61-c5cd-4f54-bd3c-0629a289960d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:56.684 193 INFO tempest.lib.common.rest_client [req-1f6b8759-af57-482e-a6b4-c8b7066833c5 ] Request (PortsRbacTest:test_update_port_binding_host_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:16:56.688 193 DEBUG tempest.lib.common.rest_client [req-1f6b8759-af57-482e-a6b4-c8b7066833c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f6b8759-af57-482e-a6b4-c8b7066833c5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["8FkIPgnYRCiSwqWnf-B46A"], "expires_at": "2020-12-14T03:16:56.000000Z", "issued_at": "2020-12-14T02:16:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:56.723 186 INFO tempest.lib.common.rest_client [req-3d09e4b9-67c6-40b8-a4b5-60a5c5c5136c ] Request (ServerMetadataRbacTest:setUp): 200 PUT http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata 0.206s 2020-12-14 02:16:56.726 186 DEBUG tempest.lib.common.rest_client [req-3d09e4b9-67c6-40b8-a4b5-60a5c5c5136c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"default_key": "value1", "delete_key": "value2"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '63', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3d09e4b9-67c6-40b8-a4b5-60a5c5c5136c', 'x-compute-request-id': 'req-3d09e4b9-67c6-40b8-a4b5-60a5c5c5136c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata'} Body: b'{"metadata": {"default_key": "value1", "delete_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:56.741 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:56.745 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.748 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.751 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.754 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.758 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.761 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.766 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.769 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.771 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.774 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.777 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.779 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.782 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.785 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.788 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.791 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.794 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.796 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.799 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.802 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.804 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.807 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.809 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.812 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.814 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.817 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.820 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.822 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.825 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.827 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.830 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.832 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.835 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.838 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.840 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.843 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.846 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.848 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.852 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.855 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.857 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.860 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.863 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.866 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.869 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.872 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.874 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.877 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.880 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.882 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.885 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.888 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.891 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.893 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.897 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.899 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.905 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.908 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.910 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.914 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.916 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.919 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.921 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.924 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.927 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.929 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.932 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.935 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.937 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.940 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.942 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:56.954 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:server-metadata:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:56.956 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:57.023 186 INFO tempest.lib.common.rest_client [req-f33f1645-2672-4f97-a4a8-225a3bd9f57a ] Request (ServerMetadataRbacTest:test_show_server_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles 0.061s 2020-12-14 02:16:57.027 186 DEBUG tempest.lib.common.rest_client [req-f33f1645-2672-4f97-a4a8-225a3bd9f57a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f33f1645-2672-4f97-a4a8-225a3bd9f57a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:57.079 186 INFO tempest.lib.common.rest_client [req-ce23a73c-9248-4591-a02d-0849817b163e ] Request (ServerMetadataRbacTest:test_show_server_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:16:57.081 186 DEBUG tempest.lib.common.rest_client [req-ce23a73c-9248-4591-a02d-0849817b163e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce23a73c-9248-4591-a02d-0849817b163e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fdd4aec086bf411486f075e6837bc36c", "name": "tempest-ServerMetadataRbacTest-1730955355", "password_expires_at": null}, "audit_ids": ["ZD1ZVQbySJuDhNcRUGsMxg"], "expires_at": "2020-12-14T03:16:57.000000Z", "issued_at": "2020-12-14T02:16:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ef7d365f8304c6c871d57337acc5adf", "name": "tempest-ServerMetadataRbacTest-1730955355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:57.241 186 INFO tempest.lib.common.rest_client [req-43ae2e27-4460-43a6-80b8-5ec6280d64d3 ] Request (ServerMetadataRbacTest:test_show_server_metadata_item): 200 GET http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata/default_key 0.153s 2020-12-14 02:16:57.245 186 DEBUG tempest.lib.common.rest_client [req-43ae2e27-4460-43a6-80b8-5ec6280d64d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '35', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-43ae2e27-4460-43a6-80b8-5ec6280d64d3', 'x-compute-request-id': 'req-43ae2e27-4460-43a6-80b8-5ec6280d64d3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata/default_key'} Body: b'{"meta": {"default_key": "value1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:57.256 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:57.322 186 INFO tempest.lib.common.rest_client [req-e18a683b-1f23-4d01-bb77-19153900d59e ] Request (ServerMetadataRbacTest:test_show_server_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles 0.060s 2020-12-14 02:16:57.326 186 DEBUG tempest.lib.common.rest_client [req-e18a683b-1f23-4d01-bb77-19153900d59e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e18a683b-1f23-4d01-bb77-19153900d59e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:57.376 186 INFO tempest.lib.common.rest_client [req-eece258a-e987-49d6-8925-6cb3e6052626 ] Request (ServerMetadataRbacTest:test_show_server_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:16:57.379 186 DEBUG tempest.lib.common.rest_client [req-eece258a-e987-49d6-8925-6cb3e6052626 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eece258a-e987-49d6-8925-6cb3e6052626', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fdd4aec086bf411486f075e6837bc36c", "name": "tempest-ServerMetadataRbacTest-1730955355", "password_expires_at": null}, "audit_ids": ["uGXn_mSXTWm_KueI0LVq6g"], "expires_at": "2020-12-14T03:16:57.000000Z", "issued_at": "2020-12-14T02:16:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ef7d365f8304c6c871d57337acc5adf", "name": "tempest-ServerMetadataRbacTest-1730955355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:57.455 189 INFO tempest.lib.common.rest_client [req-3b2ff90c-9c04-40c6-955d-92366634ebe8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.259s 2020-12-14 02:16:57.458 189 DEBUG tempest.lib.common.rest_client [req-3b2ff90c-9c04-40c6-955d-92366634ebe8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3b2ff90c-9c04-40c6-955d-92366634ebe8', 'x-compute-request-id': 'req-3b2ff90c-9c04-40c6-955d-92366634ebe8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:57.698 186 INFO tempest.lib.common.rest_client [req-7fd35282-c99a-4011-a33a-060f699affd2 ] Request (ServerMetadataRbacTest:setUp): 200 PUT http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata 0.289s 2020-12-14 02:16:57.701 186 DEBUG tempest.lib.common.rest_client [req-7fd35282-c99a-4011-a33a-060f699affd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"default_key": "value1", "delete_key": "value2"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '63', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7fd35282-c99a-4011-a33a-060f699affd2', 'x-compute-request-id': 'req-7fd35282-c99a-4011-a33a-060f699affd2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata'} Body: b'{"metadata": {"default_key": "value1", "delete_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:57.714 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:57.717 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.720 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.723 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.725 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.728 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.731 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.735 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.738 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.740 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.742 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.744 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.747 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.749 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.751 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.754 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.756 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.759 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.761 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.763 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.765 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.767 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.770 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.772 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.774 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.776 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.778 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.780 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.782 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.784 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.786 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.789 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.791 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.793 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.796 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.798 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.800 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.803 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.805 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.807 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.810 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.812 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.814 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.816 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.819 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.821 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.823 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.825 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.827 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.830 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.832 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.834 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.836 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.838 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.841 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.843 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.845 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.847 193 INFO tempest.lib.common.rest_client [req-c8957dfb-427f-4a03-ad76-3ddb68c456d8 ] Request (PortsRbacTest:test_update_port_binding_host_id): 200 PUT http://172.30.13.94:9696/v2.0/ports/df84afbf-b6a3-4f70-b97b-6a860a8e20a7 1.151s 2020-12-14 02:16:57.850 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.850 193 DEBUG tempest.lib.common.rest_client [req-c8957dfb-427f-4a03-ad76-3ddb68c456d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"binding:host_id": "rbac_test_host_updated"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1120', 'x-openstack-request-id': 'req-c8957dfb-427f-4a03-ad76-3ddb68c456d8', 'date': 'Mon, 14 Dec 2020 02:16:57 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/df84afbf-b6a3-4f70-b97b-6a860a8e20a7'} Body: b'{"port":{"id":"df84afbf-b6a3-4f70-b97b-6a860a8e20a7","name":"tempest-PortsRbacTest-1191815735","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:0b:40:0d","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.99"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"rbac_test_host_updated","binding:vif_type":"binding_failed","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.99","hostname":"host-192-168-120-99","fqdn":"host-192-168-120-99.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:55Z","updated_at":"2020-12-14T02:16:57Z","revision_number":3,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:57.852 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.853 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:57.854 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.856 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.858 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.860 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.862 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.864 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.866 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.869 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.871 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.873 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.875 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.877 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.879 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:16:57.888 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:server-metadata:create, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:57.890 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:57.929 193 INFO tempest.lib.common.rest_client [req-0fdd4575-9344-4ebb-a9ee-f83ed6014ad0 ] Request (PortsRbacTest:test_update_port_binding_host_id): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.070s 2020-12-14 02:16:57.932 193 DEBUG tempest.lib.common.rest_client [req-0fdd4575-9344-4ebb-a9ee-f83ed6014ad0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0fdd4575-9344-4ebb-a9ee-f83ed6014ad0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:57.934 197 INFO tempest.lib.common.rest_client [req-30606039-3649-48d2-96b7-0a63d8b94171 ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.274s 2020-12-14 02:16:57.937 197 DEBUG tempest.lib.common.rest_client [req-30606039-3649-48d2-96b7-0a63d8b94171 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-30606039-3649-48d2-96b7-0a63d8b94171', 'x-compute-request-id': 'req-30606039-3649-48d2-96b7-0a63d8b94171', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:50Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:42.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "rescuing", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:57.955 186 INFO tempest.lib.common.rest_client [req-80d3bdc1-0b11-4333-b79a-b941cf22b542 ] Request (ServerMetadataRbacTest:test_update_server_metadata): 200 GET http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles 0.060s 2020-12-14 02:16:57.959 186 DEBUG tempest.lib.common.rest_client [req-80d3bdc1-0b11-4333-b79a-b941cf22b542 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-80d3bdc1-0b11-4333-b79a-b941cf22b542', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:57.986 193 INFO tempest.lib.common.rest_client [req-ce67bad8-cd49-4fdb-b8d1-52b2edc15b2b ] Request (PortsRbacTest:test_update_port_binding_host_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:16:57.991 193 DEBUG tempest.lib.common.rest_client [req-ce67bad8-cd49-4fdb-b8d1-52b2edc15b2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce67bad8-cd49-4fdb-b8d1-52b2edc15b2b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["88XDQH2sTnOfzRejIFW9rQ"], "expires_at": "2020-12-14T03:16:57.000000Z", "issued_at": "2020-12-14T02:16:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:58.005 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:58.016 186 INFO tempest.lib.common.rest_client [req-f1218e0d-ed29-4f5c-ba86-5678ff497628 ] Request (ServerMetadataRbacTest:test_update_server_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:16:58.020 186 DEBUG tempest.lib.common.rest_client [req-f1218e0d-ed29-4f5c-ba86-5678ff497628 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1218e0d-ed29-4f5c-ba86-5678ff497628', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fdd4aec086bf411486f075e6837bc36c", "name": "tempest-ServerMetadataRbacTest-1730955355", "password_expires_at": null}, "audit_ids": ["8RGhc84JQFep_4aByy1UAQ"], "expires_at": "2020-12-14T03:16:57.000000Z", "issued_at": "2020-12-14T02:16:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ef7d365f8304c6c871d57337acc5adf", "name": "tempest-ServerMetadataRbacTest-1730955355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:58.032 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:58.035 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:58.059 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:58.061 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:16:58.083 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port:binding:profile, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:16:58.286 186 INFO tempest.lib.common.rest_client [req-55670da9-25bc-4638-9e0e-0621f7f524c4 ] Request (ServerMetadataRbacTest:test_update_server_metadata): 200 POST http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata 0.259s 2020-12-14 02:16:58.289 186 DEBUG tempest.lib.common.rest_client [req-55670da9-25bc-4638-9e0e-0621f7f524c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '63', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-55670da9-25bc-4638-9e0e-0621f7f524c4', 'x-compute-request-id': 'req-55670da9-25bc-4638-9e0e-0621f7f524c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c/metadata'} Body: b'{"metadata": {"default_key": "value1", "delete_key": "value2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:58.302 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:58.372 186 INFO tempest.lib.common.rest_client [req-35baa510-5a4e-4d23-ad90-58b584232558 ] Request (ServerMetadataRbacTest:test_update_server_metadata): 200 GET http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles 0.065s 2020-12-14 02:16:58.375 186 DEBUG tempest.lib.common.rest_client [req-35baa510-5a4e-4d23-ad90-58b584232558 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-35baa510-5a4e-4d23-ad90-58b584232558', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf/users/fdd4aec086bf411486f075e6837bc36c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:58.429 186 INFO tempest.lib.common.rest_client [req-f19ab31f-eed9-4209-8ec7-d85fa33f7676 ] Request (ServerMetadataRbacTest:test_update_server_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:16:58.432 186 DEBUG tempest.lib.common.rest_client [req-f19ab31f-eed9-4209-8ec7-d85fa33f7676 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f19ab31f-eed9-4209-8ec7-d85fa33f7676', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fdd4aec086bf411486f075e6837bc36c", "name": "tempest-ServerMetadataRbacTest-1730955355", "password_expires_at": null}, "audit_ids": ["Tm6OG-p9SH-N-muUyZDzrw"], "expires_at": "2020-12-14T03:16:58.000000Z", "issued_at": "2020-12-14T02:16:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ef7d365f8304c6c871d57337acc5adf", "name": "tempest-ServerMetadataRbacTest-1730955355"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ef7d365f8304c6c871d57337acc5adf", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:58.705 186 INFO tempest.lib.common.rest_client [req-b08aa274-0bdc-4ceb-a0e0-ff0a8c89de8c ] Request (ServerMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c 0.245s 2020-12-14 02:16:58.709 186 DEBUG tempest.lib.common.rest_client [req-b08aa274-0bdc-4ceb-a0e0-ff0a8c89de8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b08aa274-0bdc-4ceb-a0e0-ff0a8c89de8c', 'x-compute-request-id': 'req-b08aa274-0bdc-4ceb-a0e0-ff0a8c89de8c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:58.785 189 INFO tempest.lib.common.rest_client [req-fd6554be-5f23-4ed9-a7ea-438c377b5ea3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.218s 2020-12-14 02:16:58.787 189 DEBUG tempest.lib.common.rest_client [req-fd6554be-5f23-4ed9-a7ea-438c377b5ea3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fd6554be-5f23-4ed9-a7ea-438c377b5ea3', 'x-compute-request-id': 'req-fd6554be-5f23-4ed9-a7ea-438c377b5ea3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:58.948 186 INFO tempest.lib.common.rest_client [req-09a19b20-b477-4622-b927-9ff21d00de20 ] Request (ServerMetadataRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c 0.233s 2020-12-14 02:16:58.951 186 DEBUG tempest.lib.common.rest_client [req-09a19b20-b477-4622-b927-9ff21d00de20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1773', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-09a19b20-b477-4622-b927-9ff21d00de20', 'x-compute-request-id': 'req-09a19b20-b477-4622-b927-9ff21d00de20', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c'} Body: b'{"server": {"id": "913e8d28-6913-44af-85b7-801bbbe2420c", "name": "tempest-ServerMetadataRbacTest-server-1866062397", "status": "ACTIVE", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "user_id": "fdd4aec086bf411486f075e6837bc36c", "metadata": {"default_key": "value1", "delete_key": "value2"}, "hostId": "a86b3682a2bad9876385865ce13b3a0a046ab9c3a9a6655ec666a8ec", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:42Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-ServerMetadataRbacTest-1809872202-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:7f:96:5c"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:59.089 193 INFO tempest.lib.common.rest_client [req-f60f3770-e40a-43dc-a08b-9a572e81e2ad ] Request (PortsRbacTest:test_update_port_binding_profile): 201 POST http://172.30.13.94:9696/v2.0/ports 1.000s 2020-12-14 02:16:59.093 193 DEBUG tempest.lib.common.rest_client [req-f60f3770-e40a-43dc-a08b-9a572e81e2ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "binding:profile": {"foo": "1"}, "name": "tempest-PortsRbacTest-2122577087"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1100', 'x-openstack-request-id': 'req-f60f3770-e40a-43dc-a08b-9a572e81e2ad', 'date': 'Mon, 14 Dec 2020 02:16:59 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"42a71999-e754-4ee5-935e-597317f34236","name":"tempest-PortsRbacTest-2122577087","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:99:e0:0c","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.45"}],"project_id":"5d2b22c24509439eb518838e24b766b7","port_security_enabled":true,"qos_policy_id":null,"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"binding:vnic_type":"normal","binding:profile":{"foo":"1"},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.45","hostname":"host-192-168-120-45","fqdn":"host-192-168-120-45.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:58Z","updated_at":"2020-12-14T02:16:58Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:59.097 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:59.170 193 INFO tempest.lib.common.rest_client [req-4679cb15-6aae-4ae3-ad32-d04248097dd9 ] Request (PortsRbacTest:test_update_port_binding_profile): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.067s 2020-12-14 02:16:59.173 193 DEBUG tempest.lib.common.rest_client [req-4679cb15-6aae-4ae3-ad32-d04248097dd9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4679cb15-6aae-4ae3-ad32-d04248097dd9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:59.225 193 INFO tempest.lib.common.rest_client [req-62a73b77-fb63-4c4d-8591-1fbbb715a646 ] Request (PortsRbacTest:test_update_port_binding_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:16:59.229 193 DEBUG tempest.lib.common.rest_client [req-62a73b77-fb63-4c4d-8591-1fbbb715a646 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-62a73b77-fb63-4c4d-8591-1fbbb715a646', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["lgL2UxhCQ4GpJO-lSqFc1Q"], "expires_at": "2020-12-14T03:16:59.000000Z", "issued_at": "2020-12-14T02:16:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:59.414 197 INFO tempest.lib.common.rest_client [req-986ab8f4-cb58-40bf-b3d3-d3db14c374a0 ] Request (MiscPolicyActionsRbacTest:test_rescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.365s 2020-12-14 02:16:59.418 197 DEBUG tempest.lib.common.rest_client [req-986ab8f4-cb58-40bf-b3d3-d3db14c374a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-986ab8f4-cb58-40bf-b3d3-d3db14c374a0', 'x-compute-request-id': 'req-986ab8f4-cb58-40bf-b3d3-d3db14c374a0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:59.522 197 INFO tempest.common.waiters [-] State transition "ACTIVE/rescuing" ==> "RESCUE/None" after 4 second wait 2020-12-14 02:16:59.897 193 INFO tempest.lib.common.rest_client [req-4ffd5a4f-9235-47a4-bcb6-dfeef39533cf ] Request (PortsRbacTest:test_update_port_binding_profile): 200 PUT http://172.30.13.94:9696/v2.0/ports/42a71999-e754-4ee5-935e-597317f34236 0.659s 2020-12-14 02:16:59.901 193 DEBUG tempest.lib.common.rest_client [req-4ffd5a4f-9235-47a4-bcb6-dfeef39533cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"binding:profile": {"foo": "2"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '1100', 'x-openstack-request-id': 'req-4ffd5a4f-9235-47a4-bcb6-dfeef39533cf', 'date': 'Mon, 14 Dec 2020 02:16:59 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/42a71999-e754-4ee5-935e-597317f34236'} Body: b'{"port":{"id":"42a71999-e754-4ee5-935e-597317f34236","name":"tempest-PortsRbacTest-2122577087","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:99:e0:0c","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.45"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{"foo":"2"},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.45","hostname":"host-192-168-120-45","fqdn":"host-192-168-120-45.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:58Z","updated_at":"2020-12-14T02:16:58Z","revision_number":1,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:16:59.904 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:16:59.966 193 INFO tempest.lib.common.rest_client [req-bd1d2b5d-d75d-455c-8860-c99b22272606 ] Request (PortsRbacTest:test_update_port_binding_profile): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.056s 2020-12-14 02:16:59.969 193 DEBUG tempest.lib.common.rest_client [req-bd1d2b5d-d75d-455c-8860-c99b22272606 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd1d2b5d-d75d-455c-8860-c99b22272606', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:00.017 193 INFO tempest.lib.common.rest_client [req-fc5e6d54-0075-46fe-8b70-44eaad6ad7d5 ] Request (PortsRbacTest:test_update_port_binding_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:17:00.021 193 DEBUG tempest.lib.common.rest_client [req-fc5e6d54-0075-46fe-8b70-44eaad6ad7d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc5e6d54-0075-46fe-8b70-44eaad6ad7d5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["yiXCQCLgSueskH4mdI5ZCg"], "expires_at": "2020-12-14T03:17:00.000000Z", "issued_at": "2020-12-14T02:17:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:00.034 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:00.039 197 INFO tempest.lib.common.rest_client [req-3c47e9d5-f622-4aa4-b70d-3971133998b8 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.479s 2020-12-14 02:17:00.042 197 DEBUG tempest.lib.common.rest_client [req-3c47e9d5-f622-4aa4-b70d-3971133998b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3c47e9d5-f622-4aa4-b70d-3971133998b8', 'x-compute-request-id': 'req-3c47e9d5-f622-4aa4-b70d-3971133998b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:00.060 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:00.063 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:00.087 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:00.089 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:00.098 189 INFO tempest.lib.common.rest_client [req-4d37556f-dcf5-499e-a87b-87d5cb6746d4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.223s 2020-12-14 02:17:00.101 189 DEBUG tempest.lib.common.rest_client [req-4d37556f-dcf5-499e-a87b-87d5cb6746d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:16:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4d37556f-dcf5-499e-a87b-87d5cb6746d4', 'x-compute-request-id': 'req-4d37556f-dcf5-499e-a87b-87d5cb6746d4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:00.112 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port:device_owner, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:00.114 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:00.180 193 INFO tempest.lib.common.rest_client [req-664e3366-4d56-4f37-8f17-a1784c134da2 ] Request (PortsRbacTest:test_update_port_device_owner): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.059s 2020-12-14 02:17:00.184 193 DEBUG tempest.lib.common.rest_client [req-664e3366-4d56-4f37-8f17-a1784c134da2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-664e3366-4d56-4f37-8f17-a1784c134da2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:00.234 193 INFO tempest.lib.common.rest_client [req-4ee88176-7a0d-405b-88ec-e0faaee37b7c ] Request (PortsRbacTest:test_update_port_device_owner): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:17:00.237 193 DEBUG tempest.lib.common.rest_client [req-4ee88176-7a0d-405b-88ec-e0faaee37b7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ee88176-7a0d-405b-88ec-e0faaee37b7c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["c439P2Z9Qx63cKLgwztt1Q"], "expires_at": "2020-12-14T03:17:00.000000Z", "issued_at": "2020-12-14T02:17:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:00.238 186 INFO tempest.lib.common.rest_client [req-d9dd3665-acdf-4167-aee5-4e5e813bbd48 ] Request (ServerMetadataRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c 0.176s 2020-12-14 02:17:00.241 186 DEBUG tempest.lib.common.rest_client [req-d9dd3665-acdf-4167-aee5-4e5e813bbd48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d9dd3665-acdf-4167-aee5-4e5e813bbd48', 'x-compute-request-id': 'req-d9dd3665-acdf-4167-aee5-4e5e813bbd48', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c'} Body: b'{"server": {"id": "913e8d28-6913-44af-85b7-801bbbe2420c", "name": "tempest-ServerMetadataRbacTest-server-1866062397", "status": "ACTIVE", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "user_id": "fdd4aec086bf411486f075e6837bc36c", "metadata": {"default_key": "value1", "delete_key": "value2"}, "hostId": "a86b3682a2bad9876385865ce13b3a0a046ab9c3a9a6655ec666a8ec", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:42Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-ServerMetadataRbacTest-1809872202-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:7f:96:5c"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/913e8d28-6913-44af-85b7-801bbbe2420c"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:50.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd2", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:00.783 193 INFO tempest.lib.common.rest_client [req-b72f7539-d595-482a-8b74-4bd566adf270 ] Request (PortsRbacTest:test_update_port_device_owner): 200 PUT http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d 0.539s 2020-12-14 02:17:00.787 193 DEBUG tempest.lib.common.rest_client [req-b72f7539-d595-482a-8b74-4bd566adf270 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"device_owner": "network:router_interface"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1114', 'x-openstack-request-id': 'req-b72f7539-d595-482a-8b74-4bd566adf270', 'date': 'Mon, 14 Dec 2020 02:17:00 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d'} Body: b'{"port":{"id":"af66f967-0722-4f89-8e19-d04d4339ee1d","name":"tempest-PortsRbacTest-629263402","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:86:e0:d7","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"network:router_interface","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.21"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.21","hostname":"host-192-168-120-21","fqdn":"host-192-168-120-21.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:20Z","updated_at":"2020-12-14T02:17:00Z","revision_number":4,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:00.791 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:00.857 193 INFO tempest.lib.common.rest_client [req-d18d474b-843f-4e3c-a678-d193d09df078 ] Request (PortsRbacTest:test_update_port_device_owner): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.060s 2020-12-14 02:17:00.860 193 DEBUG tempest.lib.common.rest_client [req-d18d474b-843f-4e3c-a678-d193d09df078 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d18d474b-843f-4e3c-a678-d193d09df078', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:00.918 193 INFO tempest.lib.common.rest_client [req-9081361e-5aab-48c7-b018-268c582dc1c8 ] Request (PortsRbacTest:test_update_port_device_owner): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:17:00.921 193 DEBUG tempest.lib.common.rest_client [req-9081361e-5aab-48c7-b018-268c582dc1c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9081361e-5aab-48c7-b018-268c582dc1c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["_Lxl4bhVSvGk0DuCkycUuA"], "expires_at": "2020-12-14T03:17:00.000000Z", "issued_at": "2020-12-14T02:17:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:01.391 197 INFO tempest.lib.common.rest_client [req-ff017889-fc8b-4e06-b0b8-de1deb41ab49 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.243s 2020-12-14 02:17:01.394 197 DEBUG tempest.lib.common.rest_client [req-ff017889-fc8b-4e06-b0b8-de1deb41ab49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ff017889-fc8b-4e06-b0b8-de1deb41ab49', 'x-compute-request-id': 'req-ff017889-fc8b-4e06-b0b8-de1deb41ab49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:01.421 189 INFO tempest.lib.common.rest_client [req-5f147e9f-808a-4612-857d-c79dd6f85b79 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.234s 2020-12-14 02:17:01.425 189 DEBUG tempest.lib.common.rest_client [req-5f147e9f-808a-4612-857d-c79dd6f85b79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5f147e9f-808a-4612-857d-c79dd6f85b79', 'x-compute-request-id': 'req-5f147e9f-808a-4612-857d-c79dd6f85b79', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:01.431 186 INFO tempest.lib.common.rest_client [req-3688ce7b-2cc7-4700-9a04-d20a3f42c4cd ] Request (ServerMetadataRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c 0.079s 2020-12-14 02:17:01.434 186 DEBUG tempest.lib.common.rest_client [req-3688ce7b-2cc7-4700-9a04-d20a3f42c4cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-3688ce7b-2cc7-4700-9a04-d20a3f42c4cd', 'x-compute-request-id': 'req-3688ce7b-2cc7-4700-9a04-d20a3f42c4cd', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/913e8d28-6913-44af-85b7-801bbbe2420c'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 913e8d28-6913-44af-85b7-801bbbe2420c could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:01.436 186 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': 'fb2e3a54-e8a8-4643-b148-3f3bf1953bf4', 'name': 'tempest-ServerMetadataRbacTest-1809872202-network', 'tenant_id': '1ef7d365f8304c6c871d57337acc5adf', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '1ef7d365f8304c6c871d57337acc5adf', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:16:31Z', 'updated_at': '2020-12-14T02:16:31Z', 'revision_number': 1}, subnet: {'id': '5627aefa-babe-41d1-83ef-cb14c2b63cb4', 'name': 'tempest-ServerMetadataRbacTest-1809872202-subnet', 'tenant_id': '1ef7d365f8304c6c871d57337acc5adf', 'network_id': 'fb2e3a54-e8a8-4643-b148-3f3bf1953bf4', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:16:32Z', 'updated_at': '2020-12-14T02:16:32Z', 'revision_number': 0, 'project_id': '1ef7d365f8304c6c871d57337acc5adf'}, router: {'id': 'a25c06fc-2a9a-4336-bb93-e4f100dff742', 'name': 'tempest-ServerMetadataRbacTest-1809872202-router', 'tenant_id': '1ef7d365f8304c6c871d57337acc5adf', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.164'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::a3'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:16:32Z', 'updated_at': '2020-12-14T02:16:33Z', 'revision_number': 3, 'project_id': '1ef7d365f8304c6c871d57337acc5adf'} _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:17:01.553 193 INFO tempest.lib.common.rest_client [req-ec0f41a2-491c-40b6-8fba-c8bbe9886de3 ] Request (PortsRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d 0.622s 2020-12-14 02:17:01.556 193 DEBUG tempest.lib.common.rest_client [req-ec0f41a2-491c-40b6-8fba-c8bbe9886de3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"device_owner": ""}} Response - Headers: {'content-type': 'application/json', 'content-length': '1090', 'x-openstack-request-id': 'req-ec0f41a2-491c-40b6-8fba-c8bbe9886de3', 'date': 'Mon, 14 Dec 2020 02:17:01 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d'} Body: b'{"port":{"id":"af66f967-0722-4f89-8e19-d04d4339ee1d","name":"tempest-PortsRbacTest-629263402","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:86:e0:d7","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.21"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.21","hostname":"host-192-168-120-21","fqdn":"host-192-168-120-21.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:20Z","updated_at":"2020-12-14T02:17:01Z","revision_number":5,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:01.568 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:01.595 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:01.597 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:01.622 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:01.624 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:01.651 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port:fixed_ips:ip_address, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:02.536 193 INFO tempest.lib.common.rest_client [req-d209108c-b335-4fd8-852b-e27d156bc8d0 ] Request (PortsRbacTest:test_update_port_fixed_ips_ip_address): 201 POST http://172.30.13.94:9696/v2.0/ports 0.881s 2020-12-14 02:17:02.539 193 DEBUG tempest.lib.common.rest_client [req-d209108c-b335-4fd8-852b-e27d156bc8d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "9b3f8864-8a15-49e7-9e20-d2c6badb1cd4", "name": "tempest-PortsRbacTest-2120403355"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1091', 'x-openstack-request-id': 'req-d209108c-b335-4fd8-852b-e27d156bc8d0', 'date': 'Mon, 14 Dec 2020 02:17:02 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"a3b0d2e5-9d62-4028-9948-8436762fe6c3","name":"tempest-PortsRbacTest-2120403355","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:ee:66:65","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.49"}],"project_id":"5d2b22c24509439eb518838e24b766b7","port_security_enabled":true,"qos_policy_id":null,"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.49","hostname":"host-192-168-120-49","fqdn":"host-192-168-120-49.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:17:01Z","updated_at":"2020-12-14T02:17:02Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:02.685 193 INFO tempest.lib.common.rest_client [req-1a1f2218-4eca-4cc5-8f72-69bb77b44afe ] Request (PortsRbacTest:test_update_port_fixed_ips_ip_address): 200 GET http://172.30.13.94:9696/v2.0/ports?network_id=9b3f8864-8a15-49e7-9e20-d2c6badb1cd4 0.140s 2020-12-14 02:17:02.689 193 DEBUG tempest.lib.common.rest_client [req-1a1f2218-4eca-4cc5-8f72-69bb77b44afe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '17909', 'x-openstack-request-id': 'req-1a1f2218-4eca-4cc5-8f72-69bb77b44afe', 'date': 'Mon, 14 Dec 2020 02:17:02 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?network_id=9b3f8864-8a15-49e7-9e20-d2c6badb1cd4'} Body: b'{"ports":[{"id":"1424d9a0-aa2a-498b-912a-6e620e14fdca","name":"tempest-PortsRbacTest-875917120","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:73:e6:3a","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.75"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"rbac_test_host","binding:vif_type":"binding_failed","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.75","hostname":"host-192-168-120-75","fqdn":"host-192-168-120-75.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:24Z","updated_at":"2020-12-14T02:16:29Z","revision_number":2,"project_id":"5d2b22c24509439eb518838e24b766b7"},{"id":"2274dcfa-e06d-468c-bd1c-19d95731a8c8","name":"tempest-PortsRbacTest-209437603","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:1f:c3:e8","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.80"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.80","hostname":"host-192-168-120-80","fqdn":"host-192-168-120-80.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:37Z","updated_at":"2020-12-14T02:16:42Z","revision_number":1,"project_id":"5d2b22c24509439eb518838e24b766b7"},{"id":"3b467498-f923-45f2-b704-0474df7e1268","name":"tempest-PortsRbacTest-559294540","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:d9:f3:ec","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.60"}],"allowed_address_pairs":[{"mac_address":"fa:16:3e:a5:5c:d3","ip_address":"192.168.120.253"}],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.60","hostname":"host-192-168-120-60","fqdn":"host-192-168-120-60.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:53Z","updated_at":"2020-12-14T02:16:54Z","revision_number":2,"project_id":"5d2b22c24509439eb518838e24b766b7"},{"id":"3cce41bf-5406-433d-9e31-d145f5caa075","name":"tempest-PortsRbacTest-1282087528","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:f0:5a:a0","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.127"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:02.740 197 INFO tempest.lib.common.rest_client [req-7191d326-c3ab-4148-aa9d-bf46f049c9dc ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.239s 2020-12-14 02:17:02.743 197 DEBUG tempest.lib.common.rest_client [req-7191d326-c3ab-4148-aa9d-bf46f049c9dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7191d326-c3ab-4148-aa9d-bf46f049c9dc', 'x-compute-request-id': 'req-7191d326-c3ab-4148-aa9d-bf46f049c9dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:02.757 189 INFO tempest.lib.common.rest_client [req-f528aa40-5aea-463c-a515-73f85d90bf89 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.226s 2020-12-14 02:17:02.760 189 DEBUG tempest.lib.common.rest_client [req-f528aa40-5aea-463c-a515-73f85d90bf89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f528aa40-5aea-463c-a515-73f85d90bf89', 'x-compute-request-id': 'req-f528aa40-5aea-463c-a515-73f85d90bf89', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:02.783 193 INFO tempest.lib.common.rest_client [req-7128223b-df5e-479d-94dc-34e41bf98f4e ] Request (PortsRbacTest:test_update_port_fixed_ips_ip_address): 200 GET http://172.30.13.94:9696/v2.0/subnets/5804389f-c655-4f7f-855c-f96ce18290fc 0.084s 2020-12-14 02:17:02.787 193 DEBUG tempest.lib.common.rest_client [req-7128223b-df5e-479d-94dc-34e41bf98f4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '662', 'x-openstack-request-id': 'req-7128223b-df5e-479d-94dc-34e41bf98f4e', 'date': 'Mon, 14 Dec 2020 02:17:02 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/5804389f-c655-4f7f-855c-f96ce18290fc'} Body: b'{"subnet":{"id":"5804389f-c655-4f7f-855c-f96ce18290fc","name":"","tenant_id":"5d2b22c24509439eb518838e24b766b7","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/24","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:16:19Z","updated_at":"2020-12-14T02:16:19Z","revision_number":0,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:03.015 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:03.082 193 INFO tempest.lib.common.rest_client [req-79336879-4b85-47b9-9323-62675c71478f ] Request (PortsRbacTest:test_update_port_fixed_ips_ip_address): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.062s 2020-12-14 02:17:03.085 193 DEBUG tempest.lib.common.rest_client [req-79336879-4b85-47b9-9323-62675c71478f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79336879-4b85-47b9-9323-62675c71478f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:03.138 193 INFO tempest.lib.common.rest_client [req-2b718b23-f9b5-4279-8002-b53c115190bf ] Request (PortsRbacTest:test_update_port_fixed_ips_ip_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:17:03.141 193 DEBUG tempest.lib.common.rest_client [req-2b718b23-f9b5-4279-8002-b53c115190bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b718b23-f9b5-4279-8002-b53c115190bf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["Odiuz9OkQGWgilphPjSYvw"], "expires_at": "2020-12-14T03:17:03.000000Z", "issued_at": "2020-12-14T02:17:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:03.375 186 INFO tempest.lib.common.rest_client [req-d069bce9-d55f-488e-84c4-e5ef6f9e146b ] Request (ServerMetadataRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/a25c06fc-2a9a-4336-bb93-e4f100dff742/remove_router_interface 1.932s 2020-12-14 02:17:03.379 186 DEBUG tempest.lib.common.rest_client [req-d069bce9-d55f-488e-84c4-e5ef6f9e146b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "5627aefa-babe-41d1-83ef-cb14c2b63cb4"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-d069bce9-d55f-488e-84c4-e5ef6f9e146b', 'date': 'Mon, 14 Dec 2020 02:17:03 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/a25c06fc-2a9a-4336-bb93-e4f100dff742/remove_router_interface'} Body: b'{"id": "a25c06fc-2a9a-4336-bb93-e4f100dff742", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "port_id": "887cff29-bb90-4707-b224-2cf7690b9631", "network_id": "fb2e3a54-e8a8-4643-b148-3f3bf1953bf4", "subnet_id": "5627aefa-babe-41d1-83ef-cb14c2b63cb4", "subnet_ids": ["5627aefa-babe-41d1-83ef-cb14c2b63cb4"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:04.098 189 INFO tempest.lib.common.rest_client [req-e0713622-00dc-421a-bcd8-78ac501d32fe ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.215s 2020-12-14 02:17:04.102 189 DEBUG tempest.lib.common.rest_client [req-e0713622-00dc-421a-bcd8-78ac501d32fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e0713622-00dc-421a-bcd8-78ac501d32fe', 'x-compute-request-id': 'req-e0713622-00dc-421a-bcd8-78ac501d32fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:04.302 197 INFO tempest.lib.common.rest_client [req-117cd81b-f506-49d6-9ea2-c23e495e70c3 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.454s 2020-12-14 02:17:04.306 197 DEBUG tempest.lib.common.rest_client [req-117cd81b-f506-49d6-9ea2-c23e495e70c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-117cd81b-f506-49d6-9ea2-c23e495e70c3', 'x-compute-request-id': 'req-117cd81b-f506-49d6-9ea2-c23e495e70c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:04.308 193 INFO tempest.lib.common.rest_client [req-9ea7d163-18c1-4302-86f5-d6193742d678 ] Request (PortsRbacTest:test_update_port_fixed_ips_ip_address): 200 PUT http://172.30.13.94:9696/v2.0/ports/a3b0d2e5-9d62-4028-9948-8436762fe6c3 1.159s 2020-12-14 02:17:04.311 193 DEBUG tempest.lib.common.rest_client [req-9ea7d163-18c1-4302-86f5-d6193742d678 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"fixed_ips": [{"ip_address": "192.168.120.253"}]}} Response - Headers: {'content-type': 'application/json', 'content-length': '1095', 'x-openstack-request-id': 'req-9ea7d163-18c1-4302-86f5-d6193742d678', 'date': 'Mon, 14 Dec 2020 02:17:04 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/a3b0d2e5-9d62-4028-9948-8436762fe6c3'} Body: b'{"port":{"id":"a3b0d2e5-9d62-4028-9948-8436762fe6c3","name":"tempest-PortsRbacTest-2120403355","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:ee:66:65","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.253"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.253","hostname":"host-192-168-120-253","fqdn":"host-192-168-120-253.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:17:01Z","updated_at":"2020-12-14T02:17:03Z","revision_number":2,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:04.314 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:04.386 193 INFO tempest.lib.common.rest_client [req-48db11f0-9a65-41fd-8813-229d4f331f58 ] Request (PortsRbacTest:test_update_port_fixed_ips_ip_address): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.066s 2020-12-14 02:17:04.389 193 DEBUG tempest.lib.common.rest_client [req-48db11f0-9a65-41fd-8813-229d4f331f58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-48db11f0-9a65-41fd-8813-229d4f331f58', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:04.443 193 INFO tempest.lib.common.rest_client [req-17d1ba6c-cd8f-4f31-b159-0e904757fbe0 ] Request (PortsRbacTest:test_update_port_fixed_ips_ip_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:17:04.448 193 DEBUG tempest.lib.common.rest_client [req-17d1ba6c-cd8f-4f31-b159-0e904757fbe0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17d1ba6c-cd8f-4f31-b159-0e904757fbe0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["n1wOJw91TS-P-98-rZin5w"], "expires_at": "2020-12-14T03:17:04.000000Z", "issued_at": "2020-12-14T02:17:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:04.465 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:04.494 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:04.497 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:04.522 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:04.524 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:04.548 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port:mac_address, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:04.550 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:04.635 193 INFO tempest.lib.common.rest_client [req-91703edf-47f5-4dbd-aa0e-a6afc08cea24 ] Request (PortsRbacTest:test_update_port_mac_address): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.079s 2020-12-14 02:17:04.638 193 DEBUG tempest.lib.common.rest_client [req-91703edf-47f5-4dbd-aa0e-a6afc08cea24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-91703edf-47f5-4dbd-aa0e-a6afc08cea24', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:04.696 193 INFO tempest.lib.common.rest_client [req-56518be2-346f-4d5f-8ce7-3d3449c58c34 ] Request (PortsRbacTest:test_update_port_mac_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:17:04.700 193 DEBUG tempest.lib.common.rest_client [req-56518be2-346f-4d5f-8ce7-3d3449c58c34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56518be2-346f-4d5f-8ce7-3d3449c58c34', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["6YNd8qcCSmiCn0GkQMdztw"], "expires_at": "2020-12-14T03:17:04.000000Z", "issued_at": "2020-12-14T02:17:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:05.448 189 INFO tempest.lib.common.rest_client [req-7ac4bf7c-da2c-4f64-aa16-76f1ed8e86e0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.235s 2020-12-14 02:17:05.451 189 DEBUG tempest.lib.common.rest_client [req-7ac4bf7c-da2c-4f64-aa16-76f1ed8e86e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7ac4bf7c-da2c-4f64-aa16-76f1ed8e86e0', 'x-compute-request-id': 'req-7ac4bf7c-da2c-4f64-aa16-76f1ed8e86e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:05.577 193 INFO tempest.lib.common.rest_client [req-1877fdb4-fd35-4417-867e-f7340a4c8e51 ] Request (PortsRbacTest:test_update_port_mac_address): 200 PUT http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d 0.868s 2020-12-14 02:17:05.581 193 DEBUG tempest.lib.common.rest_client [req-1877fdb4-fd35-4417-867e-f7340a4c8e51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"mac_address": "fa:16:3e:b8:e1:99"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1090', 'x-openstack-request-id': 'req-1877fdb4-fd35-4417-867e-f7340a4c8e51', 'date': 'Mon, 14 Dec 2020 02:17:05 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d'} Body: b'{"port":{"id":"af66f967-0722-4f89-8e19-d04d4339ee1d","name":"tempest-PortsRbacTest-629263402","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:b8:e1:99","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.21"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.21","hostname":"host-192-168-120-21","fqdn":"host-192-168-120-21.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:20Z","updated_at":"2020-12-14T02:17:05Z","revision_number":6,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:05.584 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:05.658 193 INFO tempest.lib.common.rest_client [req-6d3c1ed1-fb4c-4c91-bb8c-687df88de465 ] Request (PortsRbacTest:test_update_port_mac_address): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.068s 2020-12-14 02:17:05.661 193 DEBUG tempest.lib.common.rest_client [req-6d3c1ed1-fb4c-4c91-bb8c-687df88de465 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d3c1ed1-fb4c-4c91-bb8c-687df88de465', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:05.690 197 INFO tempest.lib.common.rest_client [req-0d5a956c-caef-4aed-abd0-e4cc78ad0551 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.275s 2020-12-14 02:17:05.694 197 DEBUG tempest.lib.common.rest_client [req-0d5a956c-caef-4aed-abd0-e4cc78ad0551 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0d5a956c-caef-4aed-abd0-e4cc78ad0551', 'x-compute-request-id': 'req-0d5a956c-caef-4aed-abd0-e4cc78ad0551', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:05.714 193 INFO tempest.lib.common.rest_client [req-d2bb8e8b-4c57-4d2c-a7b0-c029b2f41920 ] Request (PortsRbacTest:test_update_port_mac_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:17:05.718 193 DEBUG tempest.lib.common.rest_client [req-d2bb8e8b-4c57-4d2c-a7b0-c029b2f41920 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2bb8e8b-4c57-4d2c-a7b0-c029b2f41920', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["JM9Z7c1DQjiv1qMiCWSg7A"], "expires_at": "2020-12-14T03:17:05.000000Z", "issued_at": "2020-12-14T02:17:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:06.585 193 INFO tempest.lib.common.rest_client [req-062032e8-9c02-44e4-bcde-b4128dee6ef8 ] Request (PortsRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d 0.856s 2020-12-14 02:17:06.589 193 DEBUG tempest.lib.common.rest_client [req-062032e8-9c02-44e4-bcde-b4128dee6ef8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"mac_address": "fa:16:3e:86:e0:d7"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1090', 'x-openstack-request-id': 'req-062032e8-9c02-44e4-bcde-b4128dee6ef8', 'date': 'Mon, 14 Dec 2020 02:17:06 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d'} Body: b'{"port":{"id":"af66f967-0722-4f89-8e19-d04d4339ee1d","name":"tempest-PortsRbacTest-629263402","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:86:e0:d7","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.21"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.21","hostname":"host-192-168-120-21","fqdn":"host-192-168-120-21.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:20Z","updated_at":"2020-12-14T02:17:06Z","revision_number":7,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:06.602 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:06.630 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:06.632 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:06.657 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:06.660 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:06.686 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_port:port_security_enabled, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:06.689 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:06.759 193 INFO tempest.lib.common.rest_client [req-320fdf0e-cc37-44d3-bfa3-a8f7a5d0d6db ] Request (PortsRbacTest:test_update_port_security_enabled): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.064s 2020-12-14 02:17:06.763 193 DEBUG tempest.lib.common.rest_client [req-320fdf0e-cc37-44d3-bfa3-a8f7a5d0d6db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-320fdf0e-cc37-44d3-bfa3-a8f7a5d0d6db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:06.817 193 INFO tempest.lib.common.rest_client [req-ff386687-e99c-44c8-b2f7-a939b321b97e ] Request (PortsRbacTest:test_update_port_security_enabled): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:17:06.821 193 DEBUG tempest.lib.common.rest_client [req-ff386687-e99c-44c8-b2f7-a939b321b97e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff386687-e99c-44c8-b2f7-a939b321b97e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["sDIMn2InS3eld4yY9H3iMg"], "expires_at": "2020-12-14T03:17:06.000000Z", "issued_at": "2020-12-14T02:17:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:06.861 189 INFO tempest.lib.common.rest_client [req-66b657b0-1f72-447d-8793-7bf80ded7f16 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.301s 2020-12-14 02:17:06.863 189 DEBUG tempest.lib.common.rest_client [req-66b657b0-1f72-447d-8793-7bf80ded7f16 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-66b657b0-1f72-447d-8793-7bf80ded7f16', 'x-compute-request-id': 'req-66b657b0-1f72-447d-8793-7bf80ded7f16', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:07.109 197 INFO tempest.lib.common.rest_client [req-58344476-e54a-4522-b6ab-ff78d4a7e4ef ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.297s 2020-12-14 02:17:07.113 197 DEBUG tempest.lib.common.rest_client [req-58344476-e54a-4522-b6ab-ff78d4a7e4ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-58344476-e54a-4522-b6ab-ff78d4a7e4ef', 'x-compute-request-id': 'req-58344476-e54a-4522-b6ab-ff78d4a7e4ef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:07.351 193 INFO tempest.lib.common.rest_client [req-06c497aa-0a0b-4810-a752-a445123ea505 ] Request (PortsRbacTest:test_update_port_security_enabled): 200 PUT http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d 0.521s 2020-12-14 02:17:07.354 193 DEBUG tempest.lib.common.rest_client [req-06c497aa-0a0b-4810-a752-a445123ea505 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"port_security_enabled": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '1090', 'x-openstack-request-id': 'req-06c497aa-0a0b-4810-a752-a445123ea505', 'date': 'Mon, 14 Dec 2020 02:17:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d'} Body: b'{"port":{"id":"af66f967-0722-4f89-8e19-d04d4339ee1d","name":"tempest-PortsRbacTest-629263402","network_id":"9b3f8864-8a15-49e7-9e20-d2c6badb1cd4","tenant_id":"5d2b22c24509439eb518838e24b766b7","mac_address":"fa:16:3e:86:e0:d7","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[{"subnet_id":"5804389f-c655-4f7f-855c-f96ce18290fc","ip_address":"192.168.120.21"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":["d47e8431-0063-44c8-a162-bc4020b774fc"],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"port_security_enabled":true,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.21","hostname":"host-192-168-120-21","fqdn":"host-192-168-120-21.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:16:20Z","updated_at":"2020-12-14T02:17:07Z","revision_number":8,"project_id":"5d2b22c24509439eb518838e24b766b7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:07.357 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:07.428 193 INFO tempest.lib.common.rest_client [req-e25bcaea-7fc6-4618-bd90-4ed08591675a ] Request (PortsRbacTest:test_update_port_security_enabled): 200 GET http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles 0.065s 2020-12-14 02:17:07.430 193 DEBUG tempest.lib.common.rest_client [req-e25bcaea-7fc6-4618-bd90-4ed08591675a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e25bcaea-7fc6-4618-bd90-4ed08591675a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7/users/993a9cf13c1c49e4acd7b4dc5ecdbe37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:07.486 193 INFO tempest.lib.common.rest_client [req-c8e0b723-1332-4661-a377-8af402e58ca2 ] Request (PortsRbacTest:test_update_port_security_enabled): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:17:07.489 193 DEBUG tempest.lib.common.rest_client [req-c8e0b723-1332-4661-a377-8af402e58ca2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6614', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8e0b723-1332-4661-a377-8af402e58ca2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "993a9cf13c1c49e4acd7b4dc5ecdbe37", "name": "tempest-PortsRbacTest-43811559", "password_expires_at": null}, "audit_ids": ["wt6pZXJKS8K3V_wl8PcT4g"], "expires_at": "2020-12-14T03:17:07.000000Z", "issued_at": "2020-12-14T02:17:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5d2b22c24509439eb518838e24b766b7", "name": "tempest-PortsRbacTest-43811559"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5d2b22c24509439eb518838e24b766b7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:08.170 193 INFO tempest.lib.common.rest_client [req-d2744d06-9ee1-4bcf-8f62-c855b7b99de5 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/a3b0d2e5-9d62-4028-9948-8436762fe6c3 0.666s 2020-12-14 02:17:08.173 193 DEBUG tempest.lib.common.rest_client [req-d2744d06-9ee1-4bcf-8f62-c855b7b99de5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-d2744d06-9ee1-4bcf-8f62-c855b7b99de5', 'date': 'Mon, 14 Dec 2020 02:17:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/a3b0d2e5-9d62-4028-9948-8436762fe6c3'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:08.339 189 INFO tempest.lib.common.rest_client [req-440d418b-75eb-49e6-b006-1c53224a3d19 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.365s 2020-12-14 02:17:08.342 189 DEBUG tempest.lib.common.rest_client [req-440d418b-75eb-49e6-b006-1c53224a3d19 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-440d418b-75eb-49e6-b006-1c53224a3d19', 'x-compute-request-id': 'req-440d418b-75eb-49e6-b006-1c53224a3d19', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:08.459 197 INFO tempest.lib.common.rest_client [req-996f8d2b-52ee-4f10-bb48-7cb9c2ba9354 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.237s 2020-12-14 02:17:08.463 197 DEBUG tempest.lib.common.rest_client [req-996f8d2b-52ee-4f10-bb48-7cb9c2ba9354 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-996f8d2b-52ee-4f10-bb48-7cb9c2ba9354', 'x-compute-request-id': 'req-996f8d2b-52ee-4f10-bb48-7cb9c2ba9354', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:08.891 193 INFO tempest.lib.common.rest_client [req-42cf6c5d-eafb-4d5d-a7eb-dac2b8d9075b ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/42a71999-e754-4ee5-935e-597317f34236 0.711s 2020-12-14 02:17:08.895 193 DEBUG tempest.lib.common.rest_client [req-42cf6c5d-eafb-4d5d-a7eb-dac2b8d9075b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-42cf6c5d-eafb-4d5d-a7eb-dac2b8d9075b', 'date': 'Mon, 14 Dec 2020 02:17:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/42a71999-e754-4ee5-935e-597317f34236'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:08.897 186 INFO tempest.lib.common.rest_client [req-b6017694-7276-4e58-84c4-6f65465d5cd0 ] Request (ServerMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/a25c06fc-2a9a-4336-bb93-e4f100dff742 5.507s 2020-12-14 02:17:08.899 186 DEBUG tempest.lib.common.rest_client [req-b6017694-7276-4e58-84c4-6f65465d5cd0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-b6017694-7276-4e58-84c4-6f65465d5cd0', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/a25c06fc-2a9a-4336-bb93-e4f100dff742'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:09.478 186 INFO tempest.lib.common.rest_client [req-dbcd20c6-6391-472a-8d59-41b146d8a593 ] Request (ServerMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/5627aefa-babe-41d1-83ef-cb14c2b63cb4 0.570s 2020-12-14 02:17:09.481 186 DEBUG tempest.lib.common.rest_client [req-dbcd20c6-6391-472a-8d59-41b146d8a593 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-dbcd20c6-6391-472a-8d59-41b146d8a593', 'date': 'Mon, 14 Dec 2020 02:17:09 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/5627aefa-babe-41d1-83ef-cb14c2b63cb4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:09.888 193 INFO tempest.lib.common.rest_client [req-54b4d4e1-fac5-438c-bd1a-7613fb794c58 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/df84afbf-b6a3-4f70-b97b-6a860a8e20a7 0.986s 2020-12-14 02:17:09.891 193 DEBUG tempest.lib.common.rest_client [req-54b4d4e1-fac5-438c-bd1a-7613fb794c58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-54b4d4e1-fac5-438c-bd1a-7613fb794c58', 'date': 'Mon, 14 Dec 2020 02:17:09 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/df84afbf-b6a3-4f70-b97b-6a860a8e20a7'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:09.893 197 INFO tempest.lib.common.rest_client [req-45298883-e6ac-46a8-b0a8-e18e4c348ac8 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.283s 2020-12-14 02:17:09.897 197 DEBUG tempest.lib.common.rest_client [req-45298883-e6ac-46a8-b0a8-e18e4c348ac8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-45298883-e6ac-46a8-b0a8-e18e4c348ac8', 'x-compute-request-id': 'req-45298883-e6ac-46a8-b0a8-e18e4c348ac8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:09.915 189 INFO tempest.lib.common.rest_client [req-69d9dd97-89df-4935-bb85-8909649996a3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.449s 2020-12-14 02:17:09.919 189 DEBUG tempest.lib.common.rest_client [req-69d9dd97-89df-4935-bb85-8909649996a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-69d9dd97-89df-4935-bb85-8909649996a3', 'x-compute-request-id': 'req-69d9dd97-89df-4935-bb85-8909649996a3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:10.410 186 INFO tempest.lib.common.rest_client [req-802950ff-1c4e-4961-937c-8adcd70eb022 ] Request (ServerMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/fb2e3a54-e8a8-4643-b148-3f3bf1953bf4 0.922s 2020-12-14 02:17:10.413 186 DEBUG tempest.lib.common.rest_client [req-802950ff-1c4e-4961-937c-8adcd70eb022 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-802950ff-1c4e-4961-937c-8adcd70eb022', 'date': 'Mon, 14 Dec 2020 02:17:10 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/fb2e3a54-e8a8-4643-b148-3f3bf1953bf4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:10.665 193 INFO tempest.lib.common.rest_client [req-93351d67-460e-478d-9381-9c2e793cfbb6 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/3b467498-f923-45f2-b704-0474df7e1268 0.769s 2020-12-14 02:17:10.667 193 DEBUG tempest.lib.common.rest_client [req-93351d67-460e-478d-9381-9c2e793cfbb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-93351d67-460e-478d-9381-9c2e793cfbb6', 'date': 'Mon, 14 Dec 2020 02:17:10 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/3b467498-f923-45f2-b704-0474df7e1268'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:10.773 186 INFO tempest.lib.common.rest_client [req-4b3c3e0f-559a-42ac-b844-70518cb1c858 ] Request (ServerMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/fdd4aec086bf411486f075e6837bc36c 0.354s 2020-12-14 02:17:10.776 186 DEBUG tempest.lib.common.rest_client [req-4b3c3e0f-559a-42ac-b844-70518cb1c858 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b3c3e0f-559a-42ac-b844-70518cb1c858', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/fdd4aec086bf411486f075e6837bc36c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:10.845 186 INFO tempest.lib.common.rest_client [req-6286e145-0bfb-4a07-b064-d583e8aa158d ] Request (ServerMetadataRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1ef7d365f8304c6c871d57337acc5adf&name=default 0.063s 2020-12-14 02:17:10.848 186 DEBUG tempest.lib.common.rest_client [req-6286e145-0bfb-4a07-b064-d583e8aa158d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-6286e145-0bfb-4a07-b064-d583e8aa158d', 'date': 'Mon, 14 Dec 2020 02:17:10 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1ef7d365f8304c6c871d57337acc5adf&name=default'} Body: b'{"security_groups": [{"id": "5ffcc4a4-3372-477f-ad4e-c40e80422d44", "name": "default", "stateful": true, "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "description": "Default security group", "security_group_rules": [{"id": "3d520722-1825-4f0f-a447-ce385896b9eb", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "security_group_id": "5ffcc4a4-3372-477f-ad4e-c40e80422d44", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:16:31Z", "updated_at": "2020-12-14T02:16:31Z", "revision_number": 0, "project_id": "1ef7d365f8304c6c871d57337acc5adf"}, {"id": "9e0aca5e-35ef-486f-a818-cb38be3a66fb", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "security_group_id": "5ffcc4a4-3372-477f-ad4e-c40e80422d44", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5ffcc4a4-3372-477f-ad4e-c40e80422d44", "description": null, "tags": [], "created_at": "2020-12-14T02:16:31Z", "updated_at": "2020-12-14T02:16:31Z", "revision_number": 0, "project_id": "1ef7d365f8304c6c871d57337acc5adf"}, {"id": "cfd44669-f437-4d77-a4e3-4b9e9a30d759", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "security_group_id": "5ffcc4a4-3372-477f-ad4e-c40e80422d44", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5ffcc4a4-3372-477f-ad4e-c40e80422d44", "description": null, "tags": [], "created_at": "2020-12-14T02:16:31Z", "updated_at": "2020-12-14T02:16:31Z", "revision_number": 0, "project_id": "1ef7d365f8304c6c871d57337acc5adf"}, {"id": "e513ff99-3640-4331-86f0-4b91a82f2269", "tenant_id": "1ef7d365f8304c6c871d57337acc5adf", "security_group_id": "5ffcc4a4-3372-477f-ad4e-c40e80422d44", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:16:31Z", "updated_at": "2020-12-14T02:16:31Z", "revision_number": 0, "project_id": "1ef7d365f8304c6c871d57337acc5adf"}], "tags": [], "created_at": "2020-12-14T02:16:31Z", "updated_at": "2020-12-14T02:16:31Z", "revision_number": 1, "project_id": "1ef7d365f8304c6c871d57337acc5adf"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:11.380 186 INFO tempest.lib.common.rest_client [req-36875050-fd16-4e40-96e1-b502c7e286e7 ] Request (ServerMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/5ffcc4a4-3372-477f-ad4e-c40e80422d44 0.526s 2020-12-14 02:17:11.384 186 DEBUG tempest.lib.common.rest_client [req-36875050-fd16-4e40-96e1-b502c7e286e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-36875050-fd16-4e40-96e1-b502c7e286e7', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:11 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5ffcc4a4-3372-477f-ad4e-c40e80422d44'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:11.477 197 INFO tempest.lib.common.rest_client [req-b42ff858-3bb5-44cc-ba45-4219cd38259c ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.417s 2020-12-14 02:17:11.482 197 DEBUG tempest.lib.common.rest_client [req-b42ff858-3bb5-44cc-ba45-4219cd38259c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b42ff858-3bb5-44cc-ba45-4219cd38259c', 'x-compute-request-id': 'req-b42ff858-3bb5-44cc-ba45-4219cd38259c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:11.500 193 INFO tempest.lib.common.rest_client [req-bbc7761e-2f2f-40df-992d-ab21a4bf4bf7 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/6c479c2d-2a9b-4676-b8ba-f08a174b4c6c 0.828s 2020-12-14 02:17:11.502 193 DEBUG tempest.lib.common.rest_client [req-bbc7761e-2f2f-40df-992d-ab21a4bf4bf7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-bbc7761e-2f2f-40df-992d-ab21a4bf4bf7', 'date': 'Mon, 14 Dec 2020 02:17:11 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/6c479c2d-2a9b-4676-b8ba-f08a174b4c6c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:11.510 189 INFO tempest.lib.common.rest_client [req-5afd6ef9-3342-4fa0-8638-ab450315543e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.426s 2020-12-14 02:17:11.514 189 DEBUG tempest.lib.common.rest_client [req-5afd6ef9-3342-4fa0-8638-ab450315543e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5afd6ef9-3342-4fa0-8638-ab450315543e', 'x-compute-request-id': 'req-5afd6ef9-3342-4fa0-8638-ab450315543e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:11.592 186 INFO tempest.lib.common.rest_client [req-06c42eae-1f46-4942-91a5-902a774514d3 ] Request (ServerMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf 0.201s 2020-12-14 02:17:11.596 186 DEBUG tempest.lib.common.rest_client [req-06c42eae-1f46-4942-91a5-902a774514d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06c42eae-1f46-4942-91a5-902a774514d3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ef7d365f8304c6c871d57337acc5adf'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:11.712 186 INFO tempest.lib.common.rest_client [req-6ea08555-fed4-45e4-ac24-7cac943a1f3a ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:17:11.715 186 DEBUG tempest.lib.common.rest_client [req-6ea08555-fed4-45e4-ac24-7cac943a1f3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ea08555-fed4-45e4-ac24-7cac943a1f3a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["I_TWdXOGRYab-WjqfXbSRg"], "expires_at": "2020-12-14T03:17:11.000000Z", "issued_at": "2020-12-14T02:17:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:11.818 186 INFO tempest.lib.common.rest_client [req-b52b298c-9357-4281-880b-84706ce67901 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:17:11.821 186 DEBUG tempest.lib.common.rest_client [req-b52b298c-9357-4281-880b-84706ce67901 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b52b298c-9357-4281-880b-84706ce67901', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["8N-51h6SRBCOscGUwSq6nQ"], "expires_at": "2020-12-14T03:17:11.000000Z", "issued_at": "2020-12-14T02:17:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:11.892 186 INFO tempest.lib.common.rest_client [req-2c657104-c8e3-4129-94ec-e3b7ad342d1f ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.063s 2020-12-14 02:17:11.896 186 DEBUG tempest.lib.common.rest_client [req-2c657104-c8e3-4129-94ec-e3b7ad342d1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2c657104-c8e3-4129-94ec-e3b7ad342d1f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:12.091 186 INFO tempest.lib.common.rest_client [req-8be982d4-14df-4954-8403-7f29fa5d82f9 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.186s 2020-12-14 02:17:12.094 186 DEBUG tempest.lib.common.rest_client [req-8be982d4-14df-4954-8403-7f29fa5d82f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441-desc", "domain_id": "default", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '402', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8be982d4-14df-4954-8403-7f29fa5d82f9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "domain_id": "default", "description": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:12.232 186 INFO tempest.lib.common.rest_client [req-16c72343-1fd7-40e8-ac72-1214c398e015 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.131s 2020-12-14 02:17:12.234 186 DEBUG tempest.lib.common.rest_client [req-16c72343-1fd7-40e8-ac72-1214c398e015 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password": "P4_hmnjgyytvHHS", "project_id": "4d2bab69895c4d7a955e71657b529b22", "email": "tempest-MiscPolicyActionsNetworkRbacTest-1074408032@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '420', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16c72343-1fd7-40e8-ac72-1214c398e015', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "4d2bab69895c4d7a955e71657b529b22", "email": "tempest-MiscPolicyActionsNetworkRbacTest-1074408032@example.com", "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/c9c6177d06e54d90aff506ccfab61ac9"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:12.304 186 INFO tempest.lib.common.rest_client [req-ef8086e5-5750-4076-a37b-2c432a4e918c ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:17:12.306 186 DEBUG tempest.lib.common.rest_client [req-ef8086e5-5750-4076-a37b-2c432a4e918c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef8086e5-5750-4076-a37b-2c432a4e918c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:12.309 193 INFO tempest.lib.common.rest_client [req-e0978186-a1de-4e78-8d3a-8a3f5cad3847 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/c35fd9b5-df94-499c-a600-92492c2588ab 0.801s 2020-12-14 02:17:12.311 193 DEBUG tempest.lib.common.rest_client [req-e0978186-a1de-4e78-8d3a-8a3f5cad3847 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-e0978186-a1de-4e78-8d3a-8a3f5cad3847', 'date': 'Mon, 14 Dec 2020 02:17:12 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/c35fd9b5-df94-499c-a600-92492c2588ab'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:12.384 186 INFO tempest.lib.common.rest_client [req-57c51a3a-6e53-4b9b-a2f0-dea48653bb45 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.068s 2020-12-14 02:17:12.387 186 DEBUG tempest.lib.common.rest_client [req-57c51a3a-6e53-4b9b-a2f0-dea48653bb45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57c51a3a-6e53-4b9b-a2f0-dea48653bb45', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:12.415 193 INFO tempest.lib.common.rest_client [req-503a636c-70ab-48bf-8499-364d5dbed9d3 ] Request (PortsRbacTest:tearDownClass): 404 DELETE http://172.30.13.94:9696/v2.0/ports/72d22f36-30f2-4a1d-8a7c-b7ebe2dc6805 0.098s 2020-12-14 02:17:12.418 193 DEBUG tempest.lib.common.rest_client [req-503a636c-70ab-48bf-8499-364d5dbed9d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '132', 'x-openstack-request-id': 'req-503a636c-70ab-48bf-8499-364d5dbed9d3', 'date': 'Mon, 14 Dec 2020 02:17:12 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/72d22f36-30f2-4a1d-8a7c-b7ebe2dc6805'} Body: b'{"NeutronError": {"type": "PortNotFound", "message": "Port 72d22f36-30f2-4a1d-8a7c-b7ebe2dc6805 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:12.481 186 INFO tempest.lib.common.rest_client [req-d582b136-7eb7-432e-8041-b03094422f3b ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles/72a4576c553448cd941b052c1ca0cf2d 0.087s 2020-12-14 02:17:12.484 186 DEBUG tempest.lib.common.rest_client [req-d582b136-7eb7-432e-8041-b03094422f3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d582b136-7eb7-432e-8041-b03094422f3b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:12.488 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MiscPolicyActionsNetworkRbacTest-1541328441', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4d2bab69895c4d7a955e71657b529b22', 'project_name': 'tempest-MiscPolicyActionsNetworkRbacTest-1541328441', 'tenant_id': '4d2bab69895c4d7a955e71657b529b22', 'tenant_name': 'tempest-MiscPolicyActionsNetworkRbacTest-1541328441', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c9c6177d06e54d90aff506ccfab61ac9'}, Network: None, Subnet: None, Router: None 2020-12-14 02:17:12.615 186 INFO tempest.lib.common.rest_client [req-7c4264d9-550b-4bde-b664-94edd3658b20 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.118s 2020-12-14 02:17:12.647 186 DEBUG tempest.lib.common.rest_client [req-7c4264d9-550b-4bde-b664-94edd3658b20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7c4264d9-550b-4bde-b664-94edd3658b20', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Qyz_SlISR9-GttEsQNWNYQ"], "expires_at": "2020-12-14T03:17:12.000000Z", "issued_at": "2020-12-14T02:17:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:12.823 197 INFO tempest.lib.common.rest_client [req-455e40eb-fb7b-4ad0-a913-7ccb543b0ef0 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.227s 2020-12-14 02:17:12.827 197 DEBUG tempest.lib.common.rest_client [req-455e40eb-fb7b-4ad0-a913-7ccb543b0ef0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-455e40eb-fb7b-4ad0-a913-7ccb543b0ef0', 'x-compute-request-id': 'req-455e40eb-fb7b-4ad0-a913-7ccb543b0ef0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:12.835 189 INFO tempest.lib.common.rest_client [req-9ad58b84-030c-42d3-97a8-525dfec40b56 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.214s 2020-12-14 02:17:12.838 189 DEBUG tempest.lib.common.rest_client [req-9ad58b84-030c-42d3-97a8-525dfec40b56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9ad58b84-030c-42d3-97a8-525dfec40b56', 'x-compute-request-id': 'req-9ad58b84-030c-42d3-97a8-525dfec40b56', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:13.044 193 INFO tempest.lib.common.rest_client [req-e6fc5bd3-7104-4af8-a502-ec6e64eb1e4b ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/2274dcfa-e06d-468c-bd1c-19d95731a8c8 0.618s 2020-12-14 02:17:13.048 193 DEBUG tempest.lib.common.rest_client [req-e6fc5bd3-7104-4af8-a502-ec6e64eb1e4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-e6fc5bd3-7104-4af8-a502-ec6e64eb1e4b', 'date': 'Mon, 14 Dec 2020 02:17:13 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/2274dcfa-e06d-468c-bd1c-19d95731a8c8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:13.722 186 INFO tempest.lib.common.rest_client [req-9359237b-0b07-42da-b7b0-c9e83fb359ac ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 1.065s 2020-12-14 02:17:13.724 186 DEBUG tempest.lib.common.rest_client [req-9359237b-0b07-42da-b7b0-c9e83fb359ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-MiscPolicyActionsNetworkRbacTest-959755476-network", "tenant_id": "4d2bab69895c4d7a955e71657b529b22"}} Response - Headers: {'content-type': 'application/json', 'content-length': '747', 'x-openstack-request-id': 'req-9359237b-0b07-42da-b7b0-c9e83fb359ac', 'date': 'Mon, 14 Dec 2020 02:17:13 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"29581da7-daeb-44b2-aca1-c64c19d19bbc","name":"tempest-MiscPolicyActionsNetworkRbacTest-959755476-network","tenant_id":"4d2bab69895c4d7a955e71657b529b22","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"4d2bab69895c4d7a955e71657b529b22","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":29,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:17:13Z","updated_at":"2020-12-14T02:17:13Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:13.784 193 INFO tempest.lib.common.rest_client [req-9d8fc2c1-b5a2-461b-848a-b09093f66c7b ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/3cce41bf-5406-433d-9e31-d145f5caa075 0.731s 2020-12-14 02:17:13.787 193 DEBUG tempest.lib.common.rest_client [req-9d8fc2c1-b5a2-461b-848a-b09093f66c7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-9d8fc2c1-b5a2-461b-848a-b09093f66c7b', 'date': 'Mon, 14 Dec 2020 02:17:13 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/3cce41bf-5406-433d-9e31-d145f5caa075'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:14.162 197 INFO tempest.lib.common.rest_client [req-5d9c4d52-44ee-438c-9e7d-b6017cba4dd4 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.224s 2020-12-14 02:17:14.166 197 DEBUG tempest.lib.common.rest_client [req-5d9c4d52-44ee-438c-9e7d-b6017cba4dd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5d9c4d52-44ee-438c-9e7d-b6017cba4dd4', 'x-compute-request-id': 'req-5d9c4d52-44ee-438c-9e7d-b6017cba4dd4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:14.174 189 INFO tempest.lib.common.rest_client [req-3984a113-1430-40ed-96aa-6b44c0600f5d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.229s 2020-12-14 02:17:14.178 189 DEBUG tempest.lib.common.rest_client [req-3984a113-1430-40ed-96aa-6b44c0600f5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3984a113-1430-40ed-96aa-6b44c0600f5d', 'x-compute-request-id': 'req-3984a113-1430-40ed-96aa-6b44c0600f5d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:14.465 186 INFO tempest.lib.common.rest_client [req-08f95aa3-efda-416f-b971-996a224b9b3f ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.731s 2020-12-14 02:17:14.469 186 DEBUG tempest.lib.common.rest_client [req-08f95aa3-efda-416f-b971-996a224b9b3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "cidr": "192.168.120.0/28", "name": "tempest-MiscPolicyActionsNetworkRbacTest-959755476-subnet", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "enable_dhcp": true, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '718', 'x-openstack-request-id': 'req-08f95aa3-efda-416f-b971-996a224b9b3f', 'date': 'Mon, 14 Dec 2020 02:17:14 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"64e5b2f0-5db9-4af2-a449-12d34efa3b51","name":"tempest-MiscPolicyActionsNetworkRbacTest-959755476-subnet","tenant_id":"4d2bab69895c4d7a955e71657b529b22","network_id":"29581da7-daeb-44b2-aca1-c64c19d19bbc","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:17:13Z","updated_at":"2020-12-14T02:17:13Z","revision_number":0,"project_id":"4d2bab69895c4d7a955e71657b529b22"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:14.570 193 INFO tempest.lib.common.rest_client [req-147d958c-ff7d-41ae-bb54-d5258aceff86 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/e489a3cb-e74a-4f4e-acfc-066e32897bbb 0.777s 2020-12-14 02:17:14.574 193 DEBUG tempest.lib.common.rest_client [req-147d958c-ff7d-41ae-bb54-d5258aceff86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-147d958c-ff7d-41ae-bb54-d5258aceff86', 'date': 'Mon, 14 Dec 2020 02:17:14 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/e489a3cb-e74a-4f4e-acfc-066e32897bbb'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:15.344 193 INFO tempest.lib.common.rest_client [req-8363adaa-2db6-4dfb-8ec3-c732b24fa765 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/4e22be47-89e8-48cc-838e-169a4fe51394 0.765s 2020-12-14 02:17:15.346 193 DEBUG tempest.lib.common.rest_client [req-8363adaa-2db6-4dfb-8ec3-c732b24fa765 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-8363adaa-2db6-4dfb-8ec3-c732b24fa765', 'date': 'Mon, 14 Dec 2020 02:17:15 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/4e22be47-89e8-48cc-838e-169a4fe51394'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:15.598 197 INFO tempest.lib.common.rest_client [req-f3c06fd8-9bb8-4142-b8f0-5e30cc50537f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.324s 2020-12-14 02:17:15.602 197 DEBUG tempest.lib.common.rest_client [req-f3c06fd8-9bb8-4142-b8f0-5e30cc50537f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f3c06fd8-9bb8-4142-b8f0-5e30cc50537f', 'x-compute-request-id': 'req-f3c06fd8-9bb8-4142-b8f0-5e30cc50537f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:15.603 189 INFO tempest.lib.common.rest_client [req-3fd21b70-20ec-4ccc-9874-040f2db7e71a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.319s 2020-12-14 02:17:15.617 189 DEBUG tempest.lib.common.rest_client [req-3fd21b70-20ec-4ccc-9874-040f2db7e71a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3fd21b70-20ec-4ccc-9874-040f2db7e71a', 'x-compute-request-id': 'req-3fd21b70-20ec-4ccc-9874-040f2db7e71a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:15.978 193 INFO tempest.lib.common.rest_client [req-c9e11325-efaa-4e36-a72b-b65d697ee013 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/4c371891-cf40-4a45-b3fa-aaea3f8815aa 0.625s 2020-12-14 02:17:15.981 193 DEBUG tempest.lib.common.rest_client [req-c9e11325-efaa-4e36-a72b-b65d697ee013 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-c9e11325-efaa-4e36-a72b-b65d697ee013', 'date': 'Mon, 14 Dec 2020 02:17:15 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/4c371891-cf40-4a45-b3fa-aaea3f8815aa'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:16.105 186 INFO tempest.lib.common.rest_client [req-f5ed9445-6f4c-4a9d-8bfd-e757d8512fd3 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.628s 2020-12-14 02:17:16.109 186 DEBUG tempest.lib.common.rest_client [req-f5ed9445-6f4c-4a9d-8bfd-e757d8512fd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-MiscPolicyActionsNetworkRbacTest-959755476-router", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '821', 'x-openstack-request-id': 'req-f5ed9445-6f4c-4a9d-8bfd-e757d8512fd3', 'date': 'Mon, 14 Dec 2020 02:17:16 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "eb12d6b6-5d03-468f-b288-883bad2a8983", "name": "tempest-MiscPolicyActionsNetworkRbacTest-959755476-router", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.253"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::1ff"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:17:14Z", "updated_at": "2020-12-14T02:17:15Z", "revision_number": 3, "project_id": "4d2bab69895c4d7a955e71657b529b22"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:16.676 193 INFO tempest.lib.common.rest_client [req-daaa52fd-591d-4f8a-b0cc-e0836af6c1c4 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/1424d9a0-aa2a-498b-912a-6e620e14fdca 0.689s 2020-12-14 02:17:16.679 193 DEBUG tempest.lib.common.rest_client [req-daaa52fd-591d-4f8a-b0cc-e0836af6c1c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-daaa52fd-591d-4f8a-b0cc-e0836af6c1c4', 'date': 'Mon, 14 Dec 2020 02:17:16 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/1424d9a0-aa2a-498b-912a-6e620e14fdca'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:16.962 197 INFO tempest.lib.common.rest_client [req-d467ee88-8914-4073-a97d-1e437ac0406b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.238s 2020-12-14 02:17:16.966 197 DEBUG tempest.lib.common.rest_client [req-d467ee88-8914-4073-a97d-1e437ac0406b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d467ee88-8914-4073-a97d-1e437ac0406b', 'x-compute-request-id': 'req-d467ee88-8914-4073-a97d-1e437ac0406b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:17.104 189 INFO tempest.lib.common.rest_client [req-1086e48f-1103-49a9-8d2f-0cc205a59d6e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.372s 2020-12-14 02:17:17.109 189 DEBUG tempest.lib.common.rest_client [req-1086e48f-1103-49a9-8d2f-0cc205a59d6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1086e48f-1103-49a9-8d2f-0cc205a59d6e', 'x-compute-request-id': 'req-1086e48f-1103-49a9-8d2f-0cc205a59d6e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:17.630 193 INFO tempest.lib.common.rest_client [req-fcdb4821-f635-4c6d-a705-665f467ba8d0 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/88f7ee0e-3b50-42d5-adf0-e3d4a9c0ce38 0.945s 2020-12-14 02:17:17.633 193 DEBUG tempest.lib.common.rest_client [req-fcdb4821-f635-4c6d-a705-665f467ba8d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-fcdb4821-f635-4c6d-a705-665f467ba8d0', 'date': 'Mon, 14 Dec 2020 02:17:17 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/88f7ee0e-3b50-42d5-adf0-e3d4a9c0ce38'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:18.441 193 INFO tempest.lib.common.rest_client [req-bbf0144c-af89-4ae9-85e1-00e26695d0b3 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/5e40c58a-f307-4ed6-8cb9-bbf0907e938b 0.801s 2020-12-14 02:17:18.445 193 DEBUG tempest.lib.common.rest_client [req-bbf0144c-af89-4ae9-85e1-00e26695d0b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-bbf0144c-af89-4ae9-85e1-00e26695d0b3', 'date': 'Mon, 14 Dec 2020 02:17:18 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/5e40c58a-f307-4ed6-8cb9-bbf0907e938b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:18.444 197 INFO tempest.lib.common.rest_client [req-e4b12984-df7d-400f-bbe9-20d327d2b64f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.371s 2020-12-14 02:17:18.448 197 DEBUG tempest.lib.common.rest_client [req-e4b12984-df7d-400f-bbe9-20d327d2b64f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e4b12984-df7d-400f-bbe9-20d327d2b64f', 'x-compute-request-id': 'req-e4b12984-df7d-400f-bbe9-20d327d2b64f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:18.564 189 INFO tempest.lib.common.rest_client [req-d44849b2-5ad5-4de7-a029-4f0c2fed823d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.313s 2020-12-14 02:17:18.567 189 DEBUG tempest.lib.common.rest_client [req-d44849b2-5ad5-4de7-a029-4f0c2fed823d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d44849b2-5ad5-4de7-a029-4f0c2fed823d', 'x-compute-request-id': 'req-d44849b2-5ad5-4de7-a029-4f0c2fed823d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:18.836 186 INFO tempest.lib.common.rest_client [req-08589866-8c82-47d0-8e35-3270a78b325b ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/eb12d6b6-5d03-468f-b288-883bad2a8983/add_router_interface 2.720s 2020-12-14 02:17:18.838 186 DEBUG tempest.lib.common.rest_client [req-08589866-8c82-47d0-8e35-3270a78b325b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-08589866-8c82-47d0-8e35-3270a78b325b', 'date': 'Mon, 14 Dec 2020 02:17:18 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/eb12d6b6-5d03-468f-b288-883bad2a8983/add_router_interface'} Body: b'{"id": "eb12d6b6-5d03-468f-b288-883bad2a8983", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "port_id": "a859285c-600b-46cb-98ba-4b1c171fdb9d", "network_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "subnet_ids": ["64e5b2f0-5db9-4af2-a449-12d34efa3b51"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:18.841 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MiscPolicyActionsNetworkRbacTest-1541328441', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4d2bab69895c4d7a955e71657b529b22', 'project_name': 'tempest-MiscPolicyActionsNetworkRbacTest-1541328441', 'tenant_id': '4d2bab69895c4d7a955e71657b529b22', 'tenant_name': 'tempest-MiscPolicyActionsNetworkRbacTest-1541328441', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c9c6177d06e54d90aff506ccfab61ac9'}, Network: {'id': '29581da7-daeb-44b2-aca1-c64c19d19bbc', 'name': 'tempest-MiscPolicyActionsNetworkRbacTest-959755476-network', 'tenant_id': '4d2bab69895c4d7a955e71657b529b22', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '4d2bab69895c4d7a955e71657b529b22', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:17:13Z', 'updated_at': '2020-12-14T02:17:13Z', 'revision_number': 1}, Subnet: {'id': '64e5b2f0-5db9-4af2-a449-12d34efa3b51', 'name': 'tempest-MiscPolicyActionsNetworkRbacTest-959755476-subnet', 'tenant_id': '4d2bab69895c4d7a955e71657b529b22', 'network_id': '29581da7-daeb-44b2-aca1-c64c19d19bbc', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': True, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:17:13Z', 'updated_at': '2020-12-14T02:17:13Z', 'revision_number': 0, 'project_id': '4d2bab69895c4d7a955e71657b529b22'}, Router: {'id': 'eb12d6b6-5d03-468f-b288-883bad2a8983', 'name': 'tempest-MiscPolicyActionsNetworkRbacTest-959755476-router', 'tenant_id': '4d2bab69895c4d7a955e71657b529b22', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.253'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::1ff'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:17:14Z', 'updated_at': '2020-12-14T02:17:15Z', 'revision_number': 3, 'project_id': '4d2bab69895c4d7a955e71657b529b22'} 2020-12-14 02:17:19.019 186 INFO tempest.lib.common.rest_client [req-f3b79c52-cca0-4f28-946d-42c10e35e4cf ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-12-14 02:17:19.022 186 DEBUG tempest.lib.common.rest_client [req-f3b79c52-cca0-4f28-946d-42c10e35e4cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6595', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3b79c52-cca0-4f28-946d-42c10e35e4cf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["A2fbKGbqSf-1NqSkDt5qJA"], "expires_at": "2020-12-14T03:17:18.000000Z", "issued_at": "2020-12-14T02:17:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "Region _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:19.026 193 INFO tempest.lib.common.rest_client [req-72efb43c-df7d-47e4-99df-7cc57c7becf5 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d 0.576s 2020-12-14 02:17:19.030 193 DEBUG tempest.lib.common.rest_client [req-72efb43c-df7d-47e4-99df-7cc57c7becf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-72efb43c-df7d-47e4-99df-7cc57c7becf5', 'date': 'Mon, 14 Dec 2020 02:17:19 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/af66f967-0722-4f89-8e19-d04d4339ee1d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:19.083 186 INFO tempest.lib.common.rest_client [req-575ffee8-a5c4-4b7a-84db-5dd91e511c27 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:17:19.086 186 DEBUG tempest.lib.common.rest_client [req-575ffee8-a5c4-4b7a-84db-5dd91e511c27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-575ffee8-a5c4-4b7a-84db-5dd91e511c27', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["zm5ALmAqQuiA29Cy1cnyAg"], "expires_at": "2020-12-14T03:17:19.000000Z", "issued_at": "2020-12-14T02:17:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:19.214 186 INFO tempest.lib.common.rest_client [req-77e4faa9-27e1-4a00-9976-a9aac8e7b8f6 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:17:19.218 186 DEBUG tempest.lib.common.rest_client [req-77e4faa9-27e1-4a00-9976-a9aac8e7b8f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-77e4faa9-27e1-4a00-9976-a9aac8e7b8f6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["2JrX3EgiRKm3tz31iWNipA"], "expires_at": "2020-12-14T03:17:19.000000Z", "issued_at": "2020-12-14T02:17:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:19.286 186 INFO tempest.lib.common.rest_client [req-dd66ee95-4590-4f19-a0c7-ff40b5149a4b ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.060s 2020-12-14 02:17:19.289 186 DEBUG tempest.lib.common.rest_client [req-dd66ee95-4590-4f19-a0c7-ff40b5149a4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dd66ee95-4590-4f19-a0c7-ff40b5149a4b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:19.350 186 INFO tempest.lib.common.rest_client [req-dfb33ea5-6407-4ba6-8ab7-f9e8b8797df7 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-14 02:17:19.352 186 DEBUG tempest.lib.common.rest_client [req-dfb33ea5-6407-4ba6-8ab7-f9e8b8797df7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dfb33ea5-6407-4ba6-8ab7-f9e8b8797df7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:19.355 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:17:19.358 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:19.424 186 INFO tempest.lib.common.rest_client [req-1b0d7c20-5c60-4baf-a7d8-9daf6e240fef ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles 0.060s 2020-12-14 02:17:19.428 186 DEBUG tempest.lib.common.rest_client [req-1b0d7c20-5c60-4baf-a7d8-9daf6e240fef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b0d7c20-5c60-4baf-a7d8-9daf6e240fef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:19.503 186 INFO tempest.lib.common.rest_client [req-69f8a532-2903-4089-b926-5732fdd11711 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-12-14 02:17:19.507 186 DEBUG tempest.lib.common.rest_client [req-69f8a532-2903-4089-b926-5732fdd11711 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69f8a532-2903-4089-b926-5732fdd11711', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:19.574 193 INFO tempest.lib.common.rest_client [req-e996fe81-e1f7-44f9-949a-3e18e80bfbc9 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/5804389f-c655-4f7f-855c-f96ce18290fc 0.537s 2020-12-14 02:17:19.575 193 DEBUG tempest.lib.common.rest_client [req-e996fe81-e1f7-44f9-949a-3e18e80bfbc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-e996fe81-e1f7-44f9-949a-3e18e80bfbc9', 'date': 'Mon, 14 Dec 2020 02:17:19 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/5804389f-c655-4f7f-855c-f96ce18290fc'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:19.639 186 INFO tempest.lib.common.rest_client [req-9c857d58-e898-47ee-9439-e6a8f29dba15 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles/a629c95d64b3416fb80ae90af4f69c05 0.125s 2020-12-14 02:17:19.642 186 DEBUG tempest.lib.common.rest_client [req-9c857d58-e898-47ee-9439-e6a8f29dba15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c857d58-e898-47ee-9439-e6a8f29dba15', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:19.782 197 INFO tempest.lib.common.rest_client [req-35327aa9-7217-4c3a-838c-6a879a1afad1 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.225s 2020-12-14 02:17:19.786 197 DEBUG tempest.lib.common.rest_client [req-35327aa9-7217-4c3a-838c-6a879a1afad1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-35327aa9-7217-4c3a-838c-6a879a1afad1', 'x-compute-request-id': 'req-35327aa9-7217-4c3a-838c-6a879a1afad1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:20.160 189 INFO tempest.lib.common.rest_client [req-619664ca-45d2-4091-a8b3-a14129a78155 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.486s 2020-12-14 02:17:20.163 189 DEBUG tempest.lib.common.rest_client [req-619664ca-45d2-4091-a8b3-a14129a78155 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-619664ca-45d2-4091-a8b3-a14129a78155', 'x-compute-request-id': 'req-619664ca-45d2-4091-a8b3-a14129a78155', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:20.704 193 INFO tempest.lib.common.rest_client [req-4d1d8c81-7476-4b4d-bd43-4c1bdc7d26df ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/9b3f8864-8a15-49e7-9e20-d2c6badb1cd4 1.124s 2020-12-14 02:17:20.705 193 DEBUG tempest.lib.common.rest_client [req-4d1d8c81-7476-4b4d-bd43-4c1bdc7d26df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-4d1d8c81-7476-4b4d-bd43-4c1bdc7d26df', 'date': 'Mon, 14 Dec 2020 02:17:20 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/9b3f8864-8a15-49e7-9e20-d2c6badb1cd4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:20.751 186 INFO tempest.lib.common.rest_client [req-039cf4be-85b4-4ee4-856a-a78d083248e0 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:17:20.754 186 DEBUG tempest.lib.common.rest_client [req-039cf4be-85b4-4ee4-856a-a78d083248e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-039cf4be-85b4-4ee4-856a-a78d083248e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["G5YSJrh5TPS-z1y6D6EspQ"], "expires_at": "2020-12-14T03:17:20.000000Z", "issued_at": "2020-12-14T02:17:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:20.851 186 INFO tempest.lib.common.rest_client [req-74ab6513-b59c-44f2-b6eb-1b8e0828aa69 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:17:20.854 186 DEBUG tempest.lib.common.rest_client [req-74ab6513-b59c-44f2-b6eb-1b8e0828aa69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74ab6513-b59c-44f2-b6eb-1b8e0828aa69', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["kTVC9UmoRAqMouJmnD0eFQ"], "expires_at": "2020-12-14T03:17:20.000000Z", "issued_at": "2020-12-14T02:17:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:20.859 186 INFO tempest.lib.common.fixed_network [-] (MiscPolicyActionsNetworkRbacTest:setUpClass) Found network {'id': '29581da7-daeb-44b2-aca1-c64c19d19bbc', 'name': 'tempest-MiscPolicyActionsNetworkRbacTest-959755476-network', 'tenant_id': '4d2bab69895c4d7a955e71657b529b22', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '4d2bab69895c4d7a955e71657b529b22', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:17:13Z', 'updated_at': '2020-12-14T02:17:13Z', 'revision_number': 1} available for tenant 2020-12-14 02:17:20.894 193 INFO tempest.lib.common.rest_client [req-79ed1a6c-3a0d-4e68-9ab2-08dfb09ce2bf ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/993a9cf13c1c49e4acd7b4dc5ecdbe37 0.181s 2020-12-14 02:17:20.896 193 DEBUG tempest.lib.common.rest_client [req-79ed1a6c-3a0d-4e68-9ab2-08dfb09ce2bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79ed1a6c-3a0d-4e68-9ab2-08dfb09ce2bf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/993a9cf13c1c49e4acd7b4dc5ecdbe37'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:21.028 193 INFO tempest.lib.common.rest_client [req-2d832381-7a3a-458b-b4fa-a0ec19496b8b ] Request (PortsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.125s 2020-12-14 02:17:21.031 193 DEBUG tempest.lib.common.rest_client [req-2d832381-7a3a-458b-b4fa-a0ec19496b8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2d832381-7a3a-458b-b4fa-a0ec19496b8b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["1YgWcP_uS4CxvMSDVPfsKw"], "expires_at": "2020-12-14T03:17:20.000000Z", "issued_at": "2020-12-14T02:17:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:21.161 197 INFO tempest.lib.common.rest_client [req-5cd54443-ed0b-4748-9a99-062ba0f54319 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.265s 2020-12-14 02:17:21.165 197 DEBUG tempest.lib.common.rest_client [req-5cd54443-ed0b-4748-9a99-062ba0f54319 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5cd54443-ed0b-4748-9a99-062ba0f54319', 'x-compute-request-id': 'req-5cd54443-ed0b-4748-9a99-062ba0f54319', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:21.305 193 INFO tempest.lib.common.rest_client [req-db90726a-b68c-464f-9a0d-2368e788b036 ] Request (PortsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5d2b22c24509439eb518838e24b766b7&name=default 0.268s 2020-12-14 02:17:21.308 193 DEBUG tempest.lib.common.rest_client [req-db90726a-b68c-464f-9a0d-2368e788b036 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-db90726a-b68c-464f-9a0d-2368e788b036', 'date': 'Mon, 14 Dec 2020 02:17:21 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5d2b22c24509439eb518838e24b766b7&name=default'} Body: b'{"security_groups": [{"id": "d47e8431-0063-44c8-a162-bc4020b774fc", "name": "default", "stateful": true, "tenant_id": "5d2b22c24509439eb518838e24b766b7", "description": "Default security group", "security_group_rules": [{"id": "71d056c2-f011-43e4-acfe-a02e0608a1e1", "tenant_id": "5d2b22c24509439eb518838e24b766b7", "security_group_id": "d47e8431-0063-44c8-a162-bc4020b774fc", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d47e8431-0063-44c8-a162-bc4020b774fc", "description": null, "tags": [], "created_at": "2020-12-14T02:16:19Z", "updated_at": "2020-12-14T02:16:19Z", "revision_number": 0, "project_id": "5d2b22c24509439eb518838e24b766b7"}, {"id": "9d7304dc-3cf6-4266-9455-432d405a2d22", "tenant_id": "5d2b22c24509439eb518838e24b766b7", "security_group_id": "d47e8431-0063-44c8-a162-bc4020b774fc", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d47e8431-0063-44c8-a162-bc4020b774fc", "description": null, "tags": [], "created_at": "2020-12-14T02:16:19Z", "updated_at": "2020-12-14T02:16:19Z", "revision_number": 0, "project_id": "5d2b22c24509439eb518838e24b766b7"}, {"id": "a562b90a-f166-469d-adc1-c55988a49f2c", "tenant_id": "5d2b22c24509439eb518838e24b766b7", "security_group_id": "d47e8431-0063-44c8-a162-bc4020b774fc", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:16:19Z", "updated_at": "2020-12-14T02:16:19Z", "revision_number": 0, "project_id": "5d2b22c24509439eb518838e24b766b7"}, {"id": "fb45b803-85cf-4717-b335-5a5da679bfab", "tenant_id": "5d2b22c24509439eb518838e24b766b7", "security_group_id": "d47e8431-0063-44c8-a162-bc4020b774fc", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:16:19Z", "updated_at": "2020-12-14T02:16:19Z", "revision_number": 0, "project_id": "5d2b22c24509439eb518838e24b766b7"}], "tags": [], "created_at": "2020-12-14T02:16:19Z", "updated_at": "2020-12-14T02:16:19Z", "revision_number": 1, "project_id": "5d2b22c24509439eb518838e24b766b7"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:21.468 193 INFO tempest.lib.common.rest_client [req-c7589a45-0804-43ea-af80-895abfa0a349 ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/d47e8431-0063-44c8-a162-bc4020b774fc 0.152s 2020-12-14 02:17:21.472 193 DEBUG tempest.lib.common.rest_client [req-c7589a45-0804-43ea-af80-895abfa0a349 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c7589a45-0804-43ea-af80-895abfa0a349', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:21 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/d47e8431-0063-44c8-a162-bc4020b774fc'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:21.510 189 INFO tempest.lib.common.rest_client [req-8feb0caa-a798-45f5-b45b-f0584a4926e8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.240s 2020-12-14 02:17:21.513 189 DEBUG tempest.lib.common.rest_client [req-8feb0caa-a798-45f5-b45b-f0584a4926e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8feb0caa-a798-45f5-b45b-f0584a4926e8', 'x-compute-request-id': 'req-8feb0caa-a798-45f5-b45b-f0584a4926e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:21.637 193 INFO tempest.lib.common.rest_client [req-f0910237-97eb-4800-95c0-6777e62c4bfe ] Request (PortsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7 0.157s 2020-12-14 02:17:21.641 193 DEBUG tempest.lib.common.rest_client [req-f0910237-97eb-4800-95c0-6777e62c4bfe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0910237-97eb-4800-95c0-6777e62c4bfe', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5d2b22c24509439eb518838e24b766b7'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:21.766 193 INFO tempest.lib.common.rest_client [req-917b766e-b3ca-4743-ae1c-4a32428d297b ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:17:21.769 193 DEBUG tempest.lib.common.rest_client [req-917b766e-b3ca-4743-ae1c-4a32428d297b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-917b766e-b3ca-4743-ae1c-4a32428d297b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["dsZ0QtF9RvWECyEoATOjcA"], "expires_at": "2020-12-14T03:17:21.000000Z", "issued_at": "2020-12-14T02:17:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:21.870 193 INFO tempest.lib.common.rest_client [req-65af2fc7-1a6e-44e3-9001-7faed65b653c ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:17:21.873 193 DEBUG tempest.lib.common.rest_client [req-65af2fc7-1a6e-44e3-9001-7faed65b653c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-65af2fc7-1a6e-44e3-9001-7faed65b653c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["rFF9BL_YT8CemFqwvR5Lkg"], "expires_at": "2020-12-14T03:17:21.000000Z", "issued_at": "2020-12-14T02:17:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:21.918 186 INFO tempest.lib.common.rest_client [req-8bf6cc17-201d-4dc6-b126-73663c2c4b31 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 1.051s 2020-12-14 02:17:21.921 186 DEBUG tempest.lib.common.rest_client [req-8bf6cc17-201d-4dc6-b126-73663c2c4b31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-MiscPolicyActionsNetworkRbacTest-server-1217856526", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "29581da7-daeb-44b2-aca1-c64c19d19bbc"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8bf6cc17-201d-4dc6-b126-73663c2c4b31', 'x-compute-request-id': 'req-8bf6cc17-201d-4dc6-b126-73663c2c4b31', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "703b2245-e2b9-43e1-b086-817fa53745e5", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "UhW8PWBw53Vs"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:21.943 193 INFO tempest.lib.common.rest_client [req-016a172f-0f88-4450-92a8-b046ca2135b7 ] Request (QosExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.062s 2020-12-14 02:17:21.946 193 DEBUG tempest.lib.common.rest_client [req-016a172f-0f88-4450-92a8-b046ca2135b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-016a172f-0f88-4450-92a8-b046ca2135b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:22.033 193 INFO tempest.lib.common.rest_client [req-cd16e83f-2efe-48cb-855f-0f46fdb5b77f ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.079s 2020-12-14 02:17:22.035 193 DEBUG tempest.lib.common.rest_client [req-cd16e83f-2efe-48cb-855f-0f46fdb5b77f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QosExtRbacTest-1634646245-desc", "domain_id": "default", "name": "tempest-QosExtRbacTest-1634646245"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '366', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd16e83f-2efe-48cb-855f-0f46fdb5b77f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245", "domain_id": "default", "description": "tempest-QosExtRbacTest-1634646245-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:22.135 186 INFO tempest.lib.common.rest_client [req-b12ccc6e-9028-4cd1-bd29-85d2d8c1e270 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5 0.183s 2020-12-14 02:17:22.138 186 DEBUG tempest.lib.common.rest_client [req-b12ccc6e-9028-4cd1-bd29-85d2d8c1e270 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1408', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b12ccc6e-9028-4cd1-bd29-85d2d8c1e270', 'x-compute-request-id': 'req-b12ccc6e-9028-4cd1-bd29-85d2d8c1e270', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5'} Body: b'{"server": {"id": "703b2245-e2b9-43e1-b086-817fa53745e5", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-1217856526", "status": "BUILD", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "user_id": "c9c6177d06e54d90aff506ccfab61ac9", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:17:22Z", "updated": "2020-12-14T02:17:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:22.164 193 INFO tempest.lib.common.rest_client [req-a676c32f-8a93-479b-b2f2-15265499f2fc ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.121s 2020-12-14 02:17:22.167 193 DEBUG tempest.lib.common.rest_client [req-a676c32f-8a93-479b-b2f2-15265499f2fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-QosExtRbacTest-1634646245", "password": "P4#weD~gcVhnb@C", "project_id": "b81a605932034dc69389ef362e8a3005", "email": "tempest-QosExtRbacTest-1639725414@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a676c32f-8a93-479b-b2f2-15265499f2fc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "b81a605932034dc69389ef362e8a3005", "email": "tempest-QosExtRbacTest-1639725414@example.com", "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/c7b62b9a73a14283bbf3eb87ef818fe0"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:22.232 193 INFO tempest.lib.common.rest_client [req-6111b8a8-819d-4053-b21e-d0d3981b60c8 ] Request (QosExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:17:22.234 193 DEBUG tempest.lib.common.rest_client [req-6111b8a8-819d-4053-b21e-d0d3981b60c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6111b8a8-819d-4053-b21e-d0d3981b60c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:22.305 193 INFO tempest.lib.common.rest_client [req-4d3d476f-296e-4d00-bdc5-857147fb79e2 ] Request (QosExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:17:22.307 193 DEBUG tempest.lib.common.rest_client [req-4d3d476f-296e-4d00-bdc5-857147fb79e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d3d476f-296e-4d00-bdc5-857147fb79e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:22.389 193 INFO tempest.lib.common.rest_client [req-413b5f83-1868-4253-b3b2-048fbcf7bac2 ] Request (QosExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles/72a4576c553448cd941b052c1ca0cf2d 0.074s 2020-12-14 02:17:22.391 193 DEBUG tempest.lib.common.rest_client [req-413b5f83-1868-4253-b3b2-048fbcf7bac2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-413b5f83-1868-4253-b3b2-048fbcf7bac2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:22.393 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QosExtRbacTest-1634646245', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'b81a605932034dc69389ef362e8a3005', 'project_name': 'tempest-QosExtRbacTest-1634646245', 'tenant_id': 'b81a605932034dc69389ef362e8a3005', 'tenant_name': 'tempest-QosExtRbacTest-1634646245', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c7b62b9a73a14283bbf3eb87ef818fe0'}, Network: None, Subnet: None, Router: None 2020-12-14 02:17:22.396 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QosExtRbacTest-1634646245', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'b81a605932034dc69389ef362e8a3005', 'project_name': 'tempest-QosExtRbacTest-1634646245', 'tenant_id': 'b81a605932034dc69389ef362e8a3005', 'tenant_name': 'tempest-QosExtRbacTest-1634646245', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c7b62b9a73a14283bbf3eb87ef818fe0'}, Network: None, Subnet: None, Router: None 2020-12-14 02:17:22.515 197 INFO tempest.lib.common.rest_client [req-ccc6c3e7-98fc-40f3-b0c6-0de0062f147d ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.243s 2020-12-14 02:17:22.519 197 DEBUG tempest.lib.common.rest_client [req-ccc6c3e7-98fc-40f3-b0c6-0de0062f147d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ccc6c3e7-98fc-40f3-b0c6-0de0062f147d', 'x-compute-request-id': 'req-ccc6c3e7-98fc-40f3-b0c6-0de0062f147d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:22.573 193 INFO tempest.lib.common.rest_client [req-37d3c836-723a-42e5-9cb2-d404a3f01877 ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:17:22.576 193 DEBUG tempest.lib.common.rest_client [req-37d3c836-723a-42e5-9cb2-d404a3f01877 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6559', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-37d3c836-723a-42e5-9cb2-d404a3f01877', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["TzqL-Kx8SpqB4KOtGeg8gQ"], "expires_at": "2020-12-14T03:17:22.000000Z", "issued_at": "2020-12-14T02:17:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/im _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:22.580 193 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-12-14 02:17:22.698 193 INFO tempest.lib.common.rest_client [req-e3a6d72e-0ec8-442d-8135-3826721ba514 ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-14 02:17:22.701 193 DEBUG tempest.lib.common.rest_client [req-e3a6d72e-0ec8-442d-8135-3826721ba514 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3a6d72e-0ec8-442d-8135-3826721ba514', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["FCGAn_C_Rdi6wnm6mmEqnQ"], "expires_at": "2020-12-14T03:17:22.000000Z", "issued_at": "2020-12-14T02:17:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:22.812 193 INFO tempest.lib.common.rest_client [req-d53bb887-a614-46d1-9be1-0777c6cd2814 ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:17:22.814 193 DEBUG tempest.lib.common.rest_client [req-d53bb887-a614-46d1-9be1-0777c6cd2814 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d53bb887-a614-46d1-9be1-0777c6cd2814', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["w5cT1X1uTgKf954V81Vf8w"], "expires_at": "2020-12-14T03:17:22.000000Z", "issued_at": "2020-12-14T02:17:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:22.850 189 INFO tempest.lib.common.rest_client [req-835de6b4-c869-4edf-b771-dd2e4cb07b72 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.230s 2020-12-14 02:17:22.854 189 DEBUG tempest.lib.common.rest_client [req-835de6b4-c869-4edf-b771-dd2e4cb07b72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-835de6b4-c869-4edf-b771-dd2e4cb07b72', 'x-compute-request-id': 'req-835de6b4-c869-4edf-b771-dd2e4cb07b72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:22.883 193 INFO tempest.lib.common.rest_client [req-7ef350e0-f7ec-4827-bf25-556a41eedcfb ] Request (QosExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.061s 2020-12-14 02:17:22.886 193 DEBUG tempest.lib.common.rest_client [req-7ef350e0-f7ec-4827-bf25-556a41eedcfb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ef350e0-f7ec-4827-bf25-556a41eedcfb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:22.946 193 INFO tempest.lib.common.rest_client [req-a7d2bfb4-c31a-430c-8d3b-a084c2fe37f7 ] Request (QosExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-12-14 02:17:22.949 193 DEBUG tempest.lib.common.rest_client [req-a7d2bfb4-c31a-430c-8d3b-a084c2fe37f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7d2bfb4-c31a-430c-8d3b-a084c2fe37f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:22.952 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:17:22.955 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:23.023 193 INFO tempest.lib.common.rest_client [req-da8505ba-1e35-4f91-ab29-84c05556256e ] Request (QosExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles 0.063s 2020-12-14 02:17:23.025 193 DEBUG tempest.lib.common.rest_client [req-da8505ba-1e35-4f91-ab29-84c05556256e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da8505ba-1e35-4f91-ab29-84c05556256e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:23.097 193 INFO tempest.lib.common.rest_client [req-9d06691c-e205-40b3-8888-53a53f870e89 ] Request (QosExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-12-14 02:17:23.099 193 DEBUG tempest.lib.common.rest_client [req-9d06691c-e205-40b3-8888-53a53f870e89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9d06691c-e205-40b3-8888-53a53f870e89', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:23.224 193 INFO tempest.lib.common.rest_client [req-bf7b8da3-6531-4323-95d3-83ad720e892c ] Request (QosExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles/a629c95d64b3416fb80ae90af4f69c05 0.118s 2020-12-14 02:17:23.227 193 DEBUG tempest.lib.common.rest_client [req-bf7b8da3-6531-4323-95d3-83ad720e892c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf7b8da3-6531-4323-95d3-83ad720e892c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:23.413 186 INFO tempest.lib.common.rest_client [req-ce4a2247-daec-4687-baa0-5459b9057833 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5 0.168s 2020-12-14 02:17:23.416 186 DEBUG tempest.lib.common.rest_client [req-ce4a2247-daec-4687-baa0-5459b9057833 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1513', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ce4a2247-daec-4687-baa0-5459b9057833', 'x-compute-request-id': 'req-ce4a2247-daec-4687-baa0-5459b9057833', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5'} Body: b'{"server": {"id": "703b2245-e2b9-43e1-b086-817fa53745e5", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-1217856526", "status": "BUILD", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "user_id": "c9c6177d06e54d90aff506ccfab61ac9", "metadata": {}, "hostId": "f3f1330a55f2bf3bdba617cc0942961ee900f44468a170a0467a6a0e", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:17:21Z", "updated": "2020-12-14T02:17:23Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "block_device_mapping", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:23.512 186 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/block_device_mapping" after 1 second wait 2020-12-14 02:17:23.848 197 INFO tempest.lib.common.rest_client [req-c2f80c48-77ef-4adb-b8b8-2739f8c2d1d0 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.222s 2020-12-14 02:17:23.851 197 DEBUG tempest.lib.common.rest_client [req-c2f80c48-77ef-4adb-b8b8-2739f8c2d1d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c2f80c48-77ef-4adb-b8b8-2739f8c2d1d0', 'x-compute-request-id': 'req-c2f80c48-77ef-4adb-b8b8-2739f8c2d1d0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:24.175 189 INFO tempest.lib.common.rest_client [req-430b0933-6394-4f26-9877-f88bb9708a8a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.214s 2020-12-14 02:17:24.179 189 DEBUG tempest.lib.common.rest_client [req-430b0933-6394-4f26-9877-f88bb9708a8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-430b0933-6394-4f26-9877-f88bb9708a8a', 'x-compute-request-id': 'req-430b0933-6394-4f26-9877-f88bb9708a8a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:24.333 193 INFO tempest.lib.common.rest_client [req-dba6a26c-769f-4b34-889c-e086ce164641 ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:17:24.337 193 DEBUG tempest.lib.common.rest_client [req-dba6a26c-769f-4b34-889c-e086ce164641 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dba6a26c-769f-4b34-889c-e086ce164641', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["gh5ZwLZATlecTgy3fUKUCA"], "expires_at": "2020-12-14T03:17:24.000000Z", "issued_at": "2020-12-14T02:17:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:24.389 193 INFO tempest.lib.common.rest_client [req-a083b30f-61d4-401c-aa89-40e86bc9da4f ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:17:24.391 193 DEBUG tempest.lib.common.rest_client [req-a083b30f-61d4-401c-aa89-40e86bc9da4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a083b30f-61d4-401c-aa89-40e86bc9da4f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["b9GG9xkdRymFKDN6nRSL1A"], "expires_at": "2020-12-14T03:17:24.000000Z", "issued_at": "2020-12-14T02:17:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:24.739 186 INFO tempest.lib.common.rest_client [req-5dd0dcc9-c0d4-42ac-a547-ab2bbc59b758 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5 0.218s 2020-12-14 02:17:24.742 186 DEBUG tempest.lib.common.rest_client [req-5dd0dcc9-c0d4-42ac-a547-ab2bbc59b758 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1543', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5dd0dcc9-c0d4-42ac-a547-ab2bbc59b758', 'x-compute-request-id': 'req-5dd0dcc9-c0d4-42ac-a547-ab2bbc59b758', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5'} Body: b'{"server": {"id": "703b2245-e2b9-43e1-b086-817fa53745e5", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-1217856526", "status": "BUILD", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "user_id": "c9c6177d06e54d90aff506ccfab61ac9", "metadata": {}, "hostId": "f3f1330a55f2bf3bdba617cc0942961ee900f44468a170a0467a6a0e", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:17:21Z", "updated": "2020-12-14T02:17:23Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:24.851 186 INFO tempest.common.waiters [-] State transition "BUILD/block_device_mapping" ==> "BUILD/spawning" after 2 second wait 2020-12-14 02:17:25.077 193 INFO tempest.lib.common.rest_client [req-2e3e9f2a-77aa-476f-99fe-fc3262b857c3 ] Request (QosExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.674s 2020-12-14 02:17:25.080 193 DEBUG tempest.lib.common.rest_client [req-2e3e9f2a-77aa-476f-99fe-fc3262b857c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-QosExtRbacTest-test-network-1401295785"}} Response - Headers: {'content-type': 'application/json', 'content-length': '735', 'x-openstack-request-id': 'req-2e3e9f2a-77aa-476f-99fe-fc3262b857c3', 'date': 'Mon, 14 Dec 2020 02:17:25 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"d568ea1e-3d00-4030-a7a9-f1d9b386938d","name":"tempest-QosExtRbacTest-test-network-1401295785","tenant_id":"b81a605932034dc69389ef362e8a3005","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"b81a605932034dc69389ef362e8a3005","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":69,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:17:24Z","updated_at":"2020-12-14T02:17:24Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:25.087 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:25.111 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_policy, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:25.113 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:25.174 197 INFO tempest.lib.common.rest_client [req-be62a9ea-2633-4f5a-bac1-56587e1b75cc ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.212s 2020-12-14 02:17:25.178 197 DEBUG tempest.lib.common.rest_client [req-be62a9ea-2633-4f5a-bac1-56587e1b75cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-be62a9ea-2633-4f5a-bac1-56587e1b75cc', 'x-compute-request-id': 'req-be62a9ea-2633-4f5a-bac1-56587e1b75cc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:25.241 193 INFO tempest.lib.common.rest_client [req-2a86868c-1dc7-4f1b-82ab-65f375fe41f5 ] Request (QosExtRbacTest:test_create_policy): 200 GET http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles 0.122s 2020-12-14 02:17:25.245 193 DEBUG tempest.lib.common.rest_client [req-2a86868c-1dc7-4f1b-82ab-65f375fe41f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a86868c-1dc7-4f1b-82ab-65f375fe41f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:25.309 193 INFO tempest.lib.common.rest_client [req-096b5368-da0c-47bd-a51c-0e05d152e2cd ] Request (QosExtRbacTest:test_create_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:17:25.313 193 DEBUG tempest.lib.common.rest_client [req-096b5368-da0c-47bd-a51c-0e05d152e2cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-096b5368-da0c-47bd-a51c-0e05d152e2cd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["JPCAbadUSJWYufDKec6YEQ"], "expires_at": "2020-12-14T03:17:25.000000Z", "issued_at": "2020-12-14T02:17:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:25.363 193 INFO tempest.lib.common.rest_client [req-5d8ebbc2-2c79-4afb-a5e1-5e31fa5b80d2 ] Request (QosExtRbacTest:test_create_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:17:25.366 193 DEBUG tempest.lib.common.rest_client [req-5d8ebbc2-2c79-4afb-a5e1-5e31fa5b80d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d8ebbc2-2c79-4afb-a5e1-5e31fa5b80d2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["UJMMTfG3Q0GEdkeOf5_5HA"], "expires_at": "2020-12-14T03:17:25.000000Z", "issued_at": "2020-12-14T02:17:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:25.493 193 INFO tempest.lib.common.rest_client [req-7f7f5f30-70fe-43a6-bd4a-7d02e397fa9b ] Request (QosExtRbacTest:test_create_policy): 201 POST http://172.30.13.94:9696/v2.0/qos/policies 0.120s 2020-12-14 02:17:25.497 193 DEBUG tempest.lib.common.rest_client [req-7f7f5f30-70fe-43a6-bd4a-7d02e397fa9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"name": "tempest-QosExtRbacTest-193838230", "shared": false, "is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '381', 'x-openstack-request-id': 'req-7f7f5f30-70fe-43a6-bd4a-7d02e397fa9b', 'date': 'Mon, 14 Dec 2020 02:17:25 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies'} Body: b'{"policy": {"id": "8658d421-2800-4b84-ad6a-6f62daf110ed", "project_id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-193838230", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-12-14T02:17:25Z", "updated_at": "2020-12-14T02:17:25Z", "tenant_id": "b81a605932034dc69389ef362e8a3005", "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:25.501 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:25.571 193 INFO tempest.lib.common.rest_client [req-ae29a945-ad6f-41a5-81d3-9e638cf9be78 ] Request (QosExtRbacTest:test_create_policy): 200 GET http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles 0.063s 2020-12-14 02:17:25.574 193 DEBUG tempest.lib.common.rest_client [req-ae29a945-ad6f-41a5-81d3-9e638cf9be78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae29a945-ad6f-41a5-81d3-9e638cf9be78', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:25.579 189 INFO tempest.lib.common.rest_client [req-cd421850-b877-43c6-99a6-eb413f9fade2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.281s 2020-12-14 02:17:25.582 189 DEBUG tempest.lib.common.rest_client [req-cd421850-b877-43c6-99a6-eb413f9fade2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cd421850-b877-43c6-99a6-eb413f9fade2', 'x-compute-request-id': 'req-cd421850-b877-43c6-99a6-eb413f9fade2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:25.620 193 INFO tempest.lib.common.rest_client [req-8b4685a7-0dd1-4cbd-85b4-7bfb02af360f ] Request (QosExtRbacTest:test_create_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:17:25.622 193 DEBUG tempest.lib.common.rest_client [req-8b4685a7-0dd1-4cbd-85b4-7bfb02af360f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b4685a7-0dd1-4cbd-85b4-7bfb02af360f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["q7wvoG1RQQ27KbX4v7z0AA"], "expires_at": "2020-12-14T03:17:25.000000Z", "issued_at": "2020-12-14T02:17:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:25.667 193 INFO tempest.lib.common.rest_client [req-7357594a-8457-465c-8d34-bfc29e2f0a16 ] Request (QosExtRbacTest:test_create_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:17:25.671 193 DEBUG tempest.lib.common.rest_client [req-7357594a-8457-465c-8d34-bfc29e2f0a16 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7357594a-8457-465c-8d34-bfc29e2f0a16', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["J5uXcirVSieiLibA-86GBg"], "expires_at": "2020-12-14T03:17:25.000000Z", "issued_at": "2020-12-14T02:17:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:25.833 193 INFO tempest.lib.common.rest_client [req-c7396f48-29aa-4adb-a906-0cb64ba55c67 ] Request (QosExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/8658d421-2800-4b84-ad6a-6f62daf110ed 0.152s 2020-12-14 02:17:25.836 193 DEBUG tempest.lib.common.rest_client [req-c7396f48-29aa-4adb-a906-0cb64ba55c67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c7396f48-29aa-4adb-a906-0cb64ba55c67', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:25 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/8658d421-2800-4b84-ad6a-6f62daf110ed'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:25.847 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:25.865 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:25.867 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:25.886 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_policy, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:25.935 193 INFO tempest.lib.common.rest_client [req-3d411d50-625c-42b4-9231-403b9b243fca ] Request (QosExtRbacTest:test_delete_policy): 201 POST http://172.30.13.94:9696/v2.0/qos/policies 0.044s 2020-12-14 02:17:25.937 193 DEBUG tempest.lib.common.rest_client [req-3d411d50-625c-42b4-9231-403b9b243fca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"name": "tempest-QosExtRbacTest-472998991", "shared": false, "is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '381', 'x-openstack-request-id': 'req-3d411d50-625c-42b4-9231-403b9b243fca', 'date': 'Mon, 14 Dec 2020 02:17:25 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies'} Body: b'{"policy": {"id": "35d36cc5-d22e-4476-8997-155d9ef5711d", "project_id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-472998991", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-12-14T02:17:25Z", "updated_at": "2020-12-14T02:17:25Z", "tenant_id": "b81a605932034dc69389ef362e8a3005", "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:25.940 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:26.000 193 INFO tempest.lib.common.rest_client [req-fa0d33e1-9871-4b3c-a871-e1b9e917fcf1 ] Request (QosExtRbacTest:test_delete_policy): 200 GET http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles 0.055s 2020-12-14 02:17:26.003 193 DEBUG tempest.lib.common.rest_client [req-fa0d33e1-9871-4b3c-a871-e1b9e917fcf1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa0d33e1-9871-4b3c-a871-e1b9e917fcf1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:26.047 193 INFO tempest.lib.common.rest_client [req-6bd63338-7249-430e-badb-aedec4eb73ad ] Request (QosExtRbacTest:test_delete_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:17:26.049 193 DEBUG tempest.lib.common.rest_client [req-6bd63338-7249-430e-badb-aedec4eb73ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6bd63338-7249-430e-badb-aedec4eb73ad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["PMYgb8_AQKidZYs7O5WTSA"], "expires_at": "2020-12-14T03:17:26.000000Z", "issued_at": "2020-12-14T02:17:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:26.094 193 INFO tempest.lib.common.rest_client [req-5e4413cd-4300-4d92-bc6e-3b08dbae5160 ] Request (QosExtRbacTest:test_delete_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:17:26.098 193 DEBUG tempest.lib.common.rest_client [req-5e4413cd-4300-4d92-bc6e-3b08dbae5160 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e4413cd-4300-4d92-bc6e-3b08dbae5160', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["8G_027ZtR5iFKIZQWIHUVg"], "expires_at": "2020-12-14T03:17:26.000000Z", "issued_at": "2020-12-14T02:17:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:26.173 186 INFO tempest.lib.common.rest_client [req-d63fa7a3-3970-4789-89ad-6e5c29d0e7fb ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5 0.313s 2020-12-14 02:17:26.177 186 DEBUG tempest.lib.common.rest_client [req-d63fa7a3-3970-4789-89ad-6e5c29d0e7fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1543', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d63fa7a3-3970-4789-89ad-6e5c29d0e7fb', 'x-compute-request-id': 'req-d63fa7a3-3970-4789-89ad-6e5c29d0e7fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5'} Body: b'{"server": {"id": "703b2245-e2b9-43e1-b086-817fa53745e5", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-1217856526", "status": "BUILD", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "user_id": "c9c6177d06e54d90aff506ccfab61ac9", "metadata": {}, "hostId": "f3f1330a55f2bf3bdba617cc0942961ee900f44468a170a0467a6a0e", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:17:21Z", "updated": "2020-12-14T02:17:23Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:26.251 193 INFO tempest.lib.common.rest_client [req-cb34c586-1333-4a8a-bc01-ba8a18976b35 ] Request (QosExtRbacTest:test_delete_policy): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/35d36cc5-d22e-4476-8997-155d9ef5711d 0.146s 2020-12-14 02:17:26.254 193 DEBUG tempest.lib.common.rest_client [req-cb34c586-1333-4a8a-bc01-ba8a18976b35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-cb34c586-1333-4a8a-bc01-ba8a18976b35', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:26 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/35d36cc5-d22e-4476-8997-155d9ef5711d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:26.257 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:26.329 193 INFO tempest.lib.common.rest_client [req-75a1f332-d454-4921-9f09-e3985878ee97 ] Request (QosExtRbacTest:test_delete_policy): 200 GET http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles 0.066s 2020-12-14 02:17:26.333 193 DEBUG tempest.lib.common.rest_client [req-75a1f332-d454-4921-9f09-e3985878ee97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-75a1f332-d454-4921-9f09-e3985878ee97', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:26.380 193 INFO tempest.lib.common.rest_client [req-6e851f06-3b5f-44dd-aff2-2f4ce0c8d88d ] Request (QosExtRbacTest:test_delete_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:17:26.382 193 DEBUG tempest.lib.common.rest_client [req-6e851f06-3b5f-44dd-aff2-2f4ce0c8d88d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e851f06-3b5f-44dd-aff2-2f4ce0c8d88d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["aGTOZxo8QZK5VAnAwQjKZg"], "expires_at": "2020-12-14T03:17:26.000000Z", "issued_at": "2020-12-14T02:17:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:26.429 193 INFO tempest.lib.common.rest_client [req-115df022-94af-4ccf-9a59-d934f2bcd1fc ] Request (QosExtRbacTest:test_delete_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:17:26.431 193 DEBUG tempest.lib.common.rest_client [req-115df022-94af-4ccf-9a59-d934f2bcd1fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-115df022-94af-4ccf-9a59-d934f2bcd1fc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["MJnN9b7qQBmbD61x4KBPZg"], "expires_at": "2020-12-14T03:17:26.000000Z", "issued_at": "2020-12-14T02:17:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:26.548 193 INFO tempest.lib.common.rest_client [req-feea212a-5aa4-4a88-91d0-9b2688384750 ] Request (QosExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/qos/policies/35d36cc5-d22e-4476-8997-155d9ef5711d 0.110s 2020-12-14 02:17:26.552 193 DEBUG tempest.lib.common.rest_client [req-feea212a-5aa4-4a88-91d0-9b2688384750 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '143', 'x-openstack-request-id': 'req-feea212a-5aa4-4a88-91d0-9b2688384750', 'date': 'Mon, 14 Dec 2020 02:17:26 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/35d36cc5-d22e-4476-8997-155d9ef5711d'} Body: b'{"NeutronError": {"type": "QosPolicyNotFound", "message": "QoS policy 35d36cc5-d22e-4476-8997-155d9ef5711d could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:26.563 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:26.579 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:26.666 193 INFO tempest.lib.common.rest_client [req-0095ebc1-6159-43a0-9a41-62d34bdae963 ] Request (QosExtRbacTest:test_get_policy): 201 POST http://172.30.13.94:9696/v2.0/qos/policies 0.082s 2020-12-14 02:17:26.670 193 DEBUG tempest.lib.common.rest_client [req-0095ebc1-6159-43a0-9a41-62d34bdae963 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"name": "tempest-QosExtRbacTest-1519822363", "shared": false, "is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '382', 'x-openstack-request-id': 'req-0095ebc1-6159-43a0-9a41-62d34bdae963', 'date': 'Mon, 14 Dec 2020 02:17:26 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies'} Body: b'{"policy": {"id": "bb59d152-05e4-47eb-95f9-beeb1102e76f", "project_id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1519822363", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-12-14T02:17:26Z", "updated_at": "2020-12-14T02:17:26Z", "tenant_id": "b81a605932034dc69389ef362e8a3005", "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:26.673 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:26.689 197 INFO tempest.lib.common.rest_client [req-dae7b4b5-5671-4997-96c0-00db0861be08 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.402s 2020-12-14 02:17:26.693 197 DEBUG tempest.lib.common.rest_client [req-dae7b4b5-5671-4997-96c0-00db0861be08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dae7b4b5-5671-4997-96c0-00db0861be08', 'x-compute-request-id': 'req-dae7b4b5-5671-4997-96c0-00db0861be08', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:26.738 193 INFO tempest.lib.common.rest_client [req-58c1676a-0595-4156-98f8-37ae9131c47a ] Request (QosExtRbacTest:test_get_policy): 200 GET http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles 0.059s 2020-12-14 02:17:26.741 193 DEBUG tempest.lib.common.rest_client [req-58c1676a-0595-4156-98f8-37ae9131c47a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58c1676a-0595-4156-98f8-37ae9131c47a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:26.801 193 INFO tempest.lib.common.rest_client [req-052ab29f-86b3-4cc4-9922-02d94131a1b7 ] Request (QosExtRbacTest:test_get_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:17:26.804 193 DEBUG tempest.lib.common.rest_client [req-052ab29f-86b3-4cc4-9922-02d94131a1b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-052ab29f-86b3-4cc4-9922-02d94131a1b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["Z6x1aDBtQIWnEY_O6hfBGQ"], "expires_at": "2020-12-14T03:17:26.000000Z", "issued_at": "2020-12-14T02:17:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:26.856 193 INFO tempest.lib.common.rest_client [req-80fdcf21-6106-4f08-a012-0afed68c02ff ] Request (QosExtRbacTest:test_get_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:17:26.861 193 DEBUG tempest.lib.common.rest_client [req-80fdcf21-6106-4f08-a012-0afed68c02ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-80fdcf21-6106-4f08-a012-0afed68c02ff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["GEraf2tqT1CJeSPctt8jlQ"], "expires_at": "2020-12-14T03:17:26.000000Z", "issued_at": "2020-12-14T02:17:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:26.900 189 INFO tempest.lib.common.rest_client [req-0b23d4a4-90af-4cba-b3e1-b2189126b107 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.211s 2020-12-14 02:17:26.904 189 DEBUG tempest.lib.common.rest_client [req-0b23d4a4-90af-4cba-b3e1-b2189126b107 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0b23d4a4-90af-4cba-b3e1-b2189126b107', 'x-compute-request-id': 'req-0b23d4a4-90af-4cba-b3e1-b2189126b107', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:26.988 193 INFO tempest.lib.common.rest_client [req-250d4e96-cf5c-4e7c-8a93-49a5dfbc8bd7 ] Request (QosExtRbacTest:test_get_policy): 200 GET http://172.30.13.94:9696/v2.0/qos/policies/bb59d152-05e4-47eb-95f9-beeb1102e76f 0.119s 2020-12-14 02:17:26.993 193 DEBUG tempest.lib.common.rest_client [req-250d4e96-cf5c-4e7c-8a93-49a5dfbc8bd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '382', 'x-openstack-request-id': 'req-250d4e96-cf5c-4e7c-8a93-49a5dfbc8bd7', 'date': 'Mon, 14 Dec 2020 02:17:26 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/bb59d152-05e4-47eb-95f9-beeb1102e76f'} Body: b'{"policy": {"id": "bb59d152-05e4-47eb-95f9-beeb1102e76f", "project_id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1519822363", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-12-14T02:17:26Z", "updated_at": "2020-12-14T02:17:26Z", "tenant_id": "b81a605932034dc69389ef362e8a3005", "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:26.996 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:27.066 193 INFO tempest.lib.common.rest_client [req-3b108179-0bd5-4c88-a578-dc94def1ac7b ] Request (QosExtRbacTest:test_get_policy): 200 GET http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles 0.063s 2020-12-14 02:17:27.069 193 DEBUG tempest.lib.common.rest_client [req-3b108179-0bd5-4c88-a578-dc94def1ac7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b108179-0bd5-4c88-a578-dc94def1ac7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:27.121 193 INFO tempest.lib.common.rest_client [req-7f2337f0-e7c6-4c23-b6d3-95e4de3f89dc ] Request (QosExtRbacTest:test_get_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:17:27.126 193 DEBUG tempest.lib.common.rest_client [req-7f2337f0-e7c6-4c23-b6d3-95e4de3f89dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f2337f0-e7c6-4c23-b6d3-95e4de3f89dc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["rzoeUVM6Th29zmtQRLxOSg"], "expires_at": "2020-12-14T03:17:27.000000Z", "issued_at": "2020-12-14T02:17:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:27.177 193 INFO tempest.lib.common.rest_client [req-b921f732-f283-477e-8390-0220c12fadba ] Request (QosExtRbacTest:test_get_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:17:27.180 193 DEBUG tempest.lib.common.rest_client [req-b921f732-f283-477e-8390-0220c12fadba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b921f732-f283-477e-8390-0220c12fadba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["ylUkNigFQRGECj8DxIHWug"], "expires_at": "2020-12-14T03:17:27.000000Z", "issued_at": "2020-12-14T02:17:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:27.332 193 INFO tempest.lib.common.rest_client [req-96d2a538-a24c-42d9-afad-bc984e7d398d ] Request (QosExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/bb59d152-05e4-47eb-95f9-beeb1102e76f 0.145s 2020-12-14 02:17:27.335 193 DEBUG tempest.lib.common.rest_client [req-96d2a538-a24c-42d9-afad-bc984e7d398d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-96d2a538-a24c-42d9-afad-bc984e7d398d', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:27 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/bb59d152-05e4-47eb-95f9-beeb1102e76f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:27.350 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:27.370 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:27.429 193 INFO tempest.lib.common.rest_client [req-edb87806-b3d7-46f6-9bb9-a66b4ffdcf2c ] Request (QosExtRbacTest:test_list_policies): 201 POST http://172.30.13.94:9696/v2.0/qos/policies 0.054s 2020-12-14 02:17:27.432 193 DEBUG tempest.lib.common.rest_client [req-edb87806-b3d7-46f6-9bb9-a66b4ffdcf2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"name": "tempest-QosExtRbacTest-1150626692", "shared": false, "is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '382', 'x-openstack-request-id': 'req-edb87806-b3d7-46f6-9bb9-a66b4ffdcf2c', 'date': 'Mon, 14 Dec 2020 02:17:27 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies'} Body: b'{"policy": {"id": "73418b5e-cb4d-4bc0-b000-9b50a46b7cc1", "project_id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1150626692", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-12-14T02:17:27Z", "updated_at": "2020-12-14T02:17:27Z", "tenant_id": "b81a605932034dc69389ef362e8a3005", "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:27.435 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:27.504 193 INFO tempest.lib.common.rest_client [req-8d3a36dc-7cbd-4e60-ad04-3f0b948cd3d6 ] Request (QosExtRbacTest:test_list_policies): 200 GET http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles 0.062s 2020-12-14 02:17:27.508 193 DEBUG tempest.lib.common.rest_client [req-8d3a36dc-7cbd-4e60-ad04-3f0b948cd3d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8d3a36dc-7cbd-4e60-ad04-3f0b948cd3d6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:27.547 186 INFO tempest.lib.common.rest_client [req-a5f271b2-5663-4b29-801a-222638d6e5d5 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5 0.262s 2020-12-14 02:17:27.549 186 DEBUG tempest.lib.common.rest_client [req-a5f271b2-5663-4b29-801a-222638d6e5d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1543', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a5f271b2-5663-4b29-801a-222638d6e5d5', 'x-compute-request-id': 'req-a5f271b2-5663-4b29-801a-222638d6e5d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5'} Body: b'{"server": {"id": "703b2245-e2b9-43e1-b086-817fa53745e5", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-1217856526", "status": "BUILD", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "user_id": "c9c6177d06e54d90aff506ccfab61ac9", "metadata": {}, "hostId": "f3f1330a55f2bf3bdba617cc0942961ee900f44468a170a0467a6a0e", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:17:21Z", "updated": "2020-12-14T02:17:23Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:27.565 193 INFO tempest.lib.common.rest_client [req-5d18b5d0-c6a9-4558-85de-906e75c6dfd2 ] Request (QosExtRbacTest:test_list_policies): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:17:27.569 193 DEBUG tempest.lib.common.rest_client [req-5d18b5d0-c6a9-4558-85de-906e75c6dfd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d18b5d0-c6a9-4558-85de-906e75c6dfd2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["Nuf21s_ZRTmejzF42-ipPQ"], "expires_at": "2020-12-14T03:17:27.000000Z", "issued_at": "2020-12-14T02:17:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:27.624 193 INFO tempest.lib.common.rest_client [req-e669c791-9b67-40ba-ac2a-1ccd6a5ded36 ] Request (QosExtRbacTest:test_list_policies): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:17:27.627 193 DEBUG tempest.lib.common.rest_client [req-e669c791-9b67-40ba-ac2a-1ccd6a5ded36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e669c791-9b67-40ba-ac2a-1ccd6a5ded36', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["ipTYP6oaSge-x9JP79fGtQ"], "expires_at": "2020-12-14T03:17:27.000000Z", "issued_at": "2020-12-14T02:17:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:27.777 193 INFO tempest.lib.common.rest_client [req-d7ce696d-2b8d-48fd-a593-fe69d610db84 ] Request (QosExtRbacTest:test_list_policies): 200 GET http://172.30.13.94:9696/v2.0/qos/policies?id=73418b5e-cb4d-4bc0-b000-9b50a46b7cc1 0.142s 2020-12-14 02:17:27.781 193 DEBUG tempest.lib.common.rest_client [req-d7ce696d-2b8d-48fd-a593-fe69d610db84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '386', 'x-openstack-request-id': 'req-d7ce696d-2b8d-48fd-a593-fe69d610db84', 'date': 'Mon, 14 Dec 2020 02:17:27 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies?id=73418b5e-cb4d-4bc0-b000-9b50a46b7cc1'} Body: b'{"policies": [{"id": "73418b5e-cb4d-4bc0-b000-9b50a46b7cc1", "project_id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1150626692", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-12-14T02:17:27Z", "updated_at": "2020-12-14T02:17:27Z", "tenant_id": "b81a605932034dc69389ef362e8a3005", "tags": []}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:27.784 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:27.855 193 INFO tempest.lib.common.rest_client [req-f72b4d13-4be8-41c8-a74c-2f9198277c0b ] Request (QosExtRbacTest:test_list_policies): 200 GET http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles 0.066s 2020-12-14 02:17:27.859 193 DEBUG tempest.lib.common.rest_client [req-f72b4d13-4be8-41c8-a74c-2f9198277c0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f72b4d13-4be8-41c8-a74c-2f9198277c0b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:27.913 193 INFO tempest.lib.common.rest_client [req-ec39b095-154c-409e-b11d-a5c29fb3db9b ] Request (QosExtRbacTest:test_list_policies): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:17:27.917 193 DEBUG tempest.lib.common.rest_client [req-ec39b095-154c-409e-b11d-a5c29fb3db9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec39b095-154c-409e-b11d-a5c29fb3db9b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["I2d1T3LpR_WvHF937H0Pdw"], "expires_at": "2020-12-14T03:17:27.000000Z", "issued_at": "2020-12-14T02:17:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:27.976 193 INFO tempest.lib.common.rest_client [req-55e845fa-8c32-47e6-b414-d295270d6d94 ] Request (QosExtRbacTest:test_list_policies): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:17:27.981 193 DEBUG tempest.lib.common.rest_client [req-55e845fa-8c32-47e6-b414-d295270d6d94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55e845fa-8c32-47e6-b414-d295270d6d94', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["kr5zzfwbT-SNuKZ7JUpaOQ"], "expires_at": "2020-12-14T03:17:27.000000Z", "issued_at": "2020-12-14T02:17:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:28.171 193 INFO tempest.lib.common.rest_client [req-50c8fd6b-e84d-47e1-a2b7-250aaacc2409 ] Request (QosExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/73418b5e-cb4d-4bc0-b000-9b50a46b7cc1 0.181s 2020-12-14 02:17:28.174 197 INFO tempest.lib.common.rest_client [req-43964cd7-1604-48b5-b2c1-eb16f50dedd2 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.372s 2020-12-14 02:17:28.175 193 DEBUG tempest.lib.common.rest_client [req-50c8fd6b-e84d-47e1-a2b7-250aaacc2409 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-50c8fd6b-e84d-47e1-a2b7-250aaacc2409', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:28 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/73418b5e-cb4d-4bc0-b000-9b50a46b7cc1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:28.177 197 DEBUG tempest.lib.common.rest_client [req-43964cd7-1604-48b5-b2c1-eb16f50dedd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-43964cd7-1604-48b5-b2c1-eb16f50dedd2', 'x-compute-request-id': 'req-43964cd7-1604-48b5-b2c1-eb16f50dedd2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:28.193 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:28.217 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:28.219 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:28.239 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_policy, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:28.273 189 INFO tempest.lib.common.rest_client [req-0bed8454-5e87-4b88-8804-8af90dd24ec3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.263s 2020-12-14 02:17:28.277 189 DEBUG tempest.lib.common.rest_client [req-0bed8454-5e87-4b88-8804-8af90dd24ec3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0bed8454-5e87-4b88-8804-8af90dd24ec3', 'x-compute-request-id': 'req-0bed8454-5e87-4b88-8804-8af90dd24ec3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:28.300 193 INFO tempest.lib.common.rest_client [req-f6d005d8-a079-40a2-9e5b-39693b967f60 ] Request (QosExtRbacTest:test_update_policy): 201 POST http://172.30.13.94:9696/v2.0/qos/policies 0.052s 2020-12-14 02:17:28.303 193 DEBUG tempest.lib.common.rest_client [req-f6d005d8-a079-40a2-9e5b-39693b967f60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"name": "tempest-QosExtRbacTest-1425531000", "shared": false, "is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '382', 'x-openstack-request-id': 'req-f6d005d8-a079-40a2-9e5b-39693b967f60', 'date': 'Mon, 14 Dec 2020 02:17:28 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies'} Body: b'{"policy": {"id": "ea6ad582-d80f-40ec-a874-298c69e3d866", "project_id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1425531000", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-12-14T02:17:28Z", "updated_at": "2020-12-14T02:17:28Z", "tenant_id": "b81a605932034dc69389ef362e8a3005", "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:28.307 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:28.382 193 INFO tempest.lib.common.rest_client [req-8779bbf7-1357-4b8e-8cae-f6ea0c5d7742 ] Request (QosExtRbacTest:test_update_policy): 200 GET http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles 0.069s 2020-12-14 02:17:28.385 193 DEBUG tempest.lib.common.rest_client [req-8779bbf7-1357-4b8e-8cae-f6ea0c5d7742 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8779bbf7-1357-4b8e-8cae-f6ea0c5d7742', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:28.440 193 INFO tempest.lib.common.rest_client [req-2416fdb2-bcea-4bc2-9eb8-ec9139dd9620 ] Request (QosExtRbacTest:test_update_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:17:28.444 193 DEBUG tempest.lib.common.rest_client [req-2416fdb2-bcea-4bc2-9eb8-ec9139dd9620 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2416fdb2-bcea-4bc2-9eb8-ec9139dd9620', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["inoWD-X-Rvivrv7Cea55_w"], "expires_at": "2020-12-14T03:17:28.000000Z", "issued_at": "2020-12-14T02:17:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:28.496 193 INFO tempest.lib.common.rest_client [req-36550769-4667-40d2-8684-d021b94e97ca ] Request (QosExtRbacTest:test_update_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:17:28.499 193 DEBUG tempest.lib.common.rest_client [req-36550769-4667-40d2-8684-d021b94e97ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36550769-4667-40d2-8684-d021b94e97ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["rJjLTAp6SvqoByR6-kMY7Q"], "expires_at": "2020-12-14T03:17:28.000000Z", "issued_at": "2020-12-14T02:17:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:28.673 193 INFO tempest.lib.common.rest_client [req-54d9f47d-a0a4-4ac4-8f59-d2ff2a0aa940 ] Request (QosExtRbacTest:test_update_policy): 200 PUT http://172.30.13.94:9696/v2.0/qos/policies/ea6ad582-d80f-40ec-a874-298c69e3d866 0.167s 2020-12-14 02:17:28.677 193 DEBUG tempest.lib.common.rest_client [req-54d9f47d-a0a4-4ac4-8f59-d2ff2a0aa940 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"description": "updated"}} Response - Headers: {'content-type': 'application/json', 'content-length': '389', 'x-openstack-request-id': 'req-54d9f47d-a0a4-4ac4-8f59-d2ff2a0aa940', 'date': 'Mon, 14 Dec 2020 02:17:28 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/ea6ad582-d80f-40ec-a874-298c69e3d866'} Body: b'{"policy": {"id": "ea6ad582-d80f-40ec-a874-298c69e3d866", "project_id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1425531000", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "updated", "created_at": "2020-12-14T02:17:28Z", "updated_at": "2020-12-14T02:17:28Z", "tenant_id": "b81a605932034dc69389ef362e8a3005", "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:28.681 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:28.760 193 INFO tempest.lib.common.rest_client [req-f287d74e-5eb1-476c-ae33-902d7536be78 ] Request (QosExtRbacTest:test_update_policy): 200 GET http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles 0.070s 2020-12-14 02:17:28.764 193 DEBUG tempest.lib.common.rest_client [req-f287d74e-5eb1-476c-ae33-902d7536be78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f287d74e-5eb1-476c-ae33-902d7536be78', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005/users/c7b62b9a73a14283bbf3eb87ef818fe0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:28.821 193 INFO tempest.lib.common.rest_client [req-de86ff14-dc67-4373-9a6e-3e1c60a46ca1 ] Request (QosExtRbacTest:test_update_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:17:28.825 193 DEBUG tempest.lib.common.rest_client [req-de86ff14-dc67-4373-9a6e-3e1c60a46ca1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de86ff14-dc67-4373-9a6e-3e1c60a46ca1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["oOxKO1BySs-ImirGz1DQrw"], "expires_at": "2020-12-14T03:17:28.000000Z", "issued_at": "2020-12-14T02:17:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:28.867 186 INFO tempest.lib.common.rest_client [req-4c375e8b-44fc-470d-a0a3-6c3c19971e95 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5 0.215s 2020-12-14 02:17:28.870 186 DEBUG tempest.lib.common.rest_client [req-4c375e8b-44fc-470d-a0a3-6c3c19971e95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1543', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4c375e8b-44fc-470d-a0a3-6c3c19971e95', 'x-compute-request-id': 'req-4c375e8b-44fc-470d-a0a3-6c3c19971e95', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5'} Body: b'{"server": {"id": "703b2245-e2b9-43e1-b086-817fa53745e5", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-1217856526", "status": "BUILD", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "user_id": "c9c6177d06e54d90aff506ccfab61ac9", "metadata": {}, "hostId": "f3f1330a55f2bf3bdba617cc0942961ee900f44468a170a0467a6a0e", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:17:21Z", "updated": "2020-12-14T02:17:23Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:28.886 193 INFO tempest.lib.common.rest_client [req-c9a51eb0-95d1-4626-a33a-aeb3cf319a2c ] Request (QosExtRbacTest:test_update_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:17:28.890 193 DEBUG tempest.lib.common.rest_client [req-c9a51eb0-95d1-4626-a33a-aeb3cf319a2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9a51eb0-95d1-4626-a33a-aeb3cf319a2c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7b62b9a73a14283bbf3eb87ef818fe0", "name": "tempest-QosExtRbacTest-1634646245", "password_expires_at": null}, "audit_ids": ["dpJiwlnlT52eePGhr_nNuA"], "expires_at": "2020-12-14T03:17:28.000000Z", "issued_at": "2020-12-14T02:17:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b81a605932034dc69389ef362e8a3005", "name": "tempest-QosExtRbacTest-1634646245"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b81a605932034dc69389ef362e8a3005", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:29.058 193 INFO tempest.lib.common.rest_client [req-468c8545-0d5e-401e-808b-9398ad483ae1 ] Request (QosExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/ea6ad582-d80f-40ec-a874-298c69e3d866 0.159s 2020-12-14 02:17:29.061 193 DEBUG tempest.lib.common.rest_client [req-468c8545-0d5e-401e-808b-9398ad483ae1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-468c8545-0d5e-401e-808b-9398ad483ae1', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:29 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/ea6ad582-d80f-40ec-a874-298c69e3d866'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:29.501 197 INFO tempest.lib.common.rest_client [req-86f26273-2d09-497b-a017-e785c402211b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.213s 2020-12-14 02:17:29.505 197 DEBUG tempest.lib.common.rest_client [req-86f26273-2d09-497b-a017-e785c402211b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-86f26273-2d09-497b-a017-e785c402211b', 'x-compute-request-id': 'req-86f26273-2d09-497b-a017-e785c402211b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:29.808 189 INFO tempest.lib.common.rest_client [req-e261a86e-93ad-476e-96f4-5553951a764e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.423s 2020-12-14 02:17:29.811 189 DEBUG tempest.lib.common.rest_client [req-e261a86e-93ad-476e-96f4-5553951a764e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e261a86e-93ad-476e-96f4-5553951a764e', 'x-compute-request-id': 'req-e261a86e-93ad-476e-96f4-5553951a764e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:29.874 193 INFO tempest.lib.common.rest_client [req-3ea9c334-eea7-4174-a847-a6e3deb810f9 ] Request (QosExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/d568ea1e-3d00-4030-a7a9-f1d9b386938d 0.794s 2020-12-14 02:17:29.877 193 DEBUG tempest.lib.common.rest_client [req-3ea9c334-eea7-4174-a847-a6e3deb810f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-3ea9c334-eea7-4174-a847-a6e3deb810f9', 'date': 'Mon, 14 Dec 2020 02:17:29 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/d568ea1e-3d00-4030-a7a9-f1d9b386938d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:30.034 193 INFO tempest.lib.common.rest_client [req-8d8f1f46-526f-4204-9eaa-8709f928fdb8 ] Request (QosExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/c7b62b9a73a14283bbf3eb87ef818fe0 0.149s 2020-12-14 02:17:30.037 193 DEBUG tempest.lib.common.rest_client [req-8d8f1f46-526f-4204-9eaa-8709f928fdb8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8d8f1f46-526f-4204-9eaa-8709f928fdb8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/c7b62b9a73a14283bbf3eb87ef818fe0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:30.131 193 INFO tempest.lib.common.rest_client [req-6fd72259-dc49-4a0d-b3eb-01dc0b53bc75 ] Request (QosExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-14 02:17:30.134 193 DEBUG tempest.lib.common.rest_client [req-6fd72259-dc49-4a0d-b3eb-01dc0b53bc75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6fd72259-dc49-4a0d-b3eb-01dc0b53bc75', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["HjY6x3CMT46GnjTbbjDTfA"], "expires_at": "2020-12-14T03:17:30.000000Z", "issued_at": "2020-12-14T02:17:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:30.273 186 INFO tempest.lib.common.rest_client [req-b93223ad-d2e4-4f50-a085-d3c1d0551fd4 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5 0.297s 2020-12-14 02:17:30.276 186 DEBUG tempest.lib.common.rest_client [req-b93223ad-d2e4-4f50-a085-d3c1d0551fd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1739', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b93223ad-d2e4-4f50-a085-d3c1d0551fd4', 'x-compute-request-id': 'req-b93223ad-d2e4-4f50-a085-d3c1d0551fd4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5'} Body: b'{"server": {"id": "703b2245-e2b9-43e1-b086-817fa53745e5", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-1217856526", "status": "ACTIVE", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "user_id": "c9c6177d06e54d90aff506ccfab61ac9", "metadata": {}, "hostId": "f3f1330a55f2bf3bdba617cc0942961ee900f44468a170a0467a6a0e", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:17:21Z", "updated": "2020-12-14T02:17:29Z", "addresses": {"tempest-MiscPolicyActionsNetworkRbacTest-959755476-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:0c:4f:91"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:17:29.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:30.291 193 INFO tempest.lib.common.rest_client [req-84d65bfa-2b2b-43e4-961e-cdd750dbfb4d ] Request (QosExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=b81a605932034dc69389ef362e8a3005&name=default 0.150s 2020-12-14 02:17:30.295 193 DEBUG tempest.lib.common.rest_client [req-84d65bfa-2b2b-43e4-961e-cdd750dbfb4d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-84d65bfa-2b2b-43e4-961e-cdd750dbfb4d', 'date': 'Mon, 14 Dec 2020 02:17:30 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=b81a605932034dc69389ef362e8a3005&name=default'} Body: b'{"security_groups": [{"id": "7221ecf5-79ca-4493-8145-c346ebe33800", "name": "default", "stateful": true, "tenant_id": "b81a605932034dc69389ef362e8a3005", "description": "Default security group", "security_group_rules": [{"id": "39db3f61-a0fe-4ffc-ac2b-934b99f89072", "tenant_id": "b81a605932034dc69389ef362e8a3005", "security_group_id": "7221ecf5-79ca-4493-8145-c346ebe33800", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:24Z", "updated_at": "2020-12-14T02:17:24Z", "revision_number": 0, "project_id": "b81a605932034dc69389ef362e8a3005"}, {"id": "478bcdfa-67d2-45a7-8799-d9bba97c51e8", "tenant_id": "b81a605932034dc69389ef362e8a3005", "security_group_id": "7221ecf5-79ca-4493-8145-c346ebe33800", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "7221ecf5-79ca-4493-8145-c346ebe33800", "description": null, "tags": [], "created_at": "2020-12-14T02:17:24Z", "updated_at": "2020-12-14T02:17:24Z", "revision_number": 0, "project_id": "b81a605932034dc69389ef362e8a3005"}, {"id": "b8c2ea60-9572-42bb-8128-c6952bdbc13d", "tenant_id": "b81a605932034dc69389ef362e8a3005", "security_group_id": "7221ecf5-79ca-4493-8145-c346ebe33800", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "7221ecf5-79ca-4493-8145-c346ebe33800", "description": null, "tags": [], "created_at": "2020-12-14T02:17:24Z", "updated_at": "2020-12-14T02:17:24Z", "revision_number": 0, "project_id": "b81a605932034dc69389ef362e8a3005"}, {"id": "c3b06e5a-5cf7-4d64-9197-8585682dc38b", "tenant_id": "b81a605932034dc69389ef362e8a3005", "security_group_id": "7221ecf5-79ca-4493-8145-c346ebe33800", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:24Z", "updated_at": "2020-12-14T02:17:24Z", "revision_number": 0, "project_id": "b81a605932034dc69389ef362e8a3005"}], "tags": [], "created_at": "2020-12-14T02:17:24Z", "updated_at": "2020-12-14T02:17:24Z", "revision_number": 1, "project_id": "b81a605932034dc69389ef362e8a3005"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:30.377 186 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 8 second wait 2020-12-14 02:17:30.592 193 INFO tempest.lib.common.rest_client [req-52d07c39-b351-4151-a102-337e0faf21e0 ] Request (QosExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/7221ecf5-79ca-4493-8145-c346ebe33800 0.290s 2020-12-14 02:17:30.596 193 DEBUG tempest.lib.common.rest_client [req-52d07c39-b351-4151-a102-337e0faf21e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-52d07c39-b351-4151-a102-337e0faf21e0', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:30 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/7221ecf5-79ca-4493-8145-c346ebe33800'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:30.727 193 INFO tempest.lib.common.rest_client [req-86f0a2fb-d62c-41ce-9907-ee1417f72829 ] Request (QosExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005 0.125s 2020-12-14 02:17:30.730 193 DEBUG tempest.lib.common.rest_client [req-86f0a2fb-d62c-41ce-9907-ee1417f72829 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-86f0a2fb-d62c-41ce-9907-ee1417f72829', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b81a605932034dc69389ef362e8a3005'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:30.737 186 INFO tempest.lib.common.rest_client [req-a545cf32-0e08-4fde-bbcd-8ec7dd7250a1 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.353s 2020-12-14 02:17:30.741 186 DEBUG tempest.lib.common.rest_client [req-a545cf32-0e08-4fde-bbcd-8ec7dd7250a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-MiscPolicyActionsNetworkRbacTest-network-865169453", "router:external": false, "shared": true, "port_security_enabled": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '746', 'x-openstack-request-id': 'req-a545cf32-0e08-4fde-bbcd-8ec7dd7250a1', 'date': 'Mon, 14 Dec 2020 02:17:30 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"7b31d2ce-a194-467e-a554-37e06eca5476","name":"tempest-MiscPolicyActionsNetworkRbacTest-network-865169453","tenant_id":"4d2bab69895c4d7a955e71657b529b22","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":true,"project_id":"4d2bab69895c4d7a955e71657b529b22","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":61,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:17:30Z","updated_at":"2020-12-14T02:17:30Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:30.846 197 INFO tempest.lib.common.rest_client [req-810f10c4-cb5b-41b7-95d5-685918f2e089 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.232s 2020-12-14 02:17:30.849 197 DEBUG tempest.lib.common.rest_client [req-810f10c4-cb5b-41b7-95d5-685918f2e089 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-810f10c4-cb5b-41b7-95d5-685918f2e089', 'x-compute-request-id': 'req-810f10c4-cb5b-41b7-95d5-685918f2e089', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:30.852 193 INFO tempest.lib.common.rest_client [req-1ae57cbe-02e5-42e6-a755-e8f39505bf22 ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:17:30.855 193 DEBUG tempest.lib.common.rest_client [req-1ae57cbe-02e5-42e6-a755-e8f39505bf22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ae57cbe-02e5-42e6-a755-e8f39505bf22', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["NyCIRNDGTs2tM86SwYcMlw"], "expires_at": "2020-12-14T03:17:30.000000Z", "issued_at": "2020-12-14T02:17:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:30.967 193 INFO tempest.lib.common.rest_client [req-20b4cc8d-5af4-4788-b5b0-a4616ae630c7 ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:17:30.970 193 DEBUG tempest.lib.common.rest_client [req-20b4cc8d-5af4-4788-b5b0-a4616ae630c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20b4cc8d-5af4-4788-b5b0-a4616ae630c7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["c7NrTSGmQ0K15WiKOBY8EA"], "expires_at": "2020-12-14T03:17:30.000000Z", "issued_at": "2020-12-14T02:17:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:31.049 193 INFO tempest.lib.common.rest_client [req-d25b6caa-afcc-480b-8af8-b2a32b7a5fa0 ] Request (SecGroupRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.071s 2020-12-14 02:17:31.051 193 DEBUG tempest.lib.common.rest_client [req-d25b6caa-afcc-480b-8af8-b2a32b7a5fa0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d25b6caa-afcc-480b-8af8-b2a32b7a5fa0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:31.142 193 INFO tempest.lib.common.rest_client [req-164be022-2cca-4263-8500-0bab27edb1d5 ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.082s 2020-12-14 02:17:31.145 193 DEBUG tempest.lib.common.rest_client [req-164be022-2cca-4263-8500-0bab27edb1d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SecGroupRbacTest-928162519-desc", "domain_id": "default", "name": "tempest-SecGroupRbacTest-928162519"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '368', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-164be022-2cca-4263-8500-0bab27edb1d5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519", "domain_id": "default", "description": "tempest-SecGroupRbacTest-928162519-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:31.151 189 INFO tempest.lib.common.rest_client [req-61bbec8c-bc7a-44e7-98e2-6710ad1423f7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.235s 2020-12-14 02:17:31.153 189 DEBUG tempest.lib.common.rest_client [req-61bbec8c-bc7a-44e7-98e2-6710ad1423f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-61bbec8c-bc7a-44e7-98e2-6710ad1423f7', 'x-compute-request-id': 'req-61bbec8c-bc7a-44e7-98e2-6710ad1423f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:31.271 193 INFO tempest.lib.common.rest_client [req-1189bb4e-be5e-4b6d-a2ae-c2203da48f42 ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.119s 2020-12-14 02:17:31.273 193 DEBUG tempest.lib.common.rest_client [req-1189bb4e-be5e-4b6d-a2ae-c2203da48f42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SecGroupRbacTest-928162519", "password": "S0_=aNgWxPbjX%0", "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "email": "tempest-SecGroupRbacTest-270019521@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1189bb4e-be5e-4b6d-a2ae-c2203da48f42', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "email": "tempest-SecGroupRbacTest-270019521@example.com", "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/7314f823e8314b4992c6cb1c0f5b0a35"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:31.339 193 INFO tempest.lib.common.rest_client [req-1328c2b8-bce3-41ef-8046-1d0b57787b99 ] Request (SecGroupRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:17:31.341 193 DEBUG tempest.lib.common.rest_client [req-1328c2b8-bce3-41ef-8046-1d0b57787b99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1328c2b8-bce3-41ef-8046-1d0b57787b99', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:31.401 193 INFO tempest.lib.common.rest_client [req-b88cf87e-c402-4e46-9505-7a3be3ee42f2 ] Request (SecGroupRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-14 02:17:31.402 193 DEBUG tempest.lib.common.rest_client [req-b88cf87e-c402-4e46-9505-7a3be3ee42f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b88cf87e-c402-4e46-9505-7a3be3ee42f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:31.497 193 INFO tempest.lib.common.rest_client [req-f1360904-7f78-4d30-96ea-bc8b28fdbbb7 ] Request (SecGroupRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles/72a4576c553448cd941b052c1ca0cf2d 0.089s 2020-12-14 02:17:31.499 193 DEBUG tempest.lib.common.rest_client [req-f1360904-7f78-4d30-96ea-bc8b28fdbbb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1360904-7f78-4d30-96ea-bc8b28fdbbb7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:31.502 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SecGroupRbacTest-928162519', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3ab4ee5fe89c41ed895fb47a74c8171b', 'project_name': 'tempest-SecGroupRbacTest-928162519', 'tenant_id': '3ab4ee5fe89c41ed895fb47a74c8171b', 'tenant_name': 'tempest-SecGroupRbacTest-928162519', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '7314f823e8314b4992c6cb1c0f5b0a35'}, Network: None, Subnet: None, Router: None 2020-12-14 02:17:31.504 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SecGroupRbacTest-928162519', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3ab4ee5fe89c41ed895fb47a74c8171b', 'project_name': 'tempest-SecGroupRbacTest-928162519', 'tenant_id': '3ab4ee5fe89c41ed895fb47a74c8171b', 'tenant_name': 'tempest-SecGroupRbacTest-928162519', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '7314f823e8314b4992c6cb1c0f5b0a35'}, Network: None, Subnet: None, Router: None 2020-12-14 02:17:31.512 186 INFO tempest.lib.common.rest_client [req-7fed606f-df0b-4dfb-8b3a-23e745d01c12 ] Request (MiscPolicyActionsNetworkRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.764s 2020-12-14 02:17:31.516 186 DEBUG tempest.lib.common.rest_client [req-7fed606f-df0b-4dfb-8b3a-23e745d01c12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "7b31d2ce-a194-467e-a554-37e06eca5476", "cidr": "192.168.120.0/24", "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '662', 'x-openstack-request-id': 'req-7fed606f-df0b-4dfb-8b3a-23e745d01c12', 'date': 'Mon, 14 Dec 2020 02:17:31 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"04a3f132-131b-4b4d-9d89-c34e861d6d5f","name":"","tenant_id":"4d2bab69895c4d7a955e71657b529b22","network_id":"7b31d2ce-a194-467e-a554-37e06eca5476","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/24","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:17:31Z","updated_at":"2020-12-14T02:17:31Z","revision_number":0,"project_id":"4d2bab69895c4d7a955e71657b529b22"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:31.524 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:31.529 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.532 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.535 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.539 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.542 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.546 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.550 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.553 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.556 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.559 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.562 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.574 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.576 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.579 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.581 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.585 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.588 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.590 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.593 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.596 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.606 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.608 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.610 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.613 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.615 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.618 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.620 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.622 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.624 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.627 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.630 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.632 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.647 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.649 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.651 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.654 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.664 193 INFO tempest.lib.common.rest_client [req-d40cfd24-cbd6-4a60-ac2f-5b2dea201a18 ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.114s 2020-12-14 02:17:31.670 193 DEBUG tempest.lib.common.rest_client [req-d40cfd24-cbd6-4a60-ac2f-5b2dea201a18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6561', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d40cfd24-cbd6-4a60-ac2f-5b2dea201a18', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["5jLEam28QSedWvpKPUqatg"], "expires_at": "2020-12-14T03:17:31.000000Z", "issued_at": "2020-12-14T02:17:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:31.670 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.673 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.675 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.679 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.682 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.684 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.686 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.689 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.691 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.693 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.696 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.698 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.701 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.703 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.705 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.708 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.710 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.711 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.714 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.716 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.721 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.723 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.725 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.728 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.730 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.732 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.734 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.736 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.738 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.740 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.743 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.745 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.747 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.749 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.751 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:31.762 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-multinic:add, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:31.791 193 INFO tempest.lib.common.rest_client [req-fa165940-d3cc-4c8f-9b48-82d1391a53fc ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:17:31.794 193 DEBUG tempest.lib.common.rest_client [req-fa165940-d3cc-4c8f-9b48-82d1391a53fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa165940-d3cc-4c8f-9b48-82d1391a53fc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["UaGDhJfHQL2MrjCH8YdUfQ"], "expires_at": "2020-12-14T03:17:31.000000Z", "issued_at": "2020-12-14T02:17:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:31.899 193 INFO tempest.lib.common.rest_client [req-d5b90554-45d1-4452-b4fe-3be282c7c3d9 ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:17:31.901 193 DEBUG tempest.lib.common.rest_client [req-d5b90554-45d1-4452-b4fe-3be282c7c3d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5b90554-45d1-4452-b4fe-3be282c7c3d9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["rwPzXiUyRQqd6SDeXu7xLQ"], "expires_at": "2020-12-14T03:17:31.000000Z", "issued_at": "2020-12-14T02:17:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:31.924 186 INFO tempest.lib.common.rest_client [req-b61052e8-216d-4ef0-aa36-097f45dc3b46 ] Request (MiscPolicyActionsNetworkRbacTest:test_add_fixed_ip): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface 0.157s 2020-12-14 02:17:31.928 186 DEBUG tempest.lib.common.rest_client [req-b61052e8-216d-4ef0-aa36-097f45dc3b46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '287', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b61052e8-216d-4ef0-aa36-097f45dc3b46', 'x-compute-request-id': 'req-b61052e8-216d-4ef0-aa36-097f45dc3b46', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "port_id": "bcdcfe0c-62b4-4338-993f-01a51ede3a86", "mac_addr": "fa:16:3e:0c:4f:91", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.7"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:31.958 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:31.965 193 INFO tempest.lib.common.rest_client [req-6a4ab744-864d-4b28-8107-157cf1e5a711 ] Request (SecGroupRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.059s 2020-12-14 02:17:31.969 193 DEBUG tempest.lib.common.rest_client [req-6a4ab744-864d-4b28-8107-157cf1e5a711 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a4ab744-864d-4b28-8107-157cf1e5a711', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:32.028 186 INFO tempest.lib.common.rest_client [req-085dddc1-3bd8-4055-8b3b-ec1f431abcf3 ] Request (MiscPolicyActionsNetworkRbacTest:test_add_fixed_ip): 200 GET http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles 0.065s 2020-12-14 02:17:32.031 186 DEBUG tempest.lib.common.rest_client [req-085dddc1-3bd8-4055-8b3b-ec1f431abcf3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-085dddc1-3bd8-4055-8b3b-ec1f431abcf3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:32.032 193 INFO tempest.lib.common.rest_client [req-b0de39ef-9b9d-4ec0-b569-8db33bb1f589 ] Request (SecGroupRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:17:32.036 193 DEBUG tempest.lib.common.rest_client [req-b0de39ef-9b9d-4ec0-b569-8db33bb1f589 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b0de39ef-9b9d-4ec0-b569-8db33bb1f589', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:32.038 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:17:32.040 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:32.102 193 INFO tempest.lib.common.rest_client [req-22c1e89f-f110-4eac-8451-641f86f5f4f2 ] Request (SecGroupRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.056s 2020-12-14 02:17:32.104 193 DEBUG tempest.lib.common.rest_client [req-22c1e89f-f110-4eac-8451-641f86f5f4f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-22c1e89f-f110-4eac-8451-641f86f5f4f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:32.131 186 INFO tempest.lib.common.rest_client [req-292905c3-3b84-44f0-961b-f2d126a1aa1d ] Request (MiscPolicyActionsNetworkRbacTest:test_add_fixed_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:17:32.134 186 DEBUG tempest.lib.common.rest_client [req-292905c3-3b84-44f0-961b-f2d126a1aa1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-292905c3-3b84-44f0-961b-f2d126a1aa1d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["oRnfr35BQkiI7v92bPWzlA"], "expires_at": "2020-12-14T03:17:32.000000Z", "issued_at": "2020-12-14T02:17:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:32.203 193 INFO tempest.lib.common.rest_client [req-b81ecba3-7869-4611-b4f9-a15abb82ae4a ] Request (SecGroupRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles/72a4576c553448cd941b052c1ca0cf2d 0.091s 2020-12-14 02:17:32.205 193 DEBUG tempest.lib.common.rest_client [req-b81ecba3-7869-4611-b4f9-a15abb82ae4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b81ecba3-7869-4611-b4f9-a15abb82ae4a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:32.315 197 INFO tempest.lib.common.rest_client [req-337bb306-7d1d-4883-b063-daaeeb17e5b3 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.357s 2020-12-14 02:17:32.319 197 DEBUG tempest.lib.common.rest_client [req-337bb306-7d1d-4883-b063-daaeeb17e5b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-337bb306-7d1d-4883-b063-daaeeb17e5b3', 'x-compute-request-id': 'req-337bb306-7d1d-4883-b063-daaeeb17e5b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:32.331 193 INFO tempest.lib.common.rest_client [req-4150ee2d-a554-4343-940b-d65d6d4179c2 ] Request (SecGroupRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles/a629c95d64b3416fb80ae90af4f69c05 0.120s 2020-12-14 02:17:32.333 193 DEBUG tempest.lib.common.rest_client [req-4150ee2d-a554-4343-940b-d65d6d4179c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4150ee2d-a554-4343-940b-d65d6d4179c2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:32.441 186 INFO tempest.lib.common.rest_client [req-db04c18a-543f-4eaf-b172-d52227d01aa3 ] Request (MiscPolicyActionsNetworkRbacTest:test_add_fixed_ip): 202 POST http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/action 0.300s 2020-12-14 02:17:32.443 186 DEBUG tempest.lib.common.rest_client [req-db04c18a-543f-4eaf-b172-d52227d01aa3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addFixedIp": {"networkId": "29581da7-daeb-44b2-aca1-c64c19d19bbc"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-db04c18a-543f-4eaf-b172-d52227d01aa3', 'x-compute-request-id': 'req-db04c18a-543f-4eaf-b172-d52227d01aa3', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:32.445 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:32.564 186 INFO tempest.lib.common.rest_client [req-27750faa-b41e-4f10-be62-479db74d616b ] Request (MiscPolicyActionsNetworkRbacTest:test_add_fixed_ip): 200 GET http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles 0.113s 2020-12-14 02:17:32.567 186 DEBUG tempest.lib.common.rest_client [req-27750faa-b41e-4f10-be62-479db74d616b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27750faa-b41e-4f10-be62-479db74d616b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:32.576 189 INFO tempest.lib.common.rest_client [req-46cda335-58e5-4eb3-a527-2963bc24b057 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.336s 2020-12-14 02:17:32.580 189 DEBUG tempest.lib.common.rest_client [req-46cda335-58e5-4eb3-a527-2963bc24b057 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-46cda335-58e5-4eb3-a527-2963bc24b057', 'x-compute-request-id': 'req-46cda335-58e5-4eb3-a527-2963bc24b057', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:32.659 186 INFO tempest.lib.common.rest_client [req-a711798a-7dc1-4f7e-b108-02ff98ad1cff ] Request (MiscPolicyActionsNetworkRbacTest:test_add_fixed_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-14 02:17:32.662 186 DEBUG tempest.lib.common.rest_client [req-a711798a-7dc1-4f7e-b108-02ff98ad1cff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a711798a-7dc1-4f7e-b108-02ff98ad1cff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["yVreRG2LSH-m8yEmu8IbxA"], "expires_at": "2020-12-14T03:17:32.000000Z", "issued_at": "2020-12-14T02:17:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:32.964 186 INFO tempest.lib.common.rest_client [req-c4f36a20-ec01-4e95-a0b7-b53b0d9cf93b ] Request (MiscPolicyActionsNetworkRbacTest:test_add_fixed_ip): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5 0.296s 2020-12-14 02:17:32.968 186 DEBUG tempest.lib.common.rest_client [req-c4f36a20-ec01-4e95-a0b7-b53b0d9cf93b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1739', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c4f36a20-ec01-4e95-a0b7-b53b0d9cf93b', 'x-compute-request-id': 'req-c4f36a20-ec01-4e95-a0b7-b53b0d9cf93b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5'} Body: b'{"server": {"id": "703b2245-e2b9-43e1-b086-817fa53745e5", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-1217856526", "status": "ACTIVE", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "user_id": "c9c6177d06e54d90aff506ccfab61ac9", "metadata": {}, "hostId": "f3f1330a55f2bf3bdba617cc0942961ee900f44468a170a0467a6a0e", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:17:21Z", "updated": "2020-12-14T02:17:29Z", "addresses": {"tempest-MiscPolicyActionsNetworkRbacTest-959755476-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:0c:4f:91"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:17:29.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:33.073 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:33.078 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.081 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.083 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.086 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.089 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.092 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.096 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.098 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.100 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.102 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.104 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.107 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.109 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.111 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.114 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.116 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.118 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.121 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.123 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.126 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.129 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.131 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.133 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.135 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.138 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.140 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.142 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.144 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.146 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.148 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.150 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.152 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.154 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.156 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.159 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.161 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.163 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.165 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.168 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.170 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.172 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.174 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.176 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.179 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.181 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.183 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.186 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.188 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.190 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.192 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.195 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.197 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.199 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.201 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.204 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.206 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.211 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.213 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.215 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.218 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.220 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.222 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.224 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.226 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.229 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.231 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.233 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.235 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.238 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.240 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.242 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:33.252 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-attach-interfaces:create, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:33.254 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:33.318 186 INFO tempest.lib.common.rest_client [req-06f09e79-c012-4f59-9283-cf38ff2c89d3 ] Request (MiscPolicyActionsNetworkRbacTest:test_create_interface): 200 GET http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles 0.058s 2020-12-14 02:17:33.321 186 DEBUG tempest.lib.common.rest_client [req-06f09e79-c012-4f59-9283-cf38ff2c89d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06f09e79-c012-4f59-9283-cf38ff2c89d3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:33.368 186 INFO tempest.lib.common.rest_client [req-e1c1f1ee-c1fa-4c51-822f-a6e636329cee ] Request (MiscPolicyActionsNetworkRbacTest:test_create_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:17:33.371 186 DEBUG tempest.lib.common.rest_client [req-e1c1f1ee-c1fa-4c51-822f-a6e636329cee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1c1f1ee-c1fa-4c51-822f-a6e636329cee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["dd_sXlr7T9OfxLk0PYOYwQ"], "expires_at": "2020-12-14T03:17:33.000000Z", "issued_at": "2020-12-14T02:17:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:33.434 193 INFO tempest.lib.common.rest_client [req-52c29bc4-52d4-4471-a743-5a45f49e149a ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:17:33.437 193 DEBUG tempest.lib.common.rest_client [req-52c29bc4-52d4-4471-a743-5a45f49e149a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52c29bc4-52d4-4471-a743-5a45f49e149a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["ij--QHiLTxyfePkk2B5CaQ"], "expires_at": "2020-12-14T03:17:33.000000Z", "issued_at": "2020-12-14T02:17:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:33.702 197 INFO tempest.lib.common.rest_client [req-4e5e6319-edda-47db-beab-7acfb7be5136 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.274s 2020-12-14 02:17:33.706 197 DEBUG tempest.lib.common.rest_client [req-4e5e6319-edda-47db-beab-7acfb7be5136 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4e5e6319-edda-47db-beab-7acfb7be5136', 'x-compute-request-id': 'req-4e5e6319-edda-47db-beab-7acfb7be5136', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:34.009 189 INFO tempest.lib.common.rest_client [req-4c8b8abb-2d33-461c-acb0-02bcb9687866 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.318s 2020-12-14 02:17:34.012 189 DEBUG tempest.lib.common.rest_client [req-4c8b8abb-2d33-461c-acb0-02bcb9687866 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4c8b8abb-2d33-461c-acb0-02bcb9687866', 'x-compute-request-id': 'req-4c8b8abb-2d33-461c-acb0-02bcb9687866', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:34.126 193 INFO tempest.lib.common.rest_client [req-f9a1fcb5-a175-4617-a1d2-c82c351ce282 ] Request (SecGroupRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/security-groups 0.679s 2020-12-14 02:17:34.128 193 DEBUG tempest.lib.common.rest_client [req-f9a1fcb5-a175-4617-a1d2-c82c351ce282 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecGroupRbacTest-secgroup-349028942"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1393', 'x-openstack-request-id': 'req-f9a1fcb5-a175-4617-a1d2-c82c351ce282', 'date': 'Mon, 14 Dec 2020 02:17:34 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups'} Body: b'{"security_group": {"id": "33e57007-0d3c-430a-92f4-7885f234ed38", "name": "tempest-SecGroupRbacTest-secgroup-349028942", "stateful": true, "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "description": "", "security_group_rules": [{"id": "001315d8-52ff-4794-92aa-e948d4e8cd7e", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "33e57007-0d3c-430a-92f4-7885f234ed38", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:34Z", "updated_at": "2020-12-14T02:17:34Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}, {"id": "9283c6ba-fa14-4e72-83b7-1576485aae21", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "33e57007-0d3c-430a-92f4-7885f234ed38", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:34Z", "updated_at": "2020-12-14T02:17:34Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}], "tags": [], "created_at": "2020-12-14T02:17:34Z", "updated_at": "2020-12-14T02:17:34Z", "revision_number": 1, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:34.134 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:34.156 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_security_group, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:34.158 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:34.221 193 INFO tempest.lib.common.rest_client [req-da42077b-ecbd-432a-822d-72761a540f7f ] Request (SecGroupRbacTest:test_create_security_group): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.058s 2020-12-14 02:17:34.223 193 DEBUG tempest.lib.common.rest_client [req-da42077b-ecbd-432a-822d-72761a540f7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da42077b-ecbd-432a-822d-72761a540f7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:34.274 193 INFO tempest.lib.common.rest_client [req-0cbd4eec-0019-4719-9ba9-2cc1ba0a5798 ] Request (SecGroupRbacTest:test_create_security_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:17:34.277 193 DEBUG tempest.lib.common.rest_client [req-0cbd4eec-0019-4719-9ba9-2cc1ba0a5798 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0cbd4eec-0019-4719-9ba9-2cc1ba0a5798', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["2OKZN5H0RYessA_H7NAFiw"], "expires_at": "2020-12-14T03:17:34.000000Z", "issued_at": "2020-12-14T02:17:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:34.671 193 INFO tempest.lib.common.rest_client [req-a4012aaf-cbf3-491d-851b-ee028831c8aa ] Request (SecGroupRbacTest:test_create_security_group): 201 POST http://172.30.13.94:9696/v2.0/security-groups 0.387s 2020-12-14 02:17:34.674 193 DEBUG tempest.lib.common.rest_client [req-a4012aaf-cbf3-491d-851b-ee028831c8aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecGroupRbacTest-secgroup-739661248"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1393', 'x-openstack-request-id': 'req-a4012aaf-cbf3-491d-851b-ee028831c8aa', 'date': 'Mon, 14 Dec 2020 02:17:34 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups'} Body: b'{"security_group": {"id": "4fa6e357-17b3-4890-bd40-f65937669aae", "name": "tempest-SecGroupRbacTest-secgroup-739661248", "stateful": true, "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "description": "", "security_group_rules": [{"id": "4d06b406-88b3-4b5d-956f-a72e0bfda7bb", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "4fa6e357-17b3-4890-bd40-f65937669aae", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:34Z", "updated_at": "2020-12-14T02:17:34Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}, {"id": "ae9de39a-9617-4231-a7c2-f259926d3bf6", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "4fa6e357-17b3-4890-bd40-f65937669aae", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:34Z", "updated_at": "2020-12-14T02:17:34Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}], "tags": [], "created_at": "2020-12-14T02:17:34Z", "updated_at": "2020-12-14T02:17:34Z", "revision_number": 1, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:34.676 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:34.744 193 INFO tempest.lib.common.rest_client [req-1dd5f3a1-a6aa-4884-8061-459979be24ac ] Request (SecGroupRbacTest:test_create_security_group): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.062s 2020-12-14 02:17:34.746 193 DEBUG tempest.lib.common.rest_client [req-1dd5f3a1-a6aa-4884-8061-459979be24ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1dd5f3a1-a6aa-4884-8061-459979be24ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:34.807 193 INFO tempest.lib.common.rest_client [req-a2d1cbfa-89f1-409f-9078-64d13d5f9d31 ] Request (SecGroupRbacTest:test_create_security_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.055s 2020-12-14 02:17:34.810 193 DEBUG tempest.lib.common.rest_client [req-a2d1cbfa-89f1-409f-9078-64d13d5f9d31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2d1cbfa-89f1-409f-9078-64d13d5f9d31', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["LakDLrwwSw2LyUnvZEbTNQ"], "expires_at": "2020-12-14T03:17:34.000000Z", "issued_at": "2020-12-14T02:17:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:35.034 197 INFO tempest.lib.common.rest_client [req-1ffde4ba-078c-4960-846d-80c6ff4bf427 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.216s 2020-12-14 02:17:35.038 197 DEBUG tempest.lib.common.rest_client [req-1ffde4ba-078c-4960-846d-80c6ff4bf427 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1ffde4ba-078c-4960-846d-80c6ff4bf427', 'x-compute-request-id': 'req-1ffde4ba-078c-4960-846d-80c6ff4bf427', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:35.186 193 INFO tempest.lib.common.rest_client [req-9cf60ce0-0146-424d-a879-146888fd091f ] Request (SecGroupRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/4fa6e357-17b3-4890-bd40-f65937669aae 0.366s 2020-12-14 02:17:35.189 193 DEBUG tempest.lib.common.rest_client [req-9cf60ce0-0146-424d-a879-146888fd091f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-9cf60ce0-0146-424d-a879-146888fd091f', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:35 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/4fa6e357-17b3-4890-bd40-f65937669aae'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:35.200 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:35.224 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_security_group_rule, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:35.226 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:35.301 193 INFO tempest.lib.common.rest_client [req-36984a65-8c98-4342-922e-e4671391aef7 ] Request (SecGroupRbacTest:test_create_security_group_rule): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.069s 2020-12-14 02:17:35.304 193 DEBUG tempest.lib.common.rest_client [req-36984a65-8c98-4342-922e-e4671391aef7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36984a65-8c98-4342-922e-e4671391aef7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:35.304 189 INFO tempest.lib.common.rest_client [req-51285002-d5b4-4c24-8a10-3e6933543dac ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.202s 2020-12-14 02:17:35.307 189 DEBUG tempest.lib.common.rest_client [req-51285002-d5b4-4c24-8a10-3e6933543dac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-51285002-d5b4-4c24-8a10-3e6933543dac', 'x-compute-request-id': 'req-51285002-d5b4-4c24-8a10-3e6933543dac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:35.358 193 INFO tempest.lib.common.rest_client [req-3ea30fc5-c9be-4ae6-814f-cb1ac24428ee ] Request (SecGroupRbacTest:test_create_security_group_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:17:35.360 193 DEBUG tempest.lib.common.rest_client [req-3ea30fc5-c9be-4ae6-814f-cb1ac24428ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ea30fc5-c9be-4ae6-814f-cb1ac24428ee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["HzO9hf7fQRuReRWtOA1YiQ"], "expires_at": "2020-12-14T03:17:35.000000Z", "issued_at": "2020-12-14T02:17:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:35.810 193 INFO tempest.lib.common.rest_client [req-500ab72e-e1c7-45c5-9430-c92a9110d4e4 ] Request (SecGroupRbacTest:test_create_security_group_rule): 201 POST http://172.30.13.94:9696/v2.0/security-group-rules 0.441s 2020-12-14 02:17:35.814 193 DEBUG tempest.lib.common.rest_client [req-500ab72e-e1c7-45c5-9430-c92a9110d4e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group_rule": {"security_group_id": "33e57007-0d3c-430a-92f4-7885f234ed38", "direction": "ingress", "protocol": "tcp", "port_range_min": 99, "port_range_max": 99}} Response - Headers: {'content-type': 'application/json', 'content-length': '507', 'x-openstack-request-id': 'req-500ab72e-e1c7-45c5-9430-c92a9110d4e4', 'date': 'Mon, 14 Dec 2020 02:17:35 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules'} Body: b'{"security_group_rule": {"id": "88b330ed-b849-4573-b61d-24e2665535eb", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "33e57007-0d3c-430a-92f4-7885f234ed38", "ethertype": "IPv4", "direction": "ingress", "protocol": "tcp", "port_range_min": 99, "port_range_max": 99, "remote_ip_prefix": null, "remote_group_id": null, "description": "", "created_at": "2020-12-14T02:17:35Z", "updated_at": "2020-12-14T02:17:35Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:35.827 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:35.899 193 INFO tempest.lib.common.rest_client [req-b4e810cb-3adf-4de3-8b1e-52919fba72f2 ] Request (SecGroupRbacTest:test_create_security_group_rule): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.066s 2020-12-14 02:17:35.902 193 DEBUG tempest.lib.common.rest_client [req-b4e810cb-3adf-4de3-8b1e-52919fba72f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4e810cb-3adf-4de3-8b1e-52919fba72f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:35.951 193 INFO tempest.lib.common.rest_client [req-5b3bdc9a-9769-4ff0-8b92-4d38077e77cc ] Request (SecGroupRbacTest:test_create_security_group_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:17:35.953 193 DEBUG tempest.lib.common.rest_client [req-5b3bdc9a-9769-4ff0-8b92-4d38077e77cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b3bdc9a-9769-4ff0-8b92-4d38077e77cc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["D7H_OGrwQhSaBQcAsMwjew"], "expires_at": "2020-12-14T03:17:35.000000Z", "issued_at": "2020-12-14T02:17:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:36.171 193 INFO tempest.lib.common.rest_client [req-cbbc766f-d99a-43f3-9d48-422040d4e660 ] Request (SecGroupRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/security-group-rules/88b330ed-b849-4573-b61d-24e2665535eb 0.210s 2020-12-14 02:17:36.173 193 DEBUG tempest.lib.common.rest_client [req-cbbc766f-d99a-43f3-9d48-422040d4e660 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-cbbc766f-d99a-43f3-9d48-422040d4e660', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:36 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules/88b330ed-b849-4573-b61d-24e2665535eb'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:36.184 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:36.206 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_security_group, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:36.208 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:36.227 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_security_group, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:36.404 197 INFO tempest.lib.common.rest_client [req-67f89223-aecc-4c2d-abbc-879ab4baed41 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.257s 2020-12-14 02:17:36.408 197 DEBUG tempest.lib.common.rest_client [req-67f89223-aecc-4c2d-abbc-879ab4baed41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-67f89223-aecc-4c2d-abbc-879ab4baed41', 'x-compute-request-id': 'req-67f89223-aecc-4c2d-abbc-879ab4baed41', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:36.696 193 INFO tempest.lib.common.rest_client [req-9bade3c6-5e5d-40a0-806d-5fb50d69e0f2 ] Request (SecGroupRbacTest:test_delete_security_group): 201 POST http://172.30.13.94:9696/v2.0/security-groups 0.464s 2020-12-14 02:17:36.700 193 DEBUG tempest.lib.common.rest_client [req-9bade3c6-5e5d-40a0-806d-5fb50d69e0f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecGroupRbacTest-secgroup-319696960"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1393', 'x-openstack-request-id': 'req-9bade3c6-5e5d-40a0-806d-5fb50d69e0f2', 'date': 'Mon, 14 Dec 2020 02:17:36 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups'} Body: b'{"security_group": {"id": "5002b9fa-ff51-4aed-a7e3-b794fb8cac98", "name": "tempest-SecGroupRbacTest-secgroup-319696960", "stateful": true, "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "description": "", "security_group_rules": [{"id": "32b24139-a2cd-43f0-8599-fbea029f4437", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "5002b9fa-ff51-4aed-a7e3-b794fb8cac98", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:36Z", "updated_at": "2020-12-14T02:17:36Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}, {"id": "79fe107e-91f9-4f3a-89c4-708cb6a23819", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "5002b9fa-ff51-4aed-a7e3-b794fb8cac98", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:36Z", "updated_at": "2020-12-14T02:17:36Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}], "tags": [], "created_at": "2020-12-14T02:17:36Z", "updated_at": "2020-12-14T02:17:36Z", "revision_number": 1, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:36.704 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:36.771 193 INFO tempest.lib.common.rest_client [req-47df32e5-532f-4264-823b-38e46aa35c8d ] Request (SecGroupRbacTest:test_delete_security_group): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.061s 2020-12-14 02:17:36.775 193 DEBUG tempest.lib.common.rest_client [req-47df32e5-532f-4264-823b-38e46aa35c8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47df32e5-532f-4264-823b-38e46aa35c8d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:36.921 193 INFO tempest.lib.common.rest_client [req-caf6647c-aff3-4c90-af88-4f6de6026e66 ] Request (SecGroupRbacTest:test_delete_security_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.138s 2020-12-14 02:17:36.924 193 DEBUG tempest.lib.common.rest_client [req-caf6647c-aff3-4c90-af88-4f6de6026e66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-caf6647c-aff3-4c90-af88-4f6de6026e66', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["OOYYiAvXQtCAHE_78rM0hg"], "expires_at": "2020-12-14T03:17:36.000000Z", "issued_at": "2020-12-14T02:17:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:37.224 193 INFO tempest.lib.common.rest_client [req-8b4120b7-f48d-4e22-a944-4e188b439ced ] Request (SecGroupRbacTest:test_delete_security_group): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/5002b9fa-ff51-4aed-a7e3-b794fb8cac98 0.291s 2020-12-14 02:17:37.228 193 DEBUG tempest.lib.common.rest_client [req-8b4120b7-f48d-4e22-a944-4e188b439ced ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8b4120b7-f48d-4e22-a944-4e188b439ced', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:37 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5002b9fa-ff51-4aed-a7e3-b794fb8cac98'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:37.231 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:37.299 193 INFO tempest.lib.common.rest_client [req-96c2e393-889d-4d6f-b2d4-fb4a66127f55 ] Request (SecGroupRbacTest:test_delete_security_group): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.061s 2020-12-14 02:17:37.303 193 DEBUG tempest.lib.common.rest_client [req-96c2e393-889d-4d6f-b2d4-fb4a66127f55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96c2e393-889d-4d6f-b2d4-fb4a66127f55', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:37.351 193 INFO tempest.lib.common.rest_client [req-7234ff34-ffd4-443b-a8d6-34dd23eab67f ] Request (SecGroupRbacTest:test_delete_security_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:17:37.354 193 DEBUG tempest.lib.common.rest_client [req-7234ff34-ffd4-443b-a8d6-34dd23eab67f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7234ff34-ffd4-443b-a8d6-34dd23eab67f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["e3l1JDOUQ8ySfEAmHAeAqg"], "expires_at": "2020-12-14T03:17:37.000000Z", "issued_at": "2020-12-14T02:17:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:37.501 193 INFO tempest.lib.common.rest_client [req-0b8e75ba-1bf0-470a-8b7f-86050b4a915d ] Request (SecGroupRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/security-groups/5002b9fa-ff51-4aed-a7e3-b794fb8cac98 0.136s 2020-12-14 02:17:37.504 193 DEBUG tempest.lib.common.rest_client [req-0b8e75ba-1bf0-470a-8b7f-86050b4a915d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '146', 'x-openstack-request-id': 'req-0b8e75ba-1bf0-470a-8b7f-86050b4a915d', 'date': 'Mon, 14 Dec 2020 02:17:37 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5002b9fa-ff51-4aed-a7e3-b794fb8cac98'} Body: b'{"NeutronError": {"type": "SecurityGroupNotFound", "message": "Security group 5002b9fa-ff51-4aed-a7e3-b794fb8cac98 does not exist", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:37.517 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:37.539 186 INFO tempest.lib.common.rest_client [req-dec986ec-552b-497b-a52d-64c96c6a9a14 ] Request (MiscPolicyActionsNetworkRbacTest:test_create_interface): 200 POST http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface 4.159s 2020-12-14 02:17:37.542 186 DEBUG tempest.lib.common.rest_client [req-dec986ec-552b-497b-a52d-64c96c6a9a14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"interfaceAttachment": {"net_id": "7b31d2ce-a194-467e-a554-37e06eca5476"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '283', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dec986ec-552b-497b-a52d-64c96c6a9a14', 'x-compute-request-id': 'req-dec986ec-552b-497b-a52d-64c96c6a9a14', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface'} Body: b'{"interfaceAttachment": {"net_id": "7b31d2ce-a194-467e-a554-37e06eca5476", "port_id": "a2e7365c-2d83-4a69-bffb-b4495cafc647", "mac_addr": "fa:16:3e:90:c9:38", "port_state": "DOWN", "fixed_ips": [{"subnet_id": "04a3f132-131b-4b4d-9d89-c34e861d6d5f", "ip_address": "192.168.120.89"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:37.543 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_security_group_rule, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:37.545 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:37.570 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_security_group_rule, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:37.575 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:37.644 186 INFO tempest.lib.common.rest_client [req-f4fac058-2276-4142-9c9b-8436aef9bdae ] Request (MiscPolicyActionsNetworkRbacTest:test_create_interface): 200 GET http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles 0.062s 2020-12-14 02:17:37.648 186 DEBUG tempest.lib.common.rest_client [req-f4fac058-2276-4142-9c9b-8436aef9bdae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4fac058-2276-4142-9c9b-8436aef9bdae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:37.700 186 INFO tempest.lib.common.rest_client [req-afd99282-2d49-42a5-b730-43762725a216 ] Request (MiscPolicyActionsNetworkRbacTest:test_create_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:17:37.703 186 DEBUG tempest.lib.common.rest_client [req-afd99282-2d49-42a5-b730-43762725a216 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-afd99282-2d49-42a5-b730-43762725a216', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["pV3DygX_T7uKVloPuTYOtw"], "expires_at": "2020-12-14T03:17:37.000000Z", "issued_at": "2020-12-14T02:17:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:37.735 197 INFO tempest.lib.common.rest_client [req-579427ba-04a9-434b-85b1-5b9f7748ae8b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.219s 2020-12-14 02:17:37.738 197 DEBUG tempest.lib.common.rest_client [req-579427ba-04a9-434b-85b1-5b9f7748ae8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-579427ba-04a9-434b-85b1-5b9f7748ae8b', 'x-compute-request-id': 'req-579427ba-04a9-434b-85b1-5b9f7748ae8b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:37.925 193 INFO tempest.lib.common.rest_client [req-011d2a85-d12d-4309-b3c0-abf7da0ee90d ] Request (SecGroupRbacTest:test_delete_security_group_rule): 201 POST http://172.30.13.94:9696/v2.0/security-group-rules 0.349s 2020-12-14 02:17:37.928 193 DEBUG tempest.lib.common.rest_client [req-011d2a85-d12d-4309-b3c0-abf7da0ee90d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group_rule": {"security_group_id": "33e57007-0d3c-430a-92f4-7885f234ed38", "direction": "ingress", "protocol": "tcp", "port_range_min": 99, "port_range_max": 99}} Response - Headers: {'content-type': 'application/json', 'content-length': '507', 'x-openstack-request-id': 'req-011d2a85-d12d-4309-b3c0-abf7da0ee90d', 'date': 'Mon, 14 Dec 2020 02:17:37 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules'} Body: b'{"security_group_rule": {"id": "47fd05f3-c080-44e1-bc10-907bf76c01f6", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "33e57007-0d3c-430a-92f4-7885f234ed38", "ethertype": "IPv4", "direction": "ingress", "protocol": "tcp", "port_range_min": 99, "port_range_max": 99, "remote_ip_prefix": null, "remote_group_id": null, "description": "", "created_at": "2020-12-14T02:17:37Z", "updated_at": "2020-12-14T02:17:37Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:37.932 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:37.962 186 INFO tempest.lib.common.rest_client [req-de5eb55c-2795-4346-a067-36a72ed1c6c6 ] Request (MiscPolicyActionsNetworkRbacTest:test_create_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/a2e7365c-2d83-4a69-bffb-b4495cafc647 0.251s 2020-12-14 02:17:37.965 186 DEBUG tempest.lib.common.rest_client [req-de5eb55c-2795-4346-a067-36a72ed1c6c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '283', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-de5eb55c-2795-4346-a067-36a72ed1c6c6', 'x-compute-request-id': 'req-de5eb55c-2795-4346-a067-36a72ed1c6c6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/a2e7365c-2d83-4a69-bffb-b4495cafc647'} Body: b'{"interfaceAttachment": {"net_id": "7b31d2ce-a194-467e-a554-37e06eca5476", "port_id": "a2e7365c-2d83-4a69-bffb-b4495cafc647", "mac_addr": "fa:16:3e:90:c9:38", "port_state": "DOWN", "fixed_ips": [{"subnet_id": "04a3f132-131b-4b4d-9d89-c34e861d6d5f", "ip_address": "192.168.120.89"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:38.006 193 INFO tempest.lib.common.rest_client [req-df187658-7e29-4607-b3fc-bd46e0008a49 ] Request (SecGroupRbacTest:test_delete_security_group_rule): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.068s 2020-12-14 02:17:38.009 193 DEBUG tempest.lib.common.rest_client [req-df187658-7e29-4607-b3fc-bd46e0008a49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df187658-7e29-4607-b3fc-bd46e0008a49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:38.069 193 INFO tempest.lib.common.rest_client [req-00204314-567d-42f1-a87d-6302dc14728d ] Request (SecGroupRbacTest:test_delete_security_group_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.055s 2020-12-14 02:17:38.072 193 DEBUG tempest.lib.common.rest_client [req-00204314-567d-42f1-a87d-6302dc14728d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-00204314-567d-42f1-a87d-6302dc14728d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["5xnIGuYvRqS2-NW1tzsUeg"], "expires_at": "2020-12-14T03:17:38.000000Z", "issued_at": "2020-12-14T02:17:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:38.247 193 INFO tempest.lib.common.rest_client [req-c08578fa-5a20-4515-acfd-3b0a779711e4 ] Request (SecGroupRbacTest:test_delete_security_group_rule): 204 DELETE http://172.30.13.94:9696/v2.0/security-group-rules/47fd05f3-c080-44e1-bc10-907bf76c01f6 0.166s 2020-12-14 02:17:38.251 193 DEBUG tempest.lib.common.rest_client [req-c08578fa-5a20-4515-acfd-3b0a779711e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c08578fa-5a20-4515-acfd-3b0a779711e4', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules/47fd05f3-c080-44e1-bc10-907bf76c01f6'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:38.254 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:38.326 193 INFO tempest.lib.common.rest_client [req-1fb15c88-f53c-4ce3-b316-f61b5ff880ee ] Request (SecGroupRbacTest:test_delete_security_group_rule): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.066s 2020-12-14 02:17:38.329 193 DEBUG tempest.lib.common.rest_client [req-1fb15c88-f53c-4ce3-b316-f61b5ff880ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1fb15c88-f53c-4ce3-b316-f61b5ff880ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:38.380 193 INFO tempest.lib.common.rest_client [req-51c193bf-049a-474e-b389-0757f678a763 ] Request (SecGroupRbacTest:test_delete_security_group_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:17:38.386 193 DEBUG tempest.lib.common.rest_client [req-51c193bf-049a-474e-b389-0757f678a763 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51c193bf-049a-474e-b389-0757f678a763', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["8Ew9gz-hSsqtK5jjHqXBgA"], "expires_at": "2020-12-14T03:17:38.000000Z", "issued_at": "2020-12-14T02:17:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:38.493 193 INFO tempest.lib.common.rest_client [req-722987e6-64b1-45bf-b736-4722f56a6eed ] Request (SecGroupRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/security-group-rules/47fd05f3-c080-44e1-bc10-907bf76c01f6 0.097s 2020-12-14 02:17:38.496 193 DEBUG tempest.lib.common.rest_client [req-722987e6-64b1-45bf-b736-4722f56a6eed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '155', 'x-openstack-request-id': 'req-722987e6-64b1-45bf-b736-4722f56a6eed', 'date': 'Mon, 14 Dec 2020 02:17:38 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules/47fd05f3-c080-44e1-bc10-907bf76c01f6'} Body: b'{"NeutronError": {"type": "SecurityGroupRuleNotFound", "message": "Security group rule 47fd05f3-c080-44e1-bc10-907bf76c01f6 does not exist", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:38.509 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:38.534 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_security_group_rule, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:38.537 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:38.608 193 INFO tempest.lib.common.rest_client [req-984b8fbd-65a0-4202-b759-b0acf8a393f5 ] Request (SecGroupRbacTest:test_list_security_group_rules): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.064s 2020-12-14 02:17:38.612 193 DEBUG tempest.lib.common.rest_client [req-984b8fbd-65a0-4202-b759-b0acf8a393f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-984b8fbd-65a0-4202-b759-b0acf8a393f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:38.663 193 INFO tempest.lib.common.rest_client [req-8e2c51ee-6f16-40d4-864c-6cdd363514d3 ] Request (SecGroupRbacTest:test_list_security_group_rules): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:17:38.666 193 DEBUG tempest.lib.common.rest_client [req-8e2c51ee-6f16-40d4-864c-6cdd363514d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e2c51ee-6f16-40d4-864c-6cdd363514d3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["wW3nlXGNQ6GnvkLhoi9K1Q"], "expires_at": "2020-12-14T03:17:38.000000Z", "issued_at": "2020-12-14T02:17:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:38.885 193 INFO tempest.lib.common.rest_client [req-d1db382a-1b2b-4513-9f6e-156b208a89b7 ] Request (SecGroupRbacTest:test_list_security_group_rules): 200 GET http://172.30.13.94:9696/v2.0/security-group-rules 0.212s 2020-12-14 02:17:38.896 193 DEBUG tempest.lib.common.rest_client [req-d1db382a-1b2b-4513-9f6e-156b208a89b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '130017', 'x-openstack-request-id': 'req-d1db382a-1b2b-4513-9f6e-156b208a89b7', 'date': 'Mon, 14 Dec 2020 02:17:38 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules'} Body: b'{"security_group_rules": [{"id": "001315d8-52ff-4794-92aa-e948d4e8cd7e", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "33e57007-0d3c-430a-92f4-7885f234ed38", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "created_at": "2020-12-14T02:17:34Z", "updated_at": "2020-12-14T02:17:34Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}, {"id": "009ab96c-512d-41df-8bab-ba4b5f92e279", "tenant_id": "3ec3a3f06b144d2c8324b9309d0e0e19", "security_group_id": "ef5b254b-0de9-4c4e-bcba-ac2019dc670a", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "created_at": "2020-11-28T12:55:33Z", "updated_at": "2020-11-28T12:55:33Z", "revision_number": 0, "project_id": "3ec3a3f06b144d2c8324b9309d0e0e19"}, {"id": "01efa90b-22b5-4898-90e2-9d1372f7f1ff", "tenant_id": "41dfe7656f7d43259604be021dfa2ff9", "security_group_id": "a6f1e336-2f63-4e5f-93d2-274fd03b20ae", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "created_at": "2020-12-02T20:44:57Z", "updated_at": "2020-12-02T20:44:57Z", "revision_number": 0, "project_id": "41dfe7656f7d43259604be021dfa2ff9"}, {"id": "02276099-5ad8-4bce-8c5d-10636e41924c", "tenant_id": "70770d0b5506411ca294041fa7d6b3d9", "security_group_id": "1a7f5fc9-484f-459f-907f-104785e40697", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "created_at": "2020-12-14T02:14:07Z", "updated_at": "2020-12-14T02:14:07Z", "revision_number": 0, "project_id": "70770d0b5506411ca294041fa7d6b3d9"}, {"id": "0295f76d-c853-4170-95a3-609a8a22b71c", "tenant_id": "70770d0b5506411ca294041fa7d6b3d9", "security_group_id": "1a7f5fc9-484f-459f-907f-104785e40697", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1a7f5fc9-484f-459f-907f-104785e40697", "description": null, "created_at": "2020-12-14T02:14:07Z", "updated_at": "2020-12-14T02:14:07Z", "revision_number": 0, "project_id": "70770d0b5506411ca294041fa7d6b3d9"}, {"id": "038bc88e-3849-4783-8d34-1b9609e40eb3", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "security_group_id": "435333aa-df3d-4bff-9eac-fe1b81cd7668", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "created_at": "2020-12-14T02:15:55Z", "updated_at": "2020-12-14T02:15:55Z", "revision_number": 0, "project_id": "a836f1fb2f90434abc04b768f968fb5b"}, {"id": "048b08c1-f582-497a-ae43-c49e652e8784", "tenant_id": "e04fbfdb93ce4cb1b57c7b64fde70af4", "security_group_id": "f0677d6b-decd-4b7d-bafb-7e9266925c34", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "created_at": "2020-12-03T05:55:52Z", "updated_at": "2020-12-03T05:55:52Z", "revision_number": 0, "project_id": "e04fbfdb93ce4cb1b57c7b64fde70af4"}, {"id": "06e26481-130e-4f44-8ce7-c369547c6daf", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "security_group_id": "435333aa-df3d-4bff-9eac-fe1b81cd7668", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "435333aa-df3d-4bff-9eac-fe1b81cd7668", "description": null, "created_at": "2020-12-14T02:15:55Z", "updated_at": "2020-12-14T02:15:55Z", "revision_number": 0, "project_id": "a836f1fb2f90434abc04b768f968fb5b"}, {"id": "086d0040-5f20-4de1-b7f8-d29c08c3dad2", "tenant_id": "c7d54465a3a34388850b2bfdce4506aa" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:38.919 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:38.998 193 INFO tempest.lib.common.rest_client [req-f4ab991d-f58c-47af-a7ff-091d6b719d74 ] Request (SecGroupRbacTest:test_list_security_group_rules): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.072s 2020-12-14 02:17:39.002 193 DEBUG tempest.lib.common.rest_client [req-f4ab991d-f58c-47af-a7ff-091d6b719d74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4ab991d-f58c-47af-a7ff-091d6b719d74', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:39.052 193 INFO tempest.lib.common.rest_client [req-1639a4cd-b451-4d43-8d77-aba00f3b99c4 ] Request (SecGroupRbacTest:test_list_security_group_rules): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:17:39.056 193 DEBUG tempest.lib.common.rest_client [req-1639a4cd-b451-4d43-8d77-aba00f3b99c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1639a4cd-b451-4d43-8d77-aba00f3b99c4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["8uC3PMyAS3axVkt5_OKVjA"], "expires_at": "2020-12-14T03:17:39.000000Z", "issued_at": "2020-12-14T02:17:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:39.072 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:39.094 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_security_group, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:39.098 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:39.172 186 INFO tempest.lib.common.rest_client [req-90318c44-a17e-4e23-af8c-fdabdd69648f ] Request (MiscPolicyActionsNetworkRbacTest:test_create_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/a2e7365c-2d83-4a69-bffb-b4495cafc647 0.166s 2020-12-14 02:17:39.173 193 INFO tempest.lib.common.rest_client [req-7209e955-8118-4177-82b4-7c2886159418 ] Request (SecGroupRbacTest:test_list_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.068s 2020-12-14 02:17:39.176 186 DEBUG tempest.lib.common.rest_client [req-90318c44-a17e-4e23-af8c-fdabdd69648f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '283', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-90318c44-a17e-4e23-af8c-fdabdd69648f', 'x-compute-request-id': 'req-90318c44-a17e-4e23-af8c-fdabdd69648f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/a2e7365c-2d83-4a69-bffb-b4495cafc647'} Body: b'{"interfaceAttachment": {"net_id": "7b31d2ce-a194-467e-a554-37e06eca5476", "port_id": "a2e7365c-2d83-4a69-bffb-b4495cafc647", "mac_addr": "fa:16:3e:90:c9:38", "port_state": "DOWN", "fixed_ips": [{"subnet_id": "04a3f132-131b-4b4d-9d89-c34e861d6d5f", "ip_address": "192.168.120.89"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:39.176 193 DEBUG tempest.lib.common.rest_client [req-7209e955-8118-4177-82b4-7c2886159418 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7209e955-8118-4177-82b4-7c2886159418', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:39.232 193 INFO tempest.lib.common.rest_client [req-8bf81028-9225-4d2e-b301-13feb6877683 ] Request (SecGroupRbacTest:test_list_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:17:39.235 193 DEBUG tempest.lib.common.rest_client [req-8bf81028-9225-4d2e-b301-13feb6877683 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8bf81028-9225-4d2e-b301-13feb6877683', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["o6ylW1spTyuh1i7N-Se8Fw"], "expires_at": "2020-12-14T03:17:39.000000Z", "issued_at": "2020-12-14T02:17:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:39.435 193 INFO tempest.lib.common.rest_client [req-c166f0ec-cf2e-4518-bdea-84c3c3b5c291 ] Request (SecGroupRbacTest:test_list_security_groups): 200 GET http://172.30.13.94:9696/v2.0/security-groups?id=33e57007-0d3c-430a-92f4-7885f234ed38 0.192s 2020-12-14 02:17:39.438 193 DEBUG tempest.lib.common.rest_client [req-c166f0ec-cf2e-4518-bdea-84c3c3b5c291 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1396', 'x-openstack-request-id': 'req-c166f0ec-cf2e-4518-bdea-84c3c3b5c291', 'date': 'Mon, 14 Dec 2020 02:17:39 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?id=33e57007-0d3c-430a-92f4-7885f234ed38'} Body: b'{"security_groups": [{"id": "33e57007-0d3c-430a-92f4-7885f234ed38", "name": "tempest-SecGroupRbacTest-secgroup-349028942", "stateful": true, "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "description": "", "security_group_rules": [{"id": "001315d8-52ff-4794-92aa-e948d4e8cd7e", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "33e57007-0d3c-430a-92f4-7885f234ed38", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:34Z", "updated_at": "2020-12-14T02:17:34Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}, {"id": "9283c6ba-fa14-4e72-83b7-1576485aae21", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "33e57007-0d3c-430a-92f4-7885f234ed38", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:34Z", "updated_at": "2020-12-14T02:17:34Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}], "tags": [], "created_at": "2020-12-14T02:17:34Z", "updated_at": "2020-12-14T02:17:38Z", "revision_number": 5, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:39.441 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:39.517 193 INFO tempest.lib.common.rest_client [req-aafa0107-cc07-4804-96e9-12a04e444b99 ] Request (SecGroupRbacTest:test_list_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.070s 2020-12-14 02:17:39.520 193 DEBUG tempest.lib.common.rest_client [req-aafa0107-cc07-4804-96e9-12a04e444b99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aafa0107-cc07-4804-96e9-12a04e444b99', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:39.575 193 INFO tempest.lib.common.rest_client [req-5ea1f039-e20e-4f1d-9916-130c3e30bc6f ] Request (SecGroupRbacTest:test_list_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:17:39.579 193 DEBUG tempest.lib.common.rest_client [req-5ea1f039-e20e-4f1d-9916-130c3e30bc6f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ea1f039-e20e-4f1d-9916-130c3e30bc6f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["2zd-lbMjRpWPjPxqCUYp_A"], "expires_at": "2020-12-14T03:17:39.000000Z", "issued_at": "2020-12-14T02:17:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:39.594 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:39.623 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_security_group, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:39.626 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:39.695 193 INFO tempest.lib.common.rest_client [req-e0de36d4-0d1d-4702-84dd-0f3ee831285b ] Request (SecGroupRbacTest:test_show_security_group): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.062s 2020-12-14 02:17:39.698 193 DEBUG tempest.lib.common.rest_client [req-e0de36d4-0d1d-4702-84dd-0f3ee831285b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0de36d4-0d1d-4702-84dd-0f3ee831285b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:39.750 193 INFO tempest.lib.common.rest_client [req-85943d1a-8571-403f-9fb4-eb87862c66e3 ] Request (SecGroupRbacTest:test_show_security_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:17:39.754 193 DEBUG tempest.lib.common.rest_client [req-85943d1a-8571-403f-9fb4-eb87862c66e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85943d1a-8571-403f-9fb4-eb87862c66e3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["XR_nyKqcRie4C3vq20g2xQ"], "expires_at": "2020-12-14T03:17:39.000000Z", "issued_at": "2020-12-14T02:17:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:39.877 193 INFO tempest.lib.common.rest_client [req-634adaf9-7efd-479e-9e8d-d6fa9b414cff ] Request (SecGroupRbacTest:test_show_security_group): 200 GET http://172.30.13.94:9696/v2.0/security-groups/33e57007-0d3c-430a-92f4-7885f234ed38 0.115s 2020-12-14 02:17:39.881 193 DEBUG tempest.lib.common.rest_client [req-634adaf9-7efd-479e-9e8d-d6fa9b414cff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1393', 'x-openstack-request-id': 'req-634adaf9-7efd-479e-9e8d-d6fa9b414cff', 'date': 'Mon, 14 Dec 2020 02:17:39 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/33e57007-0d3c-430a-92f4-7885f234ed38'} Body: b'{"security_group": {"id": "33e57007-0d3c-430a-92f4-7885f234ed38", "name": "tempest-SecGroupRbacTest-secgroup-349028942", "stateful": true, "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "description": "", "security_group_rules": [{"id": "001315d8-52ff-4794-92aa-e948d4e8cd7e", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "33e57007-0d3c-430a-92f4-7885f234ed38", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:34Z", "updated_at": "2020-12-14T02:17:34Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}, {"id": "9283c6ba-fa14-4e72-83b7-1576485aae21", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "33e57007-0d3c-430a-92f4-7885f234ed38", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:34Z", "updated_at": "2020-12-14T02:17:34Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}], "tags": [], "created_at": "2020-12-14T02:17:34Z", "updated_at": "2020-12-14T02:17:38Z", "revision_number": 5, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:39.885 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:39.956 193 INFO tempest.lib.common.rest_client [req-160f0ec4-dd03-4cbf-bb49-ee88ec37f1a2 ] Request (SecGroupRbacTest:test_show_security_group): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.064s 2020-12-14 02:17:39.960 193 DEBUG tempest.lib.common.rest_client [req-160f0ec4-dd03-4cbf-bb49-ee88ec37f1a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-160f0ec4-dd03-4cbf-bb49-ee88ec37f1a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:40.011 193 INFO tempest.lib.common.rest_client [req-03c4b139-3cab-46fb-b08b-9f1b6eb7c11b ] Request (SecGroupRbacTest:test_show_security_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:17:40.015 193 DEBUG tempest.lib.common.rest_client [req-03c4b139-3cab-46fb-b08b-9f1b6eb7c11b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-03c4b139-3cab-46fb-b08b-9f1b6eb7c11b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["I7mCXzgtRxu8Vt2vJFmGJA"], "expires_at": "2020-12-14T03:17:39.000000Z", "issued_at": "2020-12-14T02:17:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:40.031 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:40.066 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_security_group_rule, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:40.367 186 INFO tempest.lib.common.rest_client [req-b5205d3a-88fc-482d-8094-d8af06f59ecb ] Request (MiscPolicyActionsNetworkRbacTest:test_create_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/a2e7365c-2d83-4a69-bffb-b4495cafc647 0.156s 2020-12-14 02:17:40.370 186 DEBUG tempest.lib.common.rest_client [req-b5205d3a-88fc-482d-8094-d8af06f59ecb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '285', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b5205d3a-88fc-482d-8094-d8af06f59ecb', 'x-compute-request-id': 'req-b5205d3a-88fc-482d-8094-d8af06f59ecb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/a2e7365c-2d83-4a69-bffb-b4495cafc647'} Body: b'{"interfaceAttachment": {"net_id": "7b31d2ce-a194-467e-a554-37e06eca5476", "port_id": "a2e7365c-2d83-4a69-bffb-b4495cafc647", "mac_addr": "fa:16:3e:90:c9:38", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "04a3f132-131b-4b4d-9d89-c34e861d6d5f", "ip_address": "192.168.120.89"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:40.398 197 INFO tempest.lib.common.rest_client [req-a97257cd-3448-4f08-8fa0-cf527e83bbbd ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 1.551s 2020-12-14 02:17:40.401 197 DEBUG tempest.lib.common.rest_client [req-a97257cd-3448-4f08-8fa0-cf527e83bbbd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a97257cd-3448-4f08-8fa0-cf527e83bbbd', 'x-compute-request-id': 'req-a97257cd-3448-4f08-8fa0-cf527e83bbbd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:40.408 189 INFO tempest.lib.common.rest_client [req-cee3f19b-3940-4e8a-a19f-16ef08bce1ad ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 3.992s 2020-12-14 02:17:40.411 189 DEBUG tempest.lib.common.rest_client [req-cee3f19b-3940-4e8a-a19f-16ef08bce1ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cee3f19b-3940-4e8a-a19f-16ef08bce1ad', 'x-compute-request-id': 'req-cee3f19b-3940-4e8a-a19f-16ef08bce1ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:40.471 193 INFO tempest.lib.common.rest_client [req-459f61ac-dca2-4e00-8445-8c94175bfc4d ] Request (SecGroupRbacTest:test_show_security_group_rule): 201 POST http://172.30.13.94:9696/v2.0/security-group-rules 0.398s 2020-12-14 02:17:40.474 193 DEBUG tempest.lib.common.rest_client [req-459f61ac-dca2-4e00-8445-8c94175bfc4d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group_rule": {"security_group_id": "33e57007-0d3c-430a-92f4-7885f234ed38", "direction": "ingress", "protocol": "tcp", "port_range_min": 99, "port_range_max": 99}} Response - Headers: {'content-type': 'application/json', 'content-length': '507', 'x-openstack-request-id': 'req-459f61ac-dca2-4e00-8445-8c94175bfc4d', 'date': 'Mon, 14 Dec 2020 02:17:40 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules'} Body: b'{"security_group_rule": {"id": "cd145626-913b-4490-a15f-68bf6bbb2f38", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "33e57007-0d3c-430a-92f4-7885f234ed38", "ethertype": "IPv4", "direction": "ingress", "protocol": "tcp", "port_range_min": 99, "port_range_max": 99, "remote_ip_prefix": null, "remote_group_id": null, "description": "", "created_at": "2020-12-14T02:17:40Z", "updated_at": "2020-12-14T02:17:40Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:40.477 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:40.518 186 INFO tempest.lib.common.rest_client [req-03ab3fff-ffa4-4bae-97b3-68b91e774495 ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/a2e7365c-2d83-4a69-bffb-b4495cafc647 0.110s 2020-12-14 02:17:40.520 186 DEBUG tempest.lib.common.rest_client [req-03ab3fff-ffa4-4bae-97b3-68b91e774495 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-03ab3fff-ffa4-4bae-97b3-68b91e774495', 'x-compute-request-id': 'req-03ab3fff-ffa4-4bae-97b3-68b91e774495', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/a2e7365c-2d83-4a69-bffb-b4495cafc647'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:40.546 193 INFO tempest.lib.common.rest_client [req-70298056-929d-4399-b58b-baf29fcae9bd ] Request (SecGroupRbacTest:test_show_security_group_rule): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.062s 2020-12-14 02:17:40.551 193 DEBUG tempest.lib.common.rest_client [req-70298056-929d-4399-b58b-baf29fcae9bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70298056-929d-4399-b58b-baf29fcae9bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:40.605 193 INFO tempest.lib.common.rest_client [req-34f7687c-24b7-4ea7-bfc0-5101b04e22f2 ] Request (SecGroupRbacTest:test_show_security_group_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:17:40.610 193 DEBUG tempest.lib.common.rest_client [req-34f7687c-24b7-4ea7-bfc0-5101b04e22f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34f7687c-24b7-4ea7-bfc0-5101b04e22f2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["5-CUG8wERvOzCuPUgPp1ow"], "expires_at": "2020-12-14T03:17:40.000000Z", "issued_at": "2020-12-14T02:17:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:40.704 186 INFO tempest.lib.common.rest_client [req-8a6fe3d9-f657-43c9-bb17-f2b0365dd837 ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface 0.177s 2020-12-14 02:17:40.707 186 DEBUG tempest.lib.common.rest_client [req-8a6fe3d9-f657-43c9-bb17-f2b0365dd837 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '635', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8a6fe3d9-f657-43c9-bb17-f2b0365dd837', 'x-compute-request-id': 'req-8a6fe3d9-f657-43c9-bb17-f2b0365dd837', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "7b31d2ce-a194-467e-a554-37e06eca5476", "port_id": "a2e7365c-2d83-4a69-bffb-b4495cafc647", "mac_addr": "fa:16:3e:90:c9:38", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "04a3f132-131b-4b4d-9d89-c34e861d6d5f", "ip_address": "192.168.120.89"}]}, {"net_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "port_id": "bcdcfe0c-62b4-4338-993f-01a51ede3a86", "mac_addr": "fa:16:3e:0c:4f:91", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.6"}, {"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.7"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:40.709 193 INFO tempest.lib.common.rest_client [req-8fa3ad2c-a9cf-4bd2-86f2-71b3343156d4 ] Request (SecGroupRbacTest:test_show_security_group_rule): 200 GET http://172.30.13.94:9696/v2.0/security-group-rules/cd145626-913b-4490-a15f-68bf6bbb2f38 0.092s 2020-12-14 02:17:40.713 193 DEBUG tempest.lib.common.rest_client [req-8fa3ad2c-a9cf-4bd2-86f2-71b3343156d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '507', 'x-openstack-request-id': 'req-8fa3ad2c-a9cf-4bd2-86f2-71b3343156d4', 'date': 'Mon, 14 Dec 2020 02:17:40 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules/cd145626-913b-4490-a15f-68bf6bbb2f38'} Body: b'{"security_group_rule": {"id": "cd145626-913b-4490-a15f-68bf6bbb2f38", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "33e57007-0d3c-430a-92f4-7885f234ed38", "ethertype": "IPv4", "direction": "ingress", "protocol": "tcp", "port_range_min": 99, "port_range_max": 99, "remote_ip_prefix": null, "remote_group_id": null, "description": "", "created_at": "2020-12-14T02:17:40Z", "updated_at": "2020-12-14T02:17:40Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:40.716 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:40.785 193 INFO tempest.lib.common.rest_client [req-c93b3aae-a946-42d6-8c85-3761e62e686e ] Request (SecGroupRbacTest:test_show_security_group_rule): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.063s 2020-12-14 02:17:40.789 193 DEBUG tempest.lib.common.rest_client [req-c93b3aae-a946-42d6-8c85-3761e62e686e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c93b3aae-a946-42d6-8c85-3761e62e686e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:40.839 193 INFO tempest.lib.common.rest_client [req-7021da74-47c4-4491-9f8c-65957d4c166e ] Request (SecGroupRbacTest:test_show_security_group_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:17:40.844 193 DEBUG tempest.lib.common.rest_client [req-7021da74-47c4-4491-9f8c-65957d4c166e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7021da74-47c4-4491-9f8c-65957d4c166e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["4_PAVgSyR0ufAoO3gmhHcA"], "expires_at": "2020-12-14T03:17:40.000000Z", "issued_at": "2020-12-14T02:17:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:41.762 189 INFO tempest.lib.common.rest_client [req-7ebd7120-2823-4fd3-bb63-68db1a6bca24 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.242s 2020-12-14 02:17:41.766 197 INFO tempest.lib.common.rest_client [req-394bae4e-fc04-41ce-af3c-b1660de49c34 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.254s 2020-12-14 02:17:41.767 189 DEBUG tempest.lib.common.rest_client [req-7ebd7120-2823-4fd3-bb63-68db1a6bca24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7ebd7120-2823-4fd3-bb63-68db1a6bca24', 'x-compute-request-id': 'req-7ebd7120-2823-4fd3-bb63-68db1a6bca24', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:41.768 197 DEBUG tempest.lib.common.rest_client [req-394bae4e-fc04-41ce-af3c-b1660de49c34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-394bae4e-fc04-41ce-af3c-b1660de49c34', 'x-compute-request-id': 'req-394bae4e-fc04-41ce-af3c-b1660de49c34', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:42.105 186 INFO tempest.lib.common.rest_client [req-fa0257b1-b546-4f69-b765-1e931fbae7b2 ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface 0.353s 2020-12-14 02:17:42.108 186 DEBUG tempest.lib.common.rest_client [req-fa0257b1-b546-4f69-b765-1e931fbae7b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '373', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fa0257b1-b546-4f69-b765-1e931fbae7b2', 'x-compute-request-id': 'req-fa0257b1-b546-4f69-b765-1e931fbae7b2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "port_id": "bcdcfe0c-62b4-4338-993f-01a51ede3a86", "mac_addr": "fa:16:3e:0c:4f:91", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.6"}, {"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.7"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:42.170 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:42.175 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.179 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.182 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.185 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.189 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.192 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.197 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.200 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.203 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.205 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.208 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.211 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.214 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.217 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.220 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.224 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.226 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.229 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.232 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.235 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.237 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.240 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.243 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.246 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.248 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.251 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.254 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.256 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.259 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.262 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.264 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.267 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.269 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.272 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.275 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.278 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.280 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.283 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.286 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.289 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.292 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.295 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.297 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.301 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.304 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.306 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.309 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.312 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.314 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.317 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.320 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.322 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.325 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.328 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.331 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.334 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.340 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.342 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.345 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.348 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.351 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.354 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.357 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.359 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.362 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.365 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.368 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.370 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.373 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.376 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.379 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:42.391 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-attach-interfaces:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:43.178 197 INFO tempest.lib.common.rest_client [req-d460e206-1a9d-4570-9dcd-1f68bd3e4c55 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.302s 2020-12-14 02:17:43.182 197 DEBUG tempest.lib.common.rest_client [req-d460e206-1a9d-4570-9dcd-1f68bd3e4c55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d460e206-1a9d-4570-9dcd-1f68bd3e4c55', 'x-compute-request-id': 'req-d460e206-1a9d-4570-9dcd-1f68bd3e4c55', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:45.926 193 INFO tempest.lib.common.rest_client [req-9eb07495-d340-492e-a7a6-c6ff1e6481c5 ] Request (SecGroupRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/security-group-rules/cd145626-913b-4490-a15f-68bf6bbb2f38 5.072s 2020-12-14 02:17:45.930 193 DEBUG tempest.lib.common.rest_client [req-9eb07495-d340-492e-a7a6-c6ff1e6481c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-9eb07495-d340-492e-a7a6-c6ff1e6481c5', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:45 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules/cd145626-913b-4490-a15f-68bf6bbb2f38'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:45.943 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:45.968 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_security_group, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:45.970 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:45.996 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_security_group, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:46.303 193 INFO tempest.lib.common.rest_client [req-66479009-35ba-450b-b6fb-ccf520068a40 ] Request (SecGroupRbacTest:test_update_security_group): 201 POST http://172.30.13.94:9696/v2.0/security-groups 0.299s 2020-12-14 02:17:46.307 193 DEBUG tempest.lib.common.rest_client [req-66479009-35ba-450b-b6fb-ccf520068a40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecGroupRbacTest-secgroup-1020474056"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1394', 'x-openstack-request-id': 'req-66479009-35ba-450b-b6fb-ccf520068a40', 'date': 'Mon, 14 Dec 2020 02:17:46 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups'} Body: b'{"security_group": {"id": "5c06ba43-5ee7-4884-83b3-6e7a941b144e", "name": "tempest-SecGroupRbacTest-secgroup-1020474056", "stateful": true, "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "description": "", "security_group_rules": [{"id": "044dda5c-126c-47be-b0ec-56a2ca06075c", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "5c06ba43-5ee7-4884-83b3-6e7a941b144e", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:46Z", "updated_at": "2020-12-14T02:17:46Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}, {"id": "3a16efda-e6dd-41a6-be0f-db56d3f722b8", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "5c06ba43-5ee7-4884-83b3-6e7a941b144e", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:46Z", "updated_at": "2020-12-14T02:17:46Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}], "tags": [], "created_at": "2020-12-14T02:17:46Z", "updated_at": "2020-12-14T02:17:46Z", "revision_number": 1, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:46.310 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:46.389 193 INFO tempest.lib.common.rest_client [req-a55bcbee-7f73-45e6-8cc1-0f2faadef349 ] Request (SecGroupRbacTest:test_update_security_group): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.072s 2020-12-14 02:17:46.393 193 DEBUG tempest.lib.common.rest_client [req-a55bcbee-7f73-45e6-8cc1-0f2faadef349 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a55bcbee-7f73-45e6-8cc1-0f2faadef349', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:46.444 193 INFO tempest.lib.common.rest_client [req-1c54a0d9-46a9-44ca-8f27-d43130aac00d ] Request (SecGroupRbacTest:test_update_security_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:17:46.447 193 DEBUG tempest.lib.common.rest_client [req-1c54a0d9-46a9-44ca-8f27-d43130aac00d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c54a0d9-46a9-44ca-8f27-d43130aac00d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["PkYrRaIHTKirW9d0WNFcXA"], "expires_at": "2020-12-14T03:17:46.000000Z", "issued_at": "2020-12-14T02:17:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:46.667 186 INFO tempest.lib.common.rest_client [req-aa226eea-7616-40cf-a065-0c20f14a8cdf ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 200 POST http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface 4.270s 2020-12-14 02:17:46.669 186 DEBUG tempest.lib.common.rest_client [req-aa226eea-7616-40cf-a065-0c20f14a8cdf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"interfaceAttachment": {"net_id": "7b31d2ce-a194-467e-a554-37e06eca5476"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '284', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aa226eea-7616-40cf-a065-0c20f14a8cdf', 'x-compute-request-id': 'req-aa226eea-7616-40cf-a065-0c20f14a8cdf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface'} Body: b'{"interfaceAttachment": {"net_id": "7b31d2ce-a194-467e-a554-37e06eca5476", "port_id": "f4bcd52b-2260-4991-8052-c5d7c8072955", "mac_addr": "fa:16:3e:1b:fe:31", "port_state": "DOWN", "fixed_ips": [{"subnet_id": "04a3f132-131b-4b4d-9d89-c34e861d6d5f", "ip_address": "192.168.120.106"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:46.720 193 INFO tempest.lib.common.rest_client [req-fa5aa0e0-3de8-4199-8fd1-e2d8f5255938 ] Request (SecGroupRbacTest:test_update_security_group): 200 PUT http://172.30.13.94:9696/v2.0/security-groups/5c06ba43-5ee7-4884-83b3-6e7a941b144e 0.265s 2020-12-14 02:17:46.724 193 DEBUG tempest.lib.common.rest_client [req-fa5aa0e0-3de8-4199-8fd1-e2d8f5255938 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"description": "test description"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1410', 'x-openstack-request-id': 'req-fa5aa0e0-3de8-4199-8fd1-e2d8f5255938', 'date': 'Mon, 14 Dec 2020 02:17:46 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5c06ba43-5ee7-4884-83b3-6e7a941b144e'} Body: b'{"security_group": {"id": "5c06ba43-5ee7-4884-83b3-6e7a941b144e", "name": "tempest-SecGroupRbacTest-secgroup-1020474056", "stateful": true, "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "description": "test description", "security_group_rules": [{"id": "044dda5c-126c-47be-b0ec-56a2ca06075c", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "5c06ba43-5ee7-4884-83b3-6e7a941b144e", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:46Z", "updated_at": "2020-12-14T02:17:46Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}, {"id": "3a16efda-e6dd-41a6-be0f-db56d3f722b8", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "5c06ba43-5ee7-4884-83b3-6e7a941b144e", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:46Z", "updated_at": "2020-12-14T02:17:46Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}], "tags": [], "created_at": "2020-12-14T02:17:46Z", "updated_at": "2020-12-14T02:17:46Z", "revision_number": 1, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:46.728 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:46.799 193 INFO tempest.lib.common.rest_client [req-79e4d82d-307c-447a-aefa-17a72cd8d13a ] Request (SecGroupRbacTest:test_update_security_group): 200 GET http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles 0.065s 2020-12-14 02:17:46.803 193 DEBUG tempest.lib.common.rest_client [req-79e4d82d-307c-447a-aefa-17a72cd8d13a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79e4d82d-307c-447a-aefa-17a72cd8d13a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b/users/7314f823e8314b4992c6cb1c0f5b0a35/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:46.853 193 INFO tempest.lib.common.rest_client [req-0ed82f7a-cc6c-4322-b2c2-584e53fc5922 ] Request (SecGroupRbacTest:test_update_security_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:17:46.856 193 DEBUG tempest.lib.common.rest_client [req-0ed82f7a-cc6c-4322-b2c2-584e53fc5922 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ed82f7a-cc6c-4322-b2c2-584e53fc5922', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7314f823e8314b4992c6cb1c0f5b0a35", "name": "tempest-SecGroupRbacTest-928162519", "password_expires_at": null}, "audit_ids": ["fsA3qTgsThSEJ_h6F6094A"], "expires_at": "2020-12-14T03:17:46.000000Z", "issued_at": "2020-12-14T02:17:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3ab4ee5fe89c41ed895fb47a74c8171b", "name": "tempest-SecGroupRbacTest-928162519"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3ab4ee5fe89c41ed895fb47a74c8171b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:47.043 193 INFO tempest.lib.common.rest_client [req-0f0e7e58-0379-4b0b-b5db-3ea0ea3f9a17 ] Request (SecGroupRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/5c06ba43-5ee7-4884-83b3-6e7a941b144e 0.176s 2020-12-14 02:17:47.047 193 DEBUG tempest.lib.common.rest_client [req-0f0e7e58-0379-4b0b-b5db-3ea0ea3f9a17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-0f0e7e58-0379-4b0b-b5db-3ea0ea3f9a17', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:47 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5c06ba43-5ee7-4884-83b3-6e7a941b144e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:47.223 193 INFO tempest.lib.common.rest_client [req-9045cce9-fd8c-486e-be16-e67893693e2f ] Request (SecGroupRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/33e57007-0d3c-430a-92f4-7885f234ed38 0.160s 2020-12-14 02:17:47.226 193 DEBUG tempest.lib.common.rest_client [req-9045cce9-fd8c-486e-be16-e67893693e2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-9045cce9-fd8c-486e-be16-e67893693e2f', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:47 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/33e57007-0d3c-430a-92f4-7885f234ed38'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:47.299 186 INFO tempest.lib.common.rest_client [req-91e82cf2-8d1c-404b-8761-c06cf36955b7 ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/f4bcd52b-2260-4991-8052-c5d7c8072955 0.602s 2020-12-14 02:17:47.303 186 DEBUG tempest.lib.common.rest_client [req-91e82cf2-8d1c-404b-8761-c06cf36955b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '286', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-91e82cf2-8d1c-404b-8761-c06cf36955b7', 'x-compute-request-id': 'req-91e82cf2-8d1c-404b-8761-c06cf36955b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/f4bcd52b-2260-4991-8052-c5d7c8072955'} Body: b'{"interfaceAttachment": {"net_id": "7b31d2ce-a194-467e-a554-37e06eca5476", "port_id": "f4bcd52b-2260-4991-8052-c5d7c8072955", "mac_addr": "fa:16:3e:1b:fe:31", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "04a3f132-131b-4b4d-9d89-c34e861d6d5f", "ip_address": "192.168.120.106"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:47.335 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:47.383 193 INFO tempest.lib.common.rest_client [req-105def34-a988-448f-adc3-eb7e39e6ab6d ] Request (SecGroupRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/7314f823e8314b4992c6cb1c0f5b0a35 0.149s 2020-12-14 02:17:47.386 193 DEBUG tempest.lib.common.rest_client [req-105def34-a988-448f-adc3-eb7e39e6ab6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-105def34-a988-448f-adc3-eb7e39e6ab6d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/7314f823e8314b4992c6cb1c0f5b0a35'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:47.404 186 INFO tempest.lib.common.rest_client [req-bf0429da-3e8b-4ec4-bc88-02c1e3c42d2d ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 200 GET http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles 0.062s 2020-12-14 02:17:47.407 186 DEBUG tempest.lib.common.rest_client [req-bf0429da-3e8b-4ec4-bc88-02c1e3c42d2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf0429da-3e8b-4ec4-bc88-02c1e3c42d2d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:47.408 197 INFO tempest.lib.common.rest_client [req-aad99e40-8760-42a2-8d25-be5e4962a1c6 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 3.113s 2020-12-14 02:17:47.411 197 DEBUG tempest.lib.common.rest_client [req-aad99e40-8760-42a2-8d25-be5e4962a1c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aad99e40-8760-42a2-8d25-be5e4962a1c6', 'x-compute-request-id': 'req-aad99e40-8760-42a2-8d25-be5e4962a1c6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:47.492 189 INFO tempest.lib.common.rest_client [req-f8fcd448-0a4a-43e0-884a-aa7f87537f40 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 4.574s 2020-12-14 02:17:47.493 193 INFO tempest.lib.common.rest_client [req-d054a2bb-e1e1-429d-b386-74290bb72e7a ] Request (SecGroupRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:17:47.495 189 DEBUG tempest.lib.common.rest_client [req-f8fcd448-0a4a-43e0-884a-aa7f87537f40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f8fcd448-0a4a-43e0-884a-aa7f87537f40', 'x-compute-request-id': 'req-f8fcd448-0a4a-43e0-884a-aa7f87537f40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:47.496 193 DEBUG tempest.lib.common.rest_client [req-d054a2bb-e1e1-429d-b386-74290bb72e7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d054a2bb-e1e1-429d-b386-74290bb72e7a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["B0k6XhqaSZyBb1NGyusDjA"], "expires_at": "2020-12-14T03:17:47.000000Z", "issued_at": "2020-12-14T02:17:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:47.508 186 INFO tempest.lib.common.rest_client [req-9ad7d46b-7473-4d57-b73f-c85580d3a03c ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:17:47.513 186 DEBUG tempest.lib.common.rest_client [req-9ad7d46b-7473-4d57-b73f-c85580d3a03c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ad7d46b-7473-4d57-b73f-c85580d3a03c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["m9NUqSkmQ9Wl1GfcNdMj7g"], "expires_at": "2020-12-14T03:17:47.000000Z", "issued_at": "2020-12-14T02:17:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:47.673 193 INFO tempest.lib.common.rest_client [req-2d936c29-aad3-470b-afa9-7a237844cc54 ] Request (SecGroupRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3ab4ee5fe89c41ed895fb47a74c8171b&name=default 0.171s 2020-12-14 02:17:47.677 193 DEBUG tempest.lib.common.rest_client [req-2d936c29-aad3-470b-afa9-7a237844cc54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-2d936c29-aad3-470b-afa9-7a237844cc54', 'date': 'Mon, 14 Dec 2020 02:17:47 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3ab4ee5fe89c41ed895fb47a74c8171b&name=default'} Body: b'{"security_groups": [{"id": "3f63e282-737c-4d99-ab7f-ef194da63db9", "name": "default", "stateful": true, "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "description": "Default security group", "security_group_rules": [{"id": "4bae87bd-1d92-41c2-b6e9-9ce5ca11a25e", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "3f63e282-737c-4d99-ab7f-ef194da63db9", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "3f63e282-737c-4d99-ab7f-ef194da63db9", "description": null, "tags": [], "created_at": "2020-12-14T02:17:33Z", "updated_at": "2020-12-14T02:17:33Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}, {"id": "65fa213f-c5ff-49e3-91d5-0920e2719402", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "3f63e282-737c-4d99-ab7f-ef194da63db9", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "3f63e282-737c-4d99-ab7f-ef194da63db9", "description": null, "tags": [], "created_at": "2020-12-14T02:17:33Z", "updated_at": "2020-12-14T02:17:33Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}, {"id": "a21edf7e-6594-4308-9757-be5659ecd84d", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "3f63e282-737c-4d99-ab7f-ef194da63db9", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:33Z", "updated_at": "2020-12-14T02:17:33Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}, {"id": "d0143be9-3199-49d5-af19-43c7a0a143fe", "tenant_id": "3ab4ee5fe89c41ed895fb47a74c8171b", "security_group_id": "3f63e282-737c-4d99-ab7f-ef194da63db9", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:33Z", "updated_at": "2020-12-14T02:17:33Z", "revision_number": 0, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}], "tags": [], "created_at": "2020-12-14T02:17:33Z", "updated_at": "2020-12-14T02:17:33Z", "revision_number": 1, "project_id": "3ab4ee5fe89c41ed895fb47a74c8171b"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:47.733 186 INFO tempest.lib.common.rest_client [req-82cf957a-3b11-49a2-a0a4-9e053f04b057 ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 202 DELETE http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/f4bcd52b-2260-4991-8052-c5d7c8072955 0.212s 2020-12-14 02:17:47.737 186 DEBUG tempest.lib.common.rest_client [req-82cf957a-3b11-49a2-a0a4-9e053f04b057 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-82cf957a-3b11-49a2-a0a4-9e053f04b057', 'x-compute-request-id': 'req-82cf957a-3b11-49a2-a0a4-9e053f04b057', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/f4bcd52b-2260-4991-8052-c5d7c8072955'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:47.740 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:47.814 186 INFO tempest.lib.common.rest_client [req-d1641330-6e56-43a9-8835-98b98b41a016 ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 200 GET http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles 0.067s 2020-12-14 02:17:47.817 186 DEBUG tempest.lib.common.rest_client [req-d1641330-6e56-43a9-8835-98b98b41a016 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1641330-6e56-43a9-8835-98b98b41a016', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:47.869 186 INFO tempest.lib.common.rest_client [req-858184f8-7dea-41eb-8604-1d1520435d22 ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:17:47.872 186 DEBUG tempest.lib.common.rest_client [req-858184f8-7dea-41eb-8604-1d1520435d22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-858184f8-7dea-41eb-8604-1d1520435d22', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["yT_qAUWoTjWKlaemg-tdog"], "expires_at": "2020-12-14T03:17:47.000000Z", "issued_at": "2020-12-14T02:17:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:47.938 193 INFO tempest.lib.common.rest_client [req-c2f3b21f-8710-4f7d-bffc-f19322b8a65c ] Request (SecGroupRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/3f63e282-737c-4d99-ab7f-ef194da63db9 0.254s 2020-12-14 02:17:47.940 193 DEBUG tempest.lib.common.rest_client [req-c2f3b21f-8710-4f7d-bffc-f19322b8a65c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c2f3b21f-8710-4f7d-bffc-f19322b8a65c', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:47 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/3f63e282-737c-4d99-ab7f-ef194da63db9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:48.120 186 INFO tempest.lib.common.rest_client [req-b2677626-2408-4e21-89c7-83ea734bb621 ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface 0.240s 2020-12-14 02:17:48.123 186 DEBUG tempest.lib.common.rest_client [req-b2677626-2408-4e21-89c7-83ea734bb621 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '636', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b2677626-2408-4e21-89c7-83ea734bb621', 'x-compute-request-id': 'req-b2677626-2408-4e21-89c7-83ea734bb621', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "port_id": "bcdcfe0c-62b4-4338-993f-01a51ede3a86", "mac_addr": "fa:16:3e:0c:4f:91", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.6"}, {"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.7"}]}, {"net_id": "7b31d2ce-a194-467e-a554-37e06eca5476", "port_id": "f4bcd52b-2260-4991-8052-c5d7c8072955", "mac_addr": "fa:16:3e:1b:fe:31", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "04a3f132-131b-4b4d-9d89-c34e861d6d5f", "ip_address": "192.168.120.106"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:48.158 193 INFO tempest.lib.common.rest_client [req-4a764c27-b396-423c-a23c-9590803d872c ] Request (SecGroupRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b 0.212s 2020-12-14 02:17:48.160 193 DEBUG tempest.lib.common.rest_client [req-4a764c27-b396-423c-a23c-9590803d872c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a764c27-b396-423c-a23c-9590803d872c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3ab4ee5fe89c41ed895fb47a74c8171b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:48.273 193 INFO tempest.lib.common.rest_client [req-dfa8b98b-3d33-4c1e-84bd-a688b05ba181 ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:17:48.276 193 DEBUG tempest.lib.common.rest_client [req-dfa8b98b-3d33-4c1e-84bd-a688b05ba181 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dfa8b98b-3d33-4c1e-84bd-a688b05ba181', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["mvk95BYxQOeaZk2yw1hW1g"], "expires_at": "2020-12-14T03:17:48.000000Z", "issued_at": "2020-12-14T02:17:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:48.478 193 INFO tempest.lib.common.rest_client [req-dba482bf-b0e5-4ca6-b179-b8d31418e5c0 ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.151s 2020-12-14 02:17:48.480 193 DEBUG tempest.lib.common.rest_client [req-dba482bf-b0e5-4ca6-b179-b8d31418e5c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dba482bf-b0e5-4ca6-b179-b8d31418e5c0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ca3ZYbOPSemRPusyyGosMg"], "expires_at": "2020-12-14T03:17:48.000000Z", "issued_at": "2020-12-14T02:17:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:48.572 193 INFO tempest.lib.common.rest_client [req-a275f0b5-7b6d-44fb-971a-34aeced06b50 ] Request (SegmentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.083s 2020-12-14 02:17:48.575 193 DEBUG tempest.lib.common.rest_client [req-a275f0b5-7b6d-44fb-971a-34aeced06b50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a275f0b5-7b6d-44fb-971a-34aeced06b50', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:48.693 193 INFO tempest.lib.common.rest_client [req-10b074bd-8e0d-4730-b92d-1ebcd2ccf90b ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.110s 2020-12-14 02:17:48.696 193 DEBUG tempest.lib.common.rest_client [req-10b074bd-8e0d-4730-b92d-1ebcd2ccf90b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SegmentsExtRbacTest-1701683891-desc", "domain_id": "default", "name": "tempest-SegmentsExtRbacTest-1701683891"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10b074bd-8e0d-4730-b92d-1ebcd2ccf90b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891", "domain_id": "default", "description": "tempest-SegmentsExtRbacTest-1701683891-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:48.818 189 INFO tempest.lib.common.rest_client [req-eaaf769d-2464-4cf9-9efc-c49178199024 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.213s 2020-12-14 02:17:48.820 189 DEBUG tempest.lib.common.rest_client [req-eaaf769d-2464-4cf9-9efc-c49178199024 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eaaf769d-2464-4cf9-9efc-c49178199024', 'x-compute-request-id': 'req-eaaf769d-2464-4cf9-9efc-c49178199024', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:48.820 197 INFO tempest.lib.common.rest_client [req-4291d875-fb56-4710-8b2d-9b84a1fd6153 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.288s 2020-12-14 02:17:48.823 197 DEBUG tempest.lib.common.rest_client [req-4291d875-fb56-4710-8b2d-9b84a1fd6153 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4291d875-fb56-4710-8b2d-9b84a1fd6153', 'x-compute-request-id': 'req-4291d875-fb56-4710-8b2d-9b84a1fd6153', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:48.845 193 INFO tempest.lib.common.rest_client [req-f19fd01e-92d9-49e7-b415-8cb129d0d30e ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.138s 2020-12-14 02:17:48.848 193 DEBUG tempest.lib.common.rest_client [req-f19fd01e-92d9-49e7-b415-8cb129d0d30e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SegmentsExtRbacTest-1701683891", "password": "Q5@AwKH1T%QILkf", "project_id": "09ed02ef1af740cd91330b1da4c3cac2", "email": "tempest-SegmentsExtRbacTest-1696664929@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '394', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f19fd01e-92d9-49e7-b415-8cb129d0d30e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "09ed02ef1af740cd91330b1da4c3cac2", "email": "tempest-SegmentsExtRbacTest-1696664929@example.com", "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/e94d6f2b031b428d9714470fcb6ac4e8"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:48.913 193 INFO tempest.lib.common.rest_client [req-d8926081-c45b-4704-95e7-0a27a4dda972 ] Request (SegmentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:17:48.916 193 DEBUG tempest.lib.common.rest_client [req-d8926081-c45b-4704-95e7-0a27a4dda972 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8926081-c45b-4704-95e7-0a27a4dda972', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:48.986 193 INFO tempest.lib.common.rest_client [req-f155e18b-691c-495e-848e-f9b92ba19a7b ] Request (SegmentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:17:48.989 193 DEBUG tempest.lib.common.rest_client [req-f155e18b-691c-495e-848e-f9b92ba19a7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f155e18b-691c-495e-848e-f9b92ba19a7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:49.088 193 INFO tempest.lib.common.rest_client [req-889767be-31ce-411e-b730-f130664f55af ] Request (SegmentsExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles/72a4576c553448cd941b052c1ca0cf2d 0.090s 2020-12-14 02:17:49.091 193 DEBUG tempest.lib.common.rest_client [req-889767be-31ce-411e-b730-f130664f55af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-889767be-31ce-411e-b730-f130664f55af', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:49.094 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SegmentsExtRbacTest-1701683891', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '09ed02ef1af740cd91330b1da4c3cac2', 'project_name': 'tempest-SegmentsExtRbacTest-1701683891', 'tenant_id': '09ed02ef1af740cd91330b1da4c3cac2', 'tenant_name': 'tempest-SegmentsExtRbacTest-1701683891', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'e94d6f2b031b428d9714470fcb6ac4e8'}, Network: None, Subnet: None, Router: None 2020-12-14 02:17:49.096 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SegmentsExtRbacTest-1701683891', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '09ed02ef1af740cd91330b1da4c3cac2', 'project_name': 'tempest-SegmentsExtRbacTest-1701683891', 'tenant_id': '09ed02ef1af740cd91330b1da4c3cac2', 'tenant_name': 'tempest-SegmentsExtRbacTest-1701683891', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'e94d6f2b031b428d9714470fcb6ac4e8'}, Network: None, Subnet: None, Router: None 2020-12-14 02:17:49.277 193 INFO tempest.lib.common.rest_client [req-353954a1-19cf-4efe-aecd-19687aa02f28 ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.114s 2020-12-14 02:17:49.281 193 DEBUG tempest.lib.common.rest_client [req-353954a1-19cf-4efe-aecd-19687aa02f28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-353954a1-19cf-4efe-aecd-19687aa02f28', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["GgIa8DqVThyVv5lNIwYhsQ"], "expires_at": "2020-12-14T03:17:49.000000Z", "issued_at": "2020-12-14T02:17:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:49.285 193 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-12-14 02:17:49.341 186 INFO tempest.lib.common.rest_client [req-3e6312d5-b38f-4aec-b176-a7849092611a ] Request (MiscPolicyActionsNetworkRbacTest:test_delete_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface 0.169s 2020-12-14 02:17:49.344 186 DEBUG tempest.lib.common.rest_client [req-3e6312d5-b38f-4aec-b176-a7849092611a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '373', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3e6312d5-b38f-4aec-b176-a7849092611a', 'x-compute-request-id': 'req-3e6312d5-b38f-4aec-b176-a7849092611a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "port_id": "bcdcfe0c-62b4-4338-993f-01a51ede3a86", "mac_addr": "fa:16:3e:0c:4f:91", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.6"}, {"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.7"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:49.397 193 INFO tempest.lib.common.rest_client [req-6538fddb-7fa2-4fc6-9709-9c1e846441a7 ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-12-14 02:17:49.401 193 DEBUG tempest.lib.common.rest_client [req-6538fddb-7fa2-4fc6-9709-9c1e846441a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6538fddb-7fa2-4fc6-9709-9c1e846441a7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["0hdZ_qsgQJKOvmZ0dAULKQ"], "expires_at": "2020-12-14T03:17:49.000000Z", "issued_at": "2020-12-14T02:17:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:49.481 186 INFO tempest.lib.common.rest_client [req-a058d564-0383-4b75-b667-bc12900d71d4 ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/f4bcd52b-2260-4991-8052-c5d7c8072955 0.095s 2020-12-14 02:17:49.485 186 DEBUG tempest.lib.common.rest_client [req-a058d564-0383-4b75-b667-bc12900d71d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a058d564-0383-4b75-b667-bc12900d71d4', 'x-compute-request-id': 'req-a058d564-0383-4b75-b667-bc12900d71d4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/f4bcd52b-2260-4991-8052-c5d7c8072955'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:49.518 193 INFO tempest.lib.common.rest_client [req-cf08568c-d65e-48c3-8522-e5c068f4260e ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:17:49.520 193 DEBUG tempest.lib.common.rest_client [req-cf08568c-d65e-48c3-8522-e5c068f4260e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf08568c-d65e-48c3-8522-e5c068f4260e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["clcNIcgAR82IKNzG0Ch-Kw"], "expires_at": "2020-12-14T03:17:49.000000Z", "issued_at": "2020-12-14T02:17:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:49.592 193 INFO tempest.lib.common.rest_client [req-0239467a-c588-4fc4-826a-9bdcd86be4a9 ] Request (SegmentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.065s 2020-12-14 02:17:49.595 193 DEBUG tempest.lib.common.rest_client [req-0239467a-c588-4fc4-826a-9bdcd86be4a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0239467a-c588-4fc4-826a-9bdcd86be4a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:49.669 186 INFO tempest.lib.common.rest_client [req-8e2b0f7a-a93a-4f2e-b96e-0d93bf1f1a7b ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface 0.176s 2020-12-14 02:17:49.672 186 DEBUG tempest.lib.common.rest_client [req-8e2b0f7a-a93a-4f2e-b96e-0d93bf1f1a7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '373', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8e2b0f7a-a93a-4f2e-b96e-0d93bf1f1a7b', 'x-compute-request-id': 'req-8e2b0f7a-a93a-4f2e-b96e-0d93bf1f1a7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "port_id": "bcdcfe0c-62b4-4338-993f-01a51ede3a86", "mac_addr": "fa:16:3e:0c:4f:91", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.6"}, {"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.7"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:49.672 193 INFO tempest.lib.common.rest_client [req-9f650a5d-7515-4cb7-a5f9-33d6c0fe9ae9 ] Request (SegmentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.070s 2020-12-14 02:17:49.674 193 DEBUG tempest.lib.common.rest_client [req-9f650a5d-7515-4cb7-a5f9-33d6c0fe9ae9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f650a5d-7515-4cb7-a5f9-33d6c0fe9ae9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:49.677 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:17:49.679 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:49.736 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:49.741 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.745 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.748 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.751 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.751 193 INFO tempest.lib.common.rest_client [req-4b6e1de6-3192-4602-aae3-3afc220bf368 ] Request (SegmentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles 0.066s 2020-12-14 02:17:49.755 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.755 193 DEBUG tempest.lib.common.rest_client [req-4b6e1de6-3192-4602-aae3-3afc220bf368 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b6e1de6-3192-4602-aae3-3afc220bf368', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:49.759 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.763 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.766 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.769 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.772 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.774 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.777 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.780 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.783 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.786 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.789 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.792 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.795 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.798 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.800 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.803 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.806 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.808 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.811 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.814 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.817 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.819 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.822 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.825 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.828 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.827 193 INFO tempest.lib.common.rest_client [req-61c98ecd-daf6-4229-b5b2-bedece0a2178 ] Request (SegmentsExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-12-14 02:17:49.831 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.831 193 DEBUG tempest.lib.common.rest_client [req-61c98ecd-daf6-4229-b5b2-bedece0a2178 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61c98ecd-daf6-4229-b5b2-bedece0a2178', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:49.835 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.839 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.843 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.848 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.851 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.853 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.856 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.859 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.862 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.865 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.868 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.870 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.874 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.877 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.879 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.882 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.885 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.887 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.890 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.893 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.895 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.899 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.903 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.907 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.910 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.915 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.917 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.919 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.922 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.924 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.927 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.929 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.931 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.933 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.935 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.938 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.940 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.942 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.945 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.947 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:49.957 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:ips:index, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:49.958 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:49.958 193 INFO tempest.lib.common.rest_client [req-ffadcc80-5b72-4ca7-9a9b-2b8b6d9b4fc2 ] Request (SegmentsExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles/a629c95d64b3416fb80ae90af4f69c05 0.120s 2020-12-14 02:17:49.961 193 DEBUG tempest.lib.common.rest_client [req-ffadcc80-5b72-4ca7-9a9b-2b8b6d9b4fc2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ffadcc80-5b72-4ca7-9a9b-2b8b6d9b4fc2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:50.082 186 INFO tempest.lib.common.rest_client [req-b99fd514-e36e-4ad9-8237-ab05fa16e338 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses): 200 GET http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles 0.118s 2020-12-14 02:17:50.085 186 DEBUG tempest.lib.common.rest_client [req-b99fd514-e36e-4ad9-8237-ab05fa16e338 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b99fd514-e36e-4ad9-8237-ab05fa16e338', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:50.153 189 INFO tempest.lib.common.rest_client [req-b1895a99-dcbe-4dd4-b1d2-0d14c86e7d4c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.224s 2020-12-14 02:17:50.158 189 DEBUG tempest.lib.common.rest_client [req-b1895a99-dcbe-4dd4-b1d2-0d14c86e7d4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b1895a99-dcbe-4dd4-b1d2-0d14c86e7d4c', 'x-compute-request-id': 'req-b1895a99-dcbe-4dd4-b1d2-0d14c86e7d4c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:50.186 186 INFO tempest.lib.common.rest_client [req-b3913952-24f2-4889-bf82-c6674ff94542 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:17:50.190 186 DEBUG tempest.lib.common.rest_client [req-b3913952-24f2-4889-bf82-c6674ff94542 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3913952-24f2-4889-bf82-c6674ff94542', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["7egwp0rwQf-uu_3ZiRiC9Q"], "expires_at": "2020-12-14T03:17:50.000000Z", "issued_at": "2020-12-14T02:17:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:50.240 197 INFO tempest.lib.common.rest_client [req-5475366c-709c-44c2-993c-30006c0b68bf ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.311s 2020-12-14 02:17:50.243 197 DEBUG tempest.lib.common.rest_client [req-5475366c-709c-44c2-993c-30006c0b68bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5475366c-709c-44c2-993c-30006c0b68bf', 'x-compute-request-id': 'req-5475366c-709c-44c2-993c-30006c0b68bf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:50.452 186 INFO tempest.lib.common.rest_client [req-90386b07-b51e-4bd2-95d6-5d4c5a4a58e7 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/ips 0.248s 2020-12-14 02:17:50.455 186 DEBUG tempest.lib.common.rest_client [req-90386b07-b51e-4bd2-95d6-5d4c5a4a58e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '161', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-90386b07-b51e-4bd2-95d6-5d4c5a4a58e7', 'x-compute-request-id': 'req-90386b07-b51e-4bd2-95d6-5d4c5a4a58e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/ips'} Body: b'{"addresses": {"tempest-MiscPolicyActionsNetworkRbacTest-959755476-network": [{"version": 4, "addr": "192.168.120.6"}, {"version": 4, "addr": "192.168.120.7"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:50.483 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:50.553 186 INFO tempest.lib.common.rest_client [req-d4e03c7c-224e-4fa2-8bb7-31d035e8b69b ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses): 200 GET http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles 0.063s 2020-12-14 02:17:50.556 186 DEBUG tempest.lib.common.rest_client [req-d4e03c7c-224e-4fa2-8bb7-31d035e8b69b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4e03c7c-224e-4fa2-8bb7-31d035e8b69b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:50.606 186 INFO tempest.lib.common.rest_client [req-d5c39492-a201-4504-ae93-d2aa807eb234 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:17:50.610 186 DEBUG tempest.lib.common.rest_client [req-d5c39492-a201-4504-ae93-d2aa807eb234 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5c39492-a201-4504-ae93-d2aa807eb234', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["Dd9C7DIcRi6_nzLXoCngDA"], "expires_at": "2020-12-14T03:17:50.000000Z", "issued_at": "2020-12-14T02:17:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:50.636 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:50.641 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.644 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.647 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.650 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.654 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.658 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.663 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.666 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.669 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.672 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.675 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.678 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.681 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.684 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.687 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.690 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.693 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.696 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.699 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.702 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.705 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.708 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.711 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.713 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.716 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.719 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.723 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.725 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.729 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.731 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.734 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.737 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.740 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.743 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.746 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.748 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.751 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.754 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.757 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.760 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.763 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.766 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.769 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.772 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.775 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.778 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.781 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.783 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.786 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.789 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.792 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.794 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.797 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.800 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.804 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.807 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.813 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.815 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.818 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.821 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.824 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.827 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.830 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.832 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.835 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.838 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.841 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.843 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.846 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.849 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.852 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:50.864 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:ips:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:51.010 186 INFO tempest.lib.common.rest_client [req-49a7cbb4-a902-4321-8edd-0dae239edf62 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses_by_network): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/ips 0.141s 2020-12-14 02:17:51.014 186 DEBUG tempest.lib.common.rest_client [req-49a7cbb4-a902-4321-8edd-0dae239edf62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '161', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-49a7cbb4-a902-4321-8edd-0dae239edf62', 'x-compute-request-id': 'req-49a7cbb4-a902-4321-8edd-0dae239edf62', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/ips'} Body: b'{"addresses": {"tempest-MiscPolicyActionsNetworkRbacTest-959755476-network": [{"version": 4, "addr": "192.168.120.6"}, {"version": 4, "addr": "192.168.120.7"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:51.041 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:51.063 193 INFO tempest.lib.common.rest_client [req-4b54d6a0-8157-4bd9-bcf7-cf94ba92f51f ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:17:51.066 193 DEBUG tempest.lib.common.rest_client [req-4b54d6a0-8157-4bd9-bcf7-cf94ba92f51f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b54d6a0-8157-4bd9-bcf7-cf94ba92f51f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["7NOMYyf5Rwu4dBAl68t16Q"], "expires_at": "2020-12-14T03:17:51.000000Z", "issued_at": "2020-12-14T02:17:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:51.110 186 INFO tempest.lib.common.rest_client [req-9e8a2b9d-c28b-4b33-93f1-29485d74e2cb ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses_by_network): 200 GET http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles 0.062s 2020-12-14 02:17:51.113 186 DEBUG tempest.lib.common.rest_client [req-9e8a2b9d-c28b-4b33-93f1-29485d74e2cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e8a2b9d-c28b-4b33-93f1-29485d74e2cb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:51.117 193 INFO tempest.lib.common.rest_client [req-9c1f23bb-53d5-4fb3-b45d-2bd58ca0fec1 ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:17:51.120 193 DEBUG tempest.lib.common.rest_client [req-9c1f23bb-53d5-4fb3-b45d-2bd58ca0fec1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c1f23bb-53d5-4fb3-b45d-2bd58ca0fec1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["NKID1XLuRTirAjeSr_vWZA"], "expires_at": "2020-12-14T03:17:51.000000Z", "issued_at": "2020-12-14T02:17:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:51.162 186 INFO tempest.lib.common.rest_client [req-36d53e40-6c2a-41a5-892c-57f8757e7770 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses_by_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:17:51.165 186 DEBUG tempest.lib.common.rest_client [req-36d53e40-6c2a-41a5-892c-57f8757e7770 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36d53e40-6c2a-41a5-892c-57f8757e7770', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["xGUUNkBwR9yYMZ7WUh42JA"], "expires_at": "2020-12-14T03:17:51.000000Z", "issued_at": "2020-12-14T02:17:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:51.322 186 INFO tempest.lib.common.rest_client [req-f28f0f08-bf78-49d6-9546-39013f2a57a6 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses_by_network): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/ips/tempest-MiscPolicyActionsNetworkRbacTest-959755476-network 0.150s 2020-12-14 02:17:51.325 186 DEBUG tempest.lib.common.rest_client [req-f28f0f08-bf78-49d6-9546-39013f2a57a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '146', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f28f0f08-bf78-49d6-9546-39013f2a57a6', 'x-compute-request-id': 'req-f28f0f08-bf78-49d6-9546-39013f2a57a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/ips/tempest-MiscPolicyActionsNetworkRbacTest-959755476-network'} Body: b'{"tempest-MiscPolicyActionsNetworkRbacTest-959755476-network": [{"version": 4, "addr": "192.168.120.6"}, {"version": 4, "addr": "192.168.120.7"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:51.349 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:51.419 186 INFO tempest.lib.common.rest_client [req-7ac66572-d7f8-41bd-8d2a-ad38af0655ec ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses_by_network): 200 GET http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles 0.064s 2020-12-14 02:17:51.422 186 DEBUG tempest.lib.common.rest_client [req-7ac66572-d7f8-41bd-8d2a-ad38af0655ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ac66572-d7f8-41bd-8d2a-ad38af0655ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:51.470 186 INFO tempest.lib.common.rest_client [req-0b48e3a7-988d-40e1-9e95-e67cee0df18e ] Request (MiscPolicyActionsNetworkRbacTest:test_list_addresses_by_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:17:51.473 186 DEBUG tempest.lib.common.rest_client [req-0b48e3a7-988d-40e1-9e95-e67cee0df18e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b48e3a7-988d-40e1-9e95-e67cee0df18e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["NaGNxXW8T46-eXAfTOPqIw"], "expires_at": "2020-12-14T03:17:51.000000Z", "issued_at": "2020-12-14T02:17:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:51.500 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:51.505 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.508 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.511 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.514 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.518 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.522 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.527 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.530 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.532 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.535 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.538 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.541 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.544 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.546 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.549 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.553 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.556 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.558 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.561 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.564 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.567 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.569 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.572 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.574 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.577 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.580 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.582 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.585 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.588 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.590 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.593 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.595 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.598 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.601 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.603 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.606 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.609 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.611 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.615 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.618 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.621 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.623 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.626 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.629 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.632 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.635 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.637 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.640 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.643 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.645 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.648 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.651 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.653 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.656 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.655 197 INFO tempest.lib.common.rest_client [req-abac71df-c235-4d1f-a887-7d2161abe61b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.302s 2020-12-14 02:17:51.659 197 DEBUG tempest.lib.common.rest_client [req-abac71df-c235-4d1f-a887-7d2161abe61b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-abac71df-c235-4d1f-a887-7d2161abe61b', 'x-compute-request-id': 'req-abac71df-c235-4d1f-a887-7d2161abe61b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:51.659 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.662 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.668 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.670 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.673 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.676 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.679 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.681 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.684 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.685 189 INFO tempest.lib.common.rest_client [req-115fe353-d6c0-491c-9580-8619c38d770a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.416s 2020-12-14 02:17:51.687 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.689 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.689 189 DEBUG tempest.lib.common.rest_client [req-115fe353-d6c0-491c-9580-8619c38d770a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-115fe353-d6c0-491c-9580-8619c38d770a', 'x-compute-request-id': 'req-115fe353-d6c0-491c-9580-8619c38d770a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:51.692 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.695 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.697 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.700 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.702 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.705 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:51.717 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-attach-interfaces:list, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:51.719 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:51.786 186 INFO tempest.lib.common.rest_client [req-e557132e-9a2c-4741-b80f-c6f8b02fee8e ] Request (MiscPolicyActionsNetworkRbacTest:test_list_interfaces): 200 GET http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles 0.061s 2020-12-14 02:17:51.790 186 DEBUG tempest.lib.common.rest_client [req-e557132e-9a2c-4741-b80f-c6f8b02fee8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e557132e-9a2c-4741-b80f-c6f8b02fee8e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:51.839 193 INFO tempest.lib.common.rest_client [req-67e5baba-83dc-43d9-9c2f-d58ef7e086a7 ] Request (SegmentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.705s 2020-12-14 02:17:51.840 186 INFO tempest.lib.common.rest_client [req-1a217dd6-0135-4ff0-99fc-c731b4643c9f ] Request (MiscPolicyActionsNetworkRbacTest:test_list_interfaces): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:17:51.843 193 DEBUG tempest.lib.common.rest_client [req-67e5baba-83dc-43d9-9c2f-d58ef7e086a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-SegmentsExtRbacTest-test-network-2091509518"}} Response - Headers: {'content-type': 'application/json', 'content-length': '740', 'x-openstack-request-id': 'req-67e5baba-83dc-43d9-9c2f-d58ef7e086a7', 'date': 'Mon, 14 Dec 2020 02:17:51 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"210535d9-6aca-4107-995a-67af84dddebb","name":"tempest-SegmentsExtRbacTest-test-network-2091509518","tenant_id":"09ed02ef1af740cd91330b1da4c3cac2","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"09ed02ef1af740cd91330b1da4c3cac2","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":43,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:17:51Z","updated_at":"2020-12-14T02:17:51Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:51.844 186 DEBUG tempest.lib.common.rest_client [req-1a217dd6-0135-4ff0-99fc-c731b4643c9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a217dd6-0135-4ff0-99fc-c731b4643c9f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["7TWgvrSeTaKv9uvgIOj6RQ"], "expires_at": "2020-12-14T03:17:51.000000Z", "issued_at": "2020-12-14T02:17:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:51.850 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:51.878 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_segment, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:51.880 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:51.951 193 INFO tempest.lib.common.rest_client [req-272e2235-caff-4c43-833f-18e1c993b8b1 ] Request (SegmentsExtRbacTest:test_create_segment): 200 GET http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles 0.064s 2020-12-14 02:17:51.955 193 DEBUG tempest.lib.common.rest_client [req-272e2235-caff-4c43-833f-18e1c993b8b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-272e2235-caff-4c43-833f-18e1c993b8b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:52.008 193 INFO tempest.lib.common.rest_client [req-8b4391a3-ede7-4d0a-9b5e-e55311b39c4f ] Request (SegmentsExtRbacTest:test_create_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:17:52.010 193 DEBUG tempest.lib.common.rest_client [req-8b4391a3-ede7-4d0a-9b5e-e55311b39c4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b4391a3-ede7-4d0a-9b5e-e55311b39c4f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["cvCrqePbSTW9MxuuKCELDg"], "expires_at": "2020-12-14T03:17:51.000000Z", "issued_at": "2020-12-14T02:17:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:52.060 193 INFO tempest.lib.common.rest_client [req-20a0172a-1824-4f23-9e3a-ea37abbfaddf ] Request (SegmentsExtRbacTest:test_create_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:17:52.064 193 DEBUG tempest.lib.common.rest_client [req-20a0172a-1824-4f23-9e3a-ea37abbfaddf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20a0172a-1824-4f23-9e3a-ea37abbfaddf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["p677wz0HSp-7_N_BKMAr2Q"], "expires_at": "2020-12-14T03:17:52.000000Z", "issued_at": "2020-12-14T02:17:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:52.107 186 INFO tempest.lib.common.rest_client [req-216ce735-5ea9-4f90-9490-7bf5bf38c7a4 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_interfaces): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface 0.255s 2020-12-14 02:17:52.110 186 DEBUG tempest.lib.common.rest_client [req-216ce735-5ea9-4f90-9490-7bf5bf38c7a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '373', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-216ce735-5ea9-4f90-9490-7bf5bf38c7a4', 'x-compute-request-id': 'req-216ce735-5ea9-4f90-9490-7bf5bf38c7a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "port_id": "bcdcfe0c-62b4-4338-993f-01a51ede3a86", "mac_addr": "fa:16:3e:0c:4f:91", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.6"}, {"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.7"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:52.147 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:52.186 193 INFO tempest.lib.common.rest_client [req-892f7d01-384d-4915-97f4-e16a872eb8c0 ] Request (SegmentsExtRbacTest:test_create_segment): 200 GET http://172.30.13.94:9696/v2.0/segments 0.113s 2020-12-14 02:17:52.191 193 DEBUG tempest.lib.common.rest_client [req-892f7d01-384d-4915-97f4-e16a872eb8c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '21640', 'x-openstack-request-id': 'req-892f7d01-384d-4915-97f4-e16a872eb8c0', 'date': 'Mon, 14 Dec 2020 02:17:52 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segments": [{"id": "05b47d23-fc77-49a4-a84e-94929ff43fde", "network_id": "2e850320-7833-47c7-a469-1064f6b1ed25", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 19, "created_at": "2020-11-26T22:31:15Z", "updated_at": "2020-11-26T22:31:15Z", "revision_number": 0}, {"id": "0af22f04-c3bd-4452-afa9-aa61bc716249", "network_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 29, "created_at": "2020-12-14T02:17:13Z", "updated_at": "2020-12-14T02:17:13Z", "revision_number": 0}, {"id": "0b096e76-7ae1-4f89-9952-24f08f9621c5", "network_id": "d7a36286-f879-4571-a339-59912279fa90", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 24, "created_at": "2020-12-02T20:44:57Z", "updated_at": "2020-12-02T20:44:57Z", "revision_number": 0}, {"id": "11ebf32c-7448-4b1a-b048-b46b33e1efbe", "network_id": "a9a04b8b-f92c-42be-81d7-1e2272abe0b3", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 42, "created_at": "2020-12-08T01:04:21Z", "updated_at": "2020-12-08T01:04:21Z", "revision_number": 0}, {"id": "1e5c7fb0-dd39-468a-8477-7712c7476f95", "network_id": "4a71cce6-2ba2-449c-a71a-3870f3432be4", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 14, "created_at": "2020-11-25T11:30:52Z", "updated_at": "2020-11-25T11:30:52Z", "revision_number": 0}, {"id": "1f13bb9a-d96b-44d7-b4ba-0d8aa2f8ccc7", "network_id": "5e37b9a6-feb5-486c-bd34-d2ec2bb30e0e", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 5, "created_at": "2020-11-25T11:20:36Z", "updated_at": "2020-11-25T11:20:36Z", "revision_number": 0}, {"id": "21dabc4a-d0c0-4642-904c-9b00a5a12b52", "network_id": "3482a5cb-be2c-4498-bb86-24132e1bbf43", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 11, "created_at": "2020-11-22T17:24:11Z", "updated_at": "2020-11-22T17:24:11Z", "revision_number": 0}, {"id": "23066625-631a-4490-9f4f-fc3f3899e1b8", "network_id": "7b0332b8-42bd-4dec-b8aa-c5850d8f58a9", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 4, "created_at": "2020-11-22T17:15:36Z", "updated_at": "2020-11-22T17:15:36Z", "revision_number": 0}, {"id": "2cc29de4-52cb-402c-af67-f4009738d177", "network_id": "46ca4eb6-e2ab-422a-81e5-7048fed04ab4", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 38, "created_at": "2020-12-07T21:54:57Z", "updated_at": "2020-12-07T21:54:57Z", "revision_number": 0}, {"id": "2ce52f3c-0a6b-4490-bf3f-0bdf92168306", "network_id": "063503db-115b-4919-a9a6-1f3519d69592", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 67, "created_at": "2020-12-13T11:20:01Z", "updated_at": "2020-12-13T11:20:01Z", "revision_number": 0}, {"id": "2f4e8e15-6e99-44d2-92be-e396a671ec37", "network_id": "58d4b91f-7c91-47db-a107-dc36c3ef2ae0", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 48, "created_at": "2020-12-09T18:42:46Z", "updated_at": "2020-12-09T18:42:46Z", "revision_number": 0}, {"id": "3415580e-4fd2-4d36-a438-e40ad0a95b7f", "network_id": "c2fc1929-596d-49b6-a695-8492160fc58b", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 40, "created_at": "2020-12-09T09:03:21Z", "updated_at": "2020-12-09T09:03:21Z", "revision_number": 0}, {"id": "39b7014c-85b3-446a-8f78-4132ab0aa608", "network_id": "b041070c-651b-4c0d-8ae3-9096e8b5080e", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 54, "created_at": "2020-12-10T07:27:30Z", "updated_at": "2020-12-10T07:27:30Z", "revision_number": 0}, {"id": "3dcc8169-a45d-43e5-ab7d-7e0e9b4650f5", "network_id": "3fe _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:52.214 186 INFO tempest.lib.common.rest_client [req-0d9fa7f6-abec-4c3c-ac2d-ba7b466850b9 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_interfaces): 200 GET http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles 0.062s 2020-12-14 02:17:52.217 186 DEBUG tempest.lib.common.rest_client [req-0d9fa7f6-abec-4c3c-ac2d-ba7b466850b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d9fa7f6-abec-4c3c-ac2d-ba7b466850b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:52.266 186 INFO tempest.lib.common.rest_client [req-a8ebbd7e-9335-49a3-8cb7-ac626e179da0 ] Request (MiscPolicyActionsNetworkRbacTest:test_list_interfaces): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:17:52.269 186 DEBUG tempest.lib.common.rest_client [req-a8ebbd7e-9335-49a3-8cb7-ac626e179da0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8ebbd7e-9335-49a3-8cb7-ac626e179da0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["md31GveaQ4KeJQK5-ISSVg"], "expires_at": "2020-12-14T03:17:52.000000Z", "issued_at": "2020-12-14T02:17:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:52.291 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:52.296 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.299 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.302 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.305 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.309 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.312 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.317 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.320 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.322 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.325 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.328 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.331 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.334 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.336 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.339 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.343 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.345 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.348 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.351 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.354 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.356 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.359 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.362 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.364 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.367 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.370 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.372 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.375 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.378 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.381 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.383 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.386 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.389 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.391 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.394 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.397 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.400 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.402 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.405 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.409 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.411 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.414 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.417 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.420 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.423 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.426 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.428 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.431 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.434 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.437 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.439 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.442 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.445 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.447 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.469 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.472 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.478 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.481 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.484 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.487 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.489 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.492 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.495 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.498 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.500 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.503 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.506 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.508 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.511 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.514 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.516 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:17:52.528 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-attach-interfaces:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:52.642 193 INFO tempest.lib.common.rest_client [req-4fea40c8-fa2c-4cc2-b93d-622794194ed0 ] Request (SegmentsExtRbacTest:test_create_segment): 201 POST http://172.30.13.94:9696/v2.0/segments 0.440s 2020-12-14 02:17:52.645 193 DEBUG tempest.lib.common.rest_client [req-4fea40c8-fa2c-4cc2-b93d-622794194ed0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"segment": {"network_id": "210535d9-6aca-4107-995a-67af84dddebb", "network_type": "gre", "segmentation_id": 1312}} Response - Headers: {'content-type': 'application/json', 'content-length': '318', 'x-openstack-request-id': 'req-4fea40c8-fa2c-4cc2-b93d-622794194ed0', 'date': 'Mon, 14 Dec 2020 02:17:52 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segment": {"id": "480a7229-284b-45e9-b4bc-52626cfebacf", "network_id": "210535d9-6aca-4107-995a-67af84dddebb", "name": null, "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 1312, "created_at": "2020-12-14T02:17:52Z", "updated_at": "2020-12-14T02:17:52Z", "revision_number": 1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:52.649 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:52.711 193 INFO tempest.lib.common.rest_client [req-b0403021-d523-44af-8cd7-b6a4c194a437 ] Request (SegmentsExtRbacTest:test_create_segment): 200 GET http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles 0.056s 2020-12-14 02:17:52.714 193 DEBUG tempest.lib.common.rest_client [req-b0403021-d523-44af-8cd7-b6a4c194a437 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b0403021-d523-44af-8cd7-b6a4c194a437', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:52.763 193 INFO tempest.lib.common.rest_client [req-b9ac3333-dfab-45d7-823d-7dc7ad3b8f08 ] Request (SegmentsExtRbacTest:test_create_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:17:52.767 193 DEBUG tempest.lib.common.rest_client [req-b9ac3333-dfab-45d7-823d-7dc7ad3b8f08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9ac3333-dfab-45d7-823d-7dc7ad3b8f08', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["Fte0gMBtQiG6TSyko-K3Zw"], "expires_at": "2020-12-14T03:17:52.000000Z", "issued_at": "2020-12-14T02:17:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:52.818 193 INFO tempest.lib.common.rest_client [req-36deb5db-b089-4949-b5cb-49a9c2297ce9 ] Request (SegmentsExtRbacTest:test_create_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:17:52.822 193 DEBUG tempest.lib.common.rest_client [req-36deb5db-b089-4949-b5cb-49a9c2297ce9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36deb5db-b089-4949-b5cb-49a9c2297ce9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["D16iayTOS6KjQkQhQPdmEw"], "expires_at": "2020-12-14T03:17:52.000000Z", "issued_at": "2020-12-14T02:17:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:52.838 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:52.862 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_segment, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:52.864 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:52.888 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_segment, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:53.037 193 INFO tempest.lib.common.rest_client [req-b5939977-1ee6-47f8-a1f9-68c61f0ff18d ] Request (SegmentsExtRbacTest:test_delete_segment): 200 GET http://172.30.13.94:9696/v2.0/segments 0.143s 2020-12-14 02:17:53.041 193 DEBUG tempest.lib.common.rest_client [req-b5939977-1ee6-47f8-a1f9-68c61f0ff18d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '21947', 'x-openstack-request-id': 'req-b5939977-1ee6-47f8-a1f9-68c61f0ff18d', 'date': 'Mon, 14 Dec 2020 02:17:53 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segments": [{"id": "05b47d23-fc77-49a4-a84e-94929ff43fde", "network_id": "2e850320-7833-47c7-a469-1064f6b1ed25", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 19, "created_at": "2020-11-26T22:31:15Z", "updated_at": "2020-11-26T22:31:15Z", "revision_number": 0}, {"id": "0af22f04-c3bd-4452-afa9-aa61bc716249", "network_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 29, "created_at": "2020-12-14T02:17:13Z", "updated_at": "2020-12-14T02:17:13Z", "revision_number": 0}, {"id": "0b096e76-7ae1-4f89-9952-24f08f9621c5", "network_id": "d7a36286-f879-4571-a339-59912279fa90", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 24, "created_at": "2020-12-02T20:44:57Z", "updated_at": "2020-12-02T20:44:57Z", "revision_number": 0}, {"id": "11ebf32c-7448-4b1a-b048-b46b33e1efbe", "network_id": "a9a04b8b-f92c-42be-81d7-1e2272abe0b3", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 42, "created_at": "2020-12-08T01:04:21Z", "updated_at": "2020-12-08T01:04:21Z", "revision_number": 0}, {"id": "1e5c7fb0-dd39-468a-8477-7712c7476f95", "network_id": "4a71cce6-2ba2-449c-a71a-3870f3432be4", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 14, "created_at": "2020-11-25T11:30:52Z", "updated_at": "2020-11-25T11:30:52Z", "revision_number": 0}, {"id": "1f13bb9a-d96b-44d7-b4ba-0d8aa2f8ccc7", "network_id": "5e37b9a6-feb5-486c-bd34-d2ec2bb30e0e", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 5, "created_at": "2020-11-25T11:20:36Z", "updated_at": "2020-11-25T11:20:36Z", "revision_number": 0}, {"id": "21dabc4a-d0c0-4642-904c-9b00a5a12b52", "network_id": "3482a5cb-be2c-4498-bb86-24132e1bbf43", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 11, "created_at": "2020-11-22T17:24:11Z", "updated_at": "2020-11-22T17:24:11Z", "revision_number": 0}, {"id": "23066625-631a-4490-9f4f-fc3f3899e1b8", "network_id": "7b0332b8-42bd-4dec-b8aa-c5850d8f58a9", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 4, "created_at": "2020-11-22T17:15:36Z", "updated_at": "2020-11-22T17:15:36Z", "revision_number": 0}, {"id": "2cc29de4-52cb-402c-af67-f4009738d177", "network_id": "46ca4eb6-e2ab-422a-81e5-7048fed04ab4", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 38, "created_at": "2020-12-07T21:54:57Z", "updated_at": "2020-12-07T21:54:57Z", "revision_number": 0}, {"id": "2ce52f3c-0a6b-4490-bf3f-0bdf92168306", "network_id": "063503db-115b-4919-a9a6-1f3519d69592", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 67, "created_at": "2020-12-13T11:20:01Z", "updated_at": "2020-12-13T11:20:01Z", "revision_number": 0}, {"id": "2f4e8e15-6e99-44d2-92be-e396a671ec37", "network_id": "58d4b91f-7c91-47db-a107-dc36c3ef2ae0", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 48, "created_at": "2020-12-09T18:42:46Z", "updated_at": "2020-12-09T18:42:46Z", "revision_number": 0}, {"id": "3415580e-4fd2-4d36-a438-e40ad0a95b7f", "network_id": "c2fc1929-596d-49b6-a695-8492160fc58b", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 40, "created_at": "2020-12-09T09:03:21Z", "updated_at": "2020-12-09T09:03:21Z", "revision_number": 0}, {"id": "39b7014c-85b3-446a-8f78-4132ab0aa608", "network_id": "b041070c-651b-4c0d-8ae3-9096e8b5080e", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 54, "created_at": "2020-12-10T07:27:30Z", "updated_at": "2020-12-10T07:27:30Z", "revision_number": 0}, {"id": "3dcc8169-a45d-43e5-ab7d-7e0e9b4650f5", "network_id": "3fe _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:53.060 197 INFO tempest.lib.common.rest_client [req-5ead0fb4-1f62-4808-a17e-60aa32e42c0e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.294s 2020-12-14 02:17:53.063 197 DEBUG tempest.lib.common.rest_client [req-5ead0fb4-1f62-4808-a17e-60aa32e42c0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5ead0fb4-1f62-4808-a17e-60aa32e42c0e', 'x-compute-request-id': 'req-5ead0fb4-1f62-4808-a17e-60aa32e42c0e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:53.065 189 INFO tempest.lib.common.rest_client [req-67f072ec-8e75-45fc-9983-8fc0c3813ab7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.270s 2020-12-14 02:17:53.068 189 DEBUG tempest.lib.common.rest_client [req-67f072ec-8e75-45fc-9983-8fc0c3813ab7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-67f072ec-8e75-45fc-9983-8fc0c3813ab7', 'x-compute-request-id': 'req-67f072ec-8e75-45fc-9983-8fc0c3813ab7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:53.492 193 INFO tempest.lib.common.rest_client [req-7d60f08a-9428-40ea-b401-35bdd3d59b44 ] Request (SegmentsExtRbacTest:test_delete_segment): 201 POST http://172.30.13.94:9696/v2.0/segments 0.440s 2020-12-14 02:17:53.495 193 DEBUG tempest.lib.common.rest_client [req-7d60f08a-9428-40ea-b401-35bdd3d59b44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"segment": {"network_id": "210535d9-6aca-4107-995a-67af84dddebb", "network_type": "gre", "segmentation_id": 2962}} Response - Headers: {'content-type': 'application/json', 'content-length': '318', 'x-openstack-request-id': 'req-7d60f08a-9428-40ea-b401-35bdd3d59b44', 'date': 'Mon, 14 Dec 2020 02:17:53 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segment": {"id": "d8c3e76e-b383-4c4c-8b11-359e9325907e", "network_id": "210535d9-6aca-4107-995a-67af84dddebb", "name": null, "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 2962, "created_at": "2020-12-14T02:17:53Z", "updated_at": "2020-12-14T02:17:53Z", "revision_number": 1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:53.498 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:53.566 193 INFO tempest.lib.common.rest_client [req-1e718477-1e57-41d3-8af4-9e5f3a4dd7a2 ] Request (SegmentsExtRbacTest:test_delete_segment): 200 GET http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles 0.062s 2020-12-14 02:17:53.569 193 DEBUG tempest.lib.common.rest_client [req-1e718477-1e57-41d3-8af4-9e5f3a4dd7a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e718477-1e57-41d3-8af4-9e5f3a4dd7a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:53.618 193 INFO tempest.lib.common.rest_client [req-2c040b6a-921d-4aa9-bddf-f299a8b73366 ] Request (SegmentsExtRbacTest:test_delete_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:17:53.622 193 DEBUG tempest.lib.common.rest_client [req-2c040b6a-921d-4aa9-bddf-f299a8b73366 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2c040b6a-921d-4aa9-bddf-f299a8b73366', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["AqiHXuXfQ12_iU0VmYbKhg"], "expires_at": "2020-12-14T03:17:53.000000Z", "issued_at": "2020-12-14T02:17:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:53.669 193 INFO tempest.lib.common.rest_client [req-f78c066b-90fe-4b81-aaf8-3e8385e1ba63 ] Request (SegmentsExtRbacTest:test_delete_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:17:53.673 193 DEBUG tempest.lib.common.rest_client [req-f78c066b-90fe-4b81-aaf8-3e8385e1ba63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f78c066b-90fe-4b81-aaf8-3e8385e1ba63', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["c_ShoK-oQ_iqMsN0w9drFw"], "expires_at": "2020-12-14T03:17:53.000000Z", "issued_at": "2020-12-14T02:17:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:54.169 193 INFO tempest.lib.common.rest_client [req-2eaefe55-a8d6-4ee1-b29b-d6ef063ead98 ] Request (SegmentsExtRbacTest:test_delete_segment): 204 DELETE http://172.30.13.94:9696/v2.0/segments/d8c3e76e-b383-4c4c-8b11-359e9325907e 0.487s 2020-12-14 02:17:54.173 193 DEBUG tempest.lib.common.rest_client [req-2eaefe55-a8d6-4ee1-b29b-d6ef063ead98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2eaefe55-a8d6-4ee1-b29b-d6ef063ead98', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:54 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/segments/d8c3e76e-b383-4c4c-8b11-359e9325907e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:54.175 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:54.245 193 INFO tempest.lib.common.rest_client [req-6653df0e-a757-49bf-bd67-c171bb9e7546 ] Request (SegmentsExtRbacTest:test_delete_segment): 200 GET http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles 0.063s 2020-12-14 02:17:54.247 193 DEBUG tempest.lib.common.rest_client [req-6653df0e-a757-49bf-bd67-c171bb9e7546 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6653df0e-a757-49bf-bd67-c171bb9e7546', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:54.297 193 INFO tempest.lib.common.rest_client [req-acbd208c-98e8-4469-973d-2617ac143328 ] Request (SegmentsExtRbacTest:test_delete_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:17:54.301 193 DEBUG tempest.lib.common.rest_client [req-acbd208c-98e8-4469-973d-2617ac143328 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-acbd208c-98e8-4469-973d-2617ac143328', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["3ILuU4VRTWezKZfjwgS3rw"], "expires_at": "2020-12-14T03:17:54.000000Z", "issued_at": "2020-12-14T02:17:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:54.352 193 INFO tempest.lib.common.rest_client [req-f36a5bf5-1cb2-437f-8ca7-d4f1b07ec4b3 ] Request (SegmentsExtRbacTest:test_delete_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:17:54.356 193 DEBUG tempest.lib.common.rest_client [req-f36a5bf5-1cb2-437f-8ca7-d4f1b07ec4b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f36a5bf5-1cb2-437f-8ca7-d4f1b07ec4b3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["LeiwqqmmSXWvQLwV3V1vVQ"], "expires_at": "2020-12-14T03:17:54.000000Z", "issued_at": "2020-12-14T02:17:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:54.360 197 INFO tempest.lib.common.rest_client [req-bf84a4d9-e208-48ec-9bd5-09b9fd817f7a ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.188s 2020-12-14 02:17:54.363 197 DEBUG tempest.lib.common.rest_client [req-bf84a4d9-e208-48ec-9bd5-09b9fd817f7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bf84a4d9-e208-48ec-9bd5-09b9fd817f7a', 'x-compute-request-id': 'req-bf84a4d9-e208-48ec-9bd5-09b9fd817f7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:54.372 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:54.393 189 INFO tempest.lib.common.rest_client [req-8c6b4f70-f731-48bf-8c14-7c9b6687421c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.215s 2020-12-14 02:17:54.396 189 DEBUG tempest.lib.common.rest_client [req-8c6b4f70-f731-48bf-8c14-7c9b6687421c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8c6b4f70-f731-48bf-8c14-7c9b6687421c', 'x-compute-request-id': 'req-8c6b4f70-f731-48bf-8c14-7c9b6687421c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:54.399 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_segment, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:54.548 193 INFO tempest.lib.common.rest_client [req-9641e2f9-20d2-4b98-b7d2-f71d5b64bf8e ] Request (SegmentsExtRbacTest:test_list_segments): 200 GET http://172.30.13.94:9696/v2.0/segments 0.142s 2020-12-14 02:17:54.553 193 DEBUG tempest.lib.common.rest_client [req-9641e2f9-20d2-4b98-b7d2-f71d5b64bf8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '21947', 'x-openstack-request-id': 'req-9641e2f9-20d2-4b98-b7d2-f71d5b64bf8e', 'date': 'Mon, 14 Dec 2020 02:17:54 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segments": [{"id": "05b47d23-fc77-49a4-a84e-94929ff43fde", "network_id": "2e850320-7833-47c7-a469-1064f6b1ed25", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 19, "created_at": "2020-11-26T22:31:15Z", "updated_at": "2020-11-26T22:31:15Z", "revision_number": 0}, {"id": "0af22f04-c3bd-4452-afa9-aa61bc716249", "network_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 29, "created_at": "2020-12-14T02:17:13Z", "updated_at": "2020-12-14T02:17:13Z", "revision_number": 0}, {"id": "0b096e76-7ae1-4f89-9952-24f08f9621c5", "network_id": "d7a36286-f879-4571-a339-59912279fa90", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 24, "created_at": "2020-12-02T20:44:57Z", "updated_at": "2020-12-02T20:44:57Z", "revision_number": 0}, {"id": "11ebf32c-7448-4b1a-b048-b46b33e1efbe", "network_id": "a9a04b8b-f92c-42be-81d7-1e2272abe0b3", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 42, "created_at": "2020-12-08T01:04:21Z", "updated_at": "2020-12-08T01:04:21Z", "revision_number": 0}, {"id": "1e5c7fb0-dd39-468a-8477-7712c7476f95", "network_id": "4a71cce6-2ba2-449c-a71a-3870f3432be4", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 14, "created_at": "2020-11-25T11:30:52Z", "updated_at": "2020-11-25T11:30:52Z", "revision_number": 0}, {"id": "1f13bb9a-d96b-44d7-b4ba-0d8aa2f8ccc7", "network_id": "5e37b9a6-feb5-486c-bd34-d2ec2bb30e0e", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 5, "created_at": "2020-11-25T11:20:36Z", "updated_at": "2020-11-25T11:20:36Z", "revision_number": 0}, {"id": "21dabc4a-d0c0-4642-904c-9b00a5a12b52", "network_id": "3482a5cb-be2c-4498-bb86-24132e1bbf43", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 11, "created_at": "2020-11-22T17:24:11Z", "updated_at": "2020-11-22T17:24:11Z", "revision_number": 0}, {"id": "23066625-631a-4490-9f4f-fc3f3899e1b8", "network_id": "7b0332b8-42bd-4dec-b8aa-c5850d8f58a9", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 4, "created_at": "2020-11-22T17:15:36Z", "updated_at": "2020-11-22T17:15:36Z", "revision_number": 0}, {"id": "2cc29de4-52cb-402c-af67-f4009738d177", "network_id": "46ca4eb6-e2ab-422a-81e5-7048fed04ab4", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 38, "created_at": "2020-12-07T21:54:57Z", "updated_at": "2020-12-07T21:54:57Z", "revision_number": 0}, {"id": "2ce52f3c-0a6b-4490-bf3f-0bdf92168306", "network_id": "063503db-115b-4919-a9a6-1f3519d69592", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 67, "created_at": "2020-12-13T11:20:01Z", "updated_at": "2020-12-13T11:20:01Z", "revision_number": 0}, {"id": "2f4e8e15-6e99-44d2-92be-e396a671ec37", "network_id": "58d4b91f-7c91-47db-a107-dc36c3ef2ae0", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 48, "created_at": "2020-12-09T18:42:46Z", "updated_at": "2020-12-09T18:42:46Z", "revision_number": 0}, {"id": "3415580e-4fd2-4d36-a438-e40ad0a95b7f", "network_id": "c2fc1929-596d-49b6-a695-8492160fc58b", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 40, "created_at": "2020-12-09T09:03:21Z", "updated_at": "2020-12-09T09:03:21Z", "revision_number": 0}, {"id": "39b7014c-85b3-446a-8f78-4132ab0aa608", "network_id": "b041070c-651b-4c0d-8ae3-9096e8b5080e", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 54, "created_at": "2020-12-10T07:27:30Z", "updated_at": "2020-12-10T07:27:30Z", "revision_number": 0}, {"id": "3dcc8169-a45d-43e5-ab7d-7e0e9b4650f5", "network_id": "3fe _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:54.920 193 INFO tempest.lib.common.rest_client [req-6e7c3c13-dbf7-4192-be28-2644dd2a9085 ] Request (SegmentsExtRbacTest:test_list_segments): 201 POST http://172.30.13.94:9696/v2.0/segments 0.353s 2020-12-14 02:17:54.923 193 DEBUG tempest.lib.common.rest_client [req-6e7c3c13-dbf7-4192-be28-2644dd2a9085 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"segment": {"network_id": "210535d9-6aca-4107-995a-67af84dddebb", "network_type": "gre", "segmentation_id": 4261}} Response - Headers: {'content-type': 'application/json', 'content-length': '318', 'x-openstack-request-id': 'req-6e7c3c13-dbf7-4192-be28-2644dd2a9085', 'date': 'Mon, 14 Dec 2020 02:17:54 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segment": {"id": "92303fc7-fad4-4999-acb1-ed70794a71ad", "network_id": "210535d9-6aca-4107-995a-67af84dddebb", "name": null, "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 4261, "created_at": "2020-12-14T02:17:54Z", "updated_at": "2020-12-14T02:17:54Z", "revision_number": 1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:54.926 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:54.992 193 INFO tempest.lib.common.rest_client [req-ea6d94d5-756c-4cc6-bd11-8f8061abd23e ] Request (SegmentsExtRbacTest:test_list_segments): 200 GET http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles 0.060s 2020-12-14 02:17:54.995 193 DEBUG tempest.lib.common.rest_client [req-ea6d94d5-756c-4cc6-bd11-8f8061abd23e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea6d94d5-756c-4cc6-bd11-8f8061abd23e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:55.047 193 INFO tempest.lib.common.rest_client [req-87085437-852f-4c7f-b080-7af40c6eeedb ] Request (SegmentsExtRbacTest:test_list_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:17:55.051 193 DEBUG tempest.lib.common.rest_client [req-87085437-852f-4c7f-b080-7af40c6eeedb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87085437-852f-4c7f-b080-7af40c6eeedb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["4FDjUdAfSg2azvBtLWwmFQ"], "expires_at": "2020-12-14T03:17:55.000000Z", "issued_at": "2020-12-14T02:17:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:55.101 193 INFO tempest.lib.common.rest_client [req-cdf44fbb-5d76-4b07-a0fd-b25341473701 ] Request (SegmentsExtRbacTest:test_list_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:17:55.104 193 DEBUG tempest.lib.common.rest_client [req-cdf44fbb-5d76-4b07-a0fd-b25341473701 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cdf44fbb-5d76-4b07-a0fd-b25341473701', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["v5pW8BD9RLiFtscafWKaPg"], "expires_at": "2020-12-14T03:17:55.000000Z", "issued_at": "2020-12-14T02:17:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:55.220 193 INFO tempest.lib.common.rest_client [req-e463756a-b4ad-495a-b4bf-67d242fc49e1 ] Request (SegmentsExtRbacTest:test_list_segments): 200 GET http://172.30.13.94:9696/v2.0/segments?id=92303fc7-fad4-4999-acb1-ed70794a71ad 0.106s 2020-12-14 02:17:55.224 193 DEBUG tempest.lib.common.rest_client [req-e463756a-b4ad-495a-b4bf-67d242fc49e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '321', 'x-openstack-request-id': 'req-e463756a-b4ad-495a-b4bf-67d242fc49e1', 'date': 'Mon, 14 Dec 2020 02:17:55 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/segments?id=92303fc7-fad4-4999-acb1-ed70794a71ad'} Body: b'{"segments": [{"id": "92303fc7-fad4-4999-acb1-ed70794a71ad", "network_id": "210535d9-6aca-4107-995a-67af84dddebb", "name": null, "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 4261, "created_at": "2020-12-14T02:17:54Z", "updated_at": "2020-12-14T02:17:54Z", "revision_number": 1}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:55.227 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:55.297 193 INFO tempest.lib.common.rest_client [req-76341333-2380-42fe-aca6-520714f4cb66 ] Request (SegmentsExtRbacTest:test_list_segments): 200 GET http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles 0.064s 2020-12-14 02:17:55.300 193 DEBUG tempest.lib.common.rest_client [req-76341333-2380-42fe-aca6-520714f4cb66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76341333-2380-42fe-aca6-520714f4cb66', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:55.350 193 INFO tempest.lib.common.rest_client [req-a19db149-5099-446a-b6e9-d6e1415a7ba5 ] Request (SegmentsExtRbacTest:test_list_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:17:55.354 193 DEBUG tempest.lib.common.rest_client [req-a19db149-5099-446a-b6e9-d6e1415a7ba5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a19db149-5099-446a-b6e9-d6e1415a7ba5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["_h67l0SCQRiIAhttVcyVVA"], "expires_at": "2020-12-14T03:17:55.000000Z", "issued_at": "2020-12-14T02:17:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:55.406 193 INFO tempest.lib.common.rest_client [req-4efc6787-6ad6-4fa2-a0a1-673d9d8bee58 ] Request (SegmentsExtRbacTest:test_list_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:17:55.409 193 DEBUG tempest.lib.common.rest_client [req-4efc6787-6ad6-4fa2-a0a1-673d9d8bee58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4efc6787-6ad6-4fa2-a0a1-673d9d8bee58', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["RcC8OfFPRECi2oKDh96x5g"], "expires_at": "2020-12-14T03:17:55.000000Z", "issued_at": "2020-12-14T02:17:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:55.425 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:55.448 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_segment, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:55.582 193 INFO tempest.lib.common.rest_client [req-7fd33aa8-33b5-42b8-b059-88e82ad91bd5 ] Request (SegmentsExtRbacTest:test_show_segment): 200 GET http://172.30.13.94:9696/v2.0/segments 0.128s 2020-12-14 02:17:55.586 193 DEBUG tempest.lib.common.rest_client [req-7fd33aa8-33b5-42b8-b059-88e82ad91bd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '22254', 'x-openstack-request-id': 'req-7fd33aa8-33b5-42b8-b059-88e82ad91bd5', 'date': 'Mon, 14 Dec 2020 02:17:55 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segments": [{"id": "05b47d23-fc77-49a4-a84e-94929ff43fde", "network_id": "2e850320-7833-47c7-a469-1064f6b1ed25", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 19, "created_at": "2020-11-26T22:31:15Z", "updated_at": "2020-11-26T22:31:15Z", "revision_number": 0}, {"id": "0af22f04-c3bd-4452-afa9-aa61bc716249", "network_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 29, "created_at": "2020-12-14T02:17:13Z", "updated_at": "2020-12-14T02:17:13Z", "revision_number": 0}, {"id": "0b096e76-7ae1-4f89-9952-24f08f9621c5", "network_id": "d7a36286-f879-4571-a339-59912279fa90", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 24, "created_at": "2020-12-02T20:44:57Z", "updated_at": "2020-12-02T20:44:57Z", "revision_number": 0}, {"id": "11ebf32c-7448-4b1a-b048-b46b33e1efbe", "network_id": "a9a04b8b-f92c-42be-81d7-1e2272abe0b3", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 42, "created_at": "2020-12-08T01:04:21Z", "updated_at": "2020-12-08T01:04:21Z", "revision_number": 0}, {"id": "1e5c7fb0-dd39-468a-8477-7712c7476f95", "network_id": "4a71cce6-2ba2-449c-a71a-3870f3432be4", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 14, "created_at": "2020-11-25T11:30:52Z", "updated_at": "2020-11-25T11:30:52Z", "revision_number": 0}, {"id": "1f13bb9a-d96b-44d7-b4ba-0d8aa2f8ccc7", "network_id": "5e37b9a6-feb5-486c-bd34-d2ec2bb30e0e", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 5, "created_at": "2020-11-25T11:20:36Z", "updated_at": "2020-11-25T11:20:36Z", "revision_number": 0}, {"id": "21dabc4a-d0c0-4642-904c-9b00a5a12b52", "network_id": "3482a5cb-be2c-4498-bb86-24132e1bbf43", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 11, "created_at": "2020-11-22T17:24:11Z", "updated_at": "2020-11-22T17:24:11Z", "revision_number": 0}, {"id": "23066625-631a-4490-9f4f-fc3f3899e1b8", "network_id": "7b0332b8-42bd-4dec-b8aa-c5850d8f58a9", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 4, "created_at": "2020-11-22T17:15:36Z", "updated_at": "2020-11-22T17:15:36Z", "revision_number": 0}, {"id": "2cc29de4-52cb-402c-af67-f4009738d177", "network_id": "46ca4eb6-e2ab-422a-81e5-7048fed04ab4", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 38, "created_at": "2020-12-07T21:54:57Z", "updated_at": "2020-12-07T21:54:57Z", "revision_number": 0}, {"id": "2ce52f3c-0a6b-4490-bf3f-0bdf92168306", "network_id": "063503db-115b-4919-a9a6-1f3519d69592", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 67, "created_at": "2020-12-13T11:20:01Z", "updated_at": "2020-12-13T11:20:01Z", "revision_number": 0}, {"id": "2f4e8e15-6e99-44d2-92be-e396a671ec37", "network_id": "58d4b91f-7c91-47db-a107-dc36c3ef2ae0", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 48, "created_at": "2020-12-09T18:42:46Z", "updated_at": "2020-12-09T18:42:46Z", "revision_number": 0}, {"id": "3415580e-4fd2-4d36-a438-e40ad0a95b7f", "network_id": "c2fc1929-596d-49b6-a695-8492160fc58b", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 40, "created_at": "2020-12-09T09:03:21Z", "updated_at": "2020-12-09T09:03:21Z", "revision_number": 0}, {"id": "39b7014c-85b3-446a-8f78-4132ab0aa608", "network_id": "b041070c-651b-4c0d-8ae3-9096e8b5080e", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 54, "created_at": "2020-12-10T07:27:30Z", "updated_at": "2020-12-10T07:27:30Z", "revision_number": 0}, {"id": "3dcc8169-a45d-43e5-ab7d-7e0e9b4650f5", "network_id": "3fe _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:55.698 197 INFO tempest.lib.common.rest_client [req-37c83aff-d412-43fb-98c2-f8929922b4a6 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.217s 2020-12-14 02:17:55.699 189 INFO tempest.lib.common.rest_client [req-89b3f414-8d02-4fe1-964c-7e354347c082 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.197s 2020-12-14 02:17:55.701 197 DEBUG tempest.lib.common.rest_client [req-37c83aff-d412-43fb-98c2-f8929922b4a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-37c83aff-d412-43fb-98c2-f8929922b4a6', 'x-compute-request-id': 'req-37c83aff-d412-43fb-98c2-f8929922b4a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:55.702 189 DEBUG tempest.lib.common.rest_client [req-89b3f414-8d02-4fe1-964c-7e354347c082 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-89b3f414-8d02-4fe1-964c-7e354347c082', 'x-compute-request-id': 'req-89b3f414-8d02-4fe1-964c-7e354347c082', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:56.097 193 INFO tempest.lib.common.rest_client [req-6cbe654b-2ab7-4ffa-a066-4a065d52b212 ] Request (SegmentsExtRbacTest:test_show_segment): 201 POST http://172.30.13.94:9696/v2.0/segments 0.500s 2020-12-14 02:17:56.100 193 DEBUG tempest.lib.common.rest_client [req-6cbe654b-2ab7-4ffa-a066-4a065d52b212 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"segment": {"network_id": "210535d9-6aca-4107-995a-67af84dddebb", "network_type": "gre", "segmentation_id": 2310}} Response - Headers: {'content-type': 'application/json', 'content-length': '318', 'x-openstack-request-id': 'req-6cbe654b-2ab7-4ffa-a066-4a065d52b212', 'date': 'Mon, 14 Dec 2020 02:17:56 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segment": {"id": "05846b01-7d49-4a89-a802-51274b6e0237", "network_id": "210535d9-6aca-4107-995a-67af84dddebb", "name": null, "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 2310, "created_at": "2020-12-14T02:17:55Z", "updated_at": "2020-12-14T02:17:55Z", "revision_number": 1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:56.104 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:56.194 193 INFO tempest.lib.common.rest_client [req-3562c5f0-2e54-4bef-a264-16cb061a41b0 ] Request (SegmentsExtRbacTest:test_show_segment): 200 GET http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles 0.083s 2020-12-14 02:17:56.197 193 DEBUG tempest.lib.common.rest_client [req-3562c5f0-2e54-4bef-a264-16cb061a41b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3562c5f0-2e54-4bef-a264-16cb061a41b0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:56.244 193 INFO tempest.lib.common.rest_client [req-f341270b-539b-4379-b73d-369484dac53d ] Request (SegmentsExtRbacTest:test_show_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:17:56.246 193 DEBUG tempest.lib.common.rest_client [req-f341270b-539b-4379-b73d-369484dac53d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f341270b-539b-4379-b73d-369484dac53d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["uowIT-nPT_yMIh6a5JHQ_Q"], "expires_at": "2020-12-14T03:17:56.000000Z", "issued_at": "2020-12-14T02:17:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:56.295 193 INFO tempest.lib.common.rest_client [req-604d5c39-52dc-4991-aff3-8d6042c02db1 ] Request (SegmentsExtRbacTest:test_show_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:17:56.298 193 DEBUG tempest.lib.common.rest_client [req-604d5c39-52dc-4991-aff3-8d6042c02db1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-604d5c39-52dc-4991-aff3-8d6042c02db1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["j8srh3zRT3Gt78j6PBmJmg"], "expires_at": "2020-12-14T03:17:56.000000Z", "issued_at": "2020-12-14T02:17:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:56.435 193 INFO tempest.lib.common.rest_client [req-e5528029-9781-4d3f-b1d2-f23df3f9cfd1 ] Request (SegmentsExtRbacTest:test_show_segment): 200 GET http://172.30.13.94:9696/v2.0/segments/05846b01-7d49-4a89-a802-51274b6e0237 0.131s 2020-12-14 02:17:56.438 193 DEBUG tempest.lib.common.rest_client [req-e5528029-9781-4d3f-b1d2-f23df3f9cfd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '318', 'x-openstack-request-id': 'req-e5528029-9781-4d3f-b1d2-f23df3f9cfd1', 'date': 'Mon, 14 Dec 2020 02:17:56 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/segments/05846b01-7d49-4a89-a802-51274b6e0237'} Body: b'{"segment": {"id": "05846b01-7d49-4a89-a802-51274b6e0237", "network_id": "210535d9-6aca-4107-995a-67af84dddebb", "name": null, "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 2310, "created_at": "2020-12-14T02:17:55Z", "updated_at": "2020-12-14T02:17:55Z", "revision_number": 1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:56.441 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:56.509 193 INFO tempest.lib.common.rest_client [req-9bcfc3f7-1dee-4b55-ad2b-c615628eb265 ] Request (SegmentsExtRbacTest:test_show_segment): 200 GET http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles 0.061s 2020-12-14 02:17:56.511 193 DEBUG tempest.lib.common.rest_client [req-9bcfc3f7-1dee-4b55-ad2b-c615628eb265 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9bcfc3f7-1dee-4b55-ad2b-c615628eb265', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:56.565 193 INFO tempest.lib.common.rest_client [req-fbe1f1a6-94b9-4359-90f3-8eb8e4d90d3e ] Request (SegmentsExtRbacTest:test_show_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:17:56.569 193 DEBUG tempest.lib.common.rest_client [req-fbe1f1a6-94b9-4359-90f3-8eb8e4d90d3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fbe1f1a6-94b9-4359-90f3-8eb8e4d90d3e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["gJnhvDnJStmxU73VTZzd3A"], "expires_at": "2020-12-14T03:17:56.000000Z", "issued_at": "2020-12-14T02:17:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:56.616 193 INFO tempest.lib.common.rest_client [req-808632e0-536d-44b3-bf54-f280be4a6e89 ] Request (SegmentsExtRbacTest:test_show_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:17:56.619 193 DEBUG tempest.lib.common.rest_client [req-808632e0-536d-44b3-bf54-f280be4a6e89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-808632e0-536d-44b3-bf54-f280be4a6e89', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["J8BTa9ALT7--rpcrzgMcjA"], "expires_at": "2020-12-14T03:17:56.000000Z", "issued_at": "2020-12-14T02:17:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:56.635 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:56.659 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_segment, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:56.661 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:17:56.683 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_segment, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:17:56.809 193 INFO tempest.lib.common.rest_client [req-e88b6a84-3930-4927-84e5-c605ff5c4b57 ] Request (SegmentsExtRbacTest:test_update_segment): 200 GET http://172.30.13.94:9696/v2.0/segments 0.119s 2020-12-14 02:17:56.814 193 DEBUG tempest.lib.common.rest_client [req-e88b6a84-3930-4927-84e5-c605ff5c4b57 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '22561', 'x-openstack-request-id': 'req-e88b6a84-3930-4927-84e5-c605ff5c4b57', 'date': 'Mon, 14 Dec 2020 02:17:56 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segments": [{"id": "05846b01-7d49-4a89-a802-51274b6e0237", "network_id": "210535d9-6aca-4107-995a-67af84dddebb", "name": null, "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 2310, "created_at": "2020-12-14T02:17:55Z", "updated_at": "2020-12-14T02:17:55Z", "revision_number": 1}, {"id": "05b47d23-fc77-49a4-a84e-94929ff43fde", "network_id": "2e850320-7833-47c7-a469-1064f6b1ed25", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 19, "created_at": "2020-11-26T22:31:15Z", "updated_at": "2020-11-26T22:31:15Z", "revision_number": 0}, {"id": "0af22f04-c3bd-4452-afa9-aa61bc716249", "network_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 29, "created_at": "2020-12-14T02:17:13Z", "updated_at": "2020-12-14T02:17:13Z", "revision_number": 0}, {"id": "0b096e76-7ae1-4f89-9952-24f08f9621c5", "network_id": "d7a36286-f879-4571-a339-59912279fa90", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 24, "created_at": "2020-12-02T20:44:57Z", "updated_at": "2020-12-02T20:44:57Z", "revision_number": 0}, {"id": "11ebf32c-7448-4b1a-b048-b46b33e1efbe", "network_id": "a9a04b8b-f92c-42be-81d7-1e2272abe0b3", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 42, "created_at": "2020-12-08T01:04:21Z", "updated_at": "2020-12-08T01:04:21Z", "revision_number": 0}, {"id": "1e5c7fb0-dd39-468a-8477-7712c7476f95", "network_id": "4a71cce6-2ba2-449c-a71a-3870f3432be4", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 14, "created_at": "2020-11-25T11:30:52Z", "updated_at": "2020-11-25T11:30:52Z", "revision_number": 0}, {"id": "1f13bb9a-d96b-44d7-b4ba-0d8aa2f8ccc7", "network_id": "5e37b9a6-feb5-486c-bd34-d2ec2bb30e0e", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 5, "created_at": "2020-11-25T11:20:36Z", "updated_at": "2020-11-25T11:20:36Z", "revision_number": 0}, {"id": "21dabc4a-d0c0-4642-904c-9b00a5a12b52", "network_id": "3482a5cb-be2c-4498-bb86-24132e1bbf43", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 11, "created_at": "2020-11-22T17:24:11Z", "updated_at": "2020-11-22T17:24:11Z", "revision_number": 0}, {"id": "23066625-631a-4490-9f4f-fc3f3899e1b8", "network_id": "7b0332b8-42bd-4dec-b8aa-c5850d8f58a9", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 4, "created_at": "2020-11-22T17:15:36Z", "updated_at": "2020-11-22T17:15:36Z", "revision_number": 0}, {"id": "2cc29de4-52cb-402c-af67-f4009738d177", "network_id": "46ca4eb6-e2ab-422a-81e5-7048fed04ab4", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 38, "created_at": "2020-12-07T21:54:57Z", "updated_at": "2020-12-07T21:54:57Z", "revision_number": 0}, {"id": "2ce52f3c-0a6b-4490-bf3f-0bdf92168306", "network_id": "063503db-115b-4919-a9a6-1f3519d69592", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 67, "created_at": "2020-12-13T11:20:01Z", "updated_at": "2020-12-13T11:20:01Z", "revision_number": 0}, {"id": "2f4e8e15-6e99-44d2-92be-e396a671ec37", "network_id": "58d4b91f-7c91-47db-a107-dc36c3ef2ae0", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 48, "created_at": "2020-12-09T18:42:46Z", "updated_at": "2020-12-09T18:42:46Z", "revision_number": 0}, {"id": "3415580e-4fd2-4d36-a438-e40ad0a95b7f", "network_id": "c2fc1929-596d-49b6-a695-8492160fc58b", "name": null, "description": null, "physical_network": null, "network_type": "vxlan", "segmentation_id": 40, "created_at": "2020-12-09T09:03:21Z", "updated_at": "2020-12-09T09:03:21Z", "revision_number": 0}, {"id": "39b7014c-85b3-446a-8f78-4132ab0aa608", "network_id": "b0410 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:56.985 186 INFO tempest.lib.common.rest_client [req-9dc1eeb1-3d36-41a2-83e2-d59550bedf7a ] Request (MiscPolicyActionsNetworkRbacTest:test_show_interface): 200 POST http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface 4.451s 2020-12-14 02:17:56.989 186 DEBUG tempest.lib.common.rest_client [req-9dc1eeb1-3d36-41a2-83e2-d59550bedf7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"interfaceAttachment": {"net_id": "7b31d2ce-a194-467e-a554-37e06eca5476"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '283', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9dc1eeb1-3d36-41a2-83e2-d59550bedf7a', 'x-compute-request-id': 'req-9dc1eeb1-3d36-41a2-83e2-d59550bedf7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface'} Body: b'{"interfaceAttachment": {"net_id": "7b31d2ce-a194-467e-a554-37e06eca5476", "port_id": "6c1f2455-3a50-4746-a39f-292053cc6500", "mac_addr": "fa:16:3e:df:96:f7", "port_state": "DOWN", "fixed_ips": [{"subnet_id": "04a3f132-131b-4b4d-9d89-c34e861d6d5f", "ip_address": "192.168.120.34"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:57.020 197 INFO tempest.lib.common.rest_client [req-9b1f161d-f840-467e-bb3c-b10987fefd65 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.215s 2020-12-14 02:17:57.024 197 DEBUG tempest.lib.common.rest_client [req-9b1f161d-f840-467e-bb3c-b10987fefd65 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9b1f161d-f840-467e-bb3c-b10987fefd65', 'x-compute-request-id': 'req-9b1f161d-f840-467e-bb3c-b10987fefd65', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:57.186 189 INFO tempest.lib.common.rest_client [req-495511a7-f0f6-4352-aef2-6db4707f2182 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.379s 2020-12-14 02:17:57.190 189 DEBUG tempest.lib.common.rest_client [req-495511a7-f0f6-4352-aef2-6db4707f2182 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-495511a7-f0f6-4352-aef2-6db4707f2182', 'x-compute-request-id': 'req-495511a7-f0f6-4352-aef2-6db4707f2182', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:57.197 186 INFO tempest.lib.common.rest_client [req-bd758df7-197d-444c-a28b-69cd7671688a ] Request (MiscPolicyActionsNetworkRbacTest:test_show_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/6c1f2455-3a50-4746-a39f-292053cc6500 0.173s 2020-12-14 02:17:57.200 186 DEBUG tempest.lib.common.rest_client [req-bd758df7-197d-444c-a28b-69cd7671688a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '283', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bd758df7-197d-444c-a28b-69cd7671688a', 'x-compute-request-id': 'req-bd758df7-197d-444c-a28b-69cd7671688a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/6c1f2455-3a50-4746-a39f-292053cc6500'} Body: b'{"interfaceAttachment": {"net_id": "7b31d2ce-a194-467e-a554-37e06eca5476", "port_id": "6c1f2455-3a50-4746-a39f-292053cc6500", "mac_addr": "fa:16:3e:df:96:f7", "port_state": "DOWN", "fixed_ips": [{"subnet_id": "04a3f132-131b-4b4d-9d89-c34e861d6d5f", "ip_address": "192.168.120.34"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:57.255 193 INFO tempest.lib.common.rest_client [req-01a1d8e6-cbc8-4890-b33b-f0a73555955c ] Request (SegmentsExtRbacTest:test_update_segment): 201 POST http://172.30.13.94:9696/v2.0/segments 0.430s 2020-12-14 02:17:57.260 193 DEBUG tempest.lib.common.rest_client [req-01a1d8e6-cbc8-4890-b33b-f0a73555955c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"segment": {"network_id": "210535d9-6aca-4107-995a-67af84dddebb", "network_type": "gre", "segmentation_id": 1629}} Response - Headers: {'content-type': 'application/json', 'content-length': '318', 'x-openstack-request-id': 'req-01a1d8e6-cbc8-4890-b33b-f0a73555955c', 'date': 'Mon, 14 Dec 2020 02:17:57 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/segments'} Body: b'{"segment": {"id": "2176144d-6b22-4252-81c2-7412e6362bda", "network_id": "210535d9-6aca-4107-995a-67af84dddebb", "name": null, "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 1629, "created_at": "2020-12-14T02:17:56Z", "updated_at": "2020-12-14T02:17:57Z", "revision_number": 1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:57.263 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:57.329 193 INFO tempest.lib.common.rest_client [req-5420975e-52f3-4e40-8c98-88df16b6282d ] Request (SegmentsExtRbacTest:test_update_segment): 200 GET http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles 0.060s 2020-12-14 02:17:57.333 193 DEBUG tempest.lib.common.rest_client [req-5420975e-52f3-4e40-8c98-88df16b6282d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5420975e-52f3-4e40-8c98-88df16b6282d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:57.385 193 INFO tempest.lib.common.rest_client [req-0792fd21-f187-4095-ae03-1bc38bb66f6f ] Request (SegmentsExtRbacTest:test_update_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:17:57.389 193 DEBUG tempest.lib.common.rest_client [req-0792fd21-f187-4095-ae03-1bc38bb66f6f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0792fd21-f187-4095-ae03-1bc38bb66f6f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["Mg7WxSczTx-pNb5Kc9JdSQ"], "expires_at": "2020-12-14T03:17:57.000000Z", "issued_at": "2020-12-14T02:17:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:57.441 193 INFO tempest.lib.common.rest_client [req-6aa724e0-393b-4ad3-9adc-4940aa2d76ee ] Request (SegmentsExtRbacTest:test_update_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:17:57.444 193 DEBUG tempest.lib.common.rest_client [req-6aa724e0-393b-4ad3-9adc-4940aa2d76ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6aa724e0-393b-4ad3-9adc-4940aa2d76ee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["JIbt_p7OTH-9Xc77K6-kWw"], "expires_at": "2020-12-14T03:17:57.000000Z", "issued_at": "2020-12-14T02:17:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:57.577 193 INFO tempest.lib.common.rest_client [req-94606c60-99b9-4198-8b6b-70c1626167c2 ] Request (SegmentsExtRbacTest:test_update_segment): 200 PUT http://172.30.13.94:9696/v2.0/segments/2176144d-6b22-4252-81c2-7412e6362bda 0.126s 2020-12-14 02:17:57.579 193 DEBUG tempest.lib.common.rest_client [req-94606c60-99b9-4198-8b6b-70c1626167c2 ] Request - Headers: {'X-Auth-Token': ''} Body: {"segment": {"name": "NewName"}} Response - Headers: {'content-type': 'application/json', 'content-length': '323', 'x-openstack-request-id': 'req-94606c60-99b9-4198-8b6b-70c1626167c2', 'date': 'Mon, 14 Dec 2020 02:17:57 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/segments/2176144d-6b22-4252-81c2-7412e6362bda'} Body: b'{"segment": {"id": "2176144d-6b22-4252-81c2-7412e6362bda", "network_id": "210535d9-6aca-4107-995a-67af84dddebb", "name": "NewName", "description": "", "physical_network": null, "network_type": "gre", "segmentation_id": 1629, "created_at": "2020-12-14T02:17:56Z", "updated_at": "2020-12-14T02:17:57Z", "revision_number": 2}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:57.583 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:57.656 193 INFO tempest.lib.common.rest_client [req-5eeeec27-6e73-4937-8092-a1f9c706d57e ] Request (SegmentsExtRbacTest:test_update_segment): 200 GET http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles 0.064s 2020-12-14 02:17:57.660 193 DEBUG tempest.lib.common.rest_client [req-5eeeec27-6e73-4937-8092-a1f9c706d57e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5eeeec27-6e73-4937-8092-a1f9c706d57e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2/users/e94d6f2b031b428d9714470fcb6ac4e8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:57.715 193 INFO tempest.lib.common.rest_client [req-1520e088-ed2a-4a8e-a703-381629ad5840 ] Request (SegmentsExtRbacTest:test_update_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:17:57.719 193 DEBUG tempest.lib.common.rest_client [req-1520e088-ed2a-4a8e-a703-381629ad5840 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1520e088-ed2a-4a8e-a703-381629ad5840', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["bttPVnbJT4iOy7wYQcHSbA"], "expires_at": "2020-12-14T03:17:57.000000Z", "issued_at": "2020-12-14T02:17:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:57.770 193 INFO tempest.lib.common.rest_client [req-20ce47f4-861a-4bef-b99b-5c62b0d31c22 ] Request (SegmentsExtRbacTest:test_update_segment): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:17:57.774 193 DEBUG tempest.lib.common.rest_client [req-20ce47f4-861a-4bef-b99b-5c62b0d31c22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20ce47f4-861a-4bef-b99b-5c62b0d31c22', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e94d6f2b031b428d9714470fcb6ac4e8", "name": "tempest-SegmentsExtRbacTest-1701683891", "password_expires_at": null}, "audit_ids": ["Vy-0wauSSlKNN1JMGz5Udw"], "expires_at": "2020-12-14T03:17:57.000000Z", "issued_at": "2020-12-14T02:17:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "09ed02ef1af740cd91330b1da4c3cac2", "name": "tempest-SegmentsExtRbacTest-1701683891"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_09ed02ef1af740cd91330b1da4c3cac2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:58.345 193 INFO tempest.lib.common.rest_client [req-65fa855d-7cce-4988-8b37-4ddfdc17775f ] Request (SegmentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/segments/2176144d-6b22-4252-81c2-7412e6362bda 0.548s 2020-12-14 02:17:58.347 193 DEBUG tempest.lib.common.rest_client [req-65fa855d-7cce-4988-8b37-4ddfdc17775f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-65fa855d-7cce-4988-8b37-4ddfdc17775f', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:58 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/segments/2176144d-6b22-4252-81c2-7412e6362bda'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:58.407 186 INFO tempest.lib.common.rest_client [req-7aaa2cb2-7094-4298-8b5d-cdc0988639bb ] Request (MiscPolicyActionsNetworkRbacTest:test_show_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/6c1f2455-3a50-4746-a39f-292053cc6500 0.175s 2020-12-14 02:17:58.408 197 INFO tempest.lib.common.rest_client [req-c3f95484-fffa-4e3f-a2f2-c064ed4aa2ac ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.244s 2020-12-14 02:17:58.410 186 DEBUG tempest.lib.common.rest_client [req-7aaa2cb2-7094-4298-8b5d-cdc0988639bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '285', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7aaa2cb2-7094-4298-8b5d-cdc0988639bb', 'x-compute-request-id': 'req-7aaa2cb2-7094-4298-8b5d-cdc0988639bb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/6c1f2455-3a50-4746-a39f-292053cc6500'} Body: b'{"interfaceAttachment": {"net_id": "7b31d2ce-a194-467e-a554-37e06eca5476", "port_id": "6c1f2455-3a50-4746-a39f-292053cc6500", "mac_addr": "fa:16:3e:df:96:f7", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "04a3f132-131b-4b4d-9d89-c34e861d6d5f", "ip_address": "192.168.120.34"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:58.412 197 DEBUG tempest.lib.common.rest_client [req-c3f95484-fffa-4e3f-a2f2-c064ed4aa2ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c3f95484-fffa-4e3f-a2f2-c064ed4aa2ac', 'x-compute-request-id': 'req-c3f95484-fffa-4e3f-a2f2-c064ed4aa2ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:58.444 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:58.495 189 INFO tempest.lib.common.rest_client [req-5b4d4611-839f-4fba-973a-d9ad08531df2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.198s 2020-12-14 02:17:58.499 189 DEBUG tempest.lib.common.rest_client [req-5b4d4611-839f-4fba-973a-d9ad08531df2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5b4d4611-839f-4fba-973a-d9ad08531df2', 'x-compute-request-id': 'req-5b4d4611-839f-4fba-973a-d9ad08531df2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:58.510 186 INFO tempest.lib.common.rest_client [req-ca5020de-e458-49dc-8a69-8e2eff545444 ] Request (MiscPolicyActionsNetworkRbacTest:test_show_interface): 200 GET http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles 0.060s 2020-12-14 02:17:58.513 186 DEBUG tempest.lib.common.rest_client [req-ca5020de-e458-49dc-8a69-8e2eff545444 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca5020de-e458-49dc-8a69-8e2eff545444', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:58.563 186 INFO tempest.lib.common.rest_client [req-3d230102-5438-4ce4-879a-7e75642373b7 ] Request (MiscPolicyActionsNetworkRbacTest:test_show_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:17:58.567 186 DEBUG tempest.lib.common.rest_client [req-3d230102-5438-4ce4-879a-7e75642373b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d230102-5438-4ce4-879a-7e75642373b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["_wY7vOHdSAK9ZjgBhCz_sg"], "expires_at": "2020-12-14T03:17:58.000000Z", "issued_at": "2020-12-14T02:17:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:58.778 193 INFO tempest.lib.common.rest_client [req-887f8162-1dc1-48b0-8e7f-5ce88d1510a3 ] Request (SegmentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/segments/05846b01-7d49-4a89-a802-51274b6e0237 0.423s 2020-12-14 02:17:58.781 193 DEBUG tempest.lib.common.rest_client [req-887f8162-1dc1-48b0-8e7f-5ce88d1510a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-887f8162-1dc1-48b0-8e7f-5ce88d1510a3', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:58 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/segments/05846b01-7d49-4a89-a802-51274b6e0237'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:58.783 186 INFO tempest.lib.common.rest_client [req-2f42ac72-d36d-46a9-9f52-43d7a2b10e35 ] Request (MiscPolicyActionsNetworkRbacTest:test_show_interface): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/6c1f2455-3a50-4746-a39f-292053cc6500 0.208s 2020-12-14 02:17:58.786 186 DEBUG tempest.lib.common.rest_client [req-2f42ac72-d36d-46a9-9f52-43d7a2b10e35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '285', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2f42ac72-d36d-46a9-9f52-43d7a2b10e35', 'x-compute-request-id': 'req-2f42ac72-d36d-46a9-9f52-43d7a2b10e35', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/6c1f2455-3a50-4746-a39f-292053cc6500'} Body: b'{"interfaceAttachment": {"net_id": "7b31d2ce-a194-467e-a554-37e06eca5476", "port_id": "6c1f2455-3a50-4746-a39f-292053cc6500", "mac_addr": "fa:16:3e:df:96:f7", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "04a3f132-131b-4b4d-9d89-c34e861d6d5f", "ip_address": "192.168.120.34"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:58.820 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:17:58.892 186 INFO tempest.lib.common.rest_client [req-f3010ac8-363f-4aea-bf8b-ca774000b2a5 ] Request (MiscPolicyActionsNetworkRbacTest:test_show_interface): 200 GET http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles 0.065s 2020-12-14 02:17:58.896 186 DEBUG tempest.lib.common.rest_client [req-f3010ac8-363f-4aea-bf8b-ca774000b2a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3010ac8-363f-4aea-bf8b-ca774000b2a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22/users/c9c6177d06e54d90aff506ccfab61ac9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:58.945 186 INFO tempest.lib.common.rest_client [req-1bbb95ea-60ce-4a20-8fd1-cd936f42d6f9 ] Request (MiscPolicyActionsNetworkRbacTest:test_show_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:17:58.948 186 DEBUG tempest.lib.common.rest_client [req-1bbb95ea-60ce-4a20-8fd1-cd936f42d6f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1bbb95ea-60ce-4a20-8fd1-cd936f42d6f9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c9c6177d06e54d90aff506ccfab61ac9", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441", "password_expires_at": null}, "audit_ids": ["xTmUHrdjTuqPPKBD4dFThg"], "expires_at": "2020-12-14T03:17:58.000000Z", "issued_at": "2020-12-14T02:17:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d2bab69895c4d7a955e71657b529b22", "name": "tempest-MiscPolicyActionsNetworkRbacTest-1541328441"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d2bab69895c4d7a955e71657b529b22", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:59.111 186 INFO tempest.lib.common.rest_client [req-fd26952e-e6de-408d-b1eb-9349d2c31a2c ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/6c1f2455-3a50-4746-a39f-292053cc6500 0.152s 2020-12-14 02:17:59.115 186 DEBUG tempest.lib.common.rest_client [req-fd26952e-e6de-408d-b1eb-9349d2c31a2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fd26952e-e6de-408d-b1eb-9349d2c31a2c', 'x-compute-request-id': 'req-fd26952e-e6de-408d-b1eb-9349d2c31a2c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface/6c1f2455-3a50-4746-a39f-292053cc6500'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:59.212 193 INFO tempest.lib.common.rest_client [req-9161b715-7a55-4ab6-8e9f-ff962e47819b ] Request (SegmentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/segments/92303fc7-fad4-4999-acb1-ed70794a71ad 0.425s 2020-12-14 02:17:59.216 193 DEBUG tempest.lib.common.rest_client [req-9161b715-7a55-4ab6-8e9f-ff962e47819b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-9161b715-7a55-4ab6-8e9f-ff962e47819b', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:59 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/segments/92303fc7-fad4-4999-acb1-ed70794a71ad'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:59.268 193 INFO tempest.lib.common.rest_client [req-58a38c49-a399-4543-8b27-6278cc4d033e ] Request (SegmentsExtRbacTest:tearDownClass): 404 DELETE http://172.30.13.94:9696/v2.0/segments/d8c3e76e-b383-4c4c-8b11-359e9325907e 0.046s 2020-12-14 02:17:59.271 193 DEBUG tempest.lib.common.rest_client [req-58a38c49-a399-4543-8b27-6278cc4d033e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '138', 'x-openstack-request-id': 'req-58a38c49-a399-4543-8b27-6278cc4d033e', 'date': 'Mon, 14 Dec 2020 02:17:59 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/segments/d8c3e76e-b383-4c4c-8b11-359e9325907e'} Body: b'{"NeutronError": {"type": "SegmentNotFound", "message": "Segment d8c3e76e-b383-4c4c-8b11-359e9325907e could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:59.299 186 INFO tempest.lib.common.rest_client [req-abf4205f-ceda-47b7-b7f3-c1853f384fb7 ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface 0.178s 2020-12-14 02:17:59.302 186 DEBUG tempest.lib.common.rest_client [req-abf4205f-ceda-47b7-b7f3-c1853f384fb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '635', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-abf4205f-ceda-47b7-b7f3-c1853f384fb7', 'x-compute-request-id': 'req-abf4205f-ceda-47b7-b7f3-c1853f384fb7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "7b31d2ce-a194-467e-a554-37e06eca5476", "port_id": "6c1f2455-3a50-4746-a39f-292053cc6500", "mac_addr": "fa:16:3e:df:96:f7", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "04a3f132-131b-4b4d-9d89-c34e861d6d5f", "ip_address": "192.168.120.34"}]}, {"net_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "port_id": "bcdcfe0c-62b4-4338-993f-01a51ede3a86", "mac_addr": "fa:16:3e:0c:4f:91", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.6"}, {"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.7"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:59.646 193 INFO tempest.lib.common.rest_client [req-a015a150-4755-4099-be4e-2065c3a1fae0 ] Request (SegmentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/segments/480a7229-284b-45e9-b4bc-52626cfebacf 0.368s 2020-12-14 02:17:59.654 193 DEBUG tempest.lib.common.rest_client [req-a015a150-4755-4099-be4e-2065c3a1fae0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-a015a150-4755-4099-be4e-2065c3a1fae0', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:17:59 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/segments/480a7229-284b-45e9-b4bc-52626cfebacf'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:59.738 197 INFO tempest.lib.common.rest_client [req-81eff60b-9c94-4374-bd16-86e498947d4b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.213s 2020-12-14 02:17:59.741 197 DEBUG tempest.lib.common.rest_client [req-81eff60b-9c94-4374-bd16-86e498947d4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-81eff60b-9c94-4374-bd16-86e498947d4b', 'x-compute-request-id': 'req-81eff60b-9c94-4374-bd16-86e498947d4b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:17:59.955 189 INFO tempest.lib.common.rest_client [req-1f138f00-92a3-4796-822f-37403b4649f1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.349s 2020-12-14 02:17:59.958 189 DEBUG tempest.lib.common.rest_client [req-1f138f00-92a3-4796-822f-37403b4649f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:17:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1f138f00-92a3-4796-822f-37403b4649f1', 'x-compute-request-id': 'req-1f138f00-92a3-4796-822f-37403b4649f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:00.353 193 INFO tempest.lib.common.rest_client [req-df3704db-005e-482c-b2ad-61443628781a ] Request (SegmentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/210535d9-6aca-4107-995a-67af84dddebb 0.690s 2020-12-14 02:18:00.356 193 DEBUG tempest.lib.common.rest_client [req-df3704db-005e-482c-b2ad-61443628781a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-df3704db-005e-482c-b2ad-61443628781a', 'date': 'Mon, 14 Dec 2020 02:18:00 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/210535d9-6aca-4107-995a-67af84dddebb'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:00.507 193 INFO tempest.lib.common.rest_client [req-3fd5c866-5110-4068-b31a-8dbdcd849390 ] Request (SegmentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/e94d6f2b031b428d9714470fcb6ac4e8 0.144s 2020-12-14 02:18:00.510 193 DEBUG tempest.lib.common.rest_client [req-3fd5c866-5110-4068-b31a-8dbdcd849390 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3fd5c866-5110-4068-b31a-8dbdcd849390', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/e94d6f2b031b428d9714470fcb6ac4e8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:00.577 186 INFO tempest.lib.common.rest_client [req-aa3ba6eb-f694-4098-b05f-5cd966985148 ] Request (MiscPolicyActionsNetworkRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface 0.226s 2020-12-14 02:18:00.579 186 DEBUG tempest.lib.common.rest_client [req-aa3ba6eb-f694-4098-b05f-5cd966985148 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '373', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aa3ba6eb-f694-4098-b05f-5cd966985148', 'x-compute-request-id': 'req-aa3ba6eb-f694-4098-b05f-5cd966985148', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5/os-interface'} Body: b'{"interfaceAttachments": [{"net_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "port_id": "bcdcfe0c-62b4-4338-993f-01a51ede3a86", "mac_addr": "fa:16:3e:0c:4f:91", "port_state": "ACTIVE", "fixed_ips": [{"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.6"}, {"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "ip_address": "192.168.120.7"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:00.608 193 INFO tempest.lib.common.rest_client [req-02c62dc8-2b52-4240-a991-79078ae03598 ] Request (SegmentsExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:18:00.611 193 DEBUG tempest.lib.common.rest_client [req-02c62dc8-2b52-4240-a991-79078ae03598 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02c62dc8-2b52-4240-a991-79078ae03598', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["rLZDnDeOQ02OVWRaMbKgVg"], "expires_at": "2020-12-14T03:18:00.000000Z", "issued_at": "2020-12-14T02:18:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:00.793 193 INFO tempest.lib.common.rest_client [req-67801cad-74f4-4f24-9dc5-430e332ea9a1 ] Request (SegmentsExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=09ed02ef1af740cd91330b1da4c3cac2&name=default 0.176s 2020-12-14 02:18:00.796 193 DEBUG tempest.lib.common.rest_client [req-67801cad-74f4-4f24-9dc5-430e332ea9a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-67801cad-74f4-4f24-9dc5-430e332ea9a1', 'date': 'Mon, 14 Dec 2020 02:18:00 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=09ed02ef1af740cd91330b1da4c3cac2&name=default'} Body: b'{"security_groups": [{"id": "8355d85a-f335-4e65-a3cc-37df8a5faaf0", "name": "default", "stateful": true, "tenant_id": "09ed02ef1af740cd91330b1da4c3cac2", "description": "Default security group", "security_group_rules": [{"id": "04b55257-c256-4139-80ed-52ebf9043938", "tenant_id": "09ed02ef1af740cd91330b1da4c3cac2", "security_group_id": "8355d85a-f335-4e65-a3cc-37df8a5faaf0", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:51Z", "updated_at": "2020-12-14T02:17:51Z", "revision_number": 0, "project_id": "09ed02ef1af740cd91330b1da4c3cac2"}, {"id": "3ea275ca-4e3c-4392-8dc8-9d485c53b9d9", "tenant_id": "09ed02ef1af740cd91330b1da4c3cac2", "security_group_id": "8355d85a-f335-4e65-a3cc-37df8a5faaf0", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:51Z", "updated_at": "2020-12-14T02:17:51Z", "revision_number": 0, "project_id": "09ed02ef1af740cd91330b1da4c3cac2"}, {"id": "4b68a21c-b49b-4010-a1c5-9e11847d508b", "tenant_id": "09ed02ef1af740cd91330b1da4c3cac2", "security_group_id": "8355d85a-f335-4e65-a3cc-37df8a5faaf0", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "8355d85a-f335-4e65-a3cc-37df8a5faaf0", "description": null, "tags": [], "created_at": "2020-12-14T02:17:51Z", "updated_at": "2020-12-14T02:17:51Z", "revision_number": 0, "project_id": "09ed02ef1af740cd91330b1da4c3cac2"}, {"id": "b4c2c9d4-7ccd-4c34-815b-576057257995", "tenant_id": "09ed02ef1af740cd91330b1da4c3cac2", "security_group_id": "8355d85a-f335-4e65-a3cc-37df8a5faaf0", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "8355d85a-f335-4e65-a3cc-37df8a5faaf0", "description": null, "tags": [], "created_at": "2020-12-14T02:17:51Z", "updated_at": "2020-12-14T02:17:51Z", "revision_number": 0, "project_id": "09ed02ef1af740cd91330b1da4c3cac2"}], "tags": [], "created_at": "2020-12-14T02:17:51Z", "updated_at": "2020-12-14T02:17:51Z", "revision_number": 1, "project_id": "09ed02ef1af740cd91330b1da4c3cac2"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:00.801 186 INFO tempest.lib.common.rest_client [req-df9b7be7-c5a3-4614-9218-e960683a03e9 ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/ports?network_id=7b31d2ce-a194-467e-a554-37e06eca5476 0.132s 2020-12-14 02:18:00.805 186 DEBUG tempest.lib.common.rest_client [req-df9b7be7-c5a3-4614-9218-e960683a03e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1229', 'x-openstack-request-id': 'req-df9b7be7-c5a3-4614-9218-e960683a03e9', 'date': 'Mon, 14 Dec 2020 02:18:00 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?network_id=7b31d2ce-a194-467e-a554-37e06eca5476'} Body: b'{"ports":[{"id":"9cdbfe88-a608-4103-856c-d45a213d87d9","name":"","network_id":"7b31d2ce-a194-467e-a554-37e06eca5476","tenant_id":"4d2bab69895c4d7a955e71657b529b22","mac_address":"fa:16:3e:32:64:0b","admin_state_up":true,"status":"ACTIVE","device_id":"dhcpcf0aa1ad-fc1e-58c4-863b-aba14f17f098-7b31d2ce-a194-467e-a554-37e06eca5476","device_owner":"network:dhcp","fixed_ips":[{"subnet_id":"04a3f132-131b-4b4d-9d89-c34e861d6d5f","ip_address":"192.168.120.2"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":[],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"lf-virtual9","binding:vif_type":"ovs","binding:vif_details":{"connectivity":"l2","port_filter":true,"ovs_hybrid_plug":false,"datapath_type":"system","bridge_name":"br-int"},"port_security_enabled":false,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.2","hostname":"host-192-168-120-2","fqdn":"host-192-168-120-2.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:17:31Z","updated_at":"2020-12-14T02:17:37Z","revision_number":3,"project_id":"4d2bab69895c4d7a955e71657b529b22"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:00.931 193 INFO tempest.lib.common.rest_client [req-0bbbe2cb-6301-449f-9532-d2f599f8f474 ] Request (SegmentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/8355d85a-f335-4e65-a3cc-37df8a5faaf0 0.128s 2020-12-14 02:18:00.934 193 DEBUG tempest.lib.common.rest_client [req-0bbbe2cb-6301-449f-9532-d2f599f8f474 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-0bbbe2cb-6301-449f-9532-d2f599f8f474', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:00 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/8355d85a-f335-4e65-a3cc-37df8a5faaf0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:01.059 197 INFO tempest.lib.common.rest_client [req-b1972574-4fbd-4933-9753-50fd8dcae52f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.214s 2020-12-14 02:18:01.061 197 DEBUG tempest.lib.common.rest_client [req-b1972574-4fbd-4933-9753-50fd8dcae52f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b1972574-4fbd-4933-9753-50fd8dcae52f', 'x-compute-request-id': 'req-b1972574-4fbd-4933-9753-50fd8dcae52f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:01.073 193 INFO tempest.lib.common.rest_client [req-7477bfe2-b7f9-4564-b00f-df63cccc1f9e ] Request (SegmentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2 0.132s 2020-12-14 02:18:01.076 193 DEBUG tempest.lib.common.rest_client [req-7477bfe2-b7f9-4564-b00f-df63cccc1f9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7477bfe2-b7f9-4564-b00f-df63cccc1f9e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/09ed02ef1af740cd91330b1da4c3cac2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:01.204 193 INFO tempest.lib.common.rest_client [req-30b8aae1-836b-4246-977b-08bc92d51fce ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:18:01.207 193 DEBUG tempest.lib.common.rest_client [req-30b8aae1-836b-4246-977b-08bc92d51fce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30b8aae1-836b-4246-977b-08bc92d51fce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ZKR7YPxaTNa-Kk_20tcnRA"], "expires_at": "2020-12-14T03:18:01.000000Z", "issued_at": "2020-12-14T02:18:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:01.306 193 INFO tempest.lib.common.rest_client [req-e1e44d0f-a5b3-48be-9793-700b7b727f38 ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:18:01.308 193 DEBUG tempest.lib.common.rest_client [req-e1e44d0f-a5b3-48be-9793-700b7b727f38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1e44d0f-a5b3-48be-9793-700b7b727f38', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["piFuTC_YTT6IFiYtrwO2Fg"], "expires_at": "2020-12-14T03:18:01.000000Z", "issued_at": "2020-12-14T02:18:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:01.311 189 INFO tempest.lib.common.rest_client [req-2314aa68-bb0a-4505-902d-a70b5e4abd0d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.244s 2020-12-14 02:18:01.315 189 DEBUG tempest.lib.common.rest_client [req-2314aa68-bb0a-4505-902d-a70b5e4abd0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2314aa68-bb0a-4505-902d-a70b5e4abd0d', 'x-compute-request-id': 'req-2314aa68-bb0a-4505-902d-a70b5e4abd0d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:01.322 186 INFO tempest.lib.common.rest_client [req-41011fd0-1b6d-4fc9-8eaa-a2202c6e7277 ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/9cdbfe88-a608-4103-856c-d45a213d87d9 0.512s 2020-12-14 02:18:01.325 186 DEBUG tempest.lib.common.rest_client [req-41011fd0-1b6d-4fc9-8eaa-a2202c6e7277 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-41011fd0-1b6d-4fc9-8eaa-a2202c6e7277', 'date': 'Mon, 14 Dec 2020 02:18:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/9cdbfe88-a608-4103-856c-d45a213d87d9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:01.392 193 INFO tempest.lib.common.rest_client [req-3b910f59-c2d9-4e42-97eb-61c6b8e6e18e ] Request (SubnetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.075s 2020-12-14 02:18:01.395 193 DEBUG tempest.lib.common.rest_client [req-3b910f59-c2d9-4e42-97eb-61c6b8e6e18e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b910f59-c2d9-4e42-97eb-61c6b8e6e18e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:01.479 193 INFO tempest.lib.common.rest_client [req-ae73bc92-e5ac-4d5e-8d67-6339a219a138 ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.077s 2020-12-14 02:18:01.482 193 DEBUG tempest.lib.common.rest_client [req-ae73bc92-e5ac-4d5e-8d67-6339a219a138 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SubnetsRbacTest-374126046-desc", "domain_id": "default", "name": "tempest-SubnetsRbacTest-374126046"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '366', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae73bc92-e5ac-4d5e-8d67-6339a219a138', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "12d048179fb14bb8a94e7bbc84eb0550", "name": "tempest-SubnetsRbacTest-374126046", "domain_id": "default", "description": "tempest-SubnetsRbacTest-374126046-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:01.616 193 INFO tempest.lib.common.rest_client [req-35bd5195-5ff8-471c-9fb2-1831e4df1600 ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.125s 2020-12-14 02:18:01.618 193 DEBUG tempest.lib.common.rest_client [req-35bd5195-5ff8-471c-9fb2-1831e4df1600 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SubnetsRbacTest-374126046", "password": "N2~=VkFr^w6uNpx", "project_id": "12d048179fb14bb8a94e7bbc84eb0550", "email": "tempest-SubnetsRbacTest-1613045967@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '385', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-35bd5195-5ff8-471c-9fb2-1831e4df1600', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "12d048179fb14bb8a94e7bbc84eb0550", "email": "tempest-SubnetsRbacTest-1613045967@example.com", "id": "22f5a3734ecd428098da5655a803ea05", "name": "tempest-SubnetsRbacTest-374126046", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/22f5a3734ecd428098da5655a803ea05"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:01.690 193 INFO tempest.lib.common.rest_client [req-8821d8dd-660b-47c0-80e9-ba35691c9ee1 ] Request (SubnetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.065s 2020-12-14 02:18:01.692 193 DEBUG tempest.lib.common.rest_client [req-8821d8dd-660b-47c0-80e9-ba35691c9ee1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8821d8dd-660b-47c0-80e9-ba35691c9ee1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:01.760 193 INFO tempest.lib.common.rest_client [req-08ac1d4b-7f24-4d11-947e-9fa34d30f157 ] Request (SubnetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-12-14 02:18:01.763 193 DEBUG tempest.lib.common.rest_client [req-08ac1d4b-7f24-4d11-947e-9fa34d30f157 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-08ac1d4b-7f24-4d11-947e-9fa34d30f157', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:01.770 186 INFO tempest.lib.common.rest_client [req-dbc8e22d-7b1e-4b83-a939-ca6af7b2df8a ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/04a3f132-131b-4b4d-9d89-c34e861d6d5f 0.439s 2020-12-14 02:18:01.773 186 DEBUG tempest.lib.common.rest_client [req-dbc8e22d-7b1e-4b83-a939-ca6af7b2df8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-dbc8e22d-7b1e-4b83-a939-ca6af7b2df8a', 'date': 'Mon, 14 Dec 2020 02:18:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/04a3f132-131b-4b4d-9d89-c34e861d6d5f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:01.865 193 INFO tempest.lib.common.rest_client [req-2053550c-db48-41a0-8527-23ccd3969685 ] Request (SubnetsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles/72a4576c553448cd941b052c1ca0cf2d 0.091s 2020-12-14 02:18:01.868 193 DEBUG tempest.lib.common.rest_client [req-2053550c-db48-41a0-8527-23ccd3969685 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2053550c-db48-41a0-8527-23ccd3969685', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:01.871 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SubnetsRbacTest-374126046', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '12d048179fb14bb8a94e7bbc84eb0550', 'project_name': 'tempest-SubnetsRbacTest-374126046', 'tenant_id': '12d048179fb14bb8a94e7bbc84eb0550', 'tenant_name': 'tempest-SubnetsRbacTest-374126046', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '22f5a3734ecd428098da5655a803ea05'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:01.873 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SubnetsRbacTest-374126046', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '12d048179fb14bb8a94e7bbc84eb0550', 'project_name': 'tempest-SubnetsRbacTest-374126046', 'tenant_id': '12d048179fb14bb8a94e7bbc84eb0550', 'tenant_name': 'tempest-SubnetsRbacTest-374126046', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '22f5a3734ecd428098da5655a803ea05'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:02.055 193 INFO tempest.lib.common.rest_client [req-86c0493b-179c-4dce-b885-fb3b9ba0d04e ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.121s 2020-12-14 02:18:02.058 193 DEBUG tempest.lib.common.rest_client [req-86c0493b-179c-4dce-b885-fb3b9ba0d04e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6559', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-86c0493b-179c-4dce-b885-fb3b9ba0d04e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22f5a3734ecd428098da5655a803ea05", "name": "tempest-SubnetsRbacTest-374126046", "password_expires_at": null}, "audit_ids": ["G85_CqrZTq-QxdFlKl0bCg"], "expires_at": "2020-12-14T03:18:01.000000Z", "issued_at": "2020-12-14T02:18:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "12d048179fb14bb8a94e7bbc84eb0550", "name": "tempest-SubnetsRbacTest-374126046"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/im _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:02.166 193 INFO tempest.lib.common.rest_client [req-e879f034-65fe-42f1-aa93-d65bb8fa773e ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:18:02.169 193 DEBUG tempest.lib.common.rest_client [req-e879f034-65fe-42f1-aa93-d65bb8fa773e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e879f034-65fe-42f1-aa93-d65bb8fa773e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["1Uw9P8dbTNWJFEvkCpJLLA"], "expires_at": "2020-12-14T03:18:02.000000Z", "issued_at": "2020-12-14T02:18:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:02.278 193 INFO tempest.lib.common.rest_client [req-b32276b3-55a1-469f-aea7-a8619a4be058 ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:18:02.281 193 DEBUG tempest.lib.common.rest_client [req-b32276b3-55a1-469f-aea7-a8619a4be058 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b32276b3-55a1-469f-aea7-a8619a4be058', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["u9SmqZX-Rd6aVB8dSGXDKw"], "expires_at": "2020-12-14T03:18:02.000000Z", "issued_at": "2020-12-14T02:18:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:02.344 193 INFO tempest.lib.common.rest_client [req-e104c524-2db8-407d-a2ac-e5487994f8d2 ] Request (SubnetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.056s 2020-12-14 02:18:02.346 193 DEBUG tempest.lib.common.rest_client [req-e104c524-2db8-407d-a2ac-e5487994f8d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e104c524-2db8-407d-a2ac-e5487994f8d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:02.390 186 INFO tempest.lib.common.rest_client [req-d8df7415-c1a5-4fab-ab8a-fbe1297516d9 ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/7b31d2ce-a194-467e-a554-37e06eca5476 0.612s 2020-12-14 02:18:02.392 186 DEBUG tempest.lib.common.rest_client [req-d8df7415-c1a5-4fab-ab8a-fbe1297516d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-d8df7415-c1a5-4fab-ab8a-fbe1297516d9', 'date': 'Mon, 14 Dec 2020 02:18:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/7b31d2ce-a194-467e-a554-37e06eca5476'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:02.393 197 INFO tempest.lib.common.rest_client [req-f36ac599-8930-42a7-befe-db8580785eff ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.224s 2020-12-14 02:18:02.396 197 DEBUG tempest.lib.common.rest_client [req-f36ac599-8930-42a7-befe-db8580785eff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f36ac599-8930-42a7-befe-db8580785eff', 'x-compute-request-id': 'req-f36ac599-8930-42a7-befe-db8580785eff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:02.406 193 INFO tempest.lib.common.rest_client [req-7c0756e8-5fd7-4827-a270-d53d9a1feb72 ] Request (SubnetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-12-14 02:18:02.409 193 DEBUG tempest.lib.common.rest_client [req-7c0756e8-5fd7-4827-a270-d53d9a1feb72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7c0756e8-5fd7-4827-a270-d53d9a1feb72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:02.413 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:18:02.415 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:02.481 193 INFO tempest.lib.common.rest_client [req-f7922c8f-3235-419e-bbde-9468f3f74996 ] Request (SubnetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles 0.060s 2020-12-14 02:18:02.483 193 DEBUG tempest.lib.common.rest_client [req-f7922c8f-3235-419e-bbde-9468f3f74996 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7922c8f-3235-419e-bbde-9468f3f74996', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:02.556 193 INFO tempest.lib.common.rest_client [req-90365e6c-33ae-4c40-938c-bfc3dbf1769c ] Request (SubnetsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-12-14 02:18:02.560 186 INFO tempest.lib.common.rest_client [req-4834a502-f478-4583-bb36-5aa03defb4ff ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5 0.162s 2020-12-14 02:18:02.559 193 DEBUG tempest.lib.common.rest_client [req-90365e6c-33ae-4c40-938c-bfc3dbf1769c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90365e6c-33ae-4c40-938c-bfc3dbf1769c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:02.562 186 DEBUG tempest.lib.common.rest_client [req-4834a502-f478-4583-bb36-5aa03defb4ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4834a502-f478-4583-bb36-5aa03defb4ff', 'x-compute-request-id': 'req-4834a502-f478-4583-bb36-5aa03defb4ff', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:02.686 193 INFO tempest.lib.common.rest_client [req-f849bf44-63a8-464f-b372-8b6f4f2723fb ] Request (SubnetsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles/a629c95d64b3416fb80ae90af4f69c05 0.120s 2020-12-14 02:18:02.689 193 DEBUG tempest.lib.common.rest_client [req-f849bf44-63a8-464f-b372-8b6f4f2723fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f849bf44-63a8-464f-b372-8b6f4f2723fb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:02.690 189 INFO tempest.lib.common.rest_client [req-12764899-a977-41c4-b939-22ae51445039 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.265s 2020-12-14 02:18:02.693 189 DEBUG tempest.lib.common.rest_client [req-12764899-a977-41c4-b939-22ae51445039 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-12764899-a977-41c4-b939-22ae51445039', 'x-compute-request-id': 'req-12764899-a977-41c4-b939-22ae51445039', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:02.992 186 INFO tempest.lib.common.rest_client [req-21254e8d-31ec-49a0-a78f-75a9337b48c3 ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5 0.423s 2020-12-14 02:18:02.995 186 DEBUG tempest.lib.common.rest_client [req-21254e8d-31ec-49a0-a78f-75a9337b48c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1862', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-21254e8d-31ec-49a0-a78f-75a9337b48c3', 'x-compute-request-id': 'req-21254e8d-31ec-49a0-a78f-75a9337b48c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5'} Body: b'{"server": {"id": "703b2245-e2b9-43e1-b086-817fa53745e5", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-1217856526", "status": "ACTIVE", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "user_id": "c9c6177d06e54d90aff506ccfab61ac9", "metadata": {}, "hostId": "f3f1330a55f2bf3bdba617cc0942961ee900f44468a170a0467a6a0e", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:17:21Z", "updated": "2020-12-14T02:18:03Z", "addresses": {"tempest-MiscPolicyActionsNetworkRbacTest-959755476-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:0c:4f:91"}, {"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:0c:4f:91"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:17:29.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:03.718 197 INFO tempest.lib.common.rest_client [req-65821576-cd3f-4ccb-b80d-72e0e79527b6 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.219s 2020-12-14 02:18:03.721 197 DEBUG tempest.lib.common.rest_client [req-65821576-cd3f-4ccb-b80d-72e0e79527b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-65821576-cd3f-4ccb-b80d-72e0e79527b6', 'x-compute-request-id': 'req-65821576-cd3f-4ccb-b80d-72e0e79527b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:03.776 193 INFO tempest.lib.common.rest_client [req-bb985cf6-baf0-46c8-bf04-39f61cc0b94b ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-12-14 02:18:03.779 193 DEBUG tempest.lib.common.rest_client [req-bb985cf6-baf0-46c8-bf04-39f61cc0b94b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb985cf6-baf0-46c8-bf04-39f61cc0b94b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22f5a3734ecd428098da5655a803ea05", "name": "tempest-SubnetsRbacTest-374126046", "password_expires_at": null}, "audit_ids": ["8a5HL7XFSMOH8BxSjgTg1w"], "expires_at": "2020-12-14T03:18:03.000000Z", "issued_at": "2020-12-14T02:18:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "12d048179fb14bb8a94e7bbc84eb0550", "name": "tempest-SubnetsRbacTest-374126046"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:04.024 189 INFO tempest.lib.common.rest_client [req-40aa6f05-b83f-4468-99da-30b6c2f37cc2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.224s 2020-12-14 02:18:04.026 189 DEBUG tempest.lib.common.rest_client [req-40aa6f05-b83f-4468-99da-30b6c2f37cc2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-40aa6f05-b83f-4468-99da-30b6c2f37cc2', 'x-compute-request-id': 'req-40aa6f05-b83f-4468-99da-30b6c2f37cc2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:04.259 193 INFO tempest.lib.common.rest_client [req-28ca0ad2-ad5b-48e7-9ac6-80b7b64128b7 ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.468s 2020-12-14 02:18:04.262 193 DEBUG tempest.lib.common.rest_client [req-28ca0ad2-ad5b-48e7-9ac6-80b7b64128b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-SubnetsRbacTest-test-network-1143677363"}} Response - Headers: {'content-type': 'application/json', 'content-length': '736', 'x-openstack-request-id': 'req-28ca0ad2-ad5b-48e7-9ac6-80b7b64128b7', 'date': 'Mon, 14 Dec 2020 02:18:04 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b","name":"tempest-SubnetsRbacTest-test-network-1143677363","tenant_id":"12d048179fb14bb8a94e7bbc84eb0550","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"12d048179fb14bb8a94e7bbc84eb0550","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":43,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:18:04Z","updated_at":"2020-12-14T02:18:04Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:04.272 186 INFO tempest.lib.common.rest_client [req-407d09e8-e33f-4723-b5e3-72e478d6c7d2 ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5 0.167s 2020-12-14 02:18:04.276 186 DEBUG tempest.lib.common.rest_client [req-407d09e8-e33f-4723-b5e3-72e478d6c7d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1660', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-407d09e8-e33f-4723-b5e3-72e478d6c7d2', 'x-compute-request-id': 'req-407d09e8-e33f-4723-b5e3-72e478d6c7d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5'} Body: b'{"server": {"id": "703b2245-e2b9-43e1-b086-817fa53745e5", "name": "tempest-MiscPolicyActionsNetworkRbacTest-server-1217856526", "status": "DELETED", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "user_id": "c9c6177d06e54d90aff506ccfab61ac9", "metadata": {}, "hostId": "f3f1330a55f2bf3bdba617cc0942961ee900f44468a170a0467a6a0e", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:17:21Z", "updated": "2020-12-14T02:18:04Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/703b2245-e2b9-43e1-b086-817fa53745e5"}], "OS-DCF:diskConfig": "MANUAL", "fault": {"code": 404, "created": "2020-12-14T02:17:50Z", "message": "Port f4bcd52b-2260-4991-8052-c5d7c8072955 is not attached"}, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:17:29.000000", "OS-SRV-USG:terminated_at": "2020-12-14T02:18:04.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:04.373 186 INFO tempest.common.waiters [-] State transition "ACTIVE/deleting" ==> "DELETED/None" after 1 second wait 2020-12-14 02:18:04.992 193 INFO tempest.lib.common.rest_client [req-a6216c89-32c3-412d-a1f7-010f28c186d2 ] Request (SubnetsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.721s 2020-12-14 02:18:04.996 193 DEBUG tempest.lib.common.rest_client [req-a6216c89-32c3-412d-a1f7-010f28c186d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b", "cidr": "192.168.120.0/28", "ip_version": 4, "gateway_ip": "192.168.120.1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '661', 'x-openstack-request-id': 'req-a6216c89-32c3-412d-a1f7-010f28c186d2', 'date': 'Mon, 14 Dec 2020 02:18:04 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"8d0bead9-07c3-43f7-9065-04623b4a4d94","name":"","tenant_id":"12d048179fb14bb8a94e7bbc84eb0550","network_id":"16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:18:04Z","updated_at":"2020-12-14T02:18:04Z","revision_number":0,"project_id":"12d048179fb14bb8a94e7bbc84eb0550"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:05.003 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:05.015 197 INFO tempest.lib.common.rest_client [req-61dbbe05-c3f8-4037-adb1-a12236095a52 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.210s 2020-12-14 02:18:05.018 197 DEBUG tempest.lib.common.rest_client [req-61dbbe05-c3f8-4037-adb1-a12236095a52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-61dbbe05-c3f8-4037-adb1-a12236095a52', 'x-compute-request-id': 'req-61dbbe05-c3f8-4037-adb1-a12236095a52', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:05.027 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_subnet, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:05.029 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:05.156 193 INFO tempest.lib.common.rest_client [req-13fa025c-601d-4f32-a28b-5dc11923a8ad ] Request (SubnetsRbacTest:test_create_subnet): 200 GET http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles 0.121s 2020-12-14 02:18:05.159 193 DEBUG tempest.lib.common.rest_client [req-13fa025c-601d-4f32-a28b-5dc11923a8ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13fa025c-601d-4f32-a28b-5dc11923a8ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:05.211 193 INFO tempest.lib.common.rest_client [req-f13b7b3b-9f62-4d4d-9ae7-802783523dd0 ] Request (SubnetsRbacTest:test_create_subnet): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:18:05.214 193 DEBUG tempest.lib.common.rest_client [req-f13b7b3b-9f62-4d4d-9ae7-802783523dd0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f13b7b3b-9f62-4d4d-9ae7-802783523dd0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22f5a3734ecd428098da5655a803ea05", "name": "tempest-SubnetsRbacTest-374126046", "password_expires_at": null}, "audit_ids": ["LNjERFeWSpOZhcedM3rT3g"], "expires_at": "2020-12-14T03:18:05.000000Z", "issued_at": "2020-12-14T02:18:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "12d048179fb14bb8a94e7bbc84eb0550", "name": "tempest-SubnetsRbacTest-374126046"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:05.387 189 INFO tempest.lib.common.rest_client [req-389341cc-9a79-43f8-8064-331bd7d95440 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.246s 2020-12-14 02:18:05.390 189 DEBUG tempest.lib.common.rest_client [req-389341cc-9a79-43f8-8064-331bd7d95440 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-389341cc-9a79-43f8-8064-331bd7d95440', 'x-compute-request-id': 'req-389341cc-9a79-43f8-8064-331bd7d95440', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:05.461 186 INFO tempest.lib.common.rest_client [req-cb9df3ec-1f9f-494e-9971-ba4cb8b0f6f5 ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5 0.080s 2020-12-14 02:18:05.464 186 DEBUG tempest.lib.common.rest_client [req-cb9df3ec-1f9f-494e-9971-ba4cb8b0f6f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-cb9df3ec-1f9f-494e-9971-ba4cb8b0f6f5', 'x-compute-request-id': 'req-cb9df3ec-1f9f-494e-9971-ba4cb8b0f6f5', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/703b2245-e2b9-43e1-b086-817fa53745e5'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 703b2245-e2b9-43e1-b086-817fa53745e5 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:05.467 186 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '29581da7-daeb-44b2-aca1-c64c19d19bbc', 'name': 'tempest-MiscPolicyActionsNetworkRbacTest-959755476-network', 'tenant_id': '4d2bab69895c4d7a955e71657b529b22', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '4d2bab69895c4d7a955e71657b529b22', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 29, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:17:13Z', 'updated_at': '2020-12-14T02:17:13Z', 'revision_number': 1}, subnet: {'id': '64e5b2f0-5db9-4af2-a449-12d34efa3b51', 'name': 'tempest-MiscPolicyActionsNetworkRbacTest-959755476-subnet', 'tenant_id': '4d2bab69895c4d7a955e71657b529b22', 'network_id': '29581da7-daeb-44b2-aca1-c64c19d19bbc', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': True, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:17:13Z', 'updated_at': '2020-12-14T02:17:13Z', 'revision_number': 0, 'project_id': '4d2bab69895c4d7a955e71657b529b22'}, router: {'id': 'eb12d6b6-5d03-468f-b288-883bad2a8983', 'name': 'tempest-MiscPolicyActionsNetworkRbacTest-959755476-router', 'tenant_id': '4d2bab69895c4d7a955e71657b529b22', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.253'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::1ff'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:17:14Z', 'updated_at': '2020-12-14T02:17:15Z', 'revision_number': 3, 'project_id': '4d2bab69895c4d7a955e71657b529b22'} _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:18:05.646 193 INFO tempest.lib.common.rest_client [req-3a48e503-cf36-4c6c-b8d6-4202a522cbcd ] Request (SubnetsRbacTest:test_create_subnet): 400 POST http://172.30.13.94:9696/v2.0/subnets 0.421s 2020-12-14 02:18:05.650 193 DEBUG tempest.lib.common.rest_client [req-3a48e503-cf36-4c6c-b8d6-4202a522cbcd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b", "cidr": "192.168.120.0/28", "ip_version": 4, "gateway_ip": "192.168.120.1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '224', 'x-openstack-request-id': 'req-3a48e503-cf36-4c6c-b8d6-4202a522cbcd', 'date': 'Mon, 14 Dec 2020 02:18:05 GMT', 'connection': 'close', 'status': '400', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"NeutronError": {"type": "InvalidInput", "message": "Invalid input for operation: Requested subnet with cidr: 192.168.120.0/28 for network: 16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b overlaps with another subnet.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:06.358 197 INFO tempest.lib.common.rest_client [req-c86098b2-7ea9-48aa-a481-00645bd31905 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.262s 2020-12-14 02:18:06.362 197 DEBUG tempest.lib.common.rest_client [req-c86098b2-7ea9-48aa-a481-00645bd31905 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c86098b2-7ea9-48aa-a481-00645bd31905', 'x-compute-request-id': 'req-c86098b2-7ea9-48aa-a481-00645bd31905', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:06.366 193 INFO tempest.lib.common.rest_client [req-bd2e1b3c-012a-4040-bb90-448d3e8e6f44 ] Request (SubnetsRbacTest:test_create_subnet): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.708s 2020-12-14 02:18:06.370 193 DEBUG tempest.lib.common.rest_client [req-bd2e1b3c-012a-4040-bb90-448d3e8e6f44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b", "cidr": "192.168.120.16/28", "ip_version": 4, "gateway_ip": "192.168.120.17"}} Response - Headers: {'content-type': 'application/json', 'content-length': '664', 'x-openstack-request-id': 'req-bd2e1b3c-012a-4040-bb90-448d3e8e6f44', 'date': 'Mon, 14 Dec 2020 02:18:06 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"8bd621bc-4ecc-491f-afd9-5fb450558e9e","name":"","tenant_id":"12d048179fb14bb8a94e7bbc84eb0550","network_id":"16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.17","cidr":"192.168.120.16/28","allocation_pools":[{"start":"192.168.120.18","end":"192.168.120.30"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:18:05Z","updated_at":"2020-12-14T02:18:05Z","revision_number":0,"project_id":"12d048179fb14bb8a94e7bbc84eb0550"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:06.374 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:06.439 193 INFO tempest.lib.common.rest_client [req-7886b1d5-c220-4154-be52-e8a076c65050 ] Request (SubnetsRbacTest:test_create_subnet): 200 GET http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles 0.059s 2020-12-14 02:18:06.442 193 DEBUG tempest.lib.common.rest_client [req-7886b1d5-c220-4154-be52-e8a076c65050 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7886b1d5-c220-4154-be52-e8a076c65050', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:06.574 193 INFO tempest.lib.common.rest_client [req-faf17e69-39da-4ecc-9f5b-5dd2082bfff2 ] Request (SubnetsRbacTest:test_create_subnet): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.125s 2020-12-14 02:18:06.578 193 DEBUG tempest.lib.common.rest_client [req-faf17e69-39da-4ecc-9f5b-5dd2082bfff2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-faf17e69-39da-4ecc-9f5b-5dd2082bfff2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22f5a3734ecd428098da5655a803ea05", "name": "tempest-SubnetsRbacTest-374126046", "password_expires_at": null}, "audit_ids": ["dsyO1dl8Sj6hDn8jExcp-A"], "expires_at": "2020-12-14T03:18:06.000000Z", "issued_at": "2020-12-14T02:18:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "12d048179fb14bb8a94e7bbc84eb0550", "name": "tempest-SubnetsRbacTest-374126046"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:06.593 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:06.619 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subnet, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:06.621 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:06.645 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_subnet, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:06.720 189 INFO tempest.lib.common.rest_client [req-5161b1c3-8356-422a-8ada-58fec5abd231 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.222s 2020-12-14 02:18:06.723 189 DEBUG tempest.lib.common.rest_client [req-5161b1c3-8356-422a-8ada-58fec5abd231 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5161b1c3-8356-422a-8ada-58fec5abd231', 'x-compute-request-id': 'req-5161b1c3-8356-422a-8ada-58fec5abd231', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:07.065 193 INFO tempest.lib.common.rest_client [req-7f9c415b-c33c-4f79-875f-4de6400e40e6 ] Request (SubnetsRbacTest:test_delete_subnet): 400 POST http://172.30.13.94:9696/v2.0/subnets 0.412s 2020-12-14 02:18:07.068 193 DEBUG tempest.lib.common.rest_client [req-7f9c415b-c33c-4f79-875f-4de6400e40e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b", "cidr": "192.168.120.0/28", "ip_version": 4, "gateway_ip": "192.168.120.1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '224', 'x-openstack-request-id': 'req-7f9c415b-c33c-4f79-875f-4de6400e40e6', 'date': 'Mon, 14 Dec 2020 02:18:07 GMT', 'connection': 'close', 'status': '400', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"NeutronError": {"type": "InvalidInput", "message": "Invalid input for operation: Requested subnet with cidr: 192.168.120.0/28 for network: 16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b overlaps with another subnet.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:07.428 193 INFO tempest.lib.common.rest_client [req-042bbe20-a3b6-462a-bc05-2b224d73fb2e ] Request (SubnetsRbacTest:test_delete_subnet): 400 POST http://172.30.13.94:9696/v2.0/subnets 0.352s 2020-12-14 02:18:07.432 193 DEBUG tempest.lib.common.rest_client [req-042bbe20-a3b6-462a-bc05-2b224d73fb2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b", "cidr": "192.168.120.16/28", "ip_version": 4, "gateway_ip": "192.168.120.17"}} Response - Headers: {'content-type': 'application/json', 'content-length': '225', 'x-openstack-request-id': 'req-042bbe20-a3b6-462a-bc05-2b224d73fb2e', 'date': 'Mon, 14 Dec 2020 02:18:07 GMT', 'connection': 'close', 'status': '400', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"NeutronError": {"type": "InvalidInput", "message": "Invalid input for operation: Requested subnet with cidr: 192.168.120.16/28 for network: 16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b overlaps with another subnet.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:07.442 186 INFO tempest.lib.common.rest_client [req-29815a57-5bd5-420d-9d9d-d7ed801b9b1c ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/eb12d6b6-5d03-468f-b288-883bad2a8983/remove_router_interface 1.968s 2020-12-14 02:18:07.445 186 DEBUG tempest.lib.common.rest_client [req-29815a57-5bd5-420d-9d9d-d7ed801b9b1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-29815a57-5bd5-420d-9d9d-d7ed801b9b1c', 'date': 'Mon, 14 Dec 2020 02:18:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/eb12d6b6-5d03-468f-b288-883bad2a8983/remove_router_interface'} Body: b'{"id": "eb12d6b6-5d03-468f-b288-883bad2a8983", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "port_id": "a859285c-600b-46cb-98ba-4b1c171fdb9d", "network_id": "29581da7-daeb-44b2-aca1-c64c19d19bbc", "subnet_id": "64e5b2f0-5db9-4af2-a449-12d34efa3b51", "subnet_ids": ["64e5b2f0-5db9-4af2-a449-12d34efa3b51"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:07.807 197 INFO tempest.lib.common.rest_client [req-93c05548-b0e0-4da2-a022-a61e1c4350de ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.339s 2020-12-14 02:18:07.810 197 DEBUG tempest.lib.common.rest_client [req-93c05548-b0e0-4da2-a022-a61e1c4350de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-93c05548-b0e0-4da2-a022-a61e1c4350de', 'x-compute-request-id': 'req-93c05548-b0e0-4da2-a022-a61e1c4350de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:08.060 189 INFO tempest.lib.common.rest_client [req-a1d05c8d-f745-4620-a3d4-6f518e4bea44 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.229s 2020-12-14 02:18:08.063 189 DEBUG tempest.lib.common.rest_client [req-a1d05c8d-f745-4620-a3d4-6f518e4bea44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a1d05c8d-f745-4620-a3d4-6f518e4bea44', 'x-compute-request-id': 'req-a1d05c8d-f745-4620-a3d4-6f518e4bea44', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:08.174 193 INFO tempest.lib.common.rest_client [req-1d349a1e-6c5f-4387-a65f-d8a693db8c1f ] Request (SubnetsRbacTest:test_delete_subnet): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.734s 2020-12-14 02:18:08.177 193 DEBUG tempest.lib.common.rest_client [req-1d349a1e-6c5f-4387-a65f-d8a693db8c1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b", "cidr": "192.168.120.32/28", "ip_version": 4, "gateway_ip": "192.168.120.33"}} Response - Headers: {'content-type': 'application/json', 'content-length': '664', 'x-openstack-request-id': 'req-1d349a1e-6c5f-4387-a65f-d8a693db8c1f', 'date': 'Mon, 14 Dec 2020 02:18:08 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"5eb357bd-9aa1-40fc-ab6b-ae996f0a9de0","name":"","tenant_id":"12d048179fb14bb8a94e7bbc84eb0550","network_id":"16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.33","cidr":"192.168.120.32/28","allocation_pools":[{"start":"192.168.120.34","end":"192.168.120.46"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:18:07Z","updated_at":"2020-12-14T02:18:07Z","revision_number":0,"project_id":"12d048179fb14bb8a94e7bbc84eb0550"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:08.181 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:08.246 193 INFO tempest.lib.common.rest_client [req-a57baa95-4e35-43fe-ac37-24f43e86f6a9 ] Request (SubnetsRbacTest:test_delete_subnet): 200 GET http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles 0.058s 2020-12-14 02:18:08.250 193 DEBUG tempest.lib.common.rest_client [req-a57baa95-4e35-43fe-ac37-24f43e86f6a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a57baa95-4e35-43fe-ac37-24f43e86f6a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:08.295 193 INFO tempest.lib.common.rest_client [req-bb1fe6a2-571d-4d9c-9a5f-0e74264d3abf ] Request (SubnetsRbacTest:test_delete_subnet): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:18:08.300 193 DEBUG tempest.lib.common.rest_client [req-bb1fe6a2-571d-4d9c-9a5f-0e74264d3abf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb1fe6a2-571d-4d9c-9a5f-0e74264d3abf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22f5a3734ecd428098da5655a803ea05", "name": "tempest-SubnetsRbacTest-374126046", "password_expires_at": null}, "audit_ids": ["SP_U6TbsSfyyJI1olFipBA"], "expires_at": "2020-12-14T03:18:08.000000Z", "issued_at": "2020-12-14T02:18:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "12d048179fb14bb8a94e7bbc84eb0550", "name": "tempest-SubnetsRbacTest-374126046"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:08.752 186 INFO tempest.lib.common.rest_client [req-e3c980d1-c0d8-4946-937e-88ddae002722 ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/eb12d6b6-5d03-468f-b288-883bad2a8983 1.301s 2020-12-14 02:18:08.757 186 DEBUG tempest.lib.common.rest_client [req-e3c980d1-c0d8-4946-937e-88ddae002722 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e3c980d1-c0d8-4946-937e-88ddae002722', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/eb12d6b6-5d03-468f-b288-883bad2a8983'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:08.832 193 INFO tempest.lib.common.rest_client [req-7b54124e-79d7-4824-8547-40308fcfba13 ] Request (SubnetsRbacTest:test_delete_subnet): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/5eb357bd-9aa1-40fc-ab6b-ae996f0a9de0 0.525s 2020-12-14 02:18:08.835 193 DEBUG tempest.lib.common.rest_client [req-7b54124e-79d7-4824-8547-40308fcfba13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-7b54124e-79d7-4824-8547-40308fcfba13', 'date': 'Mon, 14 Dec 2020 02:18:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/5eb357bd-9aa1-40fc-ab6b-ae996f0a9de0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:08.838 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:08.899 193 INFO tempest.lib.common.rest_client [req-6dca169d-adc3-44d0-8791-785c771c70f9 ] Request (SubnetsRbacTest:test_delete_subnet): 200 GET http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles 0.054s 2020-12-14 02:18:08.902 193 DEBUG tempest.lib.common.rest_client [req-6dca169d-adc3-44d0-8791-785c771c70f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6dca169d-adc3-44d0-8791-785c771c70f9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:08.953 193 INFO tempest.lib.common.rest_client [req-0bb81641-2fb4-4182-a981-1d6815c9a533 ] Request (SubnetsRbacTest:test_delete_subnet): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:18:08.955 193 DEBUG tempest.lib.common.rest_client [req-0bb81641-2fb4-4182-a981-1d6815c9a533 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0bb81641-2fb4-4182-a981-1d6815c9a533', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22f5a3734ecd428098da5655a803ea05", "name": "tempest-SubnetsRbacTest-374126046", "password_expires_at": null}, "audit_ids": ["D6khIl-oRnG-mRkTILMaZQ"], "expires_at": "2020-12-14T03:18:08.000000Z", "issued_at": "2020-12-14T02:18:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "12d048179fb14bb8a94e7bbc84eb0550", "name": "tempest-SubnetsRbacTest-374126046"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:08.970 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:08.995 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subnet, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:08.997 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:09.074 193 INFO tempest.lib.common.rest_client [req-1e49f09d-72e5-4068-8dd0-513040998839 ] Request (SubnetsRbacTest:test_list_subnets): 200 GET http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles 0.070s 2020-12-14 02:18:09.078 193 DEBUG tempest.lib.common.rest_client [req-1e49f09d-72e5-4068-8dd0-513040998839 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e49f09d-72e5-4068-8dd0-513040998839', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:09.132 197 INFO tempest.lib.common.rest_client [req-791ad99c-a8ca-44b1-887a-0b6907e13969 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.200s 2020-12-14 02:18:09.134 193 INFO tempest.lib.common.rest_client [req-fc1d64a6-b2d8-4f1c-9063-6dbd9d844b85 ] Request (SubnetsRbacTest:test_list_subnets): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:18:09.135 197 DEBUG tempest.lib.common.rest_client [req-791ad99c-a8ca-44b1-887a-0b6907e13969 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-791ad99c-a8ca-44b1-887a-0b6907e13969', 'x-compute-request-id': 'req-791ad99c-a8ca-44b1-887a-0b6907e13969', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:09.136 193 DEBUG tempest.lib.common.rest_client [req-fc1d64a6-b2d8-4f1c-9063-6dbd9d844b85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc1d64a6-b2d8-4f1c-9063-6dbd9d844b85', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22f5a3734ecd428098da5655a803ea05", "name": "tempest-SubnetsRbacTest-374126046", "password_expires_at": null}, "audit_ids": ["qqpBiuqARH6bqG4pG5AfJg"], "expires_at": "2020-12-14T03:18:09.000000Z", "issued_at": "2020-12-14T02:18:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "12d048179fb14bb8a94e7bbc84eb0550", "name": "tempest-SubnetsRbacTest-374126046"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:09.282 193 INFO tempest.lib.common.rest_client [req-d3857bc1-5f75-4087-9261-f3ff58f38cce ] Request (SubnetsRbacTest:test_list_subnets): 200 GET http://172.30.13.94:9696/v2.0/subnets?id=8d0bead9-07c3-43f7-9065-04623b4a4d94 0.138s 2020-12-14 02:18:09.286 193 DEBUG tempest.lib.common.rest_client [req-d3857bc1-5f75-4087-9261-f3ff58f38cce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '664', 'x-openstack-request-id': 'req-d3857bc1-5f75-4087-9261-f3ff58f38cce', 'date': 'Mon, 14 Dec 2020 02:18:09 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets?id=8d0bead9-07c3-43f7-9065-04623b4a4d94'} Body: b'{"subnets":[{"id":"8d0bead9-07c3-43f7-9065-04623b4a4d94","name":"","tenant_id":"12d048179fb14bb8a94e7bbc84eb0550","network_id":"16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:18:04Z","updated_at":"2020-12-14T02:18:04Z","revision_number":0,"project_id":"12d048179fb14bb8a94e7bbc84eb0550"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:09.291 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:09.359 193 INFO tempest.lib.common.rest_client [req-c9d40e9e-e1c0-4b78-ad9d-9751fca32347 ] Request (SubnetsRbacTest:test_list_subnets): 200 GET http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles 0.062s 2020-12-14 02:18:09.362 193 DEBUG tempest.lib.common.rest_client [req-c9d40e9e-e1c0-4b78-ad9d-9751fca32347 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9d40e9e-e1c0-4b78-ad9d-9751fca32347', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:09.367 186 INFO tempest.lib.common.rest_client [req-b18bb841-af70-48b4-ad6b-4a9bf5f42b6e ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/64e5b2f0-5db9-4af2-a449-12d34efa3b51 0.601s 2020-12-14 02:18:09.369 186 DEBUG tempest.lib.common.rest_client [req-b18bb841-af70-48b4-ad6b-4a9bf5f42b6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-b18bb841-af70-48b4-ad6b-4a9bf5f42b6e', 'date': 'Mon, 14 Dec 2020 02:18:09 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/64e5b2f0-5db9-4af2-a449-12d34efa3b51'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:09.458 189 INFO tempest.lib.common.rest_client [req-0525bb1b-55df-4638-b88d-28855482400c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.283s 2020-12-14 02:18:09.461 189 DEBUG tempest.lib.common.rest_client [req-0525bb1b-55df-4638-b88d-28855482400c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0525bb1b-55df-4638-b88d-28855482400c', 'x-compute-request-id': 'req-0525bb1b-55df-4638-b88d-28855482400c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:09.468 193 INFO tempest.lib.common.rest_client [req-bac3ea28-4744-4566-ab09-884efc023de9 ] Request (SubnetsRbacTest:test_list_subnets): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:18:09.472 193 DEBUG tempest.lib.common.rest_client [req-bac3ea28-4744-4566-ab09-884efc023de9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bac3ea28-4744-4566-ab09-884efc023de9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22f5a3734ecd428098da5655a803ea05", "name": "tempest-SubnetsRbacTest-374126046", "password_expires_at": null}, "audit_ids": ["XZxLidV0TAeGSI2H_JF9vA"], "expires_at": "2020-12-14T03:18:09.000000Z", "issued_at": "2020-12-14T02:18:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "12d048179fb14bb8a94e7bbc84eb0550", "name": "tempest-SubnetsRbacTest-374126046"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:09.485 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:09.509 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subnet, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:09.511 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:09.576 193 INFO tempest.lib.common.rest_client [req-f8be419c-80af-4505-960a-edcfb98ac51b ] Request (SubnetsRbacTest:test_show_subnet): 200 GET http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles 0.059s 2020-12-14 02:18:09.579 193 DEBUG tempest.lib.common.rest_client [req-f8be419c-80af-4505-960a-edcfb98ac51b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8be419c-80af-4505-960a-edcfb98ac51b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:09.629 193 INFO tempest.lib.common.rest_client [req-45212934-52fe-4588-b03f-2ec14b8a1443 ] Request (SubnetsRbacTest:test_show_subnet): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:18:09.633 193 DEBUG tempest.lib.common.rest_client [req-45212934-52fe-4588-b03f-2ec14b8a1443 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45212934-52fe-4588-b03f-2ec14b8a1443', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22f5a3734ecd428098da5655a803ea05", "name": "tempest-SubnetsRbacTest-374126046", "password_expires_at": null}, "audit_ids": ["q8kTo0RFSsmIswzUY0LONQ"], "expires_at": "2020-12-14T03:18:09.000000Z", "issued_at": "2020-12-14T02:18:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "12d048179fb14bb8a94e7bbc84eb0550", "name": "tempest-SubnetsRbacTest-374126046"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:09.791 193 INFO tempest.lib.common.rest_client [req-5f9832ba-f4d8-4cdc-90db-6e2a84318b2b ] Request (SubnetsRbacTest:test_show_subnet): 200 GET http://172.30.13.94:9696/v2.0/subnets/8d0bead9-07c3-43f7-9065-04623b4a4d94 0.150s 2020-12-14 02:18:09.795 193 DEBUG tempest.lib.common.rest_client [req-5f9832ba-f4d8-4cdc-90db-6e2a84318b2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '661', 'x-openstack-request-id': 'req-5f9832ba-f4d8-4cdc-90db-6e2a84318b2b', 'date': 'Mon, 14 Dec 2020 02:18:09 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/8d0bead9-07c3-43f7-9065-04623b4a4d94'} Body: b'{"subnet":{"id":"8d0bead9-07c3-43f7-9065-04623b4a4d94","name":"","tenant_id":"12d048179fb14bb8a94e7bbc84eb0550","network_id":"16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:18:04Z","updated_at":"2020-12-14T02:18:04Z","revision_number":0,"project_id":"12d048179fb14bb8a94e7bbc84eb0550"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:09.799 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:09.869 193 INFO tempest.lib.common.rest_client [req-fa0d887c-75c3-4f01-a3bf-2619a6ccdab7 ] Request (SubnetsRbacTest:test_show_subnet): 200 GET http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles 0.063s 2020-12-14 02:18:09.873 193 DEBUG tempest.lib.common.rest_client [req-fa0d887c-75c3-4f01-a3bf-2619a6ccdab7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa0d887c-75c3-4f01-a3bf-2619a6ccdab7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:09.917 193 INFO tempest.lib.common.rest_client [req-865e105e-a807-4be2-87e3-11ea717c00a5 ] Request (SubnetsRbacTest:test_show_subnet): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:18:09.921 193 DEBUG tempest.lib.common.rest_client [req-865e105e-a807-4be2-87e3-11ea717c00a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-865e105e-a807-4be2-87e3-11ea717c00a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22f5a3734ecd428098da5655a803ea05", "name": "tempest-SubnetsRbacTest-374126046", "password_expires_at": null}, "audit_ids": ["v0fsJH5nTKqTjyd4IeyEbA"], "expires_at": "2020-12-14T03:18:09.000000Z", "issued_at": "2020-12-14T02:18:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "12d048179fb14bb8a94e7bbc84eb0550", "name": "tempest-SubnetsRbacTest-374126046"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:09.931 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:09.950 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subnet, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:09.952 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:09.970 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_subnet, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:09.972 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:10.032 193 INFO tempest.lib.common.rest_client [req-b6aba5ac-8e7b-4c05-99ed-9664d4b4238d ] Request (SubnetsRbacTest:test_update_subnet): 200 GET http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles 0.055s 2020-12-14 02:18:10.034 193 DEBUG tempest.lib.common.rest_client [req-b6aba5ac-8e7b-4c05-99ed-9664d4b4238d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6aba5ac-8e7b-4c05-99ed-9664d4b4238d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:10.082 193 INFO tempest.lib.common.rest_client [req-db38a2b9-4664-44d7-98ff-04bd475d70c3 ] Request (SubnetsRbacTest:test_update_subnet): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:18:10.086 193 DEBUG tempest.lib.common.rest_client [req-db38a2b9-4664-44d7-98ff-04bd475d70c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db38a2b9-4664-44d7-98ff-04bd475d70c3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22f5a3734ecd428098da5655a803ea05", "name": "tempest-SubnetsRbacTest-374126046", "password_expires_at": null}, "audit_ids": ["OVqU9Rd0QPqhHz6GbyfkRQ"], "expires_at": "2020-12-14T03:18:10.000000Z", "issued_at": "2020-12-14T02:18:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "12d048179fb14bb8a94e7bbc84eb0550", "name": "tempest-SubnetsRbacTest-374126046"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:10.344 186 INFO tempest.lib.common.rest_client [req-2e059e11-dd4f-4ff1-8031-01e6fa9b56dc ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/29581da7-daeb-44b2-aca1-c64c19d19bbc 0.969s 2020-12-14 02:18:10.347 186 DEBUG tempest.lib.common.rest_client [req-2e059e11-dd4f-4ff1-8031-01e6fa9b56dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-2e059e11-dd4f-4ff1-8031-01e6fa9b56dc', 'date': 'Mon, 14 Dec 2020 02:18:10 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/29581da7-daeb-44b2-aca1-c64c19d19bbc'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:10.465 197 INFO tempest.lib.common.rest_client [req-cbe47597-881e-42f9-9d24-6844913cb8c7 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.217s 2020-12-14 02:18:10.468 197 DEBUG tempest.lib.common.rest_client [req-cbe47597-881e-42f9-9d24-6844913cb8c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cbe47597-881e-42f9-9d24-6844913cb8c7', 'x-compute-request-id': 'req-cbe47597-881e-42f9-9d24-6844913cb8c7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:10.505 186 INFO tempest.lib.common.rest_client [req-3124243a-8add-478a-b944-b756edb11f7e ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/c9c6177d06e54d90aff506ccfab61ac9 0.151s 2020-12-14 02:18:10.508 186 DEBUG tempest.lib.common.rest_client [req-3124243a-8add-478a-b944-b756edb11f7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3124243a-8add-478a-b944-b756edb11f7e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/c9c6177d06e54d90aff506ccfab61ac9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:10.578 186 INFO tempest.lib.common.rest_client [req-df02917a-fbdf-4d3e-b628-a395a22876fc ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4d2bab69895c4d7a955e71657b529b22&name=default 0.062s 2020-12-14 02:18:10.581 186 DEBUG tempest.lib.common.rest_client [req-df02917a-fbdf-4d3e-b628-a395a22876fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-df02917a-fbdf-4d3e-b628-a395a22876fc', 'date': 'Mon, 14 Dec 2020 02:18:10 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4d2bab69895c4d7a955e71657b529b22&name=default'} Body: b'{"security_groups": [{"id": "121ec4b8-8772-4cee-8de1-f24d5792b73f", "name": "default", "stateful": true, "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "description": "Default security group", "security_group_rules": [{"id": "2ead930c-65d7-4c62-bf7e-f9a3b2dfdb77", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "security_group_id": "121ec4b8-8772-4cee-8de1-f24d5792b73f", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "121ec4b8-8772-4cee-8de1-f24d5792b73f", "description": null, "tags": [], "created_at": "2020-12-14T02:17:13Z", "updated_at": "2020-12-14T02:17:13Z", "revision_number": 0, "project_id": "4d2bab69895c4d7a955e71657b529b22"}, {"id": "7dc7b8db-071b-469d-8be1-00cae4351c82", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "security_group_id": "121ec4b8-8772-4cee-8de1-f24d5792b73f", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:13Z", "updated_at": "2020-12-14T02:17:13Z", "revision_number": 0, "project_id": "4d2bab69895c4d7a955e71657b529b22"}, {"id": "f349d49e-3fc1-4911-bd0b-b8d8b7344c94", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "security_group_id": "121ec4b8-8772-4cee-8de1-f24d5792b73f", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "121ec4b8-8772-4cee-8de1-f24d5792b73f", "description": null, "tags": [], "created_at": "2020-12-14T02:17:13Z", "updated_at": "2020-12-14T02:17:13Z", "revision_number": 0, "project_id": "4d2bab69895c4d7a955e71657b529b22"}, {"id": "f419c3b2-01bf-428c-b189-4ba27d8924ea", "tenant_id": "4d2bab69895c4d7a955e71657b529b22", "security_group_id": "121ec4b8-8772-4cee-8de1-f24d5792b73f", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:17:13Z", "updated_at": "2020-12-14T02:17:13Z", "revision_number": 0, "project_id": "4d2bab69895c4d7a955e71657b529b22"}], "tags": [], "created_at": "2020-12-14T02:17:13Z", "updated_at": "2020-12-14T02:17:13Z", "revision_number": 1, "project_id": "4d2bab69895c4d7a955e71657b529b22"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:10.626 193 INFO tempest.lib.common.rest_client [req-4cb95181-9b78-4f7e-8d40-aadd8b7b1fec ] Request (SubnetsRbacTest:test_update_subnet): 200 PUT http://172.30.13.94:9696/v2.0/subnets/8d0bead9-07c3-43f7-9065-04623b4a4d94 0.532s 2020-12-14 02:18:10.629 193 DEBUG tempest.lib.common.rest_client [req-4cb95181-9b78-4f7e-8d40-aadd8b7b1fec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"name": "tempest-SubnetsRbacTest-Subnet-257667414"}} Response - Headers: {'content-type': 'application/json', 'content-length': '701', 'x-openstack-request-id': 'req-4cb95181-9b78-4f7e-8d40-aadd8b7b1fec', 'date': 'Mon, 14 Dec 2020 02:18:10 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/8d0bead9-07c3-43f7-9065-04623b4a4d94'} Body: b'{"subnet":{"id":"8d0bead9-07c3-43f7-9065-04623b4a4d94","name":"tempest-SubnetsRbacTest-Subnet-257667414","tenant_id":"12d048179fb14bb8a94e7bbc84eb0550","network_id":"16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:18:04Z","updated_at":"2020-12-14T02:18:10Z","revision_number":1,"project_id":"12d048179fb14bb8a94e7bbc84eb0550"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:10.632 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:10.724 186 INFO tempest.lib.common.rest_client [req-9f65d47d-cf80-44f8-9a76-2830cf31941a ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/121ec4b8-8772-4cee-8de1-f24d5792b73f 0.136s 2020-12-14 02:18:10.728 186 DEBUG tempest.lib.common.rest_client [req-9f65d47d-cf80-44f8-9a76-2830cf31941a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-9f65d47d-cf80-44f8-9a76-2830cf31941a', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:10 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/121ec4b8-8772-4cee-8de1-f24d5792b73f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:10.758 193 INFO tempest.lib.common.rest_client [req-49669be2-7d6d-4130-9d79-abaed8fdfa7c ] Request (SubnetsRbacTest:test_update_subnet): 200 GET http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles 0.119s 2020-12-14 02:18:10.758 189 INFO tempest.lib.common.rest_client [req-0c0fe72e-86a3-4636-9d23-6c6a722cbccf ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.190s 2020-12-14 02:18:10.761 189 DEBUG tempest.lib.common.rest_client [req-0c0fe72e-86a3-4636-9d23-6c6a722cbccf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0c0fe72e-86a3-4636-9d23-6c6a722cbccf', 'x-compute-request-id': 'req-0c0fe72e-86a3-4636-9d23-6c6a722cbccf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:10.761 193 DEBUG tempest.lib.common.rest_client [req-49669be2-7d6d-4130-9d79-abaed8fdfa7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-49669be2-7d6d-4130-9d79-abaed8fdfa7c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550/users/22f5a3734ecd428098da5655a803ea05/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:10.857 193 INFO tempest.lib.common.rest_client [req-afa59bfa-1017-4273-9208-cd22967ad723 ] Request (SubnetsRbacTest:test_update_subnet): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:18:10.860 193 DEBUG tempest.lib.common.rest_client [req-afa59bfa-1017-4273-9208-cd22967ad723 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-afa59bfa-1017-4273-9208-cd22967ad723', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22f5a3734ecd428098da5655a803ea05", "name": "tempest-SubnetsRbacTest-374126046", "password_expires_at": null}, "audit_ids": ["Gm2jsv03Rmi6hMN5PDUkzg"], "expires_at": "2020-12-14T03:18:10.000000Z", "issued_at": "2020-12-14T02:18:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "12d048179fb14bb8a94e7bbc84eb0550", "name": "tempest-SubnetsRbacTest-374126046"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_12d048179fb14bb8a94e7bbc84eb0550", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:10.875 186 INFO tempest.lib.common.rest_client [req-6f42aab4-d70a-448a-b106-e974c48cf1df ] Request (MiscPolicyActionsNetworkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22 0.139s 2020-12-14 02:18:10.879 186 DEBUG tempest.lib.common.rest_client [req-6f42aab4-d70a-448a-b106-e974c48cf1df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f42aab4-d70a-448a-b106-e974c48cf1df', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d2bab69895c4d7a955e71657b529b22'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:10.998 186 INFO tempest.lib.common.rest_client [req-751fda55-d14a-489c-820c-ed7ac01bbaca ] Request (NamespacesPropertyRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:18:11.002 186 DEBUG tempest.lib.common.rest_client [req-751fda55-d14a-489c-820c-ed7ac01bbaca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-751fda55-d14a-489c-820c-ed7ac01bbaca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["kzwpoMXsReKIrU8IeL-Dyg"], "expires_at": "2020-12-14T03:18:10.000000Z", "issued_at": "2020-12-14T02:18:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:11.084 193 INFO tempest.lib.common.rest_client [req-6fb2f9e6-1ec1-49f6-a090-69a39f79aef0 ] Request (SubnetsRbacTest:tearDownClass): 404 DELETE http://172.30.13.94:9696/v2.0/subnets/5eb357bd-9aa1-40fc-ab6b-ae996f0a9de0 0.209s 2020-12-14 02:18:11.087 193 DEBUG tempest.lib.common.rest_client [req-6fb2f9e6-1ec1-49f6-a090-69a39f79aef0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '136', 'x-openstack-request-id': 'req-6fb2f9e6-1ec1-49f6-a090-69a39f79aef0', 'date': 'Mon, 14 Dec 2020 02:18:11 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/5eb357bd-9aa1-40fc-ab6b-ae996f0a9de0'} Body: b'{"NeutronError": {"type": "SubnetNotFound", "message": "Subnet 5eb357bd-9aa1-40fc-ab6b-ae996f0a9de0 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:11.105 186 INFO tempest.lib.common.rest_client [req-d760d333-fb60-4b07-b5df-ac528e2a086f ] Request (NamespacesPropertyRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:18:11.108 186 DEBUG tempest.lib.common.rest_client [req-d760d333-fb60-4b07-b5df-ac528e2a086f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d760d333-fb60-4b07-b5df-ac528e2a086f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["nO1QhnlrSV6CW19w625hEQ"], "expires_at": "2020-12-14T03:18:11.000000Z", "issued_at": "2020-12-14T02:18:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:11.178 186 INFO tempest.lib.common.rest_client [req-2281a5c2-903e-4ea5-85a2-0fbd28c2b53f ] Request (NamespacesPropertyRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.061s 2020-12-14 02:18:11.181 186 DEBUG tempest.lib.common.rest_client [req-2281a5c2-903e-4ea5-85a2-0fbd28c2b53f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2281a5c2-903e-4ea5-85a2-0fbd28c2b53f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:11.262 186 INFO tempest.lib.common.rest_client [req-c3bef9b2-5a6a-4418-b9bd-49fc62b18e89 ] Request (NamespacesPropertyRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.073s 2020-12-14 02:18:11.266 186 DEBUG tempest.lib.common.rest_client [req-c3bef9b2-5a6a-4418-b9bd-49fc62b18e89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-NamespacesPropertyRbacTest-324215785-desc", "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-324215785"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c3bef9b2-5a6a-4418-b9bd-49fc62b18e89', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "719b010999994140a21ecbe6cd40d59e", "name": "tempest-NamespacesPropertyRbacTest-324215785", "domain_id": "default", "description": "tempest-NamespacesPropertyRbacTest-324215785-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:11.416 186 INFO tempest.lib.common.rest_client [req-e62b6dbb-d864-4fc3-bbc6-26c5979f8c65 ] Request (NamespacesPropertyRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.142s 2020-12-14 02:18:11.420 186 DEBUG tempest.lib.common.rest_client [req-e62b6dbb-d864-4fc3-bbc6-26c5979f8c65 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-NamespacesPropertyRbacTest-324215785", "password": "O3=J#UA=NIzobLZ", "project_id": "719b010999994140a21ecbe6cd40d59e", "email": "tempest-NamespacesPropertyRbacTest-201683548@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '406', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e62b6dbb-d864-4fc3-bbc6-26c5979f8c65', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "719b010999994140a21ecbe6cd40d59e", "email": "tempest-NamespacesPropertyRbacTest-201683548@example.com", "id": "60dc4d53417d48ea9a4d1f57a7c970ab", "name": "tempest-NamespacesPropertyRbacTest-324215785", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/60dc4d53417d48ea9a4d1f57a7c970ab"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:11.486 186 INFO tempest.lib.common.rest_client [req-db2cd7ee-3d9b-46d8-9853-e9611c55f305 ] Request (NamespacesPropertyRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:18:11.488 186 DEBUG tempest.lib.common.rest_client [req-db2cd7ee-3d9b-46d8-9853-e9611c55f305 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db2cd7ee-3d9b-46d8-9853-e9611c55f305', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:11.552 186 INFO tempest.lib.common.rest_client [req-245c1116-cac5-4618-ae46-b68f730e21c9 ] Request (NamespacesPropertyRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-14 02:18:11.555 186 DEBUG tempest.lib.common.rest_client [req-245c1116-cac5-4618-ae46-b68f730e21c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-245c1116-cac5-4618-ae46-b68f730e21c9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:11.628 186 INFO tempest.lib.common.rest_client [req-61883c59-edd2-4415-beb5-287c73a2bbb9 ] Request (NamespacesPropertyRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles/72a4576c553448cd941b052c1ca0cf2d 0.064s 2020-12-14 02:18:11.630 186 DEBUG tempest.lib.common.rest_client [req-61883c59-edd2-4415-beb5-287c73a2bbb9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61883c59-edd2-4415-beb5-287c73a2bbb9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:11.634 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NamespacesPropertyRbacTest-324215785', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '719b010999994140a21ecbe6cd40d59e', 'project_name': 'tempest-NamespacesPropertyRbacTest-324215785', 'tenant_id': '719b010999994140a21ecbe6cd40d59e', 'tenant_name': 'tempest-NamespacesPropertyRbacTest-324215785', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '60dc4d53417d48ea9a4d1f57a7c970ab'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:11.635 193 INFO tempest.lib.common.rest_client [req-4805ecfd-1717-4c6a-994a-5ffa1d85f303 ] Request (SubnetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/8bd621bc-4ecc-491f-afd9-5fb450558e9e 0.540s 2020-12-14 02:18:11.636 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NamespacesPropertyRbacTest-324215785', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '719b010999994140a21ecbe6cd40d59e', 'project_name': 'tempest-NamespacesPropertyRbacTest-324215785', 'tenant_id': '719b010999994140a21ecbe6cd40d59e', 'tenant_name': 'tempest-NamespacesPropertyRbacTest-324215785', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '60dc4d53417d48ea9a4d1f57a7c970ab'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:11.638 193 DEBUG tempest.lib.common.rest_client [req-4805ecfd-1717-4c6a-994a-5ffa1d85f303 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-4805ecfd-1717-4c6a-994a-5ffa1d85f303', 'date': 'Mon, 14 Dec 2020 02:18:11 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/8bd621bc-4ecc-491f-afd9-5fb450558e9e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:11.791 197 INFO tempest.lib.common.rest_client [req-1fdd9fa4-0f9d-4837-92f6-71fe9583f821 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.214s 2020-12-14 02:18:11.795 197 DEBUG tempest.lib.common.rest_client [req-1fdd9fa4-0f9d-4837-92f6-71fe9583f821 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1fdd9fa4-0f9d-4837-92f6-71fe9583f821', 'x-compute-request-id': 'req-1fdd9fa4-0f9d-4837-92f6-71fe9583f821', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:11.839 186 INFO tempest.lib.common.rest_client [req-1bd0f449-246f-4bfe-88d5-5bf9ca84d885 ] Request (NamespacesPropertyRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.126s 2020-12-14 02:18:11.843 186 DEBUG tempest.lib.common.rest_client [req-1bd0f449-246f-4bfe-88d5-5bf9ca84d885 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1bd0f449-246f-4bfe-88d5-5bf9ca84d885', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60dc4d53417d48ea9a4d1f57a7c970ab", "name": "tempest-NamespacesPropertyRbacTest-324215785", "password_expires_at": null}, "audit_ids": ["WmfdikUwR1-JKGujDestvw"], "expires_at": "2020-12-14T03:18:11.000000Z", "issued_at": "2020-12-14T02:18:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "719b010999994140a21ecbe6cd40d59e", "name": "tempest-NamespacesPropertyRbacTest-324215785"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:11.947 186 INFO tempest.lib.common.rest_client [req-3cf9589e-69c1-4320-bffa-cfedb3fbcca8 ] Request (NamespacesPropertyRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:18:11.951 186 DEBUG tempest.lib.common.rest_client [req-3cf9589e-69c1-4320-bffa-cfedb3fbcca8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3cf9589e-69c1-4320-bffa-cfedb3fbcca8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["LZBo1S4wRnS6q7TRTygM0w"], "expires_at": "2020-12-14T03:18:11.000000Z", "issued_at": "2020-12-14T02:18:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:12.067 186 INFO tempest.lib.common.rest_client [req-92a295c1-32c3-4465-a5d2-0e27ce35f929 ] Request (NamespacesPropertyRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:18:12.070 186 DEBUG tempest.lib.common.rest_client [req-92a295c1-32c3-4465-a5d2-0e27ce35f929 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92a295c1-32c3-4465-a5d2-0e27ce35f929', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["6Cpi3FOFT92YLrZbPXkduQ"], "expires_at": "2020-12-14T03:18:12.000000Z", "issued_at": "2020-12-14T02:18:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:12.079 193 INFO tempest.lib.common.rest_client [req-ed78f6a0-50f4-4249-bad1-c2d3903ccdfc ] Request (SubnetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/8d0bead9-07c3-43f7-9065-04623b4a4d94 0.432s 2020-12-14 02:18:12.081 193 DEBUG tempest.lib.common.rest_client [req-ed78f6a0-50f4-4249-bad1-c2d3903ccdfc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-ed78f6a0-50f4-4249-bad1-c2d3903ccdfc', 'date': 'Mon, 14 Dec 2020 02:18:12 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/8d0bead9-07c3-43f7-9065-04623b4a4d94'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:12.112 189 INFO tempest.lib.common.rest_client [req-546dfac5-e6c0-4d99-8bd4-3e6e9621d113 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.245s 2020-12-14 02:18:12.115 189 DEBUG tempest.lib.common.rest_client [req-546dfac5-e6c0-4d99-8bd4-3e6e9621d113 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-546dfac5-e6c0-4d99-8bd4-3e6e9621d113', 'x-compute-request-id': 'req-546dfac5-e6c0-4d99-8bd4-3e6e9621d113', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:12.144 186 INFO tempest.lib.common.rest_client [req-aa8eba71-3544-4be2-aa7d-7a2a8197f17e ] Request (NamespacesPropertyRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.067s 2020-12-14 02:18:12.147 186 DEBUG tempest.lib.common.rest_client [req-aa8eba71-3544-4be2-aa7d-7a2a8197f17e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa8eba71-3544-4be2-aa7d-7a2a8197f17e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:12.216 186 INFO tempest.lib.common.rest_client [req-4f48b086-7151-463b-9192-8739957c9b0e ] Request (NamespacesPropertyRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:18:12.220 186 DEBUG tempest.lib.common.rest_client [req-4f48b086-7151-463b-9192-8739957c9b0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f48b086-7151-463b-9192-8739957c9b0e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:12.223 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:18:12.226 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:12.299 186 INFO tempest.lib.common.rest_client [req-69cc1a5a-6a99-403f-874a-d24592b50368 ] Request (NamespacesPropertyRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles 0.068s 2020-12-14 02:18:12.301 186 DEBUG tempest.lib.common.rest_client [req-69cc1a5a-6a99-403f-874a-d24592b50368 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69cc1a5a-6a99-403f-874a-d24592b50368', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:12.380 186 INFO tempest.lib.common.rest_client [req-12a3d481-8046-45b2-8c94-a2e75c7670a8 ] Request (NamespacesPropertyRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles/72a4576c553448cd941b052c1ca0cf2d 0.073s 2020-12-14 02:18:12.382 186 DEBUG tempest.lib.common.rest_client [req-12a3d481-8046-45b2-8c94-a2e75c7670a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-12a3d481-8046-45b2-8c94-a2e75c7670a8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:12.559 186 INFO tempest.lib.common.rest_client [req-0edf5e91-24b5-46fa-b4f9-4006c47750b5 ] Request (NamespacesPropertyRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles/a629c95d64b3416fb80ae90af4f69c05 0.170s 2020-12-14 02:18:12.562 186 DEBUG tempest.lib.common.rest_client [req-0edf5e91-24b5-46fa-b4f9-4006c47750b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0edf5e91-24b5-46fa-b4f9-4006c47750b5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:13.096 193 INFO tempest.lib.common.rest_client [req-77811e69-2f34-439b-952a-4d54ab6591a1 ] Request (SubnetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b 1.009s 2020-12-14 02:18:13.099 193 DEBUG tempest.lib.common.rest_client [req-77811e69-2f34-439b-952a-4d54ab6591a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-77811e69-2f34-439b-952a-4d54ab6591a1', 'date': 'Mon, 14 Dec 2020 02:18:13 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/16b1ff5d-6b9c-4e85-b4a8-4843ad803c0b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:13.103 197 INFO tempest.lib.common.rest_client [req-648b1348-3013-4c39-9fed-f49ef2bb6409 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.200s 2020-12-14 02:18:13.107 197 DEBUG tempest.lib.common.rest_client [req-648b1348-3013-4c39-9fed-f49ef2bb6409 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-648b1348-3013-4c39-9fed-f49ef2bb6409', 'x-compute-request-id': 'req-648b1348-3013-4c39-9fed-f49ef2bb6409', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:13.298 193 INFO tempest.lib.common.rest_client [req-34c86ebd-1206-4d1c-97c3-d0b25bd22a8c ] Request (SubnetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/22f5a3734ecd428098da5655a803ea05 0.193s 2020-12-14 02:18:13.300 193 DEBUG tempest.lib.common.rest_client [req-34c86ebd-1206-4d1c-97c3-d0b25bd22a8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34c86ebd-1206-4d1c-97c3-d0b25bd22a8c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/22f5a3734ecd428098da5655a803ea05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:13.394 193 INFO tempest.lib.common.rest_client [req-d1a00870-53a1-4951-bdad-69b8633b94df ] Request (SubnetsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:18:13.396 193 DEBUG tempest.lib.common.rest_client [req-d1a00870-53a1-4951-bdad-69b8633b94df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1a00870-53a1-4951-bdad-69b8633b94df', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["1XVZCEjFQ0iDuollapmkQA"], "expires_at": "2020-12-14T03:18:13.000000Z", "issued_at": "2020-12-14T02:18:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:13.432 189 INFO tempest.lib.common.rest_client [req-63ff2473-57ce-4f6d-8503-31b5f1c576fa ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.208s 2020-12-14 02:18:13.435 189 DEBUG tempest.lib.common.rest_client [req-63ff2473-57ce-4f6d-8503-31b5f1c576fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-63ff2473-57ce-4f6d-8503-31b5f1c576fa', 'x-compute-request-id': 'req-63ff2473-57ce-4f6d-8503-31b5f1c576fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:13.587 193 INFO tempest.lib.common.rest_client [req-4ed4fc9b-7b38-4c7a-8145-5219360d87ce ] Request (SubnetsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=12d048179fb14bb8a94e7bbc84eb0550&name=default 0.186s 2020-12-14 02:18:13.589 193 DEBUG tempest.lib.common.rest_client [req-4ed4fc9b-7b38-4c7a-8145-5219360d87ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-4ed4fc9b-7b38-4c7a-8145-5219360d87ce', 'date': 'Mon, 14 Dec 2020 02:18:13 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=12d048179fb14bb8a94e7bbc84eb0550&name=default'} Body: b'{"security_groups": [{"id": "deb4c098-a920-42d6-8d5d-6d31bbd92be3", "name": "default", "stateful": true, "tenant_id": "12d048179fb14bb8a94e7bbc84eb0550", "description": "Default security group", "security_group_rules": [{"id": "66283002-f1b6-4947-b4e3-506f4a0cbd9e", "tenant_id": "12d048179fb14bb8a94e7bbc84eb0550", "security_group_id": "deb4c098-a920-42d6-8d5d-6d31bbd92be3", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "deb4c098-a920-42d6-8d5d-6d31bbd92be3", "description": null, "tags": [], "created_at": "2020-12-14T02:18:04Z", "updated_at": "2020-12-14T02:18:04Z", "revision_number": 0, "project_id": "12d048179fb14bb8a94e7bbc84eb0550"}, {"id": "7c6523bb-dfa4-4d69-9a05-e39c2e8bf323", "tenant_id": "12d048179fb14bb8a94e7bbc84eb0550", "security_group_id": "deb4c098-a920-42d6-8d5d-6d31bbd92be3", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "deb4c098-a920-42d6-8d5d-6d31bbd92be3", "description": null, "tags": [], "created_at": "2020-12-14T02:18:04Z", "updated_at": "2020-12-14T02:18:04Z", "revision_number": 0, "project_id": "12d048179fb14bb8a94e7bbc84eb0550"}, {"id": "9148c648-84e0-463e-8333-a3a48f20ce54", "tenant_id": "12d048179fb14bb8a94e7bbc84eb0550", "security_group_id": "deb4c098-a920-42d6-8d5d-6d31bbd92be3", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:04Z", "updated_at": "2020-12-14T02:18:04Z", "revision_number": 0, "project_id": "12d048179fb14bb8a94e7bbc84eb0550"}, {"id": "cdbc4941-4e63-44a7-a30f-5129190d2566", "tenant_id": "12d048179fb14bb8a94e7bbc84eb0550", "security_group_id": "deb4c098-a920-42d6-8d5d-6d31bbd92be3", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:04Z", "updated_at": "2020-12-14T02:18:04Z", "revision_number": 0, "project_id": "12d048179fb14bb8a94e7bbc84eb0550"}], "tags": [], "created_at": "2020-12-14T02:18:04Z", "updated_at": "2020-12-14T02:18:04Z", "revision_number": 1, "project_id": "12d048179fb14bb8a94e7bbc84eb0550"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:13.644 186 INFO tempest.lib.common.rest_client [req-660d7f43-6367-4c93-87fb-290ede90cad5 ] Request (NamespacesPropertyRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.075s 2020-12-14 02:18:13.647 186 DEBUG tempest.lib.common.rest_client [req-660d7f43-6367-4c93-87fb-290ede90cad5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-660d7f43-6367-4c93-87fb-290ede90cad5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60dc4d53417d48ea9a4d1f57a7c970ab", "name": "tempest-NamespacesPropertyRbacTest-324215785", "password_expires_at": null}, "audit_ids": ["3_dchflGSwy5jK5QUCm-MA"], "expires_at": "2020-12-14T03:18:13.000000Z", "issued_at": "2020-12-14T02:18:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "719b010999994140a21ecbe6cd40d59e", "name": "tempest-NamespacesPropertyRbacTest-324215785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:13.787 193 INFO tempest.lib.common.rest_client [req-c5fe8cf6-940c-475b-a5a1-85e3a06d3e64 ] Request (SubnetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/deb4c098-a920-42d6-8d5d-6d31bbd92be3 0.191s 2020-12-14 02:18:13.789 193 DEBUG tempest.lib.common.rest_client [req-c5fe8cf6-940c-475b-a5a1-85e3a06d3e64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c5fe8cf6-940c-475b-a5a1-85e3a06d3e64', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:13 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/deb4c098-a920-42d6-8d5d-6d31bbd92be3'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:13.809 186 INFO tempest.lib.common.rest_client [req-b6a4115e-cddb-4f39-80ab-aacdcbceaa66 ] Request (NamespacesPropertyRbacTest:setUpClass): 200 GET http://172.30.13.94/image/v2/metadefs/resource_types 0.151s 2020-12-14 02:18:13.814 186 DEBUG tempest.lib.common.rest_client [req-b6a4115e-cddb-4f39-80ab-aacdcbceaa66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '31594', 'content-type': 'application/json', 'x-openstack-request-id': 'req-b6a4115e-cddb-4f39-80ab-aacdcbceaa66', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/resource_types'} Body: b'{"resource_types": [{"name": "OS::Glance::Image", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Cinder::Volume", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Nova::Flavor", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Nova::Aggregate", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Nova::Server", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Trove::Instance", "created_at": "2020-10-07T11:57:59Z"}, {"name": "tempest-353086331", "created_at": "2020-10-07T14:14:37Z", "updated_at": "2020-10-07T14:14:37Z"}, {"name": "tempest-1984004422", "created_at": "2020-10-07T14:30:19Z", "updated_at": "2020-10-07T14:30:19Z"}, {"name": "tempest-372173246", "created_at": "2020-10-07T14:49:22Z", "updated_at": "2020-10-07T14:49:22Z"}, {"name": "tempest-1164139581", "created_at": "2020-10-07T18:47:05Z", "updated_at": "2020-10-07T18:47:05Z"}, {"name": "tempest-993868956", "created_at": "2020-10-07T19:08:26Z", "updated_at": "2020-10-07T19:08:26Z"}, {"name": "tempest-272848155", "created_at": "2020-10-07T19:09:07Z", "updated_at": "2020-10-07T19:09:07Z"}, {"name": "tempest-1639040349", "created_at": "2020-10-08T06:37:04Z", "updated_at": "2020-10-08T06:37:04Z"}, {"name": "tempest-2908543", "created_at": "2020-10-08T07:02:30Z", "updated_at": "2020-10-08T07:02:30Z"}, {"name": "tempest-1856760566", "created_at": "2020-10-08T07:03:05Z", "updated_at": "2020-10-08T07:03:05Z"}, {"name": "tempest-1004252970", "created_at": "2020-10-08T08:19:46Z", "updated_at": "2020-10-08T08:19:46Z"}, {"name": "tempest-407059419", "created_at": "2020-10-08T08:33:34Z", "updated_at": "2020-10-08T08:33:34Z"}, {"name": "tempest-189587598", "created_at": "2020-10-08T08:35:59Z", "updated_at": "2020-10-08T08:35:59Z"}, {"name": "tempest-1704015896", "created_at": "2020-10-09T18:06:13Z", "updated_at": "2020-10-09T18:06:13Z"}, {"name": "tempest-1953541337", "created_at": "2020-10-09T18:17:00Z", "updated_at": "2020-10-09T18:17:00Z"}, {"name": "tempest-173577", "created_at": "2020-10-09T18:22:23Z", "updated_at": "2020-10-09T18:22:23Z"}, {"name": "tempest-333147695", "created_at": "2020-10-10T09:00:37Z", "updated_at": "2020-10-10T09:00:37Z"}, {"name": "tempest-1397311640", "created_at": "2020-10-10T09:36:16Z", "updated_at": "2020-10-10T09:36:16Z"}, {"name": "tempest-1935990982", "created_at": "2020-10-10T09:45:43Z", "updated_at": "2020-10-10T09:45:43Z"}, {"name": "tempest-455257376", "created_at": "2020-10-10T11:37:35Z", "updated_at": "2020-10-10T11:37:35Z"}, {"name": "tempest-304188733", "created_at": "2020-10-10T12:00:21Z", "updated_at": "2020-10-10T12:00:21Z"}, {"name": "tempest-2047170226", "created_at": "2020-10-10T12:04:22Z", "updated_at": "2020-10-10T12:04:22Z"}, {"name": "tempest-988388815", "created_at": "2020-10-10T13:30:05Z", "updated_at": "2020-10-10T13:30:05Z"}, {"name": "tempest-453722785", "created_at": "2020-10-10T13:54:03Z", "updated_at": "2020-10-10T13:54:03Z"}, {"name": "tempest-2101685032", "created_at": "2020-10-10T14:07:17Z", "updated_at": "2020-10-10T14:07:17Z"}, {"name": "tempest-487587532", "created_at": "2020-10-11T12:03:41Z", "updated_at": "2020-10-11T12:03:41Z"}, {"name": "tempest-92343007", "created_at": "2020-10-11T12:20:17Z", "updated_at": "2020-10-11T12:20:17Z"}, {"name": "tempest-1873204973", "created_at": "2020-10-11T12:37:23Z", "updated_at": "2020-10-11T12:37:23Z"}, {"name": "tempest-976247736", "created_at": "2020-10-12T14:24:39Z", "updated_at": "2020-10-12T14:24:39Z"}, {"name": "tempest-723114723", "created_at": "2020-10-12T14:30:01Z", "updated_at": "2020-10-12T14:30:01Z"}, {"name": "tempest-1242055933", "created_at": "2020-10-12T14:31:50Z", "updated_at": "2020-10-12T14:31:50Z"}, {"name": "tempest-1267333658", "created_at": "2020-10-16T17:36:11Z", "updated_at": "2020-10-16T17:36:11Z"}, {"name": "tempest-776499970", "created_at": "2020-10-16T17:54:29Z", "updated_at": "2020-10-16T17:54:29Z"}, {"name": "tempest-799976223", "created_at": "2020-10-16T17:59:18Z", "updated_at": "2020-10-16T17:59:18Z"}, {"name": "tempest-1471385054", "created_at": "2020-10-17T13:13:43Z", "updated_at": "2020-10-17T13:13:43Z"}, {"name": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:13.826 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:13.881 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:18:13.890 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_metadef_property, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:13.923 193 INFO tempest.lib.common.rest_client [req-951c4250-abbf-42c1-9619-6be31b0faabb ] Request (SubnetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550 0.128s 2020-12-14 02:18:13.927 193 DEBUG tempest.lib.common.rest_client [req-951c4250-abbf-42c1-9619-6be31b0faabb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-951c4250-abbf-42c1-9619-6be31b0faabb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/12d048179fb14bb8a94e7bbc84eb0550'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:13.929 186 INFO tempest.lib.common.rest_client [req-1ca36e30-7a78-4a7e-99c6-2a6c3e628241 ] Request (NamespacesPropertyRbacTest:test_add_md_properties): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.033s 2020-12-14 02:18:13.931 186 DEBUG tempest.lib.common.rest_client [req-1ca36e30-7a78-4a7e-99c6-2a6c3e628241 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-test-ns-823347569", "visibility": "public", "description": "Tempest", "protected": false, "display_name": "tempest-test-ns-823347569"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '383', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-test-ns-823347569', 'x-openstack-request-id': 'req-1ca36e30-7a78-4a7e-99c6-2a6c3e628241', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-test-ns-823347569", "display_name": "tempest-test-ns-823347569", "description": "Tempest", "visibility": "public", "protected": false, "owner": "719b010999994140a21ecbe6cd40d59e", "created_at": "2020-12-14T02:18:13Z", "updated_at": "2020-12-14T02:18:13Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-823347569", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:13.934 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:14.043 193 INFO tempest.lib.common.rest_client [req-78f9398f-f778-4c12-83e9-4011e1473ab0 ] Request (CapabilitiesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:18:14.046 193 DEBUG tempest.lib.common.rest_client [req-78f9398f-f778-4c12-83e9-4011e1473ab0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78f9398f-f778-4c12-83e9-4011e1473ab0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["XVLHqtfaQYSnVf9GP_DoMg"], "expires_at": "2020-12-14T03:18:13.000000Z", "issued_at": "2020-12-14T02:18:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.048 186 INFO tempest.lib.common.rest_client [req-f8828e23-dbef-4c61-aa33-e5f74b8de144 ] Request (NamespacesPropertyRbacTest:test_add_md_properties): 200 GET http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles 0.108s 2020-12-14 02:18:14.052 186 DEBUG tempest.lib.common.rest_client [req-f8828e23-dbef-4c61-aa33-e5f74b8de144 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8828e23-dbef-4c61-aa33-e5f74b8de144', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.137 193 INFO tempest.lib.common.rest_client [req-74da22e6-08bf-4706-9999-5a2d8da3f63e ] Request (CapabilitiesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:18:14.140 193 DEBUG tempest.lib.common.rest_client [req-74da22e6-08bf-4706-9999-5a2d8da3f63e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74da22e6-08bf-4706-9999-5a2d8da3f63e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["R4t0JAelT_SjbchPHBDwfg"], "expires_at": "2020-12-14T03:18:14.000000Z", "issued_at": "2020-12-14T02:18:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.147 186 INFO tempest.lib.common.rest_client [req-d354033a-e2e0-4a4c-8f57-1b0898f50256 ] Request (NamespacesPropertyRbacTest:test_add_md_properties): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-14 02:18:14.151 186 DEBUG tempest.lib.common.rest_client [req-d354033a-e2e0-4a4c-8f57-1b0898f50256 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d354033a-e2e0-4a4c-8f57-1b0898f50256', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60dc4d53417d48ea9a4d1f57a7c970ab", "name": "tempest-NamespacesPropertyRbacTest-324215785", "password_expires_at": null}, "audit_ids": ["gbD58LsqTiiIRpTz9AANnA"], "expires_at": "2020-12-14T03:18:14.000000Z", "issued_at": "2020-12-14T02:18:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "719b010999994140a21ecbe6cd40d59e", "name": "tempest-NamespacesPropertyRbacTest-324215785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.205 193 INFO tempest.lib.common.rest_client [req-c98724b6-2706-43a9-bdce-f2f9d5ea63c9 ] Request (CapabilitiesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.058s 2020-12-14 02:18:14.208 193 DEBUG tempest.lib.common.rest_client [req-c98724b6-2706-43a9-bdce-f2f9d5ea63c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c98724b6-2706-43a9-bdce-f2f9d5ea63c9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.285 193 INFO tempest.lib.common.rest_client [req-0f4d7b04-dab5-47f7-9e4e-1ba0f95a37c9 ] Request (CapabilitiesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.068s 2020-12-14 02:18:14.287 193 DEBUG tempest.lib.common.rest_client [req-0f4d7b04-dab5-47f7-9e4e-1ba0f95a37c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-CapabilitiesV3RbacTest-716328218-desc", "domain_id": "default", "name": "tempest-CapabilitiesV3RbacTest-716328218"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f4d7b04-dab5-47f7-9e4e-1ba0f95a37c9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "6bd5a5ca4e44415698896c946e2f7fae", "name": "tempest-CapabilitiesV3RbacTest-716328218", "domain_id": "default", "description": "tempest-CapabilitiesV3RbacTest-716328218-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.306 186 INFO tempest.lib.common.rest_client [req-7119488c-0b4d-4501-bbef-b7c1e0af52a4 ] Request (NamespacesPropertyRbacTest:test_add_md_properties): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-823347569/properties 0.147s 2020-12-14 02:18:14.310 186 DEBUG tempest.lib.common.rest_client [req-7119488c-0b4d-4501-bbef-b7c1e0af52a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-1273582991", "name": "OS::Glance::Image"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '122', 'content-type': 'application/json', 'x-openstack-request-id': 'req-7119488c-0b4d-4501-bbef-b7c1e0af52a4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-823347569/properties'} Body: b'{"name": "OS::Glance::Image", "type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-1273582991"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.312 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:14.424 193 INFO tempest.lib.common.rest_client [req-ae69a589-e3eb-47cc-8a46-2c77484583ba ] Request (CapabilitiesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.129s 2020-12-14 02:18:14.428 193 DEBUG tempest.lib.common.rest_client [req-ae69a589-e3eb-47cc-8a46-2c77484583ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-CapabilitiesV3RbacTest-716328218", "password": "R8#PHV6xGBDX%4f", "project_id": "6bd5a5ca4e44415698896c946e2f7fae", "email": "tempest-CapabilitiesV3RbacTest-851619256@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '398', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae69a589-e3eb-47cc-8a46-2c77484583ba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "6bd5a5ca4e44415698896c946e2f7fae", "email": "tempest-CapabilitiesV3RbacTest-851619256@example.com", "id": "f7c5f63f11314f7abfa20fc3b3b014af", "name": "tempest-CapabilitiesV3RbacTest-716328218", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/f7c5f63f11314f7abfa20fc3b3b014af"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.430 186 INFO tempest.lib.common.rest_client [req-a7208163-3fb1-4cca-b135-096b83eb8700 ] Request (NamespacesPropertyRbacTest:test_add_md_properties): 200 GET http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles 0.111s 2020-12-14 02:18:14.434 186 DEBUG tempest.lib.common.rest_client [req-a7208163-3fb1-4cca-b135-096b83eb8700 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7208163-3fb1-4cca-b135-096b83eb8700', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.462 197 INFO tempest.lib.common.rest_client [req-33a8c142-9281-402b-bd97-10d6138cb3b9 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.249s 2020-12-14 02:18:14.467 197 DEBUG tempest.lib.common.rest_client [req-33a8c142-9281-402b-bd97-10d6138cb3b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-33a8c142-9281-402b-bd97-10d6138cb3b9', 'x-compute-request-id': 'req-33a8c142-9281-402b-bd97-10d6138cb3b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.490 193 INFO tempest.lib.common.rest_client [req-5086ce48-3a45-4ed0-9d60-cccd00089778 ] Request (CapabilitiesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-14 02:18:14.492 193 DEBUG tempest.lib.common.rest_client [req-5086ce48-3a45-4ed0-9d60-cccd00089778 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5086ce48-3a45-4ed0-9d60-cccd00089778', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.561 193 INFO tempest.lib.common.rest_client [req-3afd084b-791f-462f-a7d6-418316fcb2ae ] Request (CapabilitiesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:18:14.564 193 DEBUG tempest.lib.common.rest_client [req-3afd084b-791f-462f-a7d6-418316fcb2ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3afd084b-791f-462f-a7d6-418316fcb2ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.570 186 INFO tempest.lib.common.rest_client [req-97daefb2-bb90-4542-95e3-b0473688bde2 ] Request (NamespacesPropertyRbacTest:test_add_md_properties): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.129s 2020-12-14 02:18:14.574 186 DEBUG tempest.lib.common.rest_client [req-97daefb2-bb90-4542-95e3-b0473688bde2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97daefb2-bb90-4542-95e3-b0473688bde2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60dc4d53417d48ea9a4d1f57a7c970ab", "name": "tempest-NamespacesPropertyRbacTest-324215785", "password_expires_at": null}, "audit_ids": ["oBFECss0QiCPeK15yNFGeg"], "expires_at": "2020-12-14T03:18:14.000000Z", "issued_at": "2020-12-14T02:18:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "719b010999994140a21ecbe6cd40d59e", "name": "tempest-NamespacesPropertyRbacTest-324215785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.657 193 INFO tempest.lib.common.rest_client [req-bfaa062f-2dce-4fb3-b511-8f847250ad28 ] Request (CapabilitiesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae/users/f7c5f63f11314f7abfa20fc3b3b014af/roles/72a4576c553448cd941b052c1ca0cf2d 0.085s 2020-12-14 02:18:14.660 193 DEBUG tempest.lib.common.rest_client [req-bfaa062f-2dce-4fb3-b511-8f847250ad28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bfaa062f-2dce-4fb3-b511-8f847250ad28', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae/users/f7c5f63f11314f7abfa20fc3b3b014af/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.663 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-CapabilitiesV3RbacTest-716328218', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6bd5a5ca4e44415698896c946e2f7fae', 'project_name': 'tempest-CapabilitiesV3RbacTest-716328218', 'tenant_id': '6bd5a5ca4e44415698896c946e2f7fae', 'tenant_name': 'tempest-CapabilitiesV3RbacTest-716328218', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f7c5f63f11314f7abfa20fc3b3b014af'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:14.665 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-CapabilitiesV3RbacTest-716328218', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6bd5a5ca4e44415698896c946e2f7fae', 'project_name': 'tempest-CapabilitiesV3RbacTest-716328218', 'tenant_id': '6bd5a5ca4e44415698896c946e2f7fae', 'tenant_name': 'tempest-CapabilitiesV3RbacTest-716328218', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f7c5f63f11314f7abfa20fc3b3b014af'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:14.786 189 INFO tempest.lib.common.rest_client [req-8ce60c0f-c358-423f-b000-88ea9691e04c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.246s 2020-12-14 02:18:14.789 189 DEBUG tempest.lib.common.rest_client [req-8ce60c0f-c358-423f-b000-88ea9691e04c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8ce60c0f-c358-423f-b000-88ea9691e04c', 'x-compute-request-id': 'req-8ce60c0f-c358-423f-b000-88ea9691e04c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.828 186 INFO tempest.lib.common.rest_client [req-36901a84-1e65-41cf-9ff7-cd6111a5c87f ] Request (NamespacesPropertyRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-823347569 0.244s 2020-12-14 02:18:14.831 186 DEBUG tempest.lib.common.rest_client [req-36901a84-1e65-41cf-9ff7-cd6111a5c87f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-36901a84-1e65-41cf-9ff7-cd6111a5c87f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-823347569'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.844 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:14.846 193 INFO tempest.lib.common.rest_client [req-32a662ca-29bf-4e69-8349-b81f901a22c6 ] Request (CapabilitiesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.112s 2020-12-14 02:18:14.850 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:18:14.850 193 DEBUG tempest.lib.common.rest_client [req-32a662ca-29bf-4e69-8349-b81f901a22c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6573', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32a662ca-29bf-4e69-8349-b81f901a22c6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f7c5f63f11314f7abfa20fc3b3b014af", "name": "tempest-CapabilitiesV3RbacTest-716328218", "password_expires_at": null}, "audit_ids": ["aIUQb6y5R4KYXc1rAQaaIg"], "expires_at": "2020-12-14T03:18:14.000000Z", "issued_at": "2020-12-14T02:18:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6bd5a5ca4e44415698896c946e2f7fae", "name": "tempest-CapabilitiesV3RbacTest-716328218"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://1 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.860 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_metadef_properties, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:14.901 186 INFO tempest.lib.common.rest_client [req-889fc5ce-8b18-465b-83b5-0ff2605fe184 ] Request (NamespacesPropertyRbacTest:test_get_md_properties): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.035s 2020-12-14 02:18:14.903 186 DEBUG tempest.lib.common.rest_client [req-889fc5ce-8b18-465b-83b5-0ff2605fe184 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-test-ns-356305630", "visibility": "public", "description": "Tempest", "protected": false, "display_name": "tempest-test-ns-356305630"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '383', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-test-ns-356305630', 'x-openstack-request-id': 'req-889fc5ce-8b18-465b-83b5-0ff2605fe184', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-test-ns-356305630", "display_name": "tempest-test-ns-356305630", "description": "Tempest", "visibility": "public", "protected": false, "owner": "719b010999994140a21ecbe6cd40d59e", "created_at": "2020-12-14T02:18:14Z", "updated_at": "2020-12-14T02:18:14Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-356305630", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:14.907 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:14.966 193 INFO tempest.lib.common.rest_client [req-8abcac50-4c1a-4f36-9565-c33e8e6f3170 ] Request (CapabilitiesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:18:14.969 193 DEBUG tempest.lib.common.rest_client [req-8abcac50-4c1a-4f36-9565-c33e8e6f3170 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8abcac50-4c1a-4f36-9565-c33e8e6f3170', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["8HnqndvSRoCsq3szsG1IAw"], "expires_at": "2020-12-14T03:18:14.000000Z", "issued_at": "2020-12-14T02:18:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.020 186 INFO tempest.lib.common.rest_client [req-e1f6b45f-f527-49b8-9574-bee350f8944d ] Request (NamespacesPropertyRbacTest:test_get_md_properties): 200 GET http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles 0.108s 2020-12-14 02:18:15.024 186 DEBUG tempest.lib.common.rest_client [req-e1f6b45f-f527-49b8-9574-bee350f8944d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1f6b45f-f527-49b8-9574-bee350f8944d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.076 186 INFO tempest.lib.common.rest_client [req-97c866cc-4b03-4e15-a1b3-eaad28c651a1 ] Request (NamespacesPropertyRbacTest:test_get_md_properties): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:18:15.080 186 DEBUG tempest.lib.common.rest_client [req-97c866cc-4b03-4e15-a1b3-eaad28c651a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97c866cc-4b03-4e15-a1b3-eaad28c651a1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60dc4d53417d48ea9a4d1f57a7c970ab", "name": "tempest-NamespacesPropertyRbacTest-324215785", "password_expires_at": null}, "audit_ids": ["f9fACewBR8WAAQjDwui-iQ"], "expires_at": "2020-12-14T03:18:15.000000Z", "issued_at": "2020-12-14T02:18:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "719b010999994140a21ecbe6cd40d59e", "name": "tempest-NamespacesPropertyRbacTest-324215785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.085 193 INFO tempest.lib.common.rest_client [req-e9e0c139-e807-4ccd-b6b2-f740422788d7 ] Request (CapabilitiesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:18:15.089 193 DEBUG tempest.lib.common.rest_client [req-e9e0c139-e807-4ccd-b6b2-f740422788d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9e0c139-e807-4ccd-b6b2-f740422788d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["r6gd4sPIStOibTw_JSvssw"], "expires_at": "2020-12-14T03:18:15.000000Z", "issued_at": "2020-12-14T02:18:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.160 193 INFO tempest.lib.common.rest_client [req-3a364b88-f8c1-4ab5-86a8-b08541eee3ce ] Request (CapabilitiesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.064s 2020-12-14 02:18:15.164 193 DEBUG tempest.lib.common.rest_client [req-3a364b88-f8c1-4ab5-86a8-b08541eee3ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a364b88-f8c1-4ab5-86a8-b08541eee3ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.184 186 INFO tempest.lib.common.rest_client [req-fed8155f-6460-4a43-aba4-6f3c361d1d52 ] Request (NamespacesPropertyRbacTest:test_get_md_properties): 200 GET http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-356305630/properties 0.096s 2020-12-14 02:18:15.189 186 DEBUG tempest.lib.common.rest_client [req-fed8155f-6460-4a43-aba4-6f3c361d1d52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '18', 'content-type': 'application/json', 'x-openstack-request-id': 'req-fed8155f-6460-4a43-aba4-6f3c361d1d52', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-356305630/properties'} Body: b'{"properties": {}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.191 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:15.275 193 INFO tempest.lib.common.rest_client [req-80ec8da1-fa31-4cfb-9b15-f17a983619c1 ] Request (CapabilitiesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.105s 2020-12-14 02:18:15.278 193 DEBUG tempest.lib.common.rest_client [req-80ec8da1-fa31-4cfb-9b15-f17a983619c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-80ec8da1-fa31-4cfb-9b15-f17a983619c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.280 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:18:15.282 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:15.312 186 INFO tempest.lib.common.rest_client [req-fb18dbe5-85c1-4198-b1fc-158802db22b3 ] Request (NamespacesPropertyRbacTest:test_get_md_properties): 200 GET http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles 0.116s 2020-12-14 02:18:15.315 186 DEBUG tempest.lib.common.rest_client [req-fb18dbe5-85c1-4198-b1fc-158802db22b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fb18dbe5-85c1-4198-b1fc-158802db22b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.350 193 INFO tempest.lib.common.rest_client [req-9df2533c-decc-4b96-a20b-2d5f33e92dc8 ] Request (CapabilitiesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae/users/f7c5f63f11314f7abfa20fc3b3b014af/roles 0.061s 2020-12-14 02:18:15.352 193 DEBUG tempest.lib.common.rest_client [req-9df2533c-decc-4b96-a20b-2d5f33e92dc8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9df2533c-decc-4b96-a20b-2d5f33e92dc8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae/users/f7c5f63f11314f7abfa20fc3b3b014af/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae/users/f7c5f63f11314f7abfa20fc3b3b014af/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.415 186 INFO tempest.lib.common.rest_client [req-2e438c14-a806-4585-a9a6-de76c34f634b ] Request (NamespacesPropertyRbacTest:test_get_md_properties): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:18:15.419 186 DEBUG tempest.lib.common.rest_client [req-2e438c14-a806-4585-a9a6-de76c34f634b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e438c14-a806-4585-a9a6-de76c34f634b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60dc4d53417d48ea9a4d1f57a7c970ab", "name": "tempest-NamespacesPropertyRbacTest-324215785", "password_expires_at": null}, "audit_ids": ["dCzKn6zxRNOjo4n7z8_Crw"], "expires_at": "2020-12-14T03:18:15.000000Z", "issued_at": "2020-12-14T02:18:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "719b010999994140a21ecbe6cd40d59e", "name": "tempest-NamespacesPropertyRbacTest-324215785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.434 193 INFO tempest.lib.common.rest_client [req-d81a633f-22b7-44d7-8ae3-25ae291cc309 ] Request (CapabilitiesV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae/users/f7c5f63f11314f7abfa20fc3b3b014af/roles/72a4576c553448cd941b052c1ca0cf2d 0.074s 2020-12-14 02:18:15.437 193 DEBUG tempest.lib.common.rest_client [req-d81a633f-22b7-44d7-8ae3-25ae291cc309 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d81a633f-22b7-44d7-8ae3-25ae291cc309', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae/users/f7c5f63f11314f7abfa20fc3b3b014af/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.560 193 INFO tempest.lib.common.rest_client [req-1d8ab0bf-4707-4eb3-ae1c-bfc73eb9557c ] Request (CapabilitiesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae/users/f7c5f63f11314f7abfa20fc3b3b014af/roles/a629c95d64b3416fb80ae90af4f69c05 0.114s 2020-12-14 02:18:15.563 193 DEBUG tempest.lib.common.rest_client [req-1d8ab0bf-4707-4eb3-ae1c-bfc73eb9557c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d8ab0bf-4707-4eb3-ae1c-bfc73eb9557c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae/users/f7c5f63f11314f7abfa20fc3b3b014af/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.652 186 INFO tempest.lib.common.rest_client [req-02b58c34-8e4d-432d-9c70-8ff06090fa1f ] Request (NamespacesPropertyRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-356305630 0.225s 2020-12-14 02:18:15.655 186 DEBUG tempest.lib.common.rest_client [req-02b58c34-8e4d-432d-9c70-8ff06090fa1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-02b58c34-8e4d-432d-9c70-8ff06090fa1f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-356305630'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.665 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:15.668 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:18:15.675 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_metadef_property, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:15.714 186 INFO tempest.lib.common.rest_client [req-2ab0426e-4a31-4784-9a97-8e5e5fd6954f ] Request (NamespacesPropertyRbacTest:test_get_md_property): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.035s 2020-12-14 02:18:15.717 186 DEBUG tempest.lib.common.rest_client [req-2ab0426e-4a31-4784-9a97-8e5e5fd6954f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-test-ns-1901802297", "visibility": "public", "description": "Tempest", "protected": false, "display_name": "tempest-test-ns-1901802297"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '386', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-test-ns-1901802297', 'x-openstack-request-id': 'req-2ab0426e-4a31-4784-9a97-8e5e5fd6954f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-test-ns-1901802297", "display_name": "tempest-test-ns-1901802297", "description": "Tempest", "visibility": "public", "protected": false, "owner": "719b010999994140a21ecbe6cd40d59e", "created_at": "2020-12-14T02:18:15Z", "updated_at": "2020-12-14T02:18:15Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-1901802297", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.759 186 INFO tempest.lib.common.rest_client [req-310570fb-5385-40b0-83d5-db51190ca541 ] Request (NamespacesPropertyRbacTest:test_get_md_property): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1901802297/properties 0.036s 2020-12-14 02:18:15.762 186 DEBUG tempest.lib.common.rest_client [req-310570fb-5385-40b0-83d5-db51190ca541 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-1039767300", "name": "OS::Glance::Image"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '122', 'content-type': 'application/json', 'x-openstack-request-id': 'req-310570fb-5385-40b0-83d5-db51190ca541', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1901802297/properties'} Body: b'{"name": "OS::Glance::Image", "type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-1039767300"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.764 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:15.809 197 INFO tempest.lib.common.rest_client [req-1901b3da-2e9f-4001-982b-01fdace7d664 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.219s 2020-12-14 02:18:15.813 197 DEBUG tempest.lib.common.rest_client [req-1901b3da-2e9f-4001-982b-01fdace7d664 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1901b3da-2e9f-4001-982b-01fdace7d664', 'x-compute-request-id': 'req-1901b3da-2e9f-4001-982b-01fdace7d664', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.871 186 INFO tempest.lib.common.rest_client [req-b39dd667-242c-4da9-823a-625729456c18 ] Request (NamespacesPropertyRbacTest:test_get_md_property): 200 GET http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles 0.102s 2020-12-14 02:18:15.875 186 DEBUG tempest.lib.common.rest_client [req-b39dd667-242c-4da9-823a-625729456c18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b39dd667-242c-4da9-823a-625729456c18', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:15.968 186 INFO tempest.lib.common.rest_client [req-16c65d94-6535-4693-baf6-1a9f1eae532a ] Request (NamespacesPropertyRbacTest:test_get_md_property): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-14 02:18:15.972 186 DEBUG tempest.lib.common.rest_client [req-16c65d94-6535-4693-baf6-1a9f1eae532a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16c65d94-6535-4693-baf6-1a9f1eae532a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60dc4d53417d48ea9a4d1f57a7c970ab", "name": "tempest-NamespacesPropertyRbacTest-324215785", "password_expires_at": null}, "audit_ids": ["2NTQ_Ty3QIuMAwEleEaAtg"], "expires_at": "2020-12-14T03:18:15.000000Z", "issued_at": "2020-12-14T02:18:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "719b010999994140a21ecbe6cd40d59e", "name": "tempest-NamespacesPropertyRbacTest-324215785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:16.097 189 INFO tempest.lib.common.rest_client [req-073a0f44-7b0a-4c85-b795-474eb18edd3a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.202s 2020-12-14 02:18:16.100 189 DEBUG tempest.lib.common.rest_client [req-073a0f44-7b0a-4c85-b795-474eb18edd3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-073a0f44-7b0a-4c85-b795-474eb18edd3a', 'x-compute-request-id': 'req-073a0f44-7b0a-4c85-b795-474eb18edd3a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:16.111 186 INFO tempest.lib.common.rest_client [req-fee28c7c-38db-4c37-9445-e0126014c83f ] Request (NamespacesPropertyRbacTest:test_get_md_property): 200 GET http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1901802297/properties/OS::Glance::Image 0.131s 2020-12-14 02:18:16.115 186 DEBUG tempest.lib.common.rest_client [req-fee28c7c-38db-4c37-9445-e0126014c83f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '122', 'content-type': 'application/json', 'x-openstack-request-id': 'req-fee28c7c-38db-4c37-9445-e0126014c83f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1901802297/properties/OS::Glance::Image'} Body: b'{"name": "OS::Glance::Image", "type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-1039767300"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:16.118 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:16.188 186 INFO tempest.lib.common.rest_client [req-0512c0dd-2a56-4d34-afae-48dd3f0dd477 ] Request (NamespacesPropertyRbacTest:test_get_md_property): 200 GET http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles 0.063s 2020-12-14 02:18:16.191 186 DEBUG tempest.lib.common.rest_client [req-0512c0dd-2a56-4d34-afae-48dd3f0dd477 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0512c0dd-2a56-4d34-afae-48dd3f0dd477', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:16.240 186 INFO tempest.lib.common.rest_client [req-cbf56e42-03ac-4c3c-bef4-a64d7be1bc47 ] Request (NamespacesPropertyRbacTest:test_get_md_property): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:18:16.243 186 DEBUG tempest.lib.common.rest_client [req-cbf56e42-03ac-4c3c-bef4-a64d7be1bc47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cbf56e42-03ac-4c3c-bef4-a64d7be1bc47', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60dc4d53417d48ea9a4d1f57a7c970ab", "name": "tempest-NamespacesPropertyRbacTest-324215785", "password_expires_at": null}, "audit_ids": ["mlg0jyTySqGOG5VsRr3fiQ"], "expires_at": "2020-12-14T03:18:16.000000Z", "issued_at": "2020-12-14T02:18:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "719b010999994140a21ecbe6cd40d59e", "name": "tempest-NamespacesPropertyRbacTest-324215785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:16.355 186 INFO tempest.lib.common.rest_client [req-a5aece8f-b2de-40f9-a801-b8084767313c ] Request (NamespacesPropertyRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1901802297 0.101s 2020-12-14 02:18:16.358 186 DEBUG tempest.lib.common.rest_client [req-a5aece8f-b2de-40f9-a801-b8084767313c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-a5aece8f-b2de-40f9-a801-b8084767313c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1901802297'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:16.370 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:16.374 186 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:18:16.382 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_metadef_property, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:16.424 186 INFO tempest.lib.common.rest_client [req-48cf7731-7955-4212-b446-9e5a1a9de3d4 ] Request (NamespacesPropertyRbacTest:test_modify_md_properties): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.035s 2020-12-14 02:18:16.427 186 DEBUG tempest.lib.common.rest_client [req-48cf7731-7955-4212-b446-9e5a1a9de3d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-test-ns-617108064", "visibility": "public", "description": "Tempest", "protected": false, "display_name": "tempest-test-ns-617108064"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '383', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-test-ns-617108064', 'x-openstack-request-id': 'req-48cf7731-7955-4212-b446-9e5a1a9de3d4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-test-ns-617108064", "display_name": "tempest-test-ns-617108064", "description": "Tempest", "visibility": "public", "protected": false, "owner": "719b010999994140a21ecbe6cd40d59e", "created_at": "2020-12-14T02:18:16Z", "updated_at": "2020-12-14T02:18:16Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-617108064", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:16.466 186 INFO tempest.lib.common.rest_client [req-23f2f146-01b2-46ca-bceb-f9f329515fa6 ] Request (NamespacesPropertyRbacTest:test_modify_md_properties): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-617108064/properties 0.032s 2020-12-14 02:18:16.468 186 DEBUG tempest.lib.common.rest_client [req-23f2f146-01b2-46ca-bceb-f9f329515fa6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-1902156880", "name": "OS::Glance::Image"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '122', 'content-type': 'application/json', 'x-openstack-request-id': 'req-23f2f146-01b2-46ca-bceb-f9f329515fa6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-617108064/properties'} Body: b'{"name": "OS::Glance::Image", "type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-1902156880"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:16.471 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:16.545 186 INFO tempest.lib.common.rest_client [req-fcaf2b3e-4a71-407e-9273-eccc0a61b3b2 ] Request (NamespacesPropertyRbacTest:test_modify_md_properties): 200 GET http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles 0.068s 2020-12-14 02:18:16.549 186 DEBUG tempest.lib.common.rest_client [req-fcaf2b3e-4a71-407e-9273-eccc0a61b3b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fcaf2b3e-4a71-407e-9273-eccc0a61b3b2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:16.601 186 INFO tempest.lib.common.rest_client [req-05eb5338-551e-4616-b081-cd52e8a63e8f ] Request (NamespacesPropertyRbacTest:test_modify_md_properties): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:18:16.604 186 DEBUG tempest.lib.common.rest_client [req-05eb5338-551e-4616-b081-cd52e8a63e8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05eb5338-551e-4616-b081-cd52e8a63e8f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60dc4d53417d48ea9a4d1f57a7c970ab", "name": "tempest-NamespacesPropertyRbacTest-324215785", "password_expires_at": null}, "audit_ids": ["liq94S_ESN-Zr-_Y_XVnUQ"], "expires_at": "2020-12-14T03:18:16.000000Z", "issued_at": "2020-12-14T02:18:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "719b010999994140a21ecbe6cd40d59e", "name": "tempest-NamespacesPropertyRbacTest-324215785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:16.671 193 INFO tempest.lib.common.rest_client [req-5dc98ecd-3018-4aef-8385-1ea3ee218b31 ] Request (CapabilitiesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:18:16.674 193 DEBUG tempest.lib.common.rest_client [req-5dc98ecd-3018-4aef-8385-1ea3ee218b31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5dc98ecd-3018-4aef-8385-1ea3ee218b31', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f7c5f63f11314f7abfa20fc3b3b014af", "name": "tempest-CapabilitiesV3RbacTest-716328218", "password_expires_at": null}, "audit_ids": ["WX2kh05TTiSq_wDpllLAiw"], "expires_at": "2020-12-14T03:18:16.000000Z", "issued_at": "2020-12-14T02:18:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6bd5a5ca4e44415698896c946e2f7fae", "name": "tempest-CapabilitiesV3RbacTest-716328218"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:16.686 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:16.712 186 INFO tempest.lib.common.rest_client [req-7d3162b4-f504-4803-a5dc-d6d9ac7ee307 ] Request (NamespacesPropertyRbacTest:test_modify_md_properties): 200 PUT http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-617108064/properties/OS::Glance::Image 0.101s 2020-12-14 02:18:16.715 186 DEBUG tempest.lib.common.rest_client [req-7d3162b4-f504-4803-a5dc-d6d9ac7ee307 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-1902156880", "name": "OS::Glance::Image"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '122', 'content-type': 'application/json', 'x-openstack-request-id': 'req-7d3162b4-f504-4803-a5dc-d6d9ac7ee307', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-617108064/properties/OS::Glance::Image'} Body: b'{"name": "OS::Glance::Image", "type": "string", "title": "tempest-NamespacesPropertyRbacTest-test-ns-property-1902156880"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:16.718 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:16.782 186 INFO tempest.lib.common.rest_client [req-4c309e9f-5a15-4b92-a0a5-da1459e44dc6 ] Request (NamespacesPropertyRbacTest:test_modify_md_properties): 200 GET http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles 0.057s 2020-12-14 02:18:16.786 186 DEBUG tempest.lib.common.rest_client [req-4c309e9f-5a15-4b92-a0a5-da1459e44dc6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c309e9f-5a15-4b92-a0a5-da1459e44dc6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e/users/60dc4d53417d48ea9a4d1f57a7c970ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:16.829 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:capabilities, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:16.833 186 INFO tempest.lib.common.rest_client [req-6e9dcbdf-06c2-4f9f-9b29-a7f5f3ce55cc ] Request (NamespacesPropertyRbacTest:test_modify_md_properties): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:18:16.837 186 DEBUG tempest.lib.common.rest_client [req-6e9dcbdf-06c2-4f9f-9b29-a7f5f3ce55cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e9dcbdf-06c2-4f9f-9b29-a7f5f3ce55cc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60dc4d53417d48ea9a4d1f57a7c970ab", "name": "tempest-NamespacesPropertyRbacTest-324215785", "password_expires_at": null}, "audit_ids": ["Y3i5yCXhQBefB7Uwkp4iJA"], "expires_at": "2020-12-14T03:18:16.000000Z", "issued_at": "2020-12-14T02:18:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "719b010999994140a21ecbe6cd40d59e", "name": "tempest-NamespacesPropertyRbacTest-324215785"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_719b010999994140a21ecbe6cd40d59e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:16.963 193 INFO tempest.lib.common.rest_client [req-8fa5c398-1a14-44b5-a2c4-22b3d39712b9 ] Request (CapabilitiesV3RbacTest:test_show_back_end_capabilities): 200 GET http://172.30.13.94/volume/v3/6bd5a5ca4e44415698896c946e2f7fae/os-hosts 0.130s 2020-12-14 02:18:16.964 193 DEBUG tempest.lib.common.rest_client [req-8fa5c398-1a14-44b5-a2c4-22b3d39712b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8fa5c398-1a14-44b5-a2c4-22b3d39712b9', 'content-length': '736', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8fa5c398-1a14-44b5-a2c4-22b3d39712b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6bd5a5ca4e44415698896c946e2f7fae/os-hosts'} Body: b'{"hosts": [{"host_name": "lf-virtual9@ceph", "service": "cinder-volume", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-12-14T02:18:15.000000"}, {"host_name": "lf-virtual9", "service": "cinder-scheduler", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-12-14T02:18:07.000000"}, {"host_name": "lf-virtual9", "service": "cinder-backup", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-12-14T02:18:08.000000"}, {"host_name": "lf-virtual8@ceph", "service": "cinder-volume", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-12-14T02:18:12.000000"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:16.986 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:17.050 186 INFO tempest.lib.common.rest_client [req-1b95646d-ddca-4ef9-afc4-f3572eca51d9 ] Request (NamespacesPropertyRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-617108064 0.203s 2020-12-14 02:18:17.052 186 DEBUG tempest.lib.common.rest_client [req-1b95646d-ddca-4ef9-afc4-f3572eca51d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-1b95646d-ddca-4ef9-afc4-f3572eca51d9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-617108064'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:17.054 193 INFO tempest.lib.common.rest_client [req-06065d4f-ee1b-4e8e-9b12-6ce5e6855767 ] Request (CapabilitiesV3RbacTest:test_show_back_end_capabilities): 200 GET http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae/users/f7c5f63f11314f7abfa20fc3b3b014af/roles 0.062s 2020-12-14 02:18:17.058 193 DEBUG tempest.lib.common.rest_client [req-06065d4f-ee1b-4e8e-9b12-6ce5e6855767 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06065d4f-ee1b-4e8e-9b12-6ce5e6855767', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae/users/f7c5f63f11314f7abfa20fc3b3b014af/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae/users/f7c5f63f11314f7abfa20fc3b3b014af/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:17.112 193 INFO tempest.lib.common.rest_client [req-0951ec68-3172-45bb-a00f-00257e18659c ] Request (CapabilitiesV3RbacTest:test_show_back_end_capabilities): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:18:17.117 193 DEBUG tempest.lib.common.rest_client [req-0951ec68-3172-45bb-a00f-00257e18659c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0951ec68-3172-45bb-a00f-00257e18659c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f7c5f63f11314f7abfa20fc3b3b014af", "name": "tempest-CapabilitiesV3RbacTest-716328218", "password_expires_at": null}, "audit_ids": ["EPfEvGpATUyM4fQVfwVoWg"], "expires_at": "2020-12-14T03:18:17.000000Z", "issued_at": "2020-12-14T02:18:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6bd5a5ca4e44415698896c946e2f7fae", "name": "tempest-CapabilitiesV3RbacTest-716328218"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:17.133 197 INFO tempest.lib.common.rest_client [req-5bef2e06-9683-467a-afc8-67924e7eeceb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.215s 2020-12-14 02:18:17.136 197 DEBUG tempest.lib.common.rest_client [req-5bef2e06-9683-467a-afc8-67924e7eeceb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5bef2e06-9683-467a-afc8-67924e7eeceb', 'x-compute-request-id': 'req-5bef2e06-9683-467a-afc8-67924e7eeceb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:17.216 186 INFO tempest.lib.common.rest_client [req-e0ca0bc3-4af9-4f3a-9333-3f1d8cda3017 ] Request (NamespacesPropertyRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/60dc4d53417d48ea9a4d1f57a7c970ab 0.138s 2020-12-14 02:18:17.222 186 DEBUG tempest.lib.common.rest_client [req-e0ca0bc3-4af9-4f3a-9333-3f1d8cda3017 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0ca0bc3-4af9-4f3a-9333-3f1d8cda3017', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/60dc4d53417d48ea9a4d1f57a7c970ab'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:17.242 193 INFO tempest.lib.common.rest_client [req-ac0558f2-a1d7-4272-a74b-8cc6d03246f0 ] Request (CapabilitiesV3RbacTest:test_show_back_end_capabilities): 200 GET http://172.30.13.94/volume/v3/6bd5a5ca4e44415698896c946e2f7fae/capabilities/lf-virtual9@ceph 0.118s 2020-12-14 02:18:17.245 193 DEBUG tempest.lib.common.rest_client [req-ac0558f2-a1d7-4272-a74b-8cc6d03246f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ac0558f2-a1d7-4272-a74b-8cc6d03246f0', 'content-length': '696', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ac0558f2-a1d7-4272-a74b-8cc6d03246f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6bd5a5ca4e44415698896c946e2f7fae/capabilities/lf-virtual9@ceph'} Body: b'{"namespace": "OS::Storage::Capabilities::lf-virtual9@ceph", "vendor_name": "Open Source", "volume_backend_name": "ceph", "pool_name": null, "driver_version": "1.2.0", "storage_protocol": "ceph", "display_name": null, "description": null, "visibility": null, "replication_targets": [], "properties": {"thin_provisioning": {"title": "Thin Provisioning", "description": "Sets thin provisioning.", "type": "boolean"}, "compression": {"title": "Compression", "description": "Enables compression.", "type": "boolean"}, "qos": {"title": "QoS", "description": "Enables QoS.", "type": "boolean"}, "replication_enabled": {"title": "Replication", "description": "Enables replication.", "type": "boolean"}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:17.280 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:17.333 186 INFO tempest.lib.common.rest_client [req-82017e19-0ed2-4c81-a912-fbf0dd8823c5 ] Request (NamespacesPropertyRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:18:17.336 186 DEBUG tempest.lib.common.rest_client [req-82017e19-0ed2-4c81-a912-fbf0dd8823c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-82017e19-0ed2-4c81-a912-fbf0dd8823c5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["N6e5wJQ8RrmP0jCtkWe-Hw"], "expires_at": "2020-12-14T03:18:17.000000Z", "issued_at": "2020-12-14T02:18:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:17.409 193 INFO tempest.lib.common.rest_client [req-ac87bd6f-b723-4a19-b554-973cbee4ecc4 ] Request (CapabilitiesV3RbacTest:test_show_back_end_capabilities): 200 GET http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae/users/f7c5f63f11314f7abfa20fc3b3b014af/roles 0.122s 2020-12-14 02:18:17.412 193 DEBUG tempest.lib.common.rest_client [req-ac87bd6f-b723-4a19-b554-973cbee4ecc4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac87bd6f-b723-4a19-b554-973cbee4ecc4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae/users/f7c5f63f11314f7abfa20fc3b3b014af/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae/users/f7c5f63f11314f7abfa20fc3b3b014af/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:17.463 189 INFO tempest.lib.common.rest_client [req-92c87db4-2393-452d-ac1a-b92c8edd6a9d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.253s 2020-12-14 02:18:17.466 189 DEBUG tempest.lib.common.rest_client [req-92c87db4-2393-452d-ac1a-b92c8edd6a9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-92c87db4-2393-452d-ac1a-b92c8edd6a9d', 'x-compute-request-id': 'req-92c87db4-2393-452d-ac1a-b92c8edd6a9d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:17.515 193 INFO tempest.lib.common.rest_client [req-6cf8d0ea-cf0e-4a5c-9b64-f6dd9785410d ] Request (CapabilitiesV3RbacTest:test_show_back_end_capabilities): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:18:17.518 193 DEBUG tempest.lib.common.rest_client [req-6cf8d0ea-cf0e-4a5c-9b64-f6dd9785410d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6cf8d0ea-cf0e-4a5c-9b64-f6dd9785410d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f7c5f63f11314f7abfa20fc3b3b014af", "name": "tempest-CapabilitiesV3RbacTest-716328218", "password_expires_at": null}, "audit_ids": ["KAi7ZY8oRCKYyakhGD9R6Q"], "expires_at": "2020-12-14T03:18:17.000000Z", "issued_at": "2020-12-14T02:18:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6bd5a5ca4e44415698896c946e2f7fae", "name": "tempest-CapabilitiesV3RbacTest-716328218"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6bd5a5ca4e44415698896c946e2f7fae", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:17.701 193 INFO tempest.lib.common.rest_client [req-7e98eabe-f0cc-451d-aa5f-64e9cc79aba5 ] Request (CapabilitiesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/f7c5f63f11314f7abfa20fc3b3b014af 0.165s 2020-12-14 02:18:17.704 193 DEBUG tempest.lib.common.rest_client [req-7e98eabe-f0cc-451d-aa5f-64e9cc79aba5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e98eabe-f0cc-451d-aa5f-64e9cc79aba5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/f7c5f63f11314f7abfa20fc3b3b014af'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:17.725 186 INFO tempest.lib.common.rest_client [req-7a78b775-df91-4b3a-acff-5a287dfc721a ] Request (NamespacesPropertyRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=719b010999994140a21ecbe6cd40d59e&name=default 0.382s 2020-12-14 02:18:17.728 186 DEBUG tempest.lib.common.rest_client [req-7a78b775-df91-4b3a-acff-5a287dfc721a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-7a78b775-df91-4b3a-acff-5a287dfc721a', 'date': 'Mon, 14 Dec 2020 02:18:17 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=719b010999994140a21ecbe6cd40d59e&name=default'} Body: b'{"security_groups": [{"id": "98b897fa-f887-4585-9b1c-cfcfc8e2f552", "name": "default", "stateful": true, "tenant_id": "719b010999994140a21ecbe6cd40d59e", "description": "Default security group", "security_group_rules": [{"id": "063da96a-370e-4655-a421-6461eb3c1fdf", "tenant_id": "719b010999994140a21ecbe6cd40d59e", "security_group_id": "98b897fa-f887-4585-9b1c-cfcfc8e2f552", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:17Z", "updated_at": "2020-12-14T02:18:17Z", "revision_number": 0, "project_id": "719b010999994140a21ecbe6cd40d59e"}, {"id": "604b05eb-d2c0-4a7f-a532-2c0e920ddcbe", "tenant_id": "719b010999994140a21ecbe6cd40d59e", "security_group_id": "98b897fa-f887-4585-9b1c-cfcfc8e2f552", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "98b897fa-f887-4585-9b1c-cfcfc8e2f552", "description": null, "tags": [], "created_at": "2020-12-14T02:18:17Z", "updated_at": "2020-12-14T02:18:17Z", "revision_number": 0, "project_id": "719b010999994140a21ecbe6cd40d59e"}, {"id": "90b40fc8-af09-4440-8b55-154eff42d6cd", "tenant_id": "719b010999994140a21ecbe6cd40d59e", "security_group_id": "98b897fa-f887-4585-9b1c-cfcfc8e2f552", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "98b897fa-f887-4585-9b1c-cfcfc8e2f552", "description": null, "tags": [], "created_at": "2020-12-14T02:18:17Z", "updated_at": "2020-12-14T02:18:17Z", "revision_number": 0, "project_id": "719b010999994140a21ecbe6cd40d59e"}, {"id": "af21648e-30b0-4dfc-be66-ee7cfd0eeba3", "tenant_id": "719b010999994140a21ecbe6cd40d59e", "security_group_id": "98b897fa-f887-4585-9b1c-cfcfc8e2f552", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:17Z", "updated_at": "2020-12-14T02:18:17Z", "revision_number": 0, "project_id": "719b010999994140a21ecbe6cd40d59e"}], "tags": [], "created_at": "2020-12-14T02:18:17Z", "updated_at": "2020-12-14T02:18:17Z", "revision_number": 1, "project_id": "719b010999994140a21ecbe6cd40d59e"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:17.806 193 INFO tempest.lib.common.rest_client [req-c78fb172-cd8d-42ec-9b2c-ce2d901e7a92 ] Request (CapabilitiesV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:18:17.809 193 DEBUG tempest.lib.common.rest_client [req-c78fb172-cd8d-42ec-9b2c-ce2d901e7a92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c78fb172-cd8d-42ec-9b2c-ce2d901e7a92', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["XucGfUkPRda1gZDRJ1SjpA"], "expires_at": "2020-12-14T03:18:17.000000Z", "issued_at": "2020-12-14T02:18:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:17.849 186 INFO tempest.lib.common.rest_client [req-84755d3c-e7e6-43e5-af7f-87d2a2fb2180 ] Request (NamespacesPropertyRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/98b897fa-f887-4585-9b1c-cfcfc8e2f552 0.112s 2020-12-14 02:18:17.853 186 DEBUG tempest.lib.common.rest_client [req-84755d3c-e7e6-43e5-af7f-87d2a2fb2180 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-84755d3c-e7e6-43e5-af7f-87d2a2fb2180', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:17 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/98b897fa-f887-4585-9b1c-cfcfc8e2f552'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.001 186 INFO tempest.lib.common.rest_client [req-2f922139-9f7d-447b-8dfc-01f5427b768e ] Request (NamespacesPropertyRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e 0.142s 2020-12-14 02:18:18.004 186 DEBUG tempest.lib.common.rest_client [req-2f922139-9f7d-447b-8dfc-01f5427b768e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f922139-9f7d-447b-8dfc-01f5427b768e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/719b010999994140a21ecbe6cd40d59e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.039 193 INFO tempest.lib.common.rest_client [req-b51a6176-ac56-4190-a495-b3cbb4a3cc78 ] Request (CapabilitiesV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6bd5a5ca4e44415698896c946e2f7fae&name=default 0.223s 2020-12-14 02:18:18.043 193 DEBUG tempest.lib.common.rest_client [req-b51a6176-ac56-4190-a495-b3cbb4a3cc78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-b51a6176-ac56-4190-a495-b3cbb4a3cc78', 'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6bd5a5ca4e44415698896c946e2f7fae&name=default'} Body: b'{"security_groups": [{"id": "1fd22277-33e5-4638-8df8-9a22d2174692", "name": "default", "stateful": true, "tenant_id": "6bd5a5ca4e44415698896c946e2f7fae", "description": "Default security group", "security_group_rules": [{"id": "073c213f-2442-4836-80e5-986b49a918b6", "tenant_id": "6bd5a5ca4e44415698896c946e2f7fae", "security_group_id": "1fd22277-33e5-4638-8df8-9a22d2174692", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1fd22277-33e5-4638-8df8-9a22d2174692", "description": null, "tags": [], "created_at": "2020-12-14T02:18:17Z", "updated_at": "2020-12-14T02:18:17Z", "revision_number": 0, "project_id": "6bd5a5ca4e44415698896c946e2f7fae"}, {"id": "10b09aaf-9247-4647-bf15-cb0169a1a817", "tenant_id": "6bd5a5ca4e44415698896c946e2f7fae", "security_group_id": "1fd22277-33e5-4638-8df8-9a22d2174692", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:17Z", "updated_at": "2020-12-14T02:18:17Z", "revision_number": 0, "project_id": "6bd5a5ca4e44415698896c946e2f7fae"}, {"id": "c39357d0-c80c-4470-97b0-7a3573f621ba", "tenant_id": "6bd5a5ca4e44415698896c946e2f7fae", "security_group_id": "1fd22277-33e5-4638-8df8-9a22d2174692", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1fd22277-33e5-4638-8df8-9a22d2174692", "description": null, "tags": [], "created_at": "2020-12-14T02:18:17Z", "updated_at": "2020-12-14T02:18:17Z", "revision_number": 0, "project_id": "6bd5a5ca4e44415698896c946e2f7fae"}, {"id": "ccd30137-153d-43a2-b5ba-e9a79614357c", "tenant_id": "6bd5a5ca4e44415698896c946e2f7fae", "security_group_id": "1fd22277-33e5-4638-8df8-9a22d2174692", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:17Z", "updated_at": "2020-12-14T02:18:17Z", "revision_number": 0, "project_id": "6bd5a5ca4e44415698896c946e2f7fae"}], "tags": [], "created_at": "2020-12-14T02:18:17Z", "updated_at": "2020-12-14T02:18:17Z", "revision_number": 1, "project_id": "6bd5a5ca4e44415698896c946e2f7fae"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.125 186 INFO tempest.lib.common.rest_client [req-7c03d64a-9aa7-4d89-b4fd-c4bafa858647 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:18:18.127 186 DEBUG tempest.lib.common.rest_client [req-7c03d64a-9aa7-4d89-b4fd-c4bafa858647 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7c03d64a-9aa7-4d89-b4fd-c4bafa858647', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["tNYQnpk9SNiwUYa-KNUfrw"], "expires_at": "2020-12-14T03:18:18.000000Z", "issued_at": "2020-12-14T02:18:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.158 193 INFO tempest.lib.common.rest_client [req-910d03be-6dd4-46d5-b14d-86866dd9414f ] Request (CapabilitiesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/1fd22277-33e5-4638-8df8-9a22d2174692 0.108s 2020-12-14 02:18:18.161 193 DEBUG tempest.lib.common.rest_client [req-910d03be-6dd4-46d5-b14d-86866dd9414f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-910d03be-6dd4-46d5-b14d-86866dd9414f', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/1fd22277-33e5-4638-8df8-9a22d2174692'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.234 186 INFO tempest.lib.common.rest_client [req-06d3a4cf-7f4e-428b-94bb-9c6aa55784f4 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:18:18.237 186 DEBUG tempest.lib.common.rest_client [req-06d3a4cf-7f4e-428b-94bb-9c6aa55784f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06d3a4cf-7f4e-428b-94bb-9c6aa55784f4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["39ifrBUSSAWF-OYu7cZYGg"], "expires_at": "2020-12-14T03:18:18.000000Z", "issued_at": "2020-12-14T02:18:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.301 193 INFO tempest.lib.common.rest_client [req-7c6f0d2c-c4ac-429b-8157-1b9c4f9443aa ] Request (CapabilitiesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae 0.132s 2020-12-14 02:18:18.304 193 DEBUG tempest.lib.common.rest_client [req-7c6f0d2c-c4ac-429b-8157-1b9c4f9443aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7c6f0d2c-c4ac-429b-8157-1b9c4f9443aa', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6bd5a5ca4e44415698896c946e2f7fae'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.354 186 INFO tempest.lib.common.rest_client [req-d24c3080-7deb-4149-8021-f67673b72b82 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.109s 2020-12-14 02:18:18.357 186 DEBUG tempest.lib.common.rest_client [req-d24c3080-7deb-4149-8021-f67673b72b82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d24c3080-7deb-4149-8021-f67673b72b82', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.371 193 INFO tempest.lib.common.rest_client [req-bec1352b-1f3f-459a-b507-1a95e3f75c5a ] Request (LimitsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:18:18.373 193 DEBUG tempest.lib.common.rest_client [req-bec1352b-1f3f-459a-b507-1a95e3f75c5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bec1352b-1f3f-459a-b507-1a95e3f75c5a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["srHO2n__RgWm2uvBkKX__w"], "expires_at": "2020-12-14T03:18:18.000000Z", "issued_at": "2020-12-14T02:18:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.444 186 INFO tempest.lib.common.rest_client [req-c0e55391-8126-4b1f-b1ca-1cf6b9be57eb ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.077s 2020-12-14 02:18:18.446 186 DEBUG tempest.lib.common.rest_client [req-c0e55391-8126-4b1f-b1ca-1cf6b9be57eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-DHCPAgentSchedulersRbacTest-349886767-desc", "domain_id": "default", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c0e55391-8126-4b1f-b1ca-1cf6b9be57eb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "87e60dabe319480a8d008afa73005b73", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767", "domain_id": "default", "description": "tempest-DHCPAgentSchedulersRbacTest-349886767-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.459 197 INFO tempest.lib.common.rest_client [req-dc5ed634-1a05-4e64-aa6a-1583f41c7c24 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.211s 2020-12-14 02:18:18.463 197 DEBUG tempest.lib.common.rest_client [req-dc5ed634-1a05-4e64-aa6a-1583f41c7c24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dc5ed634-1a05-4e64-aa6a-1583f41c7c24', 'x-compute-request-id': 'req-dc5ed634-1a05-4e64-aa6a-1583f41c7c24', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.518 193 INFO tempest.lib.common.rest_client [req-63ae178b-67be-4dd3-bff2-de4aa53f238a ] Request (LimitsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:18:18.521 193 DEBUG tempest.lib.common.rest_client [req-63ae178b-67be-4dd3-bff2-de4aa53f238a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63ae178b-67be-4dd3-bff2-de4aa53f238a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["6zTzn4o8RVuK5ekpsaP8mw"], "expires_at": "2020-12-14T03:18:18.000000Z", "issued_at": "2020-12-14T02:18:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.575 186 INFO tempest.lib.common.rest_client [req-b5eb63c6-9ffc-4171-8b96-5e9856b90cb0 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.121s 2020-12-14 02:18:18.578 186 DEBUG tempest.lib.common.rest_client [req-b5eb63c6-9ffc-4171-8b96-5e9856b90cb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-DHCPAgentSchedulersRbacTest-349886767", "password": "G4&gFdbgRPs5dFp", "project_id": "87e60dabe319480a8d008afa73005b73", "email": "tempest-DHCPAgentSchedulersRbacTest-45617204@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '407', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b5eb63c6-9ffc-4171-8b96-5e9856b90cb0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "87e60dabe319480a8d008afa73005b73", "email": "tempest-DHCPAgentSchedulersRbacTest-45617204@example.com", "id": "24c396e5f6d948fbb0c43aba9e58cf0f", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/24c396e5f6d948fbb0c43aba9e58cf0f"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.587 193 INFO tempest.lib.common.rest_client [req-5c79285e-c574-4d14-8bc3-516df624f6db ] Request (LimitsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.059s 2020-12-14 02:18:18.590 193 DEBUG tempest.lib.common.rest_client [req-5c79285e-c574-4d14-8bc3-516df624f6db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c79285e-c574-4d14-8bc3-516df624f6db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.651 186 INFO tempest.lib.common.rest_client [req-01ef72bf-15bd-4dff-92d7-28d6efe53d47 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.064s 2020-12-14 02:18:18.654 186 DEBUG tempest.lib.common.rest_client [req-01ef72bf-15bd-4dff-92d7-28d6efe53d47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01ef72bf-15bd-4dff-92d7-28d6efe53d47', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.670 193 INFO tempest.lib.common.rest_client [req-5d3ca56c-e139-4d3e-b3e6-dfdb1455425d ] Request (LimitsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.072s 2020-12-14 02:18:18.673 193 DEBUG tempest.lib.common.rest_client [req-5d3ca56c-e139-4d3e-b3e6-dfdb1455425d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-LimitsV3RbacTest-1195890478-desc", "domain_id": "default", "name": "tempest-LimitsV3RbacTest-1195890478"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '370', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d3ca56c-e139-4d3e-b3e6-dfdb1455425d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "9bf58877772040e888200d7bf1a73ce6", "name": "tempest-LimitsV3RbacTest-1195890478", "domain_id": "default", "description": "tempest-LimitsV3RbacTest-1195890478-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.778 186 INFO tempest.lib.common.rest_client [req-7a60694d-ee13-435b-87ae-1660b4ff1ae8 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.113s 2020-12-14 02:18:18.781 186 DEBUG tempest.lib.common.rest_client [req-7a60694d-ee13-435b-87ae-1660b4ff1ae8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a60694d-ee13-435b-87ae-1660b4ff1ae8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.801 193 INFO tempest.lib.common.rest_client [req-e0102f95-64bd-4428-b3eb-13568f19364c ] Request (LimitsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.118s 2020-12-14 02:18:18.804 193 DEBUG tempest.lib.common.rest_client [req-e0102f95-64bd-4428-b3eb-13568f19364c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-LimitsV3RbacTest-1195890478", "password": "R0!2QXQLpnlz!j1", "project_id": "9bf58877772040e888200d7bf1a73ce6", "email": "tempest-LimitsV3RbacTest-1497334717@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0102f95-64bd-4428-b3eb-13568f19364c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "9bf58877772040e888200d7bf1a73ce6", "email": "tempest-LimitsV3RbacTest-1497334717@example.com", "id": "61334f0390fa4a8b8cc73241d68a8c72", "name": "tempest-LimitsV3RbacTest-1195890478", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/61334f0390fa4a8b8cc73241d68a8c72"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.858 189 INFO tempest.lib.common.rest_client [req-7d76203b-2387-4dd8-b3a8-1328212ac957 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.284s 2020-12-14 02:18:18.862 189 DEBUG tempest.lib.common.rest_client [req-7d76203b-2387-4dd8-b3a8-1328212ac957 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7d76203b-2387-4dd8-b3a8-1328212ac957', 'x-compute-request-id': 'req-7d76203b-2387-4dd8-b3a8-1328212ac957', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.869 186 INFO tempest.lib.common.rest_client [req-3b5c8d23-e59e-48a8-bce6-4ba37c5d0a91 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles/72a4576c553448cd941b052c1ca0cf2d 0.078s 2020-12-14 02:18:18.872 186 DEBUG tempest.lib.common.rest_client [req-3b5c8d23-e59e-48a8-bce6-4ba37c5d0a91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b5c8d23-e59e-48a8-bce6-4ba37c5d0a91', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.872 193 INFO tempest.lib.common.rest_client [req-2a4edb13-201c-49c8-a9fa-1bd31881fc92 ] Request (LimitsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:18:18.875 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-DHCPAgentSchedulersRbacTest-349886767', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '87e60dabe319480a8d008afa73005b73', 'project_name': 'tempest-DHCPAgentSchedulersRbacTest-349886767', 'tenant_id': '87e60dabe319480a8d008afa73005b73', 'tenant_name': 'tempest-DHCPAgentSchedulersRbacTest-349886767', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '24c396e5f6d948fbb0c43aba9e58cf0f'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:18.875 193 DEBUG tempest.lib.common.rest_client [req-2a4edb13-201c-49c8-a9fa-1bd31881fc92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a4edb13-201c-49c8-a9fa-1bd31881fc92', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:18.877 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-DHCPAgentSchedulersRbacTest-349886767', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '87e60dabe319480a8d008afa73005b73', 'project_name': 'tempest-DHCPAgentSchedulersRbacTest-349886767', 'tenant_id': '87e60dabe319480a8d008afa73005b73', 'tenant_name': 'tempest-DHCPAgentSchedulersRbacTest-349886767', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '24c396e5f6d948fbb0c43aba9e58cf0f'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:18.987 193 INFO tempest.lib.common.rest_client [req-52081bbe-e241-4146-bb3a-dad80b5e3475 ] Request (LimitsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.104s 2020-12-14 02:18:18.991 193 DEBUG tempest.lib.common.rest_client [req-52081bbe-e241-4146-bb3a-dad80b5e3475 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52081bbe-e241-4146-bb3a-dad80b5e3475', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.082 193 INFO tempest.lib.common.rest_client [req-2e701b8e-8ab9-4a4a-ab9f-ee2790b92a04 ] Request (LimitsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6/users/61334f0390fa4a8b8cc73241d68a8c72/roles/72a4576c553448cd941b052c1ca0cf2d 0.083s 2020-12-14 02:18:19.084 193 DEBUG tempest.lib.common.rest_client [req-2e701b8e-8ab9-4a4a-ab9f-ee2790b92a04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e701b8e-8ab9-4a4a-ab9f-ee2790b92a04', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6/users/61334f0390fa4a8b8cc73241d68a8c72/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.086 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-LimitsV3RbacTest-1195890478', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '9bf58877772040e888200d7bf1a73ce6', 'project_name': 'tempest-LimitsV3RbacTest-1195890478', 'tenant_id': '9bf58877772040e888200d7bf1a73ce6', 'tenant_name': 'tempest-LimitsV3RbacTest-1195890478', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '61334f0390fa4a8b8cc73241d68a8c72'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:19.089 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-LimitsV3RbacTest-1195890478', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '9bf58877772040e888200d7bf1a73ce6', 'project_name': 'tempest-LimitsV3RbacTest-1195890478', 'tenant_id': '9bf58877772040e888200d7bf1a73ce6', 'tenant_name': 'tempest-LimitsV3RbacTest-1195890478', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '61334f0390fa4a8b8cc73241d68a8c72'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:19.285 193 INFO tempest.lib.common.rest_client [req-c74ccfe6-994e-4766-8f17-740e1c4256c0 ] Request (LimitsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.126s 2020-12-14 02:18:19.288 193 DEBUG tempest.lib.common.rest_client [req-c74ccfe6-994e-4766-8f17-740e1c4256c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6563', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c74ccfe6-994e-4766-8f17-740e1c4256c0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "61334f0390fa4a8b8cc73241d68a8c72", "name": "tempest-LimitsV3RbacTest-1195890478", "password_expires_at": null}, "audit_ids": ["UmOnfFOpQom5X3qcgPJxEQ"], "expires_at": "2020-12-14T03:18:19.000000Z", "issued_at": "2020-12-14T02:18:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9bf58877772040e888200d7bf1a73ce6", "name": "tempest-LimitsV3RbacTest-1195890478"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.388 193 INFO tempest.lib.common.rest_client [req-1429c981-a99c-4c6f-b8be-abc98980f2dc ] Request (LimitsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:18:19.390 193 DEBUG tempest.lib.common.rest_client [req-1429c981-a99c-4c6f-b8be-abc98980f2dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1429c981-a99c-4c6f-b8be-abc98980f2dc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["yGubTPD-TI6v78TVvCWShA"], "expires_at": "2020-12-14T03:18:19.000000Z", "issued_at": "2020-12-14T02:18:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.414 186 INFO tempest.lib.common.rest_client [req-e52187d8-67db-455d-881a-c576f9f4df28 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:18:19.416 186 DEBUG tempest.lib.common.rest_client [req-e52187d8-67db-455d-881a-c576f9f4df28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6583', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e52187d8-67db-455d-881a-c576f9f4df28', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "24c396e5f6d948fbb0c43aba9e58cf0f", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767", "password_expires_at": null}, "audit_ids": ["8-MBUJRHT5WaZ_JFUoahNQ"], "expires_at": "2020-12-14T03:18:19.000000Z", "issued_at": "2020-12-14T02:18:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "87e60dabe319480a8d008afa73005b73", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.468 186 INFO tempest.lib.common.rest_client [req-3aa104da-f011-4a12-a81b-bb6c9fe9ad08 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:18:19.470 186 DEBUG tempest.lib.common.rest_client [req-3aa104da-f011-4a12-a81b-bb6c9fe9ad08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3aa104da-f011-4a12-a81b-bb6c9fe9ad08', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["LhzE4sxrSDGBeFZlYQDNeQ"], "expires_at": "2020-12-14T03:18:19.000000Z", "issued_at": "2020-12-14T02:18:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.494 193 INFO tempest.lib.common.rest_client [req-4c54a304-337b-4f17-87c2-024ebe9a311a ] Request (LimitsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:18:19.497 193 DEBUG tempest.lib.common.rest_client [req-4c54a304-337b-4f17-87c2-024ebe9a311a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c54a304-337b-4f17-87c2-024ebe9a311a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["BJe_PKcXTt-Ce2b8oJUwRw"], "expires_at": "2020-12-14T03:18:19.000000Z", "issued_at": "2020-12-14T02:18:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.559 193 INFO tempest.lib.common.rest_client [req-76e01d1c-d8a9-4928-9093-829b8f377b1e ] Request (LimitsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.055s 2020-12-14 02:18:19.561 193 DEBUG tempest.lib.common.rest_client [req-76e01d1c-d8a9-4928-9093-829b8f377b1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76e01d1c-d8a9-4928-9093-829b8f377b1e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.573 186 INFO tempest.lib.common.rest_client [req-e6e68512-6ceb-4382-817e-905c08a0457d ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:18:19.576 186 DEBUG tempest.lib.common.rest_client [req-e6e68512-6ceb-4382-817e-905c08a0457d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6e68512-6ceb-4382-817e-905c08a0457d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["pc4oeZrdTwmPI-8UR4xKbQ"], "expires_at": "2020-12-14T03:18:19.000000Z", "issued_at": "2020-12-14T02:18:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.625 193 INFO tempest.lib.common.rest_client [req-ea63d4c5-fae2-4ee2-b3af-de6511797410 ] Request (LimitsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:18:19.628 193 DEBUG tempest.lib.common.rest_client [req-ea63d4c5-fae2-4ee2-b3af-de6511797410 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea63d4c5-fae2-4ee2-b3af-de6511797410', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.632 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:18:19.634 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:19.639 186 INFO tempest.lib.common.rest_client [req-baf305e4-aba9-413d-8d86-bb8dee9559a8 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.055s 2020-12-14 02:18:19.641 186 DEBUG tempest.lib.common.rest_client [req-baf305e4-aba9-413d-8d86-bb8dee9559a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-baf305e4-aba9-413d-8d86-bb8dee9559a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.696 193 INFO tempest.lib.common.rest_client [req-444132cb-5e1b-4acc-928b-d788ed8e8702 ] Request (LimitsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6/users/61334f0390fa4a8b8cc73241d68a8c72/roles 0.056s 2020-12-14 02:18:19.699 193 DEBUG tempest.lib.common.rest_client [req-444132cb-5e1b-4acc-928b-d788ed8e8702 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-444132cb-5e1b-4acc-928b-d788ed8e8702', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6/users/61334f0390fa4a8b8cc73241d68a8c72/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6/users/61334f0390fa4a8b8cc73241d68a8c72/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.705 186 INFO tempest.lib.common.rest_client [req-54b2df7e-fe4f-46b9-9fd2-4e506b2387ba ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:18:19.708 186 DEBUG tempest.lib.common.rest_client [req-54b2df7e-fe4f-46b9-9fd2-4e506b2387ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-54b2df7e-fe4f-46b9-9fd2-4e506b2387ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.712 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:18:19.715 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:19.773 193 INFO tempest.lib.common.rest_client [req-7c32db71-f3a7-402a-a7d5-d51e17cbb00c ] Request (LimitsV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6/users/61334f0390fa4a8b8cc73241d68a8c72/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-12-14 02:18:19.776 193 DEBUG tempest.lib.common.rest_client [req-7c32db71-f3a7-402a-a7d5-d51e17cbb00c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7c32db71-f3a7-402a-a7d5-d51e17cbb00c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6/users/61334f0390fa4a8b8cc73241d68a8c72/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.779 186 INFO tempest.lib.common.rest_client [req-9da34294-d65a-4289-8c2b-43cb9875d8ed ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles 0.059s 2020-12-14 02:18:19.782 186 DEBUG tempest.lib.common.rest_client [req-9da34294-d65a-4289-8c2b-43cb9875d8ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9da34294-d65a-4289-8c2b-43cb9875d8ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.811 197 INFO tempest.lib.common.rest_client [req-d684bd24-2108-4c39-8125-f6c529c0a980 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.240s 2020-12-14 02:18:19.815 197 DEBUG tempest.lib.common.rest_client [req-d684bd24-2108-4c39-8125-f6c529c0a980 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d684bd24-2108-4c39-8125-f6c529c0a980', 'x-compute-request-id': 'req-d684bd24-2108-4c39-8125-f6c529c0a980', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.887 186 INFO tempest.lib.common.rest_client [req-d2d31fe0-2417-4fe0-b186-5ca114c42cd3 ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles/72a4576c553448cd941b052c1ca0cf2d 0.099s 2020-12-14 02:18:19.889 186 DEBUG tempest.lib.common.rest_client [req-d2d31fe0-2417-4fe0-b186-5ca114c42cd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2d31fe0-2417-4fe0-b186-5ca114c42cd3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:19.896 193 INFO tempest.lib.common.rest_client [req-1805459c-6604-42f6-8aac-62088d7ab394 ] Request (LimitsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6/users/61334f0390fa4a8b8cc73241d68a8c72/roles/a629c95d64b3416fb80ae90af4f69c05 0.112s 2020-12-14 02:18:19.898 193 DEBUG tempest.lib.common.rest_client [req-1805459c-6604-42f6-8aac-62088d7ab394 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1805459c-6604-42f6-8aac-62088d7ab394', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6/users/61334f0390fa4a8b8cc73241d68a8c72/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:20.006 186 INFO tempest.lib.common.rest_client [req-0ee32326-4e1c-4e07-96f0-c7e7da4706af ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles/a629c95d64b3416fb80ae90af4f69c05 0.110s 2020-12-14 02:18:20.009 186 DEBUG tempest.lib.common.rest_client [req-0ee32326-4e1c-4e07-96f0-c7e7da4706af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ee32326-4e1c-4e07-96f0-c7e7da4706af', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:20.196 189 INFO tempest.lib.common.rest_client [req-93519ed3-ab92-489e-836d-121ce88c3788 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.226s 2020-12-14 02:18:20.199 189 DEBUG tempest.lib.common.rest_client [req-93519ed3-ab92-489e-836d-121ce88c3788 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-93519ed3-ab92-489e-836d-121ce88c3788', 'x-compute-request-id': 'req-93519ed3-ab92-489e-836d-121ce88c3788', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:21.016 193 INFO tempest.lib.common.rest_client [req-c13545d5-dac0-479e-8cc9-97ab71c828b4 ] Request (LimitsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-12-14 02:18:21.020 193 DEBUG tempest.lib.common.rest_client [req-c13545d5-dac0-479e-8cc9-97ab71c828b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c13545d5-dac0-479e-8cc9-97ab71c828b4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "61334f0390fa4a8b8cc73241d68a8c72", "name": "tempest-LimitsV3RbacTest-1195890478", "password_expires_at": null}, "audit_ids": ["g0vvGEsvSl2VmW9s6CfNug"], "expires_at": "2020-12-14T03:18:20.000000Z", "issued_at": "2020-12-14T02:18:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9bf58877772040e888200d7bf1a73ce6", "name": "tempest-LimitsV3RbacTest-1195890478"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:21.031 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:21.048 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: limits_extension:used_limits, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:21.051 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:21.114 186 INFO tempest.lib.common.rest_client [req-0feded58-4693-4717-a895-827c72a5871b ] Request (DHCPAgentSchedulersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:18:21.117 186 DEBUG tempest.lib.common.rest_client [req-0feded58-4693-4717-a895-827c72a5871b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0feded58-4693-4717-a895-827c72a5871b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "24c396e5f6d948fbb0c43aba9e58cf0f", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767", "password_expires_at": null}, "audit_ids": ["NqbLfLeBQdOUxQ2_uVoU-g"], "expires_at": "2020-12-14T03:18:21.000000Z", "issued_at": "2020-12-14T02:18:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "87e60dabe319480a8d008afa73005b73", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:21.172 193 INFO tempest.lib.common.rest_client [req-85cfd2f3-d381-459e-ba90-ec29b009aea6 ] Request (LimitsV3RbacTest:test_show_limits): 200 GET http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6/users/61334f0390fa4a8b8cc73241d68a8c72/roles 0.116s 2020-12-14 02:18:21.176 193 DEBUG tempest.lib.common.rest_client [req-85cfd2f3-d381-459e-ba90-ec29b009aea6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85cfd2f3-d381-459e-ba90-ec29b009aea6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6/users/61334f0390fa4a8b8cc73241d68a8c72/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6/users/61334f0390fa4a8b8cc73241d68a8c72/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:21.190 197 INFO tempest.lib.common.rest_client [req-cdf57720-776d-4464-977a-353111a1e5fd ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.250s 2020-12-14 02:18:21.194 197 DEBUG tempest.lib.common.rest_client [req-cdf57720-776d-4464-977a-353111a1e5fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cdf57720-776d-4464-977a-353111a1e5fd', 'x-compute-request-id': 'req-cdf57720-776d-4464-977a-353111a1e5fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:21.225 193 INFO tempest.lib.common.rest_client [req-102f58fd-a107-4445-bde9-0acfff002381 ] Request (LimitsV3RbacTest:test_show_limits): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:18:21.228 193 DEBUG tempest.lib.common.rest_client [req-102f58fd-a107-4445-bde9-0acfff002381 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-102f58fd-a107-4445-bde9-0acfff002381', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "61334f0390fa4a8b8cc73241d68a8c72", "name": "tempest-LimitsV3RbacTest-1195890478", "password_expires_at": null}, "audit_ids": ["mRQVMMzOTWmYTHs9g5ORtA"], "expires_at": "2020-12-14T03:18:21.000000Z", "issued_at": "2020-12-14T02:18:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9bf58877772040e888200d7bf1a73ce6", "name": "tempest-LimitsV3RbacTest-1195890478"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:21.301 186 INFO tempest.lib.common.rest_client [req-7f4f66b4-95c8-4c6b-bc68-57d73483d30a ] Request (DHCPAgentSchedulersRbacTest:setUp): 200 GET http://172.30.13.94:9696/v2.0/agents 0.164s 2020-12-14 02:18:21.304 186 DEBUG tempest.lib.common.rest_client [req-7f4f66b4-95c8-4c6b-bc68-57d73483d30a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '4330', 'x-openstack-request-id': 'req-7f4f66b4-95c8-4c6b-bc68-57d73483d30a', 'date': 'Mon, 14 Dec 2020 02:18:21 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents'} Body: b'{"agents": [{"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-12-14 02:18:08", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 11, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 1, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 14, "log_agent_heartbeats": false, "routers": 11}}, {"id": "538ccf2a-fb61-47ed-a10a-785f64cdbb63", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual8", "admin_state_up": true, "created_at": "2020-10-07 13:02:58", "started_at": "2020-10-07 13:03:28", "heartbeat_timestamp": "2020-12-14 02:18:02", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {}, "datapath_type": "system", "devices": 0, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["vxlan"], "tunneling_ip": "172.30.13.93", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "9d48116b-94de-4990-baef-e3b6765751fc", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:05", "started_at": "2020-10-07 12:07:35", "heartbeat_timestamp": "2020-12-14 02:18:17", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {"public": "br-ex"}, "datapath_type": "system", "devices": 26, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {"br-ex": "lf-virtual9"}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["gre", "vxlan"], "tunneling_ip": "172.30.13.94", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "bc496462-aac8-4795-a8f9-6f5600fa0870", "agent_type": "DHCP agent", "binary": "neutron-dhcp-agent", "topic": "dhcp_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:02", "started_at": "2020-10-07 12:07:02", "heartbeat_timestamp": "2020-12-14 02:17:56", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"dhcp_driver": "neutron.agent.linux.dhcp.Dnsmasq", "dhcp_lease_duration": 86400, "log_agent_heartbeats": false, "networks": 10, "ports": 23, "subnets": 12}}, {"id": "faf7e63c-a878-4cb5-b625-f96907b00d51", "agent_type": "Metadata agent", "binary": "neutron-metadata-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:06", "started_at": "2020-10-07 12:07:06", "heartbeat_timestamp": "2020-12-14 02:17:56", "description": null, "resources_synced _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:21.309 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:21.473 193 INFO tempest.lib.common.rest_client [req-baa79419-d477-4691-a6aa-3ceae4b0a841 ] Request (LimitsV3RbacTest:test_show_limits): 200 GET http://172.30.13.94/volume/v3/9bf58877772040e888200d7bf1a73ce6/limits 0.237s 2020-12-14 02:18:21.476 193 DEBUG tempest.lib.common.rest_client [req-baa79419-d477-4691-a6aa-3ceae4b0a841 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-baa79419-d477-4691-a6aa-3ceae4b0a841', 'content-length': '302', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-baa79419-d477-4691-a6aa-3ceae4b0a841', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9bf58877772040e888200d7bf1a73ce6/limits'} Body: b'{"limits": {"rate": [], "absolute": {"maxTotalVolumes": 10, "maxTotalSnapshots": 10, "maxTotalVolumeGigabytes": 1000, "maxTotalBackups": 10, "maxTotalBackupGigabytes": 1000, "totalVolumesUsed": 0, "totalGigabytesUsed": 0, "totalSnapshotsUsed": 0, "totalBackupsUsed": 0, "totalBackupGigabytesUsed": 0}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:21.499 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_dhcp-network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:21.506 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:21.530 189 INFO tempest.lib.common.rest_client [req-0db9579a-80aa-40ed-abb2-fca24d00aead ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.221s 2020-12-14 02:18:21.536 189 DEBUG tempest.lib.common.rest_client [req-0db9579a-80aa-40ed-abb2-fca24d00aead ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0db9579a-80aa-40ed-abb2-fca24d00aead', 'x-compute-request-id': 'req-0db9579a-80aa-40ed-abb2-fca24d00aead', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:21.581 193 INFO tempest.lib.common.rest_client [req-8505e696-3f70-4646-80f8-d93f9f178504 ] Request (LimitsV3RbacTest:test_show_limits): 200 GET http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6/users/61334f0390fa4a8b8cc73241d68a8c72/roles 0.069s 2020-12-14 02:18:21.584 193 DEBUG tempest.lib.common.rest_client [req-8505e696-3f70-4646-80f8-d93f9f178504 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8505e696-3f70-4646-80f8-d93f9f178504', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6/users/61334f0390fa4a8b8cc73241d68a8c72/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6/users/61334f0390fa4a8b8cc73241d68a8c72/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:21.636 193 INFO tempest.lib.common.rest_client [req-3961ac1e-01e2-4742-855b-8c7eba88da97 ] Request (LimitsV3RbacTest:test_show_limits): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:18:21.640 193 DEBUG tempest.lib.common.rest_client [req-3961ac1e-01e2-4742-855b-8c7eba88da97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3961ac1e-01e2-4742-855b-8c7eba88da97', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "61334f0390fa4a8b8cc73241d68a8c72", "name": "tempest-LimitsV3RbacTest-1195890478", "password_expires_at": null}, "audit_ids": ["Qk6OH5FWSm-hJQky5jus0A"], "expires_at": "2020-12-14T03:18:21.000000Z", "issued_at": "2020-12-14T02:18:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9bf58877772040e888200d7bf1a73ce6", "name": "tempest-LimitsV3RbacTest-1195890478"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9bf58877772040e888200d7bf1a73ce6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:21.783 193 INFO tempest.lib.common.rest_client [req-7f24aaab-2977-4bd6-881c-117fe54d9551 ] Request (LimitsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/61334f0390fa4a8b8cc73241d68a8c72 0.125s 2020-12-14 02:18:21.785 193 DEBUG tempest.lib.common.rest_client [req-7f24aaab-2977-4bd6-881c-117fe54d9551 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f24aaab-2977-4bd6-881c-117fe54d9551', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/61334f0390fa4a8b8cc73241d68a8c72'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:21.882 193 INFO tempest.lib.common.rest_client [req-27151b9b-4e29-41f7-b4ff-01f373ba84a3 ] Request (LimitsV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:18:21.885 193 DEBUG tempest.lib.common.rest_client [req-27151b9b-4e29-41f7-b4ff-01f373ba84a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27151b9b-4e29-41f7-b4ff-01f373ba84a3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["VyAWVtV4Q-upNc-EhFVwog"], "expires_at": "2020-12-14T03:18:21.000000Z", "issued_at": "2020-12-14T02:18:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:22.035 186 INFO tempest.lib.common.rest_client [req-604f9757-9114-4e26-bbf3-441d3484ed32 ] Request (DHCPAgentSchedulersRbacTest:test_add_dhcp_agent_to_network): 201 POST http://172.30.13.94:9696/v2.0/networks 0.531s 2020-12-14 02:18:22.037 186 DEBUG tempest.lib.common.rest_client [req-604f9757-9114-4e26-bbf3-441d3484ed32 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-DHCPAgentSchedulersRbacTest-test-network-369135950"}} Response - Headers: {'content-type': 'application/json', 'content-length': '747', 'x-openstack-request-id': 'req-604f9757-9114-4e26-bbf3-441d3484ed32', 'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"7027af34-a5f6-4ba7-be66-74a96e3abec3","name":"tempest-DHCPAgentSchedulersRbacTest-test-network-369135950","tenant_id":"87e60dabe319480a8d008afa73005b73","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"87e60dabe319480a8d008afa73005b73","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":29,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:18:21Z","updated_at":"2020-12-14T02:18:21Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:22.218 193 INFO tempest.lib.common.rest_client [req-821b1d8a-7b76-430b-b8bf-0c6b773d06b8 ] Request (LimitsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=9bf58877772040e888200d7bf1a73ce6&name=default 0.326s 2020-12-14 02:18:22.221 193 DEBUG tempest.lib.common.rest_client [req-821b1d8a-7b76-430b-b8bf-0c6b773d06b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-821b1d8a-7b76-430b-b8bf-0c6b773d06b8', 'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=9bf58877772040e888200d7bf1a73ce6&name=default'} Body: b'{"security_groups": [{"id": "a3231bfc-aeee-4905-935e-efe59476e480", "name": "default", "stateful": true, "tenant_id": "9bf58877772040e888200d7bf1a73ce6", "description": "Default security group", "security_group_rules": [{"id": "20de0f60-6b0d-4509-b39b-8c675abef354", "tenant_id": "9bf58877772040e888200d7bf1a73ce6", "security_group_id": "a3231bfc-aeee-4905-935e-efe59476e480", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:22Z", "updated_at": "2020-12-14T02:18:22Z", "revision_number": 0, "project_id": "9bf58877772040e888200d7bf1a73ce6"}, {"id": "72026525-ecb2-4c08-9ac1-f254a8fb6c1c", "tenant_id": "9bf58877772040e888200d7bf1a73ce6", "security_group_id": "a3231bfc-aeee-4905-935e-efe59476e480", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a3231bfc-aeee-4905-935e-efe59476e480", "description": null, "tags": [], "created_at": "2020-12-14T02:18:22Z", "updated_at": "2020-12-14T02:18:22Z", "revision_number": 0, "project_id": "9bf58877772040e888200d7bf1a73ce6"}, {"id": "79d5d963-5f61-474a-aa79-7f39d45b5061", "tenant_id": "9bf58877772040e888200d7bf1a73ce6", "security_group_id": "a3231bfc-aeee-4905-935e-efe59476e480", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:22Z", "updated_at": "2020-12-14T02:18:22Z", "revision_number": 0, "project_id": "9bf58877772040e888200d7bf1a73ce6"}, {"id": "f434fdab-fab3-4f45-bf97-835e9505ea04", "tenant_id": "9bf58877772040e888200d7bf1a73ce6", "security_group_id": "a3231bfc-aeee-4905-935e-efe59476e480", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a3231bfc-aeee-4905-935e-efe59476e480", "description": null, "tags": [], "created_at": "2020-12-14T02:18:22Z", "updated_at": "2020-12-14T02:18:22Z", "revision_number": 0, "project_id": "9bf58877772040e888200d7bf1a73ce6"}], "tags": [], "created_at": "2020-12-14T02:18:22Z", "updated_at": "2020-12-14T02:18:22Z", "revision_number": 1, "project_id": "9bf58877772040e888200d7bf1a73ce6"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:22.340 186 INFO tempest.lib.common.rest_client [req-0b6bd6d3-e84d-4e56-89f8-8dedef644b43 ] Request (DHCPAgentSchedulersRbacTest:test_add_dhcp_agent_to_network): 200 GET http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks 0.291s 2020-12-14 02:18:22.345 186 DEBUG tempest.lib.common.rest_client [req-0b6bd6d3-e84d-4e56-89f8-8dedef644b43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '49746', 'x-openstack-request-id': 'req-0b6bd6d3-e84d-4e56-89f8-8dedef644b43', 'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks'} Body: b'{"networks": [{"id": "2e850320-7833-47c7-a469-1064f6b1ed25", "name": "tempest-RoutersIpV6AdminTest-1081145424", "tenant_id": "fa3698e7efad416ebbedf5daff6ec476", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["f21a3762-61b1-449f-8a2b-46c373850b0f"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": true, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "is_default": false, "tags": [], "created_at": "2020-11-26T22:31:15Z", "updated_at": "2020-11-26T22:31:16Z", "revision_number": 2, "project_id": "fa3698e7efad416ebbedf5daff6ec476", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 19}, {"id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "name": "public", "tenant_id": "5990258dee3b412286ccca75bcab995c", "admin_state_up": true, "mtu": 1450, "status": "ACTIVE", "subnets": ["72d79dc6-ca18-4491-924f-283ab190f863", "886f7675-1d95-43e4-a213-604399f9af5c"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": true, "vlan_transparent": null, "description": "gman", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "is_default": true, "tags": [], "created_at": "2020-10-07T12:07:37Z", "updated_at": "2020-10-07T13:37:09Z", "revision_number": 3, "project_id": "5990258dee3b412286ccca75bcab995c", "provider:network_type": "flat", "provider:physical_network": "public", "provider:segmentation_id": null}, {"id": "0271f828-506d-471c-80e1-655c753a8b19", "name": "tempest-MultipleCreateTestJSON-190587910-network", "tenant_id": "8324c3ca97db4ac59b569d6bbbcffa09", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["de943adb-63ef-40f8-8985-a23207d72968"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-12-05T13:01:36Z", "updated_at": "2020-12-05T13:01:36Z", "revision_number": 2, "project_id": "8324c3ca97db4ac59b569d6bbbcffa09", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 32}, {"id": "09616387-dfe6-4d1f-9c5a-0be30adf60e8", "name": "tempest-MultipleCreateTestJSON-1784355696-network", "tenant_id": "aecfcc6a08a941db927cdcc1561d2427", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["a48a10af-d181-472e-ab9d-2b3defb56fad"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-12-05T13:09:23Z", "updated_at": "2020-12-05T13:09:24Z", "revision_number": 2, "project_id": "aecfcc6a08a941db927cdcc1561d2427", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 12}, {"id": "0d133d7f-cfa3-406c-bf2e-9e2becbbe589", "name": "tempest-MultipleCreateTestJSON-1880416163-network", "tenant_id": "dc83be2a868748cc9397fd7cb6675c26", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["5f072df7-c9f6-4538-8ff5-cab14f8d28a9"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-11-22T15:50:51Z", "updated_at": "2020-11-22T15:50:51Z", "revision_number": 2, "project_id": "dc83be2a868748cc9397fd7cb6675c26" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:22.359 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:22.414 193 INFO tempest.lib.common.rest_client [req-cd0eb175-af85-4444-b198-73cd1f770214 ] Request (LimitsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/a3231bfc-aeee-4905-935e-efe59476e480 0.185s 2020-12-14 02:18:22.416 193 DEBUG tempest.lib.common.rest_client [req-cd0eb175-af85-4444-b198-73cd1f770214 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-cd0eb175-af85-4444-b198-73cd1f770214', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/a3231bfc-aeee-4905-935e-efe59476e480'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:22.426 186 INFO tempest.lib.common.rest_client [req-fe0d8de6-9dee-4120-aa69-515a460e03ff ] Request (DHCPAgentSchedulersRbacTest:test_add_dhcp_agent_to_network): 200 GET http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles 0.061s 2020-12-14 02:18:22.430 186 DEBUG tempest.lib.common.rest_client [req-fe0d8de6-9dee-4120-aa69-515a460e03ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe0d8de6-9dee-4120-aa69-515a460e03ff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:22.506 197 INFO tempest.lib.common.rest_client [req-9fbdfb12-c13e-4ef8-8efb-28ac7beeb8bc ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.205s 2020-12-14 02:18:22.510 197 DEBUG tempest.lib.common.rest_client [req-9fbdfb12-c13e-4ef8-8efb-28ac7beeb8bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9fbdfb12-c13e-4ef8-8efb-28ac7beeb8bc', 'x-compute-request-id': 'req-9fbdfb12-c13e-4ef8-8efb-28ac7beeb8bc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:22.523 186 INFO tempest.lib.common.rest_client [req-f150b63a-2dd8-4129-a696-4b96b1ae9b76 ] Request (DHCPAgentSchedulersRbacTest:test_add_dhcp_agent_to_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-14 02:18:22.525 186 DEBUG tempest.lib.common.rest_client [req-f150b63a-2dd8-4129-a696-4b96b1ae9b76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f150b63a-2dd8-4129-a696-4b96b1ae9b76', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "24c396e5f6d948fbb0c43aba9e58cf0f", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767", "password_expires_at": null}, "audit_ids": ["75gqgUyVSiWWClvFYL5emg"], "expires_at": "2020-12-14T03:18:22.000000Z", "issued_at": "2020-12-14T02:18:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "87e60dabe319480a8d008afa73005b73", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:22.554 193 INFO tempest.lib.common.rest_client [req-963dabd6-bbab-40cb-b470-5f473e56d4fd ] Request (LimitsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6 0.132s 2020-12-14 02:18:22.557 193 DEBUG tempest.lib.common.rest_client [req-963dabd6-bbab-40cb-b470-5f473e56d4fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-963dabd6-bbab-40cb-b470-5f473e56d4fd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9bf58877772040e888200d7bf1a73ce6'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:22.667 193 INFO tempest.lib.common.rest_client [req-9a9cc3aa-9a31-41ed-8169-676e90761c50 ] Request (SnapshotManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:18:22.671 193 DEBUG tempest.lib.common.rest_client [req-9a9cc3aa-9a31-41ed-8169-676e90761c50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9a9cc3aa-9a31-41ed-8169-676e90761c50', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["QyBzZikbSu-HFq5DrXY2_w"], "expires_at": "2020-12-14T03:18:22.000000Z", "issued_at": "2020-12-14T02:18:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:22.767 193 INFO tempest.lib.common.rest_client [req-747a8d3d-1dd9-42b8-9e9f-bd484b902728 ] Request (SnapshotManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:18:22.770 193 DEBUG tempest.lib.common.rest_client [req-747a8d3d-1dd9-42b8-9e9f-bd484b902728 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-747a8d3d-1dd9-42b8-9e9f-bd484b902728', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["3dGaB2ChQY-3XhZSTcdo7Q"], "expires_at": "2020-12-14T03:18:22.000000Z", "issued_at": "2020-12-14T02:18:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:22.838 186 INFO tempest.lib.common.rest_client [req-9b05ebea-8f3d-48c3-8b45-5cd0a1a0ace6 ] Request (DHCPAgentSchedulersRbacTest:test_add_dhcp_agent_to_network): 201 POST http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks 0.305s 2020-12-14 02:18:22.838 193 INFO tempest.lib.common.rest_client [req-c71efa97-6875-48dc-810e-3d060b9ed2f8 ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.060s 2020-12-14 02:18:22.841 186 DEBUG tempest.lib.common.rest_client [req-9b05ebea-8f3d-48c3-8b45-5cd0a1a0ace6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network_id": "7027af34-a5f6-4ba7-be66-74a96e3abec3"} Response - Headers: {'content-type': 'application/json', 'content-length': '4', 'x-openstack-request-id': 'req-9b05ebea-8f3d-48c3-8b45-5cd0a1a0ace6', 'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks'} Body: b'null' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:22.841 193 DEBUG tempest.lib.common.rest_client [req-c71efa97-6875-48dc-810e-3d060b9ed2f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c71efa97-6875-48dc-810e-3d060b9ed2f8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:22.843 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:22.880 189 INFO tempest.lib.common.rest_client [req-de6c2f14-23a0-4def-99e8-59baf18d1414 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.235s 2020-12-14 02:18:22.884 189 DEBUG tempest.lib.common.rest_client [req-de6c2f14-23a0-4def-99e8-59baf18d1414 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-de6c2f14-23a0-4def-99e8-59baf18d1414', 'x-compute-request-id': 'req-de6c2f14-23a0-4def-99e8-59baf18d1414', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:22.909 186 INFO tempest.lib.common.rest_client [req-63818315-e1c2-473b-a405-61b8811a0ce8 ] Request (DHCPAgentSchedulersRbacTest:test_add_dhcp_agent_to_network): 200 GET http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles 0.060s 2020-12-14 02:18:22.911 186 DEBUG tempest.lib.common.rest_client [req-63818315-e1c2-473b-a405-61b8811a0ce8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63818315-e1c2-473b-a405-61b8811a0ce8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:22.919 193 INFO tempest.lib.common.rest_client [req-f16d3e8d-e49e-4e29-b125-e71d1b3fa0a5 ] Request (SnapshotManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.069s 2020-12-14 02:18:22.923 193 DEBUG tempest.lib.common.rest_client [req-f16d3e8d-e49e-4e29-b125-e71d1b3fa0a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SnapshotManageRbacTest-1961474995-desc", "domain_id": "default", "name": "tempest-SnapshotManageRbacTest-1961474995"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f16d3e8d-e49e-4e29-b125-e71d1b3fa0a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "7bee350288994567badad56fe9b73eb2", "name": "tempest-SnapshotManageRbacTest-1961474995", "domain_id": "default", "description": "tempest-SnapshotManageRbacTest-1961474995-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:23.008 186 INFO tempest.lib.common.rest_client [req-f2b92f3e-9677-4336-974d-e359d15cac6a ] Request (DHCPAgentSchedulersRbacTest:test_add_dhcp_agent_to_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:18:23.011 186 DEBUG tempest.lib.common.rest_client [req-f2b92f3e-9677-4336-974d-e359d15cac6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2b92f3e-9677-4336-974d-e359d15cac6a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "24c396e5f6d948fbb0c43aba9e58cf0f", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767", "password_expires_at": null}, "audit_ids": ["yRrdtqeqQuGJYq6dZma0eA"], "expires_at": "2020-12-14T03:18:22.000000Z", "issued_at": "2020-12-14T02:18:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "87e60dabe319480a8d008afa73005b73", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:23.047 193 INFO tempest.lib.common.rest_client [req-2bc3a193-2aa4-4b46-9277-c9c64de13451 ] Request (SnapshotManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.117s 2020-12-14 02:18:23.049 193 DEBUG tempest.lib.common.rest_client [req-2bc3a193-2aa4-4b46-9277-c9c64de13451 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SnapshotManageRbacTest-1961474995", "password": "D7@5MG^_+u%ZAYJ", "project_id": "7bee350288994567badad56fe9b73eb2", "email": "tempest-SnapshotManageRbacTest-220970665@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '399', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2bc3a193-2aa4-4b46-9277-c9c64de13451', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "7bee350288994567badad56fe9b73eb2", "email": "tempest-SnapshotManageRbacTest-220970665@example.com", "id": "06f8246ec8a749aba9386ba6b973ec37", "name": "tempest-SnapshotManageRbacTest-1961474995", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/06f8246ec8a749aba9386ba6b973ec37"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:23.130 193 INFO tempest.lib.common.rest_client [req-d508bf7c-12fb-47a4-bbac-18a260dcb3c1 ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.074s 2020-12-14 02:18:23.133 193 DEBUG tempest.lib.common.rest_client [req-d508bf7c-12fb-47a4-bbac-18a260dcb3c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d508bf7c-12fb-47a4-bbac-18a260dcb3c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:23.170 186 INFO tempest.lib.common.rest_client [req-fe67e1e5-8748-41ee-a633-cdd497715e98 ] Request (DHCPAgentSchedulersRbacTest:setUp): 200 GET http://172.30.13.94:9696/v2.0/agents 0.137s 2020-12-14 02:18:23.173 186 DEBUG tempest.lib.common.rest_client [req-fe67e1e5-8748-41ee-a633-cdd497715e98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '4330', 'x-openstack-request-id': 'req-fe67e1e5-8748-41ee-a633-cdd497715e98', 'date': 'Mon, 14 Dec 2020 02:18:23 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents'} Body: b'{"agents": [{"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-12-14 02:18:08", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 11, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 1, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 14, "log_agent_heartbeats": false, "routers": 11}}, {"id": "538ccf2a-fb61-47ed-a10a-785f64cdbb63", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual8", "admin_state_up": true, "created_at": "2020-10-07 13:02:58", "started_at": "2020-10-07 13:03:28", "heartbeat_timestamp": "2020-12-14 02:18:02", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {}, "datapath_type": "system", "devices": 0, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["vxlan"], "tunneling_ip": "172.30.13.93", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "9d48116b-94de-4990-baef-e3b6765751fc", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:05", "started_at": "2020-10-07 12:07:35", "heartbeat_timestamp": "2020-12-14 02:18:17", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {"public": "br-ex"}, "datapath_type": "system", "devices": 26, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {"br-ex": "lf-virtual9"}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["gre", "vxlan"], "tunneling_ip": "172.30.13.94", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "bc496462-aac8-4795-a8f9-6f5600fa0870", "agent_type": "DHCP agent", "binary": "neutron-dhcp-agent", "topic": "dhcp_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:02", "started_at": "2020-10-07 12:07:02", "heartbeat_timestamp": "2020-12-14 02:17:56", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"dhcp_driver": "neutron.agent.linux.dhcp.Dnsmasq", "dhcp_lease_duration": 86400, "log_agent_heartbeats": false, "networks": 10, "ports": 23, "subnets": 12}}, {"id": "faf7e63c-a878-4cb5-b625-f96907b00d51", "agent_type": "Metadata agent", "binary": "neutron-metadata-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:06", "started_at": "2020-10-07 12:07:06", "heartbeat_timestamp": "2020-12-14 02:17:56", "description": null, "resources_synced _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:23.177 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:23.207 193 INFO tempest.lib.common.rest_client [req-f98c3d44-d534-417b-bd33-81c3f19ac801 ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-12-14 02:18:23.211 193 DEBUG tempest.lib.common.rest_client [req-f98c3d44-d534-417b-bd33-81c3f19ac801 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f98c3d44-d534-417b-bd33-81c3f19ac801', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:23.213 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_dhcp-network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:23.305 193 INFO tempest.lib.common.rest_client [req-366be24b-60b4-42ed-bd16-53eb0afec018 ] Request (SnapshotManageRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2/users/06f8246ec8a749aba9386ba6b973ec37/roles/72a4576c553448cd941b052c1ca0cf2d 0.086s 2020-12-14 02:18:23.307 193 DEBUG tempest.lib.common.rest_client [req-366be24b-60b4-42ed-bd16-53eb0afec018 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-366be24b-60b4-42ed-bd16-53eb0afec018', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2/users/06f8246ec8a749aba9386ba6b973ec37/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:23.311 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SnapshotManageRbacTest-1961474995', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '7bee350288994567badad56fe9b73eb2', 'project_name': 'tempest-SnapshotManageRbacTest-1961474995', 'tenant_id': '7bee350288994567badad56fe9b73eb2', 'tenant_name': 'tempest-SnapshotManageRbacTest-1961474995', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '06f8246ec8a749aba9386ba6b973ec37'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:23.315 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SnapshotManageRbacTest-1961474995', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '7bee350288994567badad56fe9b73eb2', 'project_name': 'tempest-SnapshotManageRbacTest-1961474995', 'tenant_id': '7bee350288994567badad56fe9b73eb2', 'tenant_name': 'tempest-SnapshotManageRbacTest-1961474995', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '06f8246ec8a749aba9386ba6b973ec37'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:23.500 193 INFO tempest.lib.common.rest_client [req-84227c28-3a1d-4696-95e6-dc08af2459d3 ] Request (SnapshotManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.119s 2020-12-14 02:18:23.504 193 DEBUG tempest.lib.common.rest_client [req-84227c28-3a1d-4696-95e6-dc08af2459d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84227c28-3a1d-4696-95e6-dc08af2459d3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "06f8246ec8a749aba9386ba6b973ec37", "name": "tempest-SnapshotManageRbacTest-1961474995", "password_expires_at": null}, "audit_ids": ["VC4VpCMnQmmVmu6Lt-G3eA"], "expires_at": "2020-12-14T03:18:23.000000Z", "issued_at": "2020-12-14T02:18:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7bee350288994567badad56fe9b73eb2", "name": "tempest-SnapshotManageRbacTest-1961474995"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:23.610 193 INFO tempest.lib.common.rest_client [req-1a32747d-5a02-4c97-98af-5e8f93b7e8fb ] Request (SnapshotManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:18:23.613 193 DEBUG tempest.lib.common.rest_client [req-1a32747d-5a02-4c97-98af-5e8f93b7e8fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a32747d-5a02-4c97-98af-5e8f93b7e8fb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["HOjTutw9R22P47HnSF0dDA"], "expires_at": "2020-12-14T03:18:23.000000Z", "issued_at": "2020-12-14T02:18:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:23.627 186 INFO tempest.lib.common.rest_client [req-a4ef0a27-c9f1-4126-9993-641cb2be43f3 ] Request (DHCPAgentSchedulersRbacTest:test_delete_network_from_dhcp_agent): 201 POST http://172.30.13.94:9696/v2.0/networks 0.403s 2020-12-14 02:18:23.631 186 DEBUG tempest.lib.common.rest_client [req-a4ef0a27-c9f1-4126-9993-641cb2be43f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-DHCPAgentSchedulersRbacTest-test-network-1604942421"}} Response - Headers: {'content-type': 'application/json', 'content-length': '748', 'x-openstack-request-id': 'req-a4ef0a27-c9f1-4126-9993-641cb2be43f3', 'date': 'Mon, 14 Dec 2020 02:18:23 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"27526341-45c0-479e-a7ab-96429d1a9393","name":"tempest-DHCPAgentSchedulersRbacTest-test-network-1604942421","tenant_id":"87e60dabe319480a8d008afa73005b73","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"87e60dabe319480a8d008afa73005b73","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":43,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:18:23Z","updated_at":"2020-12-14T02:18:23Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:23.730 193 INFO tempest.lib.common.rest_client [req-24124fcf-eeb6-42ce-b45d-c7d742881cec ] Request (SnapshotManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:18:23.733 193 DEBUG tempest.lib.common.rest_client [req-24124fcf-eeb6-42ce-b45d-c7d742881cec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24124fcf-eeb6-42ce-b45d-c7d742881cec', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["lfX_oh9ORq6deDmxz21ZwQ"], "expires_at": "2020-12-14T03:18:23.000000Z", "issued_at": "2020-12-14T02:18:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:23.799 193 INFO tempest.lib.common.rest_client [req-045f4a25-0285-4f35-87ae-78ae80224b9c ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.058s 2020-12-14 02:18:23.802 193 DEBUG tempest.lib.common.rest_client [req-045f4a25-0285-4f35-87ae-78ae80224b9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-045f4a25-0285-4f35-87ae-78ae80224b9c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:23.864 193 INFO tempest.lib.common.rest_client [req-93090f7f-a2e2-4724-b7b6-750f259cdf77 ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-14 02:18:23.867 193 DEBUG tempest.lib.common.rest_client [req-93090f7f-a2e2-4724-b7b6-750f259cdf77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93090f7f-a2e2-4724-b7b6-750f259cdf77', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:23.871 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:18:23.873 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:23.935 193 INFO tempest.lib.common.rest_client [req-a7c209a9-ed20-45a6-a03c-de2b1f2a3b61 ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2/users/06f8246ec8a749aba9386ba6b973ec37/roles 0.057s 2020-12-14 02:18:23.938 193 DEBUG tempest.lib.common.rest_client [req-a7c209a9-ed20-45a6-a03c-de2b1f2a3b61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7c209a9-ed20-45a6-a03c-de2b1f2a3b61', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2/users/06f8246ec8a749aba9386ba6b973ec37/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2/users/06f8246ec8a749aba9386ba6b973ec37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:23.967 186 INFO tempest.lib.common.rest_client [req-f69512a0-c2b2-493a-8322-9b000d0e1b92 ] Request (DHCPAgentSchedulersRbacTest:test_delete_network_from_dhcp_agent): 200 GET http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks 0.327s 2020-12-14 02:18:23.974 186 DEBUG tempest.lib.common.rest_client [req-f69512a0-c2b2-493a-8322-9b000d0e1b92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '50547', 'x-openstack-request-id': 'req-f69512a0-c2b2-493a-8322-9b000d0e1b92', 'date': 'Mon, 14 Dec 2020 02:18:23 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks'} Body: b'{"networks": [{"id": "2e850320-7833-47c7-a469-1064f6b1ed25", "name": "tempest-RoutersIpV6AdminTest-1081145424", "tenant_id": "fa3698e7efad416ebbedf5daff6ec476", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["f21a3762-61b1-449f-8a2b-46c373850b0f"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": true, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "is_default": false, "tags": [], "created_at": "2020-11-26T22:31:15Z", "updated_at": "2020-11-26T22:31:16Z", "revision_number": 2, "project_id": "fa3698e7efad416ebbedf5daff6ec476", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 19}, {"id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "name": "public", "tenant_id": "5990258dee3b412286ccca75bcab995c", "admin_state_up": true, "mtu": 1450, "status": "ACTIVE", "subnets": ["72d79dc6-ca18-4491-924f-283ab190f863", "886f7675-1d95-43e4-a213-604399f9af5c"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": true, "vlan_transparent": null, "description": "gman", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "is_default": true, "tags": [], "created_at": "2020-10-07T12:07:37Z", "updated_at": "2020-10-07T13:37:09Z", "revision_number": 3, "project_id": "5990258dee3b412286ccca75bcab995c", "provider:network_type": "flat", "provider:physical_network": "public", "provider:segmentation_id": null}, {"id": "0271f828-506d-471c-80e1-655c753a8b19", "name": "tempest-MultipleCreateTestJSON-190587910-network", "tenant_id": "8324c3ca97db4ac59b569d6bbbcffa09", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["de943adb-63ef-40f8-8985-a23207d72968"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-12-05T13:01:36Z", "updated_at": "2020-12-05T13:01:36Z", "revision_number": 2, "project_id": "8324c3ca97db4ac59b569d6bbbcffa09", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 32}, {"id": "09616387-dfe6-4d1f-9c5a-0be30adf60e8", "name": "tempest-MultipleCreateTestJSON-1784355696-network", "tenant_id": "aecfcc6a08a941db927cdcc1561d2427", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["a48a10af-d181-472e-ab9d-2b3defb56fad"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-12-05T13:09:23Z", "updated_at": "2020-12-05T13:09:24Z", "revision_number": 2, "project_id": "aecfcc6a08a941db927cdcc1561d2427", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 12}, {"id": "0d133d7f-cfa3-406c-bf2e-9e2becbbe589", "name": "tempest-MultipleCreateTestJSON-1880416163-network", "tenant_id": "dc83be2a868748cc9397fd7cb6675c26", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["5f072df7-c9f6-4538-8ff5-cab14f8d28a9"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-11-22T15:50:51Z", "updated_at": "2020-11-22T15:50:51Z", "revision_number": 2, "project_id": "dc83be2a868748cc9397fd7cb6675c26" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:23.987 197 INFO tempest.lib.common.rest_client [req-f2ff2e81-8af4-439b-ac96-60ad1842d07a ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.371s 2020-12-14 02:18:23.991 197 DEBUG tempest.lib.common.rest_client [req-f2ff2e81-8af4-439b-ac96-60ad1842d07a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f2ff2e81-8af4-439b-ac96-60ad1842d07a', 'x-compute-request-id': 'req-f2ff2e81-8af4-439b-ac96-60ad1842d07a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:24.003 193 INFO tempest.lib.common.rest_client [req-345c659a-c32b-4b44-a8d7-368d513dc42b ] Request (SnapshotManageRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2/users/06f8246ec8a749aba9386ba6b973ec37/roles/72a4576c553448cd941b052c1ca0cf2d 0.057s 2020-12-14 02:18:24.006 193 DEBUG tempest.lib.common.rest_client [req-345c659a-c32b-4b44-a8d7-368d513dc42b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-345c659a-c32b-4b44-a8d7-368d513dc42b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2/users/06f8246ec8a749aba9386ba6b973ec37/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:24.108 186 INFO tempest.lib.common.rest_client [req-671d030e-b2a2-4fed-8288-68c16988d89a ] Request (DHCPAgentSchedulersRbacTest:test_delete_network_from_dhcp_agent): 201 POST http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks 0.117s 2020-12-14 02:18:24.110 186 DEBUG tempest.lib.common.rest_client [req-671d030e-b2a2-4fed-8288-68c16988d89a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network_id": "27526341-45c0-479e-a7ab-96429d1a9393"} Response - Headers: {'content-type': 'application/json', 'content-length': '4', 'x-openstack-request-id': 'req-671d030e-b2a2-4fed-8288-68c16988d89a', 'date': 'Mon, 14 Dec 2020 02:18:24 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks'} Body: b'null' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:24.113 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:24.121 193 INFO tempest.lib.common.rest_client [req-57de16af-4dbd-494a-b3c1-95f575a98e69 ] Request (SnapshotManageRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2/users/06f8246ec8a749aba9386ba6b973ec37/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-12-14 02:18:24.126 193 DEBUG tempest.lib.common.rest_client [req-57de16af-4dbd-494a-b3c1-95f575a98e69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57de16af-4dbd-494a-b3c1-95f575a98e69', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2/users/06f8246ec8a749aba9386ba6b973ec37/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:24.188 189 INFO tempest.lib.common.rest_client [req-4e36e6f0-2aa0-4040-971e-cc1911cc3bef ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.196s 2020-12-14 02:18:24.192 189 DEBUG tempest.lib.common.rest_client [req-4e36e6f0-2aa0-4040-971e-cc1911cc3bef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4e36e6f0-2aa0-4040-971e-cc1911cc3bef', 'x-compute-request-id': 'req-4e36e6f0-2aa0-4040-971e-cc1911cc3bef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:24.226 186 INFO tempest.lib.common.rest_client [req-7c997f07-f24e-4335-ac1f-fa2862b63ea6 ] Request (DHCPAgentSchedulersRbacTest:test_delete_network_from_dhcp_agent): 200 GET http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles 0.107s 2020-12-14 02:18:24.230 186 DEBUG tempest.lib.common.rest_client [req-7c997f07-f24e-4335-ac1f-fa2862b63ea6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7c997f07-f24e-4335-ac1f-fa2862b63ea6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:24.326 186 INFO tempest.lib.common.rest_client [req-8c6e3397-fb46-4815-98c4-a342e233b693 ] Request (DHCPAgentSchedulersRbacTest:test_delete_network_from_dhcp_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:18:24.328 186 DEBUG tempest.lib.common.rest_client [req-8c6e3397-fb46-4815-98c4-a342e233b693 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c6e3397-fb46-4815-98c4-a342e233b693', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "24c396e5f6d948fbb0c43aba9e58cf0f", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767", "password_expires_at": null}, "audit_ids": ["rqZI0YL_QVufRlpycyjTIA"], "expires_at": "2020-12-14T03:18:24.000000Z", "issued_at": "2020-12-14T02:18:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "87e60dabe319480a8d008afa73005b73", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:24.573 186 INFO tempest.lib.common.rest_client [req-23c1f5fc-b86e-48d1-a79b-8ff4b559ea86 ] Request (DHCPAgentSchedulersRbacTest:test_delete_network_from_dhcp_agent): 204 DELETE http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks/27526341-45c0-479e-a7ab-96429d1a9393 0.238s 2020-12-14 02:18:24.576 186 DEBUG tempest.lib.common.rest_client [req-23c1f5fc-b86e-48d1-a79b-8ff4b559ea86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-23c1f5fc-b86e-48d1-a79b-8ff4b559ea86', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:24 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks/27526341-45c0-479e-a7ab-96429d1a9393'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:24.578 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:24.647 186 INFO tempest.lib.common.rest_client [req-c08fad51-d8cd-4749-9ac3-a0a0699c16ea ] Request (DHCPAgentSchedulersRbacTest:test_delete_network_from_dhcp_agent): 200 GET http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles 0.062s 2020-12-14 02:18:24.650 186 DEBUG tempest.lib.common.rest_client [req-c08fad51-d8cd-4749-9ac3-a0a0699c16ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c08fad51-d8cd-4749-9ac3-a0a0699c16ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:24.698 186 INFO tempest.lib.common.rest_client [req-00217f64-3e86-420b-9566-bbd862c19ef0 ] Request (DHCPAgentSchedulersRbacTest:test_delete_network_from_dhcp_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:18:24.702 186 DEBUG tempest.lib.common.rest_client [req-00217f64-3e86-420b-9566-bbd862c19ef0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-00217f64-3e86-420b-9566-bbd862c19ef0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "24c396e5f6d948fbb0c43aba9e58cf0f", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767", "password_expires_at": null}, "audit_ids": ["4MXwquUFS5Wj0_1rRyQgng"], "expires_at": "2020-12-14T03:18:24.000000Z", "issued_at": "2020-12-14T02:18:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "87e60dabe319480a8d008afa73005b73", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:24.810 186 INFO tempest.lib.common.rest_client [req-2064ed07-8ad3-4178-8c06-5a46705fddf3 ] Request (DHCPAgentSchedulersRbacTest:setUp): 200 GET http://172.30.13.94:9696/v2.0/agents 0.089s 2020-12-14 02:18:24.812 186 DEBUG tempest.lib.common.rest_client [req-2064ed07-8ad3-4178-8c06-5a46705fddf3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '4330', 'x-openstack-request-id': 'req-2064ed07-8ad3-4178-8c06-5a46705fddf3', 'date': 'Mon, 14 Dec 2020 02:18:24 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents'} Body: b'{"agents": [{"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-12-14 02:18:08", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 11, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 1, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 14, "log_agent_heartbeats": false, "routers": 11}}, {"id": "538ccf2a-fb61-47ed-a10a-785f64cdbb63", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual8", "admin_state_up": true, "created_at": "2020-10-07 13:02:58", "started_at": "2020-10-07 13:03:28", "heartbeat_timestamp": "2020-12-14 02:18:02", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {}, "datapath_type": "system", "devices": 0, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["vxlan"], "tunneling_ip": "172.30.13.93", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "9d48116b-94de-4990-baef-e3b6765751fc", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:05", "started_at": "2020-10-07 12:07:35", "heartbeat_timestamp": "2020-12-14 02:18:17", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {"public": "br-ex"}, "datapath_type": "system", "devices": 26, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {"br-ex": "lf-virtual9"}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["gre", "vxlan"], "tunneling_ip": "172.30.13.94", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "bc496462-aac8-4795-a8f9-6f5600fa0870", "agent_type": "DHCP agent", "binary": "neutron-dhcp-agent", "topic": "dhcp_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:02", "started_at": "2020-10-07 12:07:02", "heartbeat_timestamp": "2020-12-14 02:17:56", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"dhcp_driver": "neutron.agent.linux.dhcp.Dnsmasq", "dhcp_lease_duration": 86400, "log_agent_heartbeats": false, "networks": 10, "ports": 23, "subnets": 12}}, {"id": "faf7e63c-a878-4cb5-b625-f96907b00d51", "agent_type": "Metadata agent", "binary": "neutron-metadata-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:06", "started_at": "2020-10-07 12:07:06", "heartbeat_timestamp": "2020-12-14 02:17:56", "description": null, "resources_synced _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:24.816 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:24.840 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_dhcp-networks, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:24.843 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:24.907 186 INFO tempest.lib.common.rest_client [req-68afe456-3a93-4be7-90f0-813e301ce4a2 ] Request (DHCPAgentSchedulersRbacTest:test_list_networks_hosted_by_one_dhcp_agent): 200 GET http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles 0.059s 2020-12-14 02:18:24.910 186 DEBUG tempest.lib.common.rest_client [req-68afe456-3a93-4be7-90f0-813e301ce4a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68afe456-3a93-4be7-90f0-813e301ce4a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:24.962 186 INFO tempest.lib.common.rest_client [req-2d36508d-9bef-4781-8973-20d2ddda46f4 ] Request (DHCPAgentSchedulersRbacTest:test_list_networks_hosted_by_one_dhcp_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:18:24.966 186 DEBUG tempest.lib.common.rest_client [req-2d36508d-9bef-4781-8973-20d2ddda46f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2d36508d-9bef-4781-8973-20d2ddda46f4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "24c396e5f6d948fbb0c43aba9e58cf0f", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767", "password_expires_at": null}, "audit_ids": ["7_d_JPDkQ2OMRlQ5eB94pQ"], "expires_at": "2020-12-14T03:18:24.000000Z", "issued_at": "2020-12-14T02:18:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "87e60dabe319480a8d008afa73005b73", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:25.232 193 INFO tempest.lib.common.rest_client [req-b1d5edfa-d623-4c97-b122-101a3fa85598 ] Request (SnapshotManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:18:25.236 193 DEBUG tempest.lib.common.rest_client [req-b1d5edfa-d623-4c97-b122-101a3fa85598 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1d5edfa-d623-4c97-b122-101a3fa85598', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "06f8246ec8a749aba9386ba6b973ec37", "name": "tempest-SnapshotManageRbacTest-1961474995", "password_expires_at": null}, "audit_ids": ["Fy-pE0SzRpuzeP7pUKs7uA"], "expires_at": "2020-12-14T03:18:25.000000Z", "issued_at": "2020-12-14T02:18:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7bee350288994567badad56fe9b73eb2", "name": "tempest-SnapshotManageRbacTest-1961474995"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:25.342 197 INFO tempest.lib.common.rest_client [req-4f67b284-d7a7-44f3-a448-705a01e72b21 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.245s 2020-12-14 02:18:25.346 197 DEBUG tempest.lib.common.rest_client [req-4f67b284-d7a7-44f3-a448-705a01e72b21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4f67b284-d7a7-44f3-a448-705a01e72b21', 'x-compute-request-id': 'req-4f67b284-d7a7-44f3-a448-705a01e72b21', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:25.362 186 INFO tempest.lib.common.rest_client [req-c315a31a-0f57-4c22-b98a-899ff046c603 ] Request (DHCPAgentSchedulersRbacTest:test_list_networks_hosted_by_one_dhcp_agent): 200 GET http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks 0.388s 2020-12-14 02:18:25.369 186 DEBUG tempest.lib.common.rest_client [req-c315a31a-0f57-4c22-b98a-899ff046c603 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '50547', 'x-openstack-request-id': 'req-c315a31a-0f57-4c22-b98a-899ff046c603', 'date': 'Mon, 14 Dec 2020 02:18:25 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/bc496462-aac8-4795-a8f9-6f5600fa0870/dhcp-networks'} Body: b'{"networks": [{"id": "2e850320-7833-47c7-a469-1064f6b1ed25", "name": "tempest-RoutersIpV6AdminTest-1081145424", "tenant_id": "fa3698e7efad416ebbedf5daff6ec476", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["f21a3762-61b1-449f-8a2b-46c373850b0f"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": true, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "is_default": false, "tags": [], "created_at": "2020-11-26T22:31:15Z", "updated_at": "2020-11-26T22:31:16Z", "revision_number": 2, "project_id": "fa3698e7efad416ebbedf5daff6ec476", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 19}, {"id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "name": "public", "tenant_id": "5990258dee3b412286ccca75bcab995c", "admin_state_up": true, "mtu": 1450, "status": "ACTIVE", "subnets": ["72d79dc6-ca18-4491-924f-283ab190f863", "886f7675-1d95-43e4-a213-604399f9af5c"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": true, "vlan_transparent": null, "description": "gman", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "is_default": true, "tags": [], "created_at": "2020-10-07T12:07:37Z", "updated_at": "2020-10-07T13:37:09Z", "revision_number": 3, "project_id": "5990258dee3b412286ccca75bcab995c", "provider:network_type": "flat", "provider:physical_network": "public", "provider:segmentation_id": null}, {"id": "0271f828-506d-471c-80e1-655c753a8b19", "name": "tempest-MultipleCreateTestJSON-190587910-network", "tenant_id": "8324c3ca97db4ac59b569d6bbbcffa09", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["de943adb-63ef-40f8-8985-a23207d72968"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-12-05T13:01:36Z", "updated_at": "2020-12-05T13:01:36Z", "revision_number": 2, "project_id": "8324c3ca97db4ac59b569d6bbbcffa09", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 32}, {"id": "09616387-dfe6-4d1f-9c5a-0be30adf60e8", "name": "tempest-MultipleCreateTestJSON-1784355696-network", "tenant_id": "aecfcc6a08a941db927cdcc1561d2427", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["a48a10af-d181-472e-ab9d-2b3defb56fad"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-12-05T13:09:23Z", "updated_at": "2020-12-05T13:09:24Z", "revision_number": 2, "project_id": "aecfcc6a08a941db927cdcc1561d2427", "provider:network_type": "vxlan", "provider:physical_network": null, "provider:segmentation_id": 12}, {"id": "0d133d7f-cfa3-406c-bf2e-9e2becbbe589", "name": "tempest-MultipleCreateTestJSON-1880416163-network", "tenant_id": "dc83be2a868748cc9397fd7cb6675c26", "admin_state_up": true, "mtu": 1400, "status": "ACTIVE", "subnets": ["5f072df7-c9f6-4538-8ff5-cab14f8d28a9"], "shared": false, "availability_zone_hints": [], "availability_zones": ["nova"], "ipv4_address_scope": null, "ipv6_address_scope": null, "router:external": false, "vlan_transparent": null, "description": "", "port_security_enabled": true, "qos_policy_id": null, "dns_domain": "", "l2_adjacency": true, "tags": [], "created_at": "2020-11-22T15:50:51Z", "updated_at": "2020-11-22T15:50:51Z", "revision_number": 2, "project_id": "dc83be2a868748cc9397fd7cb6675c26" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:25.382 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:25.446 186 INFO tempest.lib.common.rest_client [req-47d835d6-85ff-4a5f-b13b-d64154d0dcea ] Request (DHCPAgentSchedulersRbacTest:test_list_networks_hosted_by_one_dhcp_agent): 200 GET http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles 0.058s 2020-12-14 02:18:25.449 186 DEBUG tempest.lib.common.rest_client [req-47d835d6-85ff-4a5f-b13b-d64154d0dcea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47d835d6-85ff-4a5f-b13b-d64154d0dcea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73/users/24c396e5f6d948fbb0c43aba9e58cf0f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:25.500 186 INFO tempest.lib.common.rest_client [req-0182c586-034f-4645-8bc9-ed552095ff6d ] Request (DHCPAgentSchedulersRbacTest:test_list_networks_hosted_by_one_dhcp_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:18:25.505 186 DEBUG tempest.lib.common.rest_client [req-0182c586-034f-4645-8bc9-ed552095ff6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0182c586-034f-4645-8bc9-ed552095ff6d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "24c396e5f6d948fbb0c43aba9e58cf0f", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767", "password_expires_at": null}, "audit_ids": ["SNk75Xj6QC24p2e7cVOoqw"], "expires_at": "2020-12-14T03:18:25.000000Z", "issued_at": "2020-12-14T02:18:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "87e60dabe319480a8d008afa73005b73", "name": "tempest-DHCPAgentSchedulersRbacTest-349886767"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_87e60dabe319480a8d008afa73005b73", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:25.568 189 INFO tempest.lib.common.rest_client [req-0dfc838d-a30c-4080-8429-827f1349185b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.270s 2020-12-14 02:18:25.571 189 DEBUG tempest.lib.common.rest_client [req-0dfc838d-a30c-4080-8429-827f1349185b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0dfc838d-a30c-4080-8429-827f1349185b', 'x-compute-request-id': 'req-0dfc838d-a30c-4080-8429-827f1349185b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:25.678 193 INFO tempest.lib.common.rest_client [req-ddfd3996-13fc-432d-83d3-54f1f7bd40bd ] Request (SnapshotManageRbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/volumes 0.430s 2020-12-14 02:18:25.681 193 DEBUG tempest.lib.common.rest_client [req-ddfd3996-13fc-432d-83d3-54f1f7bd40bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-SnapshotManageRbacTest-Volume-1899354082"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ddfd3996-13fc-432d-83d3-54f1f7bd40bd', 'content-length': '843', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ddfd3996-13fc-432d-83d3-54f1f7bd40bd', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/volumes'} Body: b'{"volume": {"id": "bacc7e00-547b-4465-9b8d-e6a5fe0e1b67", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:26.000000", "updated_at": null, "name": "tempest-SnapshotManageRbacTest-Volume-1899354082", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67"}], "user_id": "06f8246ec8a749aba9386ba6b973ec37", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:25.858 193 INFO tempest.lib.common.rest_client [req-45c795f2-98a5-4ef0-b61b-8714ce20f3e6 ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67 0.084s 2020-12-14 02:18:25.862 193 DEBUG tempest.lib.common.rest_client [req-45c795f2-98a5-4ef0-b61b-8714ce20f3e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-45c795f2-98a5-4ef0-b61b-8714ce20f3e6', 'content-length': '1065', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-45c795f2-98a5-4ef0-b61b-8714ce20f3e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67'} Body: b'{"volume": {"id": "bacc7e00-547b-4465-9b8d-e6a5fe0e1b67", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:26.000000", "updated_at": "2020-12-14T02:18:26.000000", "name": "tempest-SnapshotManageRbacTest-Volume-1899354082", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67"}], "user_id": "06f8246ec8a749aba9386ba6b973ec37", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "7bee350288994567badad56fe9b73eb2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:26.228 186 INFO tempest.lib.common.rest_client [req-352ac054-91c9-4bc7-a01e-8a918c24e560 ] Request (DHCPAgentSchedulersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/27526341-45c0-479e-a7ab-96429d1a9393 0.708s 2020-12-14 02:18:26.232 186 DEBUG tempest.lib.common.rest_client [req-352ac054-91c9-4bc7-a01e-8a918c24e560 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-352ac054-91c9-4bc7-a01e-8a918c24e560', 'date': 'Mon, 14 Dec 2020 02:18:26 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/27526341-45c0-479e-a7ab-96429d1a9393'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:26.688 197 INFO tempest.lib.common.rest_client [req-393614f1-465a-452f-92e5-c4c5c81ca6bc ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.236s 2020-12-14 02:18:26.692 197 DEBUG tempest.lib.common.rest_client [req-393614f1-465a-452f-92e5-c4c5c81ca6bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-393614f1-465a-452f-92e5-c4c5c81ca6bc', 'x-compute-request-id': 'req-393614f1-465a-452f-92e5-c4c5c81ca6bc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:26.863 186 INFO tempest.lib.common.rest_client [req-9b1aab72-df0b-449d-9021-d6c1b7ace521 ] Request (DHCPAgentSchedulersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/7027af34-a5f6-4ba7-be66-74a96e3abec3 0.625s 2020-12-14 02:18:26.865 186 DEBUG tempest.lib.common.rest_client [req-9b1aab72-df0b-449d-9021-d6c1b7ace521 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-9b1aab72-df0b-449d-9021-d6c1b7ace521', 'date': 'Mon, 14 Dec 2020 02:18:26 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/7027af34-a5f6-4ba7-be66-74a96e3abec3'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:26.902 189 INFO tempest.lib.common.rest_client [req-cc8d925d-6fdc-44ba-8fd9-ab61411b3779 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.224s 2020-12-14 02:18:26.905 189 DEBUG tempest.lib.common.rest_client [req-cc8d925d-6fdc-44ba-8fd9-ab61411b3779 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cc8d925d-6fdc-44ba-8fd9-ab61411b3779', 'x-compute-request-id': 'req-cc8d925d-6fdc-44ba-8fd9-ab61411b3779', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:27.012 186 INFO tempest.lib.common.rest_client [req-e4ee3783-ff8e-4fcf-9cf9-b042de44dd7d ] Request (DHCPAgentSchedulersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/24c396e5f6d948fbb0c43aba9e58cf0f 0.140s 2020-12-14 02:18:27.014 186 DEBUG tempest.lib.common.rest_client [req-e4ee3783-ff8e-4fcf-9cf9-b042de44dd7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4ee3783-ff8e-4fcf-9cf9-b042de44dd7d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/24c396e5f6d948fbb0c43aba9e58cf0f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:27.037 193 INFO tempest.lib.common.rest_client [req-d91812be-6025-487f-8e3e-169800a15a1d ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67 0.071s 2020-12-14 02:18:27.041 193 DEBUG tempest.lib.common.rest_client [req-d91812be-6025-487f-8e3e-169800a15a1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d91812be-6025-487f-8e3e-169800a15a1d', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d91812be-6025-487f-8e3e-169800a15a1d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67'} Body: b'{"volume": {"id": "bacc7e00-547b-4465-9b8d-e6a5fe0e1b67", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:26.000000", "updated_at": "2020-12-14T02:18:26.000000", "name": "tempest-SnapshotManageRbacTest-Volume-1899354082", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67"}], "user_id": "06f8246ec8a749aba9386ba6b973ec37", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "7bee350288994567badad56fe9b73eb2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:27.114 186 INFO tempest.lib.common.rest_client [req-b38f054e-db22-4053-b9d2-552058cda249 ] Request (DHCPAgentSchedulersRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:18:27.116 186 DEBUG tempest.lib.common.rest_client [req-b38f054e-db22-4053-b9d2-552058cda249 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b38f054e-db22-4053-b9d2-552058cda249', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ff4ZK1gPQPObIjj1tc-l9Q"], "expires_at": "2020-12-14T03:18:27.000000Z", "issued_at": "2020-12-14T02:18:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:27.138 193 INFO tempest.common.waiters [-] volume bacc7e00-547b-4465-9b8d-e6a5fe0e1b67 reached available after waiting for 2.137963 seconds 2020-12-14 02:18:27.306 186 INFO tempest.lib.common.rest_client [req-e0417001-a254-412c-99c1-5df5df4a8059 ] Request (DHCPAgentSchedulersRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=87e60dabe319480a8d008afa73005b73&name=default 0.183s 2020-12-14 02:18:27.309 186 DEBUG tempest.lib.common.rest_client [req-e0417001-a254-412c-99c1-5df5df4a8059 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-e0417001-a254-412c-99c1-5df5df4a8059', 'date': 'Mon, 14 Dec 2020 02:18:27 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=87e60dabe319480a8d008afa73005b73&name=default'} Body: b'{"security_groups": [{"id": "2991b345-02e2-4c4a-9b1c-3450d2bb889f", "name": "default", "stateful": true, "tenant_id": "87e60dabe319480a8d008afa73005b73", "description": "Default security group", "security_group_rules": [{"id": "3d1bec42-a7ab-4ed4-9285-c3e2a64f3424", "tenant_id": "87e60dabe319480a8d008afa73005b73", "security_group_id": "2991b345-02e2-4c4a-9b1c-3450d2bb889f", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:21Z", "updated_at": "2020-12-14T02:18:21Z", "revision_number": 0, "project_id": "87e60dabe319480a8d008afa73005b73"}, {"id": "53a53b93-505c-417d-8d2a-8c638b990dba", "tenant_id": "87e60dabe319480a8d008afa73005b73", "security_group_id": "2991b345-02e2-4c4a-9b1c-3450d2bb889f", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:21Z", "updated_at": "2020-12-14T02:18:21Z", "revision_number": 0, "project_id": "87e60dabe319480a8d008afa73005b73"}, {"id": "61052a18-da54-47ba-aa37-e58fd4683007", "tenant_id": "87e60dabe319480a8d008afa73005b73", "security_group_id": "2991b345-02e2-4c4a-9b1c-3450d2bb889f", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2991b345-02e2-4c4a-9b1c-3450d2bb889f", "description": null, "tags": [], "created_at": "2020-12-14T02:18:21Z", "updated_at": "2020-12-14T02:18:21Z", "revision_number": 0, "project_id": "87e60dabe319480a8d008afa73005b73"}, {"id": "d3ba3a5e-9361-4c8d-bda0-65b4a489d8bc", "tenant_id": "87e60dabe319480a8d008afa73005b73", "security_group_id": "2991b345-02e2-4c4a-9b1c-3450d2bb889f", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2991b345-02e2-4c4a-9b1c-3450d2bb889f", "description": null, "tags": [], "created_at": "2020-12-14T02:18:21Z", "updated_at": "2020-12-14T02:18:21Z", "revision_number": 0, "project_id": "87e60dabe319480a8d008afa73005b73"}], "tags": [], "created_at": "2020-12-14T02:18:21Z", "updated_at": "2020-12-14T02:18:21Z", "revision_number": 1, "project_id": "87e60dabe319480a8d008afa73005b73"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:27.354 193 INFO tempest.lib.common.rest_client [req-87d23a79-de4e-4ecb-a422-5a22d9a60fd4 ] Request (SnapshotManageRbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots 0.210s 2020-12-14 02:18:27.358 193 DEBUG tempest.lib.common.rest_client [req-87d23a79-de4e-4ecb-a422-5a22d9a60fd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "bacc7e00-547b-4465-9b8d-e6a5fe0e1b67", "name": "tempest-SnapshotManageRbacTest-Snapshot-1463265148"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-87d23a79-de4e-4ecb-a422-5a22d9a60fd4', 'content-length': '309', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-87d23a79-de4e-4ecb-a422-5a22d9a60fd4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots'} Body: b'{"snapshot": {"id": "b6eb19d0-e037-4f40-8f20-53abbca73c23", "created_at": "2020-12-14T02:18:27.277969", "updated_at": null, "name": "tempest-SnapshotManageRbacTest-Snapshot-1463265148", "description": null, "volume_id": "bacc7e00-547b-4465-9b8d-e6a5fe0e1b67", "status": "creating", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:27.435 193 INFO tempest.lib.common.rest_client [req-e5d051c9-b935-4fb9-97e4-4ccb6d20f3f3 ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/b6eb19d0-e037-4f40-8f20-53abbca73c23 0.043s 2020-12-14 02:18:27.437 193 DEBUG tempest.lib.common.rest_client [req-e5d051c9-b935-4fb9-97e4-4ccb6d20f3f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e5d051c9-b935-4fb9-97e4-4ccb6d20f3f3', 'content-length': '441', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e5d051c9-b935-4fb9-97e4-4ccb6d20f3f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/b6eb19d0-e037-4f40-8f20-53abbca73c23'} Body: b'{"snapshot": {"id": "b6eb19d0-e037-4f40-8f20-53abbca73c23", "created_at": "2020-12-14T02:18:27.000000", "updated_at": null, "name": "tempest-SnapshotManageRbacTest-Snapshot-1463265148", "description": null, "volume_id": "bacc7e00-547b-4465-9b8d-e6a5fe0e1b67", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "7bee350288994567badad56fe9b73eb2", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:27.508 186 INFO tempest.lib.common.rest_client [req-42359a14-2017-4139-9b40-d976e1887093 ] Request (DHCPAgentSchedulersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/2991b345-02e2-4c4a-9b1c-3450d2bb889f 0.193s 2020-12-14 02:18:27.510 186 DEBUG tempest.lib.common.rest_client [req-42359a14-2017-4139-9b40-d976e1887093 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-42359a14-2017-4139-9b40-d976e1887093', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:27 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/2991b345-02e2-4c4a-9b1c-3450d2bb889f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:27.639 186 INFO tempest.lib.common.rest_client [req-9b76fcdb-a331-43e1-afdb-c87a932fc32f ] Request (DHCPAgentSchedulersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73 0.122s 2020-12-14 02:18:27.641 186 DEBUG tempest.lib.common.rest_client [req-9b76fcdb-a331-43e1-afdb-c87a932fc32f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b76fcdb-a331-43e1-afdb-c87a932fc32f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/87e60dabe319480a8d008afa73005b73'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:27.753 186 INFO tempest.lib.common.rest_client [req-4d6ffaee-a41f-41e7-bdd4-e31cc20b2af5 ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:18:27.757 186 DEBUG tempest.lib.common.rest_client [req-4d6ffaee-a41f-41e7-bdd4-e31cc20b2af5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d6ffaee-a41f-41e7-bdd4-e31cc20b2af5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["tY5e6SAuTh-Y-tV_y_yc7w"], "expires_at": "2020-12-14T03:18:27.000000Z", "issued_at": "2020-12-14T02:18:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:27.851 186 INFO tempest.lib.common.rest_client [req-a0f61295-ded3-4e02-9109-92e365a5f3fe ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:18:27.854 186 DEBUG tempest.lib.common.rest_client [req-a0f61295-ded3-4e02-9109-92e365a5f3fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0f61295-ded3-4e02-9109-92e365a5f3fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["heyyXU6_SCKjiSlArl-p3w"], "expires_at": "2020-12-14T03:18:27.000000Z", "issued_at": "2020-12-14T02:18:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:27.926 186 INFO tempest.lib.common.rest_client [req-b9115b67-1e58-44b1-b0dc-d2931725d04d ] Request (L3AgentSchedulerRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.064s 2020-12-14 02:18:27.929 186 DEBUG tempest.lib.common.rest_client [req-b9115b67-1e58-44b1-b0dc-d2931725d04d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9115b67-1e58-44b1-b0dc-d2931725d04d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:28.006 186 INFO tempest.lib.common.rest_client [req-78b10721-72e1-4511-935e-17754f2c84f8 ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.070s 2020-12-14 02:18:28.009 186 DEBUG tempest.lib.common.rest_client [req-78b10721-72e1-4511-935e-17754f2c84f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-L3AgentSchedulerRbacTest-1988175864-desc", "domain_id": "default", "name": "tempest-L3AgentSchedulerRbacTest-1988175864"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78b10721-72e1-4511-935e-17754f2c84f8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "dfafbeaf950747608cd9171e1c94886e", "name": "tempest-L3AgentSchedulerRbacTest-1988175864", "domain_id": "default", "description": "tempest-L3AgentSchedulerRbacTest-1988175864-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:28.027 197 INFO tempest.lib.common.rest_client [req-c1070fa3-5a59-4a04-894e-f4a10e1b34ae ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.227s 2020-12-14 02:18:28.030 197 DEBUG tempest.lib.common.rest_client [req-c1070fa3-5a59-4a04-894e-f4a10e1b34ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c1070fa3-5a59-4a04-894e-f4a10e1b34ae', 'x-compute-request-id': 'req-c1070fa3-5a59-4a04-894e-f4a10e1b34ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:28.128 186 INFO tempest.lib.common.rest_client [req-b29defda-51aa-4ad9-a371-7fb5f214ec2a ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.111s 2020-12-14 02:18:28.132 186 DEBUG tempest.lib.common.rest_client [req-b29defda-51aa-4ad9-a371-7fb5f214ec2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-L3AgentSchedulerRbacTest-1988175864", "password": "B8&d3*rSs7R4Kbz", "project_id": "dfafbeaf950747608cd9171e1c94886e", "email": "tempest-L3AgentSchedulerRbacTest-868554626@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '403', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b29defda-51aa-4ad9-a371-7fb5f214ec2a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "dfafbeaf950747608cd9171e1c94886e", "email": "tempest-L3AgentSchedulerRbacTest-868554626@example.com", "id": "60af7656ca4d42aeb51978c8d2b97053", "name": "tempest-L3AgentSchedulerRbacTest-1988175864", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/60af7656ca4d42aeb51978c8d2b97053"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:28.197 186 INFO tempest.lib.common.rest_client [req-a64dd6ed-d6d1-497a-b139-b1fd8d9ad344 ] Request (L3AgentSchedulerRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-12-14 02:18:28.200 186 DEBUG tempest.lib.common.rest_client [req-a64dd6ed-d6d1-497a-b139-b1fd8d9ad344 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a64dd6ed-d6d1-497a-b139-b1fd8d9ad344', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:28.241 189 INFO tempest.lib.common.rest_client [req-7771e8c6-0012-4adf-be62-9050951915f5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.231s 2020-12-14 02:18:28.244 189 DEBUG tempest.lib.common.rest_client [req-7771e8c6-0012-4adf-be62-9050951915f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7771e8c6-0012-4adf-be62-9050951915f5', 'x-compute-request-id': 'req-7771e8c6-0012-4adf-be62-9050951915f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:28.270 186 INFO tempest.lib.common.rest_client [req-341a0f3c-434e-48fe-93ec-ed70190064bf ] Request (L3AgentSchedulerRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:18:28.273 186 DEBUG tempest.lib.common.rest_client [req-341a0f3c-434e-48fe-93ec-ed70190064bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-341a0f3c-434e-48fe-93ec-ed70190064bf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:28.486 186 INFO tempest.lib.common.rest_client [req-5b916382-1dd3-4682-ad91-6e5e5cf1ab95 ] Request (L3AgentSchedulerRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles/72a4576c553448cd941b052c1ca0cf2d 0.204s 2020-12-14 02:18:28.489 186 DEBUG tempest.lib.common.rest_client [req-5b916382-1dd3-4682-ad91-6e5e5cf1ab95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b916382-1dd3-4682-ad91-6e5e5cf1ab95', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:28.492 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-L3AgentSchedulerRbacTest-1988175864', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'dfafbeaf950747608cd9171e1c94886e', 'project_name': 'tempest-L3AgentSchedulerRbacTest-1988175864', 'tenant_id': 'dfafbeaf950747608cd9171e1c94886e', 'tenant_name': 'tempest-L3AgentSchedulerRbacTest-1988175864', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '60af7656ca4d42aeb51978c8d2b97053'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:28.494 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-L3AgentSchedulerRbacTest-1988175864', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'dfafbeaf950747608cd9171e1c94886e', 'project_name': 'tempest-L3AgentSchedulerRbacTest-1988175864', 'tenant_id': 'dfafbeaf950747608cd9171e1c94886e', 'tenant_name': 'tempest-L3AgentSchedulerRbacTest-1988175864', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '60af7656ca4d42aeb51978c8d2b97053'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:28.524 193 INFO tempest.lib.common.rest_client [req-1f2773bb-585e-44be-b7e2-48f1a8504aba ] Request (SnapshotManageRbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/b6eb19d0-e037-4f40-8f20-53abbca73c23 0.048s 2020-12-14 02:18:28.527 193 DEBUG tempest.lib.common.rest_client [req-1f2773bb-585e-44be-b7e2-48f1a8504aba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1f2773bb-585e-44be-b7e2-48f1a8504aba', 'content-length': '468', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1f2773bb-585e-44be-b7e2-48f1a8504aba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/b6eb19d0-e037-4f40-8f20-53abbca73c23'} Body: b'{"snapshot": {"id": "b6eb19d0-e037-4f40-8f20-53abbca73c23", "created_at": "2020-12-14T02:18:27.000000", "updated_at": "2020-12-14T02:18:28.000000", "name": "tempest-SnapshotManageRbacTest-Snapshot-1463265148", "description": null, "volume_id": "bacc7e00-547b-4465-9b8d-e6a5fe0e1b67", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "7bee350288994567badad56fe9b73eb2", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:28.561 193 INFO tempest.common.waiters [-] snapshot b6eb19d0-e037-4f40-8f20-53abbca73c23 reached available after waiting for 1.560866 seconds 2020-12-14 02:18:28.567 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:28.586 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: snapshot_extension:snapshot_manage, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:28.589 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:28.666 186 INFO tempest.lib.common.rest_client [req-8db0053b-51fa-42b6-af71-a237bc2d9edd ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:18:28.669 186 DEBUG tempest.lib.common.rest_client [req-8db0053b-51fa-42b6-af71-a237bc2d9edd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8db0053b-51fa-42b6-af71-a237bc2d9edd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60af7656ca4d42aeb51978c8d2b97053", "name": "tempest-L3AgentSchedulerRbacTest-1988175864", "password_expires_at": null}, "audit_ids": ["oMpYpAczQuiGoSg5MiXW6A"], "expires_at": "2020-12-14T03:18:28.000000Z", "issued_at": "2020-12-14T02:18:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dfafbeaf950747608cd9171e1c94886e", "name": "tempest-L3AgentSchedulerRbacTest-1988175864"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:28.705 193 INFO tempest.lib.common.rest_client [req-e6ada876-625c-400b-b07b-463589c5a028 ] Request (SnapshotManageRbacTest:test_manage_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2/users/06f8246ec8a749aba9386ba6b973ec37/roles 0.109s 2020-12-14 02:18:28.709 193 DEBUG tempest.lib.common.rest_client [req-e6ada876-625c-400b-b07b-463589c5a028 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6ada876-625c-400b-b07b-463589c5a028', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2/users/06f8246ec8a749aba9386ba6b973ec37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2/users/06f8246ec8a749aba9386ba6b973ec37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:28.738 186 INFO tempest.lib.common.rest_client [req-6ef217c5-ae84-47b4-8605-9f5fc20d080c ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.059s 2020-12-14 02:18:28.742 186 DEBUG tempest.lib.common.rest_client [req-6ef217c5-ae84-47b4-8605-9f5fc20d080c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ef217c5-ae84-47b4-8605-9f5fc20d080c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["gr9UPEppQiKuGN0Yg3jnCQ"], "expires_at": "2020-12-14T03:18:28.000000Z", "issued_at": "2020-12-14T02:18:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:28.814 193 INFO tempest.lib.common.rest_client [req-8f2a6120-4505-44e2-be3e-fc28e919ea0e ] Request (SnapshotManageRbacTest:test_manage_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:18:28.817 193 DEBUG tempest.lib.common.rest_client [req-8f2a6120-4505-44e2-be3e-fc28e919ea0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f2a6120-4505-44e2-be3e-fc28e919ea0e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "06f8246ec8a749aba9386ba6b973ec37", "name": "tempest-SnapshotManageRbacTest-1961474995", "password_expires_at": null}, "audit_ids": ["4b1q-dlpQTenwcwSpLYGKQ"], "expires_at": "2020-12-14T03:18:28.000000Z", "issued_at": "2020-12-14T02:18:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7bee350288994567badad56fe9b73eb2", "name": "tempest-SnapshotManageRbacTest-1961474995"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:28.864 186 INFO tempest.lib.common.rest_client [req-00b91f38-4b93-4dea-85a3-c258097cee0a ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:18:28.866 186 DEBUG tempest.lib.common.rest_client [req-00b91f38-4b93-4dea-85a3-c258097cee0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-00b91f38-4b93-4dea-85a3-c258097cee0a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["4fEiJ7ctQxiECgCdw0OYPA"], "expires_at": "2020-12-14T03:18:28.000000Z", "issued_at": "2020-12-14T02:18:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:28.938 186 INFO tempest.lib.common.rest_client [req-1f2d9830-0ac9-45b4-a84f-1b7fe3644907 ] Request (L3AgentSchedulerRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.066s 2020-12-14 02:18:28.941 186 DEBUG tempest.lib.common.rest_client [req-1f2d9830-0ac9-45b4-a84f-1b7fe3644907 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f2d9830-0ac9-45b4-a84f-1b7fe3644907', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:29.020 186 INFO tempest.lib.common.rest_client [req-744a19b7-cd47-4ba1-bbaa-2ad12d8ecc7b ] Request (L3AgentSchedulerRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.070s 2020-12-14 02:18:29.024 186 DEBUG tempest.lib.common.rest_client [req-744a19b7-cd47-4ba1-bbaa-2ad12d8ecc7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-744a19b7-cd47-4ba1-bbaa-2ad12d8ecc7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:29.027 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:18:29.029 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:29.103 186 INFO tempest.lib.common.rest_client [req-c5f7f0bf-8a2c-4710-9d50-34fde806f468 ] Request (L3AgentSchedulerRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles 0.068s 2020-12-14 02:18:29.106 186 DEBUG tempest.lib.common.rest_client [req-c5f7f0bf-8a2c-4710-9d50-34fde806f468 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c5f7f0bf-8a2c-4710-9d50-34fde806f468', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:29.152 193 INFO tempest.lib.common.rest_client [req-228be22f-c053-4e72-a9b5-55a061501715 ] Request (SnapshotManageRbacTest:test_manage_snapshot_rbac): 202 POST http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/os-snapshot-manage 0.326s 2020-12-14 02:18:29.156 193 DEBUG tempest.lib.common.rest_client [req-228be22f-c053-4e72-a9b5-55a061501715 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "bacc7e00-547b-4465-9b8d-e6a5fe0e1b67", "ref": {"source-name": "snapshot-b6eb19d0-e037-4f40-8f20-53abbca73c23"}, "name": "tempest-SnapshotManageRbacTest-Managed-Snapshot-931446220"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-228be22f-c053-4e72-a9b5-55a061501715', 'content-length': '316', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-228be22f-c053-4e72-a9b5-55a061501715', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/os-snapshot-manage'} Body: b'{"snapshot": {"id": "55d3f494-0688-4f57-8335-93df3b47a36f", "created_at": "2020-12-14T02:18:29.072358", "updated_at": null, "name": "tempest-SnapshotManageRbacTest-Managed-Snapshot-931446220", "description": null, "volume_id": "bacc7e00-547b-4465-9b8d-e6a5fe0e1b67", "status": "creating", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:29.186 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:29.192 186 INFO tempest.lib.common.rest_client [req-847fb4be-d1cd-4f25-b1bb-dd72748b5b2a ] Request (L3AgentSchedulerRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles/72a4576c553448cd941b052c1ca0cf2d 0.079s 2020-12-14 02:18:29.194 186 DEBUG tempest.lib.common.rest_client [req-847fb4be-d1cd-4f25-b1bb-dd72748b5b2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-847fb4be-d1cd-4f25-b1bb-dd72748b5b2a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:29.312 193 INFO tempest.lib.common.rest_client [req-1c4f7d84-23f1-4e18-987e-db6a6de20809 ] Request (SnapshotManageRbacTest:test_manage_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2/users/06f8246ec8a749aba9386ba6b973ec37/roles 0.119s 2020-12-14 02:18:29.315 193 DEBUG tempest.lib.common.rest_client [req-1c4f7d84-23f1-4e18-987e-db6a6de20809 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c4f7d84-23f1-4e18-987e-db6a6de20809', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2/users/06f8246ec8a749aba9386ba6b973ec37/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2/users/06f8246ec8a749aba9386ba6b973ec37/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:29.328 186 INFO tempest.lib.common.rest_client [req-1a0f6867-0a14-4530-af7c-e20bb625e433 ] Request (L3AgentSchedulerRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles/a629c95d64b3416fb80ae90af4f69c05 0.127s 2020-12-14 02:18:29.331 186 DEBUG tempest.lib.common.rest_client [req-1a0f6867-0a14-4530-af7c-e20bb625e433 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a0f6867-0a14-4530-af7c-e20bb625e433', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:29.371 197 INFO tempest.lib.common.rest_client [req-c73b1359-cdd4-4b61-949c-726ea0c0bd8b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.233s 2020-12-14 02:18:29.375 197 DEBUG tempest.lib.common.rest_client [req-c73b1359-cdd4-4b61-949c-726ea0c0bd8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c73b1359-cdd4-4b61-949c-726ea0c0bd8b', 'x-compute-request-id': 'req-c73b1359-cdd4-4b61-949c-726ea0c0bd8b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:29.407 193 INFO tempest.lib.common.rest_client [req-d7c914cb-337b-4f00-b116-b2324071d2b0 ] Request (SnapshotManageRbacTest:test_manage_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-14 02:18:29.410 193 DEBUG tempest.lib.common.rest_client [req-d7c914cb-337b-4f00-b116-b2324071d2b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d7c914cb-337b-4f00-b116-b2324071d2b0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "06f8246ec8a749aba9386ba6b973ec37", "name": "tempest-SnapshotManageRbacTest-1961474995", "password_expires_at": null}, "audit_ids": ["QS403TahQpCmolRmX6ka0A"], "expires_at": "2020-12-14T03:18:29.000000Z", "issued_at": "2020-12-14T02:18:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7bee350288994567badad56fe9b73eb2", "name": "tempest-SnapshotManageRbacTest-1961474995"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7bee350288994567badad56fe9b73eb2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:29.568 189 INFO tempest.lib.common.rest_client [req-52741bef-a776-4a92-baf2-5bf6f9868523 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.219s 2020-12-14 02:18:29.571 189 DEBUG tempest.lib.common.rest_client [req-52741bef-a776-4a92-baf2-5bf6f9868523 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-52741bef-a776-4a92-baf2-5bf6f9868523', 'x-compute-request-id': 'req-52741bef-a776-4a92-baf2-5bf6f9868523', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:29.575 193 INFO tempest.lib.common.rest_client [req-32635356-6d2e-4e86-bf34-5aedf99b8fb6 ] Request (SnapshotManageRbacTest:test_manage_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/55d3f494-0688-4f57-8335-93df3b47a36f 0.157s 2020-12-14 02:18:29.579 193 DEBUG tempest.lib.common.rest_client [req-32635356-6d2e-4e86-bf34-5aedf99b8fb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-32635356-6d2e-4e86-bf34-5aedf99b8fb6', 'content-length': '448', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-32635356-6d2e-4e86-bf34-5aedf99b8fb6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/55d3f494-0688-4f57-8335-93df3b47a36f'} Body: b'{"snapshot": {"id": "55d3f494-0688-4f57-8335-93df3b47a36f", "created_at": "2020-12-14T02:18:29.000000", "updated_at": null, "name": "tempest-SnapshotManageRbacTest-Managed-Snapshot-931446220", "description": null, "volume_id": "bacc7e00-547b-4465-9b8d-e6a5fe0e1b67", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "7bee350288994567badad56fe9b73eb2", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:30.445 186 INFO tempest.lib.common.rest_client [req-1a2fff35-c047-4039-88ef-7bdf79d5c276 ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:18:30.448 186 DEBUG tempest.lib.common.rest_client [req-1a2fff35-c047-4039-88ef-7bdf79d5c276 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a2fff35-c047-4039-88ef-7bdf79d5c276', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60af7656ca4d42aeb51978c8d2b97053", "name": "tempest-L3AgentSchedulerRbacTest-1988175864", "password_expires_at": null}, "audit_ids": ["3UDEJ6wOQlC4YpKWYDBVsQ"], "expires_at": "2020-12-14T03:18:30.000000Z", "issued_at": "2020-12-14T02:18:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dfafbeaf950747608cd9171e1c94886e", "name": "tempest-L3AgentSchedulerRbacTest-1988175864"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:30.670 193 INFO tempest.lib.common.rest_client [req-c12fa109-fea5-4e9a-af11-ec8e900b4cf7 ] Request (SnapshotManageRbacTest:test_manage_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/55d3f494-0688-4f57-8335-93df3b47a36f 0.053s 2020-12-14 02:18:30.674 193 DEBUG tempest.lib.common.rest_client [req-c12fa109-fea5-4e9a-af11-ec8e900b4cf7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c12fa109-fea5-4e9a-af11-ec8e900b4cf7', 'content-length': '473', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c12fa109-fea5-4e9a-af11-ec8e900b4cf7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/55d3f494-0688-4f57-8335-93df3b47a36f'} Body: b'{"snapshot": {"id": "55d3f494-0688-4f57-8335-93df3b47a36f", "created_at": "2020-12-14T02:18:29.000000", "updated_at": "2020-12-14T02:18:30.000000", "name": "tempest-SnapshotManageRbacTest-Managed-Snapshot-931446220", "description": null, "volume_id": "bacc7e00-547b-4465-9b8d-e6a5fe0e1b67", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "7bee350288994567badad56fe9b73eb2", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:30.706 193 INFO tempest.common.waiters [-] snapshot 55d3f494-0688-4f57-8335-93df3b47a36f reached available after waiting for 1.705925 seconds 2020-12-14 02:18:30.708 197 INFO tempest.lib.common.rest_client [req-88e2ee55-c7b7-41c0-aefb-24565eb559aa ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.227s 2020-12-14 02:18:30.711 197 DEBUG tempest.lib.common.rest_client [req-88e2ee55-c7b7-41c0-aefb-24565eb559aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-88e2ee55-c7b7-41c0-aefb-24565eb559aa', 'x-compute-request-id': 'req-88e2ee55-c7b7-41c0-aefb-24565eb559aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:30.854 193 INFO tempest.lib.common.rest_client [req-ab21e6bd-dbd9-4b79-be90-45074dd2a574 ] Request (SnapshotManageRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/55d3f494-0688-4f57-8335-93df3b47a36f 0.141s 2020-12-14 02:18:30.857 193 DEBUG tempest.lib.common.rest_client [req-ab21e6bd-dbd9-4b79-be90-45074dd2a574 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ab21e6bd-dbd9-4b79-be90-45074dd2a574', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/55d3f494-0688-4f57-8335-93df3b47a36f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:30.911 193 INFO tempest.lib.common.rest_client [req-63fba556-b364-4de0-950c-f01adbd09c61 ] Request (SnapshotManageRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/55d3f494-0688-4f57-8335-93df3b47a36f 0.047s 2020-12-14 02:18:30.911 189 INFO tempest.lib.common.rest_client [req-e87d6fb3-2ef9-43bb-b125-591984f3bca4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.231s 2020-12-14 02:18:30.915 189 DEBUG tempest.lib.common.rest_client [req-e87d6fb3-2ef9-43bb-b125-591984f3bca4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e87d6fb3-2ef9-43bb-b125-591984f3bca4', 'x-compute-request-id': 'req-e87d6fb3-2ef9-43bb-b125-591984f3bca4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:30.915 193 DEBUG tempest.lib.common.rest_client [req-63fba556-b364-4de0-950c-f01adbd09c61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-63fba556-b364-4de0-950c-f01adbd09c61', 'content-length': '472', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-63fba556-b364-4de0-950c-f01adbd09c61', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/55d3f494-0688-4f57-8335-93df3b47a36f'} Body: b'{"snapshot": {"id": "55d3f494-0688-4f57-8335-93df3b47a36f", "created_at": "2020-12-14T02:18:29.000000", "updated_at": "2020-12-14T02:18:31.000000", "name": "tempest-SnapshotManageRbacTest-Managed-Snapshot-931446220", "description": null, "volume_id": "bacc7e00-547b-4465-9b8d-e6a5fe0e1b67", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "7bee350288994567badad56fe9b73eb2", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:30.979 186 INFO tempest.lib.common.rest_client [req-ff8b60df-0bf7-45d1-bf2f-a6d8b4a3ea6a ] Request (L3AgentSchedulerRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 0.519s 2020-12-14 02:18:30.981 186 DEBUG tempest.lib.common.rest_client [req-ff8b60df-0bf7-45d1-bf2f-a6d8b4a3ea6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-L3AgentSchedulerRbacTest-router-851537421", "external_gateway_info": {}, "admin_state_up": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '548', 'x-openstack-request-id': 'req-ff8b60df-0bf7-45d1-bf2f-a6d8b4a3ea6a', 'date': 'Mon, 14 Dec 2020 02:18:30 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "9ab6cec8-729c-4756-a01a-39b998aecc28", "name": "tempest-L3AgentSchedulerRbacTest-router-851537421", "tenant_id": "dfafbeaf950747608cd9171e1c94886e", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:18:30Z", "updated_at": "2020-12-14T02:18:30Z", "revision_number": 1, "project_id": "dfafbeaf950747608cd9171e1c94886e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:31.014 186 INFO tempest.lib.common.rest_client [req-410cbe61-ae3f-4a11-a716-21c53235ae60 ] Request (L3AgentSchedulerRbacTest:setUp): 200 GET http://172.30.13.94:9696/v2.0/agents 0.023s 2020-12-14 02:18:31.017 186 DEBUG tempest.lib.common.rest_client [req-410cbe61-ae3f-4a11-a716-21c53235ae60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '4329', 'x-openstack-request-id': 'req-410cbe61-ae3f-4a11-a716-21c53235ae60', 'date': 'Mon, 14 Dec 2020 02:18:31 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents'} Body: b'{"agents": [{"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-12-14 02:18:08", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 11, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 1, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 14, "log_agent_heartbeats": false, "routers": 11}}, {"id": "538ccf2a-fb61-47ed-a10a-785f64cdbb63", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual8", "admin_state_up": true, "created_at": "2020-10-07 13:02:58", "started_at": "2020-10-07 13:03:28", "heartbeat_timestamp": "2020-12-14 02:18:02", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {}, "datapath_type": "system", "devices": 0, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["vxlan"], "tunneling_ip": "172.30.13.93", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "9d48116b-94de-4990-baef-e3b6765751fc", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:05", "started_at": "2020-10-07 12:07:35", "heartbeat_timestamp": "2020-12-14 02:18:17", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {"public": "br-ex"}, "datapath_type": "system", "devices": 26, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {"br-ex": "lf-virtual9"}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["gre", "vxlan"], "tunneling_ip": "172.30.13.94", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "bc496462-aac8-4795-a8f9-6f5600fa0870", "agent_type": "DHCP agent", "binary": "neutron-dhcp-agent", "topic": "dhcp_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:02", "started_at": "2020-10-07 12:07:02", "heartbeat_timestamp": "2020-12-14 02:18:26", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"dhcp_driver": "neutron.agent.linux.dhcp.Dnsmasq", "dhcp_lease_duration": 86400, "log_agent_heartbeats": false, "networks": 8, "ports": 18, "subnets": 10}}, {"id": "faf7e63c-a878-4cb5-b625-f96907b00d51", "agent_type": "Metadata agent", "binary": "neutron-metadata-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:06", "started_at": "2020-10-07 12:07:06", "heartbeat_timestamp": "2020-12-14 02:18:26", "description": null, "resources_synced" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:31.021 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:31.045 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_l3-router, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:31.047 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:31.181 186 INFO tempest.lib.common.rest_client [req-7bd43893-01db-45d4-a22d-0fb240ef08c8 ] Request (L3AgentSchedulerRbacTest:test_create_router_on_l3_agent): 200 GET http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles 0.127s 2020-12-14 02:18:31.185 186 DEBUG tempest.lib.common.rest_client [req-7bd43893-01db-45d4-a22d-0fb240ef08c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7bd43893-01db-45d4-a22d-0fb240ef08c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:31.235 186 INFO tempest.lib.common.rest_client [req-7aa9dae9-939c-466d-9ce3-2fb15f353d40 ] Request (L3AgentSchedulerRbacTest:test_create_router_on_l3_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:18:31.238 186 DEBUG tempest.lib.common.rest_client [req-7aa9dae9-939c-466d-9ce3-2fb15f353d40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7aa9dae9-939c-466d-9ce3-2fb15f353d40', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60af7656ca4d42aeb51978c8d2b97053", "name": "tempest-L3AgentSchedulerRbacTest-1988175864", "password_expires_at": null}, "audit_ids": ["rxT27hVmTxeLStMUqu0Dlw"], "expires_at": "2020-12-14T03:18:31.000000Z", "issued_at": "2020-12-14T02:18:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dfafbeaf950747608cd9171e1c94886e", "name": "tempest-L3AgentSchedulerRbacTest-1988175864"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:31.471 186 INFO tempest.lib.common.rest_client [req-ac3aa8da-183a-41f0-bebb-36e3f14970db ] Request (L3AgentSchedulerRbacTest:test_create_router_on_l3_agent): 201 POST http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers 0.226s 2020-12-14 02:18:31.474 186 DEBUG tempest.lib.common.rest_client [req-ac3aa8da-183a-41f0-bebb-36e3f14970db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router_id": "9ab6cec8-729c-4756-a01a-39b998aecc28"} Response - Headers: {'content-type': 'application/json', 'content-length': '4', 'x-openstack-request-id': 'req-ac3aa8da-183a-41f0-bebb-36e3f14970db', 'date': 'Mon, 14 Dec 2020 02:18:31 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers'} Body: b'null' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:31.476 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:31.550 186 INFO tempest.lib.common.rest_client [req-755b549a-ea6a-41d6-a1eb-3847eecaadb0 ] Request (L3AgentSchedulerRbacTest:test_create_router_on_l3_agent): 200 GET http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles 0.067s 2020-12-14 02:18:31.553 186 DEBUG tempest.lib.common.rest_client [req-755b549a-ea6a-41d6-a1eb-3847eecaadb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-755b549a-ea6a-41d6-a1eb-3847eecaadb0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:31.607 186 INFO tempest.lib.common.rest_client [req-0e490963-e8fc-4b88-81b9-0b31103e4db7 ] Request (L3AgentSchedulerRbacTest:test_create_router_on_l3_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:18:31.610 186 DEBUG tempest.lib.common.rest_client [req-0e490963-e8fc-4b88-81b9-0b31103e4db7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e490963-e8fc-4b88-81b9-0b31103e4db7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60af7656ca4d42aeb51978c8d2b97053", "name": "tempest-L3AgentSchedulerRbacTest-1988175864", "password_expires_at": null}, "audit_ids": ["MzxA40wESwK8XdtLHE2vzg"], "expires_at": "2020-12-14T03:18:31.000000Z", "issued_at": "2020-12-14T02:18:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dfafbeaf950747608cd9171e1c94886e", "name": "tempest-L3AgentSchedulerRbacTest-1988175864"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:31.829 186 INFO tempest.lib.common.rest_client [req-83fba1ad-1ee5-4510-a1e6-8dc30aa02ab6 ] Request (L3AgentSchedulerRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers/9ab6cec8-729c-4756-a01a-39b998aecc28 0.209s 2020-12-14 02:18:31.832 186 DEBUG tempest.lib.common.rest_client [req-83fba1ad-1ee5-4510-a1e6-8dc30aa02ab6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-83fba1ad-1ee5-4510-a1e6-8dc30aa02ab6', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:31 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers/9ab6cec8-729c-4756-a01a-39b998aecc28'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:31.872 186 INFO tempest.lib.common.rest_client [req-5fef02cc-86c9-4cfa-bf7e-8c00908e152b ] Request (L3AgentSchedulerRbacTest:setUp): 200 GET http://172.30.13.94:9696/v2.0/agents 0.025s 2020-12-14 02:18:31.875 186 DEBUG tempest.lib.common.rest_client [req-5fef02cc-86c9-4cfa-bf7e-8c00908e152b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '4329', 'x-openstack-request-id': 'req-5fef02cc-86c9-4cfa-bf7e-8c00908e152b', 'date': 'Mon, 14 Dec 2020 02:18:31 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents'} Body: b'{"agents": [{"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-12-14 02:18:08", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 11, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 1, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 14, "log_agent_heartbeats": false, "routers": 11}}, {"id": "538ccf2a-fb61-47ed-a10a-785f64cdbb63", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual8", "admin_state_up": true, "created_at": "2020-10-07 13:02:58", "started_at": "2020-10-07 13:03:28", "heartbeat_timestamp": "2020-12-14 02:18:32", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {}, "datapath_type": "system", "devices": 0, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["vxlan"], "tunneling_ip": "172.30.13.93", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "9d48116b-94de-4990-baef-e3b6765751fc", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:05", "started_at": "2020-10-07 12:07:35", "heartbeat_timestamp": "2020-12-14 02:18:17", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {"public": "br-ex"}, "datapath_type": "system", "devices": 26, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {"br-ex": "lf-virtual9"}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["gre", "vxlan"], "tunneling_ip": "172.30.13.94", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "bc496462-aac8-4795-a8f9-6f5600fa0870", "agent_type": "DHCP agent", "binary": "neutron-dhcp-agent", "topic": "dhcp_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:02", "started_at": "2020-10-07 12:07:02", "heartbeat_timestamp": "2020-12-14 02:18:26", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"dhcp_driver": "neutron.agent.linux.dhcp.Dnsmasq", "dhcp_lease_duration": 86400, "log_agent_heartbeats": false, "networks": 8, "ports": 18, "subnets": 10}}, {"id": "faf7e63c-a878-4cb5-b625-f96907b00d51", "agent_type": "Metadata agent", "binary": "neutron-metadata-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:06", "started_at": "2020-10-07 12:07:06", "heartbeat_timestamp": "2020-12-14 02:18:26", "description": null, "resources_synced" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:31.880 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:31.903 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_l3-router, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:32.010 193 INFO tempest.lib.common.rest_client [req-2e058d27-7072-4f4a-bb53-e200f6f6b1b3 ] Request (SnapshotManageRbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/55d3f494-0688-4f57-8335-93df3b47a36f 0.049s 2020-12-14 02:18:32.013 193 DEBUG tempest.lib.common.rest_client [req-2e058d27-7072-4f4a-bb53-e200f6f6b1b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-2e058d27-7072-4f4a-bb53-e200f6f6b1b3', 'x-openstack-request-id': 'req-2e058d27-7072-4f4a-bb53-e200f6f6b1b3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/55d3f494-0688-4f57-8335-93df3b47a36f'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 55d3f494-0688-4f57-8335-93df3b47a36f could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:32.056 197 INFO tempest.lib.common.rest_client [req-8821812b-19c1-418b-bb9f-b9ab1876efca ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.239s 2020-12-14 02:18:32.060 197 DEBUG tempest.lib.common.rest_client [req-8821812b-19c1-418b-bb9f-b9ab1876efca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8821812b-19c1-418b-bb9f-b9ab1876efca', 'x-compute-request-id': 'req-8821812b-19c1-418b-bb9f-b9ab1876efca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:32.102 186 INFO tempest.lib.common.rest_client [req-0155396b-9726-42d1-a0cb-7a94da0eee1f ] Request (L3AgentSchedulerRbacTest:test_delete_router_from_l3_agent): 201 POST http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers 0.193s 2020-12-14 02:18:32.107 186 DEBUG tempest.lib.common.rest_client [req-0155396b-9726-42d1-a0cb-7a94da0eee1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router_id": "9ab6cec8-729c-4756-a01a-39b998aecc28"} Response - Headers: {'content-type': 'application/json', 'content-length': '4', 'x-openstack-request-id': 'req-0155396b-9726-42d1-a0cb-7a94da0eee1f', 'date': 'Mon, 14 Dec 2020 02:18:32 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers'} Body: b'null' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:32.110 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:32.127 193 INFO tempest.lib.common.rest_client [req-398871df-dea4-45b5-9e6f-d2724c2805d6 ] Request (SnapshotManageRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/b6eb19d0-e037-4f40-8f20-53abbca73c23 0.098s 2020-12-14 02:18:32.130 193 DEBUG tempest.lib.common.rest_client [req-398871df-dea4-45b5-9e6f-d2724c2805d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-398871df-dea4-45b5-9e6f-d2724c2805d6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/b6eb19d0-e037-4f40-8f20-53abbca73c23'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:32.190 186 INFO tempest.lib.common.rest_client [req-0e9a1e82-dd39-4d9b-bf75-1e8bfc86e67e ] Request (L3AgentSchedulerRbacTest:test_delete_router_from_l3_agent): 200 GET http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles 0.074s 2020-12-14 02:18:32.190 193 INFO tempest.lib.common.rest_client [req-5efb2dcf-1030-4d13-bc84-6b9cb5d2c7e5 ] Request (SnapshotManageRbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/b6eb19d0-e037-4f40-8f20-53abbca73c23 0.053s 2020-12-14 02:18:32.193 186 DEBUG tempest.lib.common.rest_client [req-0e9a1e82-dd39-4d9b-bf75-1e8bfc86e67e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e9a1e82-dd39-4d9b-bf75-1e8bfc86e67e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:32.193 193 DEBUG tempest.lib.common.rest_client [req-5efb2dcf-1030-4d13-bc84-6b9cb5d2c7e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5efb2dcf-1030-4d13-bc84-6b9cb5d2c7e5', 'content-length': '467', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5efb2dcf-1030-4d13-bc84-6b9cb5d2c7e5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/b6eb19d0-e037-4f40-8f20-53abbca73c23'} Body: b'{"snapshot": {"id": "b6eb19d0-e037-4f40-8f20-53abbca73c23", "created_at": "2020-12-14T02:18:27.000000", "updated_at": "2020-12-14T02:18:32.000000", "name": "tempest-SnapshotManageRbacTest-Snapshot-1463265148", "description": null, "volume_id": "bacc7e00-547b-4465-9b8d-e6a5fe0e1b67", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "7bee350288994567badad56fe9b73eb2", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:32.249 186 INFO tempest.lib.common.rest_client [req-8e737fb5-d24f-4783-8f6a-9d54e3f786a8 ] Request (L3AgentSchedulerRbacTest:test_delete_router_from_l3_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:18:32.252 186 DEBUG tempest.lib.common.rest_client [req-8e737fb5-d24f-4783-8f6a-9d54e3f786a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e737fb5-d24f-4783-8f6a-9d54e3f786a8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60af7656ca4d42aeb51978c8d2b97053", "name": "tempest-L3AgentSchedulerRbacTest-1988175864", "password_expires_at": null}, "audit_ids": ["zR2J5bDVQQ-KhFGXOWCycQ"], "expires_at": "2020-12-14T03:18:32.000000Z", "issued_at": "2020-12-14T02:18:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dfafbeaf950747608cd9171e1c94886e", "name": "tempest-L3AgentSchedulerRbacTest-1988175864"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:32.327 189 INFO tempest.lib.common.rest_client [req-1a4a3654-4e94-4ffd-9935-31a2c1b988f8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.302s 2020-12-14 02:18:32.331 189 DEBUG tempest.lib.common.rest_client [req-1a4a3654-4e94-4ffd-9935-31a2c1b988f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1a4a3654-4e94-4ffd-9935-31a2c1b988f8', 'x-compute-request-id': 'req-1a4a3654-4e94-4ffd-9935-31a2c1b988f8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:32.469 186 INFO tempest.lib.common.rest_client [req-27396038-369f-4481-a2fc-6f73aca439e6 ] Request (L3AgentSchedulerRbacTest:test_delete_router_from_l3_agent): 204 DELETE http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers/9ab6cec8-729c-4756-a01a-39b998aecc28 0.210s 2020-12-14 02:18:32.473 186 DEBUG tempest.lib.common.rest_client [req-27396038-369f-4481-a2fc-6f73aca439e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-27396038-369f-4481-a2fc-6f73aca439e6', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:32 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers/9ab6cec8-729c-4756-a01a-39b998aecc28'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:32.475 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:32.548 186 INFO tempest.lib.common.rest_client [req-87a7744f-388a-47f7-9d45-a5721ff407c1 ] Request (L3AgentSchedulerRbacTest:test_delete_router_from_l3_agent): 200 GET http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles 0.067s 2020-12-14 02:18:32.551 186 DEBUG tempest.lib.common.rest_client [req-87a7744f-388a-47f7-9d45-a5721ff407c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87a7744f-388a-47f7-9d45-a5721ff407c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:32.609 186 INFO tempest.lib.common.rest_client [req-2c1112e6-4165-457d-938d-fdaf8d043899 ] Request (L3AgentSchedulerRbacTest:test_delete_router_from_l3_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:18:32.613 186 DEBUG tempest.lib.common.rest_client [req-2c1112e6-4165-457d-938d-fdaf8d043899 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2c1112e6-4165-457d-938d-fdaf8d043899', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60af7656ca4d42aeb51978c8d2b97053", "name": "tempest-L3AgentSchedulerRbacTest-1988175864", "password_expires_at": null}, "audit_ids": ["PwfWFdJDS72EIH0MVJvPXA"], "expires_at": "2020-12-14T03:18:32.000000Z", "issued_at": "2020-12-14T02:18:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dfafbeaf950747608cd9171e1c94886e", "name": "tempest-L3AgentSchedulerRbacTest-1988175864"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:32.835 186 INFO tempest.lib.common.rest_client [req-801efc87-1c1e-45c9-8a43-7d5260344eaf ] Request (L3AgentSchedulerRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers/9ab6cec8-729c-4756-a01a-39b998aecc28 0.213s 2020-12-14 02:18:32.840 186 DEBUG tempest.lib.common.rest_client [req-801efc87-1c1e-45c9-8a43-7d5260344eaf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-801efc87-1c1e-45c9-8a43-7d5260344eaf', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:32 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers/9ab6cec8-729c-4756-a01a-39b998aecc28'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:32.881 186 INFO tempest.lib.common.rest_client [req-6e4d29e0-ea4c-4120-bfcd-c4c17ce3b705 ] Request (L3AgentSchedulerRbacTest:setUp): 200 GET http://172.30.13.94:9696/v2.0/agents 0.027s 2020-12-14 02:18:32.885 186 DEBUG tempest.lib.common.rest_client [req-6e4d29e0-ea4c-4120-bfcd-c4c17ce3b705 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '4329', 'x-openstack-request-id': 'req-6e4d29e0-ea4c-4120-bfcd-c4c17ce3b705', 'date': 'Mon, 14 Dec 2020 02:18:32 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents'} Body: b'{"agents": [{"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-12-14 02:18:08", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 11, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 1, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 14, "log_agent_heartbeats": false, "routers": 11}}, {"id": "538ccf2a-fb61-47ed-a10a-785f64cdbb63", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual8", "admin_state_up": true, "created_at": "2020-10-07 13:02:58", "started_at": "2020-10-07 13:03:28", "heartbeat_timestamp": "2020-12-14 02:18:32", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {}, "datapath_type": "system", "devices": 0, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["vxlan"], "tunneling_ip": "172.30.13.93", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "9d48116b-94de-4990-baef-e3b6765751fc", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:05", "started_at": "2020-10-07 12:07:35", "heartbeat_timestamp": "2020-12-14 02:18:17", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {"public": "br-ex"}, "datapath_type": "system", "devices": 26, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {"br-ex": "lf-virtual9"}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["gre", "vxlan"], "tunneling_ip": "172.30.13.94", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "bc496462-aac8-4795-a8f9-6f5600fa0870", "agent_type": "DHCP agent", "binary": "neutron-dhcp-agent", "topic": "dhcp_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:02", "started_at": "2020-10-07 12:07:02", "heartbeat_timestamp": "2020-12-14 02:18:26", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"dhcp_driver": "neutron.agent.linux.dhcp.Dnsmasq", "dhcp_lease_duration": 86400, "log_agent_heartbeats": false, "networks": 8, "ports": 18, "subnets": 10}}, {"id": "faf7e63c-a878-4cb5-b625-f96907b00d51", "agent_type": "Metadata agent", "binary": "neutron-metadata-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:06", "started_at": "2020-10-07 12:07:06", "heartbeat_timestamp": "2020-12-14 02:18:26", "description": null, "resources_synced" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:32.890 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:32.912 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_l3-routers, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:32.914 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:32.986 186 INFO tempest.lib.common.rest_client [req-b4220c66-5f83-4c97-a1c0-8f193258fb34 ] Request (L3AgentSchedulerRbacTest:test_list_routers_on_l3_agent): 200 GET http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles 0.067s 2020-12-14 02:18:32.990 186 DEBUG tempest.lib.common.rest_client [req-b4220c66-5f83-4c97-a1c0-8f193258fb34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4220c66-5f83-4c97-a1c0-8f193258fb34', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:33.043 186 INFO tempest.lib.common.rest_client [req-53413351-0b9c-4a2f-860d-647131c10302 ] Request (L3AgentSchedulerRbacTest:test_list_routers_on_l3_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:18:33.046 186 DEBUG tempest.lib.common.rest_client [req-53413351-0b9c-4a2f-860d-647131c10302 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53413351-0b9c-4a2f-860d-647131c10302', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60af7656ca4d42aeb51978c8d2b97053", "name": "tempest-L3AgentSchedulerRbacTest-1988175864", "password_expires_at": null}, "audit_ids": ["61VhAwxpQTiQX3aIrr8eNg"], "expires_at": "2020-12-14T03:18:33.000000Z", "issued_at": "2020-12-14T02:18:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dfafbeaf950747608cd9171e1c94886e", "name": "tempest-L3AgentSchedulerRbacTest-1988175864"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:33.281 193 INFO tempest.lib.common.rest_client [req-00748505-644e-4c73-b198-9de879a19074 ] Request (SnapshotManageRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/b6eb19d0-e037-4f40-8f20-53abbca73c23 0.048s 2020-12-14 02:18:33.284 193 DEBUG tempest.lib.common.rest_client [req-00748505-644e-4c73-b198-9de879a19074 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-00748505-644e-4c73-b198-9de879a19074', 'x-openstack-request-id': 'req-00748505-644e-4c73-b198-9de879a19074', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/snapshots/b6eb19d0-e037-4f40-8f20-53abbca73c23'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot b6eb19d0-e037-4f40-8f20-53abbca73c23 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:33.338 186 INFO tempest.lib.common.rest_client [req-8a5cb108-2efc-4799-ab48-4a561c85596c ] Request (L3AgentSchedulerRbacTest:test_list_routers_on_l3_agent): 200 GET http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers 0.284s 2020-12-14 02:18:33.341 186 DEBUG tempest.lib.common.rest_client [req-8a5cb108-2efc-4799-ab48-4a561c85596c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '8648', 'x-openstack-request-id': 'req-8a5cb108-2efc-4799-ab48-4a561c85596c', 'date': 'Mon, 14 Dec 2020 02:18:33 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e/l3-routers'} Body: b'{"routers": [{"id": "08d801bd-c8a6-4a0e-af57-e87aa77134be", "name": "patrole_reader-router_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "tenant_id": "3cc32870ea9c4124a18f8824ceee8b29", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.230"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::68"}], "enable_snat": true}, "gw_port_id": "c33c8cc1-bc38-4da5-b799-20864bcf784c", "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "ha_vr_id": 0, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:05:17Z", "updated_at": "2020-12-14T02:05:20Z", "revision_number": 4, "project_id": "3cc32870ea9c4124a18f8824ceee8b29"}, {"id": "3c679a5a-15a2-4715-9812-f5f53c6676ad", "name": "tempest-MiscPolicyActionsRbacTest-1381669334-router", "tenant_id": "13e063fab0044afeafaff2049f9b1404", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.197"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::157"}], "enable_snat": true}, "gw_port_id": "03c9bca2-2ec1-41d9-b661-435a26711a83", "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "ha_vr_id": 0, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:16:07Z", "updated_at": "2020-12-14T02:16:09Z", "revision_number": 4, "project_id": "13e063fab0044afeafaff2049f9b1404"}, {"id": "69cdd791-b50f-45f1-893f-c06a43c312f6", "name": "tempest-TestGettingAddress-router-117866178", "tenant_id": "8902aa05bbca4b55ac6f711d1a59a3ef", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.117"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::32e"}], "enable_snat": true}, "gw_port_id": "1a6c1f57-6f0f-4c39-bdf1-02c96a51fed6", "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "ha_vr_id": 0, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:17:33Z", "updated_at": "2020-12-14T02:17:43Z", "revision_number": 5, "project_id": "8902aa05bbca4b55ac6f711d1a59a3ef"}, {"id": "911b7616-b3be-41de-b52b-cd6958a6c7bb", "name": "rally_full-router_8a0926b1-7dc8-420c-9bd4-67b88c62abef", "tenant_id": "8344f95ee1a0496bbe14a846d14dc85d", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.89"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::207"}], "enable_snat": true}, "gw_port_id": "51708fa7-c6c2-4b8a-82b5-5ac8f4d959fd", "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "ha_vr_id": 0, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-09T17:31:36Z", "updated_at": "2020-12-09T17:31:39Z", "revision_number": 4, "project_id": "8344f95ee1a0496bbe14a846d14dc85d"}, {"id": "91571816-e8eb-4403-9b91-8f8d1fcef93b", "name": "tempest-MiscPolicyActionsRbacTest-2031429312-router", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.72"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::11a"}], "enable_snat": true}, "gw_port_id": "6b96ef76-e850-4930-b1f2-0aabcf3b3464", "descrip _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:33.345 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:33.378 193 INFO tempest.lib.common.rest_client [req-45c98a04-d415-46b0-b763-12aadf2dbca2 ] Request (SnapshotManageRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67 0.087s 2020-12-14 02:18:33.382 193 DEBUG tempest.lib.common.rest_client [req-45c98a04-d415-46b0-b763-12aadf2dbca2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-45c98a04-d415-46b0-b763-12aadf2dbca2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:33.424 186 INFO tempest.lib.common.rest_client [req-71c8117f-1b64-4ce0-a954-534113c5eb2a ] Request (L3AgentSchedulerRbacTest:test_list_routers_on_l3_agent): 200 GET http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles 0.073s 2020-12-14 02:18:33.427 186 DEBUG tempest.lib.common.rest_client [req-71c8117f-1b64-4ce0-a954-534113c5eb2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-71c8117f-1b64-4ce0-a954-534113c5eb2a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e/users/60af7656ca4d42aeb51978c8d2b97053/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:33.441 197 INFO tempest.lib.common.rest_client [req-1ce4b045-1521-462c-b316-e5df6bb0168e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.248s 2020-12-14 02:18:33.446 197 DEBUG tempest.lib.common.rest_client [req-1ce4b045-1521-462c-b316-e5df6bb0168e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1ce4b045-1521-462c-b316-e5df6bb0168e', 'x-compute-request-id': 'req-1ce4b045-1521-462c-b316-e5df6bb0168e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:33.470 193 INFO tempest.lib.common.rest_client [req-913158ab-0083-4bb4-80db-97387ee97769 ] Request (SnapshotManageRbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67 0.081s 2020-12-14 02:18:33.473 193 DEBUG tempest.lib.common.rest_client [req-913158ab-0083-4bb4-80db-97387ee97769 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-913158ab-0083-4bb4-80db-97387ee97769', 'content-length': '1065', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-913158ab-0083-4bb4-80db-97387ee97769', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67'} Body: b'{"volume": {"id": "bacc7e00-547b-4465-9b8d-e6a5fe0e1b67", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:26.000000", "updated_at": "2020-12-14T02:18:33.000000", "name": "tempest-SnapshotManageRbacTest-Volume-1899354082", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67"}], "user_id": "06f8246ec8a749aba9386ba6b973ec37", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "7bee350288994567badad56fe9b73eb2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:33.483 186 INFO tempest.lib.common.rest_client [req-796cca8c-43db-4015-aca2-37525412e189 ] Request (L3AgentSchedulerRbacTest:test_list_routers_on_l3_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:18:33.487 186 DEBUG tempest.lib.common.rest_client [req-796cca8c-43db-4015-aca2-37525412e189 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-796cca8c-43db-4015-aca2-37525412e189', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "60af7656ca4d42aeb51978c8d2b97053", "name": "tempest-L3AgentSchedulerRbacTest-1988175864", "password_expires_at": null}, "audit_ids": ["huI5M78GQkeJ83u6CMHbJw"], "expires_at": "2020-12-14T03:18:33.000000Z", "issued_at": "2020-12-14T02:18:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dfafbeaf950747608cd9171e1c94886e", "name": "tempest-L3AgentSchedulerRbacTest-1988175864"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfafbeaf950747608cd9171e1c94886e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:33.607 186 INFO tempest.lib.common.rest_client [req-22b91993-d3d0-4f82-a130-9081a8e32a6c ] Request (L3AgentSchedulerRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/ports?device_id=9ab6cec8-729c-4756-a01a-39b998aecc28 0.102s 2020-12-14 02:18:33.609 186 DEBUG tempest.lib.common.rest_client [req-22b91993-d3d0-4f82-a130-9081a8e32a6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '12', 'x-openstack-request-id': 'req-22b91993-d3d0-4f82-a130-9081a8e32a6c', 'date': 'Mon, 14 Dec 2020 02:18:33 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?device_id=9ab6cec8-729c-4756-a01a-39b998aecc28'} Body: b'{"ports":[]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:33.654 189 INFO tempest.lib.common.rest_client [req-db12110d-931a-4a34-b588-5e3341dcc47e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.216s 2020-12-14 02:18:33.657 189 DEBUG tempest.lib.common.rest_client [req-db12110d-931a-4a34-b588-5e3341dcc47e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-db12110d-931a-4a34-b588-5e3341dcc47e', 'x-compute-request-id': 'req-db12110d-931a-4a34-b588-5e3341dcc47e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:34.032 186 INFO tempest.lib.common.rest_client [req-f4e311d1-521e-4edc-a5fa-f6d19fd62075 ] Request (L3AgentSchedulerRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/9ab6cec8-729c-4756-a01a-39b998aecc28 0.416s 2020-12-14 02:18:34.034 186 DEBUG tempest.lib.common.rest_client [req-f4e311d1-521e-4edc-a5fa-f6d19fd62075 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f4e311d1-521e-4edc-a5fa-f6d19fd62075', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:34 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/9ab6cec8-729c-4756-a01a-39b998aecc28'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:34.197 186 INFO tempest.lib.common.rest_client [req-56cffd97-0cf1-40fc-b9f5-d6444139f16a ] Request (L3AgentSchedulerRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/60af7656ca4d42aeb51978c8d2b97053 0.155s 2020-12-14 02:18:34.200 186 DEBUG tempest.lib.common.rest_client [req-56cffd97-0cf1-40fc-b9f5-d6444139f16a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56cffd97-0cf1-40fc-b9f5-d6444139f16a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/60af7656ca4d42aeb51978c8d2b97053'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:34.315 186 INFO tempest.lib.common.rest_client [req-378dc2d8-5135-4b56-bd4b-cb5a26d456c8 ] Request (L3AgentSchedulerRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:18:34.317 186 DEBUG tempest.lib.common.rest_client [req-378dc2d8-5135-4b56-bd4b-cb5a26d456c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-378dc2d8-5135-4b56-bd4b-cb5a26d456c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["W2ZcUzplSYCH-Jzjtnyjjw"], "expires_at": "2020-12-14T03:18:34.000000Z", "issued_at": "2020-12-14T02:18:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:34.625 186 INFO tempest.lib.common.rest_client [req-a239946b-e2ae-4208-8b02-7a0c61d6f5f8 ] Request (L3AgentSchedulerRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=dfafbeaf950747608cd9171e1c94886e&name=default 0.301s 2020-12-14 02:18:34.629 186 DEBUG tempest.lib.common.rest_client [req-a239946b-e2ae-4208-8b02-7a0c61d6f5f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-a239946b-e2ae-4208-8b02-7a0c61d6f5f8', 'date': 'Mon, 14 Dec 2020 02:18:34 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=dfafbeaf950747608cd9171e1c94886e&name=default'} Body: b'{"security_groups": [{"id": "a8b738de-8a6e-46cd-8471-2e3b1d2c79fd", "name": "default", "stateful": true, "tenant_id": "dfafbeaf950747608cd9171e1c94886e", "description": "Default security group", "security_group_rules": [{"id": "201b918b-926b-44c9-b771-7f41cf14d5eb", "tenant_id": "dfafbeaf950747608cd9171e1c94886e", "security_group_id": "a8b738de-8a6e-46cd-8471-2e3b1d2c79fd", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:34Z", "updated_at": "2020-12-14T02:18:34Z", "revision_number": 0, "project_id": "dfafbeaf950747608cd9171e1c94886e"}, {"id": "3a407fcd-d652-4a46-be26-cd7826fe0800", "tenant_id": "dfafbeaf950747608cd9171e1c94886e", "security_group_id": "a8b738de-8a6e-46cd-8471-2e3b1d2c79fd", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a8b738de-8a6e-46cd-8471-2e3b1d2c79fd", "description": null, "tags": [], "created_at": "2020-12-14T02:18:34Z", "updated_at": "2020-12-14T02:18:34Z", "revision_number": 0, "project_id": "dfafbeaf950747608cd9171e1c94886e"}, {"id": "71fea63e-16c5-4bd4-8541-11e66920734b", "tenant_id": "dfafbeaf950747608cd9171e1c94886e", "security_group_id": "a8b738de-8a6e-46cd-8471-2e3b1d2c79fd", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:34Z", "updated_at": "2020-12-14T02:18:34Z", "revision_number": 0, "project_id": "dfafbeaf950747608cd9171e1c94886e"}, {"id": "936ab5c8-f48a-4f06-b86a-d6de881d38ce", "tenant_id": "dfafbeaf950747608cd9171e1c94886e", "security_group_id": "a8b738de-8a6e-46cd-8471-2e3b1d2c79fd", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a8b738de-8a6e-46cd-8471-2e3b1d2c79fd", "description": null, "tags": [], "created_at": "2020-12-14T02:18:34Z", "updated_at": "2020-12-14T02:18:34Z", "revision_number": 0, "project_id": "dfafbeaf950747608cd9171e1c94886e"}], "tags": [], "created_at": "2020-12-14T02:18:34Z", "updated_at": "2020-12-14T02:18:34Z", "revision_number": 1, "project_id": "dfafbeaf950747608cd9171e1c94886e"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:34.673 193 INFO tempest.lib.common.rest_client [req-5ae4bf55-7823-4127-9e31-94cd673fc57f ] Request (SnapshotManageRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67 0.096s 2020-12-14 02:18:34.676 193 DEBUG tempest.lib.common.rest_client [req-5ae4bf55-7823-4127-9e31-94cd673fc57f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-5ae4bf55-7823-4127-9e31-94cd673fc57f', 'x-openstack-request-id': 'req-5ae4bf55-7823-4127-9e31-94cd673fc57f', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/7bee350288994567badad56fe9b73eb2/volumes/bacc7e00-547b-4465-9b8d-e6a5fe0e1b67'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume bacc7e00-547b-4465-9b8d-e6a5fe0e1b67 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:34.788 197 INFO tempest.lib.common.rest_client [req-3a01c0ab-871b-4e7c-ac3d-1e1f47cf667d ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.233s 2020-12-14 02:18:34.791 197 DEBUG tempest.lib.common.rest_client [req-3a01c0ab-871b-4e7c-ac3d-1e1f47cf667d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3a01c0ab-871b-4e7c-ac3d-1e1f47cf667d', 'x-compute-request-id': 'req-3a01c0ab-871b-4e7c-ac3d-1e1f47cf667d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:34.843 186 INFO tempest.lib.common.rest_client [req-dc4dc354-0399-4000-afde-59acd9466826 ] Request (L3AgentSchedulerRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/a8b738de-8a6e-46cd-8471-2e3b1d2c79fd 0.207s 2020-12-14 02:18:34.846 186 DEBUG tempest.lib.common.rest_client [req-dc4dc354-0399-4000-afde-59acd9466826 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-dc4dc354-0399-4000-afde-59acd9466826', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:34 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/a8b738de-8a6e-46cd-8471-2e3b1d2c79fd'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:34.987 189 INFO tempest.lib.common.rest_client [req-a85adf4b-a650-47a8-a0e8-3635ad57ce31 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.226s 2020-12-14 02:18:34.990 189 DEBUG tempest.lib.common.rest_client [req-a85adf4b-a650-47a8-a0e8-3635ad57ce31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a85adf4b-a650-47a8-a0e8-3635ad57ce31', 'x-compute-request-id': 'req-a85adf4b-a650-47a8-a0e8-3635ad57ce31', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.038 186 INFO tempest.lib.common.rest_client [req-f3b52a88-b390-4195-8892-748aeb340517 ] Request (L3AgentSchedulerRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e 0.184s 2020-12-14 02:18:35.041 186 DEBUG tempest.lib.common.rest_client [req-f3b52a88-b390-4195-8892-748aeb340517 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3b52a88-b390-4195-8892-748aeb340517', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfafbeaf950747608cd9171e1c94886e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.114 193 INFO tempest.lib.common.rest_client [req-d581978f-0a18-4fc8-b582-ab1ecd621bc7 ] Request (SnapshotManageRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/06f8246ec8a749aba9386ba6b973ec37 0.431s 2020-12-14 02:18:35.116 193 DEBUG tempest.lib.common.rest_client [req-d581978f-0a18-4fc8-b582-ab1ecd621bc7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d581978f-0a18-4fc8-b582-ab1ecd621bc7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/06f8246ec8a749aba9386ba6b973ec37'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.161 186 INFO tempest.lib.common.rest_client [req-35ae8642-d9ac-4049-9f82-8da8ddab2d9a ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:18:35.163 186 DEBUG tempest.lib.common.rest_client [req-35ae8642-d9ac-4049-9f82-8da8ddab2d9a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-35ae8642-d9ac-4049-9f82-8da8ddab2d9a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["7itGDffvT_qAMApZFad5cA"], "expires_at": "2020-12-14T03:18:35.000000Z", "issued_at": "2020-12-14T02:18:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.225 193 INFO tempest.lib.common.rest_client [req-6a5fcbbb-2dc6-4713-93e5-6e1a383ee002 ] Request (SnapshotManageRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:18:35.229 193 DEBUG tempest.lib.common.rest_client [req-6a5fcbbb-2dc6-4713-93e5-6e1a383ee002 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a5fcbbb-2dc6-4713-93e5-6e1a383ee002', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["4MMf8MCgR-2jPH2UkjyHKA"], "expires_at": "2020-12-14T03:18:35.000000Z", "issued_at": "2020-12-14T02:18:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.262 186 INFO tempest.lib.common.rest_client [req-dc67abf6-884c-49d8-903c-3054913cf941 ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:18:35.265 186 DEBUG tempest.lib.common.rest_client [req-dc67abf6-884c-49d8-903c-3054913cf941 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc67abf6-884c-49d8-903c-3054913cf941', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["pMo8yFmEQRmhCoj6wHSLRg"], "expires_at": "2020-12-14T03:18:35.000000Z", "issued_at": "2020-12-14T02:18:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.338 186 INFO tempest.lib.common.rest_client [req-f85872b4-479b-492d-b15a-bb0660cff942 ] Request (FlavorsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.066s 2020-12-14 02:18:35.340 186 DEBUG tempest.lib.common.rest_client [req-f85872b4-479b-492d-b15a-bb0660cff942 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f85872b4-479b-492d-b15a-bb0660cff942', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.418 186 INFO tempest.lib.common.rest_client [req-eff62a33-3cd8-4cbc-9a6c-c25e17782321 ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.071s 2020-12-14 02:18:35.421 186 DEBUG tempest.lib.common.rest_client [req-eff62a33-3cd8-4cbc-9a6c-c25e17782321 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FlavorsExtRbacTest-1438693375-desc", "domain_id": "default", "name": "tempest-FlavorsExtRbacTest-1438693375"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '374', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eff62a33-3cd8-4cbc-9a6c-c25e17782321', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375", "domain_id": "default", "description": "tempest-FlavorsExtRbacTest-1438693375-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.521 193 INFO tempest.lib.common.rest_client [req-cba62f05-b88f-4a66-a057-e78aa94eca7b ] Request (SnapshotManageRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=7bee350288994567badad56fe9b73eb2&name=default 0.283s 2020-12-14 02:18:35.524 193 DEBUG tempest.lib.common.rest_client [req-cba62f05-b88f-4a66-a057-e78aa94eca7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-cba62f05-b88f-4a66-a057-e78aa94eca7b', 'date': 'Mon, 14 Dec 2020 02:18:35 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=7bee350288994567badad56fe9b73eb2&name=default'} Body: b'{"security_groups": [{"id": "f552b49a-557c-4667-a2ca-322dd4637e5b", "name": "default", "stateful": true, "tenant_id": "7bee350288994567badad56fe9b73eb2", "description": "Default security group", "security_group_rules": [{"id": "1358506a-1329-4159-95b8-952771cfae02", "tenant_id": "7bee350288994567badad56fe9b73eb2", "security_group_id": "f552b49a-557c-4667-a2ca-322dd4637e5b", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f552b49a-557c-4667-a2ca-322dd4637e5b", "description": null, "tags": [], "created_at": "2020-12-14T02:18:35Z", "updated_at": "2020-12-14T02:18:35Z", "revision_number": 0, "project_id": "7bee350288994567badad56fe9b73eb2"}, {"id": "26feec37-2f7e-4641-a517-c680ce71aa91", "tenant_id": "7bee350288994567badad56fe9b73eb2", "security_group_id": "f552b49a-557c-4667-a2ca-322dd4637e5b", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:35Z", "updated_at": "2020-12-14T02:18:35Z", "revision_number": 0, "project_id": "7bee350288994567badad56fe9b73eb2"}, {"id": "9bad7760-bc13-4931-8e07-e051bbbdcec9", "tenant_id": "7bee350288994567badad56fe9b73eb2", "security_group_id": "f552b49a-557c-4667-a2ca-322dd4637e5b", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f552b49a-557c-4667-a2ca-322dd4637e5b", "description": null, "tags": [], "created_at": "2020-12-14T02:18:35Z", "updated_at": "2020-12-14T02:18:35Z", "revision_number": 0, "project_id": "7bee350288994567badad56fe9b73eb2"}, {"id": "ec589c06-60b1-4f5c-aa90-2bc625bd4bbb", "tenant_id": "7bee350288994567badad56fe9b73eb2", "security_group_id": "f552b49a-557c-4667-a2ca-322dd4637e5b", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:35Z", "updated_at": "2020-12-14T02:18:35Z", "revision_number": 0, "project_id": "7bee350288994567badad56fe9b73eb2"}], "tags": [], "created_at": "2020-12-14T02:18:35Z", "updated_at": "2020-12-14T02:18:35Z", "revision_number": 1, "project_id": "7bee350288994567badad56fe9b73eb2"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.553 186 INFO tempest.lib.common.rest_client [req-aa5b7ab5-e171-46a4-a90a-e015c7ebcb36 ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.124s 2020-12-14 02:18:35.556 186 DEBUG tempest.lib.common.rest_client [req-aa5b7ab5-e171-46a4-a90a-e015c7ebcb36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FlavorsExtRbacTest-1438693375", "password": "K4+j0^KKPI4@zCS", "project_id": "1093d310ea664c308dece13226357f80", "email": "tempest-FlavorsExtRbacTest-640178080@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '391', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa5b7ab5-e171-46a4-a90a-e015c7ebcb36', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "1093d310ea664c308dece13226357f80", "email": "tempest-FlavorsExtRbacTest-640178080@example.com", "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/1a2aac97039b4071af0e391ac603ab6e"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.627 186 INFO tempest.lib.common.rest_client [req-eeeebec0-6488-4469-ae57-346636896b0d ] Request (FlavorsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:18:35.630 186 DEBUG tempest.lib.common.rest_client [req-eeeebec0-6488-4469-ae57-346636896b0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eeeebec0-6488-4469-ae57-346636896b0d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.697 186 INFO tempest.lib.common.rest_client [req-3a70e70f-7644-4b45-8a82-50f73b6d7ab6 ] Request (FlavorsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:18:35.699 186 DEBUG tempest.lib.common.rest_client [req-3a70e70f-7644-4b45-8a82-50f73b6d7ab6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a70e70f-7644-4b45-8a82-50f73b6d7ab6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.709 193 INFO tempest.lib.common.rest_client [req-85ad235a-c972-4772-9595-2424b1ee038f ] Request (SnapshotManageRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/f552b49a-557c-4667-a2ca-322dd4637e5b 0.178s 2020-12-14 02:18:35.712 193 DEBUG tempest.lib.common.rest_client [req-85ad235a-c972-4772-9595-2424b1ee038f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-85ad235a-c972-4772-9595-2424b1ee038f', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:35 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/f552b49a-557c-4667-a2ca-322dd4637e5b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.792 186 INFO tempest.lib.common.rest_client [req-f3cb4745-01b5-468b-9564-5117181029ae ] Request (FlavorsExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles/72a4576c553448cd941b052c1ca0cf2d 0.085s 2020-12-14 02:18:35.795 186 DEBUG tempest.lib.common.rest_client [req-f3cb4745-01b5-468b-9564-5117181029ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3cb4745-01b5-468b-9564-5117181029ae', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.798 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorsExtRbacTest-1438693375', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1093d310ea664c308dece13226357f80', 'project_name': 'tempest-FlavorsExtRbacTest-1438693375', 'tenant_id': '1093d310ea664c308dece13226357f80', 'tenant_name': 'tempest-FlavorsExtRbacTest-1438693375', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '1a2aac97039b4071af0e391ac603ab6e'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:35.800 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorsExtRbacTest-1438693375', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1093d310ea664c308dece13226357f80', 'project_name': 'tempest-FlavorsExtRbacTest-1438693375', 'tenant_id': '1093d310ea664c308dece13226357f80', 'tenant_name': 'tempest-FlavorsExtRbacTest-1438693375', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '1a2aac97039b4071af0e391ac603ab6e'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:35.856 193 INFO tempest.lib.common.rest_client [req-7559370f-ac4a-4ea3-b6e9-1020d10a5e1d ] Request (SnapshotManageRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2 0.138s 2020-12-14 02:18:35.859 193 DEBUG tempest.lib.common.rest_client [req-7559370f-ac4a-4ea3-b6e9-1020d10a5e1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7559370f-ac4a-4ea3-b6e9-1020d10a5e1d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7bee350288994567badad56fe9b73eb2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.970 193 INFO tempest.lib.common.rest_client [req-6969ac41-7390-4ba3-a324-2db6076a16dc ] Request (SnapshotMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:18:35.973 193 DEBUG tempest.lib.common.rest_client [req-6969ac41-7390-4ba3-a324-2db6076a16dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6969ac41-7390-4ba3-a324-2db6076a16dc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ZooPORmNTeyAXFKpX7ojkg"], "expires_at": "2020-12-14T03:18:35.000000Z", "issued_at": "2020-12-14T02:18:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.986 186 INFO tempest.lib.common.rest_client [req-5dac035e-d269-42f4-bd4c-366c25f0b153 ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.124s 2020-12-14 02:18:35.988 186 DEBUG tempest.lib.common.rest_client [req-5dac035e-d269-42f4-bd4c-366c25f0b153 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6567', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5dac035e-d269-42f4-bd4c-366c25f0b153', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["O-QZ4yeiQEup3D2mHHqEjQ"], "expires_at": "2020-12-14T03:18:35.000000Z", "issued_at": "2020-12-14T02:18:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30. _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:35.992 186 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-12-14 02:18:36.075 193 INFO tempest.lib.common.rest_client [req-cab8bac0-4015-44f3-b9ba-e9ab2a709794 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:18:36.077 186 INFO tempest.lib.common.rest_client [req-89d4a2a7-c2c0-45bf-84df-a6855f66ac34 ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:18:36.078 193 DEBUG tempest.lib.common.rest_client [req-cab8bac0-4015-44f3-b9ba-e9ab2a709794 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cab8bac0-4015-44f3-b9ba-e9ab2a709794', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["dDBn-xwNTuSXkksiMFb8Lw"], "expires_at": "2020-12-14T03:18:36.000000Z", "issued_at": "2020-12-14T02:18:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:36.080 186 DEBUG tempest.lib.common.rest_client [req-89d4a2a7-c2c0-45bf-84df-a6855f66ac34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89d4a2a7-c2c0-45bf-84df-a6855f66ac34', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["6nhW_3hBSRStFBfWuoDP7A"], "expires_at": "2020-12-14T03:18:36.000000Z", "issued_at": "2020-12-14T02:18:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:36.140 197 INFO tempest.lib.common.rest_client [req-eb3deb62-8154-4b7f-b6e1-4d9b14d03399 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.241s 2020-12-14 02:18:36.144 197 DEBUG tempest.lib.common.rest_client [req-eb3deb62-8154-4b7f-b6e1-4d9b14d03399 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eb3deb62-8154-4b7f-b6e1-4d9b14d03399', 'x-compute-request-id': 'req-eb3deb62-8154-4b7f-b6e1-4d9b14d03399', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:36.210 193 INFO tempest.lib.common.rest_client [req-29b12300-f2b9-4013-a4b0-a4b85ac2945c ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.124s 2020-12-14 02:18:36.213 193 DEBUG tempest.lib.common.rest_client [req-29b12300-f2b9-4013-a4b0-a4b85ac2945c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29b12300-f2b9-4013-a4b0-a4b85ac2945c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:36.232 186 INFO tempest.lib.common.rest_client [req-bcd5b3b8-ccb4-4e55-92f6-f9dc740663c4 ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.055s 2020-12-14 02:18:36.236 186 DEBUG tempest.lib.common.rest_client [req-bcd5b3b8-ccb4-4e55-92f6-f9dc740663c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bcd5b3b8-ccb4-4e55-92f6-f9dc740663c4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["t0NaxvLkSTWSVC2KbXNOUg"], "expires_at": "2020-12-14T03:18:36.000000Z", "issued_at": "2020-12-14T02:18:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:36.295 193 INFO tempest.lib.common.rest_client [req-e46fa1a8-8fea-4828-9f62-5979f92738bf ] Request (SnapshotMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.073s 2020-12-14 02:18:36.298 193 DEBUG tempest.lib.common.rest_client [req-e46fa1a8-8fea-4828-9f62-5979f92738bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SnapshotMetadataV3RbacTest-599363395-desc", "domain_id": "default", "name": "tempest-SnapshotMetadataV3RbacTest-599363395"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e46fa1a8-8fea-4828-9f62-5979f92738bf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "c6686db654814a049859a68b2cfea6f5", "name": "tempest-SnapshotMetadataV3RbacTest-599363395", "domain_id": "default", "description": "tempest-SnapshotMetadataV3RbacTest-599363395-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:36.305 189 INFO tempest.lib.common.rest_client [req-534a28d2-d5d9-4071-a804-2f886772d649 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.211s 2020-12-14 02:18:36.309 189 DEBUG tempest.lib.common.rest_client [req-534a28d2-d5d9-4071-a804-2f886772d649 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-534a28d2-d5d9-4071-a804-2f886772d649', 'x-compute-request-id': 'req-534a28d2-d5d9-4071-a804-2f886772d649', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:36.312 186 INFO tempest.lib.common.rest_client [req-1c22e907-0109-42e0-ac21-15f9d9a3d0cf ] Request (FlavorsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.067s 2020-12-14 02:18:36.316 186 DEBUG tempest.lib.common.rest_client [req-1c22e907-0109-42e0-ac21-15f9d9a3d0cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c22e907-0109-42e0-ac21-15f9d9a3d0cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:36.417 193 INFO tempest.lib.common.rest_client [req-3e8a6644-35c0-437f-b77f-bbf7f56596f7 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.111s 2020-12-14 02:18:36.420 193 DEBUG tempest.lib.common.rest_client [req-3e8a6644-35c0-437f-b77f-bbf7f56596f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SnapshotMetadataV3RbacTest-599363395", "password": "M8@zn3P@Y8teUve", "project_id": "c6686db654814a049859a68b2cfea6f5", "email": "tempest-SnapshotMetadataV3RbacTest-1489301160@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '407', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3e8a6644-35c0-437f-b77f-bbf7f56596f7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "c6686db654814a049859a68b2cfea6f5", "email": "tempest-SnapshotMetadataV3RbacTest-1489301160@example.com", "id": "539742cb43b2420195668c52b7d7dce9", "name": "tempest-SnapshotMetadataV3RbacTest-599363395", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/539742cb43b2420195668c52b7d7dce9"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:36.435 186 INFO tempest.lib.common.rest_client [req-acf04527-2685-4569-aca2-355bdd9dc42e ] Request (FlavorsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.112s 2020-12-14 02:18:36.439 186 DEBUG tempest.lib.common.rest_client [req-acf04527-2685-4569-aca2-355bdd9dc42e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-acf04527-2685-4569-aca2-355bdd9dc42e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:36.442 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:18:36.445 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:36.486 193 INFO tempest.lib.common.rest_client [req-13c2a7d6-2bee-4890-b1b5-b4e503241f84 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-12-14 02:18:36.489 193 DEBUG tempest.lib.common.rest_client [req-13c2a7d6-2bee-4890-b1b5-b4e503241f84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13c2a7d6-2bee-4890-b1b5-b4e503241f84', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:36.516 186 INFO tempest.lib.common.rest_client [req-27c80a83-4796-49eb-abd5-aeb3be4c04cc ] Request (FlavorsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles 0.066s 2020-12-14 02:18:36.519 186 DEBUG tempest.lib.common.rest_client [req-27c80a83-4796-49eb-abd5-aeb3be4c04cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27c80a83-4796-49eb-abd5-aeb3be4c04cc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:36.558 193 INFO tempest.lib.common.rest_client [req-e8cdef36-c269-44a0-b75f-29f7881f747a ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:18:36.561 193 DEBUG tempest.lib.common.rest_client [req-e8cdef36-c269-44a0-b75f-29f7881f747a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e8cdef36-c269-44a0-b75f-29f7881f747a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:36.596 186 INFO tempest.lib.common.rest_client [req-f1e312b8-34fb-4a0a-9845-a999a6480538 ] Request (FlavorsExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles/72a4576c553448cd941b052c1ca0cf2d 0.070s 2020-12-14 02:18:36.599 186 DEBUG tempest.lib.common.rest_client [req-f1e312b8-34fb-4a0a-9845-a999a6480538 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1e312b8-34fb-4a0a-9845-a999a6480538', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:36.705 193 INFO tempest.lib.common.rest_client [req-401628d9-e6f3-4a9b-b739-0fc1bc1cf264 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles/72a4576c553448cd941b052c1ca0cf2d 0.135s 2020-12-14 02:18:36.708 193 DEBUG tempest.lib.common.rest_client [req-401628d9-e6f3-4a9b-b739-0fc1bc1cf264 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-401628d9-e6f3-4a9b-b739-0fc1bc1cf264', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:36.711 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SnapshotMetadataV3RbacTest-599363395', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c6686db654814a049859a68b2cfea6f5', 'project_name': 'tempest-SnapshotMetadataV3RbacTest-599363395', 'tenant_id': 'c6686db654814a049859a68b2cfea6f5', 'tenant_name': 'tempest-SnapshotMetadataV3RbacTest-599363395', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '539742cb43b2420195668c52b7d7dce9'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:36.713 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SnapshotMetadataV3RbacTest-599363395', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c6686db654814a049859a68b2cfea6f5', 'project_name': 'tempest-SnapshotMetadataV3RbacTest-599363395', 'tenant_id': 'c6686db654814a049859a68b2cfea6f5', 'tenant_name': 'tempest-SnapshotMetadataV3RbacTest-599363395', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '539742cb43b2420195668c52b7d7dce9'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:36.727 186 INFO tempest.lib.common.rest_client [req-8eaffa8f-ed32-470b-b1ce-b53a44358ccd ] Request (FlavorsExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles/a629c95d64b3416fb80ae90af4f69c05 0.121s 2020-12-14 02:18:36.729 186 DEBUG tempest.lib.common.rest_client [req-8eaffa8f-ed32-470b-b1ce-b53a44358ccd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8eaffa8f-ed32-470b-b1ce-b53a44358ccd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:36.894 193 INFO tempest.lib.common.rest_client [req-ad3773e3-0c28-4bf5-ad05-efc995e6f45c ] Request (SnapshotMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.119s 2020-12-14 02:18:36.898 193 DEBUG tempest.lib.common.rest_client [req-ad3773e3-0c28-4bf5-ad05-efc995e6f45c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad3773e3-0c28-4bf5-ad05-efc995e6f45c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "539742cb43b2420195668c52b7d7dce9", "name": "tempest-SnapshotMetadataV3RbacTest-599363395", "password_expires_at": null}, "audit_ids": ["tRHfFQ3rQwehXbs0Gi_yuw"], "expires_at": "2020-12-14T03:18:36.000000Z", "issued_at": "2020-12-14T02:18:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6686db654814a049859a68b2cfea6f5", "name": "tempest-SnapshotMetadataV3RbacTest-599363395"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:37.000 193 INFO tempest.lib.common.rest_client [req-aeaf5b6c-d11f-4a26-9bcf-4e8286b497ad ] Request (SnapshotMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:18:37.003 193 DEBUG tempest.lib.common.rest_client [req-aeaf5b6c-d11f-4a26-9bcf-4e8286b497ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aeaf5b6c-d11f-4a26-9bcf-4e8286b497ad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["WWRCr9Y4RqGSZ6KolApzUg"], "expires_at": "2020-12-14T03:18:36.000000Z", "issued_at": "2020-12-14T02:18:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:37.110 193 INFO tempest.lib.common.rest_client [req-ec354c44-88f3-48c4-8d58-c3bb9631b940 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:18:37.113 193 DEBUG tempest.lib.common.rest_client [req-ec354c44-88f3-48c4-8d58-c3bb9631b940 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec354c44-88f3-48c4-8d58-c3bb9631b940', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["FT9VMoGCQR6UFKv_HCasCA"], "expires_at": "2020-12-14T03:18:37.000000Z", "issued_at": "2020-12-14T02:18:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:37.187 193 INFO tempest.lib.common.rest_client [req-88737b1c-cc80-4540-901f-89e730c5a5d2 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.066s 2020-12-14 02:18:37.190 193 DEBUG tempest.lib.common.rest_client [req-88737b1c-cc80-4540-901f-89e730c5a5d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88737b1c-cc80-4540-901f-89e730c5a5d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:37.304 193 INFO tempest.lib.common.rest_client [req-313e4377-a3aa-4370-a798-800ae01ac28e ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.108s 2020-12-14 02:18:37.306 193 DEBUG tempest.lib.common.rest_client [req-313e4377-a3aa-4370-a798-800ae01ac28e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-313e4377-a3aa-4370-a798-800ae01ac28e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:37.310 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:18:37.312 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:37.385 193 INFO tempest.lib.common.rest_client [req-0d77cf7c-b963-4dd3-a622-209cffd36cba ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles 0.067s 2020-12-14 02:18:37.387 193 DEBUG tempest.lib.common.rest_client [req-0d77cf7c-b963-4dd3-a622-209cffd36cba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d77cf7c-b963-4dd3-a622-209cffd36cba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:37.466 193 INFO tempest.lib.common.rest_client [req-0fda9083-0955-4b6f-a2cc-d3159a4fa720 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles/72a4576c553448cd941b052c1ca0cf2d 0.073s 2020-12-14 02:18:37.468 193 DEBUG tempest.lib.common.rest_client [req-0fda9083-0955-4b6f-a2cc-d3159a4fa720 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0fda9083-0955-4b6f-a2cc-d3159a4fa720', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:37.494 197 INFO tempest.lib.common.rest_client [req-b0acb88f-cda8-4870-aacc-0ae98cce7d52 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.225s 2020-12-14 02:18:37.498 197 DEBUG tempest.lib.common.rest_client [req-b0acb88f-cda8-4870-aacc-0ae98cce7d52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b0acb88f-cda8-4870-aacc-0ae98cce7d52', 'x-compute-request-id': 'req-b0acb88f-cda8-4870-aacc-0ae98cce7d52', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:37.582 193 INFO tempest.lib.common.rest_client [req-673dc142-d020-420b-a3e6-093748f695d4 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles/a629c95d64b3416fb80ae90af4f69c05 0.106s 2020-12-14 02:18:37.585 193 DEBUG tempest.lib.common.rest_client [req-673dc142-d020-420b-a3e6-093748f695d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-673dc142-d020-420b-a3e6-093748f695d4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:37.624 189 INFO tempest.lib.common.rest_client [req-dd451853-5541-496e-8a39-c2e4398f0c3f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.208s 2020-12-14 02:18:37.628 189 DEBUG tempest.lib.common.rest_client [req-dd451853-5541-496e-8a39-c2e4398f0c3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dd451853-5541-496e-8a39-c2e4398f0c3f', 'x-compute-request-id': 'req-dd451853-5541-496e-8a39-c2e4398f0c3f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:37.834 186 INFO tempest.lib.common.rest_client [req-06793cef-6692-4c48-bf45-f16039ec43c1 ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:18:37.837 186 DEBUG tempest.lib.common.rest_client [req-06793cef-6692-4c48-bf45-f16039ec43c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06793cef-6692-4c48-bf45-f16039ec43c1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["IQf4sOWXSZusSRIvGz5fcA"], "expires_at": "2020-12-14T03:18:37.000000Z", "issued_at": "2020-12-14T02:18:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:37.885 186 INFO tempest.lib.common.rest_client [req-aef45787-427c-4f18-8a14-b5c1198247bc ] Request (FlavorsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:18:37.888 186 DEBUG tempest.lib.common.rest_client [req-aef45787-427c-4f18-8a14-b5c1198247bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aef45787-427c-4f18-8a14-b5c1198247bc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["oAd-uj4nQmSJcIoRnEua5g"], "expires_at": "2020-12-14T03:18:37.000000Z", "issued_at": "2020-12-14T02:18:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:38.062 186 INFO tempest.lib.common.rest_client [req-b15c6cce-bbed-4dc7-a4b8-d96213e5349a ] Request (FlavorsExtRbacTest:setUpClass): 200 GET http://172.30.13.94:9696/v2.0/service-providers 0.162s 2020-12-14 02:18:38.066 186 DEBUG tempest.lib.common.rest_client [req-b15c6cce-bbed-4dc7-a4b8-d96213e5349a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '304', 'x-openstack-request-id': 'req-b15c6cce-bbed-4dc7-a4b8-d96213e5349a', 'date': 'Mon, 14 Dec 2020 02:18:38 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/service-providers'} Body: b'{"service_providers": [{"service_type": "L3_ROUTER_NAT", "name": "dvrha", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "dvr", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "ha", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "single_node", "default": false}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:38.074 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:38.097 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_flavor, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:38.099 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:38.215 186 INFO tempest.lib.common.rest_client [req-c567ab6e-3ba5-40c8-a350-1e9afaf64ef0 ] Request (FlavorsExtRbacTest:test_create_flavor): 200 GET http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles 0.111s 2020-12-14 02:18:38.218 186 DEBUG tempest.lib.common.rest_client [req-c567ab6e-3ba5-40c8-a350-1e9afaf64ef0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c567ab6e-3ba5-40c8-a350-1e9afaf64ef0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:38.267 186 INFO tempest.lib.common.rest_client [req-8a8423ad-1ad6-489d-a84e-8f0eed0ea08d ] Request (FlavorsExtRbacTest:test_create_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:18:38.270 186 DEBUG tempest.lib.common.rest_client [req-8a8423ad-1ad6-489d-a84e-8f0eed0ea08d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a8423ad-1ad6-489d-a84e-8f0eed0ea08d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["KVSoBi9iTKu-UxRGJPNkVA"], "expires_at": "2020-12-14T03:18:38.000000Z", "issued_at": "2020-12-14T02:18:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:38.314 186 INFO tempest.lib.common.rest_client [req-e566e9d2-90c3-4292-8e38-42c0d1b9299f ] Request (FlavorsExtRbacTest:test_create_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:18:38.316 186 DEBUG tempest.lib.common.rest_client [req-e566e9d2-90c3-4292-8e38-42c0d1b9299f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e566e9d2-90c3-4292-8e38-42c0d1b9299f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["11wcnAoLTzSBznuraQYxsg"], "expires_at": "2020-12-14T03:18:38.000000Z", "issued_at": "2020-12-14T02:18:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:38.412 186 INFO tempest.lib.common.rest_client [req-d8191783-e838-4b8e-9e86-7d52d879f7e1 ] Request (FlavorsExtRbacTest:test_create_flavor): 201 POST http://172.30.13.94:9696/v2.0/flavors 0.088s 2020-12-14 02:18:38.416 186 DEBUG tempest.lib.common.rest_client [req-d8191783-e838-4b8e-9e86-7d52d879f7e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"service_type": "L3_ROUTER_NAT"}} Response - Headers: {'content-type': 'application/json', 'content-length': '163', 'x-openstack-request-id': 'req-d8191783-e838-4b8e-9e86-7d52d879f7e1', 'date': 'Mon, 14 Dec 2020 02:18:38 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors'} Body: b'{"flavor": {"id": "455c594a-847e-4d33-aa8a-fa696a772ebb", "name": "", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:38.419 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:38.484 186 INFO tempest.lib.common.rest_client [req-f3e5b850-88f3-4e2e-83fa-6018da3c6e05 ] Request (FlavorsExtRbacTest:test_create_flavor): 200 GET http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles 0.059s 2020-12-14 02:18:38.487 186 DEBUG tempest.lib.common.rest_client [req-f3e5b850-88f3-4e2e-83fa-6018da3c6e05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3e5b850-88f3-4e2e-83fa-6018da3c6e05', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:38.541 186 INFO tempest.lib.common.rest_client [req-5d284ccb-c3bc-40f6-99cf-2aa81b2ca705 ] Request (FlavorsExtRbacTest:test_create_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:18:38.544 186 DEBUG tempest.lib.common.rest_client [req-5d284ccb-c3bc-40f6-99cf-2aa81b2ca705 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d284ccb-c3bc-40f6-99cf-2aa81b2ca705', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["3W4sP_qVRNm0zdOczKpDWw"], "expires_at": "2020-12-14T03:18:38.000000Z", "issued_at": "2020-12-14T02:18:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:38.593 186 INFO tempest.lib.common.rest_client [req-e7dc408a-2915-48e2-82ea-7c0012e54680 ] Request (FlavorsExtRbacTest:test_create_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:18:38.596 186 DEBUG tempest.lib.common.rest_client [req-e7dc408a-2915-48e2-82ea-7c0012e54680 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7dc408a-2915-48e2-82ea-7c0012e54680', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["Hei9c3ZITwmRE4U88u3Uog"], "expires_at": "2020-12-14T03:18:38.000000Z", "issued_at": "2020-12-14T02:18:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:38.687 193 INFO tempest.lib.common.rest_client [req-47c01bfc-2796-4996-aeea-50a40ec1ddb2 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:18:38.690 193 DEBUG tempest.lib.common.rest_client [req-47c01bfc-2796-4996-aeea-50a40ec1ddb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47c01bfc-2796-4996-aeea-50a40ec1ddb2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "539742cb43b2420195668c52b7d7dce9", "name": "tempest-SnapshotMetadataV3RbacTest-599363395", "password_expires_at": null}, "audit_ids": ["ml_8Y-wfS6On8X1uz_iEPQ"], "expires_at": "2020-12-14T03:18:38.000000Z", "issued_at": "2020-12-14T02:18:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6686db654814a049859a68b2cfea6f5", "name": "tempest-SnapshotMetadataV3RbacTest-599363395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:38.727 186 INFO tempest.lib.common.rest_client [req-dfbf54ea-9f5f-4988-92bc-1437dc9d6cee ] Request (FlavorsExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/flavors/455c594a-847e-4d33-aa8a-fa696a772ebb 0.120s 2020-12-14 02:18:38.730 186 DEBUG tempest.lib.common.rest_client [req-dfbf54ea-9f5f-4988-92bc-1437dc9d6cee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-dfbf54ea-9f5f-4988-92bc-1437dc9d6cee', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/455c594a-847e-4d33-aa8a-fa696a772ebb'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:38.743 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:38.766 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_flavor, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:38.769 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:38.792 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_flavor, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:38.867 186 INFO tempest.lib.common.rest_client [req-eef9c666-6683-48fd-91c8-819ddf5b94cf ] Request (FlavorsExtRbacTest:test_delete_flavor): 201 POST http://172.30.13.94:9696/v2.0/flavors 0.070s 2020-12-14 02:18:38.870 186 DEBUG tempest.lib.common.rest_client [req-eef9c666-6683-48fd-91c8-819ddf5b94cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"service_type": "L3_ROUTER_NAT"}} Response - Headers: {'content-type': 'application/json', 'content-length': '163', 'x-openstack-request-id': 'req-eef9c666-6683-48fd-91c8-819ddf5b94cf', 'date': 'Mon, 14 Dec 2020 02:18:38 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors'} Body: b'{"flavor": {"id": "7a5336d2-5ff8-4c45-8625-160956d4d1e0", "name": "", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:38.873 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:38.879 197 INFO tempest.lib.common.rest_client [req-5e47a766-afd0-4b0d-b53c-af5f98a85c48 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.273s 2020-12-14 02:18:38.883 197 DEBUG tempest.lib.common.rest_client [req-5e47a766-afd0-4b0d-b53c-af5f98a85c48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5e47a766-afd0-4b0d-b53c-af5f98a85c48', 'x-compute-request-id': 'req-5e47a766-afd0-4b0d-b53c-af5f98a85c48', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:38.959 186 INFO tempest.lib.common.rest_client [req-7714e384-13b2-45c5-b0de-b71c175dbc7d ] Request (FlavorsExtRbacTest:test_delete_flavor): 200 GET http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles 0.079s 2020-12-14 02:18:38.961 189 INFO tempest.lib.common.rest_client [req-7b5a9cf9-5fde-4505-b175-26d1b3b62dcf ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.229s 2020-12-14 02:18:38.962 186 DEBUG tempest.lib.common.rest_client [req-7714e384-13b2-45c5-b0de-b71c175dbc7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7714e384-13b2-45c5-b0de-b71c175dbc7d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:38.965 189 DEBUG tempest.lib.common.rest_client [req-7b5a9cf9-5fde-4505-b175-26d1b3b62dcf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7b5a9cf9-5fde-4505-b175-26d1b3b62dcf', 'x-compute-request-id': 'req-7b5a9cf9-5fde-4505-b175-26d1b3b62dcf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:39.013 186 INFO tempest.lib.common.rest_client [req-aed3cd0c-7046-45c3-9aab-d2226b5c0488 ] Request (FlavorsExtRbacTest:test_delete_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:18:39.016 186 DEBUG tempest.lib.common.rest_client [req-aed3cd0c-7046-45c3-9aab-d2226b5c0488 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aed3cd0c-7046-45c3-9aab-d2226b5c0488', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["vKGRWkuTRw-PNDIAB0q6qQ"], "expires_at": "2020-12-14T03:18:38.000000Z", "issued_at": "2020-12-14T02:18:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:39.067 186 INFO tempest.lib.common.rest_client [req-f24a4699-f329-42b4-abc2-d87ae1a6871d ] Request (FlavorsExtRbacTest:test_delete_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:18:39.070 186 DEBUG tempest.lib.common.rest_client [req-f24a4699-f329-42b4-abc2-d87ae1a6871d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f24a4699-f329-42b4-abc2-d87ae1a6871d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["vZtF89sEQsyRg4JLMg0SSQ"], "expires_at": "2020-12-14T03:18:39.000000Z", "issued_at": "2020-12-14T02:18:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:39.133 193 INFO tempest.lib.common.rest_client [req-1e5c7ce6-4be8-450e-8793-9cb676923927 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/volumes 0.430s 2020-12-14 02:18:39.136 193 DEBUG tempest.lib.common.rest_client [req-1e5c7ce6-4be8-450e-8793-9cb676923927 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-SnapshotMetadataV3RbacTest-Volume-227656601"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1e5c7ce6-4be8-450e-8793-9cb676923927', 'content-length': '846', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1e5c7ce6-4be8-450e-8793-9cb676923927', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/volumes'} Body: b'{"volume": {"id": "c08a8b5e-72a6-485b-ab95-3eb2700b45ef", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:39.000000", "updated_at": null, "name": "tempest-SnapshotMetadataV3RbacTest-Volume-227656601", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef"}], "user_id": "539742cb43b2420195668c52b7d7dce9", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:39.209 186 INFO tempest.lib.common.rest_client [req-88d91325-6d61-4782-8f7a-e58cef77e212 ] Request (FlavorsExtRbacTest:test_delete_flavor): 204 DELETE http://172.30.13.94:9696/v2.0/flavors/7a5336d2-5ff8-4c45-8625-160956d4d1e0 0.130s 2020-12-14 02:18:39.213 186 DEBUG tempest.lib.common.rest_client [req-88d91325-6d61-4782-8f7a-e58cef77e212 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-88d91325-6d61-4782-8f7a-e58cef77e212', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:39 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/7a5336d2-5ff8-4c45-8625-160956d4d1e0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:39.216 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:39.284 186 INFO tempest.lib.common.rest_client [req-cd7ca2ae-7c65-429c-92fa-302e0a332b2e ] Request (FlavorsExtRbacTest:test_delete_flavor): 200 GET http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles 0.062s 2020-12-14 02:18:39.287 186 DEBUG tempest.lib.common.rest_client [req-cd7ca2ae-7c65-429c-92fa-302e0a332b2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd7ca2ae-7c65-429c-92fa-302e0a332b2e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:39.317 193 INFO tempest.lib.common.rest_client [req-ab319db5-45c0-40a9-8f76-e249535c4d5c ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef 0.080s 2020-12-14 02:18:39.321 193 DEBUG tempest.lib.common.rest_client [req-ab319db5-45c0-40a9-8f76-e249535c4d5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ab319db5-45c0-40a9-8f76-e249535c4d5c', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ab319db5-45c0-40a9-8f76-e249535c4d5c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef'} Body: b'{"volume": {"id": "c08a8b5e-72a6-485b-ab95-3eb2700b45ef", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:39.000000", "updated_at": "2020-12-14T02:18:39.000000", "name": "tempest-SnapshotMetadataV3RbacTest-Volume-227656601", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef"}], "user_id": "539742cb43b2420195668c52b7d7dce9", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c6686db654814a049859a68b2cfea6f5"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:39.339 186 INFO tempest.lib.common.rest_client [req-d37d976a-7770-4c65-a2da-433c5945729c ] Request (FlavorsExtRbacTest:test_delete_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:18:39.343 186 DEBUG tempest.lib.common.rest_client [req-d37d976a-7770-4c65-a2da-433c5945729c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d37d976a-7770-4c65-a2da-433c5945729c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["NvboBT3TTzKZXHCa9j9ZzA"], "expires_at": "2020-12-14T03:18:39.000000Z", "issued_at": "2020-12-14T02:18:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:39.392 186 INFO tempest.lib.common.rest_client [req-df99b12c-f6db-45a2-90ad-714a9c5b54d7 ] Request (FlavorsExtRbacTest:test_delete_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:18:39.395 186 DEBUG tempest.lib.common.rest_client [req-df99b12c-f6db-45a2-90ad-714a9c5b54d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df99b12c-f6db-45a2-90ad-714a9c5b54d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["T5vulxSqQZejsuPshDSkfw"], "expires_at": "2020-12-14T03:18:39.000000Z", "issued_at": "2020-12-14T02:18:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:39.497 186 INFO tempest.lib.common.rest_client [req-62bfbe50-621f-4226-8815-8c473967b236 ] Request (FlavorsExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/flavors/7a5336d2-5ff8-4c45-8625-160956d4d1e0 0.093s 2020-12-14 02:18:39.568 186 DEBUG tempest.lib.common.rest_client [req-62bfbe50-621f-4226-8815-8c473967b236 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '136', 'x-openstack-request-id': 'req-62bfbe50-621f-4226-8815-8c473967b236', 'date': 'Mon, 14 Dec 2020 02:18:39 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/7a5336d2-5ff8-4c45-8625-160956d4d1e0'} Body: b'{"NeutronError": {"type": "FlavorNotFound", "message": "Flavor 7a5336d2-5ff8-4c45-8625-160956d4d1e0 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:39.582 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:39.604 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_flavor, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:39.692 186 INFO tempest.lib.common.rest_client [req-0cff7397-f74e-4503-885f-31970b4417aa ] Request (FlavorsExtRbacTest:test_list_flavors): 201 POST http://172.30.13.94:9696/v2.0/flavors 0.082s 2020-12-14 02:18:39.697 186 DEBUG tempest.lib.common.rest_client [req-0cff7397-f74e-4503-885f-31970b4417aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"service_type": "L3_ROUTER_NAT"}} Response - Headers: {'content-type': 'application/json', 'content-length': '163', 'x-openstack-request-id': 'req-0cff7397-f74e-4503-885f-31970b4417aa', 'date': 'Mon, 14 Dec 2020 02:18:39 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors'} Body: b'{"flavor": {"id": "c8beb344-ac26-424f-9ebb-b329915dda43", "name": "", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:39.700 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:39.770 186 INFO tempest.lib.common.rest_client [req-d1c66364-b0ef-4197-9ab1-5f34fc5ca59c ] Request (FlavorsExtRbacTest:test_list_flavors): 200 GET http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles 0.061s 2020-12-14 02:18:39.773 186 DEBUG tempest.lib.common.rest_client [req-d1c66364-b0ef-4197-9ab1-5f34fc5ca59c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1c66364-b0ef-4197-9ab1-5f34fc5ca59c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:39.825 186 INFO tempest.lib.common.rest_client [req-e7be0cc7-c6a0-44bc-a625-4ed2857193a0 ] Request (FlavorsExtRbacTest:test_list_flavors): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:18:39.829 186 DEBUG tempest.lib.common.rest_client [req-e7be0cc7-c6a0-44bc-a625-4ed2857193a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7be0cc7-c6a0-44bc-a625-4ed2857193a0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["2DFeAFrxQ0ehflkqvyiaYw"], "expires_at": "2020-12-14T03:18:39.000000Z", "issued_at": "2020-12-14T02:18:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:39.880 186 INFO tempest.lib.common.rest_client [req-03fdf5e7-9663-47ca-8013-40fc222655df ] Request (FlavorsExtRbacTest:test_list_flavors): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:18:39.884 186 DEBUG tempest.lib.common.rest_client [req-03fdf5e7-9663-47ca-8013-40fc222655df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-03fdf5e7-9663-47ca-8013-40fc222655df', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["STcs5u-ETuSl8-ACzt9ZSw"], "expires_at": "2020-12-14T03:18:39.000000Z", "issued_at": "2020-12-14T02:18:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:39.991 186 INFO tempest.lib.common.rest_client [req-2b72c1fd-bbc5-4483-9a0b-c7d8ad953077 ] Request (FlavorsExtRbacTest:test_list_flavors): 200 GET http://172.30.13.94:9696/v2.0/flavors 0.100s 2020-12-14 02:18:39.995 186 DEBUG tempest.lib.common.rest_client [req-2b72c1fd-bbc5-4483-9a0b-c7d8ad953077 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '166', 'x-openstack-request-id': 'req-2b72c1fd-bbc5-4483-9a0b-c7d8ad953077', 'date': 'Mon, 14 Dec 2020 02:18:39 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors'} Body: b'{"flavors": [{"id": "c8beb344-ac26-424f-9ebb-b329915dda43", "name": "", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.000 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:40.075 186 INFO tempest.lib.common.rest_client [req-18abfcd3-cdfa-4983-a7ce-fa154ff0a1cf ] Request (FlavorsExtRbacTest:test_list_flavors): 200 GET http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles 0.065s 2020-12-14 02:18:40.078 186 DEBUG tempest.lib.common.rest_client [req-18abfcd3-cdfa-4983-a7ce-fa154ff0a1cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-18abfcd3-cdfa-4983-a7ce-fa154ff0a1cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.133 186 INFO tempest.lib.common.rest_client [req-674a32a6-9d0b-4ec7-8ed8-53ed1685457c ] Request (FlavorsExtRbacTest:test_list_flavors): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:18:40.136 186 DEBUG tempest.lib.common.rest_client [req-674a32a6-9d0b-4ec7-8ed8-53ed1685457c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-674a32a6-9d0b-4ec7-8ed8-53ed1685457c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["1NCHALWhRfuNTUzrjS9rGQ"], "expires_at": "2020-12-14T03:18:40.000000Z", "issued_at": "2020-12-14T02:18:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.196 186 INFO tempest.lib.common.rest_client [req-8922f6c2-b6a1-44eb-a577-6df666b1af73 ] Request (FlavorsExtRbacTest:test_list_flavors): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:18:40.199 186 DEBUG tempest.lib.common.rest_client [req-8922f6c2-b6a1-44eb-a577-6df666b1af73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8922f6c2-b6a1-44eb-a577-6df666b1af73', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["sehbg70fR92uq_AUP5vbzQ"], "expires_at": "2020-12-14T03:18:40.000000Z", "issued_at": "2020-12-14T02:18:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.286 197 INFO tempest.lib.common.rest_client [req-68d3a1a1-4013-40b3-8717-74c2bd57eb1f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.278s 2020-12-14 02:18:40.290 197 DEBUG tempest.lib.common.rest_client [req-68d3a1a1-4013-40b3-8717-74c2bd57eb1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-68d3a1a1-4013-40b3-8717-74c2bd57eb1f', 'x-compute-request-id': 'req-68d3a1a1-4013-40b3-8717-74c2bd57eb1f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.341 186 INFO tempest.lib.common.rest_client [req-b6cc0d92-075f-4d68-9b35-9b9e78aad88f ] Request (FlavorsExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/flavors/c8beb344-ac26-424f-9ebb-b329915dda43 0.133s 2020-12-14 02:18:40.344 186 DEBUG tempest.lib.common.rest_client [req-b6cc0d92-075f-4d68-9b35-9b9e78aad88f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-b6cc0d92-075f-4d68-9b35-9b9e78aad88f', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/c8beb344-ac26-424f-9ebb-b329915dda43'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.358 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:40.366 189 INFO tempest.lib.common.rest_client [req-b0316257-daaf-448b-9aa1-ca4e0284d0a9 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.279s 2020-12-14 02:18:40.370 189 DEBUG tempest.lib.common.rest_client [req-b0316257-daaf-448b-9aa1-ca4e0284d0a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b0316257-daaf-448b-9aa1-ca4e0284d0a9', 'x-compute-request-id': 'req-b0316257-daaf-448b-9aa1-ca4e0284d0a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.380 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_flavor, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:40.439 186 INFO tempest.lib.common.rest_client [req-4fd8c665-5258-4bbc-ae33-86437137f262 ] Request (FlavorsExtRbacTest:test_show_flavor): 201 POST http://172.30.13.94:9696/v2.0/flavors 0.054s 2020-12-14 02:18:40.442 186 DEBUG tempest.lib.common.rest_client [req-4fd8c665-5258-4bbc-ae33-86437137f262 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"service_type": "L3_ROUTER_NAT"}} Response - Headers: {'content-type': 'application/json', 'content-length': '163', 'x-openstack-request-id': 'req-4fd8c665-5258-4bbc-ae33-86437137f262', 'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors'} Body: b'{"flavor": {"id": "07207e8e-262f-4a7c-b205-c7f327b11c21", "name": "", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.444 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:40.496 193 INFO tempest.lib.common.rest_client [req-87de3aaa-07e6-4c14-90da-1ea1fd3161f2 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef 0.077s 2020-12-14 02:18:40.499 193 DEBUG tempest.lib.common.rest_client [req-87de3aaa-07e6-4c14-90da-1ea1fd3161f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-87de3aaa-07e6-4c14-90da-1ea1fd3161f2', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-87de3aaa-07e6-4c14-90da-1ea1fd3161f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef'} Body: b'{"volume": {"id": "c08a8b5e-72a6-485b-ab95-3eb2700b45ef", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:39.000000", "updated_at": "2020-12-14T02:18:39.000000", "name": "tempest-SnapshotMetadataV3RbacTest-Volume-227656601", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef"}], "user_id": "539742cb43b2420195668c52b7d7dce9", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c6686db654814a049859a68b2cfea6f5"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.513 186 INFO tempest.lib.common.rest_client [req-ca330b98-9940-468e-9e8b-422e3f66b6c1 ] Request (FlavorsExtRbacTest:test_show_flavor): 200 GET http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles 0.063s 2020-12-14 02:18:40.516 186 DEBUG tempest.lib.common.rest_client [req-ca330b98-9940-468e-9e8b-422e3f66b6c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca330b98-9940-468e-9e8b-422e3f66b6c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.566 186 INFO tempest.lib.common.rest_client [req-bc634cf4-2aa3-415d-bd78-ebe29de0dd6b ] Request (FlavorsExtRbacTest:test_show_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:18:40.570 186 DEBUG tempest.lib.common.rest_client [req-bc634cf4-2aa3-415d-bd78-ebe29de0dd6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc634cf4-2aa3-415d-bd78-ebe29de0dd6b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["tEzx0yZ-S_iDJidrLQ82uQ"], "expires_at": "2020-12-14T03:18:40.000000Z", "issued_at": "2020-12-14T02:18:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.592 193 INFO tempest.common.waiters [-] volume c08a8b5e-72a6-485b-ab95-3eb2700b45ef reached available after waiting for 1.592048 seconds 2020-12-14 02:18:40.628 186 INFO tempest.lib.common.rest_client [req-abc3bd26-b7a1-4f26-b20c-5d146331b155 ] Request (FlavorsExtRbacTest:test_show_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:18:40.632 186 DEBUG tempest.lib.common.rest_client [req-abc3bd26-b7a1-4f26-b20c-5d146331b155 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-abc3bd26-b7a1-4f26-b20c-5d146331b155', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["tck71mLqRimscXXkGs7jsw"], "expires_at": "2020-12-14T03:18:40.000000Z", "issued_at": "2020-12-14T02:18:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.727 186 INFO tempest.lib.common.rest_client [req-25eceed7-d868-4a5e-8f43-7b90c35d05cf ] Request (FlavorsExtRbacTest:test_show_flavor): 200 GET http://172.30.13.94:9696/v2.0/flavors/07207e8e-262f-4a7c-b205-c7f327b11c21 0.087s 2020-12-14 02:18:40.731 186 DEBUG tempest.lib.common.rest_client [req-25eceed7-d868-4a5e-8f43-7b90c35d05cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '163', 'x-openstack-request-id': 'req-25eceed7-d868-4a5e-8f43-7b90c35d05cf', 'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/07207e8e-262f-4a7c-b205-c7f327b11c21'} Body: b'{"flavor": {"id": "07207e8e-262f-4a7c-b205-c7f327b11c21", "name": "", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.735 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:40.807 186 INFO tempest.lib.common.rest_client [req-d1d2b723-c19d-44a8-adac-a60d517df9d4 ] Request (FlavorsExtRbacTest:test_show_flavor): 200 GET http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles 0.065s 2020-12-14 02:18:40.810 186 DEBUG tempest.lib.common.rest_client [req-d1d2b723-c19d-44a8-adac-a60d517df9d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1d2b723-c19d-44a8-adac-a60d517df9d4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.818 193 INFO tempest.lib.common.rest_client [req-d256172a-6a64-4088-8cc5-d9f5d06f28d4 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots 0.220s 2020-12-14 02:18:40.821 193 DEBUG tempest.lib.common.rest_client [req-d256172a-6a64-4088-8cc5-d9f5d06f28d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "c08a8b5e-72a6-485b-ab95-3eb2700b45ef", "name": "tempest-SnapshotMetadataV3RbacTest-Snapshot-1431261006"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d256172a-6a64-4088-8cc5-d9f5d06f28d4', 'content-length': '313', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d256172a-6a64-4088-8cc5-d9f5d06f28d4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots'} Body: b'{"snapshot": {"id": "58683219-b17f-4b4b-b9a2-ba700c39f710", "created_at": "2020-12-14T02:18:40.738528", "updated_at": null, "name": "tempest-SnapshotMetadataV3RbacTest-Snapshot-1431261006", "description": null, "volume_id": "c08a8b5e-72a6-485b-ab95-3eb2700b45ef", "status": "creating", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.862 186 INFO tempest.lib.common.rest_client [req-a9aaaff1-0dfc-41ec-bd74-a518f7019d54 ] Request (FlavorsExtRbacTest:test_show_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:18:40.864 186 DEBUG tempest.lib.common.rest_client [req-a9aaaff1-0dfc-41ec-bd74-a518f7019d54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9aaaff1-0dfc-41ec-bd74-a518f7019d54', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["7l9rZjGxTe2nF42rzub8Dg"], "expires_at": "2020-12-14T03:18:40.000000Z", "issued_at": "2020-12-14T02:18:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.904 193 INFO tempest.lib.common.rest_client [req-8a7be871-ec58-41a5-a491-68268c12ce34 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710 0.048s 2020-12-14 02:18:40.907 193 DEBUG tempest.lib.common.rest_client [req-8a7be871-ec58-41a5-a491-68268c12ce34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8a7be871-ec58-41a5-a491-68268c12ce34', 'content-length': '445', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8a7be871-ec58-41a5-a491-68268c12ce34', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710'} Body: b'{"snapshot": {"id": "58683219-b17f-4b4b-b9a2-ba700c39f710", "created_at": "2020-12-14T02:18:41.000000", "updated_at": null, "name": "tempest-SnapshotMetadataV3RbacTest-Snapshot-1431261006", "description": null, "volume_id": "c08a8b5e-72a6-485b-ab95-3eb2700b45ef", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "c6686db654814a049859a68b2cfea6f5", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:40.920 186 INFO tempest.lib.common.rest_client [req-7fc6b408-23e3-4bda-8240-9595e4652306 ] Request (FlavorsExtRbacTest:test_show_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:18:40.923 186 DEBUG tempest.lib.common.rest_client [req-7fc6b408-23e3-4bda-8240-9595e4652306 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7fc6b408-23e3-4bda-8240-9595e4652306', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["dTajzuN_SRab10Cul_HVhw"], "expires_at": "2020-12-14T03:18:40.000000Z", "issued_at": "2020-12-14T02:18:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:41.052 186 INFO tempest.lib.common.rest_client [req-74bd9187-8faf-4fa8-8eb1-9648321315b1 ] Request (FlavorsExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/flavors/07207e8e-262f-4a7c-b205-c7f327b11c21 0.119s 2020-12-14 02:18:41.055 186 DEBUG tempest.lib.common.rest_client [req-74bd9187-8faf-4fa8-8eb1-9648321315b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-74bd9187-8faf-4fa8-8eb1-9648321315b1', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:41 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/07207e8e-262f-4a7c-b205-c7f327b11c21'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:41.070 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:41.094 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_flavor, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:41.096 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:41.119 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_flavor, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:41.171 186 INFO tempest.lib.common.rest_client [req-d4281162-37ab-4af0-8e3e-dd720020935e ] Request (FlavorsExtRbacTest:test_update_flavor): 201 POST http://172.30.13.94:9696/v2.0/flavors 0.045s 2020-12-14 02:18:41.175 186 DEBUG tempest.lib.common.rest_client [req-d4281162-37ab-4af0-8e3e-dd720020935e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"service_type": "L3_ROUTER_NAT"}} Response - Headers: {'content-type': 'application/json', 'content-length': '163', 'x-openstack-request-id': 'req-d4281162-37ab-4af0-8e3e-dd720020935e', 'date': 'Mon, 14 Dec 2020 02:18:41 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors'} Body: b'{"flavor": {"id": "af5bb763-d958-4665-984c-1fdd92d9a50e", "name": "", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:41.179 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:41.254 186 INFO tempest.lib.common.rest_client [req-1c29a8b5-9634-43ec-a638-a8634652c6ae ] Request (FlavorsExtRbacTest:test_update_flavor): 200 GET http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles 0.069s 2020-12-14 02:18:41.258 186 DEBUG tempest.lib.common.rest_client [req-1c29a8b5-9634-43ec-a638-a8634652c6ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c29a8b5-9634-43ec-a638-a8634652c6ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:41.307 186 INFO tempest.lib.common.rest_client [req-556999bf-bc55-4b16-94cb-74acec2ab649 ] Request (FlavorsExtRbacTest:test_update_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:18:41.310 186 DEBUG tempest.lib.common.rest_client [req-556999bf-bc55-4b16-94cb-74acec2ab649 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-556999bf-bc55-4b16-94cb-74acec2ab649', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["00oQvTwrQm6CFlfN_7_Mzw"], "expires_at": "2020-12-14T03:18:41.000000Z", "issued_at": "2020-12-14T02:18:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:41.365 186 INFO tempest.lib.common.rest_client [req-0c928915-9fba-4d9c-a58e-e95c164b271a ] Request (FlavorsExtRbacTest:test_update_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:18:41.369 186 DEBUG tempest.lib.common.rest_client [req-0c928915-9fba-4d9c-a58e-e95c164b271a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c928915-9fba-4d9c-a58e-e95c164b271a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["av98F6LqQfGpfYCNHTG4_g"], "expires_at": "2020-12-14T03:18:41.000000Z", "issued_at": "2020-12-14T02:18:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:41.481 186 INFO tempest.lib.common.rest_client [req-66d6626f-2a74-4231-82a5-0870e3956f01 ] Request (FlavorsExtRbacTest:test_update_flavor): 200 PUT http://172.30.13.94:9696/v2.0/flavors/af5bb763-d958-4665-984c-1fdd92d9a50e 0.105s 2020-12-14 02:18:41.484 186 DEBUG tempest.lib.common.rest_client [req-66d6626f-2a74-4231-82a5-0870e3956f01 ] Request - Headers: {'X-Auth-Token': ''} Body: {"flavor": {"name": "tempest-FlavorsExtRbacTest-Flavor-1722439552"}} Response - Headers: {'content-type': 'application/json', 'content-length': '207', 'x-openstack-request-id': 'req-66d6626f-2a74-4231-82a5-0870e3956f01', 'date': 'Mon, 14 Dec 2020 02:18:41 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/af5bb763-d958-4665-984c-1fdd92d9a50e'} Body: b'{"flavor": {"id": "af5bb763-d958-4665-984c-1fdd92d9a50e", "name": "tempest-FlavorsExtRbacTest-Flavor-1722439552", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:41.486 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:41.557 186 INFO tempest.lib.common.rest_client [req-638b8aa6-fe39-456f-9dfc-e8616cd0c21a ] Request (FlavorsExtRbacTest:test_update_flavor): 200 GET http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles 0.064s 2020-12-14 02:18:41.561 186 DEBUG tempest.lib.common.rest_client [req-638b8aa6-fe39-456f-9dfc-e8616cd0c21a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-638b8aa6-fe39-456f-9dfc-e8616cd0c21a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80/users/1a2aac97039b4071af0e391ac603ab6e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:41.613 186 INFO tempest.lib.common.rest_client [req-1245e98f-bba0-467c-aa56-c2b0c1bbbc64 ] Request (FlavorsExtRbacTest:test_update_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:18:41.618 186 DEBUG tempest.lib.common.rest_client [req-1245e98f-bba0-467c-aa56-c2b0c1bbbc64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1245e98f-bba0-467c-aa56-c2b0c1bbbc64', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["iKJtwYQqQJahdWkEqRQYPQ"], "expires_at": "2020-12-14T03:18:41.000000Z", "issued_at": "2020-12-14T02:18:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:41.668 197 INFO tempest.lib.common.rest_client [req-4396d230-f811-4c26-b06e-68b6df78b5e1 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.250s 2020-12-14 02:18:41.672 197 DEBUG tempest.lib.common.rest_client [req-4396d230-f811-4c26-b06e-68b6df78b5e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4396d230-f811-4c26-b06e-68b6df78b5e1', 'x-compute-request-id': 'req-4396d230-f811-4c26-b06e-68b6df78b5e1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:41.676 186 INFO tempest.lib.common.rest_client [req-97155058-cff5-45bb-8b44-25bcf8300aef ] Request (FlavorsExtRbacTest:test_update_flavor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:18:41.681 186 DEBUG tempest.lib.common.rest_client [req-97155058-cff5-45bb-8b44-25bcf8300aef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97155058-cff5-45bb-8b44-25bcf8300aef', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1a2aac97039b4071af0e391ac603ab6e", "name": "tempest-FlavorsExtRbacTest-1438693375", "password_expires_at": null}, "audit_ids": ["0JJZ6hHOTpKF7fvXtq7uuw"], "expires_at": "2020-12-14T03:18:41.000000Z", "issued_at": "2020-12-14T02:18:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1093d310ea664c308dece13226357f80", "name": "tempest-FlavorsExtRbacTest-1438693375"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1093d310ea664c308dece13226357f80", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:41.721 189 INFO tempest.lib.common.rest_client [req-702de995-6c2f-4336-8c87-2d9d4da6171a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.229s 2020-12-14 02:18:41.726 189 DEBUG tempest.lib.common.rest_client [req-702de995-6c2f-4336-8c87-2d9d4da6171a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-702de995-6c2f-4336-8c87-2d9d4da6171a', 'x-compute-request-id': 'req-702de995-6c2f-4336-8c87-2d9d4da6171a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:41.803 186 INFO tempest.lib.common.rest_client [req-458240ba-0c64-44c3-90c9-31950f35fc1d ] Request (FlavorsExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/flavors/af5bb763-d958-4665-984c-1fdd92d9a50e 0.114s 2020-12-14 02:18:41.806 186 DEBUG tempest.lib.common.rest_client [req-458240ba-0c64-44c3-90c9-31950f35fc1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-458240ba-0c64-44c3-90c9-31950f35fc1d', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:41 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/af5bb763-d958-4665-984c-1fdd92d9a50e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:41.981 186 INFO tempest.lib.common.rest_client [req-1c3e51d7-1e79-432f-b808-3e2943da2792 ] Request (FlavorsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/1a2aac97039b4071af0e391ac603ab6e 0.156s 2020-12-14 02:18:41.984 186 DEBUG tempest.lib.common.rest_client [req-1c3e51d7-1e79-432f-b808-3e2943da2792 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c3e51d7-1e79-432f-b808-3e2943da2792', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/1a2aac97039b4071af0e391ac603ab6e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:41.991 193 INFO tempest.lib.common.rest_client [req-85339b4a-4e42-42e5-97ed-8a12fb7410a0 ] Request (SnapshotMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710 0.047s 2020-12-14 02:18:41.994 193 DEBUG tempest.lib.common.rest_client [req-85339b4a-4e42-42e5-97ed-8a12fb7410a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-85339b4a-4e42-42e5-97ed-8a12fb7410a0', 'content-length': '472', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-85339b4a-4e42-42e5-97ed-8a12fb7410a0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710'} Body: b'{"snapshot": {"id": "58683219-b17f-4b4b-b9a2-ba700c39f710", "created_at": "2020-12-14T02:18:41.000000", "updated_at": "2020-12-14T02:18:41.000000", "name": "tempest-SnapshotMetadataV3RbacTest-Snapshot-1431261006", "description": null, "volume_id": "c08a8b5e-72a6-485b-ab95-3eb2700b45ef", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "c6686db654814a049859a68b2cfea6f5", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:42.027 193 INFO tempest.common.waiters [-] snapshot 58683219-b17f-4b4b-b9a2-ba700c39f710 reached available after waiting for 2.026782 seconds 2020-12-14 02:18:42.033 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:42.052 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:delete_snapshot_metadata, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:42.084 186 INFO tempest.lib.common.rest_client [req-c021a6a8-0d69-46e8-9cba-a5488bb093c6 ] Request (FlavorsExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:18:42.086 186 DEBUG tempest.lib.common.rest_client [req-c021a6a8-0d69-46e8-9cba-a5488bb093c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c021a6a8-0d69-46e8-9cba-a5488bb093c6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["RhBLN82_QrSjTcV5EutgXw"], "expires_at": "2020-12-14T03:18:42.000000Z", "issued_at": "2020-12-14T02:18:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:42.137 193 INFO tempest.lib.common.rest_client [req-8bba5455-f65b-40bc-abd6-ec353382dfd0 ] Request (SnapshotMetadataV3RbacTest:test_delete_snapshot_metadata_item): 200 POST http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata 0.079s 2020-12-14 02:18:42.139 193 DEBUG tempest.lib.common.rest_client [req-8bba5455-f65b-40bc-abd6-ec353382dfd0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1", "key2": "value2", "key3": "value3"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8bba5455-f65b-40bc-abd6-ec353382dfd0', 'content-length': '68', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8bba5455-f65b-40bc-abd6-ec353382dfd0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata'} Body: b'{"metadata": {"key1": "value1", "key2": "value2", "key3": "value3"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:42.154 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:42.229 193 INFO tempest.lib.common.rest_client [req-cf43f361-b919-46d4-9346-c00d744b672f ] Request (SnapshotMetadataV3RbacTest:test_delete_snapshot_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles 0.069s 2020-12-14 02:18:42.232 193 DEBUG tempest.lib.common.rest_client [req-cf43f361-b919-46d4-9346-c00d744b672f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf43f361-b919-46d4-9346-c00d744b672f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:42.333 193 INFO tempest.lib.common.rest_client [req-3f0df1fe-4c1b-44f6-87b0-b22635389f27 ] Request (SnapshotMetadataV3RbacTest:test_delete_snapshot_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:18:42.336 193 DEBUG tempest.lib.common.rest_client [req-3f0df1fe-4c1b-44f6-87b0-b22635389f27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f0df1fe-4c1b-44f6-87b0-b22635389f27', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "539742cb43b2420195668c52b7d7dce9", "name": "tempest-SnapshotMetadataV3RbacTest-599363395", "password_expires_at": null}, "audit_ids": ["moKzk7leQpeNRqo63aOdDg"], "expires_at": "2020-12-14T03:18:42.000000Z", "issued_at": "2020-12-14T02:18:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6686db654814a049859a68b2cfea6f5", "name": "tempest-SnapshotMetadataV3RbacTest-599363395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:42.382 186 INFO tempest.lib.common.rest_client [req-6a26d385-364c-4767-8bb5-1662046ee576 ] Request (FlavorsExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1093d310ea664c308dece13226357f80&name=default 0.289s 2020-12-14 02:18:42.386 186 DEBUG tempest.lib.common.rest_client [req-6a26d385-364c-4767-8bb5-1662046ee576 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-6a26d385-364c-4767-8bb5-1662046ee576', 'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1093d310ea664c308dece13226357f80&name=default'} Body: b'{"security_groups": [{"id": "4360a79b-7610-4156-a8c5-efdc8518a57b", "name": "default", "stateful": true, "tenant_id": "1093d310ea664c308dece13226357f80", "description": "Default security group", "security_group_rules": [{"id": "28c4313d-4bb8-4843-9ba5-71ba43968108", "tenant_id": "1093d310ea664c308dece13226357f80", "security_group_id": "4360a79b-7610-4156-a8c5-efdc8518a57b", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4360a79b-7610-4156-a8c5-efdc8518a57b", "description": null, "tags": [], "created_at": "2020-12-14T02:18:42Z", "updated_at": "2020-12-14T02:18:42Z", "revision_number": 0, "project_id": "1093d310ea664c308dece13226357f80"}, {"id": "c87534f4-9460-4432-be2c-5c5b9bfb9e87", "tenant_id": "1093d310ea664c308dece13226357f80", "security_group_id": "4360a79b-7610-4156-a8c5-efdc8518a57b", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:42Z", "updated_at": "2020-12-14T02:18:42Z", "revision_number": 0, "project_id": "1093d310ea664c308dece13226357f80"}, {"id": "d9b0e42e-6eab-4fe1-a223-612542d9e3bc", "tenant_id": "1093d310ea664c308dece13226357f80", "security_group_id": "4360a79b-7610-4156-a8c5-efdc8518a57b", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:42Z", "updated_at": "2020-12-14T02:18:42Z", "revision_number": 0, "project_id": "1093d310ea664c308dece13226357f80"}, {"id": "fa2b5c05-34c6-4e6a-92d8-c9b8cb5da790", "tenant_id": "1093d310ea664c308dece13226357f80", "security_group_id": "4360a79b-7610-4156-a8c5-efdc8518a57b", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4360a79b-7610-4156-a8c5-efdc8518a57b", "description": null, "tags": [], "created_at": "2020-12-14T02:18:42Z", "updated_at": "2020-12-14T02:18:42Z", "revision_number": 0, "project_id": "1093d310ea664c308dece13226357f80"}], "tags": [], "created_at": "2020-12-14T02:18:42Z", "updated_at": "2020-12-14T02:18:42Z", "revision_number": 1, "project_id": "1093d310ea664c308dece13226357f80"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:42.506 193 INFO tempest.lib.common.rest_client [req-0cf32a23-f4a2-4581-a9f0-979d4a008c4e ] Request (SnapshotMetadataV3RbacTest:test_delete_snapshot_metadata_item): 200 DELETE http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata/key1 0.163s 2020-12-14 02:18:42.510 193 DEBUG tempest.lib.common.rest_client [req-0cf32a23-f4a2-4581-a9f0-979d4a008c4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-0cf32a23-f4a2-4581-a9f0-979d4a008c4e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata/key1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:42.512 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:42.555 186 INFO tempest.lib.common.rest_client [req-7971892d-9650-4b36-9bfc-0e9e5b294e76 ] Request (FlavorsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/4360a79b-7610-4156-a8c5-efdc8518a57b 0.163s 2020-12-14 02:18:42.558 186 DEBUG tempest.lib.common.rest_client [req-7971892d-9650-4b36-9bfc-0e9e5b294e76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-7971892d-9650-4b36-9bfc-0e9e5b294e76', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/4360a79b-7610-4156-a8c5-efdc8518a57b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:42.590 193 INFO tempest.lib.common.rest_client [req-3c9b8003-d7f6-4109-a324-3aa1da1e62c8 ] Request (SnapshotMetadataV3RbacTest:test_delete_snapshot_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles 0.072s 2020-12-14 02:18:42.594 193 DEBUG tempest.lib.common.rest_client [req-3c9b8003-d7f6-4109-a324-3aa1da1e62c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c9b8003-d7f6-4109-a324-3aa1da1e62c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:42.647 193 INFO tempest.lib.common.rest_client [req-989c27ca-f5cf-43ee-9381-6068efb35c0e ] Request (SnapshotMetadataV3RbacTest:test_delete_snapshot_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:18:42.650 193 DEBUG tempest.lib.common.rest_client [req-989c27ca-f5cf-43ee-9381-6068efb35c0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-989c27ca-f5cf-43ee-9381-6068efb35c0e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "539742cb43b2420195668c52b7d7dce9", "name": "tempest-SnapshotMetadataV3RbacTest-599363395", "password_expires_at": null}, "audit_ids": ["RbNlAfvnR2inBIKdPKRChQ"], "expires_at": "2020-12-14T03:18:42.000000Z", "issued_at": "2020-12-14T02:18:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6686db654814a049859a68b2cfea6f5", "name": "tempest-SnapshotMetadataV3RbacTest-599363395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:42.663 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:42.681 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_snapshot_metadata, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:42.703 186 INFO tempest.lib.common.rest_client [req-c2b1d4cb-ab56-4d73-a737-6a851b987b14 ] Request (FlavorsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80 0.138s 2020-12-14 02:18:42.706 186 DEBUG tempest.lib.common.rest_client [req-c2b1d4cb-ab56-4d73-a737-6a851b987b14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2b1d4cb-ab56-4d73-a737-6a851b987b14', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1093d310ea664c308dece13226357f80'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:42.719 186 INFO tempest.test [-] raised in MeteringLabelRulesRbacTest.setUpClass. Invoking tearDownClass. 2020-12-14 02:18:42.732 186 INFO tempest.test [-] raised in MeteringLabelsRbacTest.setUpClass. Invoking tearDownClass. 2020-12-14 02:18:42.848 186 INFO tempest.lib.common.rest_client [req-feacf02f-9fdc-454f-a913-58d1b48a7b1a ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:18:42.851 186 DEBUG tempest.lib.common.rest_client [req-feacf02f-9fdc-454f-a913-58d1b48a7b1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-feacf02f-9fdc-454f-a913-58d1b48a7b1a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["RdF3FuiCQQStw374qinWBQ"], "expires_at": "2020-12-14T03:18:42.000000Z", "issued_at": "2020-12-14T02:18:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:42.914 193 INFO tempest.lib.common.rest_client [req-1d99b25e-3b88-4dce-ad12-924b62a369fb ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata): 200 POST http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata 0.228s 2020-12-14 02:18:42.917 193 DEBUG tempest.lib.common.rest_client [req-1d99b25e-3b88-4dce-ad12-924b62a369fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1", "key2": "value2", "key3": "value3"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1d99b25e-3b88-4dce-ad12-924b62a369fb', 'content-length': '68', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1d99b25e-3b88-4dce-ad12-924b62a369fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata'} Body: b'{"metadata": {"key2": "value2", "key3": "value3", "key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:42.932 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:42.949 186 INFO tempest.lib.common.rest_client [req-25490176-7c33-4538-9ac4-862fe3aaf9fc ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:18:42.952 186 DEBUG tempest.lib.common.rest_client [req-25490176-7c33-4538-9ac4-862fe3aaf9fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25490176-7c33-4538-9ac4-862fe3aaf9fc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["_AmGw5BsRrCqsmrpf_qs0w"], "expires_at": "2020-12-14T03:18:42.000000Z", "issued_at": "2020-12-14T02:18:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.002 193 INFO tempest.lib.common.rest_client [req-4ce9f1b0-cb27-4e4e-be1e-3610713bcad5 ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata): 200 GET http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles 0.064s 2020-12-14 02:18:43.006 193 DEBUG tempest.lib.common.rest_client [req-4ce9f1b0-cb27-4e4e-be1e-3610713bcad5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ce9f1b0-cb27-4e4e-be1e-3610713bcad5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.023 186 INFO tempest.lib.common.rest_client [req-c5b4450c-b253-4359-9af8-4d621df3fb55 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.063s 2020-12-14 02:18:43.025 186 DEBUG tempest.lib.common.rest_client [req-c5b4450c-b253-4359-9af8-4d621df3fb55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c5b4450c-b253-4359-9af8-4d621df3fb55', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.032 197 INFO tempest.lib.common.rest_client [req-bb312c18-3f21-4e45-86f0-3ebb65c62fce ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.208s 2020-12-14 02:18:43.035 197 DEBUG tempest.lib.common.rest_client [req-bb312c18-3f21-4e45-86f0-3ebb65c62fce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bb312c18-3f21-4e45-86f0-3ebb65c62fce', 'x-compute-request-id': 'req-bb312c18-3f21-4e45-86f0-3ebb65c62fce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.060 193 INFO tempest.lib.common.rest_client [req-7247febe-05bb-40e1-a311-45004f8a3652 ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:18:43.064 193 DEBUG tempest.lib.common.rest_client [req-7247febe-05bb-40e1-a311-45004f8a3652 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7247febe-05bb-40e1-a311-45004f8a3652', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "539742cb43b2420195668c52b7d7dce9", "name": "tempest-SnapshotMetadataV3RbacTest-599363395", "password_expires_at": null}, "audit_ids": ["5bpHSCybTFebTvufIpObLg"], "expires_at": "2020-12-14T03:18:43.000000Z", "issued_at": "2020-12-14T02:18:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6686db654814a049859a68b2cfea6f5", "name": "tempest-SnapshotMetadataV3RbacTest-599363395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.099 186 INFO tempest.lib.common.rest_client [req-253d5019-3895-461c-9a61-f9a0efec9218 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.067s 2020-12-14 02:18:43.102 186 DEBUG tempest.lib.common.rest_client [req-253d5019-3895-461c-9a61-f9a0efec9218 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571-desc", "domain_id": "default", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '402', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-253d5019-3895-461c-9a61-f9a0efec9218', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "bd0689aea9984970a31a908124b9f8f6", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571", "domain_id": "default", "description": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.107 189 INFO tempest.lib.common.rest_client [req-2c5c0b51-670f-4a6d-9a22-9276f1b8bcf9 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.238s 2020-12-14 02:18:43.110 189 DEBUG tempest.lib.common.rest_client [req-2c5c0b51-670f-4a6d-9a22-9276f1b8bcf9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2c5c0b51-670f-4a6d-9a22-9276f1b8bcf9', 'x-compute-request-id': 'req-2c5c0b51-670f-4a6d-9a22-9276f1b8bcf9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.222 186 INFO tempest.lib.common.rest_client [req-9e09a6c3-b95f-42d9-9b3e-4614f9de3b28 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.112s 2020-12-14 02:18:43.226 186 DEBUG tempest.lib.common.rest_client [req-9e09a6c3-b95f-42d9-9b3e-4614f9de3b28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571", "password": "C2%S=@MUT3NZwvy", "project_id": "bd0689aea9984970a31a908124b9f8f6", "email": "tempest-NetworkIpAvailabilityExtRbacTest-1555565924@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '420', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e09a6c3-b95f-42d9-9b3e-4614f9de3b28', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "bd0689aea9984970a31a908124b9f8f6", "email": "tempest-NetworkIpAvailabilityExtRbacTest-1555565924@example.com", "id": "94bf6f5b3cbc46828d24d6876d6958e4", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/94bf6f5b3cbc46828d24d6876d6958e4"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.271 193 INFO tempest.lib.common.rest_client [req-0e91e205-0c1a-4e36-a18c-fb255922cc4f ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata): 200 GET http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata 0.199s 2020-12-14 02:18:43.274 193 DEBUG tempest.lib.common.rest_client [req-0e91e205-0c1a-4e36-a18c-fb255922cc4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0e91e205-0c1a-4e36-a18c-fb255922cc4f', 'content-length': '68', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0e91e205-0c1a-4e36-a18c-fb255922cc4f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata'} Body: b'{"metadata": {"key2": "value2", "key3": "value3", "key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.289 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:43.290 186 INFO tempest.lib.common.rest_client [req-15f6aab1-d579-4cd3-a627-45d9a370baa8 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:18:43.292 186 DEBUG tempest.lib.common.rest_client [req-15f6aab1-d579-4cd3-a627-45d9a370baa8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15f6aab1-d579-4cd3-a627-45d9a370baa8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.356 193 INFO tempest.lib.common.rest_client [req-50eb96d5-799e-4946-ba82-797b65d97ce7 ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata): 200 GET http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles 0.060s 2020-12-14 02:18:43.358 193 DEBUG tempest.lib.common.rest_client [req-50eb96d5-799e-4946-ba82-797b65d97ce7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-50eb96d5-799e-4946-ba82-797b65d97ce7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.359 186 INFO tempest.lib.common.rest_client [req-15538737-32c8-4f2e-b3f4-1991fbe272ca ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-12-14 02:18:43.362 186 DEBUG tempest.lib.common.rest_client [req-15538737-32c8-4f2e-b3f4-1991fbe272ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15538737-32c8-4f2e-b3f4-1991fbe272ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.410 193 INFO tempest.lib.common.rest_client [req-d574766f-9890-48f7-a0ce-d4ca4aa5ab3a ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:18:43.413 193 DEBUG tempest.lib.common.rest_client [req-d574766f-9890-48f7-a0ce-d4ca4aa5ab3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d574766f-9890-48f7-a0ce-d4ca4aa5ab3a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "539742cb43b2420195668c52b7d7dce9", "name": "tempest-SnapshotMetadataV3RbacTest-599363395", "password_expires_at": null}, "audit_ids": ["BeWzhB3RQEO_7GolSYpLdQ"], "expires_at": "2020-12-14T03:18:43.000000Z", "issued_at": "2020-12-14T02:18:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6686db654814a049859a68b2cfea6f5", "name": "tempest-SnapshotMetadataV3RbacTest-599363395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.427 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:43.445 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_tenant_attribute, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:43.446 186 INFO tempest.lib.common.rest_client [req-f6704b7b-35b6-437c-882f-2c35c97aea6b ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles/72a4576c553448cd941b052c1ca0cf2d 0.077s 2020-12-14 02:18:43.447 186 DEBUG tempest.lib.common.rest_client [req-f6704b7b-35b6-437c-882f-2c35c97aea6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6704b7b-35b6-437c-882f-2c35c97aea6b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.450 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NetworkIpAvailabilityExtRbacTest-1805837571', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'bd0689aea9984970a31a908124b9f8f6', 'project_name': 'tempest-NetworkIpAvailabilityExtRbacTest-1805837571', 'tenant_id': 'bd0689aea9984970a31a908124b9f8f6', 'tenant_name': 'tempest-NetworkIpAvailabilityExtRbacTest-1805837571', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '94bf6f5b3cbc46828d24d6876d6958e4'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:43.452 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NetworkIpAvailabilityExtRbacTest-1805837571', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'bd0689aea9984970a31a908124b9f8f6', 'project_name': 'tempest-NetworkIpAvailabilityExtRbacTest-1805837571', 'tenant_id': 'bd0689aea9984970a31a908124b9f8f6', 'tenant_name': 'tempest-NetworkIpAvailabilityExtRbacTest-1805837571', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '94bf6f5b3cbc46828d24d6876d6958e4'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:43.631 186 INFO tempest.lib.common.rest_client [req-b9ff5193-f334-4384-982b-bb0e36783516 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-12-14 02:18:43.634 186 DEBUG tempest.lib.common.rest_client [req-b9ff5193-f334-4384-982b-bb0e36783516 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6595', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9ff5193-f334-4384-982b-bb0e36783516', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "94bf6f5b3cbc46828d24d6876d6958e4", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571", "password_expires_at": null}, "audit_ids": ["PD4OXa7-R9ivWoFhb944Iw"], "expires_at": "2020-12-14T03:18:43.000000Z", "issued_at": "2020-12-14T02:18:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd0689aea9984970a31a908124b9f8f6", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "Region _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.638 186 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-12-14 02:18:43.665 193 INFO tempest.lib.common.rest_client [req-9c63ea97-b42f-457f-98a7-b4ed886ea6b7 ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata_for_volume_tenant): 200 POST http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata 0.213s 2020-12-14 02:18:43.669 193 DEBUG tempest.lib.common.rest_client [req-9c63ea97-b42f-457f-98a7-b4ed886ea6b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1", "key2": "value2", "key3": "value3"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9c63ea97-b42f-457f-98a7-b4ed886ea6b7', 'content-length': '68', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9c63ea97-b42f-457f-98a7-b4ed886ea6b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata'} Body: b'{"metadata": {"key2": "value2", "key3": "value3", "key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.682 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:43.763 186 INFO tempest.lib.common.rest_client [req-023ec116-f0fe-46ac-9de7-efc634eb14c9 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:18:43.767 186 DEBUG tempest.lib.common.rest_client [req-023ec116-f0fe-46ac-9de7-efc634eb14c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-023ec116-f0fe-46ac-9de7-efc634eb14c9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["1xMec4o4T8aVanigr4HJww"], "expires_at": "2020-12-14T03:18:43.000000Z", "issued_at": "2020-12-14T02:18:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.795 193 INFO tempest.lib.common.rest_client [req-cce3743a-ff01-4e77-90f0-a8a302083e14 ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata_for_volume_tenant): 200 GET http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles 0.107s 2020-12-14 02:18:43.799 193 DEBUG tempest.lib.common.rest_client [req-cce3743a-ff01-4e77-90f0-a8a302083e14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cce3743a-ff01-4e77-90f0-a8a302083e14', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.850 193 INFO tempest.lib.common.rest_client [req-2cc41952-43f6-4786-ab7d-85ce6fb6b875 ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata_for_volume_tenant): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:18:43.854 193 DEBUG tempest.lib.common.rest_client [req-2cc41952-43f6-4786-ab7d-85ce6fb6b875 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2cc41952-43f6-4786-ab7d-85ce6fb6b875', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "539742cb43b2420195668c52b7d7dce9", "name": "tempest-SnapshotMetadataV3RbacTest-599363395", "password_expires_at": null}, "audit_ids": ["YuB4ucU2SoGPcCuV4YAzbA"], "expires_at": "2020-12-14T03:18:43.000000Z", "issued_at": "2020-12-14T02:18:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6686db654814a049859a68b2cfea6f5", "name": "tempest-SnapshotMetadataV3RbacTest-599363395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.880 186 INFO tempest.lib.common.rest_client [req-dfc53986-ede8-49f4-8e91-1186424dd559 ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:18:43.884 186 DEBUG tempest.lib.common.rest_client [req-dfc53986-ede8-49f4-8e91-1186424dd559 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dfc53986-ede8-49f4-8e91-1186424dd559', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["NbOVNwmcTzm_o2zpzQ1ONQ"], "expires_at": "2020-12-14T03:18:43.000000Z", "issued_at": "2020-12-14T02:18:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.948 186 INFO tempest.lib.common.rest_client [req-f8cb9978-f845-4053-b883-f6bb99b681ad ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.057s 2020-12-14 02:18:43.951 186 DEBUG tempest.lib.common.rest_client [req-f8cb9978-f845-4053-b883-f6bb99b681ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8cb9978-f845-4053-b883-f6bb99b681ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.958 193 INFO tempest.lib.common.rest_client [req-121bc6fa-044a-4ed9-8f3b-99c9023f35c7 ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata_for_volume_tenant): 200 GET http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata 0.097s 2020-12-14 02:18:43.961 193 DEBUG tempest.lib.common.rest_client [req-121bc6fa-044a-4ed9-8f3b-99c9023f35c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-121bc6fa-044a-4ed9-8f3b-99c9023f35c7', 'content-length': '68', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-121bc6fa-044a-4ed9-8f3b-99c9023f35c7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata'} Body: b'{"metadata": {"key2": "value2", "key3": "value3", "key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:43.985 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:44.014 186 INFO tempest.lib.common.rest_client [req-8f21c47e-3669-4adb-848c-9c413bb8048d ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:18:44.016 186 DEBUG tempest.lib.common.rest_client [req-8f21c47e-3669-4adb-848c-9c413bb8048d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f21c47e-3669-4adb-848c-9c413bb8048d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:44.020 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:18:44.022 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:44.046 193 INFO tempest.lib.common.rest_client [req-81931e94-13f3-4f15-b515-ac75611af757 ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata_for_volume_tenant): 200 GET http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles 0.055s 2020-12-14 02:18:44.049 193 DEBUG tempest.lib.common.rest_client [req-81931e94-13f3-4f15-b515-ac75611af757 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81931e94-13f3-4f15-b515-ac75611af757', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:44.087 186 INFO tempest.lib.common.rest_client [req-e392e803-e385-4121-b01f-183e23a07bce ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles 0.059s 2020-12-14 02:18:44.090 186 DEBUG tempest.lib.common.rest_client [req-e392e803-e385-4121-b01f-183e23a07bce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e392e803-e385-4121-b01f-183e23a07bce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:44.097 193 INFO tempest.lib.common.rest_client [req-77e47995-69bf-469c-9049-0f2d4b5e3161 ] Request (SnapshotMetadataV3RbacTest:test_get_snapshot_metadata_for_volume_tenant): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:18:44.101 193 DEBUG tempest.lib.common.rest_client [req-77e47995-69bf-469c-9049-0f2d4b5e3161 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-77e47995-69bf-469c-9049-0f2d4b5e3161', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "539742cb43b2420195668c52b7d7dce9", "name": "tempest-SnapshotMetadataV3RbacTest-599363395", "password_expires_at": null}, "audit_ids": ["ZttiqHTXT6qISyjwO30VOA"], "expires_at": "2020-12-14T03:18:44.000000Z", "issued_at": "2020-12-14T02:18:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6686db654814a049859a68b2cfea6f5", "name": "tempest-SnapshotMetadataV3RbacTest-599363395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:44.115 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:44.134 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_snapshot_metadata, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:44.169 186 INFO tempest.lib.common.rest_client [req-b3cb9c39-5230-429f-8dba-d0bf43172b7e ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles/72a4576c553448cd941b052c1ca0cf2d 0.072s 2020-12-14 02:18:44.171 186 DEBUG tempest.lib.common.rest_client [req-b3cb9c39-5230-429f-8dba-d0bf43172b7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3cb9c39-5230-429f-8dba-d0bf43172b7e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:44.292 186 INFO tempest.lib.common.rest_client [req-c690fed3-a11c-43b5-b791-24662db0dc4a ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles/a629c95d64b3416fb80ae90af4f69c05 0.114s 2020-12-14 02:18:44.294 186 DEBUG tempest.lib.common.rest_client [req-c690fed3-a11c-43b5-b791-24662db0dc4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c690fed3-a11c-43b5-b791-24662db0dc4a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:44.362 193 INFO tempest.lib.common.rest_client [req-4d6d1d93-d416-4f2f-8887-1a0b5994c3da ] Request (SnapshotMetadataV3RbacTest:test_show_snapshot_metadata_item): 200 POST http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata 0.222s 2020-12-14 02:18:44.365 193 DEBUG tempest.lib.common.rest_client [req-4d6d1d93-d416-4f2f-8887-1a0b5994c3da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1", "key2": "value2", "key3": "value3"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4d6d1d93-d416-4f2f-8887-1a0b5994c3da', 'content-length': '68', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4d6d1d93-d416-4f2f-8887-1a0b5994c3da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata'} Body: b'{"metadata": {"key2": "value2", "key3": "value3", "key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:44.380 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:44.438 197 INFO tempest.lib.common.rest_client [req-12d0ca88-33fb-43f7-b55f-d67c9768f72a ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.289s 2020-12-14 02:18:44.442 197 DEBUG tempest.lib.common.rest_client [req-12d0ca88-33fb-43f7-b55f-d67c9768f72a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-12d0ca88-33fb-43f7-b55f-d67c9768f72a', 'x-compute-request-id': 'req-12d0ca88-33fb-43f7-b55f-d67c9768f72a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:44.496 193 INFO tempest.lib.common.rest_client [req-c8e03e3b-48fc-4270-a8d1-7aa88df890e4 ] Request (SnapshotMetadataV3RbacTest:test_show_snapshot_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles 0.110s 2020-12-14 02:18:44.498 189 INFO tempest.lib.common.rest_client [req-b6fe9dcb-8dd0-46a9-bfb9-be55a8c5f943 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.273s 2020-12-14 02:18:44.500 193 DEBUG tempest.lib.common.rest_client [req-c8e03e3b-48fc-4270-a8d1-7aa88df890e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8e03e3b-48fc-4270-a8d1-7aa88df890e4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:44.501 189 DEBUG tempest.lib.common.rest_client [req-b6fe9dcb-8dd0-46a9-bfb9-be55a8c5f943 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b6fe9dcb-8dd0-46a9-bfb9-be55a8c5f943', 'x-compute-request-id': 'req-b6fe9dcb-8dd0-46a9-bfb9-be55a8c5f943', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:44.594 193 INFO tempest.lib.common.rest_client [req-d1bd41a9-8e31-4a2c-98a7-8c553cb56e14 ] Request (SnapshotMetadataV3RbacTest:test_show_snapshot_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-14 02:18:44.596 193 DEBUG tempest.lib.common.rest_client [req-d1bd41a9-8e31-4a2c-98a7-8c553cb56e14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1bd41a9-8e31-4a2c-98a7-8c553cb56e14', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "539742cb43b2420195668c52b7d7dce9", "name": "tempest-SnapshotMetadataV3RbacTest-599363395", "password_expires_at": null}, "audit_ids": ["6n7cjzNQRCuHOmwdttjAhg"], "expires_at": "2020-12-14T03:18:44.000000Z", "issued_at": "2020-12-14T02:18:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6686db654814a049859a68b2cfea6f5", "name": "tempest-SnapshotMetadataV3RbacTest-599363395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:44.748 193 INFO tempest.lib.common.rest_client [req-1a81e2c7-4748-4377-be8c-8137cca2491e ] Request (SnapshotMetadataV3RbacTest:test_show_snapshot_metadata_item): 200 GET http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata/key3 0.144s 2020-12-14 02:18:44.752 193 DEBUG tempest.lib.common.rest_client [req-1a81e2c7-4748-4377-be8c-8137cca2491e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1a81e2c7-4748-4377-be8c-8137cca2491e', 'content-length': '28', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1a81e2c7-4748-4377-be8c-8137cca2491e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata/key3'} Body: b'{"meta": {"key3": "value3"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:44.767 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:44.828 193 INFO tempest.lib.common.rest_client [req-37bf6b81-dfd5-49dd-9bc7-acf7657e64a8 ] Request (SnapshotMetadataV3RbacTest:test_show_snapshot_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles 0.055s 2020-12-14 02:18:44.831 193 DEBUG tempest.lib.common.rest_client [req-37bf6b81-dfd5-49dd-9bc7-acf7657e64a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-37bf6b81-dfd5-49dd-9bc7-acf7657e64a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:44.876 193 INFO tempest.lib.common.rest_client [req-71da1dcc-bd50-4133-8ccd-306e9e827fb6 ] Request (SnapshotMetadataV3RbacTest:test_show_snapshot_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:18:44.880 193 DEBUG tempest.lib.common.rest_client [req-71da1dcc-bd50-4133-8ccd-306e9e827fb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-71da1dcc-bd50-4133-8ccd-306e9e827fb6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "539742cb43b2420195668c52b7d7dce9", "name": "tempest-SnapshotMetadataV3RbacTest-599363395", "password_expires_at": null}, "audit_ids": ["x24KQQzfQbSM6ZZI99bwHw"], "expires_at": "2020-12-14T03:18:44.000000Z", "issued_at": "2020-12-14T02:18:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6686db654814a049859a68b2cfea6f5", "name": "tempest-SnapshotMetadataV3RbacTest-599363395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:44.894 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:44.911 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:update_snapshot_metadata, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:45.054 193 INFO tempest.lib.common.rest_client [req-d1a2dd4f-6dec-4452-b395-7728e805042b ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata): 200 POST http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata 0.137s 2020-12-14 02:18:45.057 193 DEBUG tempest.lib.common.rest_client [req-d1a2dd4f-6dec-4452-b395-7728e805042b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1", "key2": "value2", "key3": "value3"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d1a2dd4f-6dec-4452-b395-7728e805042b', 'content-length': '68', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d1a2dd4f-6dec-4452-b395-7728e805042b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata'} Body: b'{"metadata": {"key2": "value2", "key3": "value3", "key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.072 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:45.139 193 INFO tempest.lib.common.rest_client [req-dd2d5b8d-f2ff-45a2-a448-ca049eba72bc ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata): 200 GET http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles 0.061s 2020-12-14 02:18:45.142 193 DEBUG tempest.lib.common.rest_client [req-dd2d5b8d-f2ff-45a2-a448-ca049eba72bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dd2d5b8d-f2ff-45a2-a448-ca049eba72bc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.190 193 INFO tempest.lib.common.rest_client [req-d144cd95-5eb0-43db-a0e4-ca5384969e45 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:18:45.192 193 DEBUG tempest.lib.common.rest_client [req-d144cd95-5eb0-43db-a0e4-ca5384969e45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d144cd95-5eb0-43db-a0e4-ca5384969e45', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "539742cb43b2420195668c52b7d7dce9", "name": "tempest-SnapshotMetadataV3RbacTest-599363395", "password_expires_at": null}, "audit_ids": ["bb29wZFyQj2Hc6go4gDIzQ"], "expires_at": "2020-12-14T03:18:45.000000Z", "issued_at": "2020-12-14T02:18:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6686db654814a049859a68b2cfea6f5", "name": "tempest-SnapshotMetadataV3RbacTest-599363395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.344 193 INFO tempest.lib.common.rest_client [req-e3332365-cb44-4ea9-80e3-eecb8d71accc ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata): 200 PUT http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata 0.144s 2020-12-14 02:18:45.347 193 DEBUG tempest.lib.common.rest_client [req-e3332365-cb44-4ea9-80e3-eecb8d71accc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key3": "value3_update", "key4": "value4"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e3332365-cb44-4ea9-80e3-eecb8d71accc', 'content-length': '57', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e3332365-cb44-4ea9-80e3-eecb8d71accc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata'} Body: b'{"metadata": {"key3": "value3_update", "key4": "value4"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.364 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:45.396 186 INFO tempest.lib.common.rest_client [req-58c57498-0149-47ab-a05f-3ff14347c1ba ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:18:45.400 186 DEBUG tempest.lib.common.rest_client [req-58c57498-0149-47ab-a05f-3ff14347c1ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58c57498-0149-47ab-a05f-3ff14347c1ba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "94bf6f5b3cbc46828d24d6876d6958e4", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571", "password_expires_at": null}, "audit_ids": ["A3JsDkl4TGOMSrhy2hHPjw"], "expires_at": "2020-12-14T03:18:45.000000Z", "issued_at": "2020-12-14T02:18:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd0689aea9984970a31a908124b9f8f6", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.438 193 INFO tempest.lib.common.rest_client [req-751bd218-fbf8-43d6-b939-ab9555e08f67 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata): 200 GET http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles 0.068s 2020-12-14 02:18:45.441 193 DEBUG tempest.lib.common.rest_client [req-751bd218-fbf8-43d6-b939-ab9555e08f67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-751bd218-fbf8-43d6-b939-ab9555e08f67', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.452 186 INFO tempest.lib.common.rest_client [req-9bd2890a-f46a-4707-979a-359ab506e0bc ] Request (NetworkIpAvailabilityExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:18:45.455 186 DEBUG tempest.lib.common.rest_client [req-9bd2890a-f46a-4707-979a-359ab506e0bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9bd2890a-f46a-4707-979a-359ab506e0bc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "94bf6f5b3cbc46828d24d6876d6958e4", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571", "password_expires_at": null}, "audit_ids": ["dAWJ-3j3QDiHWQWpa0Z73A"], "expires_at": "2020-12-14T03:18:45.000000Z", "issued_at": "2020-12-14T02:18:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd0689aea9984970a31a908124b9f8f6", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.465 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:45.489 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network_ip_availability, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:45.489 193 INFO tempest.lib.common.rest_client [req-dbd94c7c-8b31-42f5-8225-b7c8c45675c4 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:18:45.493 193 DEBUG tempest.lib.common.rest_client [req-dbd94c7c-8b31-42f5-8225-b7c8c45675c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dbd94c7c-8b31-42f5-8225-b7c8c45675c4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "539742cb43b2420195668c52b7d7dce9", "name": "tempest-SnapshotMetadataV3RbacTest-599363395", "password_expires_at": null}, "audit_ids": ["N9k7tIR0QtKY3HH6md9v8Q"], "expires_at": "2020-12-14T03:18:45.000000Z", "issued_at": "2020-12-14T02:18:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6686db654814a049859a68b2cfea6f5", "name": "tempest-SnapshotMetadataV3RbacTest-599363395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.508 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:45.525 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:update_snapshot_metadata, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:45.640 186 INFO tempest.lib.common.rest_client [req-827e25ef-d034-46b1-828e-5e71388e3752 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availabilities): 200 GET http://172.30.13.94:9696/v2.0/network-ip-availabilities 0.145s 2020-12-14 02:18:45.646 186 DEBUG tempest.lib.common.rest_client [req-827e25ef-d034-46b1-828e-5e71388e3752 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '31078', 'x-openstack-request-id': 'req-827e25ef-d034-46b1-828e-5e71388e3752', 'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/network-ip-availabilities'} Body: b'{"network_ip_availabilities": [{"network_id": "0271f828-506d-471c-80e1-655c753a8b19", "network_name": "tempest-MultipleCreateTestJSON-190587910-network", "tenant_id": "8324c3ca97db4ac59b569d6bbbcffa09", "project_id": "8324c3ca97db4ac59b569d6bbbcffa09", "subnet_ip_availability": [{"subnet_id": "de943adb-63ef-40f8-8985-a23207d72968", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-190587910-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "063503db-115b-4919-a9a6-1f3519d69592", "network_name": "tempest-test-network--1200798417", "tenant_id": "2cdd20738a884c61a2383ca16c2d69c9", "project_id": "2cdd20738a884c61a2383ca16c2d69c9", "subnet_ip_availability": [], "used_ips": 0, "total_ips": 0}, {"network_id": "09616387-dfe6-4d1f-9c5a-0be30adf60e8", "network_name": "tempest-MultipleCreateTestJSON-1784355696-network", "tenant_id": "aecfcc6a08a941db927cdcc1561d2427", "project_id": "aecfcc6a08a941db927cdcc1561d2427", "subnet_ip_availability": [{"subnet_id": "a48a10af-d181-472e-ab9d-2b3defb56fad", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-1784355696-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "0d133d7f-cfa3-406c-bf2e-9e2becbbe589", "network_name": "tempest-MultipleCreateTestJSON-1880416163-network", "tenant_id": "dc83be2a868748cc9397fd7cb6675c26", "project_id": "dc83be2a868748cc9397fd7cb6675c26", "subnet_ip_availability": [{"subnet_id": "5f072df7-c9f6-4538-8ff5-cab14f8d28a9", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-1880416163-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "11e7deb5-beae-4249-9f34-285ba605afd2", "network_name": "patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "tenant_id": "3cc32870ea9c4124a18f8824ceee8b29", "project_id": "3cc32870ea9c4124a18f8824ceee8b29", "subnet_ip_availability": [{"subnet_id": "410abf33-6f29-4217-ac80-d3f2fac8eea9", "ip_version": 4, "cidr": "192.168.120.0/24", "subnet_name": "patrole_reader-subnet_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "used_ips": 2, "total_ips": 253}], "used_ips": 2, "total_ips": 253}, {"network_id": "124e719e-8437-47a4-973c-977c7c572a7d", "network_name": "tempest-MultipleCreateTestJSON-1295474568-network", "tenant_id": "16e6f4f0a4a944488c7f25eb06ee42d3", "project_id": "16e6f4f0a4a944488c7f25eb06ee42d3", "subnet_ip_availability": [{"subnet_id": "0c611d55-9a54-4412-a450-cbf7410de51a", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-1295474568-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "1349c40f-b4d6-4ba8-bebb-b7551d1c2049", "network_name": "tempest-MultipleCreateTestJSON-1164513363-network", "tenant_id": "c51bc1ec25c34695b2407d43920cec51", "project_id": "c51bc1ec25c34695b2407d43920cec51", "subnet_ip_availability": [{"subnet_id": "d16d468f-6259-41a0-9606-8910f57ba562", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-1164513363-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "1c02029e-3385-4b0f-8ea8-64f5a5e9c878", "network_name": "private", "tenant_id": "76550dbb2e094ea8b53f0ef35fc93342", "project_id": "76550dbb2e094ea8b53f0ef35fc93342", "subnet_ip_availability": [{"subnet_id": "026ed5dd-3740-4409-bbff-427502b63344", "ip_version": 4, "cidr": "10.0.0.0/26", "subnet_name": "private-subnet", "used_ips": 2, "total_ips": 61}, {"subnet_id": "91f28f82-50f3-4858-baa0-c00af5a09fba", "ip_version": 6, "cidr": "fd45:7793:ed2b::/64", "subnet_name": "ipv6-private-subnet", "used_ips": 2, "total_ips": 18446744073709551614}], "used_ips": 4, "total_ips": 18446744073709551675}, {"network_id": "1c085583-16aa-4f2c-b48c-e9cce6ab197b", "network_name": "tempest-ServerActionsRbacTest-2074532455-network", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "project_id": "3400d8caa66043d0b7fa128b68a28ecc", "subnet_ip_availability": [{"subnet_id": "44ba7c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.654 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:45.676 193 INFO tempest.lib.common.rest_client [req-1ddb6892-f7aa-4d57-82a6-4bbec7c3e6a8 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata_item): 200 POST http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata 0.145s 2020-12-14 02:18:45.679 193 DEBUG tempest.lib.common.rest_client [req-1ddb6892-f7aa-4d57-82a6-4bbec7c3e6a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1", "key2": "value2", "key3": "value3"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1ddb6892-f7aa-4d57-82a6-4bbec7c3e6a8', 'content-length': '86', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1ddb6892-f7aa-4d57-82a6-4bbec7c3e6a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata'} Body: b'{"metadata": {"key3": "value3", "key4": "value4", "key1": "value1", "key2": "value2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.693 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:45.720 186 INFO tempest.lib.common.rest_client [req-2718187d-4190-4523-a3e4-391a678ac3f9 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availabilities): 200 GET http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles 0.059s 2020-12-14 02:18:45.723 186 DEBUG tempest.lib.common.rest_client [req-2718187d-4190-4523-a3e4-391a678ac3f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2718187d-4190-4523-a3e4-391a678ac3f9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.763 193 INFO tempest.lib.common.rest_client [req-93e7bfa6-7216-427b-b2f0-32be3306caa8 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles 0.063s 2020-12-14 02:18:45.766 193 DEBUG tempest.lib.common.rest_client [req-93e7bfa6-7216-427b-b2f0-32be3306caa8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93e7bfa6-7216-427b-b2f0-32be3306caa8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.775 186 INFO tempest.lib.common.rest_client [req-50263c47-05ed-4810-a64f-6d5ca318f6cb ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availabilities): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:18:45.780 186 DEBUG tempest.lib.common.rest_client [req-50263c47-05ed-4810-a64f-6d5ca318f6cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-50263c47-05ed-4810-a64f-6d5ca318f6cb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "94bf6f5b3cbc46828d24d6876d6958e4", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571", "password_expires_at": null}, "audit_ids": ["k-8D2XXlT3mKLusVo3cvkw"], "expires_at": "2020-12-14T03:18:45.000000Z", "issued_at": "2020-12-14T02:18:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd0689aea9984970a31a908124b9f8f6", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.816 193 INFO tempest.lib.common.rest_client [req-3459b0ae-5d31-4c5d-b2eb-f3965d656a94 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:18:45.821 193 DEBUG tempest.lib.common.rest_client [req-3459b0ae-5d31-4c5d-b2eb-f3965d656a94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3459b0ae-5d31-4c5d-b2eb-f3965d656a94', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "539742cb43b2420195668c52b7d7dce9", "name": "tempest-SnapshotMetadataV3RbacTest-599363395", "password_expires_at": null}, "audit_ids": ["aVPTZHgcS6C8-EnqK6Z4KQ"], "expires_at": "2020-12-14T03:18:45.000000Z", "issued_at": "2020-12-14T02:18:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6686db654814a049859a68b2cfea6f5", "name": "tempest-SnapshotMetadataV3RbacTest-599363395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.830 186 INFO tempest.lib.common.rest_client [req-0f5078e9-42d9-45f0-9f31-de9b72200e76 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availabilities): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:18:45.833 186 DEBUG tempest.lib.common.rest_client [req-0f5078e9-42d9-45f0-9f31-de9b72200e76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f5078e9-42d9-45f0-9f31-de9b72200e76', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "94bf6f5b3cbc46828d24d6876d6958e4", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571", "password_expires_at": null}, "audit_ids": ["XA3Fmqe4RKWiqd9SwQ4YHg"], "expires_at": "2020-12-14T03:18:45.000000Z", "issued_at": "2020-12-14T02:18:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd0689aea9984970a31a908124b9f8f6", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.845 197 INFO tempest.lib.common.rest_client [req-cfda6c8e-e6c1-4b8a-84e8-2cef9343844c ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.298s 2020-12-14 02:18:45.848 197 DEBUG tempest.lib.common.rest_client [req-cfda6c8e-e6c1-4b8a-84e8-2cef9343844c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cfda6c8e-e6c1-4b8a-84e8-2cef9343844c', 'x-compute-request-id': 'req-cfda6c8e-e6c1-4b8a-84e8-2cef9343844c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.848 189 INFO tempest.lib.common.rest_client [req-fa26587e-f5e4-4342-8eb3-dfe6337b1013 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.239s 2020-12-14 02:18:45.851 189 DEBUG tempest.lib.common.rest_client [req-fa26587e-f5e4-4342-8eb3-dfe6337b1013 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fa26587e-f5e4-4342-8eb3-dfe6337b1013', 'x-compute-request-id': 'req-fa26587e-f5e4-4342-8eb3-dfe6337b1013', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.942 186 INFO tempest.lib.common.rest_client [req-de322666-3a45-4411-ab11-09f1df13e4dc ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availabilities): 200 GET http://172.30.13.94:9696/v2.0/network-ip-availabilities 0.101s 2020-12-14 02:18:45.947 186 DEBUG tempest.lib.common.rest_client [req-de322666-3a45-4411-ab11-09f1df13e4dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '31078', 'x-openstack-request-id': 'req-de322666-3a45-4411-ab11-09f1df13e4dc', 'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/network-ip-availabilities'} Body: b'{"network_ip_availabilities": [{"network_id": "0271f828-506d-471c-80e1-655c753a8b19", "network_name": "tempest-MultipleCreateTestJSON-190587910-network", "tenant_id": "8324c3ca97db4ac59b569d6bbbcffa09", "project_id": "8324c3ca97db4ac59b569d6bbbcffa09", "subnet_ip_availability": [{"subnet_id": "de943adb-63ef-40f8-8985-a23207d72968", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-190587910-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "063503db-115b-4919-a9a6-1f3519d69592", "network_name": "tempest-test-network--1200798417", "tenant_id": "2cdd20738a884c61a2383ca16c2d69c9", "project_id": "2cdd20738a884c61a2383ca16c2d69c9", "subnet_ip_availability": [], "used_ips": 0, "total_ips": 0}, {"network_id": "09616387-dfe6-4d1f-9c5a-0be30adf60e8", "network_name": "tempest-MultipleCreateTestJSON-1784355696-network", "tenant_id": "aecfcc6a08a941db927cdcc1561d2427", "project_id": "aecfcc6a08a941db927cdcc1561d2427", "subnet_ip_availability": [{"subnet_id": "a48a10af-d181-472e-ab9d-2b3defb56fad", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-1784355696-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "0d133d7f-cfa3-406c-bf2e-9e2becbbe589", "network_name": "tempest-MultipleCreateTestJSON-1880416163-network", "tenant_id": "dc83be2a868748cc9397fd7cb6675c26", "project_id": "dc83be2a868748cc9397fd7cb6675c26", "subnet_ip_availability": [{"subnet_id": "5f072df7-c9f6-4538-8ff5-cab14f8d28a9", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-1880416163-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "11e7deb5-beae-4249-9f34-285ba605afd2", "network_name": "patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "tenant_id": "3cc32870ea9c4124a18f8824ceee8b29", "project_id": "3cc32870ea9c4124a18f8824ceee8b29", "subnet_ip_availability": [{"subnet_id": "410abf33-6f29-4217-ac80-d3f2fac8eea9", "ip_version": 4, "cidr": "192.168.120.0/24", "subnet_name": "patrole_reader-subnet_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "used_ips": 2, "total_ips": 253}], "used_ips": 2, "total_ips": 253}, {"network_id": "124e719e-8437-47a4-973c-977c7c572a7d", "network_name": "tempest-MultipleCreateTestJSON-1295474568-network", "tenant_id": "16e6f4f0a4a944488c7f25eb06ee42d3", "project_id": "16e6f4f0a4a944488c7f25eb06ee42d3", "subnet_ip_availability": [{"subnet_id": "0c611d55-9a54-4412-a450-cbf7410de51a", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-1295474568-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "1349c40f-b4d6-4ba8-bebb-b7551d1c2049", "network_name": "tempest-MultipleCreateTestJSON-1164513363-network", "tenant_id": "c51bc1ec25c34695b2407d43920cec51", "project_id": "c51bc1ec25c34695b2407d43920cec51", "subnet_ip_availability": [{"subnet_id": "d16d468f-6259-41a0-9606-8910f57ba562", "ip_version": 4, "cidr": "192.168.120.0/28", "subnet_name": "tempest-MultipleCreateTestJSON-1164513363-subnet", "used_ips": 0, "total_ips": 13}], "used_ips": 0, "total_ips": 13}, {"network_id": "1c02029e-3385-4b0f-8ea8-64f5a5e9c878", "network_name": "private", "tenant_id": "76550dbb2e094ea8b53f0ef35fc93342", "project_id": "76550dbb2e094ea8b53f0ef35fc93342", "subnet_ip_availability": [{"subnet_id": "026ed5dd-3740-4409-bbff-427502b63344", "ip_version": 4, "cidr": "10.0.0.0/26", "subnet_name": "private-subnet", "used_ips": 2, "total_ips": 61}, {"subnet_id": "91f28f82-50f3-4858-baa0-c00af5a09fba", "ip_version": 6, "cidr": "fd45:7793:ed2b::/64", "subnet_name": "ipv6-private-subnet", "used_ips": 2, "total_ips": 18446744073709551614}], "used_ips": 4, "total_ips": 18446744073709551675}, {"network_id": "1c085583-16aa-4f2c-b48c-e9cce6ab197b", "network_name": "tempest-ServerActionsRbacTest-2074532455-network", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "project_id": "3400d8caa66043d0b7fa128b68a28ecc", "subnet_ip_availability": [{"subnet_id": "44ba7c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.956 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:45.957 193 INFO tempest.lib.common.rest_client [req-c2276d37-f527-43dd-8d36-445614d28d25 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata_item): 200 PUT http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata/key3 0.129s 2020-12-14 02:18:45.960 193 DEBUG tempest.lib.common.rest_client [req-c2276d37-f527-43dd-8d36-445614d28d25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"meta": {"key3": "value3_update"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c2276d37-f527-43dd-8d36-445614d28d25', 'content-length': '35', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c2276d37-f527-43dd-8d36-445614d28d25', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710/metadata/key3'} Body: b'{"meta": {"key3": "value3_update"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:45.976 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:46.022 186 INFO tempest.lib.common.rest_client [req-d136f092-76da-4ca9-ba2d-81673e498ba3 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availabilities): 200 GET http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles 0.060s 2020-12-14 02:18:46.025 186 DEBUG tempest.lib.common.rest_client [req-d136f092-76da-4ca9-ba2d-81673e498ba3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d136f092-76da-4ca9-ba2d-81673e498ba3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:46.044 193 INFO tempest.lib.common.rest_client [req-5f6e4f8e-ab04-4748-83e7-02361e1efc50 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles 0.062s 2020-12-14 02:18:46.047 193 DEBUG tempest.lib.common.rest_client [req-5f6e4f8e-ab04-4748-83e7-02361e1efc50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f6e4f8e-ab04-4748-83e7-02361e1efc50', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5/users/539742cb43b2420195668c52b7d7dce9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:46.075 186 INFO tempest.lib.common.rest_client [req-c3fd62db-ec14-4343-a739-64c3d1a66947 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availabilities): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:18:46.078 186 DEBUG tempest.lib.common.rest_client [req-c3fd62db-ec14-4343-a739-64c3d1a66947 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c3fd62db-ec14-4343-a739-64c3d1a66947', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "94bf6f5b3cbc46828d24d6876d6958e4", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571", "password_expires_at": null}, "audit_ids": ["JVDctrGIQ-WHaeVWccMnvg"], "expires_at": "2020-12-14T03:18:46.000000Z", "issued_at": "2020-12-14T02:18:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd0689aea9984970a31a908124b9f8f6", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:46.096 193 INFO tempest.lib.common.rest_client [req-ba69a909-54f5-4852-8880-da8e04a685d5 ] Request (SnapshotMetadataV3RbacTest:test_update_snapshot_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:18:46.100 193 DEBUG tempest.lib.common.rest_client [req-ba69a909-54f5-4852-8880-da8e04a685d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba69a909-54f5-4852-8880-da8e04a685d5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "539742cb43b2420195668c52b7d7dce9", "name": "tempest-SnapshotMetadataV3RbacTest-599363395", "password_expires_at": null}, "audit_ids": ["ziT97m-RRPGf0Pt_dNWtdQ"], "expires_at": "2020-12-14T03:18:46.000000Z", "issued_at": "2020-12-14T02:18:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c6686db654814a049859a68b2cfea6f5", "name": "tempest-SnapshotMetadataV3RbacTest-599363395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c6686db654814a049859a68b2cfea6f5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:46.130 186 INFO tempest.lib.common.rest_client [req-b5ebf69d-ed05-4dd0-95dd-d599a704dec6 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availabilities): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:18:46.133 186 DEBUG tempest.lib.common.rest_client [req-b5ebf69d-ed05-4dd0-95dd-d599a704dec6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b5ebf69d-ed05-4dd0-95dd-d599a704dec6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "94bf6f5b3cbc46828d24d6876d6958e4", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571", "password_expires_at": null}, "audit_ids": ["UHCk5WOQT8SXdMBt7LbPlw"], "expires_at": "2020-12-14T03:18:46.000000Z", "issued_at": "2020-12-14T02:18:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd0689aea9984970a31a908124b9f8f6", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:46.150 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:46.173 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network_ip_availability, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:46.259 193 INFO tempest.lib.common.rest_client [req-0b81db5b-efd7-49e4-a4f0-bf56b4ba9266 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710 0.141s 2020-12-14 02:18:46.262 193 DEBUG tempest.lib.common.rest_client [req-0b81db5b-efd7-49e4-a4f0-bf56b4ba9266 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0b81db5b-efd7-49e4-a4f0-bf56b4ba9266', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:46.321 193 INFO tempest.lib.common.rest_client [req-3a746e22-9147-48db-a4bf-d510fce3dce9 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710 0.051s 2020-12-14 02:18:46.324 193 DEBUG tempest.lib.common.rest_client [req-3a746e22-9147-48db-a4bf-d510fce3dce9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3a746e22-9147-48db-a4bf-d510fce3dce9', 'content-length': '548', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3a746e22-9147-48db-a4bf-d510fce3dce9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710'} Body: b'{"snapshot": {"id": "58683219-b17f-4b4b-b9a2-ba700c39f710", "created_at": "2020-12-14T02:18:41.000000", "updated_at": "2020-12-14T02:18:46.000000", "name": "tempest-SnapshotMetadataV3RbacTest-Snapshot-1431261006", "description": null, "volume_id": "c08a8b5e-72a6-485b-ab95-3eb2700b45ef", "status": "deleting", "size": 1, "metadata": {"key3": "value3_update", "key4": "value4", "key1": "value1", "key2": "value2"}, "os-extended-snapshot-attributes:project_id": "c6686db654814a049859a68b2cfea6f5", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:46.778 186 INFO tempest.lib.common.rest_client [req-91f9ef2a-3291-496e-b584-9078e9d7f4db ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availability): 201 POST http://172.30.13.94:9696/v2.0/networks 0.598s 2020-12-14 02:18:46.782 186 DEBUG tempest.lib.common.rest_client [req-91f9ef2a-3291-496e-b584-9078e9d7f4db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworkIpAvailabilityExtRbacTest-Network-408266955"}} Response - Headers: {'content-type': 'application/json', 'content-length': '747', 'x-openstack-request-id': 'req-91f9ef2a-3291-496e-b584-9078e9d7f4db', 'date': 'Mon, 14 Dec 2020 02:18:46 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"3f823acc-7983-4018-86d0-9054d91a762c","name":"tempest-NetworkIpAvailabilityExtRbacTest-Network-408266955","tenant_id":"bd0689aea9984970a31a908124b9f8f6","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"bd0689aea9984970a31a908124b9f8f6","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":29,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:18:46Z","updated_at":"2020-12-14T02:18:46Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:46.785 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:46.851 186 INFO tempest.lib.common.rest_client [req-c1c6888d-fd8d-4adb-920c-67d737abdac6 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availability): 200 GET http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles 0.060s 2020-12-14 02:18:46.854 186 DEBUG tempest.lib.common.rest_client [req-c1c6888d-fd8d-4adb-920c-67d737abdac6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c1c6888d-fd8d-4adb-920c-67d737abdac6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:46.903 186 INFO tempest.lib.common.rest_client [req-0176d9d9-deff-406c-873e-50efbdb06dcb ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availability): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:18:46.906 186 DEBUG tempest.lib.common.rest_client [req-0176d9d9-deff-406c-873e-50efbdb06dcb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0176d9d9-deff-406c-873e-50efbdb06dcb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "94bf6f5b3cbc46828d24d6876d6958e4", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571", "password_expires_at": null}, "audit_ids": ["SqysPD1IRBamKIwa2fUjvA"], "expires_at": "2020-12-14T03:18:46.000000Z", "issued_at": "2020-12-14T02:18:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd0689aea9984970a31a908124b9f8f6", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:46.955 186 INFO tempest.lib.common.rest_client [req-388c772b-db66-4b59-92f7-5c0f1c1e3ab4 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availability): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:18:46.958 186 DEBUG tempest.lib.common.rest_client [req-388c772b-db66-4b59-92f7-5c0f1c1e3ab4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-388c772b-db66-4b59-92f7-5c0f1c1e3ab4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "94bf6f5b3cbc46828d24d6876d6958e4", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571", "password_expires_at": null}, "audit_ids": ["K9qib3wtT2S7BRTWGbws_w"], "expires_at": "2020-12-14T03:18:46.000000Z", "issued_at": "2020-12-14T02:18:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd0689aea9984970a31a908124b9f8f6", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:47.054 186 INFO tempest.lib.common.rest_client [req-dfe58f00-aa65-48b8-9d7e-427c21c5004f ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availability): 200 GET http://172.30.13.94:9696/v2.0/network-ip-availabilities/3f823acc-7983-4018-86d0-9054d91a762c 0.087s 2020-12-14 02:18:47.058 186 DEBUG tempest.lib.common.rest_client [req-dfe58f00-aa65-48b8-9d7e-427c21c5004f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '321', 'x-openstack-request-id': 'req-dfe58f00-aa65-48b8-9d7e-427c21c5004f', 'date': 'Mon, 14 Dec 2020 02:18:47 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/network-ip-availabilities/3f823acc-7983-4018-86d0-9054d91a762c'} Body: b'{"network_ip_availability": {"network_id": "3f823acc-7983-4018-86d0-9054d91a762c", "network_name": "tempest-NetworkIpAvailabilityExtRbacTest-Network-408266955", "tenant_id": "bd0689aea9984970a31a908124b9f8f6", "project_id": "bd0689aea9984970a31a908124b9f8f6", "subnet_ip_availability": [], "used_ips": 0, "total_ips": 0}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:47.062 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:47.137 186 INFO tempest.lib.common.rest_client [req-48fb8fec-948f-4566-aa46-b9a425eb5dc1 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availability): 200 GET http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles 0.069s 2020-12-14 02:18:47.141 186 DEBUG tempest.lib.common.rest_client [req-48fb8fec-948f-4566-aa46-b9a425eb5dc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-48fb8fec-948f-4566-aa46-b9a425eb5dc1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6/users/94bf6f5b3cbc46828d24d6876d6958e4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:47.174 197 INFO tempest.lib.common.rest_client [req-9e1513b7-6774-4abb-8c6d-8ad029d502a7 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.219s 2020-12-14 02:18:47.178 197 DEBUG tempest.lib.common.rest_client [req-9e1513b7-6774-4abb-8c6d-8ad029d502a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9e1513b7-6774-4abb-8c6d-8ad029d502a7', 'x-compute-request-id': 'req-9e1513b7-6774-4abb-8c6d-8ad029d502a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:47.191 186 INFO tempest.lib.common.rest_client [req-5cbdb510-0522-4697-9d5e-bc94b705e336 ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availability): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:18:47.194 186 DEBUG tempest.lib.common.rest_client [req-5cbdb510-0522-4697-9d5e-bc94b705e336 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5cbdb510-0522-4697-9d5e-bc94b705e336', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "94bf6f5b3cbc46828d24d6876d6958e4", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571", "password_expires_at": null}, "audit_ids": ["nGxOafVYQ5uNAjo69_6I1Q"], "expires_at": "2020-12-14T03:18:47.000000Z", "issued_at": "2020-12-14T02:18:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd0689aea9984970a31a908124b9f8f6", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:47.201 189 INFO tempest.lib.common.rest_client [req-cb2dbb4d-7b7f-4b11-8235-63e55748349b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.240s 2020-12-14 02:18:47.205 189 DEBUG tempest.lib.common.rest_client [req-cb2dbb4d-7b7f-4b11-8235-63e55748349b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cb2dbb4d-7b7f-4b11-8235-63e55748349b', 'x-compute-request-id': 'req-cb2dbb4d-7b7f-4b11-8235-63e55748349b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:47.245 186 INFO tempest.lib.common.rest_client [req-615ae701-28fe-4995-8b2f-7d71f4dccebb ] Request (NetworkIpAvailabilityExtRbacTest:test_get_network_ip_availability): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:18:47.248 186 DEBUG tempest.lib.common.rest_client [req-615ae701-28fe-4995-8b2f-7d71f4dccebb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-615ae701-28fe-4995-8b2f-7d71f4dccebb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "94bf6f5b3cbc46828d24d6876d6958e4", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571", "password_expires_at": null}, "audit_ids": ["afD1lRy5Ty2LqP_jhQ2f2g"], "expires_at": "2020-12-14T03:18:47.000000Z", "issued_at": "2020-12-14T02:18:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd0689aea9984970a31a908124b9f8f6", "name": "tempest-NetworkIpAvailabilityExtRbacTest-1805837571"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd0689aea9984970a31a908124b9f8f6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:47.423 193 INFO tempest.lib.common.rest_client [req-5dce48dd-18f6-4707-baed-690520e09d1b ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710 0.044s 2020-12-14 02:18:47.425 193 DEBUG tempest.lib.common.rest_client [req-5dce48dd-18f6-4707-baed-690520e09d1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5dce48dd-18f6-4707-baed-690520e09d1b', 'content-length': '548', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5dce48dd-18f6-4707-baed-690520e09d1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710'} Body: b'{"snapshot": {"id": "58683219-b17f-4b4b-b9a2-ba700c39f710", "created_at": "2020-12-14T02:18:41.000000", "updated_at": "2020-12-14T02:18:46.000000", "name": "tempest-SnapshotMetadataV3RbacTest-Snapshot-1431261006", "description": null, "volume_id": "c08a8b5e-72a6-485b-ab95-3eb2700b45ef", "status": "deleting", "size": 1, "metadata": {"key3": "value3_update", "key4": "value4", "key1": "value1", "key2": "value2"}, "os-extended-snapshot-attributes:project_id": "c6686db654814a049859a68b2cfea6f5", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:47.977 186 INFO tempest.lib.common.rest_client [req-2da9dc0a-bde1-4b6a-9d06-d2a70baf36c8 ] Request (NetworkIpAvailabilityExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/3f823acc-7983-4018-86d0-9054d91a762c 0.714s 2020-12-14 02:18:47.979 186 DEBUG tempest.lib.common.rest_client [req-2da9dc0a-bde1-4b6a-9d06-d2a70baf36c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-2da9dc0a-bde1-4b6a-9d06-d2a70baf36c8', 'date': 'Mon, 14 Dec 2020 02:18:47 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/3f823acc-7983-4018-86d0-9054d91a762c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:48.124 186 INFO tempest.lib.common.rest_client [req-ffc45b65-29ce-48a5-b41e-15c48a2d27b5 ] Request (NetworkIpAvailabilityExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/94bf6f5b3cbc46828d24d6876d6958e4 0.137s 2020-12-14 02:18:48.128 186 DEBUG tempest.lib.common.rest_client [req-ffc45b65-29ce-48a5-b41e-15c48a2d27b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ffc45b65-29ce-48a5-b41e-15c48a2d27b5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/94bf6f5b3cbc46828d24d6876d6958e4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:48.226 186 INFO tempest.lib.common.rest_client [req-3c8e754d-9c56-430f-8a60-5e420e858551 ] Request (NetworkIpAvailabilityExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:18:48.230 186 DEBUG tempest.lib.common.rest_client [req-3c8e754d-9c56-430f-8a60-5e420e858551 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c8e754d-9c56-430f-8a60-5e420e858551', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["OsssKRG3QtyV1EUhePO23A"], "expires_at": "2020-12-14T03:18:48.000000Z", "issued_at": "2020-12-14T02:18:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:48.403 186 INFO tempest.lib.common.rest_client [req-d56a66f0-06c1-4d40-9990-70e33c970ded ] Request (NetworkIpAvailabilityExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=bd0689aea9984970a31a908124b9f8f6&name=default 0.166s 2020-12-14 02:18:48.407 186 DEBUG tempest.lib.common.rest_client [req-d56a66f0-06c1-4d40-9990-70e33c970ded ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-d56a66f0-06c1-4d40-9990-70e33c970ded', 'date': 'Mon, 14 Dec 2020 02:18:48 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=bd0689aea9984970a31a908124b9f8f6&name=default'} Body: b'{"security_groups": [{"id": "b30c784b-0fc5-4f56-bbbc-dcedda4b7e5b", "name": "default", "stateful": true, "tenant_id": "bd0689aea9984970a31a908124b9f8f6", "description": "Default security group", "security_group_rules": [{"id": "35ac870e-0841-4caa-9ef9-4352718b385c", "tenant_id": "bd0689aea9984970a31a908124b9f8f6", "security_group_id": "b30c784b-0fc5-4f56-bbbc-dcedda4b7e5b", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:46Z", "updated_at": "2020-12-14T02:18:46Z", "revision_number": 0, "project_id": "bd0689aea9984970a31a908124b9f8f6"}, {"id": "7ce94a8a-4619-4057-a1c9-d24f498e24f3", "tenant_id": "bd0689aea9984970a31a908124b9f8f6", "security_group_id": "b30c784b-0fc5-4f56-bbbc-dcedda4b7e5b", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b30c784b-0fc5-4f56-bbbc-dcedda4b7e5b", "description": null, "tags": [], "created_at": "2020-12-14T02:18:46Z", "updated_at": "2020-12-14T02:18:46Z", "revision_number": 0, "project_id": "bd0689aea9984970a31a908124b9f8f6"}, {"id": "be491142-988b-4f63-b84d-7c53bdf3d079", "tenant_id": "bd0689aea9984970a31a908124b9f8f6", "security_group_id": "b30c784b-0fc5-4f56-bbbc-dcedda4b7e5b", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b30c784b-0fc5-4f56-bbbc-dcedda4b7e5b", "description": null, "tags": [], "created_at": "2020-12-14T02:18:46Z", "updated_at": "2020-12-14T02:18:46Z", "revision_number": 0, "project_id": "bd0689aea9984970a31a908124b9f8f6"}, {"id": "f1ce168c-af73-4db5-8778-f10a1263fb9a", "tenant_id": "bd0689aea9984970a31a908124b9f8f6", "security_group_id": "b30c784b-0fc5-4f56-bbbc-dcedda4b7e5b", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:46Z", "updated_at": "2020-12-14T02:18:46Z", "revision_number": 0, "project_id": "bd0689aea9984970a31a908124b9f8f6"}], "tags": [], "created_at": "2020-12-14T02:18:46Z", "updated_at": "2020-12-14T02:18:46Z", "revision_number": 1, "project_id": "bd0689aea9984970a31a908124b9f8f6"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:48.503 193 INFO tempest.lib.common.rest_client [req-e901e085-5a52-483f-aa72-29be695a44b3 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710 0.046s 2020-12-14 02:18:48.506 193 DEBUG tempest.lib.common.rest_client [req-e901e085-5a52-483f-aa72-29be695a44b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-e901e085-5a52-483f-aa72-29be695a44b3', 'x-openstack-request-id': 'req-e901e085-5a52-483f-aa72-29be695a44b3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/snapshots/58683219-b17f-4b4b-b9a2-ba700c39f710'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 58683219-b17f-4b4b-b9a2-ba700c39f710 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:48.547 186 INFO tempest.lib.common.rest_client [req-593787d9-aa9d-45df-96c7-b754b3f1a5e4 ] Request (NetworkIpAvailabilityExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/b30c784b-0fc5-4f56-bbbc-dcedda4b7e5b 0.134s 2020-12-14 02:18:48.549 186 DEBUG tempest.lib.common.rest_client [req-593787d9-aa9d-45df-96c7-b754b3f1a5e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-593787d9-aa9d-45df-96c7-b754b3f1a5e4', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:48 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/b30c784b-0fc5-4f56-bbbc-dcedda4b7e5b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:48.595 193 INFO tempest.lib.common.rest_client [req-eea70653-e298-42da-bfd4-d3e3ed3d2791 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef 0.084s 2020-12-14 02:18:48.597 193 DEBUG tempest.lib.common.rest_client [req-eea70653-e298-42da-bfd4-d3e3ed3d2791 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-eea70653-e298-42da-bfd4-d3e3ed3d2791', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:48.603 189 INFO tempest.lib.common.rest_client [req-c9a1f35a-97e9-4411-9fd7-365068409d4a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.292s 2020-12-14 02:18:48.606 189 DEBUG tempest.lib.common.rest_client [req-c9a1f35a-97e9-4411-9fd7-365068409d4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c9a1f35a-97e9-4411-9fd7-365068409d4a', 'x-compute-request-id': 'req-c9a1f35a-97e9-4411-9fd7-365068409d4a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:48.605 197 INFO tempest.lib.common.rest_client [req-c6148330-a0bd-4495-b619-226f3d1bc2c6 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.323s 2020-12-14 02:18:48.610 197 DEBUG tempest.lib.common.rest_client [req-c6148330-a0bd-4495-b619-226f3d1bc2c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c6148330-a0bd-4495-b619-226f3d1bc2c6', 'x-compute-request-id': 'req-c6148330-a0bd-4495-b619-226f3d1bc2c6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:48.682 186 INFO tempest.lib.common.rest_client [req-9523fd35-a6aa-4945-b2fb-b8c375ae4b9f ] Request (NetworkIpAvailabilityExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6 0.127s 2020-12-14 02:18:48.684 186 DEBUG tempest.lib.common.rest_client [req-9523fd35-a6aa-4945-b2fb-b8c375ae4b9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9523fd35-a6aa-4945-b2fb-b8c375ae4b9f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/bd0689aea9984970a31a908124b9f8f6'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:48.685 193 INFO tempest.lib.common.rest_client [req-19d78fbb-d4de-4fd9-87ba-6d6556ccacf1 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef 0.082s 2020-12-14 02:18:48.689 193 DEBUG tempest.lib.common.rest_client [req-19d78fbb-d4de-4fd9-87ba-6d6556ccacf1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-19d78fbb-d4de-4fd9-87ba-6d6556ccacf1', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-19d78fbb-d4de-4fd9-87ba-6d6556ccacf1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef'} Body: b'{"volume": {"id": "c08a8b5e-72a6-485b-ab95-3eb2700b45ef", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:39.000000", "updated_at": "2020-12-14T02:18:49.000000", "name": "tempest-SnapshotMetadataV3RbacTest-Volume-227656601", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef"}], "user_id": "539742cb43b2420195668c52b7d7dce9", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "c6686db654814a049859a68b2cfea6f5"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:48.796 186 INFO tempest.lib.common.rest_client [req-88fa3088-ea73-478e-b9f8-b0afbd0aad18 ] Request (NetworkSegmentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:18:48.800 186 DEBUG tempest.lib.common.rest_client [req-88fa3088-ea73-478e-b9f8-b0afbd0aad18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88fa3088-ea73-478e-b9f8-b0afbd0aad18', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["jNimBZ6ZRAWWNt3xLjpmFg"], "expires_at": "2020-12-14T03:18:48.000000Z", "issued_at": "2020-12-14T02:18:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:48.892 186 INFO tempest.lib.common.rest_client [req-7ad2d2da-752c-48ce-95cc-eb5c3cbe77be ] Request (NetworkSegmentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:18:48.895 186 DEBUG tempest.lib.common.rest_client [req-7ad2d2da-752c-48ce-95cc-eb5c3cbe77be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ad2d2da-752c-48ce-95cc-eb5c3cbe77be', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["8banUQQ_S12gPaYiJMeJfA"], "expires_at": "2020-12-14T03:18:48.000000Z", "issued_at": "2020-12-14T02:18:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:48.971 186 INFO tempest.lib.common.rest_client [req-6ff9afd6-bc33-44f0-bf74-bd4acbd8455f ] Request (NetworkSegmentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.067s 2020-12-14 02:18:48.974 186 DEBUG tempest.lib.common.rest_client [req-6ff9afd6-bc33-44f0-bf74-bd4acbd8455f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ff9afd6-bc33-44f0-bf74-bd4acbd8455f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:49.064 186 INFO tempest.lib.common.rest_client [req-4432dc46-2ab0-495e-aedd-f36119cd1a61 ] Request (NetworkSegmentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.083s 2020-12-14 02:18:49.067 186 DEBUG tempest.lib.common.rest_client [req-4432dc46-2ab0-495e-aedd-f36119cd1a61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-NetworkSegmentsRbacTest-1390973949-desc", "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-1390973949"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4432dc46-2ab0-495e-aedd-f36119cd1a61', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "f92fc125904344aab17ff9e885ea5d65", "name": "tempest-NetworkSegmentsRbacTest-1390973949", "domain_id": "default", "description": "tempest-NetworkSegmentsRbacTest-1390973949-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:49.274 186 INFO tempest.lib.common.rest_client [req-21147987-8743-4335-8caf-2281a6daf8fa ] Request (NetworkSegmentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.199s 2020-12-14 02:18:49.276 186 DEBUG tempest.lib.common.rest_client [req-21147987-8743-4335-8caf-2281a6daf8fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-NetworkSegmentsRbacTest-1390973949", "password": "H1~8%AXoViLqah1", "project_id": "f92fc125904344aab17ff9e885ea5d65", "email": "tempest-NetworkSegmentsRbacTest-1264154511@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '402', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21147987-8743-4335-8caf-2281a6daf8fa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "f92fc125904344aab17ff9e885ea5d65", "email": "tempest-NetworkSegmentsRbacTest-1264154511@example.com", "id": "1e6937eb792040be87cea9af9e21d6dd", "name": "tempest-NetworkSegmentsRbacTest-1390973949", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/1e6937eb792040be87cea9af9e21d6dd"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:49.340 186 INFO tempest.lib.common.rest_client [req-590a9c43-976c-4b26-a841-afd36fb8773b ] Request (NetworkSegmentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:18:49.343 186 DEBUG tempest.lib.common.rest_client [req-590a9c43-976c-4b26-a841-afd36fb8773b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-590a9c43-976c-4b26-a841-afd36fb8773b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:49.408 186 INFO tempest.lib.common.rest_client [req-4b3c9252-16b7-4185-be51-639b720332bd ] Request (NetworkSegmentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-12-14 02:18:49.410 186 DEBUG tempest.lib.common.rest_client [req-4b3c9252-16b7-4185-be51-639b720332bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b3c9252-16b7-4185-be51-639b720332bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:49.531 186 INFO tempest.lib.common.rest_client [req-005d457a-715d-493a-8efe-11eb1f34c445 ] Request (NetworkSegmentsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles/72a4576c553448cd941b052c1ca0cf2d 0.113s 2020-12-14 02:18:49.534 186 DEBUG tempest.lib.common.rest_client [req-005d457a-715d-493a-8efe-11eb1f34c445 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-005d457a-715d-493a-8efe-11eb1f34c445', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:49.537 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NetworkSegmentsRbacTest-1390973949', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'f92fc125904344aab17ff9e885ea5d65', 'project_name': 'tempest-NetworkSegmentsRbacTest-1390973949', 'tenant_id': 'f92fc125904344aab17ff9e885ea5d65', 'tenant_name': 'tempest-NetworkSegmentsRbacTest-1390973949', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '1e6937eb792040be87cea9af9e21d6dd'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:49.540 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NetworkSegmentsRbacTest-1390973949', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'f92fc125904344aab17ff9e885ea5d65', 'project_name': 'tempest-NetworkSegmentsRbacTest-1390973949', 'tenant_id': 'f92fc125904344aab17ff9e885ea5d65', 'tenant_name': 'tempest-NetworkSegmentsRbacTest-1390973949', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '1e6937eb792040be87cea9af9e21d6dd'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:49.720 186 INFO tempest.lib.common.rest_client [req-a5259b00-0c53-42dc-bd51-2442b5cb0fb3 ] Request (NetworkSegmentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-12-14 02:18:49.723 186 DEBUG tempest.lib.common.rest_client [req-a5259b00-0c53-42dc-bd51-2442b5cb0fb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5259b00-0c53-42dc-bd51-2442b5cb0fb3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1e6937eb792040be87cea9af9e21d6dd", "name": "tempest-NetworkSegmentsRbacTest-1390973949", "password_expires_at": null}, "audit_ids": ["9SNCHmBhQH-GBlC5ni4zOA"], "expires_at": "2020-12-14T03:18:49.000000Z", "issued_at": "2020-12-14T02:18:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f92fc125904344aab17ff9e885ea5d65", "name": "tempest-NetworkSegmentsRbacTest-1390973949"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:49.831 186 INFO tempest.lib.common.rest_client [req-c097bdc3-8b6f-4989-9d17-055839c16479 ] Request (NetworkSegmentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:18:49.834 186 DEBUG tempest.lib.common.rest_client [req-c097bdc3-8b6f-4989-9d17-055839c16479 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c097bdc3-8b6f-4989-9d17-055839c16479', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["SPB7vc-lTmiV74JFwNCh8Q"], "expires_at": "2020-12-14T03:18:49.000000Z", "issued_at": "2020-12-14T02:18:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:49.856 193 INFO tempest.lib.common.rest_client [req-a9304269-8151-4233-895e-c8b27f4d1841 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef 0.067s 2020-12-14 02:18:49.858 193 DEBUG tempest.lib.common.rest_client [req-a9304269-8151-4233-895e-c8b27f4d1841 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-a9304269-8151-4233-895e-c8b27f4d1841', 'x-openstack-request-id': 'req-a9304269-8151-4233-895e-c8b27f4d1841', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/c6686db654814a049859a68b2cfea6f5/volumes/c08a8b5e-72a6-485b-ab95-3eb2700b45ef'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume c08a8b5e-72a6-485b-ab95-3eb2700b45ef could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:49.938 186 INFO tempest.lib.common.rest_client [req-b61f7cef-b64d-48a2-8ffe-0de914b09825 ] Request (NetworkSegmentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:18:49.941 186 DEBUG tempest.lib.common.rest_client [req-b61f7cef-b64d-48a2-8ffe-0de914b09825 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b61f7cef-b64d-48a2-8ffe-0de914b09825', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["nBtK0yzuRxuhWtskDJeXVA"], "expires_at": "2020-12-14T03:18:49.000000Z", "issued_at": "2020-12-14T02:18:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:49.942 197 INFO tempest.lib.common.rest_client [req-b328ef8b-1003-4935-a676-44175057db59 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.222s 2020-12-14 02:18:49.945 197 DEBUG tempest.lib.common.rest_client [req-b328ef8b-1003-4935-a676-44175057db59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b328ef8b-1003-4935-a676-44175057db59', 'x-compute-request-id': 'req-b328ef8b-1003-4935-a676-44175057db59', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:49.957 189 INFO tempest.lib.common.rest_client [req-9a6869e5-c933-4758-9347-d96fcf33b3c0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.246s 2020-12-14 02:18:49.961 189 DEBUG tempest.lib.common.rest_client [req-9a6869e5-c933-4758-9347-d96fcf33b3c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9a6869e5-c933-4758-9347-d96fcf33b3c0', 'x-compute-request-id': 'req-9a6869e5-c933-4758-9347-d96fcf33b3c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:50.004 186 INFO tempest.lib.common.rest_client [req-5d268bc1-9cd0-43ec-8225-4ebd522aa482 ] Request (NetworkSegmentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.055s 2020-12-14 02:18:50.007 186 DEBUG tempest.lib.common.rest_client [req-5d268bc1-9cd0-43ec-8225-4ebd522aa482 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d268bc1-9cd0-43ec-8225-4ebd522aa482', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:50.068 186 INFO tempest.lib.common.rest_client [req-0bbf3cd8-2a15-4a26-9262-4fdedd34e038 ] Request (NetworkSegmentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-14 02:18:50.071 186 DEBUG tempest.lib.common.rest_client [req-0bbf3cd8-2a15-4a26-9262-4fdedd34e038 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0bbf3cd8-2a15-4a26-9262-4fdedd34e038', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:50.075 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:18:50.077 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:50.145 186 INFO tempest.lib.common.rest_client [req-5ccfb26b-1718-4389-943e-1713a67a54fd ] Request (NetworkSegmentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles 0.063s 2020-12-14 02:18:50.144 193 INFO tempest.lib.common.rest_client [req-a31b7b49-4d1d-4834-bf45-37f9d3dd098d ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/539742cb43b2420195668c52b7d7dce9 0.279s 2020-12-14 02:18:50.147 186 DEBUG tempest.lib.common.rest_client [req-5ccfb26b-1718-4389-943e-1713a67a54fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ccfb26b-1718-4389-943e-1713a67a54fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:50.147 193 DEBUG tempest.lib.common.rest_client [req-a31b7b49-4d1d-4834-bf45-37f9d3dd098d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a31b7b49-4d1d-4834-bf45-37f9d3dd098d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/539742cb43b2420195668c52b7d7dce9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:50.246 193 INFO tempest.lib.common.rest_client [req-72c3b43f-0226-41e7-8414-74e79e4b5710 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:18:50.249 193 DEBUG tempest.lib.common.rest_client [req-72c3b43f-0226-41e7-8414-74e79e4b5710 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-72c3b43f-0226-41e7-8414-74e79e4b5710', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["HNCG3ZPcSNSgDxXqe12NGw"], "expires_at": "2020-12-14T03:18:50.000000Z", "issued_at": "2020-12-14T02:18:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:50.260 186 INFO tempest.lib.common.rest_client [req-815a2764-ea9c-48f0-acd1-275893e3b18b ] Request (NetworkSegmentsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles/72a4576c553448cd941b052c1ca0cf2d 0.108s 2020-12-14 02:18:50.262 186 DEBUG tempest.lib.common.rest_client [req-815a2764-ea9c-48f0-acd1-275893e3b18b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-815a2764-ea9c-48f0-acd1-275893e3b18b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:50.377 186 INFO tempest.lib.common.rest_client [req-4d9e0dbe-ea79-4878-9e94-a5c743c0e192 ] Request (NetworkSegmentsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-12-14 02:18:50.380 186 DEBUG tempest.lib.common.rest_client [req-4d9e0dbe-ea79-4878-9e94-a5c743c0e192 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d9e0dbe-ea79-4878-9e94-a5c743c0e192', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:50.571 193 INFO tempest.lib.common.rest_client [req-dea9069c-17b0-47b4-aa24-9a6c0285d7f9 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c6686db654814a049859a68b2cfea6f5&name=default 0.315s 2020-12-14 02:18:50.575 193 DEBUG tempest.lib.common.rest_client [req-dea9069c-17b0-47b4-aa24-9a6c0285d7f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-dea9069c-17b0-47b4-aa24-9a6c0285d7f9', 'date': 'Mon, 14 Dec 2020 02:18:50 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c6686db654814a049859a68b2cfea6f5&name=default'} Body: b'{"security_groups": [{"id": "5b1be9b0-c9c6-49d7-ad97-0c26a517d167", "name": "default", "stateful": true, "tenant_id": "c6686db654814a049859a68b2cfea6f5", "description": "Default security group", "security_group_rules": [{"id": "8ae5fcca-21d6-4daa-9faf-dbafcd6f39e6", "tenant_id": "c6686db654814a049859a68b2cfea6f5", "security_group_id": "5b1be9b0-c9c6-49d7-ad97-0c26a517d167", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:50Z", "updated_at": "2020-12-14T02:18:50Z", "revision_number": 0, "project_id": "c6686db654814a049859a68b2cfea6f5"}, {"id": "c1058bad-a2db-4cc3-b882-3f24919ee8bb", "tenant_id": "c6686db654814a049859a68b2cfea6f5", "security_group_id": "5b1be9b0-c9c6-49d7-ad97-0c26a517d167", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5b1be9b0-c9c6-49d7-ad97-0c26a517d167", "description": null, "tags": [], "created_at": "2020-12-14T02:18:50Z", "updated_at": "2020-12-14T02:18:50Z", "revision_number": 0, "project_id": "c6686db654814a049859a68b2cfea6f5"}, {"id": "d084d6f5-0c78-4bc6-afec-c6913dc713d0", "tenant_id": "c6686db654814a049859a68b2cfea6f5", "security_group_id": "5b1be9b0-c9c6-49d7-ad97-0c26a517d167", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5b1be9b0-c9c6-49d7-ad97-0c26a517d167", "description": null, "tags": [], "created_at": "2020-12-14T02:18:50Z", "updated_at": "2020-12-14T02:18:50Z", "revision_number": 0, "project_id": "c6686db654814a049859a68b2cfea6f5"}, {"id": "f13373c6-c68a-4416-8739-8567a70d7a1d", "tenant_id": "c6686db654814a049859a68b2cfea6f5", "security_group_id": "5b1be9b0-c9c6-49d7-ad97-0c26a517d167", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:50Z", "updated_at": "2020-12-14T02:18:50Z", "revision_number": 0, "project_id": "c6686db654814a049859a68b2cfea6f5"}], "tags": [], "created_at": "2020-12-14T02:18:50Z", "updated_at": "2020-12-14T02:18:50Z", "revision_number": 1, "project_id": "c6686db654814a049859a68b2cfea6f5"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:50.706 193 INFO tempest.lib.common.rest_client [req-83a0f342-d66c-4687-9ed3-b1a09ed413a8 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/5b1be9b0-c9c6-49d7-ad97-0c26a517d167 0.124s 2020-12-14 02:18:50.709 193 DEBUG tempest.lib.common.rest_client [req-83a0f342-d66c-4687-9ed3-b1a09ed413a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-83a0f342-d66c-4687-9ed3-b1a09ed413a8', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:18:50 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5b1be9b0-c9c6-49d7-ad97-0c26a517d167'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:50.899 193 INFO tempest.lib.common.rest_client [req-1d1f4d06-ee5d-451c-9790-57be3cb8fa58 ] Request (SnapshotMetadataV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5 0.183s 2020-12-14 02:18:50.901 193 DEBUG tempest.lib.common.rest_client [req-1d1f4d06-ee5d-451c-9790-57be3cb8fa58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d1f4d06-ee5d-451c-9790-57be3cb8fa58', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c6686db654814a049859a68b2cfea6f5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:51.011 193 INFO tempest.lib.common.rest_client [req-1a1c466a-a1ad-4cb2-bb1a-c98fac59f514 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:18:51.013 193 DEBUG tempest.lib.common.rest_client [req-1a1c466a-a1ad-4cb2-bb1a-c98fac59f514 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a1c466a-a1ad-4cb2-bb1a-c98fac59f514', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["4yIm6_ASRBa1MYtApgMbrw"], "expires_at": "2020-12-14T03:18:50.000000Z", "issued_at": "2020-12-14T02:18:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:51.106 193 INFO tempest.lib.common.rest_client [req-7a132841-1237-45c3-8742-454163357520 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:18:51.108 193 DEBUG tempest.lib.common.rest_client [req-7a132841-1237-45c3-8742-454163357520 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a132841-1237-45c3-8742-454163357520', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["MXPB7-oGTmOJdCPhxSrUZQ"], "expires_at": "2020-12-14T03:18:51.000000Z", "issued_at": "2020-12-14T02:18:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:51.176 193 INFO tempest.lib.common.rest_client [req-1eb7f8fc-a89c-4bd5-a3b8-c5ff78f3dd1b ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.061s 2020-12-14 02:18:51.179 193 DEBUG tempest.lib.common.rest_client [req-1eb7f8fc-a89c-4bd5-a3b8-c5ff78f3dd1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1eb7f8fc-a89c-4bd5-a3b8-c5ff78f3dd1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:51.255 193 INFO tempest.lib.common.rest_client [req-3afd2e49-7298-46c7-a090-c71eedb38a1c ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.069s 2020-12-14 02:18:51.257 193 DEBUG tempest.lib.common.rest_client [req-3afd2e49-7298-46c7-a090-c71eedb38a1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesBasicCrudV3RbacTest-1092237612-desc", "domain_id": "default", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3afd2e49-7298-46c7-a090-c71eedb38a1c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "domain_id": "default", "description": "tempest-VolumesBasicCrudV3RbacTest-1092237612-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:51.266 197 INFO tempest.lib.common.rest_client [req-c4827116-e0c5-4cae-a48e-2e4cfe31cfbf ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.215s 2020-12-14 02:18:51.270 197 DEBUG tempest.lib.common.rest_client [req-c4827116-e0c5-4cae-a48e-2e4cfe31cfbf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c4827116-e0c5-4cae-a48e-2e4cfe31cfbf', 'x-compute-request-id': 'req-c4827116-e0c5-4cae-a48e-2e4cfe31cfbf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:51.290 189 INFO tempest.lib.common.rest_client [req-66e00c80-b6d1-46e0-bbd3-1769e38d9e26 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.224s 2020-12-14 02:18:51.294 189 DEBUG tempest.lib.common.rest_client [req-66e00c80-b6d1-46e0-bbd3-1769e38d9e26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-66e00c80-b6d1-46e0-bbd3-1769e38d9e26', 'x-compute-request-id': 'req-66e00c80-b6d1-46e0-bbd3-1769e38d9e26', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:51.375 193 INFO tempest.lib.common.rest_client [req-a9771178-0a00-4af3-afcf-97339686f325 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.112s 2020-12-14 02:18:51.377 193 DEBUG tempest.lib.common.rest_client [req-a9771178-0a00-4af3-afcf-97339686f325 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password": "R1%_!ny!gAyZm=o", "project_id": "ef4eb6a078ca46f5ad7424d660ae9952", "email": "tempest-VolumesBasicCrudV3RbacTest-2043014498@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '408', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9771178-0a00-4af3-afcf-97339686f325', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "ef4eb6a078ca46f5ad7424d660ae9952", "email": "tempest-VolumesBasicCrudV3RbacTest-2043014498@example.com", "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/741e9d103f71464cb4f195cefc616588"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:51.439 193 INFO tempest.lib.common.rest_client [req-83d3ad04-c7e5-490a-9253-9b97f4a7d15b ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-14 02:18:51.441 193 DEBUG tempest.lib.common.rest_client [req-83d3ad04-c7e5-490a-9253-9b97f4a7d15b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83d3ad04-c7e5-490a-9253-9b97f4a7d15b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:51.473 186 INFO tempest.lib.common.rest_client [req-14d12fc6-0b9b-48ff-a8c8-60589892fa9b ] Request (NetworkSegmentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-14 02:18:51.476 186 DEBUG tempest.lib.common.rest_client [req-14d12fc6-0b9b-48ff-a8c8-60589892fa9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14d12fc6-0b9b-48ff-a8c8-60589892fa9b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1e6937eb792040be87cea9af9e21d6dd", "name": "tempest-NetworkSegmentsRbacTest-1390973949", "password_expires_at": null}, "audit_ids": ["BAT2wyowQ12_j4TsOalQpQ"], "expires_at": "2020-12-14T03:18:51.000000Z", "issued_at": "2020-12-14T02:18:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f92fc125904344aab17ff9e885ea5d65", "name": "tempest-NetworkSegmentsRbacTest-1390973949"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:51.510 193 INFO tempest.lib.common.rest_client [req-a322a311-43d3-4685-b220-61a755d1414b ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:18:51.512 193 DEBUG tempest.lib.common.rest_client [req-a322a311-43d3-4685-b220-61a755d1414b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a322a311-43d3-4685-b220-61a755d1414b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:51.595 193 INFO tempest.lib.common.rest_client [req-f23749d5-b009-4de5-bed4-e414303bbb81 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles/72a4576c553448cd941b052c1ca0cf2d 0.075s 2020-12-14 02:18:51.598 193 DEBUG tempest.lib.common.rest_client [req-f23749d5-b009-4de5-bed4-e414303bbb81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f23749d5-b009-4de5-bed4-e414303bbb81', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:51.602 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesBasicCrudV3RbacTest-1092237612', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ef4eb6a078ca46f5ad7424d660ae9952', 'project_name': 'tempest-VolumesBasicCrudV3RbacTest-1092237612', 'tenant_id': 'ef4eb6a078ca46f5ad7424d660ae9952', 'tenant_name': 'tempest-VolumesBasicCrudV3RbacTest-1092237612', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '741e9d103f71464cb4f195cefc616588'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:51.606 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesBasicCrudV3RbacTest-1092237612', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ef4eb6a078ca46f5ad7424d660ae9952', 'project_name': 'tempest-VolumesBasicCrudV3RbacTest-1092237612', 'tenant_id': 'ef4eb6a078ca46f5ad7424d660ae9952', 'tenant_name': 'tempest-VolumesBasicCrudV3RbacTest-1092237612', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '741e9d103f71464cb4f195cefc616588'}, Network: None, Subnet: None, Router: None 2020-12-14 02:18:51.799 193 INFO tempest.lib.common.rest_client [req-37e4576e-e859-4a69-b1cc-6ec20dcc5ec9 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-12-14 02:18:51.802 193 DEBUG tempest.lib.common.rest_client [req-37e4576e-e859-4a69-b1cc-6ec20dcc5ec9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6583', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-37e4576e-e859-4a69-b1cc-6ec20dcc5ec9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password_expires_at": null}, "audit_ids": ["jM8E_2q-SzGnO8cB_4Eiuw"], "expires_at": "2020-12-14T03:18:51.000000Z", "issued_at": "2020-12-14T02:18:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:51.896 186 INFO tempest.lib.common.rest_client [req-a3199175-2b1f-4f2f-86a2-8ba471103f25 ] Request (NetworkSegmentsRbacTest:setUpClass): 200 GET http://172.30.13.94:9696/v2.0/networks 0.409s 2020-12-14 02:18:51.902 193 INFO tempest.lib.common.rest_client [req-961fc6c0-0446-4cc0-8cbd-a573b0ef3a3d ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:18:51.902 186 DEBUG tempest.lib.common.rest_client [req-a3199175-2b1f-4f2f-86a2-8ba471103f25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '49891', 'x-openstack-request-id': 'req-a3199175-2b1f-4f2f-86a2-8ba471103f25', 'date': 'Mon, 14 Dec 2020 02:18:51 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"networks":[{"id":"0271f828-506d-471c-80e1-655c753a8b19","name":"tempest-MultipleCreateTestJSON-190587910-network","tenant_id":"8324c3ca97db4ac59b569d6bbbcffa09","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["de943adb-63ef-40f8-8985-a23207d72968"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-05T13:01:36Z","updated_at":"2020-12-05T13:01:36Z","revision_number":2,"project_id":"8324c3ca97db4ac59b569d6bbbcffa09","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":32},{"id":"063503db-115b-4919-a9a6-1f3519d69592","name":"tempest-test-network--1200798417","tenant_id":"2cdd20738a884c61a2383ca16c2d69c9","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"availability_zone_hints":[],"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-13T11:20:01Z","updated_at":"2020-12-13T11:20:01Z","revision_number":1,"project_id":"2cdd20738a884c61a2383ca16c2d69c9","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":67},{"id":"09616387-dfe6-4d1f-9c5a-0be30adf60e8","name":"tempest-MultipleCreateTestJSON-1784355696-network","tenant_id":"aecfcc6a08a941db927cdcc1561d2427","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["a48a10af-d181-472e-ab9d-2b3defb56fad"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-05T13:09:23Z","updated_at":"2020-12-05T13:09:24Z","revision_number":2,"project_id":"aecfcc6a08a941db927cdcc1561d2427","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":12},{"id":"0d133d7f-cfa3-406c-bf2e-9e2becbbe589","name":"tempest-MultipleCreateTestJSON-1880416163-network","tenant_id":"dc83be2a868748cc9397fd7cb6675c26","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["5f072df7-c9f6-4538-8ff5-cab14f8d28a9"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-11-22T15:50:51Z","updated_at":"2020-11-22T15:50:51Z","revision_number":2,"project_id":"dc83be2a868748cc9397fd7cb6675c26","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":16},{"id":"11e7deb5-beae-4249-9f34-285ba605afd2","name":"patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f","tenant_id":"3cc32870ea9c4124a18f8824ceee8b29","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["410abf33-6f29-4217-ac80-d3f2fac8eea9"],"shared":true,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:05:16Z","updated_at":"2020-12-14T02:05:17Z","revision_number":2,"project_id":"3cc32870ea9c4124a18f8824ceee8b29","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":56},{"id":"124e719e-8437-47a4-973c-977c7c572a7d","name":"tempest-MultipleCreateTestJSON-1295474568-network","tenant_id":"16e6f4f0a4a944488c7f25eb06ee42d3","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["0c611d55-9a54-4412-a450-cbf7410de51a"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:51.905 193 DEBUG tempest.lib.common.rest_client [req-961fc6c0-0446-4cc0-8cbd-a573b0ef3a3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-961fc6c0-0446-4cc0-8cbd-a573b0ef3a3d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["lffjXUu_QGCPyz1BWAACcA"], "expires_at": "2020-12-14T03:18:51.000000Z", "issued_at": "2020-12-14T02:18:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:51.919 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:51.942 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:51.945 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:51.968 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network:segments, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:51.970 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:52.019 193 INFO tempest.lib.common.rest_client [req-90ff1e52-4f56-432c-8ade-2bf150975302 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:18:52.022 193 DEBUG tempest.lib.common.rest_client [req-90ff1e52-4f56-432c-8ade-2bf150975302 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90ff1e52-4f56-432c-8ade-2bf150975302', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["cTde0YPxStiTeIIalZHgfA"], "expires_at": "2020-12-14T03:18:52.000000Z", "issued_at": "2020-12-14T02:18:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:52.040 186 INFO tempest.lib.common.rest_client [req-ee92905c-b050-4679-a9af-0f52f2d022f4 ] Request (NetworkSegmentsRbacTest:test_create_network_segments): 200 GET http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles 0.064s 2020-12-14 02:18:52.045 186 DEBUG tempest.lib.common.rest_client [req-ee92905c-b050-4679-a9af-0f52f2d022f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee92905c-b050-4679-a9af-0f52f2d022f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:52.087 193 INFO tempest.lib.common.rest_client [req-d0b8d1ce-51a9-4cdc-8901-1609389c0893 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.057s 2020-12-14 02:18:52.089 193 DEBUG tempest.lib.common.rest_client [req-d0b8d1ce-51a9-4cdc-8901-1609389c0893 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0b8d1ce-51a9-4cdc-8901-1609389c0893', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:52.148 186 INFO tempest.lib.common.rest_client [req-12988994-95fd-4275-b0c5-3eba8679a0cd ] Request (NetworkSegmentsRbacTest:test_create_network_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:18:52.151 186 DEBUG tempest.lib.common.rest_client [req-12988994-95fd-4275-b0c5-3eba8679a0cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-12988994-95fd-4275-b0c5-3eba8679a0cd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1e6937eb792040be87cea9af9e21d6dd", "name": "tempest-NetworkSegmentsRbacTest-1390973949", "password_expires_at": null}, "audit_ids": ["uJ7jGZKaToatn-5lJWcpqg"], "expires_at": "2020-12-14T03:18:52.000000Z", "issued_at": "2020-12-14T02:18:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f92fc125904344aab17ff9e885ea5d65", "name": "tempest-NetworkSegmentsRbacTest-1390973949"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:52.155 193 INFO tempest.lib.common.rest_client [req-d0681ad6-0ed8-4488-950c-1e6d5469dfba ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-12-14 02:18:52.158 193 DEBUG tempest.lib.common.rest_client [req-d0681ad6-0ed8-4488-950c-1e6d5469dfba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0681ad6-0ed8-4488-950c-1e6d5469dfba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:52.162 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:18:52.164 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:52.229 193 INFO tempest.lib.common.rest_client [req-1964c0cb-5e07-4e64-b2bb-d83d52dbaa8c ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles 0.060s 2020-12-14 02:18:52.232 193 DEBUG tempest.lib.common.rest_client [req-1964c0cb-5e07-4e64-b2bb-d83d52dbaa8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1964c0cb-5e07-4e64-b2bb-d83d52dbaa8c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:52.303 193 INFO tempest.lib.common.rest_client [req-71ff70af-5f22-4ab9-ba77-7e8f174c3122 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles/72a4576c553448cd941b052c1ca0cf2d 0.063s 2020-12-14 02:18:52.305 193 DEBUG tempest.lib.common.rest_client [req-71ff70af-5f22-4ab9-ba77-7e8f174c3122 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-71ff70af-5f22-4ab9-ba77-7e8f174c3122', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:52.424 193 INFO tempest.lib.common.rest_client [req-cccc4b84-9249-4b64-8270-a68764a9c293 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles/a629c95d64b3416fb80ae90af4f69c05 0.111s 2020-12-14 02:18:52.426 193 DEBUG tempest.lib.common.rest_client [req-cccc4b84-9249-4b64-8270-a68764a9c293 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cccc4b84-9249-4b64-8270-a68764a9c293', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:52.588 197 INFO tempest.lib.common.rest_client [req-304cc15f-d4a7-4163-9363-501dd18b1dae ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.212s 2020-12-14 02:18:52.592 197 DEBUG tempest.lib.common.rest_client [req-304cc15f-d4a7-4163-9363-501dd18b1dae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-304cc15f-d4a7-4163-9363-501dd18b1dae', 'x-compute-request-id': 'req-304cc15f-d4a7-4163-9363-501dd18b1dae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:52.704 189 INFO tempest.lib.common.rest_client [req-14841bd9-b3c3-4b01-9b5f-d3d6e6b5cd86 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.302s 2020-12-14 02:18:52.709 189 DEBUG tempest.lib.common.rest_client [req-14841bd9-b3c3-4b01-9b5f-d3d6e6b5cd86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-14841bd9-b3c3-4b01-9b5f-d3d6e6b5cd86', 'x-compute-request-id': 'req-14841bd9-b3c3-4b01-9b5f-d3d6e6b5cd86', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:52.937 186 INFO tempest.lib.common.rest_client [req-c49a4d88-7e52-4e0a-b448-a15c8121e5cb ] Request (NetworkSegmentsRbacTest:test_create_network_segments): 201 POST http://172.30.13.94:9696/v2.0/networks 0.777s 2020-12-14 02:18:52.939 186 DEBUG tempest.lib.common.rest_client [req-c49a4d88-7e52-4e0a-b448-a15c8121e5cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworkSegmentsRbacTest-1761536769", "segments": [{"provider:network_type": "vxlan"}, {"provider:network_type": "vxlan"}]}} Response - Headers: {'content-type': 'application/json', 'content-length': '843', 'x-openstack-request-id': 'req-c49a4d88-7e52-4e0a-b448-a15c8121e5cb', 'date': 'Mon, 14 Dec 2020 02:18:52 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"406615c7-9646-465b-8ee2-ae7ece46efcc","name":"tempest-NetworkSegmentsRbacTest-1761536769","tenant_id":"f92fc125904344aab17ff9e885ea5d65","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"f92fc125904344aab17ff9e885ea5d65","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"segments":[{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":29},{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":43}],"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:18:52Z","updated_at":"2020-12-14T02:18:52Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:52.942 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:53.061 186 INFO tempest.lib.common.rest_client [req-6b6f0164-9e0e-45bd-a200-181788d83699 ] Request (NetworkSegmentsRbacTest:test_create_network_segments): 200 GET http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles 0.112s 2020-12-14 02:18:53.063 186 DEBUG tempest.lib.common.rest_client [req-6b6f0164-9e0e-45bd-a200-181788d83699 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b6f0164-9e0e-45bd-a200-181788d83699', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:53.159 186 INFO tempest.lib.common.rest_client [req-0594f039-f055-4813-9565-73018f603b14 ] Request (NetworkSegmentsRbacTest:test_create_network_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-14 02:18:53.163 186 DEBUG tempest.lib.common.rest_client [req-0594f039-f055-4813-9565-73018f603b14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0594f039-f055-4813-9565-73018f603b14', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1e6937eb792040be87cea9af9e21d6dd", "name": "tempest-NetworkSegmentsRbacTest-1390973949", "password_expires_at": null}, "audit_ids": ["fbSY3POyT-23XH0E8VRRNw"], "expires_at": "2020-12-14T03:18:53.000000Z", "issued_at": "2020-12-14T02:18:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f92fc125904344aab17ff9e885ea5d65", "name": "tempest-NetworkSegmentsRbacTest-1390973949"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:53.533 193 INFO tempest.lib.common.rest_client [req-cabf5fbb-b021-4ec1-9743-8fc15d757885 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:18:53.537 193 DEBUG tempest.lib.common.rest_client [req-cabf5fbb-b021-4ec1-9743-8fc15d757885 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cabf5fbb-b021-4ec1-9743-8fc15d757885', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password_expires_at": null}, "audit_ids": ["7MhCgS3cTHW4rtbwclvs6Q"], "expires_at": "2020-12-14T03:18:53.000000Z", "issued_at": "2020-12-14T02:18:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:53.934 197 INFO tempest.lib.common.rest_client [req-611d16d7-dea6-45b5-8c81-119e210a932e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.235s 2020-12-14 02:18:53.937 197 DEBUG tempest.lib.common.rest_client [req-611d16d7-dea6-45b5-8c81-119e210a932e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-611d16d7-dea6-45b5-8c81-119e210a932e', 'x-compute-request-id': 'req-611d16d7-dea6-45b5-8c81-119e210a932e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:53.973 193 INFO tempest.lib.common.rest_client [req-2f6f0e5c-7271-4a78-8676-65743baac811 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes 0.423s 2020-12-14 02:18:53.976 193 DEBUG tempest.lib.common.rest_client [req-2f6f0e5c-7271-4a78-8676-65743baac811 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-1575378150"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2f6f0e5c-7271-4a78-8676-65743baac811', 'content-length': '847', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2f6f0e5c-7271-4a78-8676-65743baac811', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes'} Body: b'{"volume": {"id": "04273fcf-2194-45fc-b235-c46a27cc1109", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:54.000000", "updated_at": null, "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-1575378150", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:54.028 189 INFO tempest.lib.common.rest_client [req-420b644a-5362-49fa-be23-41c22d890281 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.215s 2020-12-14 02:18:54.032 189 DEBUG tempest.lib.common.rest_client [req-420b644a-5362-49fa-be23-41c22d890281 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-420b644a-5362-49fa-be23-41c22d890281', 'x-compute-request-id': 'req-420b644a-5362-49fa-be23-41c22d890281', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:54.161 193 INFO tempest.lib.common.rest_client [req-08598f37-241b-4f41-8a1d-3e577b7c023a ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109 0.099s 2020-12-14 02:18:54.164 193 DEBUG tempest.lib.common.rest_client [req-08598f37-241b-4f41-8a1d-3e577b7c023a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-08598f37-241b-4f41-8a1d-3e577b7c023a', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-08598f37-241b-4f41-8a1d-3e577b7c023a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109'} Body: b'{"volume": {"id": "04273fcf-2194-45fc-b235-c46a27cc1109", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:54.000000", "updated_at": "2020-12-14T02:18:54.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-1575378150", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:54.400 186 INFO tempest.lib.common.rest_client [req-be607b2f-40c3-48d3-97fd-257f35ad4034 ] Request (NetworkSegmentsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/networks/406615c7-9646-465b-8ee2-ae7ece46efcc 1.229s 2020-12-14 02:18:54.402 186 DEBUG tempest.lib.common.rest_client [req-be607b2f-40c3-48d3-97fd-257f35ad4034 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-be607b2f-40c3-48d3-97fd-257f35ad4034', 'date': 'Mon, 14 Dec 2020 02:18:54 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/406615c7-9646-465b-8ee2-ae7ece46efcc'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:54.411 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:54.430 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:54.432 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:54.448 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network:segments, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:54.787 186 INFO tempest.lib.common.rest_client [req-29850a99-6c23-4272-8b8b-f04003bf664f ] Request (NetworkSegmentsRbacTest:test_show_network_segments): 201 POST http://172.30.13.94:9696/v2.0/networks 0.334s 2020-12-14 02:18:54.791 186 DEBUG tempest.lib.common.rest_client [req-29850a99-6c23-4272-8b8b-f04003bf664f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworkSegmentsRbacTest-95022132", "segments": [{"provider:network_type": "vxlan"}, {"provider:network_type": "vxlan"}]}} Response - Headers: {'content-type': 'application/json', 'content-length': '841', 'x-openstack-request-id': 'req-29850a99-6c23-4272-8b8b-f04003bf664f', 'date': 'Mon, 14 Dec 2020 02:18:54 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"9b6b8b09-2d9d-47a5-9962-9722e7c0c6f4","name":"tempest-NetworkSegmentsRbacTest-95022132","tenant_id":"f92fc125904344aab17ff9e885ea5d65","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"f92fc125904344aab17ff9e885ea5d65","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"segments":[{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":29},{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":43}],"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:18:54Z","updated_at":"2020-12-14T02:18:54Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:54.793 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:54.899 186 INFO tempest.lib.common.rest_client [req-1e036d97-95c5-4a15-816b-29b6a8fc4b94 ] Request (NetworkSegmentsRbacTest:test_show_network_segments): 200 GET http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles 0.101s 2020-12-14 02:18:54.901 186 DEBUG tempest.lib.common.rest_client [req-1e036d97-95c5-4a15-816b-29b6a8fc4b94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e036d97-95c5-4a15-816b-29b6a8fc4b94', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:54.987 186 INFO tempest.lib.common.rest_client [req-9c81e3c2-f375-4614-ae7f-a8fb259fd4c1 ] Request (NetworkSegmentsRbacTest:test_show_network_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-12-14 02:18:54.989 186 DEBUG tempest.lib.common.rest_client [req-9c81e3c2-f375-4614-ae7f-a8fb259fd4c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c81e3c2-f375-4614-ae7f-a8fb259fd4c1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1e6937eb792040be87cea9af9e21d6dd", "name": "tempest-NetworkSegmentsRbacTest-1390973949", "password_expires_at": null}, "audit_ids": ["lEP3yN12TEuNemIO0DZPLQ"], "expires_at": "2020-12-14T03:18:54.000000Z", "issued_at": "2020-12-14T02:18:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f92fc125904344aab17ff9e885ea5d65", "name": "tempest-NetworkSegmentsRbacTest-1390973949"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:55.216 186 INFO tempest.lib.common.rest_client [req-4b15bb58-f995-48d2-a5eb-99fdb36d1e8a ] Request (NetworkSegmentsRbacTest:test_show_network_segments): 200 GET http://172.30.13.94:9696/v2.0/networks/9b6b8b09-2d9d-47a5-9962-9722e7c0c6f4?fields=segments 0.221s 2020-12-14 02:18:55.222 186 DEBUG tempest.lib.common.rest_client [req-4b15bb58-f995-48d2-a5eb-99fdb36d1e8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '220', 'x-openstack-request-id': 'req-4b15bb58-f995-48d2-a5eb-99fdb36d1e8a', 'date': 'Mon, 14 Dec 2020 02:18:55 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/9b6b8b09-2d9d-47a5-9962-9722e7c0c6f4?fields=segments'} Body: b'{"network":{"segments":[{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":29},{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":43}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:55.224 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:55.283 197 INFO tempest.lib.common.rest_client [req-26af93c7-7008-4ebf-9438-bf052b3022ee ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.238s 2020-12-14 02:18:55.285 197 DEBUG tempest.lib.common.rest_client [req-26af93c7-7008-4ebf-9438-bf052b3022ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-26af93c7-7008-4ebf-9438-bf052b3022ee', 'x-compute-request-id': 'req-26af93c7-7008-4ebf-9438-bf052b3022ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:55.307 186 INFO tempest.lib.common.rest_client [req-7fbaaa7c-78d8-43d4-9a7f-4b1080cc570c ] Request (NetworkSegmentsRbacTest:test_show_network_segments): 200 GET http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles 0.076s 2020-12-14 02:18:55.310 186 DEBUG tempest.lib.common.rest_client [req-7fbaaa7c-78d8-43d4-9a7f-4b1080cc570c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7fbaaa7c-78d8-43d4-9a7f-4b1080cc570c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:55.344 193 INFO tempest.lib.common.rest_client [req-b20bc461-bbb8-4c02-8b4b-c16375c886e6 ] Request (VolumesBasicCrudV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109 0.084s 2020-12-14 02:18:55.347 193 DEBUG tempest.lib.common.rest_client [req-b20bc461-bbb8-4c02-8b4b-c16375c886e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b20bc461-bbb8-4c02-8b4b-c16375c886e6', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b20bc461-bbb8-4c02-8b4b-c16375c886e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109'} Body: b'{"volume": {"id": "04273fcf-2194-45fc-b235-c46a27cc1109", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:54.000000", "updated_at": "2020-12-14T02:18:54.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-1575378150", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:55.366 186 INFO tempest.lib.common.rest_client [req-4707bbb7-f034-4342-bde8-5ad625f9d1b2 ] Request (NetworkSegmentsRbacTest:test_show_network_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:18:55.370 186 DEBUG tempest.lib.common.rest_client [req-4707bbb7-f034-4342-bde8-5ad625f9d1b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4707bbb7-f034-4342-bde8-5ad625f9d1b2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1e6937eb792040be87cea9af9e21d6dd", "name": "tempest-NetworkSegmentsRbacTest-1390973949", "password_expires_at": null}, "audit_ids": ["q9v3XJRkSryvQNSnC2CdBg"], "expires_at": "2020-12-14T03:18:55.000000Z", "issued_at": "2020-12-14T02:18:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f92fc125904344aab17ff9e885ea5d65", "name": "tempest-NetworkSegmentsRbacTest-1390973949"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:55.382 189 INFO tempest.lib.common.rest_client [req-0b77e704-1386-4a2e-8f29-cfdb340ac07d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.242s 2020-12-14 02:18:55.384 189 DEBUG tempest.lib.common.rest_client [req-0b77e704-1386-4a2e-8f29-cfdb340ac07d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0b77e704-1386-4a2e-8f29-cfdb340ac07d', 'x-compute-request-id': 'req-0b77e704-1386-4a2e-8f29-cfdb340ac07d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:55.438 193 INFO tempest.common.waiters [-] volume 04273fcf-2194-45fc-b235-c46a27cc1109 reached available after waiting for 1.437946 seconds 2020-12-14 02:18:55.443 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:55.461 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:create, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:55.464 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:55.589 193 INFO tempest.lib.common.rest_client [req-189d63c6-c3df-4485-b227-343ccfa1cf11 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume): 200 GET http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles 0.118s 2020-12-14 02:18:55.592 193 DEBUG tempest.lib.common.rest_client [req-189d63c6-c3df-4485-b227-343ccfa1cf11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-189d63c6-c3df-4485-b227-343ccfa1cf11', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:55.778 193 INFO tempest.lib.common.rest_client [req-fbcdf8a8-5213-4eb0-97af-2e6416a4b604 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.179s 2020-12-14 02:18:55.781 193 DEBUG tempest.lib.common.rest_client [req-fbcdf8a8-5213-4eb0-97af-2e6416a4b604 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fbcdf8a8-5213-4eb0-97af-2e6416a4b604', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password_expires_at": null}, "audit_ids": ["LBeFrB2bS7abLzQlLclX6g"], "expires_at": "2020-12-14T03:18:55.000000Z", "issued_at": "2020-12-14T02:18:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:56.231 193 INFO tempest.lib.common.rest_client [req-64f98eee-17ae-4abd-9c4a-691a1381064d ] Request (VolumesBasicCrudV3RbacTest:test_create_volume): 202 POST http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes 0.442s 2020-12-14 02:18:56.233 193 DEBUG tempest.lib.common.rest_client [req-64f98eee-17ae-4abd-9c4a-691a1381064d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"name": "tempest-VolumesBasicCrudV3RbacTest-Volume-1114725481", "size": 1}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-64f98eee-17ae-4abd-9c4a-691a1381064d', 'content-length': '847', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-64f98eee-17ae-4abd-9c4a-691a1381064d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes'} Body: b'{"volume": {"id": "7cc4b44c-3249-4e95-8ab0-fb42b325a1e5", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:56.000000", "updated_at": null, "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-1114725481", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/7cc4b44c-3249-4e95-8ab0-fb42b325a1e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/7cc4b44c-3249-4e95-8ab0-fb42b325a1e5"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:56.315 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:56.358 186 INFO tempest.lib.common.rest_client [req-ffc86cf4-794d-4a07-8458-0b0b6715a139 ] Request (NetworkSegmentsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/networks/9b6b8b09-2d9d-47a5-9962-9722e7c0c6f4 0.978s 2020-12-14 02:18:56.361 186 DEBUG tempest.lib.common.rest_client [req-ffc86cf4-794d-4a07-8458-0b0b6715a139 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-ffc86cf4-794d-4a07-8458-0b0b6715a139', 'date': 'Mon, 14 Dec 2020 02:18:56 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/9b6b8b09-2d9d-47a5-9962-9722e7c0c6f4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:56.375 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:56.394 193 INFO tempest.lib.common.rest_client [req-5bcb4910-9d42-4afd-8d2f-edfc28fe59fc ] Request (VolumesBasicCrudV3RbacTest:test_create_volume): 200 GET http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles 0.073s 2020-12-14 02:18:56.397 193 DEBUG tempest.lib.common.rest_client [req-5bcb4910-9d42-4afd-8d2f-edfc28fe59fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5bcb4910-9d42-4afd-8d2f-edfc28fe59fc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:56.402 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:56.404 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:56.429 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:56.431 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:56.447 193 INFO tempest.lib.common.rest_client [req-4eff246f-b60c-4da2-b813-b94c8b1c9047 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:18:56.450 193 DEBUG tempest.lib.common.rest_client [req-4eff246f-b60c-4da2-b813-b94c8b1c9047 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4eff246f-b60c-4da2-b813-b94c8b1c9047', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password_expires_at": null}, "audit_ids": ["Vgq-TROxQwq_nIy74N1pGA"], "expires_at": "2020-12-14T03:18:56.000000Z", "issued_at": "2020-12-14T02:18:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:56.456 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_network:segments, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:56.582 197 INFO tempest.lib.common.rest_client [req-5ffc13c5-8563-48db-bf65-999e8186403f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.211s 2020-12-14 02:18:56.586 197 DEBUG tempest.lib.common.rest_client [req-5ffc13c5-8563-48db-bf65-999e8186403f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5ffc13c5-8563-48db-bf65-999e8186403f', 'x-compute-request-id': 'req-5ffc13c5-8563-48db-bf65-999e8186403f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:56.614 193 INFO tempest.lib.common.rest_client [req-bc5ac3ac-5086-4f17-9890-f75f8191d208 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/7cc4b44c-3249-4e95-8ab0-fb42b325a1e5 0.156s 2020-12-14 02:18:56.617 193 DEBUG tempest.lib.common.rest_client [req-bc5ac3ac-5086-4f17-9890-f75f8191d208 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bc5ac3ac-5086-4f17-9890-f75f8191d208', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bc5ac3ac-5086-4f17-9890-f75f8191d208', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/7cc4b44c-3249-4e95-8ab0-fb42b325a1e5'} Body: b'{"volume": {"id": "7cc4b44c-3249-4e95-8ab0-fb42b325a1e5", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:56.000000", "updated_at": "2020-12-14T02:18:56.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-1114725481", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/7cc4b44c-3249-4e95-8ab0-fb42b325a1e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/7cc4b44c-3249-4e95-8ab0-fb42b325a1e5"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:56.710 193 INFO tempest.common.waiters [-] volume 7cc4b44c-3249-4e95-8ab0-fb42b325a1e5 reached available after waiting for 0.710111 seconds 2020-12-14 02:18:56.798 193 INFO tempest.lib.common.rest_client [req-01306e52-d5cc-4b69-8aa4-2e30161114ac ] Request (VolumesBasicCrudV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/7cc4b44c-3249-4e95-8ab0-fb42b325a1e5 0.081s 2020-12-14 02:18:56.801 193 DEBUG tempest.lib.common.rest_client [req-01306e52-d5cc-4b69-8aa4-2e30161114ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-01306e52-d5cc-4b69-8aa4-2e30161114ac', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/7cc4b44c-3249-4e95-8ab0-fb42b325a1e5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:56.838 189 INFO tempest.lib.common.rest_client [req-e91b0cc2-7607-46a0-b888-6f9b6b7d6c7a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.346s 2020-12-14 02:18:56.842 189 DEBUG tempest.lib.common.rest_client [req-e91b0cc2-7607-46a0-b888-6f9b6b7d6c7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e91b0cc2-7607-46a0-b888-6f9b6b7d6c7a', 'x-compute-request-id': 'req-e91b0cc2-7607-46a0-b888-6f9b6b7d6c7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:56.885 193 INFO tempest.lib.common.rest_client [req-e2c1c15e-d820-4bf2-acde-d71a2f04398e ] Request (VolumesBasicCrudV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/7cc4b44c-3249-4e95-8ab0-fb42b325a1e5 0.077s 2020-12-14 02:18:56.889 193 DEBUG tempest.lib.common.rest_client [req-e2c1c15e-d820-4bf2-acde-d71a2f04398e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e2c1c15e-d820-4bf2-acde-d71a2f04398e', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e2c1c15e-d820-4bf2-acde-d71a2f04398e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/7cc4b44c-3249-4e95-8ab0-fb42b325a1e5'} Body: b'{"volume": {"id": "7cc4b44c-3249-4e95-8ab0-fb42b325a1e5", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:56.000000", "updated_at": "2020-12-14T02:18:57.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-1114725481", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/7cc4b44c-3249-4e95-8ab0-fb42b325a1e5"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/7cc4b44c-3249-4e95-8ab0-fb42b325a1e5"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:56.901 186 INFO tempest.lib.common.rest_client [req-c51ee447-5052-42fe-8ab2-42dcc2506c55 ] Request (NetworkSegmentsRbacTest:test_update_network_segments): 201 POST http://172.30.13.94:9696/v2.0/networks 0.438s 2020-12-14 02:18:56.905 186 DEBUG tempest.lib.common.rest_client [req-c51ee447-5052-42fe-8ab2-42dcc2506c55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworkSegmentsRbacTest-1290728702", "segments": [{"provider:network_type": "vxlan"}, {"provider:network_type": "vxlan"}]}} Response - Headers: {'content-type': 'application/json', 'content-length': '843', 'x-openstack-request-id': 'req-c51ee447-5052-42fe-8ab2-42dcc2506c55', 'date': 'Mon, 14 Dec 2020 02:18:56 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"0a20d802-d81d-4dc8-be56-4e38d6355d03","name":"tempest-NetworkSegmentsRbacTest-1290728702","tenant_id":"f92fc125904344aab17ff9e885ea5d65","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"f92fc125904344aab17ff9e885ea5d65","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"segments":[{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":29},{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":43}],"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:18:56Z","updated_at":"2020-12-14T02:18:56Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:56.908 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:56.964 186 INFO tempest.lib.common.rest_client [req-1686c883-fa6f-432b-982d-42c8123e44b2 ] Request (NetworkSegmentsRbacTest:test_update_network_segments): 200 GET http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles 0.050s 2020-12-14 02:18:56.967 186 DEBUG tempest.lib.common.rest_client [req-1686c883-fa6f-432b-982d-42c8123e44b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1686c883-fa6f-432b-982d-42c8123e44b2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:57.059 186 INFO tempest.lib.common.rest_client [req-73690abf-8db7-4096-a159-791af186f0d5 ] Request (NetworkSegmentsRbacTest:test_update_network_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-14 02:18:57.063 186 DEBUG tempest.lib.common.rest_client [req-73690abf-8db7-4096-a159-791af186f0d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73690abf-8db7-4096-a159-791af186f0d5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1e6937eb792040be87cea9af9e21d6dd", "name": "tempest-NetworkSegmentsRbacTest-1390973949", "password_expires_at": null}, "audit_ids": ["pkHesZcYSGGQItFlz5UsmQ"], "expires_at": "2020-12-14T03:18:57.000000Z", "issued_at": "2020-12-14T02:18:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f92fc125904344aab17ff9e885ea5d65", "name": "tempest-NetworkSegmentsRbacTest-1390973949"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:57.678 186 INFO tempest.lib.common.rest_client [req-95325534-2e85-4964-8bf6-5d145d880150 ] Request (NetworkSegmentsRbacTest:test_update_network_segments): 200 PUT http://172.30.13.94:9696/v2.0/networks/0a20d802-d81d-4dc8-be56-4e38d6355d03 0.606s 2020-12-14 02:18:57.682 186 DEBUG tempest.lib.common.rest_client [req-95325534-2e85-4964-8bf6-5d145d880150 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"segments": [{"provider:network_type": "vxlan"}]}} Response - Headers: {'content-type': 'application/json', 'content-length': '824', 'x-openstack-request-id': 'req-95325534-2e85-4964-8bf6-5d145d880150', 'date': 'Mon, 14 Dec 2020 02:18:57 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/0a20d802-d81d-4dc8-be56-4e38d6355d03'} Body: b'{"network":{"id":"0a20d802-d81d-4dc8-be56-4e38d6355d03","name":"tempest-NetworkSegmentsRbacTest-1290728702","tenant_id":"f92fc125904344aab17ff9e885ea5d65","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"availability_zone_hints":[],"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:18:56Z","updated_at":"2020-12-14T02:18:56Z","revision_number":1,"project_id":"f92fc125904344aab17ff9e885ea5d65","segments":[{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":29},{"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":43}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:57.685 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:57.847 186 INFO tempest.lib.common.rest_client [req-fb8b030d-ee48-44d8-aa2a-b3a10b5d99c3 ] Request (NetworkSegmentsRbacTest:test_update_network_segments): 200 GET http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles 0.156s 2020-12-14 02:18:57.850 186 DEBUG tempest.lib.common.rest_client [req-fb8b030d-ee48-44d8-aa2a-b3a10b5d99c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fb8b030d-ee48-44d8-aa2a-b3a10b5d99c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65/users/1e6937eb792040be87cea9af9e21d6dd/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:57.919 197 INFO tempest.lib.common.rest_client [req-a67c562f-fce2-4ad5-84e1-a70250d44bdd ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.246s 2020-12-14 02:18:57.922 197 DEBUG tempest.lib.common.rest_client [req-a67c562f-fce2-4ad5-84e1-a70250d44bdd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a67c562f-fce2-4ad5-84e1-a70250d44bdd', 'x-compute-request-id': 'req-a67c562f-fce2-4ad5-84e1-a70250d44bdd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:57.948 186 INFO tempest.lib.common.rest_client [req-9b1d1c3a-ab3f-43d8-8632-c1c87b57411f ] Request (NetworkSegmentsRbacTest:test_update_network_segments): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:18:57.952 186 DEBUG tempest.lib.common.rest_client [req-9b1d1c3a-ab3f-43d8-8632-c1c87b57411f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b1d1c3a-ab3f-43d8-8632-c1c87b57411f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1e6937eb792040be87cea9af9e21d6dd", "name": "tempest-NetworkSegmentsRbacTest-1390973949", "password_expires_at": null}, "audit_ids": ["wfdwWgUEQyKujxdRoIV4ig"], "expires_at": "2020-12-14T03:18:57.000000Z", "issued_at": "2020-12-14T02:18:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f92fc125904344aab17ff9e885ea5d65", "name": "tempest-NetworkSegmentsRbacTest-1390973949"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f92fc125904344aab17ff9e885ea5d65", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:58.048 193 INFO tempest.lib.common.rest_client [req-a4919fd5-22b4-4733-aa88-c3d7f706cc75 ] Request (VolumesBasicCrudV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/7cc4b44c-3249-4e95-8ab0-fb42b325a1e5 0.060s 2020-12-14 02:18:58.051 193 DEBUG tempest.lib.common.rest_client [req-a4919fd5-22b4-4733-aa88-c3d7f706cc75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-a4919fd5-22b4-4733-aa88-c3d7f706cc75', 'x-openstack-request-id': 'req-a4919fd5-22b4-4733-aa88-c3d7f706cc75', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/7cc4b44c-3249-4e95-8ab0-fb42b325a1e5'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 7cc4b44c-3249-4e95-8ab0-fb42b325a1e5 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:58.065 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:18:58.080 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:create_from_image, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:18:58.082 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:58.157 193 INFO tempest.lib.common.rest_client [req-f2956848-0ac3-47e8-891c-aea502d95dbf ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 200 GET http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles 0.068s 2020-12-14 02:18:58.159 193 DEBUG tempest.lib.common.rest_client [req-f2956848-0ac3-47e8-891c-aea502d95dbf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2956848-0ac3-47e8-891c-aea502d95dbf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:58.247 189 INFO tempest.lib.common.rest_client [req-437db98c-0295-42c9-ac6d-87847fc4a023 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.297s 2020-12-14 02:18:58.251 189 DEBUG tempest.lib.common.rest_client [req-437db98c-0295-42c9-ac6d-87847fc4a023 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-437db98c-0295-42c9-ac6d-87847fc4a023', 'x-compute-request-id': 'req-437db98c-0295-42c9-ac6d-87847fc4a023', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:58.268 193 INFO tempest.lib.common.rest_client [req-5adf8fab-6925-44b7-bb9d-ea6a1e386fa4 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-14 02:18:58.272 193 DEBUG tempest.lib.common.rest_client [req-5adf8fab-6925-44b7-bb9d-ea6a1e386fa4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5adf8fab-6925-44b7-bb9d-ea6a1e386fa4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password_expires_at": null}, "audit_ids": ["73t10qmWSBCe5Uxkx3xlTA"], "expires_at": "2020-12-14T03:18:58.000000Z", "issued_at": "2020-12-14T02:18:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:58.839 193 INFO tempest.lib.common.rest_client [req-5efe9cb7-c847-41d4-a099-125dc9686678 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 202 POST http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes 0.558s 2020-12-14 02:18:58.842 193 DEBUG tempest.lib.common.rest_client [req-5efe9cb7-c847-41d4-a099-125dc9686678 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"name": "tempest-VolumesBasicCrudV3RbacTest-Volume-831681124", "size": 1, "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5efe9cb7-c847-41d4-a099-125dc9686678', 'content-length': '846', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5efe9cb7-c847-41d4-a099-125dc9686678', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes'} Body: b'{"volume": {"id": "4c5ca33c-1b5b-4ed5-8574-9087ec83495b", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:59.000000", "updated_at": null, "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-831681124", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:58.931 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:18:59.006 193 INFO tempest.lib.common.rest_client [req-e9cefd0f-4652-40d4-b444-1322970af5ac ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 200 GET http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles 0.067s 2020-12-14 02:18:59.010 193 DEBUG tempest.lib.common.rest_client [req-e9cefd0f-4652-40d4-b444-1322970af5ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9cefd0f-4652-40d4-b444-1322970af5ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:59.060 193 INFO tempest.lib.common.rest_client [req-47c136d1-5a19-41e6-905d-333df2fe8ef8 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:18:59.064 193 DEBUG tempest.lib.common.rest_client [req-47c136d1-5a19-41e6-905d-333df2fe8ef8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47c136d1-5a19-41e6-905d-333df2fe8ef8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password_expires_at": null}, "audit_ids": ["dMCrDlFfTAe3l1CFk4Qxnw"], "expires_at": "2020-12-14T03:18:59.000000Z", "issued_at": "2020-12-14T02:18:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:59.211 193 INFO tempest.lib.common.rest_client [req-1beb2083-9f54-48c0-a499-ed4fb9d957a3 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b 0.138s 2020-12-14 02:18:59.214 193 DEBUG tempest.lib.common.rest_client [req-1beb2083-9f54-48c0-a499-ed4fb9d957a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1beb2083-9f54-48c0-a499-ed4fb9d957a3', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1beb2083-9f54-48c0-a499-ed4fb9d957a3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b'} Body: b'{"volume": {"id": "4c5ca33c-1b5b-4ed5-8574-9087ec83495b", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:59.000000", "updated_at": "2020-12-14T02:18:59.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-831681124", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:59.284 197 INFO tempest.lib.common.rest_client [req-c844bb68-d87f-426c-b070-27db61f640e6 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.252s 2020-12-14 02:18:59.288 197 DEBUG tempest.lib.common.rest_client [req-c844bb68-d87f-426c-b070-27db61f640e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c844bb68-d87f-426c-b070-27db61f640e6', 'x-compute-request-id': 'req-c844bb68-d87f-426c-b070-27db61f640e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:18:59.592 189 INFO tempest.lib.common.rest_client [req-0f06e4e6-27f8-44a3-a2a6-17b6a0f98ce2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.234s 2020-12-14 02:18:59.595 189 DEBUG tempest.lib.common.rest_client [req-0f06e4e6-27f8-44a3-a2a6-17b6a0f98ce2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:18:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0f06e4e6-27f8-44a3-a2a6-17b6a0f98ce2', 'x-compute-request-id': 'req-0f06e4e6-27f8-44a3-a2a6-17b6a0f98ce2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:00.395 193 INFO tempest.lib.common.rest_client [req-d441124d-7b8e-4c5c-a35a-147f08124794 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b 0.077s 2020-12-14 02:19:00.397 193 DEBUG tempest.lib.common.rest_client [req-d441124d-7b8e-4c5c-a35a-147f08124794 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d441124d-7b8e-4c5c-a35a-147f08124794', 'content-length': '1126', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d441124d-7b8e-4c5c-a35a-147f08124794', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b'} Body: b'{"volume": {"id": "4c5ca33c-1b5b-4ed5-8574-9087ec83495b", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:59.000000", "updated_at": "2020-12-14T02:18:59.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-831681124", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:00.737 197 INFO tempest.lib.common.rest_client [req-b5c71489-3488-4355-b9a2-57542712674c ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.341s 2020-12-14 02:19:00.741 197 DEBUG tempest.lib.common.rest_client [req-b5c71489-3488-4355-b9a2-57542712674c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b5c71489-3488-4355-b9a2-57542712674c', 'x-compute-request-id': 'req-b5c71489-3488-4355-b9a2-57542712674c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:01.580 193 INFO tempest.lib.common.rest_client [req-ae33874b-72dd-44f6-a93d-672af664aed6 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b 0.085s 2020-12-14 02:19:01.583 193 DEBUG tempest.lib.common.rest_client [req-ae33874b-72dd-44f6-a93d-672af664aed6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ae33874b-72dd-44f6-a93d-672af664aed6', 'content-length': '1129', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ae33874b-72dd-44f6-a93d-672af664aed6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b'} Body: b'{"volume": {"id": "4c5ca33c-1b5b-4ed5-8574-9087ec83495b", "status": "downloading", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:59.000000", "updated_at": "2020-12-14T02:19:00.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-831681124", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:02.764 193 INFO tempest.lib.common.rest_client [req-7411297a-5022-4e3c-8116-41c2cd189757 ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b 0.084s 2020-12-14 02:19:02.768 193 DEBUG tempest.lib.common.rest_client [req-7411297a-5022-4e3c-8116-41c2cd189757 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7411297a-5022-4e3c-8116-41c2cd189757', 'content-length': '1129', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7411297a-5022-4e3c-8116-41c2cd189757', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b'} Body: b'{"volume": {"id": "4c5ca33c-1b5b-4ed5-8574-9087ec83495b", "status": "downloading", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:59.000000", "updated_at": "2020-12-14T02:19:00.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-831681124", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:03.005 186 INFO tempest.lib.common.rest_client [req-8cde9330-0cab-49c0-b043-5677c4034927 ] Request (NetworkSegmentsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/networks/0a20d802-d81d-4dc8-be56-4e38d6355d03 5.044s 2020-12-14 02:19:03.009 186 DEBUG tempest.lib.common.rest_client [req-8cde9330-0cab-49c0-b043-5677c4034927 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-8cde9330-0cab-49c0-b043-5677c4034927', 'date': 'Mon, 14 Dec 2020 02:19:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/0a20d802-d81d-4dc8-be56-4e38d6355d03'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:03.027 189 INFO tempest.lib.common.rest_client [req-23d9fd1e-9d49-40d2-b9f0-17723eb6e9e0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 2.326s 2020-12-14 02:19:03.030 189 DEBUG tempest.lib.common.rest_client [req-23d9fd1e-9d49-40d2-b9f0-17723eb6e9e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-23d9fd1e-9d49-40d2-b9f0-17723eb6e9e0', 'x-compute-request-id': 'req-23d9fd1e-9d49-40d2-b9f0-17723eb6e9e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:03.041 197 INFO tempest.lib.common.rest_client [req-35ec0ccb-6d1f-4573-bfab-7d70b12b6dde ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 1.191s 2020-12-14 02:19:03.045 197 DEBUG tempest.lib.common.rest_client [req-35ec0ccb-6d1f-4573-bfab-7d70b12b6dde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-35ec0ccb-6d1f-4573-bfab-7d70b12b6dde', 'x-compute-request-id': 'req-35ec0ccb-6d1f-4573-bfab-7d70b12b6dde', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:03.172 186 INFO tempest.lib.common.rest_client [req-b6c3f5fe-60b3-47a9-9aa3-c35c5c0acedf ] Request (NetworkSegmentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/1e6937eb792040be87cea9af9e21d6dd 0.146s 2020-12-14 02:19:03.175 186 DEBUG tempest.lib.common.rest_client [req-b6c3f5fe-60b3-47a9-9aa3-c35c5c0acedf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6c3f5fe-60b3-47a9-9aa3-c35c5c0acedf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/1e6937eb792040be87cea9af9e21d6dd'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:03.273 186 INFO tempest.lib.common.rest_client [req-ce1d63de-55f2-4251-bcfc-9c3646b132d1 ] Request (NetworkSegmentsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:19:03.277 186 DEBUG tempest.lib.common.rest_client [req-ce1d63de-55f2-4251-bcfc-9c3646b132d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce1d63de-55f2-4251-bcfc-9c3646b132d1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["BRn4VUOcQYOvEAaT7SoWPw"], "expires_at": "2020-12-14T03:19:03.000000Z", "issued_at": "2020-12-14T02:19:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:03.444 186 INFO tempest.lib.common.rest_client [req-081ed44e-0df3-4757-b1d5-2680900b5aa4 ] Request (NetworkSegmentsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=f92fc125904344aab17ff9e885ea5d65&name=default 0.161s 2020-12-14 02:19:03.447 186 DEBUG tempest.lib.common.rest_client [req-081ed44e-0df3-4757-b1d5-2680900b5aa4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-081ed44e-0df3-4757-b1d5-2680900b5aa4', 'date': 'Mon, 14 Dec 2020 02:19:03 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=f92fc125904344aab17ff9e885ea5d65&name=default'} Body: b'{"security_groups": [{"id": "52453f0c-ee9e-4afe-8e54-ecfd0ead3125", "name": "default", "stateful": true, "tenant_id": "f92fc125904344aab17ff9e885ea5d65", "description": "Default security group", "security_group_rules": [{"id": "270783d1-8c45-40f2-93f2-522d84d2a0d1", "tenant_id": "f92fc125904344aab17ff9e885ea5d65", "security_group_id": "52453f0c-ee9e-4afe-8e54-ecfd0ead3125", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:52Z", "updated_at": "2020-12-14T02:18:52Z", "revision_number": 0, "project_id": "f92fc125904344aab17ff9e885ea5d65"}, {"id": "791cde1f-5768-4331-b6f3-14d8a39bd5b9", "tenant_id": "f92fc125904344aab17ff9e885ea5d65", "security_group_id": "52453f0c-ee9e-4afe-8e54-ecfd0ead3125", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:18:52Z", "updated_at": "2020-12-14T02:18:52Z", "revision_number": 0, "project_id": "f92fc125904344aab17ff9e885ea5d65"}, {"id": "8fc53f6a-dd07-45c5-9509-206f1b59a8dc", "tenant_id": "f92fc125904344aab17ff9e885ea5d65", "security_group_id": "52453f0c-ee9e-4afe-8e54-ecfd0ead3125", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "52453f0c-ee9e-4afe-8e54-ecfd0ead3125", "description": null, "tags": [], "created_at": "2020-12-14T02:18:52Z", "updated_at": "2020-12-14T02:18:52Z", "revision_number": 0, "project_id": "f92fc125904344aab17ff9e885ea5d65"}, {"id": "da2f2c09-2ec2-4785-9ce4-b7918d038f5b", "tenant_id": "f92fc125904344aab17ff9e885ea5d65", "security_group_id": "52453f0c-ee9e-4afe-8e54-ecfd0ead3125", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "52453f0c-ee9e-4afe-8e54-ecfd0ead3125", "description": null, "tags": [], "created_at": "2020-12-14T02:18:52Z", "updated_at": "2020-12-14T02:18:52Z", "revision_number": 0, "project_id": "f92fc125904344aab17ff9e885ea5d65"}], "tags": [], "created_at": "2020-12-14T02:18:52Z", "updated_at": "2020-12-14T02:18:52Z", "revision_number": 1, "project_id": "f92fc125904344aab17ff9e885ea5d65"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:03.613 186 INFO tempest.lib.common.rest_client [req-51af4f33-73be-4bbc-a99b-dc5d6df35188 ] Request (NetworkSegmentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/52453f0c-ee9e-4afe-8e54-ecfd0ead3125 0.161s 2020-12-14 02:19:03.615 186 DEBUG tempest.lib.common.rest_client [req-51af4f33-73be-4bbc-a99b-dc5d6df35188 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-51af4f33-73be-4bbc-a99b-dc5d6df35188', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:03 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/52453f0c-ee9e-4afe-8e54-ecfd0ead3125'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:03.770 186 INFO tempest.lib.common.rest_client [req-5cda36e4-7a02-4226-a9a9-de7f9a8f73bf ] Request (NetworkSegmentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65 0.150s 2020-12-14 02:19:03.773 186 DEBUG tempest.lib.common.rest_client [req-5cda36e4-7a02-4226-a9a9-de7f9a8f73bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5cda36e4-7a02-4226-a9a9-de7f9a8f73bf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f92fc125904344aab17ff9e885ea5d65'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:03.871 186 INFO tempest.lib.common.rest_client [req-be7e3526-d405-4929-89b9-a38aa34bc6ad ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-12-14 02:19:03.874 186 DEBUG tempest.lib.common.rest_client [req-be7e3526-d405-4929-89b9-a38aa34bc6ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be7e3526-d405-4929-89b9-a38aa34bc6ad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["-grnViXTTXWvMreiOQiG5Q"], "expires_at": "2020-12-14T03:19:03.000000Z", "issued_at": "2020-12-14T02:19:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:03.948 193 INFO tempest.lib.common.rest_client [req-defb6acc-db28-4a0f-8acc-c658874a2d3b ] Request (VolumesBasicCrudV3RbacTest:test_create_volume_from_image): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b 0.082s 2020-12-14 02:19:03.951 193 DEBUG tempest.lib.common.rest_client [req-defb6acc-db28-4a0f-8acc-c658874a2d3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-defb6acc-db28-4a0f-8acc-c658874a2d3b', 'content-length': '1722', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-defb6acc-db28-4a0f-8acc-c658874a2d3b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b'} Body: b'{"volume": {"id": "4c5ca33c-1b5b-4ed5-8574-9087ec83495b", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:59.000000", "updated_at": "2020-12-14T02:19:03.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-831681124", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "true", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "image_id": "cd332004-33aa-4c81-9e50-54766a6df097", "image_name": "patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "container_format": "bare", "disk_format": "qcow2", "min_disk": "0", "min_ram": "0", "size": "12716032"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:03.963 186 INFO tempest.lib.common.rest_client [req-857be4a7-8f20-497d-8c9e-44a23b332281 ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:19:03.966 186 DEBUG tempest.lib.common.rest_client [req-857be4a7-8f20-497d-8c9e-44a23b332281 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-857be4a7-8f20-497d-8c9e-44a23b332281', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Ys_2NWy4TUmVo39s_eYp7Q"], "expires_at": "2020-12-14T03:19:03.000000Z", "issued_at": "2020-12-14T02:19:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:04.040 193 INFO tempest.common.waiters [-] volume 4c5ca33c-1b5b-4ed5-8574-9087ec83495b reached available after waiting for 5.039898 seconds 2020-12-14 02:19:04.044 186 INFO tempest.lib.common.rest_client [req-3677ece6-862d-4257-b74a-3a86d96738ef ] Request (NetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.070s 2020-12-14 02:19:04.047 186 DEBUG tempest.lib.common.rest_client [req-3677ece6-862d-4257-b74a-3a86d96738ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3677ece6-862d-4257-b74a-3a86d96738ef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:04.117 186 INFO tempest.lib.common.rest_client [req-04da91c4-73ac-4af7-8e06-e27d9da9e696 ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.064s 2020-12-14 02:19:04.119 186 DEBUG tempest.lib.common.rest_client [req-04da91c4-73ac-4af7-8e06-e27d9da9e696 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-NetworksRbacTest-551926975-desc", "domain_id": "default", "name": "tempest-NetworksRbacTest-551926975"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '368', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04da91c4-73ac-4af7-8e06-e27d9da9e696', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975", "domain_id": "default", "description": "tempest-NetworksRbacTest-551926975-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:04.140 193 INFO tempest.lib.common.rest_client [req-814eaaed-2a18-45f3-9bca-11b2a3b3dfdf ] Request (VolumesBasicCrudV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b 0.095s 2020-12-14 02:19:04.143 193 DEBUG tempest.lib.common.rest_client [req-814eaaed-2a18-45f3-9bca-11b2a3b3dfdf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-814eaaed-2a18-45f3-9bca-11b2a3b3dfdf', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:04.240 186 INFO tempest.lib.common.rest_client [req-5f1120d6-954a-4b0c-8043-b0d2ef43ab96 ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.112s 2020-12-14 02:19:04.241 193 INFO tempest.lib.common.rest_client [req-88e53d70-530b-45cf-b838-b7aac09e3cb2 ] Request (VolumesBasicCrudV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b 0.091s 2020-12-14 02:19:04.244 193 DEBUG tempest.lib.common.rest_client [req-88e53d70-530b-45cf-b838-b7aac09e3cb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-88e53d70-530b-45cf-b838-b7aac09e3cb2', 'content-length': '1721', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-88e53d70-530b-45cf-b838-b7aac09e3cb2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b'} Body: b'{"volume": {"id": "4c5ca33c-1b5b-4ed5-8574-9087ec83495b", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:59.000000", "updated_at": "2020-12-14T02:19:04.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-831681124", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "true", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "image_id": "cd332004-33aa-4c81-9e50-54766a6df097", "image_name": "patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "container_format": "bare", "disk_format": "qcow2", "min_disk": "0", "min_ram": "0", "size": "12716032"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:04.244 186 DEBUG tempest.lib.common.rest_client [req-5f1120d6-954a-4b0c-8043-b0d2ef43ab96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-NetworksRbacTest-551926975", "password": "W7#ibQMBFTT1fSu", "project_id": "018f3876f714467cb33dc272b1b292fa", "email": "tempest-NetworksRbacTest-19493895@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '385', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f1120d6-954a-4b0c-8043-b0d2ef43ab96', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "018f3876f714467cb33dc272b1b292fa", "email": "tempest-NetworksRbacTest-19493895@example.com", "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/e8ed31319cd64f6ebc514ca361a5a71b"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:04.334 186 INFO tempest.lib.common.rest_client [req-e8bd92dc-2afa-4dbf-b0e8-a83382189ebc ] Request (NetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.082s 2020-12-14 02:19:04.337 186 DEBUG tempest.lib.common.rest_client [req-e8bd92dc-2afa-4dbf-b0e8-a83382189ebc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e8bd92dc-2afa-4dbf-b0e8-a83382189ebc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:04.343 189 INFO tempest.lib.common.rest_client [req-de5e7f73-b83b-4956-bace-6042de5ac8ab ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.215s 2020-12-14 02:19:04.346 189 DEBUG tempest.lib.common.rest_client [req-de5e7f73-b83b-4956-bace-6042de5ac8ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-de5e7f73-b83b-4956-bace-6042de5ac8ab', 'x-compute-request-id': 'req-de5e7f73-b83b-4956-bace-6042de5ac8ab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:04.389 197 INFO tempest.lib.common.rest_client [req-004cfe6a-1e85-4f6f-9b31-a746def286d3 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.234s 2020-12-14 02:19:04.392 197 DEBUG tempest.lib.common.rest_client [req-004cfe6a-1e85-4f6f-9b31-a746def286d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-004cfe6a-1e85-4f6f-9b31-a746def286d3', 'x-compute-request-id': 'req-004cfe6a-1e85-4f6f-9b31-a746def286d3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:04.403 186 INFO tempest.lib.common.rest_client [req-2ad470cf-46bb-4b5d-b635-da6bdc557775 ] Request (NetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:19:04.405 186 DEBUG tempest.lib.common.rest_client [req-2ad470cf-46bb-4b5d-b635-da6bdc557775 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ad470cf-46bb-4b5d-b635-da6bdc557775', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:04.490 186 INFO tempest.lib.common.rest_client [req-30cd0396-b6e0-4c47-b133-8a4268dc659c ] Request (NetworksRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles/72a4576c553448cd941b052c1ca0cf2d 0.079s 2020-12-14 02:19:04.492 186 DEBUG tempest.lib.common.rest_client [req-30cd0396-b6e0-4c47-b133-8a4268dc659c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30cd0396-b6e0-4c47-b133-8a4268dc659c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:04.495 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NetworksRbacTest-551926975', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '018f3876f714467cb33dc272b1b292fa', 'project_name': 'tempest-NetworksRbacTest-551926975', 'tenant_id': '018f3876f714467cb33dc272b1b292fa', 'tenant_name': 'tempest-NetworksRbacTest-551926975', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'e8ed31319cd64f6ebc514ca361a5a71b'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:04.498 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NetworksRbacTest-551926975', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '018f3876f714467cb33dc272b1b292fa', 'project_name': 'tempest-NetworksRbacTest-551926975', 'tenant_id': '018f3876f714467cb33dc272b1b292fa', 'tenant_name': 'tempest-NetworksRbacTest-551926975', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'e8ed31319cd64f6ebc514ca361a5a71b'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:04.674 186 INFO tempest.lib.common.rest_client [req-23ede967-e344-47c7-afd4-ed45ea165e58 ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-12-14 02:19:04.678 186 DEBUG tempest.lib.common.rest_client [req-23ede967-e344-47c7-afd4-ed45ea165e58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6561', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-23ede967-e344-47c7-afd4-ed45ea165e58', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["vX9Erg7QSIagTMw5F3kJRA"], "expires_at": "2020-12-14T03:19:04.000000Z", "issued_at": "2020-12-14T02:19:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:04.779 186 INFO tempest.lib.common.rest_client [req-8bd8c145-9df4-4874-833c-c144f91444f8 ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:19:04.783 186 DEBUG tempest.lib.common.rest_client [req-8bd8c145-9df4-4874-833c-c144f91444f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8bd8c145-9df4-4874-833c-c144f91444f8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["959bkLn0QRCGfmNp8_9lSw"], "expires_at": "2020-12-14T03:19:04.000000Z", "issued_at": "2020-12-14T02:19:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:04.875 186 INFO tempest.lib.common.rest_client [req-a2b6522f-dca2-480f-9992-28838447d16c ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:19:04.877 186 DEBUG tempest.lib.common.rest_client [req-a2b6522f-dca2-480f-9992-28838447d16c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2b6522f-dca2-480f-9992-28838447d16c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["H6B3zIHhQf2Bk3Qq5KbVww"], "expires_at": "2020-12-14T03:19:04.000000Z", "issued_at": "2020-12-14T02:19:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:04.938 186 INFO tempest.lib.common.rest_client [req-73264bcc-5df4-4d46-9f82-66c3d208ebb6 ] Request (NetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.054s 2020-12-14 02:19:04.941 186 DEBUG tempest.lib.common.rest_client [req-73264bcc-5df4-4d46-9f82-66c3d208ebb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73264bcc-5df4-4d46-9f82-66c3d208ebb6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:04.996 186 INFO tempest.lib.common.rest_client [req-247628b7-4716-4848-964f-962ce7b71e3e ] Request (NetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-12-14 02:19:04.998 186 DEBUG tempest.lib.common.rest_client [req-247628b7-4716-4848-964f-962ce7b71e3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-247628b7-4716-4848-964f-962ce7b71e3e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:05.000 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:19:05.002 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:05.059 186 INFO tempest.lib.common.rest_client [req-d9fa9acc-06bb-436e-a854-0ec6bf4ec2e4 ] Request (NetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.052s 2020-12-14 02:19:05.062 186 DEBUG tempest.lib.common.rest_client [req-d9fa9acc-06bb-436e-a854-0ec6bf4ec2e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9fa9acc-06bb-436e-a854-0ec6bf4ec2e4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:05.131 186 INFO tempest.lib.common.rest_client [req-c8dc4213-161f-48b6-bb86-cc9851a736bd ] Request (NetworksRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles/72a4576c553448cd941b052c1ca0cf2d 0.061s 2020-12-14 02:19:05.133 186 DEBUG tempest.lib.common.rest_client [req-c8dc4213-161f-48b6-bb86-cc9851a736bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8dc4213-161f-48b6-bb86-cc9851a736bd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:05.247 186 INFO tempest.lib.common.rest_client [req-5ce0c854-8a7c-4a3f-9776-0e43165b95b9 ] Request (NetworksRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-12-14 02:19:05.251 186 DEBUG tempest.lib.common.rest_client [req-5ce0c854-8a7c-4a3f-9776-0e43165b95b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ce0c854-8a7c-4a3f-9776-0e43165b95b9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:05.403 193 INFO tempest.lib.common.rest_client [req-f7aba2b5-e380-475c-805b-39a3cfe4d8aa ] Request (VolumesBasicCrudV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b 0.056s 2020-12-14 02:19:05.406 193 DEBUG tempest.lib.common.rest_client [req-f7aba2b5-e380-475c-805b-39a3cfe4d8aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-f7aba2b5-e380-475c-805b-39a3cfe4d8aa', 'x-openstack-request-id': 'req-f7aba2b5-e380-475c-805b-39a3cfe4d8aa', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/4c5ca33c-1b5b-4ed5-8574-9087ec83495b'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 4c5ca33c-1b5b-4ed5-8574-9087ec83495b could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:05.422 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:05.440 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:05.647 189 INFO tempest.lib.common.rest_client [req-e275b4bf-fd29-405f-8c48-5fbe50187b33 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.206s 2020-12-14 02:19:05.650 189 DEBUG tempest.lib.common.rest_client [req-e275b4bf-fd29-405f-8c48-5fbe50187b33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e275b4bf-fd29-405f-8c48-5fbe50187b33', 'x-compute-request-id': 'req-e275b4bf-fd29-405f-8c48-5fbe50187b33', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:05.704 193 INFO tempest.lib.common.rest_client [req-908e0d3d-961f-4ab3-8b71-145a10798e4a ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 202 POST http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes 0.258s 2020-12-14 02:19:05.708 193 DEBUG tempest.lib.common.rest_client [req-908e0d3d-961f-4ab3-8b71-145a10798e4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-1762086902"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-908e0d3d-961f-4ab3-8b71-145a10798e4a', 'content-length': '847', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-908e0d3d-961f-4ab3-8b71-145a10798e4a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes'} Body: b'{"volume": {"id": "23b5835f-8e18-4c29-babc-39ffe1486026", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:06.000000", "updated_at": null, "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-1762086902", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:05.733 197 INFO tempest.lib.common.rest_client [req-62049bfb-415f-4846-8d8e-8827f5b9c2ed ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.227s 2020-12-14 02:19:05.736 197 DEBUG tempest.lib.common.rest_client [req-62049bfb-415f-4846-8d8e-8827f5b9c2ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-62049bfb-415f-4846-8d8e-8827f5b9c2ed', 'x-compute-request-id': 'req-62049bfb-415f-4846-8d8e-8827f5b9c2ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:05.876 193 INFO tempest.lib.common.rest_client [req-44943379-b106-4231-856b-1f04448effd1 ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026 0.082s 2020-12-14 02:19:05.880 193 DEBUG tempest.lib.common.rest_client [req-44943379-b106-4231-856b-1f04448effd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-44943379-b106-4231-856b-1f04448effd1', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-44943379-b106-4231-856b-1f04448effd1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026'} Body: b'{"volume": {"id": "23b5835f-8e18-4c29-babc-39ffe1486026", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:06.000000", "updated_at": "2020-12-14T02:19:06.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-1762086902", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:06.357 186 INFO tempest.lib.common.rest_client [req-e7d7049c-0f11-46be-927d-6f0afe5fa4ae ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:19:06.361 186 DEBUG tempest.lib.common.rest_client [req-e7d7049c-0f11-46be-927d-6f0afe5fa4ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7d7049c-0f11-46be-927d-6f0afe5fa4ae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["C5usfK3HS7qhzUEj5jq4_w"], "expires_at": "2020-12-14T03:19:06.000000Z", "issued_at": "2020-12-14T02:19:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:06.957 186 INFO tempest.lib.common.rest_client [req-857e0290-ee94-4fd0-9982-6d54c28a81c9 ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.584s 2020-12-14 02:19:06.961 186 DEBUG tempest.lib.common.rest_client [req-857e0290-ee94-4fd0-9982-6d54c28a81c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-test-network-816309557"}} Response - Headers: {'content-type': 'application/json', 'content-length': '736', 'x-openstack-request-id': 'req-857e0290-ee94-4fd0-9982-6d54c28a81c9', 'date': 'Mon, 14 Dec 2020 02:19:06 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"cb9bcdd1-9700-4d03-8250-b150f1bb918c","name":"tempest-NetworksRbacTest-test-network-816309557","tenant_id":"018f3876f714467cb33dc272b1b292fa","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"018f3876f714467cb33dc272b1b292fa","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":43,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:19:06Z","updated_at":"2020-12-14T02:19:06Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:06.994 189 INFO tempest.lib.common.rest_client [req-1595c14f-480c-4c09-99b2-211a536fb222 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.233s 2020-12-14 02:19:06.997 189 DEBUG tempest.lib.common.rest_client [req-1595c14f-480c-4c09-99b2-211a536fb222 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1595c14f-480c-4c09-99b2-211a536fb222', 'x-compute-request-id': 'req-1595c14f-480c-4c09-99b2-211a536fb222', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:07.063 193 INFO tempest.lib.common.rest_client [req-927d440a-5dcc-4f9b-ae19-f6a8368d61a8 ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026 0.082s 2020-12-14 02:19:07.068 193 DEBUG tempest.lib.common.rest_client [req-927d440a-5dcc-4f9b-ae19-f6a8368d61a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-927d440a-5dcc-4f9b-ae19-f6a8368d61a8', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-927d440a-5dcc-4f9b-ae19-f6a8368d61a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026'} Body: b'{"volume": {"id": "23b5835f-8e18-4c29-babc-39ffe1486026", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:06.000000", "updated_at": "2020-12-14T02:19:06.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-1762086902", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:07.071 197 INFO tempest.lib.common.rest_client [req-ce110fc1-fcdb-4d22-9398-1e8d4a7c82f9 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.226s 2020-12-14 02:19:07.074 197 DEBUG tempest.lib.common.rest_client [req-ce110fc1-fcdb-4d22-9398-1e8d4a7c82f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ce110fc1-fcdb-4d22-9398-1e8d4a7c82f9', 'x-compute-request-id': 'req-ce110fc1-fcdb-4d22-9398-1e8d4a7c82f9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:07.161 193 INFO tempest.common.waiters [-] volume 23b5835f-8e18-4c29-babc-39ffe1486026 reached available after waiting for 2.160836 seconds 2020-12-14 02:19:07.163 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:07.283 193 INFO tempest.lib.common.rest_client [req-d6eaabb7-2514-48be-9967-4fcc5bf89dba ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 200 GET http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles 0.113s 2020-12-14 02:19:07.286 193 DEBUG tempest.lib.common.rest_client [req-d6eaabb7-2514-48be-9967-4fcc5bf89dba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6eaabb7-2514-48be-9967-4fcc5bf89dba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:07.382 193 INFO tempest.lib.common.rest_client [req-e8e01a2b-1eee-443a-b252-dc95852e4253 ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:19:07.386 193 DEBUG tempest.lib.common.rest_client [req-e8e01a2b-1eee-443a-b252-dc95852e4253 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e8e01a2b-1eee-443a-b252-dc95852e4253', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password_expires_at": null}, "audit_ids": ["wed5kAOzRJ6RaNZXL6ZvEQ"], "expires_at": "2020-12-14T03:19:07.000000Z", "issued_at": "2020-12-14T02:19:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:07.573 193 INFO tempest.lib.common.rest_client [req-f1cf54c7-2db9-4c3c-9c56-c1472c82c62c ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 202 DELETE http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026 0.179s 2020-12-14 02:19:07.577 193 DEBUG tempest.lib.common.rest_client [req-f1cf54c7-2db9-4c3c-9c56-c1472c82c62c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f1cf54c7-2db9-4c3c-9c56-c1472c82c62c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:07.580 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:07.657 186 INFO tempest.lib.common.rest_client [req-9e4e40f8-69ce-48ef-b4fe-2a4b2b50040f ] Request (NetworksRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.688s 2020-12-14 02:19:07.658 193 INFO tempest.lib.common.rest_client [req-1fe8d004-cb13-45d8-aaaa-8d19679b8bd1 ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 200 GET http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles 0.072s 2020-12-14 02:19:07.660 186 DEBUG tempest.lib.common.rest_client [req-9e4e40f8-69ce-48ef-b4fe-2a4b2b50040f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "cb9bcdd1-9700-4d03-8250-b150f1bb918c", "cidr": "192.168.120.0/24", "ip_version": 4, "gateway_ip": "192.168.120.1", "enable_dhcp": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '663', 'x-openstack-request-id': 'req-9e4e40f8-69ce-48ef-b4fe-2a4b2b50040f', 'date': 'Mon, 14 Dec 2020 02:19:07 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"68f6c472-de82-48f4-ad9f-e861023eab10","name":"","tenant_id":"018f3876f714467cb33dc272b1b292fa","network_id":"cb9bcdd1-9700-4d03-8250-b150f1bb918c","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/24","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:19:07Z","updated_at":"2020-12-14T02:19:07Z","revision_number":0,"project_id":"018f3876f714467cb33dc272b1b292fa"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:07.662 193 DEBUG tempest.lib.common.rest_client [req-1fe8d004-cb13-45d8-aaaa-8d19679b8bd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1fe8d004-cb13-45d8-aaaa-8d19679b8bd1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:07.668 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:07.693 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:07.696 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:07.708 193 INFO tempest.lib.common.rest_client [req-f2d540c3-feae-49c2-9733-cdad7156d23b ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:19:07.711 193 DEBUG tempest.lib.common.rest_client [req-f2d540c3-feae-49c2-9733-cdad7156d23b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2d540c3-feae-49c2-9733-cdad7156d23b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password_expires_at": null}, "audit_ids": ["_aVxi6VsTSm8cGkg22CmMA"], "expires_at": "2020-12-14T03:19:07.000000Z", "issued_at": "2020-12-14T02:19:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:07.773 186 INFO tempest.lib.common.rest_client [req-398840e5-cae4-4e74-8c95-9bb1bdd8b635 ] Request (NetworksRbacTest:test_create_network): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.071s 2020-12-14 02:19:07.776 186 DEBUG tempest.lib.common.rest_client [req-398840e5-cae4-4e74-8c95-9bb1bdd8b635 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-398840e5-cae4-4e74-8c95-9bb1bdd8b635', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:07.833 186 INFO tempest.lib.common.rest_client [req-6041e1a1-8fad-4196-8471-c6fd1a35f401 ] Request (NetworksRbacTest:test_create_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:19:07.836 186 DEBUG tempest.lib.common.rest_client [req-6041e1a1-8fad-4196-8471-c6fd1a35f401 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6041e1a1-8fad-4196-8471-c6fd1a35f401', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["C2YQmtxtTvi9y2Up43MVKg"], "expires_at": "2020-12-14T03:19:07.000000Z", "issued_at": "2020-12-14T02:19:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:07.872 193 INFO tempest.lib.common.rest_client [req-c85ac77d-27d1-4960-9e44-18477c8633c1 ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026 0.153s 2020-12-14 02:19:07.875 193 DEBUG tempest.lib.common.rest_client [req-c85ac77d-27d1-4960-9e44-18477c8633c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c85ac77d-27d1-4960-9e44-18477c8633c1', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c85ac77d-27d1-4960-9e44-18477c8633c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026'} Body: b'{"volume": {"id": "23b5835f-8e18-4c29-babc-39ffe1486026", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:06.000000", "updated_at": "2020-12-14T02:19:08.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-1762086902", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:08.336 186 INFO tempest.lib.common.rest_client [req-fe371ce0-2e12-4892-a8f8-19a8288afc4b ] Request (NetworksRbacTest:test_create_network): 201 POST http://172.30.13.94:9696/v2.0/networks 0.492s 2020-12-14 02:19:08.340 186 DEBUG tempest.lib.common.rest_client [req-fe371ce0-2e12-4892-a8f8-19a8288afc4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-1271973793"}} Response - Headers: {'content-type': 'application/json', 'content-length': '732', 'x-openstack-request-id': 'req-fe371ce0-2e12-4892-a8f8-19a8288afc4b', 'date': 'Mon, 14 Dec 2020 02:19:08 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"2928603e-d2ac-4c6a-ad46-1e98ad5b0753","name":"tempest-NetworksRbacTest-Network-1271973793","tenant_id":"018f3876f714467cb33dc272b1b292fa","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"018f3876f714467cb33dc272b1b292fa","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":61,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:19:08Z","updated_at":"2020-12-14T02:19:08Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:08.343 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:08.344 189 INFO tempest.lib.common.rest_client [req-0ad19f82-17de-4e7c-94eb-ec45c279d010 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.239s 2020-12-14 02:19:08.347 189 DEBUG tempest.lib.common.rest_client [req-0ad19f82-17de-4e7c-94eb-ec45c279d010 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0ad19f82-17de-4e7c-94eb-ec45c279d010', 'x-compute-request-id': 'req-0ad19f82-17de-4e7c-94eb-ec45c279d010', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:08.421 186 INFO tempest.lib.common.rest_client [req-b3b809ca-009a-4d6d-9c36-58b12b926f7b ] Request (NetworksRbacTest:test_create_network): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.070s 2020-12-14 02:19:08.424 186 DEBUG tempest.lib.common.rest_client [req-b3b809ca-009a-4d6d-9c36-58b12b926f7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3b809ca-009a-4d6d-9c36-58b12b926f7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:08.433 197 INFO tempest.lib.common.rest_client [req-df0a95b9-778a-411a-8f6f-47069a4465fb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.247s 2020-12-14 02:19:08.436 197 DEBUG tempest.lib.common.rest_client [req-df0a95b9-778a-411a-8f6f-47069a4465fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-df0a95b9-778a-411a-8f6f-47069a4465fb', 'x-compute-request-id': 'req-df0a95b9-778a-411a-8f6f-47069a4465fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:08.473 186 INFO tempest.lib.common.rest_client [req-e1690b4c-dedc-44c2-bd14-20fbffd9d264 ] Request (NetworksRbacTest:test_create_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:19:08.476 186 DEBUG tempest.lib.common.rest_client [req-e1690b4c-dedc-44c2-bd14-20fbffd9d264 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1690b4c-dedc-44c2-bd14-20fbffd9d264', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["q_7sbsEaSLa8zQhxLoT_7A"], "expires_at": "2020-12-14T03:19:08.000000Z", "issued_at": "2020-12-14T02:19:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:08.490 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:08.512 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:08.514 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:08.537 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network:is_default, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:08.539 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:08.604 186 INFO tempest.lib.common.rest_client [req-710d26a7-f49d-417b-82c1-051755854534 ] Request (NetworksRbacTest:test_create_network_is_default): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.059s 2020-12-14 02:19:08.607 186 DEBUG tempest.lib.common.rest_client [req-710d26a7-f49d-417b-82c1-051755854534 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-710d26a7-f49d-417b-82c1-051755854534', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:08.658 186 INFO tempest.lib.common.rest_client [req-7d1ee80f-b7a5-4eea-b4ab-470aa0575347 ] Request (NetworksRbacTest:test_create_network_is_default): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:19:08.661 186 DEBUG tempest.lib.common.rest_client [req-7d1ee80f-b7a5-4eea-b4ab-470aa0575347 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d1ee80f-b7a5-4eea-b4ab-470aa0575347', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["NLwO2D3AQnaqy8vJ_BFhxw"], "expires_at": "2020-12-14T03:19:08.000000Z", "issued_at": "2020-12-14T02:19:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:08.983 186 INFO tempest.lib.common.rest_client [req-10c70002-3c1e-4d2b-8214-ab1865b42982 ] Request (NetworksRbacTest:test_create_network_is_default): 409 POST http://172.30.13.94:9696/v2.0/networks 0.315s 2020-12-14 02:19:08.986 186 DEBUG tempest.lib.common.rest_client [req-10c70002-3c1e-4d2b-8214-ab1865b42982 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-1059534266", "is_default": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '167', 'x-openstack-request-id': 'req-10c70002-3c1e-4d2b-8214-ab1865b42982', 'date': 'Mon, 14 Dec 2020 02:19:08 GMT', 'connection': 'close', 'status': '409', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"NeutronError": {"type": "DefaultExternalNetworkExists", "message": "A default external network already exists: 3fe4fc32-89a3-4f72-b166-6eb7100e1fea.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:08.990 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:09.035 193 INFO tempest.lib.common.rest_client [req-744c2078-21ca-40a6-85c3-468d0607a03b ] Request (VolumesBasicCrudV3RbacTest:test_delete_volume): 404 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026 0.060s 2020-12-14 02:19:09.039 193 DEBUG tempest.lib.common.rest_client [req-744c2078-21ca-40a6-85c3-468d0607a03b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-744c2078-21ca-40a6-85c3-468d0607a03b', 'x-openstack-request-id': 'req-744c2078-21ca-40a6-85c3-468d0607a03b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 23b5835f-8e18-4c29-babc-39ffe1486026 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.054 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:09.063 186 INFO tempest.lib.common.rest_client [req-b601db85-3fae-4a60-8219-4c247c34f000 ] Request (NetworksRbacTest:test_create_network_is_default): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.067s 2020-12-14 02:19:09.066 186 DEBUG tempest.lib.common.rest_client [req-b601db85-3fae-4a60-8219-4c247c34f000 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b601db85-3fae-4a60-8219-4c247c34f000', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.071 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_all, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:09.073 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:09.116 186 INFO tempest.lib.common.rest_client [req-009badcd-23e0-47ea-9e65-85b31e69d94e ] Request (NetworksRbacTest:test_create_network_is_default): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:19:09.119 186 DEBUG tempest.lib.common.rest_client [req-009badcd-23e0-47ea-9e65-85b31e69d94e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-009badcd-23e0-47ea-9e65-85b31e69d94e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["029Z36loScuzW4hMT1-sGw"], "expires_at": "2020-12-14T03:19:09.000000Z", "issued_at": "2020-12-14T02:19:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.134 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:09.152 193 INFO tempest.lib.common.rest_client [req-9fd9d6e2-797e-48b1-b0cc-24a785dfa51f ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes): 200 GET http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles 0.072s 2020-12-14 02:19:09.156 193 DEBUG tempest.lib.common.rest_client [req-9fd9d6e2-797e-48b1-b0cc-24a785dfa51f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9fd9d6e2-797e-48b1-b0cc-24a785dfa51f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.157 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:09.160 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:09.183 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network:provider:network_type, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:09.185 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:09.207 193 INFO tempest.lib.common.rest_client [req-ed40da54-b5e5-44bc-b277-65ffbf380628 ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:19:09.211 193 DEBUG tempest.lib.common.rest_client [req-ed40da54-b5e5-44bc-b277-65ffbf380628 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed40da54-b5e5-44bc-b277-65ffbf380628', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password_expires_at": null}, "audit_ids": ["IhkC-iJ1QoapVyivIDsDMQ"], "expires_at": "2020-12-14T03:19:09.000000Z", "issued_at": "2020-12-14T02:19:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.256 186 INFO tempest.lib.common.rest_client [req-970c37e1-b776-4fab-8d7c-be5bee459364 ] Request (NetworksRbacTest:test_create_network_provider_network_type): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.065s 2020-12-14 02:19:09.259 186 DEBUG tempest.lib.common.rest_client [req-970c37e1-b776-4fab-8d7c-be5bee459364 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-970c37e1-b776-4fab-8d7c-be5bee459364', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.312 186 INFO tempest.lib.common.rest_client [req-6af7db1b-da28-45d8-b4b6-2658fd2ed472 ] Request (NetworksRbacTest:test_create_network_provider_network_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:19:09.315 186 DEBUG tempest.lib.common.rest_client [req-6af7db1b-da28-45d8-b4b6-2658fd2ed472 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6af7db1b-da28-45d8-b4b6-2658fd2ed472', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["p-nPDucVQsOZw28OJpbEBg"], "expires_at": "2020-12-14T03:19:09.000000Z", "issued_at": "2020-12-14T02:19:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.346 193 INFO tempest.lib.common.rest_client [req-8744b1ba-405c-4c2f-a0e8-133f7e7b3f86 ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes 0.127s 2020-12-14 02:19:09.348 193 DEBUG tempest.lib.common.rest_client [req-8744b1ba-405c-4c2f-a0e8-133f7e7b3f86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8744b1ba-405c-4c2f-a0e8-133f7e7b3f86', 'content-length': '409', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8744b1ba-405c-4c2f-a0e8-133f7e7b3f86', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes'} Body: b'{"volumes": [{"id": "04273fcf-2194-45fc-b235-c46a27cc1109", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-1575378150", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.379 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:09.473 193 INFO tempest.lib.common.rest_client [req-aa19a537-f874-42a9-a877-b625f66c4015 ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes): 200 GET http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles 0.088s 2020-12-14 02:19:09.476 193 DEBUG tempest.lib.common.rest_client [req-aa19a537-f874-42a9-a877-b625f66c4015 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa19a537-f874-42a9-a877-b625f66c4015', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.525 193 INFO tempest.lib.common.rest_client [req-210c5bb4-a6dd-4e2d-80f1-b2f7a5581a36 ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:19:09.528 193 DEBUG tempest.lib.common.rest_client [req-210c5bb4-a6dd-4e2d-80f1-b2f7a5581a36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-210c5bb4-a6dd-4e2d-80f1-b2f7a5581a36', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password_expires_at": null}, "audit_ids": ["gR15hNr5QFeANjG2yHPL6g"], "expires_at": "2020-12-14T03:19:09.000000Z", "issued_at": "2020-12-14T02:19:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.543 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:09.567 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_all, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:09.570 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:09.639 193 INFO tempest.lib.common.rest_client [req-257f03d6-fd75-4345-8cc2-e9a2c96905a8 ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes_with_details): 200 GET http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles 0.062s 2020-12-14 02:19:09.643 193 DEBUG tempest.lib.common.rest_client [req-257f03d6-fd75-4345-8cc2-e9a2c96905a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-257f03d6-fd75-4345-8cc2-e9a2c96905a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.677 189 INFO tempest.lib.common.rest_client [req-b14783f8-2a75-409e-b7f6-289576a331d7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.242s 2020-12-14 02:19:09.680 189 DEBUG tempest.lib.common.rest_client [req-b14783f8-2a75-409e-b7f6-289576a331d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b14783f8-2a75-409e-b7f6-289576a331d7', 'x-compute-request-id': 'req-b14783f8-2a75-409e-b7f6-289576a331d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.695 193 INFO tempest.lib.common.rest_client [req-40033f0c-55d4-4080-9ac1-2625f7ef27c9 ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:19:09.698 193 DEBUG tempest.lib.common.rest_client [req-40033f0c-55d4-4080-9ac1-2625f7ef27c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40033f0c-55d4-4080-9ac1-2625f7ef27c9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password_expires_at": null}, "audit_ids": ["UQTxOAmURz-NHeQn9Ewojw"], "expires_at": "2020-12-14T03:19:09.000000Z", "issued_at": "2020-12-14T02:19:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.712 186 INFO tempest.lib.common.rest_client [req-7ce56d3d-b984-4639-b20e-6905ca73a5e0 ] Request (NetworksRbacTest:test_create_network_provider_network_type): 201 POST http://172.30.13.94:9696/v2.0/networks 0.389s 2020-12-14 02:19:09.715 186 DEBUG tempest.lib.common.rest_client [req-7ce56d3d-b984-4639-b20e-6905ca73a5e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-1342403589", "provider:network_type": "vxlan"}} Response - Headers: {'content-type': 'application/json', 'content-length': '732', 'x-openstack-request-id': 'req-7ce56d3d-b984-4639-b20e-6905ca73a5e0', 'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"7d0d7def-c70e-4609-a70d-fa0d95e4b958","name":"tempest-NetworksRbacTest-Network-1342403589","tenant_id":"018f3876f714467cb33dc272b1b292fa","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"018f3876f714467cb33dc272b1b292fa","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":70,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:19:09Z","updated_at":"2020-12-14T02:19:09Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.718 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:09.760 197 INFO tempest.lib.common.rest_client [req-f3b4e32d-70ac-4baa-94cd-cc8aa68b6297 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.215s 2020-12-14 02:19:09.765 197 DEBUG tempest.lib.common.rest_client [req-f3b4e32d-70ac-4baa-94cd-cc8aa68b6297 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f3b4e32d-70ac-4baa-94cd-cc8aa68b6297', 'x-compute-request-id': 'req-f3b4e32d-70ac-4baa-94cd-cc8aa68b6297', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.783 186 INFO tempest.lib.common.rest_client [req-60c6c6bf-6220-4893-9a97-268963ef7be7 ] Request (NetworksRbacTest:test_create_network_provider_network_type): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.060s 2020-12-14 02:19:09.786 186 DEBUG tempest.lib.common.rest_client [req-60c6c6bf-6220-4893-9a97-268963ef7be7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60c6c6bf-6220-4893-9a97-268963ef7be7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.831 193 INFO tempest.lib.common.rest_client [req-489e6e72-387d-46f4-8a5c-d4e285c1de2c ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes_with_details): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/detail 0.125s 2020-12-14 02:19:09.833 186 INFO tempest.lib.common.rest_client [req-32404a52-dc77-44b5-adeb-ed56bf08bb32 ] Request (NetworksRbacTest:test_create_network_provider_network_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:19:09.834 193 DEBUG tempest.lib.common.rest_client [req-489e6e72-387d-46f4-8a5c-d4e285c1de2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-489e6e72-387d-46f4-8a5c-d4e285c1de2c', 'content-length': '1073', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-489e6e72-387d-46f4-8a5c-d4e285c1de2c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/detail'} Body: b'{"volumes": [{"id": "04273fcf-2194-45fc-b235-c46a27cc1109", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:54.000000", "updated_at": "2020-12-14T02:18:54.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-1575378150", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.837 186 DEBUG tempest.lib.common.rest_client [req-32404a52-dc77-44b5-adeb-ed56bf08bb32 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32404a52-dc77-44b5-adeb-ed56bf08bb32', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["RAChnafKQsGqHeOosnP5lg"], "expires_at": "2020-12-14T03:19:09.000000Z", "issued_at": "2020-12-14T02:19:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:09.851 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:09.874 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:09.876 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:09.899 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network:provider:physical_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:09.901 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:09.935 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:09.967 186 INFO tempest.lib.common.rest_client [req-5d0e4de7-69c5-4114-b299-493d7d87b6a6 ] Request (NetworksRbacTest:test_create_network_provider_physical_network): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.060s 2020-12-14 02:19:09.970 186 DEBUG tempest.lib.common.rest_client [req-5d0e4de7-69c5-4114-b299-493d7d87b6a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d0e4de7-69c5-4114-b299-493d7d87b6a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:10.001 193 INFO tempest.lib.common.rest_client [req-e08c22ab-a535-49ea-aef6-d1cd4e1c320a ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes_with_details): 200 GET http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles 0.059s 2020-12-14 02:19:10.004 193 DEBUG tempest.lib.common.rest_client [req-e08c22ab-a535-49ea-aef6-d1cd4e1c320a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e08c22ab-a535-49ea-aef6-d1cd4e1c320a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:10.016 186 INFO tempest.lib.common.rest_client [req-8a94b268-e684-4c04-ae80-8a5460ca54c4 ] Request (NetworksRbacTest:test_create_network_provider_physical_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:19:10.020 186 DEBUG tempest.lib.common.rest_client [req-8a94b268-e684-4c04-ae80-8a5460ca54c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a94b268-e684-4c04-ae80-8a5460ca54c4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["KyXSIiXVStC2fSXAYZVtMw"], "expires_at": "2020-12-14T03:19:10.000000Z", "issued_at": "2020-12-14T02:19:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:10.053 193 INFO tempest.lib.common.rest_client [req-28aa443b-e7c6-400d-b6b7-9c2e6302dc9c ] Request (VolumesBasicCrudV3RbacTest:test_list_volumes_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:19:10.056 193 DEBUG tempest.lib.common.rest_client [req-28aa443b-e7c6-400d-b6b7-9c2e6302dc9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28aa443b-e7c6-400d-b6b7-9c2e6302dc9c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password_expires_at": null}, "audit_ids": ["EaiUdAv0Qw696-6Pt3VJNQ"], "expires_at": "2020-12-14T03:19:10.000000Z", "issued_at": "2020-12-14T02:19:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:10.069 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:10.086 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:10.088 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:10.158 193 INFO tempest.lib.common.rest_client [req-10d1852e-5266-4eea-b1f0-093e44d78df8 ] Request (VolumesBasicCrudV3RbacTest:test_show_volume): 200 GET http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles 0.063s 2020-12-14 02:19:10.162 193 DEBUG tempest.lib.common.rest_client [req-10d1852e-5266-4eea-b1f0-093e44d78df8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10d1852e-5266-4eea-b1f0-093e44d78df8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:10.210 193 INFO tempest.lib.common.rest_client [req-3c86584c-1b68-40c2-9e9f-706c542e3bf6 ] Request (VolumesBasicCrudV3RbacTest:test_show_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:19:10.213 193 DEBUG tempest.lib.common.rest_client [req-3c86584c-1b68-40c2-9e9f-706c542e3bf6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c86584c-1b68-40c2-9e9f-706c542e3bf6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password_expires_at": null}, "audit_ids": ["q1qTG_roREuiIcbNVj7a4w"], "expires_at": "2020-12-14T03:19:10.000000Z", "issued_at": "2020-12-14T02:19:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:10.289 186 INFO tempest.lib.common.rest_client [req-aff780d4-aa2c-4c05-bdcf-f381f0b7b501 ] Request (NetworksRbacTest:test_create_network_provider_physical_network): 400 POST http://172.30.13.94:9696/v2.0/networks 0.260s 2020-12-14 02:19:10.293 186 DEBUG tempest.lib.common.rest_client [req-aff780d4-aa2c-4c05-bdcf-f381f0b7b501 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-838009429", "provider:network_type": "flat", "provider:physical_network": "provider"}} Response - Headers: {'content-type': 'application/json', 'content-length': '162', 'x-openstack-request-id': 'req-aff780d4-aa2c-4c05-bdcf-f381f0b7b501', 'date': 'Mon, 14 Dec 2020 02:19:10 GMT', 'connection': 'close', 'status': '400', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"NeutronError": {"type": "InvalidInput", "message": "Invalid input for operation: physical_network \'provider\' unknown for flat provider network.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:10.296 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:10.354 186 INFO tempest.lib.common.rest_client [req-ddad25ea-691e-43c3-8522-a390918adeb7 ] Request (NetworksRbacTest:test_create_network_provider_physical_network): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.052s 2020-12-14 02:19:10.356 186 DEBUG tempest.lib.common.rest_client [req-ddad25ea-691e-43c3-8522-a390918adeb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ddad25ea-691e-43c3-8522-a390918adeb7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:10.357 193 INFO tempest.lib.common.rest_client [req-bfb34b14-af97-4a86-baa5-d1e6fa190079 ] Request (VolumesBasicCrudV3RbacTest:test_show_volume): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109 0.138s 2020-12-14 02:19:10.360 193 DEBUG tempest.lib.common.rest_client [req-bfb34b14-af97-4a86-baa5-d1e6fa190079 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bfb34b14-af97-4a86-baa5-d1e6fa190079', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bfb34b14-af97-4a86-baa5-d1e6fa190079', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109'} Body: b'{"volume": {"id": "04273fcf-2194-45fc-b235-c46a27cc1109", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:54.000000", "updated_at": "2020-12-14T02:18:54.000000", "name": "tempest-VolumesBasicCrudV3RbacTest-Volume-1575378150", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:10.402 186 INFO tempest.lib.common.rest_client [req-797503c1-2fbb-4ab1-aecd-9a241fd76258 ] Request (NetworksRbacTest:test_create_network_provider_physical_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:19:10.406 186 DEBUG tempest.lib.common.rest_client [req-797503c1-2fbb-4ab1-aecd-9a241fd76258 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-797503c1-2fbb-4ab1-aecd-9a241fd76258', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["kQGvvMfsTkiIloB6xX4GFA"], "expires_at": "2020-12-14T03:19:10.000000Z", "issued_at": "2020-12-14T02:19:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:10.420 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:10.441 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:10.444 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:10.452 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:10.466 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network:router:external, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:10.468 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:10.515 193 INFO tempest.lib.common.rest_client [req-dc5e1a6e-43b4-4b30-8d3b-2968fce6d5b2 ] Request (VolumesBasicCrudV3RbacTest:test_show_volume): 200 GET http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles 0.057s 2020-12-14 02:19:10.519 193 DEBUG tempest.lib.common.rest_client [req-dc5e1a6e-43b4-4b30-8d3b-2968fce6d5b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc5e1a6e-43b4-4b30-8d3b-2968fce6d5b2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:10.535 186 INFO tempest.lib.common.rest_client [req-1d71b0c8-2718-423c-982b-0d236991a705 ] Request (NetworksRbacTest:test_create_network_router_external): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.060s 2020-12-14 02:19:10.538 186 DEBUG tempest.lib.common.rest_client [req-1d71b0c8-2718-423c-982b-0d236991a705 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d71b0c8-2718-423c-982b-0d236991a705', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:10.568 193 INFO tempest.lib.common.rest_client [req-f3b13315-bfb5-4f28-98f9-7def885d4ebf ] Request (VolumesBasicCrudV3RbacTest:test_show_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:19:10.572 193 DEBUG tempest.lib.common.rest_client [req-f3b13315-bfb5-4f28-98f9-7def885d4ebf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3b13315-bfb5-4f28-98f9-7def885d4ebf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password_expires_at": null}, "audit_ids": ["xu2mBl4nQ8u6LTAiapTBFA"], "expires_at": "2020-12-14T03:19:10.000000Z", "issued_at": "2020-12-14T02:19:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:10.586 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:10.588 186 INFO tempest.lib.common.rest_client [req-1f81eb6a-d6e0-4f41-8dfa-5a1ab43f4491 ] Request (NetworksRbacTest:test_create_network_router_external): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:19:10.591 186 DEBUG tempest.lib.common.rest_client [req-1f81eb6a-d6e0-4f41-8dfa-5a1ab43f4491 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f81eb6a-d6e0-4f41-8dfa-5a1ab43f4491', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["653vn8TCQTeMjyrOHSsUCA"], "expires_at": "2020-12-14T03:19:10.000000Z", "issued_at": "2020-12-14T02:19:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:10.604 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:update, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:10.606 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:10.671 193 INFO tempest.lib.common.rest_client [req-8983cfa7-702c-4421-948c-721325112ecf ] Request (VolumesBasicCrudV3RbacTest:test_update_volume): 200 GET http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles 0.059s 2020-12-14 02:19:10.673 193 DEBUG tempest.lib.common.rest_client [req-8983cfa7-702c-4421-948c-721325112ecf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8983cfa7-702c-4421-948c-721325112ecf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:10.725 193 INFO tempest.lib.common.rest_client [req-880ac027-2ef9-4ed7-8993-71bd7b06c95f ] Request (VolumesBasicCrudV3RbacTest:test_update_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:19:10.729 193 DEBUG tempest.lib.common.rest_client [req-880ac027-2ef9-4ed7-8993-71bd7b06c95f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-880ac027-2ef9-4ed7-8993-71bd7b06c95f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password_expires_at": null}, "audit_ids": ["yStLkmHmQAaxDCiFkoaudw"], "expires_at": "2020-12-14T03:19:10.000000Z", "issued_at": "2020-12-14T02:19:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:10.911 193 INFO tempest.lib.common.rest_client [req-0d488681-a593-475a-af1a-c9ed081643eb ] Request (VolumesBasicCrudV3RbacTest:test_update_volume): 200 PUT http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109 0.175s 2020-12-14 02:19:10.915 193 DEBUG tempest.lib.common.rest_client [req-0d488681-a593-475a-af1a-c9ed081643eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"name": "tempest-VolumesBasicCrudV3RbacTestvolume-404558412"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0d488681-a593-475a-af1a-c9ed081643eb', 'content-length': '870', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0d488681-a593-475a-af1a-c9ed081643eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109'} Body: b'{"volume": {"id": "04273fcf-2194-45fc-b235-c46a27cc1109", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:54.000000", "updated_at": "2020-12-14T02:18:54.000000", "name": "tempest-VolumesBasicCrudV3RbacTestvolume-404558412", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:11.004 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:11.030 189 INFO tempest.lib.common.rest_client [req-b77876fb-4766-47e1-b8a9-c371d8af8c6e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.244s 2020-12-14 02:19:11.034 189 DEBUG tempest.lib.common.rest_client [req-b77876fb-4766-47e1-b8a9-c371d8af8c6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b77876fb-4766-47e1-b8a9-c371d8af8c6e', 'x-compute-request-id': 'req-b77876fb-4766-47e1-b8a9-c371d8af8c6e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:11.044 186 INFO tempest.lib.common.rest_client [req-8c684817-b401-47d0-aead-a26d0c2a2d6b ] Request (NetworksRbacTest:test_create_network_router_external): 201 POST http://172.30.13.94:9696/v2.0/networks 0.444s 2020-12-14 02:19:11.047 186 DEBUG tempest.lib.common.rest_client [req-8c684817-b401-47d0-aead-a26d0c2a2d6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-1763921030", "router:external": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '731', 'x-openstack-request-id': 'req-8c684817-b401-47d0-aead-a26d0c2a2d6b', 'date': 'Mon, 14 Dec 2020 02:19:11 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"0caaa3d8-11a6-4824-9b4b-1f2157a1fd05","name":"tempest-NetworksRbacTest-Network-1763921030","tenant_id":"018f3876f714467cb33dc272b1b292fa","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"018f3876f714467cb33dc272b1b292fa","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":true,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":71,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:19:10Z","updated_at":"2020-12-14T02:19:10Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:11.051 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:11.087 193 INFO tempest.lib.common.rest_client [req-e44ad223-f060-4f1c-a641-ef88a270dd68 ] Request (VolumesBasicCrudV3RbacTest:test_update_volume): 200 GET http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles 0.076s 2020-12-14 02:19:11.091 193 DEBUG tempest.lib.common.rest_client [req-e44ad223-f060-4f1c-a641-ef88a270dd68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e44ad223-f060-4f1c-a641-ef88a270dd68', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952/users/741e9d103f71464cb4f195cefc616588/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:11.107 197 INFO tempest.lib.common.rest_client [req-d1ae0339-4f3a-4a67-b9c0-cbfa1c935aed ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.232s 2020-12-14 02:19:11.112 197 DEBUG tempest.lib.common.rest_client [req-d1ae0339-4f3a-4a67-b9c0-cbfa1c935aed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d1ae0339-4f3a-4a67-b9c0-cbfa1c935aed', 'x-compute-request-id': 'req-d1ae0339-4f3a-4a67-b9c0-cbfa1c935aed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:11.123 186 INFO tempest.lib.common.rest_client [req-6688ac75-78c5-4ba1-bc01-f68949f7d365 ] Request (NetworksRbacTest:test_create_network_router_external): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.066s 2020-12-14 02:19:11.126 186 DEBUG tempest.lib.common.rest_client [req-6688ac75-78c5-4ba1-bc01-f68949f7d365 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6688ac75-78c5-4ba1-bc01-f68949f7d365', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:11.149 193 INFO tempest.lib.common.rest_client [req-c2d53f92-c673-45a0-beee-31ae9c734b30 ] Request (VolumesBasicCrudV3RbacTest:test_update_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:19:11.153 193 DEBUG tempest.lib.common.rest_client [req-c2d53f92-c673-45a0-beee-31ae9c734b30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2d53f92-c673-45a0-beee-31ae9c734b30', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "741e9d103f71464cb4f195cefc616588", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612", "password_expires_at": null}, "audit_ids": ["3oxeVGzqR0a6ZRIils3xpQ"], "expires_at": "2020-12-14T03:19:11.000000Z", "issued_at": "2020-12-14T02:19:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef4eb6a078ca46f5ad7424d660ae9952", "name": "tempest-VolumesBasicCrudV3RbacTest-1092237612"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef4eb6a078ca46f5ad7424d660ae9952", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:11.179 186 INFO tempest.lib.common.rest_client [req-65f593a6-cdec-477c-a4fa-412d9431dca3 ] Request (NetworksRbacTest:test_create_network_router_external): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:19:11.183 186 DEBUG tempest.lib.common.rest_client [req-65f593a6-cdec-477c-a4fa-412d9431dca3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-65f593a6-cdec-477c-a4fa-412d9431dca3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["Sp-Q-rvoQZejkjnBz4y3-g"], "expires_at": "2020-12-14T03:19:11.000000Z", "issued_at": "2020-12-14T02:19:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:11.197 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:11.220 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:11.222 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:11.245 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_network:shared, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:11.247 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:11.313 193 INFO tempest.lib.common.rest_client [req-7cd0c46e-7146-481d-98bc-f5e10e4d4143 ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026 0.145s 2020-12-14 02:19:11.316 193 DEBUG tempest.lib.common.rest_client [req-7cd0c46e-7146-481d-98bc-f5e10e4d4143 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-7cd0c46e-7146-481d-98bc-f5e10e4d4143', 'x-openstack-request-id': 'req-7cd0c46e-7146-481d-98bc-f5e10e4d4143', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/23b5835f-8e18-4c29-babc-39ffe1486026'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 23b5835f-8e18-4c29-babc-39ffe1486026 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:11.328 186 INFO tempest.lib.common.rest_client [req-6f22d803-cf2d-410a-af73-6aa319547767 ] Request (NetworksRbacTest:test_create_network_shared): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.074s 2020-12-14 02:19:11.332 186 DEBUG tempest.lib.common.rest_client [req-6f22d803-cf2d-410a-af73-6aa319547767 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f22d803-cf2d-410a-af73-6aa319547767', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:11.387 186 INFO tempest.lib.common.rest_client [req-d3e21d62-b7d7-4531-af23-9864fcc4c19f ] Request (NetworksRbacTest:test_create_network_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:19:11.391 186 DEBUG tempest.lib.common.rest_client [req-d3e21d62-b7d7-4531-af23-9864fcc4c19f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3e21d62-b7d7-4531-af23-9864fcc4c19f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["nPOrXfrVTWaVkXUvpfjgkg"], "expires_at": "2020-12-14T03:19:11.000000Z", "issued_at": "2020-12-14T02:19:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:11.417 193 INFO tempest.lib.common.rest_client [req-4176bd47-1590-45b8-a27a-3e8711143dc8 ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109 0.095s 2020-12-14 02:19:11.419 193 DEBUG tempest.lib.common.rest_client [req-4176bd47-1590-45b8-a27a-3e8711143dc8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4176bd47-1590-45b8-a27a-3e8711143dc8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:11.501 193 INFO tempest.lib.common.rest_client [req-2156d4c1-8c46-4059-90ce-d8d371738d89 ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109 0.076s 2020-12-14 02:19:11.504 193 DEBUG tempest.lib.common.rest_client [req-2156d4c1-8c46-4059-90ce-d8d371738d89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2156d4c1-8c46-4059-90ce-d8d371738d89', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2156d4c1-8c46-4059-90ce-d8d371738d89', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109'} Body: b'{"volume": {"id": "04273fcf-2194-45fc-b235-c46a27cc1109", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:18:54.000000", "updated_at": "2020-12-14T02:19:11.000000", "name": "tempest-VolumesBasicCrudV3RbacTestvolume-404558412", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109"}], "user_id": "741e9d103f71464cb4f195cefc616588", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:11.794 186 INFO tempest.lib.common.rest_client [req-da175df2-9942-4c36-96bf-14c13808a083 ] Request (NetworksRbacTest:test_create_network_shared): 201 POST http://172.30.13.94:9696/v2.0/networks 0.395s 2020-12-14 02:19:11.798 186 DEBUG tempest.lib.common.rest_client [req-da175df2-9942-4c36-96bf-14c13808a083 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-1387196965", "shared": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '731', 'x-openstack-request-id': 'req-da175df2-9942-4c36-96bf-14c13808a083', 'date': 'Mon, 14 Dec 2020 02:19:11 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"d9435302-9e2d-46c5-9123-c4b589f7d062","name":"tempest-NetworksRbacTest-Network-1387196965","tenant_id":"018f3876f714467cb33dc272b1b292fa","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":true,"project_id":"018f3876f714467cb33dc272b1b292fa","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":72,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:19:11Z","updated_at":"2020-12-14T02:19:11Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:11.801 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:11.866 186 INFO tempest.lib.common.rest_client [req-bb0eff50-4b1c-45af-b3b7-9b49295be5be ] Request (NetworksRbacTest:test_create_network_shared): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.060s 2020-12-14 02:19:11.869 186 DEBUG tempest.lib.common.rest_client [req-bb0eff50-4b1c-45af-b3b7-9b49295be5be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb0eff50-4b1c-45af-b3b7-9b49295be5be', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:11.917 186 INFO tempest.lib.common.rest_client [req-06c5d9a3-f40a-4057-b3c3-90128c5e6a30 ] Request (NetworksRbacTest:test_create_network_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:19:11.921 186 DEBUG tempest.lib.common.rest_client [req-06c5d9a3-f40a-4057-b3c3-90128c5e6a30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06c5d9a3-f40a-4057-b3c3-90128c5e6a30', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["zxKTkZ_rQyOCF38hOF_e5A"], "expires_at": "2020-12-14T03:19:11.000000Z", "issued_at": "2020-12-14T02:19:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:11.935 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:11.960 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:11.963 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:11.986 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:12.370 186 INFO tempest.lib.common.rest_client [req-bcba8c28-2628-49cb-a198-b475b1a07346 ] Request (NetworksRbacTest:test_delete_network): 201 POST http://172.30.13.94:9696/v2.0/networks 0.377s 2020-12-14 02:19:12.374 186 DEBUG tempest.lib.common.rest_client [req-bcba8c28-2628-49cb-a198-b475b1a07346 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-1087877118"}} Response - Headers: {'content-type': 'application/json', 'content-length': '732', 'x-openstack-request-id': 'req-bcba8c28-2628-49cb-a198-b475b1a07346', 'date': 'Mon, 14 Dec 2020 02:19:12 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"6a9c7cbb-952b-43a8-b2ad-41cd18a4e2a3","name":"tempest-NetworksRbacTest-Network-1087877118","tenant_id":"018f3876f714467cb33dc272b1b292fa","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"018f3876f714467cb33dc272b1b292fa","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":73,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:19:12Z","updated_at":"2020-12-14T02:19:12Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:12.377 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:12.455 186 INFO tempest.lib.common.rest_client [req-b09529d8-f360-40c6-9a8a-23fbc3c4cf8b ] Request (NetworksRbacTest:test_delete_network): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.071s 2020-12-14 02:19:12.458 186 DEBUG tempest.lib.common.rest_client [req-b09529d8-f360-40c6-9a8a-23fbc3c4cf8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b09529d8-f360-40c6-9a8a-23fbc3c4cf8b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:12.470 197 INFO tempest.lib.common.rest_client [req-02120ee0-87ce-4ac6-a6c0-1d03d420954b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.236s 2020-12-14 02:19:12.474 197 DEBUG tempest.lib.common.rest_client [req-02120ee0-87ce-4ac6-a6c0-1d03d420954b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-02120ee0-87ce-4ac6-a6c0-1d03d420954b', 'x-compute-request-id': 'req-02120ee0-87ce-4ac6-a6c0-1d03d420954b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:12.514 186 INFO tempest.lib.common.rest_client [req-0ed6e5bc-021b-45c8-b392-6fd5ce374c72 ] Request (NetworksRbacTest:test_delete_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:19:12.518 186 DEBUG tempest.lib.common.rest_client [req-0ed6e5bc-021b-45c8-b392-6fd5ce374c72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ed6e5bc-021b-45c8-b392-6fd5ce374c72', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["TKOv9CD2Rja51o4A_Sgu1w"], "expires_at": "2020-12-14T03:19:12.000000Z", "issued_at": "2020-12-14T02:19:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:12.667 193 INFO tempest.lib.common.rest_client [req-aa4151ae-0c5b-48d9-8516-eedf8b615f8f ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109 0.060s 2020-12-14 02:19:12.670 193 DEBUG tempest.lib.common.rest_client [req-aa4151ae-0c5b-48d9-8516-eedf8b615f8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-aa4151ae-0c5b-48d9-8516-eedf8b615f8f', 'x-openstack-request-id': 'req-aa4151ae-0c5b-48d9-8516-eedf8b615f8f', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ef4eb6a078ca46f5ad7424d660ae9952/volumes/04273fcf-2194-45fc-b235-c46a27cc1109'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 04273fcf-2194-45fc-b235-c46a27cc1109 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:12.845 193 INFO tempest.lib.common.rest_client [req-be66e965-4788-491a-b3fc-0b3109b7ff4c ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/741e9d103f71464cb4f195cefc616588 0.168s 2020-12-14 02:19:12.849 193 DEBUG tempest.lib.common.rest_client [req-be66e965-4788-491a-b3fc-0b3109b7ff4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be66e965-4788-491a-b3fc-0b3109b7ff4c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/741e9d103f71464cb4f195cefc616588'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:12.952 193 INFO tempest.lib.common.rest_client [req-e949bed1-29d2-4deb-b159-67f7f7874e1d ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:19:12.955 193 DEBUG tempest.lib.common.rest_client [req-e949bed1-29d2-4deb-b159-67f7f7874e1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e949bed1-29d2-4deb-b159-67f7f7874e1d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["HTis32UKQHeGn7eRVj55Vw"], "expires_at": "2020-12-14T03:19:12.000000Z", "issued_at": "2020-12-14T02:19:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:13.219 186 INFO tempest.lib.common.rest_client [req-1948bc01-34aa-49d0-b937-a061e2583ff0 ] Request (NetworksRbacTest:test_delete_network): 204 DELETE http://172.30.13.94:9696/v2.0/networks/6a9c7cbb-952b-43a8-b2ad-41cd18a4e2a3 0.692s 2020-12-14 02:19:13.223 186 DEBUG tempest.lib.common.rest_client [req-1948bc01-34aa-49d0-b937-a061e2583ff0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-1948bc01-34aa-49d0-b937-a061e2583ff0', 'date': 'Mon, 14 Dec 2020 02:19:13 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/6a9c7cbb-952b-43a8-b2ad-41cd18a4e2a3'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:13.226 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:13.306 186 INFO tempest.lib.common.rest_client [req-65ffcc72-7220-43fb-b6d0-61a5065378fb ] Request (NetworksRbacTest:test_delete_network): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.074s 2020-12-14 02:19:13.309 186 DEBUG tempest.lib.common.rest_client [req-65ffcc72-7220-43fb-b6d0-61a5065378fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-65ffcc72-7220-43fb-b6d0-61a5065378fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:13.314 193 INFO tempest.lib.common.rest_client [req-c0f9e5c1-4d87-4ef3-a8b5-c881acbe2474 ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ef4eb6a078ca46f5ad7424d660ae9952&name=default 0.351s 2020-12-14 02:19:13.317 193 DEBUG tempest.lib.common.rest_client [req-c0f9e5c1-4d87-4ef3-a8b5-c881acbe2474 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-c0f9e5c1-4d87-4ef3-a8b5-c881acbe2474', 'date': 'Mon, 14 Dec 2020 02:19:13 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ef4eb6a078ca46f5ad7424d660ae9952&name=default'} Body: b'{"security_groups": [{"id": "cb94a469-1f6e-4876-afa5-daf3385ff78a", "name": "default", "stateful": true, "tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952", "description": "Default security group", "security_group_rules": [{"id": "2cbba2c3-c31e-4877-9cde-e8b6a7fc5943", "tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952", "security_group_id": "cb94a469-1f6e-4876-afa5-daf3385ff78a", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:13Z", "updated_at": "2020-12-14T02:19:13Z", "revision_number": 0, "project_id": "ef4eb6a078ca46f5ad7424d660ae9952"}, {"id": "54dc0179-c28d-41be-a9ac-d9a560f28859", "tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952", "security_group_id": "cb94a469-1f6e-4876-afa5-daf3385ff78a", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:13Z", "updated_at": "2020-12-14T02:19:13Z", "revision_number": 0, "project_id": "ef4eb6a078ca46f5ad7424d660ae9952"}, {"id": "5b971cbd-695a-4cc6-a4df-99af7b5327a1", "tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952", "security_group_id": "cb94a469-1f6e-4876-afa5-daf3385ff78a", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "cb94a469-1f6e-4876-afa5-daf3385ff78a", "description": null, "tags": [], "created_at": "2020-12-14T02:19:13Z", "updated_at": "2020-12-14T02:19:13Z", "revision_number": 0, "project_id": "ef4eb6a078ca46f5ad7424d660ae9952"}, {"id": "d91d0902-9a9d-48a9-9d9b-203d60ebaed0", "tenant_id": "ef4eb6a078ca46f5ad7424d660ae9952", "security_group_id": "cb94a469-1f6e-4876-afa5-daf3385ff78a", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "cb94a469-1f6e-4876-afa5-daf3385ff78a", "description": null, "tags": [], "created_at": "2020-12-14T02:19:13Z", "updated_at": "2020-12-14T02:19:13Z", "revision_number": 0, "project_id": "ef4eb6a078ca46f5ad7424d660ae9952"}], "tags": [], "created_at": "2020-12-14T02:19:13Z", "updated_at": "2020-12-14T02:19:13Z", "revision_number": 1, "project_id": "ef4eb6a078ca46f5ad7424d660ae9952"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:13.422 186 INFO tempest.lib.common.rest_client [req-d20ff7b2-7680-481f-afc5-51e16de61fde ] Request (NetworksRbacTest:test_delete_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:19:13.426 186 DEBUG tempest.lib.common.rest_client [req-d20ff7b2-7680-481f-afc5-51e16de61fde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d20ff7b2-7680-481f-afc5-51e16de61fde', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["_Jc-3buUSSyzqeJ0JPfGKQ"], "expires_at": "2020-12-14T03:19:13.000000Z", "issued_at": "2020-12-14T02:19:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:13.440 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:13.463 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_dhcp-agents, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:13.466 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:13.474 193 INFO tempest.lib.common.rest_client [req-91bdadb3-dfd3-402b-9220-f261d9164c6c ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/cb94a469-1f6e-4876-afa5-daf3385ff78a 0.150s 2020-12-14 02:19:13.476 193 DEBUG tempest.lib.common.rest_client [req-91bdadb3-dfd3-402b-9220-f261d9164c6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-91bdadb3-dfd3-402b-9220-f261d9164c6c', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:13 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/cb94a469-1f6e-4876-afa5-daf3385ff78a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:13.540 186 INFO tempest.lib.common.rest_client [req-e6b8808f-d885-4a0b-a79f-3943c5895a64 ] Request (NetworksRbacTest:test_list_dhcp_agents_on_hosting_network): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.069s 2020-12-14 02:19:13.543 186 DEBUG tempest.lib.common.rest_client [req-e6b8808f-d885-4a0b-a79f-3943c5895a64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6b8808f-d885-4a0b-a79f-3943c5895a64', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:13.633 193 INFO tempest.lib.common.rest_client [req-7f95140f-789b-4ddc-a243-b852769353ec ] Request (VolumesBasicCrudV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952 0.150s 2020-12-14 02:19:13.637 193 DEBUG tempest.lib.common.rest_client [req-7f95140f-789b-4ddc-a243-b852769353ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f95140f-789b-4ddc-a243-b852769353ec', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef4eb6a078ca46f5ad7424d660ae9952'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:13.643 186 INFO tempest.lib.common.rest_client [req-082d6182-c2c9-4e1c-9d31-1a67b970c5f8 ] Request (NetworksRbacTest:test_list_dhcp_agents_on_hosting_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:19:13.646 186 DEBUG tempest.lib.common.rest_client [req-082d6182-c2c9-4e1c-9d31-1a67b970c5f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-082d6182-c2c9-4e1c-9d31-1a67b970c5f8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["Q1vTQH9ATKS6cFqpym_JDQ"], "expires_at": "2020-12-14T03:19:13.000000Z", "issued_at": "2020-12-14T02:19:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:13.752 193 INFO tempest.lib.common.rest_client [req-98abc2e8-4e5d-4913-9c71-f9139edb681b ] Request (VolumeHostsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:19:13.755 193 DEBUG tempest.lib.common.rest_client [req-98abc2e8-4e5d-4913-9c71-f9139edb681b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98abc2e8-4e5d-4913-9c71-f9139edb681b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["K0dMR0XpRIK5sxz1bHf_kw"], "expires_at": "2020-12-14T03:19:13.000000Z", "issued_at": "2020-12-14T02:19:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:13.810 197 INFO tempest.lib.common.rest_client [req-8b8d0ce5-1c34-4e90-b44a-292b93cb4d4e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.230s 2020-12-14 02:19:13.813 197 DEBUG tempest.lib.common.rest_client [req-8b8d0ce5-1c34-4e90-b44a-292b93cb4d4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8b8d0ce5-1c34-4e90-b44a-292b93cb4d4e', 'x-compute-request-id': 'req-8b8d0ce5-1c34-4e90-b44a-292b93cb4d4e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:13.823 186 INFO tempest.lib.common.rest_client [req-8c2eecdb-a33b-4cfc-b252-53fe55c96d3e ] Request (NetworksRbacTest:test_list_dhcp_agents_on_hosting_network): 200 GET http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c/dhcp-agents 0.170s 2020-12-14 02:19:13.827 186 DEBUG tempest.lib.common.rest_client [req-8c2eecdb-a33b-4cfc-b252-53fe55c96d3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '601', 'x-openstack-request-id': 'req-8c2eecdb-a33b-4cfc-b252-53fe55c96d3e', 'date': 'Mon, 14 Dec 2020 02:19:13 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c/dhcp-agents'} Body: b'{"agents": [{"id": "bc496462-aac8-4795-a8f9-6f5600fa0870", "agent_type": "DHCP agent", "binary": "neutron-dhcp-agent", "topic": "dhcp_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:02", "started_at": "2020-10-07 12:07:02", "heartbeat_timestamp": "2020-12-14 02:18:56", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"dhcp_driver": "neutron.agent.linux.dhcp.Dnsmasq", "dhcp_lease_duration": 86400, "log_agent_heartbeats": false, "networks": 8, "ports": 18, "subnets": 10}, "resource_versions": {}}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:13.830 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:13.852 193 INFO tempest.lib.common.rest_client [req-fad39b93-43b4-4ec9-b38c-980c94c99a21 ] Request (VolumeHostsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:19:13.854 193 DEBUG tempest.lib.common.rest_client [req-fad39b93-43b4-4ec9-b38c-980c94c99a21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fad39b93-43b4-4ec9-b38c-980c94c99a21', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["HW8k6KMqR8qZjmOSsSarPw"], "expires_at": "2020-12-14T03:19:13.000000Z", "issued_at": "2020-12-14T02:19:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:13.901 186 INFO tempest.lib.common.rest_client [req-a304ab38-529e-4f59-aa41-b84f8a0ad22c ] Request (NetworksRbacTest:test_list_dhcp_agents_on_hosting_network): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.065s 2020-12-14 02:19:13.905 186 DEBUG tempest.lib.common.rest_client [req-a304ab38-529e-4f59-aa41-b84f8a0ad22c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a304ab38-529e-4f59-aa41-b84f8a0ad22c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:13.942 193 INFO tempest.lib.common.rest_client [req-4528d4e8-a96c-41c9-9e44-519a3afee4e5 ] Request (VolumeHostsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.079s 2020-12-14 02:19:13.944 193 DEBUG tempest.lib.common.rest_client [req-4528d4e8-a96c-41c9-9e44-519a3afee4e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4528d4e8-a96c-41c9-9e44-519a3afee4e5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:13.958 186 INFO tempest.lib.common.rest_client [req-229646c5-6873-4150-a88b-67ec9b1833cf ] Request (NetworksRbacTest:test_list_dhcp_agents_on_hosting_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:19:13.963 186 DEBUG tempest.lib.common.rest_client [req-229646c5-6873-4150-a88b-67ec9b1833cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-229646c5-6873-4150-a88b-67ec9b1833cf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["0cIdH0oSQMKPiIBDV65PQA"], "expires_at": "2020-12-14T03:19:13.000000Z", "issued_at": "2020-12-14T02:19:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:13.977 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:14.001 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:14.004 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:14.034 193 INFO tempest.lib.common.rest_client [req-b12906a9-1d83-4800-b91a-a50dcf69c1ca ] Request (VolumeHostsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.080s 2020-12-14 02:19:14.036 193 DEBUG tempest.lib.common.rest_client [req-b12906a9-1d83-4800-b91a-a50dcf69c1ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeHostsV3RbacTest-1201979942-desc", "domain_id": "default", "name": "tempest-VolumeHostsV3RbacTest-1201979942"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b12906a9-1d83-4800-b91a-a50dcf69c1ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "1759f34b955742f3a091f6bb8fb5aaa3", "name": "tempest-VolumeHostsV3RbacTest-1201979942", "domain_id": "default", "description": "tempest-VolumeHostsV3RbacTest-1201979942-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.115 186 INFO tempest.lib.common.rest_client [req-d04ce4bd-9d51-4b6d-939d-d02dbb0d377d ] Request (NetworksRbacTest:test_list_networks): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.106s 2020-12-14 02:19:14.118 186 DEBUG tempest.lib.common.rest_client [req-d04ce4bd-9d51-4b6d-939d-d02dbb0d377d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d04ce4bd-9d51-4b6d-939d-d02dbb0d377d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.172 193 INFO tempest.lib.common.rest_client [req-0b332330-7118-4029-981e-2f9955ff537a ] Request (VolumeHostsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.127s 2020-12-14 02:19:14.175 193 DEBUG tempest.lib.common.rest_client [req-0b332330-7118-4029-981e-2f9955ff537a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeHostsV3RbacTest-1201979942", "password": "C7^FvU0x&a=b9MR", "project_id": "1759f34b955742f3a091f6bb8fb5aaa3", "email": "tempest-VolumeHostsV3RbacTest-911926562@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '397', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b332330-7118-4029-981e-2f9955ff537a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "1759f34b955742f3a091f6bb8fb5aaa3", "email": "tempest-VolumeHostsV3RbacTest-911926562@example.com", "id": "6c23a74aaecd42e18453557e3c0d0043", "name": "tempest-VolumeHostsV3RbacTest-1201979942", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/6c23a74aaecd42e18453557e3c0d0043"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.224 186 INFO tempest.lib.common.rest_client [req-12798ecc-97da-4c7f-89cb-214837e99755 ] Request (NetworksRbacTest:test_list_networks): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:19:14.227 186 DEBUG tempest.lib.common.rest_client [req-12798ecc-97da-4c7f-89cb-214837e99755 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-12798ecc-97da-4c7f-89cb-214837e99755', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["9h2wwl5vTyqLL1i3ZgBhRQ"], "expires_at": "2020-12-14T03:19:14.000000Z", "issued_at": "2020-12-14T02:19:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.248 193 INFO tempest.lib.common.rest_client [req-0823a69e-6907-4621-b8e8-fbb7907b3b54 ] Request (VolumeHostsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:19:14.250 193 DEBUG tempest.lib.common.rest_client [req-0823a69e-6907-4621-b8e8-fbb7907b3b54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0823a69e-6907-4621-b8e8-fbb7907b3b54', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.319 193 INFO tempest.lib.common.rest_client [req-c6b2e15d-c2c1-46fd-bea7-f962156c4343 ] Request (VolumeHostsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:19:14.321 193 DEBUG tempest.lib.common.rest_client [req-c6b2e15d-c2c1-46fd-bea7-f962156c4343 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6b2e15d-c2c1-46fd-bea7-f962156c4343', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.412 193 INFO tempest.lib.common.rest_client [req-e07ef9ab-180a-46fd-bfa8-2d30515dee28 ] Request (VolumeHostsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles/72a4576c553448cd941b052c1ca0cf2d 0.083s 2020-12-14 02:19:14.414 193 DEBUG tempest.lib.common.rest_client [req-e07ef9ab-180a-46fd-bfa8-2d30515dee28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e07ef9ab-180a-46fd-bfa8-2d30515dee28', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.417 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeHostsV3RbacTest-1201979942', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1759f34b955742f3a091f6bb8fb5aaa3', 'project_name': 'tempest-VolumeHostsV3RbacTest-1201979942', 'tenant_id': '1759f34b955742f3a091f6bb8fb5aaa3', 'tenant_name': 'tempest-VolumeHostsV3RbacTest-1201979942', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '6c23a74aaecd42e18453557e3c0d0043'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:14.420 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeHostsV3RbacTest-1201979942', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1759f34b955742f3a091f6bb8fb5aaa3', 'project_name': 'tempest-VolumeHostsV3RbacTest-1201979942', 'tenant_id': '1759f34b955742f3a091f6bb8fb5aaa3', 'tenant_name': 'tempest-VolumeHostsV3RbacTest-1201979942', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '6c23a74aaecd42e18453557e3c0d0043'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:14.498 186 INFO tempest.lib.common.rest_client [req-4467d28b-ffe3-4377-9af9-c1d34c4e7369 ] Request (NetworksRbacTest:test_list_networks): 200 GET http://172.30.13.94:9696/v2.0/networks?id=cb9bcdd1-9700-4d03-8250-b150f1bb918c 0.262s 2020-12-14 02:19:14.501 186 DEBUG tempest.lib.common.rest_client [req-4467d28b-ffe3-4377-9af9-c1d34c4e7369 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '764', 'x-openstack-request-id': 'req-4467d28b-ffe3-4377-9af9-c1d34c4e7369', 'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks?id=cb9bcdd1-9700-4d03-8250-b150f1bb918c'} Body: b'{"networks":[{"id":"cb9bcdd1-9700-4d03-8250-b150f1bb918c","name":"tempest-NetworksRbacTest-test-network-816309557","tenant_id":"018f3876f714467cb33dc272b1b292fa","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["68f6c472-de82-48f4-ad9f-e861023eab10"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:19:06Z","updated_at":"2020-12-14T02:19:07Z","revision_number":2,"project_id":"018f3876f714467cb33dc272b1b292fa","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":43}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.504 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:14.619 193 INFO tempest.lib.common.rest_client [req-2cd0ac7c-1240-4e2b-97fe-c4c831919b45 ] Request (VolumeHostsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.137s 2020-12-14 02:19:14.622 193 DEBUG tempest.lib.common.rest_client [req-2cd0ac7c-1240-4e2b-97fe-c4c831919b45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6573', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2cd0ac7c-1240-4e2b-97fe-c4c831919b45', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6c23a74aaecd42e18453557e3c0d0043", "name": "tempest-VolumeHostsV3RbacTest-1201979942", "password_expires_at": null}, "audit_ids": ["bNPgdhQsRPCCoNQdIIAHQg"], "expires_at": "2020-12-14T03:19:14.000000Z", "issued_at": "2020-12-14T02:19:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1759f34b955742f3a091f6bb8fb5aaa3", "name": "tempest-VolumeHostsV3RbacTest-1201979942"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://1 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.641 186 INFO tempest.lib.common.rest_client [req-e5e2b5b8-aec5-49eb-bbdb-ebf0001d6603 ] Request (NetworksRbacTest:test_list_networks): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.131s 2020-12-14 02:19:14.645 186 DEBUG tempest.lib.common.rest_client [req-e5e2b5b8-aec5-49eb-bbdb-ebf0001d6603 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5e2b5b8-aec5-49eb-bbdb-ebf0001d6603', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.685 193 INFO tempest.lib.common.rest_client [req-8adabe3d-12a3-4c8f-87e3-dd7f99a2d9d1 ] Request (VolumeHostsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:19:14.689 193 DEBUG tempest.lib.common.rest_client [req-8adabe3d-12a3-4c8f-87e3-dd7f99a2d9d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8adabe3d-12a3-4c8f-87e3-dd7f99a2d9d1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["qwv3JfL5S3GhWDcuSmyvsg"], "expires_at": "2020-12-14T03:19:14.000000Z", "issued_at": "2020-12-14T02:19:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.751 186 INFO tempest.lib.common.rest_client [req-99d6c4cf-f378-4f31-9050-6b3594c1323e ] Request (NetworksRbacTest:test_list_networks): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:19:14.756 186 DEBUG tempest.lib.common.rest_client [req-99d6c4cf-f378-4f31-9050-6b3594c1323e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-99d6c4cf-f378-4f31-9050-6b3594c1323e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["aSzLy1mrTYGCI5taZaQTUA"], "expires_at": "2020-12-14T03:19:14.000000Z", "issued_at": "2020-12-14T02:19:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.769 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:14.794 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:14.796 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:14.806 193 INFO tempest.lib.common.rest_client [req-d8c147d0-79bb-4274-8b4d-3cf2667725b9 ] Request (VolumeHostsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:19:14.809 193 DEBUG tempest.lib.common.rest_client [req-d8c147d0-79bb-4274-8b4d-3cf2667725b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8c147d0-79bb-4274-8b4d-3cf2667725b9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["qdmWaMNzQsC1XC31diQ7Tg"], "expires_at": "2020-12-14T03:19:14.000000Z", "issued_at": "2020-12-14T02:19:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.868 186 INFO tempest.lib.common.rest_client [req-08459b31-a1c6-4e46-99cc-1fc7dd6a1e50 ] Request (NetworksRbacTest:test_show_network): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.066s 2020-12-14 02:19:14.871 186 DEBUG tempest.lib.common.rest_client [req-08459b31-a1c6-4e46-99cc-1fc7dd6a1e50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-08459b31-a1c6-4e46-99cc-1fc7dd6a1e50', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.885 193 INFO tempest.lib.common.rest_client [req-6eef2ad7-cf4c-46e3-9267-df02b70a9c8a ] Request (VolumeHostsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.069s 2020-12-14 02:19:14.888 193 DEBUG tempest.lib.common.rest_client [req-6eef2ad7-cf4c-46e3-9267-df02b70a9c8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6eef2ad7-cf4c-46e3-9267-df02b70a9c8a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.926 186 INFO tempest.lib.common.rest_client [req-6169ce1f-22d3-4ee5-8967-663d4eed3fd2 ] Request (NetworksRbacTest:test_show_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:19:14.930 186 DEBUG tempest.lib.common.rest_client [req-6169ce1f-22d3-4ee5-8967-663d4eed3fd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6169ce1f-22d3-4ee5-8967-663d4eed3fd2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["Vd4CyGhYQFiuS7E173cp4w"], "expires_at": "2020-12-14T03:19:14.000000Z", "issued_at": "2020-12-14T02:19:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.955 193 INFO tempest.lib.common.rest_client [req-25ed10d0-7d1c-4e5c-bfd1-c8ca1db1560a ] Request (VolumeHostsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:19:14.959 193 DEBUG tempest.lib.common.rest_client [req-25ed10d0-7d1c-4e5c-bfd1-c8ca1db1560a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25ed10d0-7d1c-4e5c-bfd1-c8ca1db1560a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:14.962 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:19:14.965 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:15.030 193 INFO tempest.lib.common.rest_client [req-e5f057f8-8a59-497a-82ee-daa67d8ab663 ] Request (VolumeHostsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles 0.059s 2020-12-14 02:19:15.033 193 DEBUG tempest.lib.common.rest_client [req-e5f057f8-8a59-497a-82ee-daa67d8ab663 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5f057f8-8a59-497a-82ee-daa67d8ab663', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:15.152 193 INFO tempest.lib.common.rest_client [req-37fe1577-7e44-4716-a7f3-44256586752c ] Request (VolumeHostsV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles/72a4576c553448cd941b052c1ca0cf2d 0.112s 2020-12-14 02:19:15.156 193 DEBUG tempest.lib.common.rest_client [req-37fe1577-7e44-4716-a7f3-44256586752c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-37fe1577-7e44-4716-a7f3-44256586752c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:15.169 186 INFO tempest.lib.common.rest_client [req-4cc8a1e0-c187-45ed-b1b8-71973756bd6f ] Request (NetworksRbacTest:test_show_network): 200 GET http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c 0.232s 2020-12-14 02:19:15.171 186 DEBUG tempest.lib.common.rest_client [req-4cc8a1e0-c187-45ed-b1b8-71973756bd6f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '761', 'x-openstack-request-id': 'req-4cc8a1e0-c187-45ed-b1b8-71973756bd6f', 'date': 'Mon, 14 Dec 2020 02:19:15 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c'} Body: b'{"network":{"id":"cb9bcdd1-9700-4d03-8250-b150f1bb918c","name":"tempest-NetworksRbacTest-test-network-816309557","tenant_id":"018f3876f714467cb33dc272b1b292fa","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["68f6c472-de82-48f4-ad9f-e861023eab10"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:19:06Z","updated_at":"2020-12-14T02:19:07Z","revision_number":2,"project_id":"018f3876f714467cb33dc272b1b292fa","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":43}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:15.174 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:15.275 193 INFO tempest.lib.common.rest_client [req-e1a3d423-2fcb-4512-871b-3d7ee9f8e332 ] Request (VolumeHostsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles/a629c95d64b3416fb80ae90af4f69c05 0.112s 2020-12-14 02:19:15.278 193 DEBUG tempest.lib.common.rest_client [req-e1a3d423-2fcb-4512-871b-3d7ee9f8e332 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1a3d423-2fcb-4512-871b-3d7ee9f8e332', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:15.290 186 INFO tempest.lib.common.rest_client [req-7f095c10-9e32-4eb1-868c-e924dbf0b140 ] Request (NetworksRbacTest:test_show_network): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.108s 2020-12-14 02:19:15.295 186 DEBUG tempest.lib.common.rest_client [req-7f095c10-9e32-4eb1-868c-e924dbf0b140 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f095c10-9e32-4eb1-868c-e924dbf0b140', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:15.379 186 INFO tempest.lib.common.rest_client [req-80fbba9d-25ee-4e2a-86ba-a6f93a0fcee8 ] Request (NetworksRbacTest:test_show_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-12-14 02:19:15.382 186 DEBUG tempest.lib.common.rest_client [req-80fbba9d-25ee-4e2a-86ba-a6f93a0fcee8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-80fbba9d-25ee-4e2a-86ba-a6f93a0fcee8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["zo8j3eUoSlO8RcvBlj2qNw"], "expires_at": "2020-12-14T03:19:15.000000Z", "issued_at": "2020-12-14T02:19:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:15.396 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:15.421 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:15.424 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:15.446 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network:provider:network_type, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:15.448 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:15.574 186 INFO tempest.lib.common.rest_client [req-fdd1ffd8-0f12-4ff2-bd87-808454ddfa2e ] Request (NetworksRbacTest:test_show_network_provider_network_type): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.119s 2020-12-14 02:19:15.577 186 DEBUG tempest.lib.common.rest_client [req-fdd1ffd8-0f12-4ff2-bd87-808454ddfa2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fdd1ffd8-0f12-4ff2-bd87-808454ddfa2e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:15.623 186 INFO tempest.lib.common.rest_client [req-d8c91085-348b-412d-b510-fb6ff6f7df22 ] Request (NetworksRbacTest:test_show_network_provider_network_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:19:15.625 186 DEBUG tempest.lib.common.rest_client [req-d8c91085-348b-412d-b510-fb6ff6f7df22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8c91085-348b-412d-b510-fb6ff6f7df22', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["uygKNZ-lT72Mdf_3yFiEtw"], "expires_at": "2020-12-14T03:19:15.000000Z", "issued_at": "2020-12-14T02:19:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:15.913 186 INFO tempest.lib.common.rest_client [req-c8d14e26-1127-47c2-a04d-b3c233027477 ] Request (NetworksRbacTest:test_show_network_provider_network_type): 200 GET http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c?fields=provider%3Anetwork_type 0.279s 2020-12-14 02:19:15.917 186 DEBUG tempest.lib.common.rest_client [req-c8d14e26-1127-47c2-a04d-b3c233027477 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '45', 'x-openstack-request-id': 'req-c8d14e26-1127-47c2-a04d-b3c233027477', 'date': 'Mon, 14 Dec 2020 02:19:15 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c?fields=provider%3Anetwork_type'} Body: b'{"network":{"provider:network_type":"vxlan"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:15.920 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:15.986 186 INFO tempest.lib.common.rest_client [req-a94553d2-3e69-4d71-9408-6252bccb276b ] Request (NetworksRbacTest:test_show_network_provider_network_type): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.060s 2020-12-14 02:19:15.989 186 DEBUG tempest.lib.common.rest_client [req-a94553d2-3e69-4d71-9408-6252bccb276b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a94553d2-3e69-4d71-9408-6252bccb276b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.040 186 INFO tempest.lib.common.rest_client [req-8b8de490-5e1c-4ffe-9109-06c6e92dded9 ] Request (NetworksRbacTest:test_show_network_provider_network_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:19:16.044 186 DEBUG tempest.lib.common.rest_client [req-8b8de490-5e1c-4ffe-9109-06c6e92dded9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b8de490-5e1c-4ffe-9109-06c6e92dded9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["X20LHRr5Rs-J6xhSmxeNMg"], "expires_at": "2020-12-14T03:19:16.000000Z", "issued_at": "2020-12-14T02:19:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.059 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:16.083 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:16.086 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:16.108 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network:provider:physical_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:16.111 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:16.181 186 INFO tempest.lib.common.rest_client [req-4510d335-6ad8-42ef-a260-fd11e8224ecd ] Request (NetworksRbacTest:test_show_network_provider_physical_network): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.065s 2020-12-14 02:19:16.184 186 DEBUG tempest.lib.common.rest_client [req-4510d335-6ad8-42ef-a260-fd11e8224ecd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4510d335-6ad8-42ef-a260-fd11e8224ecd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.239 186 INFO tempest.lib.common.rest_client [req-abadfa5b-3243-4ae4-a1db-4c3820766ff6 ] Request (NetworksRbacTest:test_show_network_provider_physical_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:19:16.242 186 DEBUG tempest.lib.common.rest_client [req-abadfa5b-3243-4ae4-a1db-4c3820766ff6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-abadfa5b-3243-4ae4-a1db-4c3820766ff6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["Rz_TUFTMQgaY7_nykEDvVg"], "expires_at": "2020-12-14T03:19:16.000000Z", "issued_at": "2020-12-14T02:19:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.386 193 INFO tempest.lib.common.rest_client [req-8fbf8ea6-569c-4b32-9b21-ecfb11804774 ] Request (VolumeHostsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:19:16.390 193 DEBUG tempest.lib.common.rest_client [req-8fbf8ea6-569c-4b32-9b21-ecfb11804774 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8fbf8ea6-569c-4b32-9b21-ecfb11804774', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6c23a74aaecd42e18453557e3c0d0043", "name": "tempest-VolumeHostsV3RbacTest-1201979942", "password_expires_at": null}, "audit_ids": ["Po2Dc3CPQkWMxXs30NqT1Q"], "expires_at": "2020-12-14T03:19:16.000000Z", "issued_at": "2020-12-14T02:19:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1759f34b955742f3a091f6bb8fb5aaa3", "name": "tempest-VolumeHostsV3RbacTest-1201979942"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.408 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:16.439 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:hosts, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:16.443 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:16.453 189 INFO tempest.lib.common.rest_client [req-4319c7cb-7362-4b4d-9c92-c6399d14d1d2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 4.306s 2020-12-14 02:19:16.457 189 DEBUG tempest.lib.common.rest_client [req-4319c7cb-7362-4b4d-9c92-c6399d14d1d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4319c7cb-7362-4b4d-9c92-c6399d14d1d2', 'x-compute-request-id': 'req-4319c7cb-7362-4b4d-9c92-c6399d14d1d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.458 197 INFO tempest.lib.common.rest_client [req-1cad05b2-83f3-4661-9d90-a7fd93155a7d ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 1.539s 2020-12-14 02:19:16.462 197 DEBUG tempest.lib.common.rest_client [req-1cad05b2-83f3-4661-9d90-a7fd93155a7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1cad05b2-83f3-4661-9d90-a7fd93155a7d', 'x-compute-request-id': 'req-1cad05b2-83f3-4661-9d90-a7fd93155a7d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.497 186 INFO tempest.lib.common.rest_client [req-6fb9b62d-65ad-4d7b-a427-68860790c8d5 ] Request (NetworksRbacTest:test_show_network_provider_physical_network): 200 GET http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c?fields=provider%3Aphysical_network 0.247s 2020-12-14 02:19:16.501 186 DEBUG tempest.lib.common.rest_client [req-6fb9b62d-65ad-4d7b-a427-68860790c8d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '46', 'x-openstack-request-id': 'req-6fb9b62d-65ad-4d7b-a427-68860790c8d5', 'date': 'Mon, 14 Dec 2020 02:19:16 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c?fields=provider%3Aphysical_network'} Body: b'{"network":{"provider:physical_network":null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.504 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:16.526 193 INFO tempest.lib.common.rest_client [req-3ecb61bd-14ab-4764-a14a-2d98b804c6ff ] Request (VolumeHostsV3RbacTest:test_list_hosts): 200 GET http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles 0.075s 2020-12-14 02:19:16.529 193 DEBUG tempest.lib.common.rest_client [req-3ecb61bd-14ab-4764-a14a-2d98b804c6ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ecb61bd-14ab-4764-a14a-2d98b804c6ff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.577 186 INFO tempest.lib.common.rest_client [req-4b85a5d0-89aa-474a-9192-713cf8d75d4e ] Request (NetworksRbacTest:test_show_network_provider_physical_network): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.066s 2020-12-14 02:19:16.579 193 INFO tempest.lib.common.rest_client [req-8c7e6161-f2af-453b-9968-6be32a308f3a ] Request (VolumeHostsV3RbacTest:test_list_hosts): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:19:16.581 186 DEBUG tempest.lib.common.rest_client [req-4b85a5d0-89aa-474a-9192-713cf8d75d4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b85a5d0-89aa-474a-9192-713cf8d75d4e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.584 193 DEBUG tempest.lib.common.rest_client [req-8c7e6161-f2af-453b-9968-6be32a308f3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c7e6161-f2af-453b-9968-6be32a308f3a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6c23a74aaecd42e18453557e3c0d0043", "name": "tempest-VolumeHostsV3RbacTest-1201979942", "password_expires_at": null}, "audit_ids": ["qy42r7OzSaW8vGVCiF_CAA"], "expires_at": "2020-12-14T03:19:16.000000Z", "issued_at": "2020-12-14T02:19:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1759f34b955742f3a091f6bb8fb5aaa3", "name": "tempest-VolumeHostsV3RbacTest-1201979942"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.635 186 INFO tempest.lib.common.rest_client [req-84dc904d-99bf-4347-b7e4-326d00af3d35 ] Request (NetworksRbacTest:test_show_network_provider_physical_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:19:16.639 186 DEBUG tempest.lib.common.rest_client [req-84dc904d-99bf-4347-b7e4-326d00af3d35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84dc904d-99bf-4347-b7e4-326d00af3d35', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["lYPH0nHrTtGHddCSKHZ6zA"], "expires_at": "2020-12-14T03:19:16.000000Z", "issued_at": "2020-12-14T02:19:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.652 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:16.677 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:16.679 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:16.701 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network:provider:segmentation_id, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:16.703 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:16.751 193 INFO tempest.lib.common.rest_client [req-092aafdb-03f9-46d0-9b1b-03781405e63f ] Request (VolumeHostsV3RbacTest:test_list_hosts): 200 GET http://172.30.13.94/volume/v3/1759f34b955742f3a091f6bb8fb5aaa3/os-hosts 0.160s 2020-12-14 02:19:16.754 193 DEBUG tempest.lib.common.rest_client [req-092aafdb-03f9-46d0-9b1b-03781405e63f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-092aafdb-03f9-46d0-9b1b-03781405e63f', 'content-length': '736', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-092aafdb-03f9-46d0-9b1b-03781405e63f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/1759f34b955742f3a091f6bb8fb5aaa3/os-hosts'} Body: b'{"hosts": [{"host_name": "lf-virtual9@ceph", "service": "cinder-volume", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-12-14T02:19:15.000000"}, {"host_name": "lf-virtual9", "service": "cinder-scheduler", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-12-14T02:19:07.000000"}, {"host_name": "lf-virtual9", "service": "cinder-backup", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-12-14T02:19:08.000000"}, {"host_name": "lf-virtual8@ceph", "service": "cinder-volume", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-12-14T02:19:12.000000"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.776 186 INFO tempest.lib.common.rest_client [req-c5ee9288-2a85-449d-bf88-eea0f2d118a5 ] Request (NetworksRbacTest:test_show_network_provider_segmentation_id): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.067s 2020-12-14 02:19:16.779 186 DEBUG tempest.lib.common.rest_client [req-c5ee9288-2a85-449d-bf88-eea0f2d118a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c5ee9288-2a85-449d-bf88-eea0f2d118a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.783 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:16.833 186 INFO tempest.lib.common.rest_client [req-adac954b-4c6f-4c25-bb78-27b2d14913c2 ] Request (NetworksRbacTest:test_show_network_provider_segmentation_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:19:16.837 186 DEBUG tempest.lib.common.rest_client [req-adac954b-4c6f-4c25-bb78-27b2d14913c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-adac954b-4c6f-4c25-bb78-27b2d14913c2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["TprcFsfEToiDJiu4D4zueg"], "expires_at": "2020-12-14T03:19:16.000000Z", "issued_at": "2020-12-14T02:19:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.857 193 INFO tempest.lib.common.rest_client [req-b88af156-d9d7-4e96-9f25-8e9c9ddddef0 ] Request (VolumeHostsV3RbacTest:test_list_hosts): 200 GET http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles 0.068s 2020-12-14 02:19:16.861 193 DEBUG tempest.lib.common.rest_client [req-b88af156-d9d7-4e96-9f25-8e9c9ddddef0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b88af156-d9d7-4e96-9f25-8e9c9ddddef0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.914 193 INFO tempest.lib.common.rest_client [req-82985e53-cc56-4775-9039-8d835e227592 ] Request (VolumeHostsV3RbacTest:test_list_hosts): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:19:16.917 193 DEBUG tempest.lib.common.rest_client [req-82985e53-cc56-4775-9039-8d835e227592 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-82985e53-cc56-4775-9039-8d835e227592', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6c23a74aaecd42e18453557e3c0d0043", "name": "tempest-VolumeHostsV3RbacTest-1201979942", "password_expires_at": null}, "audit_ids": ["BR9gyN_XT5mMgwlUx16F9A"], "expires_at": "2020-12-14T03:19:16.000000Z", "issued_at": "2020-12-14T02:19:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1759f34b955742f3a091f6bb8fb5aaa3", "name": "tempest-VolumeHostsV3RbacTest-1201979942"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:16.930 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:16.947 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:hosts, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:17.036 186 INFO tempest.lib.common.rest_client [req-fa6daeef-6426-4ac9-872b-d396c17ce046 ] Request (NetworksRbacTest:test_show_network_provider_segmentation_id): 200 GET http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c?fields=provider%3Asegmentation_id 0.186s 2020-12-14 02:19:17.039 186 DEBUG tempest.lib.common.rest_client [req-fa6daeef-6426-4ac9-872b-d396c17ce046 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '43', 'x-openstack-request-id': 'req-fa6daeef-6426-4ac9-872b-d396c17ce046', 'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c?fields=provider%3Asegmentation_id'} Body: b'{"network":{"provider:segmentation_id":43}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.042 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:17.050 193 INFO tempest.lib.common.rest_client [req-87f9340d-16a7-4cfc-9093-145bdd282a9f ] Request (VolumeHostsV3RbacTest:test_show_host): 200 GET http://172.30.13.94/volume/v3/1759f34b955742f3a091f6bb8fb5aaa3/os-hosts 0.097s 2020-12-14 02:19:17.053 193 DEBUG tempest.lib.common.rest_client [req-87f9340d-16a7-4cfc-9093-145bdd282a9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-87f9340d-16a7-4cfc-9093-145bdd282a9f', 'content-length': '736', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-87f9340d-16a7-4cfc-9093-145bdd282a9f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/1759f34b955742f3a091f6bb8fb5aaa3/os-hosts'} Body: b'{"hosts": [{"host_name": "lf-virtual9@ceph", "service": "cinder-volume", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-12-14T02:19:15.000000"}, {"host_name": "lf-virtual9", "service": "cinder-scheduler", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-12-14T02:19:17.000000"}, {"host_name": "lf-virtual9", "service": "cinder-backup", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-12-14T02:19:08.000000"}, {"host_name": "lf-virtual8@ceph", "service": "cinder-volume", "zone": "nova", "service-status": "available", "service-state": "enabled", "last-update": "2020-12-14T02:19:12.000000"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.083 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:17.112 186 INFO tempest.lib.common.rest_client [req-989a567f-c695-4c87-9eba-248b02e98465 ] Request (NetworksRbacTest:test_show_network_provider_segmentation_id): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.064s 2020-12-14 02:19:17.114 186 DEBUG tempest.lib.common.rest_client [req-989a567f-c695-4c87-9eba-248b02e98465 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-989a567f-c695-4c87-9eba-248b02e98465', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.150 193 INFO tempest.lib.common.rest_client [req-15bb16aa-1a0d-4b77-8584-270070d59d51 ] Request (VolumeHostsV3RbacTest:test_show_host): 200 GET http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles 0.062s 2020-12-14 02:19:17.158 193 DEBUG tempest.lib.common.rest_client [req-15bb16aa-1a0d-4b77-8584-270070d59d51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15bb16aa-1a0d-4b77-8584-270070d59d51', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.161 186 INFO tempest.lib.common.rest_client [req-c2e13f6c-6ff8-4f36-a7b2-eaab9c0e553a ] Request (NetworksRbacTest:test_show_network_provider_segmentation_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:19:17.165 186 DEBUG tempest.lib.common.rest_client [req-c2e13f6c-6ff8-4f36-a7b2-eaab9c0e553a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2e13f6c-6ff8-4f36-a7b2-eaab9c0e553a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["BfeANxe0RQ2DlEQYQH-e1A"], "expires_at": "2020-12-14T03:19:17.000000Z", "issued_at": "2020-12-14T02:19:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.177 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:17.198 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:17.200 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:17.205 193 INFO tempest.lib.common.rest_client [req-a1ffae2b-ddd7-4bf7-b9d2-2c258287a76b ] Request (VolumeHostsV3RbacTest:test_show_host): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:19:17.207 193 DEBUG tempest.lib.common.rest_client [req-a1ffae2b-ddd7-4bf7-b9d2-2c258287a76b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1ffae2b-ddd7-4bf7-b9d2-2c258287a76b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6c23a74aaecd42e18453557e3c0d0043", "name": "tempest-VolumeHostsV3RbacTest-1201979942", "password_expires_at": null}, "audit_ids": ["rwB1-0_zTlqiXUOKqONjpg"], "expires_at": "2020-12-14T03:19:17.000000Z", "issued_at": "2020-12-14T02:19:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1759f34b955742f3a091f6bb8fb5aaa3", "name": "tempest-VolumeHostsV3RbacTest-1201979942"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.215 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network:router:external, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:17.217 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:17.278 186 INFO tempest.lib.common.rest_client [req-de44586c-237b-4c40-9a7b-402a17849a89 ] Request (NetworksRbacTest:test_show_network_router_external): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.057s 2020-12-14 02:19:17.280 186 DEBUG tempest.lib.common.rest_client [req-de44586c-237b-4c40-9a7b-402a17849a89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de44586c-237b-4c40-9a7b-402a17849a89', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.325 186 INFO tempest.lib.common.rest_client [req-75c57e4b-0123-427f-82c8-151ff2e49a24 ] Request (NetworksRbacTest:test_show_network_router_external): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:19:17.327 186 DEBUG tempest.lib.common.rest_client [req-75c57e4b-0123-427f-82c8-151ff2e49a24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-75c57e4b-0123-427f-82c8-151ff2e49a24', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["PwQYffm_RFm6AnfB1WLijQ"], "expires_at": "2020-12-14T03:19:17.000000Z", "issued_at": "2020-12-14T02:19:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.329 193 INFO tempest.lib.common.rest_client [req-c7b414a2-7bb0-4f2b-af36-ea8542a9cf80 ] Request (VolumeHostsV3RbacTest:test_show_host): 200 GET http://172.30.13.94/volume/v3/1759f34b955742f3a091f6bb8fb5aaa3/os-hosts/lf-virtual9@ceph 0.115s 2020-12-14 02:19:17.332 193 DEBUG tempest.lib.common.rest_client [req-c7b414a2-7bb0-4f2b-af36-ea8542a9cf80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c7b414a2-7bb0-4f2b-af36-ea8542a9cf80', 'content-length': '170', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c7b414a2-7bb0-4f2b-af36-ea8542a9cf80', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/1759f34b955742f3a091f6bb8fb5aaa3/os-hosts/lf-virtual9@ceph'} Body: b'{"host": [{"resource": {"host": "lf-virtual9@ceph", "project": "(total)", "volume_count": "0", "total_volume_gb": "0", "snapshot_count": "0", "total_snapshot_gb": "0"}}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.360 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:17.429 193 INFO tempest.lib.common.rest_client [req-daaf151a-62c5-40e1-96b6-b9be919f3761 ] Request (VolumeHostsV3RbacTest:test_show_host): 200 GET http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles 0.061s 2020-12-14 02:19:17.432 193 DEBUG tempest.lib.common.rest_client [req-daaf151a-62c5-40e1-96b6-b9be919f3761 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-daaf151a-62c5-40e1-96b6-b9be919f3761', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3/users/6c23a74aaecd42e18453557e3c0d0043/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.488 193 INFO tempest.lib.common.rest_client [req-3da801ff-20b6-46aa-844a-4e816929a398 ] Request (VolumeHostsV3RbacTest:test_show_host): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:19:17.492 193 DEBUG tempest.lib.common.rest_client [req-3da801ff-20b6-46aa-844a-4e816929a398 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3da801ff-20b6-46aa-844a-4e816929a398', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6c23a74aaecd42e18453557e3c0d0043", "name": "tempest-VolumeHostsV3RbacTest-1201979942", "password_expires_at": null}, "audit_ids": ["AX_7PxrDTauMhP4EeDrMOg"], "expires_at": "2020-12-14T03:19:17.000000Z", "issued_at": "2020-12-14T02:19:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1759f34b955742f3a091f6bb8fb5aaa3", "name": "tempest-VolumeHostsV3RbacTest-1201979942"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1759f34b955742f3a091f6bb8fb5aaa3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.560 186 INFO tempest.lib.common.rest_client [req-80be93ea-120f-4870-a192-d8ff10d9ffcf ] Request (NetworksRbacTest:test_show_network_router_external): 200 GET http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c?fields=router%3Aexternal 0.227s 2020-12-14 02:19:17.565 186 DEBUG tempest.lib.common.rest_client [req-80be93ea-120f-4870-a192-d8ff10d9ffcf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '37', 'x-openstack-request-id': 'req-80be93ea-120f-4870-a192-d8ff10d9ffcf', 'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c?fields=router%3Aexternal'} Body: b'{"network":{"router:external":false}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.569 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:17.644 186 INFO tempest.lib.common.rest_client [req-16474e76-8662-4894-8995-1962dacd04c1 ] Request (NetworksRbacTest:test_show_network_router_external): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.065s 2020-12-14 02:19:17.649 186 DEBUG tempest.lib.common.rest_client [req-16474e76-8662-4894-8995-1962dacd04c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16474e76-8662-4894-8995-1962dacd04c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.684 193 INFO tempest.lib.common.rest_client [req-efde6ec7-ec45-4852-a39b-1cd4b913f540 ] Request (VolumeHostsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/6c23a74aaecd42e18453557e3c0d0043 0.168s 2020-12-14 02:19:17.687 193 DEBUG tempest.lib.common.rest_client [req-efde6ec7-ec45-4852-a39b-1cd4b913f540 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-efde6ec7-ec45-4852-a39b-1cd4b913f540', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/6c23a74aaecd42e18453557e3c0d0043'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.745 186 INFO tempest.lib.common.rest_client [req-6b4360da-d744-4c43-b9d7-eec3082a54a8 ] Request (NetworksRbacTest:test_show_network_router_external): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:19:17.748 186 DEBUG tempest.lib.common.rest_client [req-6b4360da-d744-4c43-b9d7-eec3082a54a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b4360da-d744-4c43-b9d7-eec3082a54a8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["v0ws1OtpQ_mQ74SUqEn8lQ"], "expires_at": "2020-12-14T03:19:17.000000Z", "issued_at": "2020-12-14T02:19:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.761 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:17.785 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:17.788 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:17.788 193 INFO tempest.lib.common.rest_client [req-ef983c3d-f1e6-4bdb-becd-e4b1e5bf342a ] Request (VolumeHostsV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:19:17.791 193 DEBUG tempest.lib.common.rest_client [req-ef983c3d-f1e6-4bdb-becd-e4b1e5bf342a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef983c3d-f1e6-4bdb-becd-e4b1e5bf342a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["VGWqRINcQVel1fxFngUv-g"], "expires_at": "2020-12-14T03:19:17.000000Z", "issued_at": "2020-12-14T02:19:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.811 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:17.814 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:17.825 197 INFO tempest.lib.common.rest_client [req-a10003a7-dfda-4aaf-a1ad-95cf96e162ef ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.245s 2020-12-14 02:19:17.829 197 DEBUG tempest.lib.common.rest_client [req-a10003a7-dfda-4aaf-a1ad-95cf96e162ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a10003a7-dfda-4aaf-a1ad-95cf96e162ef', 'x-compute-request-id': 'req-a10003a7-dfda-4aaf-a1ad-95cf96e162ef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.829 189 INFO tempest.lib.common.rest_client [req-40f1dd78-cc4c-49c7-85ce-705a8473bd64 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.266s 2020-12-14 02:19:17.833 189 DEBUG tempest.lib.common.rest_client [req-40f1dd78-cc4c-49c7-85ce-705a8473bd64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-40f1dd78-cc4c-49c7-85ce-705a8473bd64', 'x-compute-request-id': 'req-40f1dd78-cc4c-49c7-85ce-705a8473bd64', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.883 186 INFO tempest.lib.common.rest_client [req-c211068a-ed37-41bc-939f-04e7fdedf872 ] Request (NetworksRbacTest:test_update_network): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.062s 2020-12-14 02:19:17.886 186 DEBUG tempest.lib.common.rest_client [req-c211068a-ed37-41bc-939f-04e7fdedf872 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c211068a-ed37-41bc-939f-04e7fdedf872', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:17.937 186 INFO tempest.lib.common.rest_client [req-f22d9c63-0278-4f9a-9648-c6f5b40232b7 ] Request (NetworksRbacTest:test_update_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:19:17.941 186 DEBUG tempest.lib.common.rest_client [req-f22d9c63-0278-4f9a-9648-c6f5b40232b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f22d9c63-0278-4f9a-9648-c6f5b40232b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["5XNMj5roS8eWOw4OmLwrbg"], "expires_at": "2020-12-14T03:19:17.000000Z", "issued_at": "2020-12-14T02:19:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:19.172 197 INFO tempest.lib.common.rest_client [req-edf52106-a874-49a5-89b5-1465f2f6c3b3 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.234s 2020-12-14 02:19:19.175 197 DEBUG tempest.lib.common.rest_client [req-edf52106-a874-49a5-89b5-1465f2f6c3b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-edf52106-a874-49a5-89b5-1465f2f6c3b3', 'x-compute-request-id': 'req-edf52106-a874-49a5-89b5-1465f2f6c3b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:19.181 189 INFO tempest.lib.common.rest_client [req-6026c6ab-70f2-4e5a-b0c4-814479c5ced6 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.240s 2020-12-14 02:19:19.185 189 DEBUG tempest.lib.common.rest_client [req-6026c6ab-70f2-4e5a-b0c4-814479c5ced6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6026c6ab-70f2-4e5a-b0c4-814479c5ced6', 'x-compute-request-id': 'req-6026c6ab-70f2-4e5a-b0c4-814479c5ced6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:20.580 189 INFO tempest.lib.common.rest_client [req-3550bf9c-b580-4136-9045-01fbb22ed2c8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.307s 2020-12-14 02:19:20.583 189 DEBUG tempest.lib.common.rest_client [req-3550bf9c-b580-4136-9045-01fbb22ed2c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3550bf9c-b580-4136-9045-01fbb22ed2c8', 'x-compute-request-id': 'req-3550bf9c-b580-4136-9045-01fbb22ed2c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:20.585 197 INFO tempest.lib.common.rest_client [req-fc766a99-ff3b-437c-9507-61ba3f7b2475 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.301s 2020-12-14 02:19:20.589 197 DEBUG tempest.lib.common.rest_client [req-fc766a99-ff3b-437c-9507-61ba3f7b2475 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fc766a99-ff3b-437c-9507-61ba3f7b2475', 'x-compute-request-id': 'req-fc766a99-ff3b-437c-9507-61ba3f7b2475', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:21.920 189 INFO tempest.lib.common.rest_client [req-c1a3ad73-eab9-4ba7-8a20-ba7c78b1de8b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.251s 2020-12-14 02:19:21.923 189 DEBUG tempest.lib.common.rest_client [req-c1a3ad73-eab9-4ba7-8a20-ba7c78b1de8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c1a3ad73-eab9-4ba7-8a20-ba7c78b1de8b', 'x-compute-request-id': 'req-c1a3ad73-eab9-4ba7-8a20-ba7c78b1de8b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:21.923 197 INFO tempest.lib.common.rest_client [req-1a46b04f-d470-459b-8d75-74bd9a8ad434 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.223s 2020-12-14 02:19:21.926 197 DEBUG tempest.lib.common.rest_client [req-1a46b04f-d470-459b-8d75-74bd9a8ad434 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1a46b04f-d470-459b-8d75-74bd9a8ad434', 'x-compute-request-id': 'req-1a46b04f-d470-459b-8d75-74bd9a8ad434', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:22.246 193 INFO tempest.lib.common.rest_client [req-d46c2881-a69d-48eb-8dd0-e302ab56e3f0 ] Request (VolumeHostsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1759f34b955742f3a091f6bb8fb5aaa3&name=default 4.447s 2020-12-14 02:19:22.248 193 DEBUG tempest.lib.common.rest_client [req-d46c2881-a69d-48eb-8dd0-e302ab56e3f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-d46c2881-a69d-48eb-8dd0-e302ab56e3f0', 'date': 'Mon, 14 Dec 2020 02:19:22 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1759f34b955742f3a091f6bb8fb5aaa3&name=default'} Body: b'{"security_groups": [{"id": "af9dd067-6d3a-40fb-b79f-e9537b0def42", "name": "default", "stateful": true, "tenant_id": "1759f34b955742f3a091f6bb8fb5aaa3", "description": "Default security group", "security_group_rules": [{"id": "1fb338d7-c568-4301-9740-5996e4f743c8", "tenant_id": "1759f34b955742f3a091f6bb8fb5aaa3", "security_group_id": "af9dd067-6d3a-40fb-b79f-e9537b0def42", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "af9dd067-6d3a-40fb-b79f-e9537b0def42", "description": null, "tags": [], "created_at": "2020-12-14T02:19:18Z", "updated_at": "2020-12-14T02:19:18Z", "revision_number": 0, "project_id": "1759f34b955742f3a091f6bb8fb5aaa3"}, {"id": "b24f8fc1-953d-45e5-be89-2523f5017860", "tenant_id": "1759f34b955742f3a091f6bb8fb5aaa3", "security_group_id": "af9dd067-6d3a-40fb-b79f-e9537b0def42", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:18Z", "updated_at": "2020-12-14T02:19:18Z", "revision_number": 0, "project_id": "1759f34b955742f3a091f6bb8fb5aaa3"}, {"id": "cdd1b3b1-4fcc-45ed-9350-18c97232cfdc", "tenant_id": "1759f34b955742f3a091f6bb8fb5aaa3", "security_group_id": "af9dd067-6d3a-40fb-b79f-e9537b0def42", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:18Z", "updated_at": "2020-12-14T02:19:18Z", "revision_number": 0, "project_id": "1759f34b955742f3a091f6bb8fb5aaa3"}, {"id": "eaf8881c-f5b4-4778-a948-7c3c6fc3d669", "tenant_id": "1759f34b955742f3a091f6bb8fb5aaa3", "security_group_id": "af9dd067-6d3a-40fb-b79f-e9537b0def42", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "af9dd067-6d3a-40fb-b79f-e9537b0def42", "description": null, "tags": [], "created_at": "2020-12-14T02:19:17Z", "updated_at": "2020-12-14T02:19:17Z", "revision_number": 0, "project_id": "1759f34b955742f3a091f6bb8fb5aaa3"}], "tags": [], "created_at": "2020-12-14T02:19:17Z", "updated_at": "2020-12-14T02:19:18Z", "revision_number": 1, "project_id": "1759f34b955742f3a091f6bb8fb5aaa3"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:22.397 193 INFO tempest.lib.common.rest_client [req-9cddf853-a07e-4c38-9727-7830e47d5930 ] Request (VolumeHostsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/af9dd067-6d3a-40fb-b79f-e9537b0def42 0.143s 2020-12-14 02:19:22.399 193 DEBUG tempest.lib.common.rest_client [req-9cddf853-a07e-4c38-9727-7830e47d5930 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-9cddf853-a07e-4c38-9727-7830e47d5930', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:22 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/af9dd067-6d3a-40fb-b79f-e9537b0def42'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:22.499 186 INFO tempest.lib.common.rest_client [req-87006e68-57a8-4804-977b-fd9b4120ef5e ] Request (NetworksRbacTest:test_update_network): 200 PUT http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c 4.551s 2020-12-14 02:19:22.504 186 DEBUG tempest.lib.common.rest_client [req-87006e68-57a8-4804-977b-fd9b4120ef5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-1932804438"}} Response - Headers: {'content-type': 'application/json', 'content-length': '757', 'x-openstack-request-id': 'req-87006e68-57a8-4804-977b-fd9b4120ef5e', 'date': 'Mon, 14 Dec 2020 02:19:22 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c'} Body: b'{"network":{"id":"cb9bcdd1-9700-4d03-8250-b150f1bb918c","name":"tempest-NetworksRbacTest-Network-1932804438","tenant_id":"018f3876f714467cb33dc272b1b292fa","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["68f6c472-de82-48f4-ad9f-e861023eab10"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:19:06Z","updated_at":"2020-12-14T02:19:22Z","revision_number":3,"project_id":"018f3876f714467cb33dc272b1b292fa","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":43}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:22.507 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:22.548 193 INFO tempest.lib.common.rest_client [req-58665d3d-12f8-4173-91f9-21443505e6ae ] Request (VolumeHostsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3 0.142s 2020-12-14 02:19:22.550 193 DEBUG tempest.lib.common.rest_client [req-58665d3d-12f8-4173-91f9-21443505e6ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58665d3d-12f8-4173-91f9-21443505e6ae', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1759f34b955742f3a091f6bb8fb5aaa3'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:22.615 193 INFO tempest.lib.common.rest_client [req-049126b5-1148-4d65-9b86-c0d357441e1a ] Request (VolumeQuotasV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:19:22.618 193 DEBUG tempest.lib.common.rest_client [req-049126b5-1148-4d65-9b86-c0d357441e1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-049126b5-1148-4d65-9b86-c0d357441e1a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["wyuOKFPhRkC_c0YMSP9gqA"], "expires_at": "2020-12-14T03:19:22.000000Z", "issued_at": "2020-12-14T02:19:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:22.640 186 INFO tempest.lib.common.rest_client [req-09e447bb-7709-47c4-a020-e556b6dfec4f ] Request (NetworksRbacTest:test_update_network): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.127s 2020-12-14 02:19:22.649 186 DEBUG tempest.lib.common.rest_client [req-09e447bb-7709-47c4-a020-e556b6dfec4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-09e447bb-7709-47c4-a020-e556b6dfec4f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:22.722 193 INFO tempest.lib.common.rest_client [req-e119816e-916a-4141-8455-6f653783f9ac ] Request (VolumeQuotasV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:19:22.724 193 DEBUG tempest.lib.common.rest_client [req-e119816e-916a-4141-8455-6f653783f9ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e119816e-916a-4141-8455-6f653783f9ac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["VnpcJuzxR7iU15Sh-8-FzQ"], "expires_at": "2020-12-14T03:19:22.000000Z", "issued_at": "2020-12-14T02:19:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:22.755 186 INFO tempest.lib.common.rest_client [req-cfe41e43-3183-4ed8-a974-8d433dc0119a ] Request (NetworksRbacTest:test_update_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:19:22.759 186 DEBUG tempest.lib.common.rest_client [req-cfe41e43-3183-4ed8-a974-8d433dc0119a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfe41e43-3183-4ed8-a974-8d433dc0119a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["BBtWvzplTKyH5HE0roX2_w"], "expires_at": "2020-12-14T03:19:22.000000Z", "issued_at": "2020-12-14T02:19:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:22.799 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:22.802 193 INFO tempest.lib.common.rest_client [req-51acd359-664e-4867-938a-84a21c19b3f0 ] Request (VolumeQuotasV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.069s 2020-12-14 02:19:22.804 193 DEBUG tempest.lib.common.rest_client [req-51acd359-664e-4867-938a-84a21c19b3f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51acd359-664e-4867-938a-84a21c19b3f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:22.827 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:22.829 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:22.857 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:22.860 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:22.883 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_network:router:external, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:22.887 193 INFO tempest.lib.common.rest_client [req-c38b5780-448a-4575-a53c-845c465e5f68 ] Request (VolumeQuotasV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.076s 2020-12-14 02:19:22.890 193 DEBUG tempest.lib.common.rest_client [req-c38b5780-448a-4575-a53c-845c465e5f68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeQuotasV3RbacTest-1697437067-desc", "domain_id": "default", "name": "tempest-VolumeQuotasV3RbacTest-1697437067"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c38b5780-448a-4575-a53c-845c465e5f68', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "e0e21d98ec9b4b8e98b47179cbfa4566", "name": "tempest-VolumeQuotasV3RbacTest-1697437067", "domain_id": "default", "description": "tempest-VolumeQuotasV3RbacTest-1697437067-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:23.021 193 INFO tempest.lib.common.rest_client [req-5535af83-5277-42b7-8d17-a49f6f41d203 ] Request (VolumeQuotasV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.124s 2020-12-14 02:19:23.024 193 DEBUG tempest.lib.common.rest_client [req-5535af83-5277-42b7-8d17-a49f6f41d203 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeQuotasV3RbacTest-1697437067", "password": "Y0&z3#bLWe4kZE@", "project_id": "e0e21d98ec9b4b8e98b47179cbfa4566", "email": "tempest-VolumeQuotasV3RbacTest-1257667524@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '400', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5535af83-5277-42b7-8d17-a49f6f41d203', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "e0e21d98ec9b4b8e98b47179cbfa4566", "email": "tempest-VolumeQuotasV3RbacTest-1257667524@example.com", "id": "1b82dfecc1094374917223464d7a9564", "name": "tempest-VolumeQuotasV3RbacTest-1697437067", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/1b82dfecc1094374917223464d7a9564"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:23.099 193 INFO tempest.lib.common.rest_client [req-57563a4e-470f-4584-9188-51eebd4e6caa ] Request (VolumeQuotasV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.068s 2020-12-14 02:19:23.101 193 DEBUG tempest.lib.common.rest_client [req-57563a4e-470f-4584-9188-51eebd4e6caa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57563a4e-470f-4584-9188-51eebd4e6caa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:23.176 193 INFO tempest.lib.common.rest_client [req-306f4457-3346-4107-81ab-b9bf25e12df6 ] Request (VolumeQuotasV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:19:23.179 193 DEBUG tempest.lib.common.rest_client [req-306f4457-3346-4107-81ab-b9bf25e12df6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-306f4457-3346-4107-81ab-b9bf25e12df6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:23.248 197 INFO tempest.lib.common.rest_client [req-73be4b26-8dd0-40d9-98ff-33f7d9b4016b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.214s 2020-12-14 02:19:23.250 197 DEBUG tempest.lib.common.rest_client [req-73be4b26-8dd0-40d9-98ff-33f7d9b4016b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-73be4b26-8dd0-40d9-98ff-33f7d9b4016b', 'x-compute-request-id': 'req-73be4b26-8dd0-40d9-98ff-33f7d9b4016b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:23.273 193 INFO tempest.lib.common.rest_client [req-ec2f4746-da30-4f85-9e70-96123af44c0f ] Request (VolumeQuotasV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles/72a4576c553448cd941b052c1ca0cf2d 0.086s 2020-12-14 02:19:23.275 193 DEBUG tempest.lib.common.rest_client [req-ec2f4746-da30-4f85-9e70-96123af44c0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec2f4746-da30-4f85-9e70-96123af44c0f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:23.278 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeQuotasV3RbacTest-1697437067', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e0e21d98ec9b4b8e98b47179cbfa4566', 'project_name': 'tempest-VolumeQuotasV3RbacTest-1697437067', 'tenant_id': 'e0e21d98ec9b4b8e98b47179cbfa4566', 'tenant_name': 'tempest-VolumeQuotasV3RbacTest-1697437067', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '1b82dfecc1094374917223464d7a9564'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:23.280 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeQuotasV3RbacTest-1697437067', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e0e21d98ec9b4b8e98b47179cbfa4566', 'project_name': 'tempest-VolumeQuotasV3RbacTest-1697437067', 'tenant_id': 'e0e21d98ec9b4b8e98b47179cbfa4566', 'tenant_name': 'tempest-VolumeQuotasV3RbacTest-1697437067', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '1b82dfecc1094374917223464d7a9564'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:23.482 193 INFO tempest.lib.common.rest_client [req-d7563d1a-218e-44d6-85f2-b6de3ca895f7 ] Request (VolumeQuotasV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.133s 2020-12-14 02:19:23.486 193 DEBUG tempest.lib.common.rest_client [req-d7563d1a-218e-44d6-85f2-b6de3ca895f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d7563d1a-218e-44d6-85f2-b6de3ca895f7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1b82dfecc1094374917223464d7a9564", "name": "tempest-VolumeQuotasV3RbacTest-1697437067", "password_expires_at": null}, "audit_ids": ["NElDsjx9Q06Xw3V6vJgWUA"], "expires_at": "2020-12-14T03:19:23.000000Z", "issued_at": "2020-12-14T02:19:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e0e21d98ec9b4b8e98b47179cbfa4566", "name": "tempest-VolumeQuotasV3RbacTest-1697437067"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:23.509 189 INFO tempest.lib.common.rest_client [req-7c5b5f17-b5c2-4c75-9f6c-c5d760d26bc6 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.475s 2020-12-14 02:19:23.513 189 DEBUG tempest.lib.common.rest_client [req-7c5b5f17-b5c2-4c75-9f6c-c5d760d26bc6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7c5b5f17-b5c2-4c75-9f6c-c5d760d26bc6', 'x-compute-request-id': 'req-7c5b5f17-b5c2-4c75-9f6c-c5d760d26bc6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:23.605 193 INFO tempest.lib.common.rest_client [req-b6639756-5c5b-4529-b8cf-7e58b4bec49e ] Request (VolumeQuotasV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:19:23.608 193 DEBUG tempest.lib.common.rest_client [req-b6639756-5c5b-4529-b8cf-7e58b4bec49e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6639756-5c5b-4529-b8cf-7e58b4bec49e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["6CGPyOKcQCmoT9iFHqbEKQ"], "expires_at": "2020-12-14T03:19:23.000000Z", "issued_at": "2020-12-14T02:19:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:23.609 186 INFO tempest.lib.common.rest_client [req-947f58dd-f251-4a87-a952-ab109b5e59d2 ] Request (NetworksRbacTest:test_update_network_router_external): 201 POST http://172.30.13.94:9696/v2.0/networks 0.720s 2020-12-14 02:19:23.612 186 DEBUG tempest.lib.common.rest_client [req-947f58dd-f251-4a87-a952-ab109b5e59d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-NetworksRbacTest-Network-1858024694"}} Response - Headers: {'content-type': 'application/json', 'content-length': '732', 'x-openstack-request-id': 'req-947f58dd-f251-4a87-a952-ab109b5e59d2', 'date': 'Mon, 14 Dec 2020 02:19:23 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"7e0a4b4b-b8c3-45dd-afda-93e34832ecb4","name":"tempest-NetworksRbacTest-Network-1858024694","tenant_id":"018f3876f714467cb33dc272b1b292fa","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"018f3876f714467cb33dc272b1b292fa","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":73,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:19:23Z","updated_at":"2020-12-14T02:19:23Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:23.615 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:23.695 186 INFO tempest.lib.common.rest_client [req-a48c4cf1-bda3-42a8-9584-50ad51f9b2d8 ] Request (NetworksRbacTest:test_update_network_router_external): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.073s 2020-12-14 02:19:23.699 186 DEBUG tempest.lib.common.rest_client [req-a48c4cf1-bda3-42a8-9584-50ad51f9b2d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a48c4cf1-bda3-42a8-9584-50ad51f9b2d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:23.728 193 INFO tempest.lib.common.rest_client [req-98240399-709d-4bbc-b7fe-57375af14187 ] Request (VolumeQuotasV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:19:23.731 193 DEBUG tempest.lib.common.rest_client [req-98240399-709d-4bbc-b7fe-57375af14187 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98240399-709d-4bbc-b7fe-57375af14187', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["BqKi_nYDTfSte70lZWZv_g"], "expires_at": "2020-12-14T03:19:23.000000Z", "issued_at": "2020-12-14T02:19:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:23.807 193 INFO tempest.lib.common.rest_client [req-33e0484f-b556-4667-8911-5e96d591b9ef ] Request (VolumeQuotasV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.069s 2020-12-14 02:19:23.807 186 INFO tempest.lib.common.rest_client [req-9266c6cb-45a4-45bf-b11e-28539e01bc25 ] Request (NetworksRbacTest:test_update_network_router_external): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:19:23.809 193 DEBUG tempest.lib.common.rest_client [req-33e0484f-b556-4667-8911-5e96d591b9ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33e0484f-b556-4667-8911-5e96d591b9ef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:23.812 186 DEBUG tempest.lib.common.rest_client [req-9266c6cb-45a4-45bf-b11e-28539e01bc25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9266c6cb-45a4-45bf-b11e-28539e01bc25', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["PQy6ydT0SXy7y1jysSSz3Q"], "expires_at": "2020-12-14T03:19:23.000000Z", "issued_at": "2020-12-14T02:19:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:23.883 193 INFO tempest.lib.common.rest_client [req-13d3768b-18ed-4ea5-8259-9b2b583e7932 ] Request (VolumeQuotasV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:19:23.887 193 DEBUG tempest.lib.common.rest_client [req-13d3768b-18ed-4ea5-8259-9b2b583e7932 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13d3768b-18ed-4ea5-8259-9b2b583e7932', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:23.892 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:19:23.896 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:23.970 193 INFO tempest.lib.common.rest_client [req-8c35ae77-ab32-47fc-a20a-6143038ac0c0 ] Request (VolumeQuotasV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles 0.065s 2020-12-14 02:19:23.973 193 DEBUG tempest.lib.common.rest_client [req-8c35ae77-ab32-47fc-a20a-6143038ac0c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c35ae77-ab32-47fc-a20a-6143038ac0c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:24.054 193 INFO tempest.lib.common.rest_client [req-a97b18ee-1108-458c-942f-bdb8bf61317f ] Request (VolumeQuotasV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles/72a4576c553448cd941b052c1ca0cf2d 0.072s 2020-12-14 02:19:24.057 193 DEBUG tempest.lib.common.rest_client [req-a97b18ee-1108-458c-942f-bdb8bf61317f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a97b18ee-1108-458c-942f-bdb8bf61317f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:24.201 193 INFO tempest.lib.common.rest_client [req-e3be9e92-184b-4e60-80e8-f267815b9787 ] Request (VolumeQuotasV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles/a629c95d64b3416fb80ae90af4f69c05 0.135s 2020-12-14 02:19:24.204 193 DEBUG tempest.lib.common.rest_client [req-e3be9e92-184b-4e60-80e8-f267815b9787 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3be9e92-184b-4e60-80e8-f267815b9787', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:24.369 186 INFO tempest.lib.common.rest_client [req-01ad351b-69d9-40a0-b2f3-c360c4238990 ] Request (NetworksRbacTest:test_update_network_router_external): 200 PUT http://172.30.13.94:9696/v2.0/networks/7e0a4b4b-b8c3-45dd-afda-93e34832ecb4 0.549s 2020-12-14 02:19:24.373 186 DEBUG tempest.lib.common.rest_client [req-01ad351b-69d9-40a0-b2f3-c360c4238990 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"router:external": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '731', 'x-openstack-request-id': 'req-01ad351b-69d9-40a0-b2f3-c360c4238990', 'date': 'Mon, 14 Dec 2020 02:19:24 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/7e0a4b4b-b8c3-45dd-afda-93e34832ecb4'} Body: b'{"network":{"id":"7e0a4b4b-b8c3-45dd-afda-93e34832ecb4","name":"tempest-NetworksRbacTest-Network-1858024694","tenant_id":"018f3876f714467cb33dc272b1b292fa","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"availability_zone_hints":[],"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":true,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"is_default":false,"tags":[],"created_at":"2020-12-14T02:19:23Z","updated_at":"2020-12-14T02:19:24Z","revision_number":2,"project_id":"018f3876f714467cb33dc272b1b292fa","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":73}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:24.375 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:24.499 186 INFO tempest.lib.common.rest_client [req-15b095da-9749-4578-a139-ebff1d30e0e9 ] Request (NetworksRbacTest:test_update_network_router_external): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.119s 2020-12-14 02:19:24.502 186 DEBUG tempest.lib.common.rest_client [req-15b095da-9749-4578-a139-ebff1d30e0e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15b095da-9749-4578-a139-ebff1d30e0e9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:24.580 197 INFO tempest.lib.common.rest_client [req-c11550e2-1b0a-47be-93bd-e0a7d35178ee ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.211s 2020-12-14 02:19:24.584 197 DEBUG tempest.lib.common.rest_client [req-c11550e2-1b0a-47be-93bd-e0a7d35178ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c11550e2-1b0a-47be-93bd-e0a7d35178ee', 'x-compute-request-id': 'req-c11550e2-1b0a-47be-93bd-e0a7d35178ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:24.624 186 INFO tempest.lib.common.rest_client [req-b6d83608-60ce-4416-9687-678155692776 ] Request (NetworksRbacTest:test_update_network_router_external): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.115s 2020-12-14 02:19:24.626 186 DEBUG tempest.lib.common.rest_client [req-b6d83608-60ce-4416-9687-678155692776 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6d83608-60ce-4416-9687-678155692776', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["hzzC_tZBSnyiaocRh6P1Fg"], "expires_at": "2020-12-14T03:19:24.000000Z", "issued_at": "2020-12-14T02:19:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:24.638 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:24.659 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:24.661 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:24.680 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_network, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:24.682 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:24.700 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_network:shared, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:24.702 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:24.770 186 INFO tempest.lib.common.rest_client [req-9eae75e4-9b6a-4b0a-8d3b-ce1f2207d64e ] Request (NetworksRbacTest:test_update_network_shared): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.063s 2020-12-14 02:19:24.772 186 DEBUG tempest.lib.common.rest_client [req-9eae75e4-9b6a-4b0a-8d3b-ce1f2207d64e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9eae75e4-9b6a-4b0a-8d3b-ce1f2207d64e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:24.815 189 INFO tempest.lib.common.rest_client [req-fd1c4c43-1793-4a39-94de-23c2276cddac ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.195s 2020-12-14 02:19:24.818 189 DEBUG tempest.lib.common.rest_client [req-fd1c4c43-1793-4a39-94de-23c2276cddac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fd1c4c43-1793-4a39-94de-23c2276cddac', 'x-compute-request-id': 'req-fd1c4c43-1793-4a39-94de-23c2276cddac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:24.824 186 INFO tempest.lib.common.rest_client [req-4439aff9-377b-4958-a4f4-7e2723953751 ] Request (NetworksRbacTest:test_update_network_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:19:24.829 186 DEBUG tempest.lib.common.rest_client [req-4439aff9-377b-4958-a4f4-7e2723953751 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4439aff9-377b-4958-a4f4-7e2723953751', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["51hfs0TfTNG-QKFmWp9CMA"], "expires_at": "2020-12-14T03:19:24.000000Z", "issued_at": "2020-12-14T02:19:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:25.307 193 INFO tempest.lib.common.rest_client [req-5355ba80-3136-4be0-bdcd-5c735cccc0bf ] Request (VolumeQuotasV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:19:25.310 193 DEBUG tempest.lib.common.rest_client [req-5355ba80-3136-4be0-bdcd-5c735cccc0bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5355ba80-3136-4be0-bdcd-5c735cccc0bf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1b82dfecc1094374917223464d7a9564", "name": "tempest-VolumeQuotasV3RbacTest-1697437067", "password_expires_at": null}, "audit_ids": ["8JXv2mAXSU2bZ__6xAqY9w"], "expires_at": "2020-12-14T03:19:25.000000Z", "issued_at": "2020-12-14T02:19:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e0e21d98ec9b4b8e98b47179cbfa4566", "name": "tempest-VolumeQuotasV3RbacTest-1697437067"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:25.320 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:25.338 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:quotas:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:25.487 186 INFO tempest.lib.common.rest_client [req-015036a4-2aca-4e43-b100-c04272f5776a ] Request (NetworksRbacTest:test_update_network_shared): 200 PUT http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c 0.651s 2020-12-14 02:19:25.490 186 DEBUG tempest.lib.common.rest_client [req-015036a4-2aca-4e43-b100-c04272f5776a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"shared": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '756', 'x-openstack-request-id': 'req-015036a4-2aca-4e43-b100-c04272f5776a', 'date': 'Mon, 14 Dec 2020 02:19:25 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c'} Body: b'{"network":{"id":"cb9bcdd1-9700-4d03-8250-b150f1bb918c","name":"tempest-NetworksRbacTest-Network-1932804438","tenant_id":"018f3876f714467cb33dc272b1b292fa","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["68f6c472-de82-48f4-ad9f-e861023eab10"],"shared":true,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:19:06Z","updated_at":"2020-12-14T02:19:25Z","revision_number":4,"project_id":"018f3876f714467cb33dc272b1b292fa","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":43}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:25.493 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:25.538 193 INFO tempest.lib.common.rest_client [req-8b2acd73-8466-4fb4-8fcf-c0a515a0a687 ] Request (VolumeQuotasV3RbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566/defaults 0.194s 2020-12-14 02:19:25.542 193 DEBUG tempest.lib.common.rest_client [req-8b2acd73-8466-4fb4-8fcf-c0a515a0a687 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8b2acd73-8466-4fb4-8fcf-c0a515a0a687', 'content-length': '340', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8b2acd73-8466-4fb4-8fcf-c0a515a0a687', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566/defaults'} Body: b'{"quota_set": {"volumes": 10, "per_volume_gigabytes": -1, "snapshots": 10, "gigabytes": 1000, "backups": 10, "backup_gigabytes": 1000, "volumes_ceph": -1, "gigabytes_ceph": -1, "snapshots_ceph": -1, "volumes___DEFAULT__": -1, "gigabytes___DEFAULT__": -1, "snapshots___DEFAULT__": -1, "groups": 10, "id": "e0e21d98ec9b4b8e98b47179cbfa4566"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:25.557 186 INFO tempest.lib.common.rest_client [req-5648354a-ce25-440e-8570-4ca1fe1637a2 ] Request (NetworksRbacTest:test_update_network_shared): 200 GET http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles 0.059s 2020-12-14 02:19:25.560 186 DEBUG tempest.lib.common.rest_client [req-5648354a-ce25-440e-8570-4ca1fe1637a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5648354a-ce25-440e-8570-4ca1fe1637a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa/users/e8ed31319cd64f6ebc514ca361a5a71b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:25.567 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:25.607 186 INFO tempest.lib.common.rest_client [req-758dcbac-f4ef-49e3-afd5-854b39e1cea4 ] Request (NetworksRbacTest:test_update_network_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:19:25.611 186 DEBUG tempest.lib.common.rest_client [req-758dcbac-f4ef-49e3-afd5-854b39e1cea4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-758dcbac-f4ef-49e3-afd5-854b39e1cea4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e8ed31319cd64f6ebc514ca361a5a71b", "name": "tempest-NetworksRbacTest-551926975", "password_expires_at": null}, "audit_ids": ["dqURtqcZSL6ry7q3kcomDw"], "expires_at": "2020-12-14T03:19:25.000000Z", "issued_at": "2020-12-14T02:19:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "018f3876f714467cb33dc272b1b292fa", "name": "tempest-NetworksRbacTest-551926975"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_018f3876f714467cb33dc272b1b292fa", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:25.634 193 INFO tempest.lib.common.rest_client [req-02ead8b8-7576-468a-9ba0-23aad0fad94b ] Request (VolumeQuotasV3RbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles 0.061s 2020-12-14 02:19:25.637 193 DEBUG tempest.lib.common.rest_client [req-02ead8b8-7576-468a-9ba0-23aad0fad94b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02ead8b8-7576-468a-9ba0-23aad0fad94b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:25.684 193 INFO tempest.lib.common.rest_client [req-50f5326a-5911-411e-998e-488a389b4ac5 ] Request (VolumeQuotasV3RbacTest:test_delete_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:19:25.687 193 DEBUG tempest.lib.common.rest_client [req-50f5326a-5911-411e-998e-488a389b4ac5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-50f5326a-5911-411e-998e-488a389b4ac5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1b82dfecc1094374917223464d7a9564", "name": "tempest-VolumeQuotasV3RbacTest-1697437067", "password_expires_at": null}, "audit_ids": ["oMw4tX94SLeSrpxiksg1Uw"], "expires_at": "2020-12-14T03:19:25.000000Z", "issued_at": "2020-12-14T02:19:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e0e21d98ec9b4b8e98b47179cbfa4566", "name": "tempest-VolumeQuotasV3RbacTest-1697437067"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:25.793 193 INFO tempest.lib.common.rest_client [req-6ec335d0-fec0-4fe7-8f83-f0a3aa198cd3 ] Request (VolumeQuotasV3RbacTest:test_delete_quota_set): 200 DELETE http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566 0.097s 2020-12-14 02:19:25.797 193 DEBUG tempest.lib.common.rest_client [req-6ec335d0-fec0-4fe7-8f83-f0a3aa198cd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-6ec335d0-fec0-4fe7-8f83-f0a3aa198cd3', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6ec335d0-fec0-4fe7-8f83-f0a3aa198cd3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:25.800 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:25.869 193 INFO tempest.lib.common.rest_client [req-5cf5f18d-f1eb-49ca-9be3-9a22f05640c8 ] Request (VolumeQuotasV3RbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles 0.064s 2020-12-14 02:19:25.872 193 DEBUG tempest.lib.common.rest_client [req-5cf5f18d-f1eb-49ca-9be3-9a22f05640c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5cf5f18d-f1eb-49ca-9be3-9a22f05640c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:25.920 197 INFO tempest.lib.common.rest_client [req-55067c2f-8984-4844-a3c4-84361538a8b0 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.212s 2020-12-14 02:19:25.923 197 DEBUG tempest.lib.common.rest_client [req-55067c2f-8984-4844-a3c4-84361538a8b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-55067c2f-8984-4844-a3c4-84361538a8b0', 'x-compute-request-id': 'req-55067c2f-8984-4844-a3c4-84361538a8b0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:25.923 193 INFO tempest.lib.common.rest_client [req-05dff404-347a-41d8-964a-4797ecaa700c ] Request (VolumeQuotasV3RbacTest:test_delete_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:19:25.927 193 DEBUG tempest.lib.common.rest_client [req-05dff404-347a-41d8-964a-4797ecaa700c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05dff404-347a-41d8-964a-4797ecaa700c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1b82dfecc1094374917223464d7a9564", "name": "tempest-VolumeQuotasV3RbacTest-1697437067", "password_expires_at": null}, "audit_ids": ["b5ET8gLlRoq5_6qKaD9EdQ"], "expires_at": "2020-12-14T03:19:25.000000Z", "issued_at": "2020-12-14T02:19:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e0e21d98ec9b4b8e98b47179cbfa4566", "name": "tempest-VolumeQuotasV3RbacTest-1697437067"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:26.247 193 INFO tempest.lib.common.rest_client [req-ddaa8bd6-444e-43e9-8bc0-de79ace72fa4 ] Request (VolumeQuotasV3RbacTest:_run_cleanups): 200 PUT http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566 0.310s 2020-12-14 02:19:26.251 193 DEBUG tempest.lib.common.rest_client [req-ddaa8bd6-444e-43e9-8bc0-de79ace72fa4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_set": {"volumes": 10, "per_volume_gigabytes": -1, "snapshots": 10, "gigabytes": 1000, "backups": 10, "backup_gigabytes": 1000}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ddaa8bd6-444e-43e9-8bc0-de79ace72fa4', 'content-length': '298', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ddaa8bd6-444e-43e9-8bc0-de79ace72fa4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566'} Body: b'{"quota_set": {"volumes": 10, "per_volume_gigabytes": -1, "snapshots": 10, "gigabytes": 1000, "backups": 10, "backup_gigabytes": 1000, "volumes_ceph": -1, "gigabytes_ceph": -1, "snapshots_ceph": -1, "volumes___DEFAULT__": -1, "gigabytes___DEFAULT__": -1, "snapshots___DEFAULT__": -1, "groups": 10}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:26.288 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:26.307 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:quotas:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:26.309 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:26.327 189 INFO tempest.lib.common.rest_client [req-257afcbe-f5f0-48d4-bb4f-50f58dc14dcb ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.403s 2020-12-14 02:19:26.330 189 DEBUG tempest.lib.common.rest_client [req-257afcbe-f5f0-48d4-bb4f-50f58dc14dcb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-257afcbe-f5f0-48d4-bb4f-50f58dc14dcb', 'x-compute-request-id': 'req-257afcbe-f5f0-48d4-bb4f-50f58dc14dcb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:26.351 186 INFO tempest.lib.common.rest_client [req-7ff4609d-ae62-47b4-a987-6b1f9a39b149 ] Request (NetworksRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c 0.732s 2020-12-14 02:19:26.354 186 DEBUG tempest.lib.common.rest_client [req-7ff4609d-ae62-47b4-a987-6b1f9a39b149 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"shared": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '757', 'x-openstack-request-id': 'req-7ff4609d-ae62-47b4-a987-6b1f9a39b149', 'date': 'Mon, 14 Dec 2020 02:19:26 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c'} Body: b'{"network":{"id":"cb9bcdd1-9700-4d03-8250-b150f1bb918c","name":"tempest-NetworksRbacTest-Network-1932804438","tenant_id":"018f3876f714467cb33dc272b1b292fa","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":["68f6c472-de82-48f4-ad9f-e861023eab10"],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:19:06Z","updated_at":"2020-12-14T02:19:26Z","revision_number":5,"project_id":"018f3876f714467cb33dc272b1b292fa","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":43}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:26.378 193 INFO tempest.lib.common.rest_client [req-6e35bceb-ab36-4b0e-8ae6-6380cef9207c ] Request (VolumeQuotasV3RbacTest:test_list_default_quotas): 200 GET http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles 0.063s 2020-12-14 02:19:26.380 193 DEBUG tempest.lib.common.rest_client [req-6e35bceb-ab36-4b0e-8ae6-6380cef9207c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e35bceb-ab36-4b0e-8ae6-6380cef9207c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:26.426 193 INFO tempest.lib.common.rest_client [req-63d13a0f-940a-460f-a240-94bc7f2203e5 ] Request (VolumeQuotasV3RbacTest:test_list_default_quotas): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:19:26.427 193 DEBUG tempest.lib.common.rest_client [req-63d13a0f-940a-460f-a240-94bc7f2203e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63d13a0f-940a-460f-a240-94bc7f2203e5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1b82dfecc1094374917223464d7a9564", "name": "tempest-VolumeQuotasV3RbacTest-1697437067", "password_expires_at": null}, "audit_ids": ["KmV0avw5TSetc2uUyAr0Dg"], "expires_at": "2020-12-14T03:19:26.000000Z", "issued_at": "2020-12-14T02:19:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e0e21d98ec9b4b8e98b47179cbfa4566", "name": "tempest-VolumeQuotasV3RbacTest-1697437067"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:26.571 193 INFO tempest.lib.common.rest_client [req-ce36fe59-e922-4d46-bf08-a29a6ffa5f83 ] Request (VolumeQuotasV3RbacTest:test_list_default_quotas): 200 GET http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566/defaults 0.138s 2020-12-14 02:19:26.576 193 DEBUG tempest.lib.common.rest_client [req-ce36fe59-e922-4d46-bf08-a29a6ffa5f83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ce36fe59-e922-4d46-bf08-a29a6ffa5f83', 'content-length': '340', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ce36fe59-e922-4d46-bf08-a29a6ffa5f83', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566/defaults'} Body: b'{"quota_set": {"volumes": 10, "per_volume_gigabytes": -1, "snapshots": 10, "gigabytes": 1000, "backups": 10, "backup_gigabytes": 1000, "volumes_ceph": -1, "gigabytes_ceph": -1, "snapshots_ceph": -1, "volumes___DEFAULT__": -1, "gigabytes___DEFAULT__": -1, "snapshots___DEFAULT__": -1, "groups": 10, "id": "e0e21d98ec9b4b8e98b47179cbfa4566"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:26.601 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:26.676 193 INFO tempest.lib.common.rest_client [req-ee052b2e-9192-450d-bbd9-88a26f43c3e6 ] Request (VolumeQuotasV3RbacTest:test_list_default_quotas): 200 GET http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles 0.068s 2020-12-14 02:19:26.680 193 DEBUG tempest.lib.common.rest_client [req-ee052b2e-9192-450d-bbd9-88a26f43c3e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee052b2e-9192-450d-bbd9-88a26f43c3e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:26.732 193 INFO tempest.lib.common.rest_client [req-c265e844-4dba-4f77-9950-9e95d2919a05 ] Request (VolumeQuotasV3RbacTest:test_list_default_quotas): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:19:26.735 193 DEBUG tempest.lib.common.rest_client [req-c265e844-4dba-4f77-9950-9e95d2919a05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c265e844-4dba-4f77-9950-9e95d2919a05', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1b82dfecc1094374917223464d7a9564", "name": "tempest-VolumeQuotasV3RbacTest-1697437067", "password_expires_at": null}, "audit_ids": ["ApashGklRiqcPv6185HsMQ"], "expires_at": "2020-12-14T03:19:26.000000Z", "issued_at": "2020-12-14T02:19:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e0e21d98ec9b4b8e98b47179cbfa4566", "name": "tempest-VolumeQuotasV3RbacTest-1697437067"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:26.749 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:26.766 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:quotas:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:26.768 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:26.842 193 INFO tempest.lib.common.rest_client [req-cb72804e-eb82-4292-b52e-2e2322315d49 ] Request (VolumeQuotasV3RbacTest:test_list_quotas): 200 GET http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles 0.068s 2020-12-14 02:19:26.844 193 DEBUG tempest.lib.common.rest_client [req-cb72804e-eb82-4292-b52e-2e2322315d49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb72804e-eb82-4292-b52e-2e2322315d49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:26.904 193 INFO tempest.lib.common.rest_client [req-5fd76e73-32a2-4def-bb97-5c7635cd0097 ] Request (VolumeQuotasV3RbacTest:test_list_quotas): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:19:26.908 193 DEBUG tempest.lib.common.rest_client [req-5fd76e73-32a2-4def-bb97-5c7635cd0097 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5fd76e73-32a2-4def-bb97-5c7635cd0097', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1b82dfecc1094374917223464d7a9564", "name": "tempest-VolumeQuotasV3RbacTest-1697437067", "password_expires_at": null}, "audit_ids": ["LyHVYO_sR3aXVVJEaK1Hmg"], "expires_at": "2020-12-14T03:19:26.000000Z", "issued_at": "2020-12-14T02:19:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e0e21d98ec9b4b8e98b47179cbfa4566", "name": "tempest-VolumeQuotasV3RbacTest-1697437067"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:26.989 186 INFO tempest.lib.common.rest_client [req-9f3ce010-31c0-480a-aa18-8e1ec1b55988 ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/7e0a4b4b-b8c3-45dd-afda-93e34832ecb4 0.613s 2020-12-14 02:19:26.991 186 DEBUG tempest.lib.common.rest_client [req-9f3ce010-31c0-480a-aa18-8e1ec1b55988 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-9f3ce010-31c0-480a-aa18-8e1ec1b55988', 'date': 'Mon, 14 Dec 2020 02:19:26 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/7e0a4b4b-b8c3-45dd-afda-93e34832ecb4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:27.031 186 INFO tempest.lib.common.rest_client [req-71e8d211-0231-468d-8cab-1ab05acef312 ] Request (NetworksRbacTest:tearDownClass): 404 DELETE http://172.30.13.94:9696/v2.0/networks/6a9c7cbb-952b-43a8-b2ad-41cd18a4e2a3 0.034s 2020-12-14 02:19:27.034 186 DEBUG tempest.lib.common.rest_client [req-71e8d211-0231-468d-8cab-1ab05acef312 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '138', 'x-openstack-request-id': 'req-71e8d211-0231-468d-8cab-1ab05acef312', 'date': 'Mon, 14 Dec 2020 02:19:27 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/6a9c7cbb-952b-43a8-b2ad-41cd18a4e2a3'} Body: b'{"NeutronError": {"type": "NetworkNotFound", "message": "Network 6a9c7cbb-952b-43a8-b2ad-41cd18a4e2a3 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:27.060 193 INFO tempest.lib.common.rest_client [req-5bc6627a-4416-4069-bb3a-1d7e162764cc ] Request (VolumeQuotasV3RbacTest:test_list_quotas): 200 GET http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566 0.145s 2020-12-14 02:19:27.062 193 DEBUG tempest.lib.common.rest_client [req-5bc6627a-4416-4069-bb3a-1d7e162764cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5bc6627a-4416-4069-bb3a-1d7e162764cc', 'content-length': '340', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5bc6627a-4416-4069-bb3a-1d7e162764cc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566'} Body: b'{"quota_set": {"volumes": 10, "per_volume_gigabytes": -1, "snapshots": 10, "gigabytes": 1000, "backups": 10, "backup_gigabytes": 1000, "volumes_ceph": -1, "gigabytes_ceph": -1, "snapshots_ceph": -1, "volumes___DEFAULT__": -1, "gigabytes___DEFAULT__": -1, "snapshots___DEFAULT__": -1, "groups": 10, "id": "e0e21d98ec9b4b8e98b47179cbfa4566"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:27.088 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:27.165 193 INFO tempest.lib.common.rest_client [req-9e48a1b8-3eb4-4fc9-b8ee-6dbbe45a8bfa ] Request (VolumeQuotasV3RbacTest:test_list_quotas): 200 GET http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles 0.071s 2020-12-14 02:19:27.169 193 DEBUG tempest.lib.common.rest_client [req-9e48a1b8-3eb4-4fc9-b8ee-6dbbe45a8bfa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e48a1b8-3eb4-4fc9-b8ee-6dbbe45a8bfa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:27.230 193 INFO tempest.lib.common.rest_client [req-1f79c42a-5a77-4e28-a9e0-a56ad74b919a ] Request (VolumeQuotasV3RbacTest:test_list_quotas): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:19:27.234 193 DEBUG tempest.lib.common.rest_client [req-1f79c42a-5a77-4e28-a9e0-a56ad74b919a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f79c42a-5a77-4e28-a9e0-a56ad74b919a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1b82dfecc1094374917223464d7a9564", "name": "tempest-VolumeQuotasV3RbacTest-1697437067", "password_expires_at": null}, "audit_ids": ["DG50QVk5SKWP1kxHPNcpyg"], "expires_at": "2020-12-14T03:19:27.000000Z", "issued_at": "2020-12-14T02:19:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e0e21d98ec9b4b8e98b47179cbfa4566", "name": "tempest-VolumeQuotasV3RbacTest-1697437067"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:27.248 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:27.265 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:quotas:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:27.267 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:27.295 197 INFO tempest.lib.common.rest_client [req-61710355-eaca-4094-b369-63995078e2be ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.265s 2020-12-14 02:19:27.299 197 DEBUG tempest.lib.common.rest_client [req-61710355-eaca-4094-b369-63995078e2be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-61710355-eaca-4094-b369-63995078e2be', 'x-compute-request-id': 'req-61710355-eaca-4094-b369-63995078e2be', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:27.340 193 INFO tempest.lib.common.rest_client [req-b1dedc98-f8ba-4a86-b3e3-9aaba82dac53 ] Request (VolumeQuotasV3RbacTest:test_list_quotas_usage_true): 200 GET http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles 0.066s 2020-12-14 02:19:27.344 193 DEBUG tempest.lib.common.rest_client [req-b1dedc98-f8ba-4a86-b3e3-9aaba82dac53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1dedc98-f8ba-4a86-b3e3-9aaba82dac53', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:27.396 193 INFO tempest.lib.common.rest_client [req-472875c2-a66b-44b4-a84b-da5f67726a92 ] Request (VolumeQuotasV3RbacTest:test_list_quotas_usage_true): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:19:27.399 193 DEBUG tempest.lib.common.rest_client [req-472875c2-a66b-44b4-a84b-da5f67726a92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-472875c2-a66b-44b4-a84b-da5f67726a92', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1b82dfecc1094374917223464d7a9564", "name": "tempest-VolumeQuotasV3RbacTest-1697437067", "password_expires_at": null}, "audit_ids": ["fk4AepTAQPCEU2ynR2h-XQ"], "expires_at": "2020-12-14T03:19:27.000000Z", "issued_at": "2020-12-14T02:19:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e0e21d98ec9b4b8e98b47179cbfa4566", "name": "tempest-VolumeQuotasV3RbacTest-1697437067"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:27.579 193 INFO tempest.lib.common.rest_client [req-136dae4a-a4a1-41d6-b8b4-7a8134917b7c ] Request (VolumeQuotasV3RbacTest:test_list_quotas_usage_true): 200 GET http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566?usage=True 0.172s 2020-12-14 02:19:27.582 193 DEBUG tempest.lib.common.rest_client [req-136dae4a-a4a1-41d6-b8b4-7a8134917b7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-136dae4a-a4a1-41d6-b8b4-7a8134917b7c', 'content-length': '1055', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-136dae4a-a4a1-41d6-b8b4-7a8134917b7c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566?usage=True'} Body: b'{"quota_set": {"volumes": {"limit": 10, "in_use": 0, "reserved": 0, "allocated": 0}, "per_volume_gigabytes": {"limit": -1, "in_use": 0, "reserved": 0, "allocated": 0}, "snapshots": {"limit": 10, "in_use": 0, "reserved": 0, "allocated": 0}, "gigabytes": {"limit": 1000, "in_use": 0, "reserved": 0, "allocated": 0}, "backups": {"limit": 10, "in_use": 0, "reserved": 0, "allocated": 0}, "backup_gigabytes": {"limit": 1000, "in_use": 0, "reserved": 0, "allocated": 0}, "volumes_ceph": {"limit": -1, "in_use": 0, "reserved": 0, "allocated": 0}, "gigabytes_ceph": {"limit": -1, "in_use": 0, "reserved": 0, "allocated": 0}, "snapshots_ceph": {"limit": -1, "in_use": 0, "reserved": 0, "allocated": 0}, "volumes___DEFAULT__": {"limit": -1, "in_use": 0, "reserved": 0, "allocated": 0}, "gigabytes___DEFAULT__": {"limit": -1, "in_use": 0, "reserved": 0, "allocated": 0}, "snapshots___DEFAULT__": {"limit": -1, "in_use": 0, "reserved": 0, "allocated": 0}, "groups": {"limit": 10, "in_use": 0, "reserved": 0, "allocated": 0}, "id": "e0e21d98ec9b4b8e98b47179cbfa4566"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:27.657 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:27.726 193 INFO tempest.lib.common.rest_client [req-3a80528e-f0ce-4374-8cd7-4cc8486625ba ] Request (VolumeQuotasV3RbacTest:test_list_quotas_usage_true): 200 GET http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles 0.063s 2020-12-14 02:19:27.730 193 DEBUG tempest.lib.common.rest_client [req-3a80528e-f0ce-4374-8cd7-4cc8486625ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a80528e-f0ce-4374-8cd7-4cc8486625ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:27.784 193 INFO tempest.lib.common.rest_client [req-9e5308bd-cf76-45eb-b3e4-a490382117b2 ] Request (VolumeQuotasV3RbacTest:test_list_quotas_usage_true): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:19:27.788 193 DEBUG tempest.lib.common.rest_client [req-9e5308bd-cf76-45eb-b3e4-a490382117b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e5308bd-cf76-45eb-b3e4-a490382117b2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1b82dfecc1094374917223464d7a9564", "name": "tempest-VolumeQuotasV3RbacTest-1697437067", "password_expires_at": null}, "audit_ids": ["ikQ44WetQNitVnn3ZK92cA"], "expires_at": "2020-12-14T03:19:27.000000Z", "issued_at": "2020-12-14T02:19:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e0e21d98ec9b4b8e98b47179cbfa4566", "name": "tempest-VolumeQuotasV3RbacTest-1697437067"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:27.802 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:27.819 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:quotas:update, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:27.878 186 INFO tempest.lib.common.rest_client [req-b34410ba-3ea4-4de8-b40b-8a714887ba2b ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/d9435302-9e2d-46c5-9123-c4b589f7d062 0.838s 2020-12-14 02:19:27.881 186 DEBUG tempest.lib.common.rest_client [req-b34410ba-3ea4-4de8-b40b-8a714887ba2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-b34410ba-3ea4-4de8-b40b-8a714887ba2b', 'date': 'Mon, 14 Dec 2020 02:19:27 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/d9435302-9e2d-46c5-9123-c4b589f7d062'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:27.941 189 INFO tempest.lib.common.rest_client [req-d655d784-7a13-4c48-9f99-3001b672e7c0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.503s 2020-12-14 02:19:27.945 189 DEBUG tempest.lib.common.rest_client [req-d655d784-7a13-4c48-9f99-3001b672e7c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d655d784-7a13-4c48-9f99-3001b672e7c0', 'x-compute-request-id': 'req-d655d784-7a13-4c48-9f99-3001b672e7c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:27.964 193 INFO tempest.lib.common.rest_client [req-b691c236-71e2-4d32-a3ca-febfcf1f48f1 ] Request (VolumeQuotasV3RbacTest:test_update_quota_set): 200 GET http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566/defaults 0.139s 2020-12-14 02:19:27.968 193 DEBUG tempest.lib.common.rest_client [req-b691c236-71e2-4d32-a3ca-febfcf1f48f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b691c236-71e2-4d32-a3ca-febfcf1f48f1', 'content-length': '340', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b691c236-71e2-4d32-a3ca-febfcf1f48f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566/defaults'} Body: b'{"quota_set": {"volumes": 10, "per_volume_gigabytes": -1, "snapshots": 10, "gigabytes": 1000, "backups": 10, "backup_gigabytes": 1000, "volumes_ceph": -1, "gigabytes_ceph": -1, "snapshots_ceph": -1, "volumes___DEFAULT__": -1, "gigabytes___DEFAULT__": -1, "snapshots___DEFAULT__": -1, "groups": 10, "id": "e0e21d98ec9b4b8e98b47179cbfa4566"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:27.994 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:28.062 193 INFO tempest.lib.common.rest_client [req-dc2bfab4-cf5f-4f02-adcc-89fb6884109e ] Request (VolumeQuotasV3RbacTest:test_update_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles 0.063s 2020-12-14 02:19:28.064 193 DEBUG tempest.lib.common.rest_client [req-dc2bfab4-cf5f-4f02-adcc-89fb6884109e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc2bfab4-cf5f-4f02-adcc-89fb6884109e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:28.112 193 INFO tempest.lib.common.rest_client [req-1d82408e-8941-49b4-87d8-108b67ac895d ] Request (VolumeQuotasV3RbacTest:test_update_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:19:28.115 193 DEBUG tempest.lib.common.rest_client [req-1d82408e-8941-49b4-87d8-108b67ac895d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d82408e-8941-49b4-87d8-108b67ac895d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1b82dfecc1094374917223464d7a9564", "name": "tempest-VolumeQuotasV3RbacTest-1697437067", "password_expires_at": null}, "audit_ids": ["KeEq-QHaQnSiDw1EB9bLZQ"], "expires_at": "2020-12-14T03:19:28.000000Z", "issued_at": "2020-12-14T02:19:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e0e21d98ec9b4b8e98b47179cbfa4566", "name": "tempest-VolumeQuotasV3RbacTest-1697437067"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:28.396 193 INFO tempest.lib.common.rest_client [req-eba84617-8649-4e54-b4dd-1eec274dbd11 ] Request (VolumeQuotasV3RbacTest:test_update_quota_set): 200 PUT http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566 0.274s 2020-12-14 02:19:28.399 193 DEBUG tempest.lib.common.rest_client [req-eba84617-8649-4e54-b4dd-1eec274dbd11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_set": {"gigabytes": 1009, "volumes": 11, "snapshots": 11}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-eba84617-8649-4e54-b4dd-1eec274dbd11', 'content-length': '298', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-eba84617-8649-4e54-b4dd-1eec274dbd11', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566'} Body: b'{"quota_set": {"volumes": 11, "per_volume_gigabytes": -1, "snapshots": 11, "gigabytes": 1009, "backups": 10, "backup_gigabytes": 1000, "volumes_ceph": -1, "gigabytes_ceph": -1, "snapshots_ceph": -1, "volumes___DEFAULT__": -1, "gigabytes___DEFAULT__": -1, "snapshots___DEFAULT__": -1, "groups": 10}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:28.424 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:28.502 193 INFO tempest.lib.common.rest_client [req-4a1d18e7-f653-4fd8-b57e-fe11418385ad ] Request (VolumeQuotasV3RbacTest:test_update_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles 0.072s 2020-12-14 02:19:28.505 193 DEBUG tempest.lib.common.rest_client [req-4a1d18e7-f653-4fd8-b57e-fe11418385ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a1d18e7-f653-4fd8-b57e-fe11418385ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566/users/1b82dfecc1094374917223464d7a9564/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:28.557 186 INFO tempest.lib.common.rest_client [req-bdc9de63-fb4c-451c-a527-f2b570e8ef7c ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/0caaa3d8-11a6-4824-9b4b-1f2157a1fd05 0.671s 2020-12-14 02:19:28.560 186 DEBUG tempest.lib.common.rest_client [req-bdc9de63-fb4c-451c-a527-f2b570e8ef7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-bdc9de63-fb4c-451c-a527-f2b570e8ef7c', 'date': 'Mon, 14 Dec 2020 02:19:28 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/0caaa3d8-11a6-4824-9b4b-1f2157a1fd05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:28.559 193 INFO tempest.lib.common.rest_client [req-5452d8e6-3da8-4a22-a520-47c3e95f0d58 ] Request (VolumeQuotasV3RbacTest:test_update_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:19:28.563 193 DEBUG tempest.lib.common.rest_client [req-5452d8e6-3da8-4a22-a520-47c3e95f0d58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5452d8e6-3da8-4a22-a520-47c3e95f0d58', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1b82dfecc1094374917223464d7a9564", "name": "tempest-VolumeQuotasV3RbacTest-1697437067", "password_expires_at": null}, "audit_ids": ["v98pKinjQmqv7nExoTQj7A"], "expires_at": "2020-12-14T03:19:28.000000Z", "issued_at": "2020-12-14T02:19:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e0e21d98ec9b4b8e98b47179cbfa4566", "name": "tempest-VolumeQuotasV3RbacTest-1697437067"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e0e21d98ec9b4b8e98b47179cbfa4566", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:28.622 197 INFO tempest.lib.common.rest_client [req-64eaa829-30f2-449d-a4bc-d1949aa5d8c4 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.216s 2020-12-14 02:19:28.626 197 DEBUG tempest.lib.common.rest_client [req-64eaa829-30f2-449d-a4bc-d1949aa5d8c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-64eaa829-30f2-449d-a4bc-d1949aa5d8c4', 'x-compute-request-id': 'req-64eaa829-30f2-449d-a4bc-d1949aa5d8c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:28.843 193 INFO tempest.lib.common.rest_client [req-e869be4c-28fe-4af9-9aaf-967a7afd11b1 ] Request (VolumeQuotasV3RbacTest:_run_cleanups): 200 PUT http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566 0.271s 2020-12-14 02:19:28.846 193 DEBUG tempest.lib.common.rest_client [req-e869be4c-28fe-4af9-9aaf-967a7afd11b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_set": {"volumes": 10, "per_volume_gigabytes": -1, "snapshots": 10, "gigabytes": 1000, "backups": 10, "backup_gigabytes": 1000}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e869be4c-28fe-4af9-9aaf-967a7afd11b1', 'content-length': '298', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e869be4c-28fe-4af9-9aaf-967a7afd11b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/e0e21d98ec9b4b8e98b47179cbfa4566/os-quota-sets/e0e21d98ec9b4b8e98b47179cbfa4566'} Body: b'{"quota_set": {"volumes": 10, "per_volume_gigabytes": -1, "snapshots": 10, "gigabytes": 1000, "backups": 10, "backup_gigabytes": 1000, "volumes_ceph": -1, "gigabytes_ceph": -1, "snapshots_ceph": -1, "volumes___DEFAULT__": -1, "gigabytes___DEFAULT__": -1, "snapshots___DEFAULT__": -1, "groups": 10}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:29.033 193 INFO tempest.lib.common.rest_client [req-21d1285b-2bbe-4527-b8d3-d596e5364a95 ] Request (VolumeQuotasV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/1b82dfecc1094374917223464d7a9564 0.153s 2020-12-14 02:19:29.036 193 DEBUG tempest.lib.common.rest_client [req-21d1285b-2bbe-4527-b8d3-d596e5364a95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21d1285b-2bbe-4527-b8d3-d596e5364a95', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/1b82dfecc1094374917223464d7a9564'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:29.146 193 INFO tempest.lib.common.rest_client [req-c2410f67-3dcb-4a71-8ca2-7773714d831e ] Request (VolumeQuotasV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-14 02:19:29.148 193 DEBUG tempest.lib.common.rest_client [req-c2410f67-3dcb-4a71-8ca2-7773714d831e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2410f67-3dcb-4a71-8ca2-7773714d831e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["W8sD_Wz3TmCipo_QPqMXlw"], "expires_at": "2020-12-14T03:19:29.000000Z", "issued_at": "2020-12-14T02:19:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:29.286 189 INFO tempest.lib.common.rest_client [req-f78a4872-96a2-47a8-961a-0180ffa401ca ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.236s 2020-12-14 02:19:29.290 189 DEBUG tempest.lib.common.rest_client [req-f78a4872-96a2-47a8-961a-0180ffa401ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f78a4872-96a2-47a8-961a-0180ffa401ca', 'x-compute-request-id': 'req-f78a4872-96a2-47a8-961a-0180ffa401ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:29.336 186 INFO tempest.lib.common.rest_client [req-fc3b169d-f93b-4d2c-8ce7-40c30fdbaf6d ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/7d0d7def-c70e-4609-a70d-fa0d95e4b958 0.771s 2020-12-14 02:19:29.339 186 DEBUG tempest.lib.common.rest_client [req-fc3b169d-f93b-4d2c-8ce7-40c30fdbaf6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-fc3b169d-f93b-4d2c-8ce7-40c30fdbaf6d', 'date': 'Mon, 14 Dec 2020 02:19:29 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/7d0d7def-c70e-4609-a70d-fa0d95e4b958'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:29.697 193 INFO tempest.lib.common.rest_client [req-adfc6dbc-6f4e-49d4-bddc-5e87628dc71b ] Request (VolumeQuotasV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e0e21d98ec9b4b8e98b47179cbfa4566&name=default 0.543s 2020-12-14 02:19:29.700 193 DEBUG tempest.lib.common.rest_client [req-adfc6dbc-6f4e-49d4-bddc-5e87628dc71b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-adfc6dbc-6f4e-49d4-bddc-5e87628dc71b', 'date': 'Mon, 14 Dec 2020 02:19:29 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e0e21d98ec9b4b8e98b47179cbfa4566&name=default'} Body: b'{"security_groups": [{"id": "d73b5fb5-3942-41bb-82f4-36282b8e1621", "name": "default", "stateful": true, "tenant_id": "e0e21d98ec9b4b8e98b47179cbfa4566", "description": "Default security group", "security_group_rules": [{"id": "0fcb5569-d2e0-43ab-92cf-a6fd3209625f", "tenant_id": "e0e21d98ec9b4b8e98b47179cbfa4566", "security_group_id": "d73b5fb5-3942-41bb-82f4-36282b8e1621", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d73b5fb5-3942-41bb-82f4-36282b8e1621", "description": null, "tags": [], "created_at": "2020-12-14T02:19:29Z", "updated_at": "2020-12-14T02:19:29Z", "revision_number": 0, "project_id": "e0e21d98ec9b4b8e98b47179cbfa4566"}, {"id": "11ed86ad-25af-42e7-8b87-8011fc60b62b", "tenant_id": "e0e21d98ec9b4b8e98b47179cbfa4566", "security_group_id": "d73b5fb5-3942-41bb-82f4-36282b8e1621", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:29Z", "updated_at": "2020-12-14T02:19:29Z", "revision_number": 0, "project_id": "e0e21d98ec9b4b8e98b47179cbfa4566"}, {"id": "17a4ed31-41da-4f57-9547-b44f83276e4e", "tenant_id": "e0e21d98ec9b4b8e98b47179cbfa4566", "security_group_id": "d73b5fb5-3942-41bb-82f4-36282b8e1621", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d73b5fb5-3942-41bb-82f4-36282b8e1621", "description": null, "tags": [], "created_at": "2020-12-14T02:19:29Z", "updated_at": "2020-12-14T02:19:29Z", "revision_number": 0, "project_id": "e0e21d98ec9b4b8e98b47179cbfa4566"}, {"id": "60baafc8-1475-4a25-8339-4e082f09b5d4", "tenant_id": "e0e21d98ec9b4b8e98b47179cbfa4566", "security_group_id": "d73b5fb5-3942-41bb-82f4-36282b8e1621", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:29Z", "updated_at": "2020-12-14T02:19:29Z", "revision_number": 0, "project_id": "e0e21d98ec9b4b8e98b47179cbfa4566"}], "tags": [], "created_at": "2020-12-14T02:19:29Z", "updated_at": "2020-12-14T02:19:29Z", "revision_number": 1, "project_id": "e0e21d98ec9b4b8e98b47179cbfa4566"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:29.884 193 INFO tempest.lib.common.rest_client [req-beb7e29c-88a3-407a-bcf6-474d72f001db ] Request (VolumeQuotasV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/d73b5fb5-3942-41bb-82f4-36282b8e1621 0.175s 2020-12-14 02:19:29.887 193 DEBUG tempest.lib.common.rest_client [req-beb7e29c-88a3-407a-bcf6-474d72f001db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-beb7e29c-88a3-407a-bcf6-474d72f001db', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:29 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/d73b5fb5-3942-41bb-82f4-36282b8e1621'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:30.043 193 INFO tempest.lib.common.rest_client [req-15958c81-4315-4d67-9528-935c1e7c2219 ] Request (VolumeQuotasV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566 0.149s 2020-12-14 02:19:30.045 193 DEBUG tempest.lib.common.rest_client [req-15958c81-4315-4d67-9528-935c1e7c2219 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15958c81-4315-4d67-9528-935c1e7c2219', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e0e21d98ec9b4b8e98b47179cbfa4566'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:30.153 186 INFO tempest.lib.common.rest_client [req-003f26bb-ecf2-40af-be25-5061dc8cd2ba ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/2928603e-d2ac-4c6a-ad46-1e98ad5b0753 0.807s 2020-12-14 02:19:30.157 186 DEBUG tempest.lib.common.rest_client [req-003f26bb-ecf2-40af-be25-5061dc8cd2ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-003f26bb-ecf2-40af-be25-5061dc8cd2ba', 'date': 'Mon, 14 Dec 2020 02:19:30 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/2928603e-d2ac-4c6a-ad46-1e98ad5b0753'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:30.169 197 INFO tempest.lib.common.rest_client [req-dd15a216-b66f-478e-9593-c9037eeebefb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.439s 2020-12-14 02:19:30.170 193 INFO tempest.lib.common.rest_client [req-76c489dd-bea8-4245-9b10-3970e687e5f9 ] Request (VolumeServicesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:19:30.173 197 DEBUG tempest.lib.common.rest_client [req-dd15a216-b66f-478e-9593-c9037eeebefb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dd15a216-b66f-478e-9593-c9037eeebefb', 'x-compute-request-id': 'req-dd15a216-b66f-478e-9593-c9037eeebefb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:30.174 193 DEBUG tempest.lib.common.rest_client [req-76c489dd-bea8-4245-9b10-3970e687e5f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76c489dd-bea8-4245-9b10-3970e687e5f9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["w7Kru4i6RYasPn6USI7LGw"], "expires_at": "2020-12-14T03:19:30.000000Z", "issued_at": "2020-12-14T02:19:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:30.270 193 INFO tempest.lib.common.rest_client [req-2ae91f5e-c932-433f-b2d5-10e5b5343e5e ] Request (VolumeServicesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:19:30.273 193 DEBUG tempest.lib.common.rest_client [req-2ae91f5e-c932-433f-b2d5-10e5b5343e5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ae91f5e-c932-433f-b2d5-10e5b5343e5e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["966neZc7ThyOlk0Av6TE4g"], "expires_at": "2020-12-14T03:19:30.000000Z", "issued_at": "2020-12-14T02:19:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:30.350 193 INFO tempest.lib.common.rest_client [req-88fbef44-24e4-429f-b4bf-88a6d39257a6 ] Request (VolumeServicesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.068s 2020-12-14 02:19:30.351 193 DEBUG tempest.lib.common.rest_client [req-88fbef44-24e4-429f-b4bf-88a6d39257a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88fbef44-24e4-429f-b4bf-88a6d39257a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:30.433 193 INFO tempest.lib.common.rest_client [req-0401726f-2af8-4f76-8b21-f89c37c8bfe6 ] Request (VolumeServicesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.075s 2020-12-14 02:19:30.434 193 DEBUG tempest.lib.common.rest_client [req-0401726f-2af8-4f76-8b21-f89c37c8bfe6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeServicesV3RbacTest-1042061085-desc", "domain_id": "default", "name": "tempest-VolumeServicesV3RbacTest-1042061085"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0401726f-2af8-4f76-8b21-f89c37c8bfe6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "ce8a947ff73c4ace9e6c4ee7045bed49", "name": "tempest-VolumeServicesV3RbacTest-1042061085", "domain_id": "default", "description": "tempest-VolumeServicesV3RbacTest-1042061085-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:30.549 186 INFO tempest.lib.common.rest_client [req-f3d1bd1a-c011-4338-ad40-1add0c2753d3 ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/68f6c472-de82-48f4-ad9f-e861023eab10 0.386s 2020-12-14 02:19:30.553 186 DEBUG tempest.lib.common.rest_client [req-f3d1bd1a-c011-4338-ad40-1add0c2753d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-f3d1bd1a-c011-4338-ad40-1add0c2753d3', 'date': 'Mon, 14 Dec 2020 02:19:30 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/68f6c472-de82-48f4-ad9f-e861023eab10'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:30.649 193 INFO tempest.lib.common.rest_client [req-100feb7f-38db-48cd-a29e-c45280f4fc2a ] Request (VolumeServicesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.208s 2020-12-14 02:19:30.652 193 DEBUG tempest.lib.common.rest_client [req-100feb7f-38db-48cd-a29e-c45280f4fc2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeServicesV3RbacTest-1042061085", "password": "W4_u4OYyP^o_JiL", "project_id": "ce8a947ff73c4ace9e6c4ee7045bed49", "email": "tempest-VolumeServicesV3RbacTest-1482136044@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '404', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-100feb7f-38db-48cd-a29e-c45280f4fc2a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "ce8a947ff73c4ace9e6c4ee7045bed49", "email": "tempest-VolumeServicesV3RbacTest-1482136044@example.com", "id": "828018fc3ab54d5bba3105623ec642c2", "name": "tempest-VolumeServicesV3RbacTest-1042061085", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/828018fc3ab54d5bba3105623ec642c2"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:30.729 193 INFO tempest.lib.common.rest_client [req-bba873cc-f904-4d47-8c46-92ea12db92c4 ] Request (VolumeServicesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.069s 2020-12-14 02:19:30.733 193 DEBUG tempest.lib.common.rest_client [req-bba873cc-f904-4d47-8c46-92ea12db92c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bba873cc-f904-4d47-8c46-92ea12db92c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:30.747 189 INFO tempest.lib.common.rest_client [req-cd46d1d6-2153-4f46-8481-d661b692dba0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.346s 2020-12-14 02:19:30.750 189 DEBUG tempest.lib.common.rest_client [req-cd46d1d6-2153-4f46-8481-d661b692dba0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cd46d1d6-2153-4f46-8481-d661b692dba0', 'x-compute-request-id': 'req-cd46d1d6-2153-4f46-8481-d661b692dba0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:30.806 193 INFO tempest.lib.common.rest_client [req-a6872778-5b96-4d5c-be1e-f366b3576689 ] Request (VolumeServicesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-12-14 02:19:30.809 193 DEBUG tempest.lib.common.rest_client [req-a6872778-5b96-4d5c-be1e-f366b3576689 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a6872778-5b96-4d5c-be1e-f366b3576689', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:30.902 193 INFO tempest.lib.common.rest_client [req-efb1d644-f54d-4e3a-a22f-c4167fad25df ] Request (VolumeServicesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49/users/828018fc3ab54d5bba3105623ec642c2/roles/72a4576c553448cd941b052c1ca0cf2d 0.084s 2020-12-14 02:19:30.905 193 DEBUG tempest.lib.common.rest_client [req-efb1d644-f54d-4e3a-a22f-c4167fad25df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-efb1d644-f54d-4e3a-a22f-c4167fad25df', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49/users/828018fc3ab54d5bba3105623ec642c2/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:30.909 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeServicesV3RbacTest-1042061085', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ce8a947ff73c4ace9e6c4ee7045bed49', 'project_name': 'tempest-VolumeServicesV3RbacTest-1042061085', 'tenant_id': 'ce8a947ff73c4ace9e6c4ee7045bed49', 'tenant_name': 'tempest-VolumeServicesV3RbacTest-1042061085', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '828018fc3ab54d5bba3105623ec642c2'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:30.911 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeServicesV3RbacTest-1042061085', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ce8a947ff73c4ace9e6c4ee7045bed49', 'project_name': 'tempest-VolumeServicesV3RbacTest-1042061085', 'tenant_id': 'ce8a947ff73c4ace9e6c4ee7045bed49', 'tenant_name': 'tempest-VolumeServicesV3RbacTest-1042061085', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '828018fc3ab54d5bba3105623ec642c2'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:31.097 193 INFO tempest.lib.common.rest_client [req-c7330318-0b23-4bf3-8827-60e27481d89c ] Request (VolumeServicesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.117s 2020-12-14 02:19:31.101 193 DEBUG tempest.lib.common.rest_client [req-c7330318-0b23-4bf3-8827-60e27481d89c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7330318-0b23-4bf3-8827-60e27481d89c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "828018fc3ab54d5bba3105623ec642c2", "name": "tempest-VolumeServicesV3RbacTest-1042061085", "password_expires_at": null}, "audit_ids": ["RwE9IN9JQhOt-N5PNfjGNw"], "expires_at": "2020-12-14T03:19:31.000000Z", "issued_at": "2020-12-14T02:19:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ce8a947ff73c4ace9e6c4ee7045bed49", "name": "tempest-VolumeServicesV3RbacTest-1042061085"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:31.223 186 INFO tempest.lib.common.rest_client [req-3150dcf7-bdf0-4023-af9c-299691492aba ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c 0.664s 2020-12-14 02:19:31.224 193 INFO tempest.lib.common.rest_client [req-30ecd9fc-2c36-4104-9ee9-3045a8e6d259 ] Request (VolumeServicesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-12-14 02:19:31.227 193 DEBUG tempest.lib.common.rest_client [req-30ecd9fc-2c36-4104-9ee9-3045a8e6d259 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30ecd9fc-2c36-4104-9ee9-3045a8e6d259', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["LEBfK30RTQyFiy53UFFPSg"], "expires_at": "2020-12-14T03:19:31.000000Z", "issued_at": "2020-12-14T02:19:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:31.227 186 DEBUG tempest.lib.common.rest_client [req-3150dcf7-bdf0-4023-af9c-299691492aba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-3150dcf7-bdf0-4023-af9c-299691492aba', 'date': 'Mon, 14 Dec 2020 02:19:31 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/cb9bcdd1-9700-4d03-8250-b150f1bb918c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:31.328 193 INFO tempest.lib.common.rest_client [req-5e6bf93e-1e66-40d2-93a9-57b43fe6ef45 ] Request (VolumeServicesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:19:31.331 193 DEBUG tempest.lib.common.rest_client [req-5e6bf93e-1e66-40d2-93a9-57b43fe6ef45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e6bf93e-1e66-40d2-93a9-57b43fe6ef45', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["iPObsBQxRwinADk8-9tHSQ"], "expires_at": "2020-12-14T03:19:31.000000Z", "issued_at": "2020-12-14T02:19:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:31.375 186 INFO tempest.lib.common.rest_client [req-32f760bd-204a-4b2a-97f2-79e5e6697a6a ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/e8ed31319cd64f6ebc514ca361a5a71b 0.141s 2020-12-14 02:19:31.377 186 DEBUG tempest.lib.common.rest_client [req-32f760bd-204a-4b2a-97f2-79e5e6697a6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32f760bd-204a-4b2a-97f2-79e5e6697a6a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/e8ed31319cd64f6ebc514ca361a5a71b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:31.402 193 INFO tempest.lib.common.rest_client [req-4558d434-0bfd-4e8b-9f73-766af21b37b1 ] Request (VolumeServicesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.065s 2020-12-14 02:19:31.405 193 DEBUG tempest.lib.common.rest_client [req-4558d434-0bfd-4e8b-9f73-766af21b37b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4558d434-0bfd-4e8b-9f73-766af21b37b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:31.480 186 INFO tempest.lib.common.rest_client [req-122e6db7-2988-4a83-adfc-cfe92ea65b98 ] Request (NetworksRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:19:31.482 186 DEBUG tempest.lib.common.rest_client [req-122e6db7-2988-4a83-adfc-cfe92ea65b98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-122e6db7-2988-4a83-adfc-cfe92ea65b98', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["9mFaqwQkThiHXp3g2eEJFw"], "expires_at": "2020-12-14T03:19:31.000000Z", "issued_at": "2020-12-14T02:19:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:31.515 193 INFO tempest.lib.common.rest_client [req-5e9c123c-212c-44df-a257-27dd1c992a27 ] Request (VolumeServicesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.104s 2020-12-14 02:19:31.519 193 DEBUG tempest.lib.common.rest_client [req-5e9c123c-212c-44df-a257-27dd1c992a27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e9c123c-212c-44df-a257-27dd1c992a27', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:31.522 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:19:31.525 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:31.531 197 INFO tempest.lib.common.rest_client [req-fdc663f6-9006-441b-9385-cc5114b97a7c ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.255s 2020-12-14 02:19:31.534 197 DEBUG tempest.lib.common.rest_client [req-fdc663f6-9006-441b-9385-cc5114b97a7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fdc663f6-9006-441b-9385-cc5114b97a7c', 'x-compute-request-id': 'req-fdc663f6-9006-441b-9385-cc5114b97a7c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:31.597 193 INFO tempest.lib.common.rest_client [req-7f5c6b4e-6cc1-44a2-a588-7f487a814cdc ] Request (VolumeServicesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49/users/828018fc3ab54d5bba3105623ec642c2/roles 0.067s 2020-12-14 02:19:31.599 193 DEBUG tempest.lib.common.rest_client [req-7f5c6b4e-6cc1-44a2-a588-7f487a814cdc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f5c6b4e-6cc1-44a2-a588-7f487a814cdc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49/users/828018fc3ab54d5bba3105623ec642c2/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49/users/828018fc3ab54d5bba3105623ec642c2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:31.681 193 INFO tempest.lib.common.rest_client [req-dfc1c126-0db6-4544-9543-f6485c301294 ] Request (VolumeServicesV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49/users/828018fc3ab54d5bba3105623ec642c2/roles/72a4576c553448cd941b052c1ca0cf2d 0.076s 2020-12-14 02:19:31.683 193 DEBUG tempest.lib.common.rest_client [req-dfc1c126-0db6-4544-9543-f6485c301294 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dfc1c126-0db6-4544-9543-f6485c301294', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49/users/828018fc3ab54d5bba3105623ec642c2/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:31.700 186 INFO tempest.lib.common.rest_client [req-4d245a4e-259f-4a9d-bec0-aed8086c99b6 ] Request (NetworksRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=018f3876f714467cb33dc272b1b292fa&name=default 0.211s 2020-12-14 02:19:31.703 186 DEBUG tempest.lib.common.rest_client [req-4d245a4e-259f-4a9d-bec0-aed8086c99b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-4d245a4e-259f-4a9d-bec0-aed8086c99b6', 'date': 'Mon, 14 Dec 2020 02:19:31 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=018f3876f714467cb33dc272b1b292fa&name=default'} Body: b'{"security_groups": [{"id": "1116e076-e7b6-43b9-8236-86b27c1e237e", "name": "default", "stateful": true, "tenant_id": "018f3876f714467cb33dc272b1b292fa", "description": "Default security group", "security_group_rules": [{"id": "222272ea-a09e-42a3-9e2a-4852f541501f", "tenant_id": "018f3876f714467cb33dc272b1b292fa", "security_group_id": "1116e076-e7b6-43b9-8236-86b27c1e237e", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1116e076-e7b6-43b9-8236-86b27c1e237e", "description": null, "tags": [], "created_at": "2020-12-14T02:19:06Z", "updated_at": "2020-12-14T02:19:06Z", "revision_number": 0, "project_id": "018f3876f714467cb33dc272b1b292fa"}, {"id": "6267ee32-686c-4814-b22e-2837a78c36bf", "tenant_id": "018f3876f714467cb33dc272b1b292fa", "security_group_id": "1116e076-e7b6-43b9-8236-86b27c1e237e", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:06Z", "updated_at": "2020-12-14T02:19:06Z", "revision_number": 0, "project_id": "018f3876f714467cb33dc272b1b292fa"}, {"id": "b07be68a-bb6f-4329-ab70-4e04c314148e", "tenant_id": "018f3876f714467cb33dc272b1b292fa", "security_group_id": "1116e076-e7b6-43b9-8236-86b27c1e237e", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:06Z", "updated_at": "2020-12-14T02:19:06Z", "revision_number": 0, "project_id": "018f3876f714467cb33dc272b1b292fa"}, {"id": "b61d33fe-853b-4ab6-9ce5-ca5fd95f9e42", "tenant_id": "018f3876f714467cb33dc272b1b292fa", "security_group_id": "1116e076-e7b6-43b9-8236-86b27c1e237e", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1116e076-e7b6-43b9-8236-86b27c1e237e", "description": null, "tags": [], "created_at": "2020-12-14T02:19:06Z", "updated_at": "2020-12-14T02:19:06Z", "revision_number": 0, "project_id": "018f3876f714467cb33dc272b1b292fa"}], "tags": [], "created_at": "2020-12-14T02:19:06Z", "updated_at": "2020-12-14T02:19:06Z", "revision_number": 1, "project_id": "018f3876f714467cb33dc272b1b292fa"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:31.814 193 INFO tempest.lib.common.rest_client [req-600ff5ba-69b5-42fa-b6f1-0c06d2e99181 ] Request (VolumeServicesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49/users/828018fc3ab54d5bba3105623ec642c2/roles/a629c95d64b3416fb80ae90af4f69c05 0.126s 2020-12-14 02:19:31.817 193 DEBUG tempest.lib.common.rest_client [req-600ff5ba-69b5-42fa-b6f1-0c06d2e99181 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-600ff5ba-69b5-42fa-b6f1-0c06d2e99181', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49/users/828018fc3ab54d5bba3105623ec642c2/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:31.879 186 INFO tempest.lib.common.rest_client [req-5f7a79d2-2a68-444d-86b9-6f265ebb8a6b ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/1116e076-e7b6-43b9-8236-86b27c1e237e 0.170s 2020-12-14 02:19:31.882 186 DEBUG tempest.lib.common.rest_client [req-5f7a79d2-2a68-444d-86b9-6f265ebb8a6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5f7a79d2-2a68-444d-86b9-6f265ebb8a6b', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:31 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/1116e076-e7b6-43b9-8236-86b27c1e237e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:32.072 189 INFO tempest.lib.common.rest_client [req-22153810-0169-4c45-9429-4b3e88b43fdf ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.213s 2020-12-14 02:19:32.076 189 DEBUG tempest.lib.common.rest_client [req-22153810-0169-4c45-9429-4b3e88b43fdf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-22153810-0169-4c45-9429-4b3e88b43fdf', 'x-compute-request-id': 'req-22153810-0169-4c45-9429-4b3e88b43fdf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:32.082 186 INFO tempest.lib.common.rest_client [req-1b3ca7bc-c710-4a0c-b90d-020498ec7232 ] Request (NetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa 0.193s 2020-12-14 02:19:32.084 186 DEBUG tempest.lib.common.rest_client [req-1b3ca7bc-c710-4a0c-b90d-020498ec7232 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b3ca7bc-c710-4a0c-b90d-020498ec7232', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/018f3876f714467cb33dc272b1b292fa'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:32.210 186 INFO tempest.lib.common.rest_client [req-10efdc93-243a-44b1-ac06-860c4976a0b9 ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:19:32.212 186 DEBUG tempest.lib.common.rest_client [req-10efdc93-243a-44b1-ac06-860c4976a0b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10efdc93-243a-44b1-ac06-860c4976a0b9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["AyQa6gGPQIiCxHHoSg7fuQ"], "expires_at": "2020-12-14T03:19:32.000000Z", "issued_at": "2020-12-14T02:19:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:32.321 186 INFO tempest.lib.common.rest_client [req-1f788923-011f-483f-a2ff-4632816fc8e3 ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:19:32.323 186 DEBUG tempest.lib.common.rest_client [req-1f788923-011f-483f-a2ff-4632816fc8e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f788923-011f-483f-a2ff-4632816fc8e3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["stO70ivvQbm8vB86oBMYWA"], "expires_at": "2020-12-14T03:19:32.000000Z", "issued_at": "2020-12-14T02:19:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:32.400 186 INFO tempest.lib.common.rest_client [req-52606719-fa00-4187-a5e3-988d4c08a9f0 ] Request (ServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.069s 2020-12-14 02:19:32.402 186 DEBUG tempest.lib.common.rest_client [req-52606719-fa00-4187-a5e3-988d4c08a9f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52606719-fa00-4187-a5e3-988d4c08a9f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:32.493 186 INFO tempest.lib.common.rest_client [req-2650552c-637c-4d3c-9826-d1e5d5322bc4 ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.083s 2020-12-14 02:19:32.495 186 DEBUG tempest.lib.common.rest_client [req-2650552c-637c-4d3c-9826-d1e5d5322bc4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServiceProfileExtRbacTest-947918784-desc", "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-947918784"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2650552c-637c-4d3c-9826-d1e5d5322bc4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784", "domain_id": "default", "description": "tempest-ServiceProfileExtRbacTest-947918784-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:32.617 186 INFO tempest.lib.common.rest_client [req-489795b0-6474-4a22-9f20-4c5af32a9326 ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.113s 2020-12-14 02:19:32.619 186 DEBUG tempest.lib.common.rest_client [req-489795b0-6474-4a22-9f20-4c5af32a9326 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServiceProfileExtRbacTest-947918784", "password": "Y3%C#C=Lw~qzI@i", "project_id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "email": "tempest-ServiceProfileExtRbacTest-727283445@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '404', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-489795b0-6474-4a22-9f20-4c5af32a9326', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "email": "tempest-ServiceProfileExtRbacTest-727283445@example.com", "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/bc9b1bbc068b4b91bcd4900813ea4ea2"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:32.692 186 INFO tempest.lib.common.rest_client [req-3a50175a-4bfb-4710-8ddd-360d602d5459 ] Request (ServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.065s 2020-12-14 02:19:32.695 186 DEBUG tempest.lib.common.rest_client [req-3a50175a-4bfb-4710-8ddd-360d602d5459 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a50175a-4bfb-4710-8ddd-360d602d5459', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:32.766 186 INFO tempest.lib.common.rest_client [req-b2def6c1-9b83-4831-9d12-22a8017ed077 ] Request (ServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:19:32.769 186 DEBUG tempest.lib.common.rest_client [req-b2def6c1-9b83-4831-9d12-22a8017ed077 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2def6c1-9b83-4831-9d12-22a8017ed077', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:32.861 197 INFO tempest.lib.common.rest_client [req-5f89b604-feaa-41d3-ba96-7d9447782665 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.220s 2020-12-14 02:19:32.862 186 INFO tempest.lib.common.rest_client [req-e14b9ec4-7daa-44f1-8f53-4524e1f164f9 ] Request (ServiceProfileExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles/72a4576c553448cd941b052c1ca0cf2d 0.085s 2020-12-14 02:19:32.865 186 DEBUG tempest.lib.common.rest_client [req-e14b9ec4-7daa-44f1-8f53-4524e1f164f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e14b9ec4-7daa-44f1-8f53-4524e1f164f9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:32.865 197 DEBUG tempest.lib.common.rest_client [req-5f89b604-feaa-41d3-ba96-7d9447782665 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5f89b604-feaa-41d3-ba96-7d9447782665', 'x-compute-request-id': 'req-5f89b604-feaa-41d3-ba96-7d9447782665', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:32.868 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServiceProfileExtRbacTest-947918784', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ef926bb4bf3b4b84966d8c829cc2a9e1', 'project_name': 'tempest-ServiceProfileExtRbacTest-947918784', 'tenant_id': 'ef926bb4bf3b4b84966d8c829cc2a9e1', 'tenant_name': 'tempest-ServiceProfileExtRbacTest-947918784', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'bc9b1bbc068b4b91bcd4900813ea4ea2'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:32.871 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServiceProfileExtRbacTest-947918784', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ef926bb4bf3b4b84966d8c829cc2a9e1', 'project_name': 'tempest-ServiceProfileExtRbacTest-947918784', 'tenant_id': 'ef926bb4bf3b4b84966d8c829cc2a9e1', 'tenant_name': 'tempest-ServiceProfileExtRbacTest-947918784', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'bc9b1bbc068b4b91bcd4900813ea4ea2'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:32.922 193 INFO tempest.lib.common.rest_client [req-1bb3b9e5-8a58-4a18-aca1-60a5ebde951f ] Request (VolumeServicesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:19:32.925 193 DEBUG tempest.lib.common.rest_client [req-1bb3b9e5-8a58-4a18-aca1-60a5ebde951f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1bb3b9e5-8a58-4a18-aca1-60a5ebde951f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "828018fc3ab54d5bba3105623ec642c2", "name": "tempest-VolumeServicesV3RbacTest-1042061085", "password_expires_at": null}, "audit_ids": ["wIoVItb4R_yRDJl2drDzUw"], "expires_at": "2020-12-14T03:19:32.000000Z", "issued_at": "2020-12-14T02:19:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ce8a947ff73c4ace9e6c4ee7045bed49", "name": "tempest-VolumeServicesV3RbacTest-1042061085"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:32.937 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:32.960 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:services:index, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:32.963 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:33.059 186 INFO tempest.lib.common.rest_client [req-0c054d60-22f9-4738-a2bd-6ac842c8bf78 ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.123s 2020-12-14 02:19:33.062 186 DEBUG tempest.lib.common.rest_client [req-0c054d60-22f9-4738-a2bd-6ac842c8bf78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c054d60-22f9-4738-a2bd-6ac842c8bf78', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["Nx4pYX1tS0aAE_aIR1WzvA"], "expires_at": "2020-12-14T03:19:32.000000Z", "issued_at": "2020-12-14T02:19:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:33.065 186 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-12-14 02:19:33.092 193 INFO tempest.lib.common.rest_client [req-67d5334b-e834-475f-8c8e-0dfc8a8bbf7a ] Request (VolumeServicesV3RbacTest:test_list_services): 200 GET http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49/users/828018fc3ab54d5bba3105623ec642c2/roles 0.123s 2020-12-14 02:19:33.095 193 DEBUG tempest.lib.common.rest_client [req-67d5334b-e834-475f-8c8e-0dfc8a8bbf7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67d5334b-e834-475f-8c8e-0dfc8a8bbf7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49/users/828018fc3ab54d5bba3105623ec642c2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49/users/828018fc3ab54d5bba3105623ec642c2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:33.148 186 INFO tempest.lib.common.rest_client [req-ba983ed5-f89c-479f-a640-c6f8bbe54eab ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:19:33.152 186 DEBUG tempest.lib.common.rest_client [req-ba983ed5-f89c-479f-a640-c6f8bbe54eab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba983ed5-f89c-479f-a640-c6f8bbe54eab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["aYNCwjHyQPi20feow6PG3w"], "expires_at": "2020-12-14T03:19:33.000000Z", "issued_at": "2020-12-14T02:19:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:33.152 193 INFO tempest.lib.common.rest_client [req-cc430a5e-b4cb-4996-bcc2-b18b5a6e6663 ] Request (VolumeServicesV3RbacTest:test_list_services): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:19:33.156 193 DEBUG tempest.lib.common.rest_client [req-cc430a5e-b4cb-4996-bcc2-b18b5a6e6663 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cc430a5e-b4cb-4996-bcc2-b18b5a6e6663', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "828018fc3ab54d5bba3105623ec642c2", "name": "tempest-VolumeServicesV3RbacTest-1042061085", "password_expires_at": null}, "audit_ids": ["ykZgUurbSuOIJAXO2RNbqw"], "expires_at": "2020-12-14T03:19:33.000000Z", "issued_at": "2020-12-14T02:19:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ce8a947ff73c4ace9e6c4ee7045bed49", "name": "tempest-VolumeServicesV3RbacTest-1042061085"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:33.271 186 INFO tempest.lib.common.rest_client [req-397f8dea-f334-4c16-9689-0a97d71b6bed ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:19:33.274 186 DEBUG tempest.lib.common.rest_client [req-397f8dea-f334-4c16-9689-0a97d71b6bed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-397f8dea-f334-4c16-9689-0a97d71b6bed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["GQDlo4vJTnKIzquwyFMWVA"], "expires_at": "2020-12-14T03:19:33.000000Z", "issued_at": "2020-12-14T02:19:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:33.311 193 INFO tempest.lib.common.rest_client [req-75902002-354c-44e3-9786-fdea3d82fc91 ] Request (VolumeServicesV3RbacTest:test_list_services): 200 GET http://172.30.13.94/volume/v3/ce8a947ff73c4ace9e6c4ee7045bed49/os-services 0.147s 2020-12-14 02:19:33.314 193 DEBUG tempest.lib.common.rest_client [req-75902002-354c-44e3-9786-fdea3d82fc91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-75902002-354c-44e3-9786-fdea3d82fc91', 'content-length': '875', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-75902002-354c-44e3-9786-fdea3d82fc91', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ce8a947ff73c4ace9e6c4ee7045bed49/os-services'} Body: b'{"services": [{"binary": "cinder-volume", "host": "lf-virtual9@ceph", "zone": "nova", "status": "enabled", "state": "up", "updated_at": "2020-12-14T02:19:32.000000", "disabled_reason": null, "replication_status": "disabled", "active_backend_id": null, "frozen": false}, {"binary": "cinder-scheduler", "host": "lf-virtual9", "zone": "nova", "status": "enabled", "state": "up", "updated_at": "2020-12-14T02:19:27.000000", "disabled_reason": null}, {"binary": "cinder-backup", "host": "lf-virtual9", "zone": "nova", "status": "enabled", "state": "up", "updated_at": "2020-12-14T02:19:28.000000", "disabled_reason": null}, {"binary": "cinder-volume", "host": "lf-virtual8@ceph", "zone": "nova", "status": "enabled", "state": "up", "updated_at": "2020-12-14T02:19:32.000000", "disabled_reason": null, "replication_status": "disabled", "active_backend_id": null, "frozen": false}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:33.344 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:33.346 186 INFO tempest.lib.common.rest_client [req-a4efd8d2-7d5d-4079-926a-1423baf6f792 ] Request (ServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.065s 2020-12-14 02:19:33.349 186 DEBUG tempest.lib.common.rest_client [req-a4efd8d2-7d5d-4079-926a-1423baf6f792 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a4efd8d2-7d5d-4079-926a-1423baf6f792', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:33.416 193 INFO tempest.lib.common.rest_client [req-e942481f-e26c-470f-be18-8d58b27a52da ] Request (VolumeServicesV3RbacTest:test_list_services): 200 GET http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49/users/828018fc3ab54d5bba3105623ec642c2/roles 0.067s 2020-12-14 02:19:33.420 186 INFO tempest.lib.common.rest_client [req-d27d664b-8b7a-4ddf-8695-1590b4789c63 ] Request (ServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.065s 2020-12-14 02:19:33.420 193 DEBUG tempest.lib.common.rest_client [req-e942481f-e26c-470f-be18-8d58b27a52da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e942481f-e26c-470f-be18-8d58b27a52da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49/users/828018fc3ab54d5bba3105623ec642c2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49/users/828018fc3ab54d5bba3105623ec642c2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:33.422 186 DEBUG tempest.lib.common.rest_client [req-d27d664b-8b7a-4ddf-8695-1590b4789c63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d27d664b-8b7a-4ddf-8695-1590b4789c63', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:33.425 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:19:33.428 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:33.435 189 INFO tempest.lib.common.rest_client [req-70ed5d87-a091-4de4-9066-758fb4530ba3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.251s 2020-12-14 02:19:33.438 189 DEBUG tempest.lib.common.rest_client [req-70ed5d87-a091-4de4-9066-758fb4530ba3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-70ed5d87-a091-4de4-9066-758fb4530ba3', 'x-compute-request-id': 'req-70ed5d87-a091-4de4-9066-758fb4530ba3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:33.471 193 INFO tempest.lib.common.rest_client [req-f2c0d7bc-c901-47d6-944e-117bd34d4153 ] Request (VolumeServicesV3RbacTest:test_list_services): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:19:33.473 193 DEBUG tempest.lib.common.rest_client [req-f2c0d7bc-c901-47d6-944e-117bd34d4153 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2c0d7bc-c901-47d6-944e-117bd34d4153', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "828018fc3ab54d5bba3105623ec642c2", "name": "tempest-VolumeServicesV3RbacTest-1042061085", "password_expires_at": null}, "audit_ids": ["I1i8Q54WSK6JgNGwwlxnqg"], "expires_at": "2020-12-14T03:19:33.000000Z", "issued_at": "2020-12-14T02:19:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ce8a947ff73c4ace9e6c4ee7045bed49", "name": "tempest-VolumeServicesV3RbacTest-1042061085"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ce8a947ff73c4ace9e6c4ee7045bed49", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:33.491 186 INFO tempest.lib.common.rest_client [req-17dde10f-48e2-4227-982b-2a884388d8d4 ] Request (ServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles 0.058s 2020-12-14 02:19:33.493 186 DEBUG tempest.lib.common.rest_client [req-17dde10f-48e2-4227-982b-2a884388d8d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17dde10f-48e2-4227-982b-2a884388d8d4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:33.590 186 INFO tempest.lib.common.rest_client [req-b2a23c0e-b5f9-4bdf-93e2-202ad1e606b7 ] Request (ServiceProfileExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles/72a4576c553448cd941b052c1ca0cf2d 0.091s 2020-12-14 02:19:33.592 186 DEBUG tempest.lib.common.rest_client [req-b2a23c0e-b5f9-4bdf-93e2-202ad1e606b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2a23c0e-b5f9-4bdf-93e2-202ad1e606b7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:33.704 193 INFO tempest.lib.common.rest_client [req-d962aed5-f9b8-45c2-bb46-aa9c5e380c87 ] Request (VolumeServicesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/828018fc3ab54d5bba3105623ec642c2 0.218s 2020-12-14 02:19:33.707 193 DEBUG tempest.lib.common.rest_client [req-d962aed5-f9b8-45c2-bb46-aa9c5e380c87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d962aed5-f9b8-45c2-bb46-aa9c5e380c87', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/828018fc3ab54d5bba3105623ec642c2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:33.709 186 INFO tempest.lib.common.rest_client [req-7f4b2644-29e6-4e15-9980-b718a45433be ] Request (ServiceProfileExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles/a629c95d64b3416fb80ae90af4f69c05 0.110s 2020-12-14 02:19:33.713 186 DEBUG tempest.lib.common.rest_client [req-7f4b2644-29e6-4e15-9980-b718a45433be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f4b2644-29e6-4e15-9980-b718a45433be', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:33.802 193 INFO tempest.lib.common.rest_client [req-48851c8d-ff6e-414d-a3ba-589c43a894d4 ] Request (VolumeServicesV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-14 02:19:33.805 193 DEBUG tempest.lib.common.rest_client [req-48851c8d-ff6e-414d-a3ba-589c43a894d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-48851c8d-ff6e-414d-a3ba-589c43a894d4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["K41ul-ZNQJGGux3pnCOLkA"], "expires_at": "2020-12-14T03:19:33.000000Z", "issued_at": "2020-12-14T02:19:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:34.120 193 INFO tempest.lib.common.rest_client [req-e1e74d65-59f2-4d28-94ec-66827b8e4907 ] Request (VolumeServicesV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ce8a947ff73c4ace9e6c4ee7045bed49&name=default 0.308s 2020-12-14 02:19:34.124 193 DEBUG tempest.lib.common.rest_client [req-e1e74d65-59f2-4d28-94ec-66827b8e4907 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-e1e74d65-59f2-4d28-94ec-66827b8e4907', 'date': 'Mon, 14 Dec 2020 02:19:34 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ce8a947ff73c4ace9e6c4ee7045bed49&name=default'} Body: b'{"security_groups": [{"id": "f704b2ba-0a08-4f1f-a9f2-585836049540", "name": "default", "stateful": true, "tenant_id": "ce8a947ff73c4ace9e6c4ee7045bed49", "description": "Default security group", "security_group_rules": [{"id": "03c3c0db-1cc7-44a0-891a-bcc07ece5625", "tenant_id": "ce8a947ff73c4ace9e6c4ee7045bed49", "security_group_id": "f704b2ba-0a08-4f1f-a9f2-585836049540", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f704b2ba-0a08-4f1f-a9f2-585836049540", "description": null, "tags": [], "created_at": "2020-12-14T02:19:34Z", "updated_at": "2020-12-14T02:19:34Z", "revision_number": 0, "project_id": "ce8a947ff73c4ace9e6c4ee7045bed49"}, {"id": "6e583de9-ddcc-4a98-aa37-814b0465fbc6", "tenant_id": "ce8a947ff73c4ace9e6c4ee7045bed49", "security_group_id": "f704b2ba-0a08-4f1f-a9f2-585836049540", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:34Z", "updated_at": "2020-12-14T02:19:34Z", "revision_number": 0, "project_id": "ce8a947ff73c4ace9e6c4ee7045bed49"}, {"id": "c52e451f-563c-451f-8481-e86b3fab7097", "tenant_id": "ce8a947ff73c4ace9e6c4ee7045bed49", "security_group_id": "f704b2ba-0a08-4f1f-a9f2-585836049540", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:34Z", "updated_at": "2020-12-14T02:19:34Z", "revision_number": 0, "project_id": "ce8a947ff73c4ace9e6c4ee7045bed49"}, {"id": "d2fab881-9618-46a9-ac1e-742548a24e05", "tenant_id": "ce8a947ff73c4ace9e6c4ee7045bed49", "security_group_id": "f704b2ba-0a08-4f1f-a9f2-585836049540", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f704b2ba-0a08-4f1f-a9f2-585836049540", "description": null, "tags": [], "created_at": "2020-12-14T02:19:34Z", "updated_at": "2020-12-14T02:19:34Z", "revision_number": 0, "project_id": "ce8a947ff73c4ace9e6c4ee7045bed49"}], "tags": [], "created_at": "2020-12-14T02:19:33Z", "updated_at": "2020-12-14T02:19:34Z", "revision_number": 1, "project_id": "ce8a947ff73c4ace9e6c4ee7045bed49"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:34.204 197 INFO tempest.lib.common.rest_client [req-87485547-d8b2-4a4f-9c94-ccf76eca1534 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.233s 2020-12-14 02:19:34.207 197 DEBUG tempest.lib.common.rest_client [req-87485547-d8b2-4a4f-9c94-ccf76eca1534 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-87485547-d8b2-4a4f-9c94-ccf76eca1534', 'x-compute-request-id': 'req-87485547-d8b2-4a4f-9c94-ccf76eca1534', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:34.276 193 INFO tempest.lib.common.rest_client [req-6b28be94-f56e-4dd9-9421-d056946fde0d ] Request (VolumeServicesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/f704b2ba-0a08-4f1f-a9f2-585836049540 0.145s 2020-12-14 02:19:34.279 193 DEBUG tempest.lib.common.rest_client [req-6b28be94-f56e-4dd9-9421-d056946fde0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6b28be94-f56e-4dd9-9421-d056946fde0d', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:34 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/f704b2ba-0a08-4f1f-a9f2-585836049540'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:34.439 193 INFO tempest.lib.common.rest_client [req-08f778ac-f9bd-4fcc-88f6-c043ee53d07c ] Request (VolumeServicesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49 0.152s 2020-12-14 02:19:34.443 193 DEBUG tempest.lib.common.rest_client [req-08f778ac-f9bd-4fcc-88f6-c043ee53d07c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-08f778ac-f9bd-4fcc-88f6-c043ee53d07c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ce8a947ff73c4ace9e6c4ee7045bed49'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:34.564 193 INFO tempest.lib.common.rest_client [req-d8146a4d-5fc7-49b0-930d-5edad7ec0cca ] Request (VolumesTransfersV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-14 02:19:34.568 193 DEBUG tempest.lib.common.rest_client [req-d8146a4d-5fc7-49b0-930d-5edad7ec0cca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8146a4d-5fc7-49b0-930d-5edad7ec0cca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["BRMLN-psSlaHn16Rt1jBTA"], "expires_at": "2020-12-14T03:19:34.000000Z", "issued_at": "2020-12-14T02:19:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:34.668 193 INFO tempest.lib.common.rest_client [req-bfc5e786-8a1e-4c82-a356-99a4781ddba6 ] Request (VolumesTransfersV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:19:34.671 193 DEBUG tempest.lib.common.rest_client [req-bfc5e786-8a1e-4c82-a356-99a4781ddba6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bfc5e786-8a1e-4c82-a356-99a4781ddba6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["AzEfUpPkSmOhMHzT6AcP6w"], "expires_at": "2020-12-14T03:19:34.000000Z", "issued_at": "2020-12-14T02:19:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:34.752 193 INFO tempest.lib.common.rest_client [req-38b93156-e8a4-474a-996e-f170aa84d4b6 ] Request (VolumesTransfersV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.073s 2020-12-14 02:19:34.754 193 DEBUG tempest.lib.common.rest_client [req-38b93156-e8a4-474a-996e-f170aa84d4b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-38b93156-e8a4-474a-996e-f170aa84d4b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:34.783 189 INFO tempest.lib.common.rest_client [req-6145fed9-9690-4bb5-a28d-91ed07fff4ba ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.238s 2020-12-14 02:19:34.787 189 DEBUG tempest.lib.common.rest_client [req-6145fed9-9690-4bb5-a28d-91ed07fff4ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6145fed9-9690-4bb5-a28d-91ed07fff4ba', 'x-compute-request-id': 'req-6145fed9-9690-4bb5-a28d-91ed07fff4ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:34.817 186 INFO tempest.lib.common.rest_client [req-418a7aab-467f-4896-9c83-f67e03a6b854 ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:19:34.820 186 DEBUG tempest.lib.common.rest_client [req-418a7aab-467f-4896-9c83-f67e03a6b854 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-418a7aab-467f-4896-9c83-f67e03a6b854', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["yuFG9EVXRi21S9kaPcCiuA"], "expires_at": "2020-12-14T03:19:34.000000Z", "issued_at": "2020-12-14T02:19:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:34.846 193 INFO tempest.lib.common.rest_client [req-eb360d1d-35a4-4feb-8b1e-d6218efa0c8a ] Request (VolumesTransfersV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.084s 2020-12-14 02:19:34.849 193 DEBUG tempest.lib.common.rest_client [req-eb360d1d-35a4-4feb-8b1e-d6218efa0c8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesTransfersV3RbacTest-442473916-desc", "domain_id": "default", "name": "tempest-VolumesTransfersV3RbacTest-442473916"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb360d1d-35a4-4feb-8b1e-d6218efa0c8a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "02757feb81fe4551841e4147d355201e", "name": "tempest-VolumesTransfersV3RbacTest-442473916", "domain_id": "default", "description": "tempest-VolumesTransfersV3RbacTest-442473916-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:34.939 186 INFO tempest.lib.common.rest_client [req-def095a3-715c-4e9a-a511-afef74f8e59e ] Request (ServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:19:34.941 186 DEBUG tempest.lib.common.rest_client [req-def095a3-715c-4e9a-a511-afef74f8e59e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-def095a3-715c-4e9a-a511-afef74f8e59e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["GJk8d-KjQoCitkwdaEPvgw"], "expires_at": "2020-12-14T03:19:34.000000Z", "issued_at": "2020-12-14T02:19:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:34.952 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:34.977 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_service_profile, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:34.979 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:35.008 193 INFO tempest.lib.common.rest_client [req-83ced1ed-5ab4-4f39-9fe3-76cb0020456d ] Request (VolumesTransfersV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.149s 2020-12-14 02:19:35.011 193 DEBUG tempest.lib.common.rest_client [req-83ced1ed-5ab4-4f39-9fe3-76cb0020456d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesTransfersV3RbacTest-442473916", "password": "W5%LnFwQu1R2NEm", "project_id": "02757feb81fe4551841e4147d355201e", "email": "tempest-VolumesTransfersV3RbacTest-1998436925@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '407', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83ced1ed-5ab4-4f39-9fe3-76cb0020456d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "02757feb81fe4551841e4147d355201e", "email": "tempest-VolumesTransfersV3RbacTest-1998436925@example.com", "id": "21eec2608c394756a6fced2b31462577", "name": "tempest-VolumesTransfersV3RbacTest-442473916", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/21eec2608c394756a6fced2b31462577"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.054 186 INFO tempest.lib.common.rest_client [req-2c4ad2b1-2598-45f1-a1c3-2ebd883e99ac ] Request (ServiceProfileExtRbacTest:test_create_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles 0.068s 2020-12-14 02:19:35.057 186 DEBUG tempest.lib.common.rest_client [req-2c4ad2b1-2598-45f1-a1c3-2ebd883e99ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2c4ad2b1-2598-45f1-a1c3-2ebd883e99ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.087 193 INFO tempest.lib.common.rest_client [req-3e1aa7ed-6f9a-41ce-8902-49f2e85b1c1f ] Request (VolumesTransfersV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.068s 2020-12-14 02:19:35.090 193 DEBUG tempest.lib.common.rest_client [req-3e1aa7ed-6f9a-41ce-8902-49f2e85b1c1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3e1aa7ed-6f9a-41ce-8902-49f2e85b1c1f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.114 186 INFO tempest.lib.common.rest_client [req-89954254-f56b-49ed-8549-d7520afedd88 ] Request (ServiceProfileExtRbacTest:test_create_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:19:35.118 186 DEBUG tempest.lib.common.rest_client [req-89954254-f56b-49ed-8549-d7520afedd88 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89954254-f56b-49ed-8549-d7520afedd88', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["rUbxVCRBR_uqqEDmAAobQg"], "expires_at": "2020-12-14T03:19:35.000000Z", "issued_at": "2020-12-14T02:19:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.167 193 INFO tempest.lib.common.rest_client [req-3b6391bc-c9a5-40fd-994c-1a0d3f15a1aa ] Request (VolumesTransfersV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.069s 2020-12-14 02:19:35.169 193 DEBUG tempest.lib.common.rest_client [req-3b6391bc-c9a5-40fd-994c-1a0d3f15a1aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b6391bc-c9a5-40fd-994c-1a0d3f15a1aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.181 186 INFO tempest.lib.common.rest_client [req-0b2540c1-82a3-4e62-a76d-00c6d49dd6de ] Request (ServiceProfileExtRbacTest:test_create_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-12-14 02:19:35.185 186 DEBUG tempest.lib.common.rest_client [req-0b2540c1-82a3-4e62-a76d-00c6d49dd6de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b2540c1-82a3-4e62-a76d-00c6d49dd6de', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["sqFDwKo5Q0yjqgTLbyZ90w"], "expires_at": "2020-12-14T03:19:35.000000Z", "issued_at": "2020-12-14T02:19:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.271 193 INFO tempest.lib.common.rest_client [req-ac43fdfa-1fc6-42a6-9daa-1a06345b4a94 ] Request (VolumesTransfersV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles/72a4576c553448cd941b052c1ca0cf2d 0.094s 2020-12-14 02:19:35.273 193 DEBUG tempest.lib.common.rest_client [req-ac43fdfa-1fc6-42a6-9daa-1a06345b4a94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac43fdfa-1fc6-42a6-9daa-1a06345b4a94', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.276 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesTransfersV3RbacTest-442473916', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '02757feb81fe4551841e4147d355201e', 'project_name': 'tempest-VolumesTransfersV3RbacTest-442473916', 'tenant_id': '02757feb81fe4551841e4147d355201e', 'tenant_name': 'tempest-VolumesTransfersV3RbacTest-442473916', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '21eec2608c394756a6fced2b31462577'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:35.278 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesTransfersV3RbacTest-442473916', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '02757feb81fe4551841e4147d355201e', 'project_name': 'tempest-VolumesTransfersV3RbacTest-442473916', 'tenant_id': '02757feb81fe4551841e4147d355201e', 'tenant_name': 'tempest-VolumesTransfersV3RbacTest-442473916', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '21eec2608c394756a6fced2b31462577'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:35.445 186 INFO tempest.lib.common.rest_client [req-c251d59c-3952-46d9-9828-4fa8b5f50804 ] Request (ServiceProfileExtRbacTest:test_create_service_profile): 201 POST http://172.30.13.94:9696/v2.0/service_profiles 0.251s 2020-12-14 02:19:35.448 186 DEBUG tempest.lib.common.rest_client [req-c251d59c-3952-46d9-9828-4fa8b5f50804 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"service_profile": {"metainfo": "{\"foo\": \"bar\"}"}} Response - Headers: {'content-type': 'application/json', 'content-length': '151', 'x-openstack-request-id': 'req-c251d59c-3952-46d9-9828-4fa8b5f50804', 'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles'} Body: b'{"service_profile": {"id": "05ae89a4-c2e5-4ba4-9938-10b6b865cf2d", "description": "", "driver": "", "enabled": true, "metainfo": "{\\"foo\\": \\"bar\\"}"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.453 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:35.471 193 INFO tempest.lib.common.rest_client [req-15ed6415-a496-49b7-b9c9-931138b4b2f0 ] Request (VolumesTransfersV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.121s 2020-12-14 02:19:35.474 193 DEBUG tempest.lib.common.rest_client [req-15ed6415-a496-49b7-b9c9-931138b4b2f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15ed6415-a496-49b7-b9c9-931138b4b2f0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21eec2608c394756a6fced2b31462577", "name": "tempest-VolumesTransfersV3RbacTest-442473916", "password_expires_at": null}, "audit_ids": ["x855i8c3RvK83x1rrYmD6w"], "expires_at": "2020-12-14T03:19:35.000000Z", "issued_at": "2020-12-14T02:19:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "02757feb81fe4551841e4147d355201e", "name": "tempest-VolumesTransfersV3RbacTest-442473916"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.541 197 INFO tempest.lib.common.rest_client [req-93621da3-be6f-4c13-a3fb-7bd9dc849e76 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.225s 2020-12-14 02:19:35.545 197 DEBUG tempest.lib.common.rest_client [req-93621da3-be6f-4c13-a3fb-7bd9dc849e76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-93621da3-be6f-4c13-a3fb-7bd9dc849e76', 'x-compute-request-id': 'req-93621da3-be6f-4c13-a3fb-7bd9dc849e76', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.575 186 INFO tempest.lib.common.rest_client [req-75300aa0-6e4a-456d-8ced-73514e592b87 ] Request (ServiceProfileExtRbacTest:test_create_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles 0.114s 2020-12-14 02:19:35.579 186 DEBUG tempest.lib.common.rest_client [req-75300aa0-6e4a-456d-8ced-73514e592b87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-75300aa0-6e4a-456d-8ced-73514e592b87', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.583 193 INFO tempest.lib.common.rest_client [req-09446f37-cd39-4985-99af-4eca4bc0144e ] Request (VolumesTransfersV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:19:35.586 193 DEBUG tempest.lib.common.rest_client [req-09446f37-cd39-4985-99af-4eca4bc0144e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-09446f37-cd39-4985-99af-4eca4bc0144e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["D56r8Vt3SE2mTdEr3fBNQg"], "expires_at": "2020-12-14T03:19:35.000000Z", "issued_at": "2020-12-14T02:19:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.633 186 INFO tempest.lib.common.rest_client [req-2e36b3c0-cbe1-46c4-acea-61b70ac452c5 ] Request (ServiceProfileExtRbacTest:test_create_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:19:35.637 186 DEBUG tempest.lib.common.rest_client [req-2e36b3c0-cbe1-46c4-acea-61b70ac452c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e36b3c0-cbe1-46c4-acea-61b70ac452c5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["RUBQc_bYQdSyBeFOt6RXpw"], "expires_at": "2020-12-14T03:19:35.000000Z", "issued_at": "2020-12-14T02:19:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.691 186 INFO tempest.lib.common.rest_client [req-1775da26-e43c-4e13-82f4-63735bded253 ] Request (ServiceProfileExtRbacTest:test_create_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:19:35.696 186 DEBUG tempest.lib.common.rest_client [req-1775da26-e43c-4e13-82f4-63735bded253 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1775da26-e43c-4e13-82f4-63735bded253', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["tpiwlZ9fSJaduqhWKbvi-Q"], "expires_at": "2020-12-14T03:19:35.000000Z", "issued_at": "2020-12-14T02:19:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.702 193 INFO tempest.lib.common.rest_client [req-3d6bb9fb-9930-481d-b0e2-0a350f156b28 ] Request (VolumesTransfersV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:19:35.705 193 DEBUG tempest.lib.common.rest_client [req-3d6bb9fb-9930-481d-b0e2-0a350f156b28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d6bb9fb-9930-481d-b0e2-0a350f156b28', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["4GJWgwtnSE6BAxpJTS1ghA"], "expires_at": "2020-12-14T03:19:35.000000Z", "issued_at": "2020-12-14T02:19:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.714 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:35.738 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_service_profile, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:35.741 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:35.764 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_service_profile, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:35.780 193 INFO tempest.lib.common.rest_client [req-d9c88574-a918-4318-a255-8a402b4f0499 ] Request (VolumesTransfersV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.068s 2020-12-14 02:19:35.784 193 DEBUG tempest.lib.common.rest_client [req-d9c88574-a918-4318-a255-8a402b4f0499 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9c88574-a918-4318-a255-8a402b4f0499', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.864 193 INFO tempest.lib.common.rest_client [req-0cedbff4-1f71-4c8d-9609-fa7bdaca9cd1 ] Request (VolumesTransfersV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.073s 2020-12-14 02:19:35.868 193 DEBUG tempest.lib.common.rest_client [req-0cedbff4-1f71-4c8d-9609-fa7bdaca9cd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0cedbff4-1f71-4c8d-9609-fa7bdaca9cd1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.869 186 INFO tempest.lib.common.rest_client [req-5e61fb19-afd7-415f-91b8-4d5bfaf1d0ef ] Request (ServiceProfileExtRbacTest:test_delete_service_profile): 201 POST http://172.30.13.94:9696/v2.0/service_profiles 0.099s 2020-12-14 02:19:35.871 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:19:35.871 186 DEBUG tempest.lib.common.rest_client [req-5e61fb19-afd7-415f-91b8-4d5bfaf1d0ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"service_profile": {"metainfo": "{\"foo\": \"bar\"}"}} Response - Headers: {'content-type': 'application/json', 'content-length': '151', 'x-openstack-request-id': 'req-5e61fb19-afd7-415f-91b8-4d5bfaf1d0ef', 'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles'} Body: b'{"service_profile": {"id": "fc333de5-13da-420f-9e64-35e6413e5da7", "description": "", "driver": "", "enabled": true, "metainfo": "{\\"foo\\": \\"bar\\"}"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.874 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:35.874 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:35.944 193 INFO tempest.lib.common.rest_client [req-a07f75b5-9c34-40e7-b955-5587dab084ba ] Request (VolumesTransfersV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles 0.065s 2020-12-14 02:19:35.947 193 DEBUG tempest.lib.common.rest_client [req-a07f75b5-9c34-40e7-b955-5587dab084ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a07f75b5-9c34-40e7-b955-5587dab084ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:35.947 186 INFO tempest.lib.common.rest_client [req-a0e7c09e-6923-4a23-89a2-6877f3cf5b81 ] Request (ServiceProfileExtRbacTest:test_delete_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles 0.066s 2020-12-14 02:19:35.951 186 DEBUG tempest.lib.common.rest_client [req-a0e7c09e-6923-4a23-89a2-6877f3cf5b81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0e7c09e-6923-4a23-89a2-6877f3cf5b81', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:36.025 193 INFO tempest.lib.common.rest_client [req-659125fd-2f12-476c-bd4b-63d6bc1f6a95 ] Request (VolumesTransfersV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles/72a4576c553448cd941b052c1ca0cf2d 0.071s 2020-12-14 02:19:36.028 193 DEBUG tempest.lib.common.rest_client [req-659125fd-2f12-476c-bd4b-63d6bc1f6a95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-659125fd-2f12-476c-bd4b-63d6bc1f6a95', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:36.114 189 INFO tempest.lib.common.rest_client [req-6921d5d4-cb56-4d45-acfb-ac8fd10025cc ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.219s 2020-12-14 02:19:36.118 189 DEBUG tempest.lib.common.rest_client [req-6921d5d4-cb56-4d45-acfb-ac8fd10025cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6921d5d4-cb56-4d45-acfb-ac8fd10025cc', 'x-compute-request-id': 'req-6921d5d4-cb56-4d45-acfb-ac8fd10025cc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:36.155 193 INFO tempest.lib.common.rest_client [req-5cdfb92a-1c40-466a-a11a-180adf392827 ] Request (VolumesTransfersV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles/a629c95d64b3416fb80ae90af4f69c05 0.119s 2020-12-14 02:19:36.158 193 DEBUG tempest.lib.common.rest_client [req-5cdfb92a-1c40-466a-a11a-180adf392827 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5cdfb92a-1c40-466a-a11a-180adf392827', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:36.171 186 INFO tempest.lib.common.rest_client [req-af8478a8-212b-457d-8224-e141a4da6f4e ] Request (ServiceProfileExtRbacTest:test_delete_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.212s 2020-12-14 02:19:36.175 186 DEBUG tempest.lib.common.rest_client [req-af8478a8-212b-457d-8224-e141a4da6f4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af8478a8-212b-457d-8224-e141a4da6f4e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["zVeJU-3wQyOnK05AHGivwQ"], "expires_at": "2020-12-14T03:19:36.000000Z", "issued_at": "2020-12-14T02:19:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:36.279 186 INFO tempest.lib.common.rest_client [req-8d6736a2-5b21-491a-a599-d76ec20bf916 ] Request (ServiceProfileExtRbacTest:test_delete_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:19:36.282 186 DEBUG tempest.lib.common.rest_client [req-8d6736a2-5b21-491a-a599-d76ec20bf916 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8d6736a2-5b21-491a-a599-d76ec20bf916', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["dAR1TnJgRSK2mXuIm9UKGg"], "expires_at": "2020-12-14T03:19:36.000000Z", "issued_at": "2020-12-14T02:19:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:36.462 186 INFO tempest.lib.common.rest_client [req-10c6bcc0-a07c-407b-8208-4873d52833c3 ] Request (ServiceProfileExtRbacTest:test_delete_service_profile): 204 DELETE http://172.30.13.94:9696/v2.0/service_profiles/fc333de5-13da-420f-9e64-35e6413e5da7 0.173s 2020-12-14 02:19:36.465 186 DEBUG tempest.lib.common.rest_client [req-10c6bcc0-a07c-407b-8208-4873d52833c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-10c6bcc0-a07c-407b-8208-4873d52833c3', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:36 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles/fc333de5-13da-420f-9e64-35e6413e5da7'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:36.468 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:36.648 186 INFO tempest.lib.common.rest_client [req-f7b35037-d8f4-4469-be57-3e6d1fcc9de7 ] Request (ServiceProfileExtRbacTest:test_delete_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles 0.174s 2020-12-14 02:19:36.653 186 DEBUG tempest.lib.common.rest_client [req-f7b35037-d8f4-4469-be57-3e6d1fcc9de7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7b35037-d8f4-4469-be57-3e6d1fcc9de7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:36.705 186 INFO tempest.lib.common.rest_client [req-9f1025e8-bfb0-4387-aa37-a73a286f3ed6 ] Request (ServiceProfileExtRbacTest:test_delete_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:19:36.708 186 DEBUG tempest.lib.common.rest_client [req-9f1025e8-bfb0-4387-aa37-a73a286f3ed6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f1025e8-bfb0-4387-aa37-a73a286f3ed6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["rH7rRqQTTGONkCCuSEg8eg"], "expires_at": "2020-12-14T03:19:36.000000Z", "issued_at": "2020-12-14T02:19:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:36.760 186 INFO tempest.lib.common.rest_client [req-ec68b9e2-63e5-4ee0-989a-750228bd43ee ] Request (ServiceProfileExtRbacTest:test_delete_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:19:36.764 186 DEBUG tempest.lib.common.rest_client [req-ec68b9e2-63e5-4ee0-989a-750228bd43ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec68b9e2-63e5-4ee0-989a-750228bd43ee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["mLe2hQ3NQGWy7ed3Fa-sSw"], "expires_at": "2020-12-14T03:19:36.000000Z", "issued_at": "2020-12-14T02:19:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:36.779 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:36.801 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_service_profile, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:36.891 197 INFO tempest.lib.common.rest_client [req-7fa3fb85-89e6-40a2-a9fc-9773665f5a32 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.238s 2020-12-14 02:19:36.895 197 DEBUG tempest.lib.common.rest_client [req-7fa3fb85-89e6-40a2-a9fc-9773665f5a32 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7fa3fb85-89e6-40a2-a9fc-9773665f5a32', 'x-compute-request-id': 'req-7fa3fb85-89e6-40a2-a9fc-9773665f5a32', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:36.950 186 INFO tempest.lib.common.rest_client [req-b79638de-ada7-4187-9ed3-03b4b92e5905 ] Request (ServiceProfileExtRbacTest:test_show_service_profile): 201 POST http://172.30.13.94:9696/v2.0/service_profiles 0.143s 2020-12-14 02:19:36.952 186 DEBUG tempest.lib.common.rest_client [req-b79638de-ada7-4187-9ed3-03b4b92e5905 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"service_profile": {"metainfo": "{\"foo\": \"bar\"}"}} Response - Headers: {'content-type': 'application/json', 'content-length': '151', 'x-openstack-request-id': 'req-b79638de-ada7-4187-9ed3-03b4b92e5905', 'date': 'Mon, 14 Dec 2020 02:19:36 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles'} Body: b'{"service_profile": {"id": "d5c505fc-7e93-4bb7-ab10-2755521374b4", "description": "", "driver": "", "enabled": true, "metainfo": "{\\"foo\\": \\"bar\\"}"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:36.955 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:37.017 186 INFO tempest.lib.common.rest_client [req-ce8dee2a-a780-4bcd-a68e-07ca328effd8 ] Request (ServiceProfileExtRbacTest:test_show_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles 0.056s 2020-12-14 02:19:37.021 186 DEBUG tempest.lib.common.rest_client [req-ce8dee2a-a780-4bcd-a68e-07ca328effd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce8dee2a-a780-4bcd-a68e-07ca328effd8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:37.071 186 INFO tempest.lib.common.rest_client [req-e2202c20-f6e6-4c8a-a826-7ebfc5018dce ] Request (ServiceProfileExtRbacTest:test_show_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:19:37.073 186 DEBUG tempest.lib.common.rest_client [req-e2202c20-f6e6-4c8a-a826-7ebfc5018dce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2202c20-f6e6-4c8a-a826-7ebfc5018dce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["0MBvnGQnQ2yaV_ftO5gbpg"], "expires_at": "2020-12-14T03:19:37.000000Z", "issued_at": "2020-12-14T02:19:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:37.120 186 INFO tempest.lib.common.rest_client [req-116a2c67-9332-46de-96e9-3c3ad874be22 ] Request (ServiceProfileExtRbacTest:test_show_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:19:37.125 186 DEBUG tempest.lib.common.rest_client [req-116a2c67-9332-46de-96e9-3c3ad874be22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-116a2c67-9332-46de-96e9-3c3ad874be22', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["6WRIzkxITuqp2sDLpp5plA"], "expires_at": "2020-12-14T03:19:37.000000Z", "issued_at": "2020-12-14T02:19:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:37.233 186 INFO tempest.lib.common.rest_client [req-8025a529-e314-4b5e-adcb-877535a72217 ] Request (ServiceProfileExtRbacTest:test_show_service_profile): 200 GET http://172.30.13.94:9696/v2.0/service_profiles/d5c505fc-7e93-4bb7-ab10-2755521374b4 0.102s 2020-12-14 02:19:37.237 186 DEBUG tempest.lib.common.rest_client [req-8025a529-e314-4b5e-adcb-877535a72217 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '151', 'x-openstack-request-id': 'req-8025a529-e314-4b5e-adcb-877535a72217', 'date': 'Mon, 14 Dec 2020 02:19:37 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles/d5c505fc-7e93-4bb7-ab10-2755521374b4'} Body: b'{"service_profile": {"id": "d5c505fc-7e93-4bb7-ab10-2755521374b4", "description": "", "driver": "", "enabled": true, "metainfo": "{\\"foo\\": \\"bar\\"}"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:37.240 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:37.258 193 INFO tempest.lib.common.rest_client [req-4984e3bb-161b-4e46-936b-77ae396f267a ] Request (VolumesTransfersV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:19:37.260 193 DEBUG tempest.lib.common.rest_client [req-4984e3bb-161b-4e46-936b-77ae396f267a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4984e3bb-161b-4e46-936b-77ae396f267a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21eec2608c394756a6fced2b31462577", "name": "tempest-VolumesTransfersV3RbacTest-442473916", "password_expires_at": null}, "audit_ids": ["LWaehSnrTemskQNc08al0Q"], "expires_at": "2020-12-14T03:19:37.000000Z", "issued_at": "2020-12-14T02:19:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "02757feb81fe4551841e4147d355201e", "name": "tempest-VolumesTransfersV3RbacTest-442473916"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:37.305 186 INFO tempest.lib.common.rest_client [req-8dae6dad-fb70-4470-b36a-255375490897 ] Request (ServiceProfileExtRbacTest:test_show_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles 0.059s 2020-12-14 02:19:37.307 186 DEBUG tempest.lib.common.rest_client [req-8dae6dad-fb70-4470-b36a-255375490897 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8dae6dad-fb70-4470-b36a-255375490897', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:37.357 186 INFO tempest.lib.common.rest_client [req-669045b5-2dd6-4897-80b6-846886226332 ] Request (ServiceProfileExtRbacTest:test_show_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:19:37.360 186 DEBUG tempest.lib.common.rest_client [req-669045b5-2dd6-4897-80b6-846886226332 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-669045b5-2dd6-4897-80b6-846886226332', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["L4zO7xHTTvK2tjn9twlwSQ"], "expires_at": "2020-12-14T03:19:37.000000Z", "issued_at": "2020-12-14T02:19:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:37.411 186 INFO tempest.lib.common.rest_client [req-57323ad2-9ca0-4cc3-8cf1-821f5e31b908 ] Request (ServiceProfileExtRbacTest:test_show_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:19:37.416 186 DEBUG tempest.lib.common.rest_client [req-57323ad2-9ca0-4cc3-8cf1-821f5e31b908 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57323ad2-9ca0-4cc3-8cf1-821f5e31b908', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["OSUhdpL7SZaDCs7y1m_Trw"], "expires_at": "2020-12-14T03:19:37.000000Z", "issued_at": "2020-12-14T02:19:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:37.432 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:37.452 189 INFO tempest.lib.common.rest_client [req-46aa8903-e714-4de3-bd7b-516e0ada0c07 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.227s 2020-12-14 02:19:37.454 189 DEBUG tempest.lib.common.rest_client [req-46aa8903-e714-4de3-bd7b-516e0ada0c07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-46aa8903-e714-4de3-bd7b-516e0ada0c07', 'x-compute-request-id': 'req-46aa8903-e714-4de3-bd7b-516e0ada0c07', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:37.455 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_service_profile, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:37.458 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:37.481 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_service_profile, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:37.574 186 INFO tempest.lib.common.rest_client [req-f4b898d0-89e1-454e-ba03-e8eb149f2eb3 ] Request (ServiceProfileExtRbacTest:test_update_service_profile): 201 POST http://172.30.13.94:9696/v2.0/service_profiles 0.087s 2020-12-14 02:19:37.578 186 DEBUG tempest.lib.common.rest_client [req-f4b898d0-89e1-454e-ba03-e8eb149f2eb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"service_profile": {"metainfo": "{\"foo\": \"bar\"}"}} Response - Headers: {'content-type': 'application/json', 'content-length': '151', 'x-openstack-request-id': 'req-f4b898d0-89e1-454e-ba03-e8eb149f2eb3', 'date': 'Mon, 14 Dec 2020 02:19:37 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles'} Body: b'{"service_profile": {"id": "fb298f10-91d3-4413-af14-f9c78f8999fe", "description": "", "driver": "", "enabled": true, "metainfo": "{\\"foo\\": \\"bar\\"}"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:37.581 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:37.648 186 INFO tempest.lib.common.rest_client [req-75691508-8828-44ff-9608-059f3a970dcf ] Request (ServiceProfileExtRbacTest:test_update_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles 0.061s 2020-12-14 02:19:37.652 186 DEBUG tempest.lib.common.rest_client [req-75691508-8828-44ff-9608-059f3a970dcf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-75691508-8828-44ff-9608-059f3a970dcf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:37.706 193 INFO tempest.lib.common.rest_client [req-77c0f581-98d4-4520-9c56-48f911355d66 ] Request (VolumesTransfersV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes 0.434s 2020-12-14 02:19:37.707 186 INFO tempest.lib.common.rest_client [req-d4c33d87-5154-4d6e-b1cd-64882b21185f ] Request (ServiceProfileExtRbacTest:test_update_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:19:37.709 193 DEBUG tempest.lib.common.rest_client [req-77c0f581-98d4-4520-9c56-48f911355d66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesTransfersV3RbacTest-Volume-1996875304"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-77c0f581-98d4-4520-9c56-48f911355d66', 'content-length': '847', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-77c0f581-98d4-4520-9c56-48f911355d66', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes'} Body: b'{"volume": {"id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:38.000000", "updated_at": null, "name": "tempest-VolumesTransfersV3RbacTest-Volume-1996875304", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}], "user_id": "21eec2608c394756a6fced2b31462577", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:37.710 186 DEBUG tempest.lib.common.rest_client [req-d4c33d87-5154-4d6e-b1cd-64882b21185f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4c33d87-5154-4d6e-b1cd-64882b21185f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["FaLmokUBT3mdUVI-MgBTVw"], "expires_at": "2020-12-14T03:19:37.000000Z", "issued_at": "2020-12-14T02:19:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:37.756 186 INFO tempest.lib.common.rest_client [req-8eed6c0b-9981-4ad8-8f9b-07ef8c85009b ] Request (ServiceProfileExtRbacTest:test_update_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:19:37.759 186 DEBUG tempest.lib.common.rest_client [req-8eed6c0b-9981-4ad8-8f9b-07ef8c85009b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8eed6c0b-9981-4ad8-8f9b-07ef8c85009b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["TLFAX3j6Tme3c-MVy_8eVQ"], "expires_at": "2020-12-14T03:19:37.000000Z", "issued_at": "2020-12-14T02:19:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:37.875 193 INFO tempest.lib.common.rest_client [req-5eb73689-2ace-4260-b577-fc6f24f40b68 ] Request (VolumesTransfersV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33 0.076s 2020-12-14 02:19:37.877 193 DEBUG tempest.lib.common.rest_client [req-5eb73689-2ace-4260-b577-fc6f24f40b68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5eb73689-2ace-4260-b577-fc6f24f40b68', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5eb73689-2ace-4260-b577-fc6f24f40b68', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33'} Body: b'{"volume": {"id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:38.000000", "updated_at": "2020-12-14T02:19:38.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1996875304", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}], "user_id": "21eec2608c394756a6fced2b31462577", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "02757feb81fe4551841e4147d355201e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:37.980 186 INFO tempest.lib.common.rest_client [req-b4319a17-d81f-4575-9bea-13b85a268359 ] Request (ServiceProfileExtRbacTest:test_update_service_profile): 200 PUT http://172.30.13.94:9696/v2.0/service_profiles/fb298f10-91d3-4413-af14-f9c78f8999fe 0.213s 2020-12-14 02:19:37.983 186 DEBUG tempest.lib.common.rest_client [req-b4319a17-d81f-4575-9bea-13b85a268359 ] Request - Headers: {'X-Auth-Token': ''} Body: {"service_profile": {"enabled": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '152', 'x-openstack-request-id': 'req-b4319a17-d81f-4575-9bea-13b85a268359', 'date': 'Mon, 14 Dec 2020 02:19:37 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles/fb298f10-91d3-4413-af14-f9c78f8999fe'} Body: b'{"service_profile": {"id": "fb298f10-91d3-4413-af14-f9c78f8999fe", "description": "", "driver": "", "enabled": false, "metainfo": "{\\"foo\\": \\"bar\\"}"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:37.986 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:38.087 186 INFO tempest.lib.common.rest_client [req-5f4c8e07-0a20-4a51-8510-64ef5186bb41 ] Request (ServiceProfileExtRbacTest:test_update_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles 0.094s 2020-12-14 02:19:38.091 186 DEBUG tempest.lib.common.rest_client [req-5f4c8e07-0a20-4a51-8510-64ef5186bb41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f4c8e07-0a20-4a51-8510-64ef5186bb41', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1/users/bc9b1bbc068b4b91bcd4900813ea4ea2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:38.145 186 INFO tempest.lib.common.rest_client [req-cedcb44f-a152-4622-a0bc-655adc595eaf ] Request (ServiceProfileExtRbacTest:test_update_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:19:38.148 186 DEBUG tempest.lib.common.rest_client [req-cedcb44f-a152-4622-a0bc-655adc595eaf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cedcb44f-a152-4622-a0bc-655adc595eaf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["4CB1h8i4T_Oki85zOzJP2Q"], "expires_at": "2020-12-14T03:19:38.000000Z", "issued_at": "2020-12-14T02:19:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:38.199 186 INFO tempest.lib.common.rest_client [req-19fe82e4-c98f-4cd4-8dbc-90b734dcf943 ] Request (ServiceProfileExtRbacTest:test_update_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:19:38.203 186 DEBUG tempest.lib.common.rest_client [req-19fe82e4-c98f-4cd4-8dbc-90b734dcf943 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19fe82e4-c98f-4cd4-8dbc-90b734dcf943', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bc9b1bbc068b4b91bcd4900813ea4ea2", "name": "tempest-ServiceProfileExtRbacTest-947918784", "password_expires_at": null}, "audit_ids": ["7kb62M8fSr-0E8IjPfRg3w"], "expires_at": "2020-12-14T03:19:38.000000Z", "issued_at": "2020-12-14T02:19:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "name": "tempest-ServiceProfileExtRbacTest-947918784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ef926bb4bf3b4b84966d8c829cc2a9e1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:38.255 197 INFO tempest.lib.common.rest_client [req-013b1e17-01e8-4cdf-853c-15a45fc3525e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.254s 2020-12-14 02:19:38.258 197 DEBUG tempest.lib.common.rest_client [req-013b1e17-01e8-4cdf-853c-15a45fc3525e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-013b1e17-01e8-4cdf-853c-15a45fc3525e', 'x-compute-request-id': 'req-013b1e17-01e8-4cdf-853c-15a45fc3525e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:38.326 186 INFO tempest.lib.common.rest_client [req-c5ee7334-0ad6-475d-9191-a88409f6e645 ] Request (ServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/service_profiles/fb298f10-91d3-4413-af14-f9c78f8999fe 0.107s 2020-12-14 02:19:38.329 186 DEBUG tempest.lib.common.rest_client [req-c5ee7334-0ad6-475d-9191-a88409f6e645 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c5ee7334-0ad6-475d-9191-a88409f6e645', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles/fb298f10-91d3-4413-af14-f9c78f8999fe'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:38.384 186 INFO tempest.lib.common.rest_client [req-04f5c9f2-3b48-4494-93c0-0c6be4fc512f ] Request (ServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/service_profiles/d5c505fc-7e93-4bb7-ab10-2755521374b4 0.048s 2020-12-14 02:19:38.386 186 DEBUG tempest.lib.common.rest_client [req-04f5c9f2-3b48-4494-93c0-0c6be4fc512f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-04f5c9f2-3b48-4494-93c0-0c6be4fc512f', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles/d5c505fc-7e93-4bb7-ab10-2755521374b4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:38.433 186 INFO tempest.lib.common.rest_client [req-cd86f942-cb0b-4151-ad19-9f47f4a38df4 ] Request (ServiceProfileExtRbacTest:tearDownClass): 404 DELETE http://172.30.13.94:9696/v2.0/service_profiles/fc333de5-13da-420f-9e64-35e6413e5da7 0.041s 2020-12-14 02:19:38.435 186 DEBUG tempest.lib.common.rest_client [req-cd86f942-cb0b-4151-ad19-9f47f4a38df4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '153', 'x-openstack-request-id': 'req-cd86f942-cb0b-4151-ad19-9f47f4a38df4', 'date': 'Mon, 14 Dec 2020 02:19:38 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles/fc333de5-13da-420f-9e64-35e6413e5da7'} Body: b'{"NeutronError": {"type": "ServiceProfileNotFound", "message": "Service Profile fc333de5-13da-420f-9e64-35e6413e5da7 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:38.485 186 INFO tempest.lib.common.rest_client [req-3c7800cc-090e-49f9-b7b4-1db59e3929b8 ] Request (ServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/service_profiles/05ae89a4-c2e5-4ba4-9938-10b6b865cf2d 0.044s 2020-12-14 02:19:38.488 186 DEBUG tempest.lib.common.rest_client [req-3c7800cc-090e-49f9-b7b4-1db59e3929b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-3c7800cc-090e-49f9-b7b4-1db59e3929b8', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles/05ae89a4-c2e5-4ba4-9938-10b6b865cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:38.647 186 INFO tempest.lib.common.rest_client [req-fbad661e-6551-4e57-b0ef-55f2cfed17c7 ] Request (ServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/bc9b1bbc068b4b91bcd4900813ea4ea2 0.152s 2020-12-14 02:19:38.651 186 DEBUG tempest.lib.common.rest_client [req-fbad661e-6551-4e57-b0ef-55f2cfed17c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fbad661e-6551-4e57-b0ef-55f2cfed17c7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/bc9b1bbc068b4b91bcd4900813ea4ea2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:38.745 186 INFO tempest.lib.common.rest_client [req-375dae7b-ff1c-4e74-bac1-3e12187176ae ] Request (ServiceProfileExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-14 02:19:38.748 186 DEBUG tempest.lib.common.rest_client [req-375dae7b-ff1c-4e74-bac1-3e12187176ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-375dae7b-ff1c-4e74-bac1-3e12187176ae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["_N1rt2JzR0yC_3KcC3dH-A"], "expires_at": "2020-12-14T03:19:38.000000Z", "issued_at": "2020-12-14T02:19:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:38.765 189 INFO tempest.lib.common.rest_client [req-bb9a9d14-fbaf-4115-9e91-343a5cc8a77c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.205s 2020-12-14 02:19:38.769 189 DEBUG tempest.lib.common.rest_client [req-bb9a9d14-fbaf-4115-9e91-343a5cc8a77c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bb9a9d14-fbaf-4115-9e91-343a5cc8a77c', 'x-compute-request-id': 'req-bb9a9d14-fbaf-4115-9e91-343a5cc8a77c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:39.004 186 INFO tempest.lib.common.rest_client [req-f67e2183-4de1-4c98-80a0-0ce4aeedf569 ] Request (ServiceProfileExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ef926bb4bf3b4b84966d8c829cc2a9e1&name=default 0.249s 2020-12-14 02:19:39.006 186 DEBUG tempest.lib.common.rest_client [req-f67e2183-4de1-4c98-80a0-0ce4aeedf569 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-f67e2183-4de1-4c98-80a0-0ce4aeedf569', 'date': 'Mon, 14 Dec 2020 02:19:38 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ef926bb4bf3b4b84966d8c829cc2a9e1&name=default'} Body: b'{"security_groups": [{"id": "d0cabcfa-b5a9-4114-a020-def535cc4f7d", "name": "default", "stateful": true, "tenant_id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "description": "Default security group", "security_group_rules": [{"id": "6f7f60af-dd23-403d-a903-b797f916bb81", "tenant_id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "security_group_id": "d0cabcfa-b5a9-4114-a020-def535cc4f7d", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:38Z", "updated_at": "2020-12-14T02:19:38Z", "revision_number": 0, "project_id": "ef926bb4bf3b4b84966d8c829cc2a9e1"}, {"id": "7d91a6f4-8d59-437f-86b9-29ff390731af", "tenant_id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "security_group_id": "d0cabcfa-b5a9-4114-a020-def535cc4f7d", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:38Z", "updated_at": "2020-12-14T02:19:38Z", "revision_number": 0, "project_id": "ef926bb4bf3b4b84966d8c829cc2a9e1"}, {"id": "89d65922-1448-4884-ba46-d28e6ec0698d", "tenant_id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "security_group_id": "d0cabcfa-b5a9-4114-a020-def535cc4f7d", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d0cabcfa-b5a9-4114-a020-def535cc4f7d", "description": null, "tags": [], "created_at": "2020-12-14T02:19:38Z", "updated_at": "2020-12-14T02:19:38Z", "revision_number": 0, "project_id": "ef926bb4bf3b4b84966d8c829cc2a9e1"}, {"id": "c2e8a89f-f1ca-4a22-822c-2b8a2eea8a1a", "tenant_id": "ef926bb4bf3b4b84966d8c829cc2a9e1", "security_group_id": "d0cabcfa-b5a9-4114-a020-def535cc4f7d", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d0cabcfa-b5a9-4114-a020-def535cc4f7d", "description": null, "tags": [], "created_at": "2020-12-14T02:19:38Z", "updated_at": "2020-12-14T02:19:38Z", "revision_number": 0, "project_id": "ef926bb4bf3b4b84966d8c829cc2a9e1"}], "tags": [], "created_at": "2020-12-14T02:19:38Z", "updated_at": "2020-12-14T02:19:38Z", "revision_number": 1, "project_id": "ef926bb4bf3b4b84966d8c829cc2a9e1"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:39.066 193 INFO tempest.lib.common.rest_client [req-ccf4a164-f316-48f1-b55c-ae526e4d55a4 ] Request (VolumesTransfersV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33 0.087s 2020-12-14 02:19:39.069 193 DEBUG tempest.lib.common.rest_client [req-ccf4a164-f316-48f1-b55c-ae526e4d55a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ccf4a164-f316-48f1-b55c-ae526e4d55a4', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ccf4a164-f316-48f1-b55c-ae526e4d55a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33'} Body: b'{"volume": {"id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:38.000000", "updated_at": "2020-12-14T02:19:38.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1996875304", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}], "user_id": "21eec2608c394756a6fced2b31462577", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "02757feb81fe4551841e4147d355201e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:39.144 186 INFO tempest.lib.common.rest_client [req-60b01cc3-e1b2-4546-95f7-271f0fac3b40 ] Request (ServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/d0cabcfa-b5a9-4114-a020-def535cc4f7d 0.132s 2020-12-14 02:19:39.146 186 DEBUG tempest.lib.common.rest_client [req-60b01cc3-e1b2-4546-95f7-271f0fac3b40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-60b01cc3-e1b2-4546-95f7-271f0fac3b40', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/d0cabcfa-b5a9-4114-a020-def535cc4f7d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:39.161 193 INFO tempest.common.waiters [-] volume 5edc7823-0bc2-42bd-8953-3f06e7073d33 reached available after waiting for 2.161184 seconds 2020-12-14 02:19:39.167 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:39.183 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:accept_transfer, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:39.286 186 INFO tempest.lib.common.rest_client [req-b6ef5f18-8c97-4960-b37e-4ab0854d3169 ] Request (ServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1 0.133s 2020-12-14 02:19:39.289 186 DEBUG tempest.lib.common.rest_client [req-b6ef5f18-8c97-4960-b37e-4ab0854d3169 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6ef5f18-8c97-4960-b37e-4ab0854d3169', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ef926bb4bf3b4b84966d8c829cc2a9e1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:39.307 193 INFO tempest.lib.common.rest_client [req-b6133f3b-9e6e-4a0b-b0cc-2d81cd71f2ca ] Request (VolumesTransfersV3RbacTest:test_accept_volume_transfer): 202 POST http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer 0.117s 2020-12-14 02:19:39.311 193 DEBUG tempest.lib.common.rest_client [req-b6133f3b-9e6e-4a0b-b0cc-2d81cd71f2ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"transfer": {"volume_id": "5edc7823-0bc2-42bd-8953-3f06e7073d33"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b6133f3b-9e6e-4a0b-b0cc-2d81cd71f2ca', 'content-length': '509', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b6133f3b-9e6e-4a0b-b0cc-2d81cd71f2ca', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer'} Body: b'{"transfer": {"id": "c7cca436-db64-44bb-a255-543594b12c91", "created_at": "2020-12-14T02:19:39.272124", "name": null, "volume_id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "auth_key": "c6c0db6ca8ee0454", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/c7cca436-db64-44bb-a255-543594b12c91"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/os-volume-transfer/c7cca436-db64-44bb-a255-543594b12c91"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:39.406 186 INFO tempest.lib.common.rest_client [req-4ea29513-6dd0-4ca5-ad59-a55a029a05d6 ] Request (ServiceProvidersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:19:39.409 186 DEBUG tempest.lib.common.rest_client [req-4ea29513-6dd0-4ca5-ad59-a55a029a05d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ea29513-6dd0-4ca5-ad59-a55a029a05d6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["wD6usGTLRhKZ5NSyqk3mOA"], "expires_at": "2020-12-14T03:19:39.000000Z", "issued_at": "2020-12-14T02:19:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:39.429 193 INFO tempest.lib.common.rest_client [req-1729b1c1-8968-40e2-93f9-19d620afa643 ] Request (VolumesTransfersV3RbacTest:test_accept_volume_transfer): 200 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33 0.083s 2020-12-14 02:19:39.432 193 DEBUG tempest.lib.common.rest_client [req-1729b1c1-8968-40e2-93f9-19d620afa643 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1729b1c1-8968-40e2-93f9-19d620afa643', 'content-length': '1078', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1729b1c1-8968-40e2-93f9-19d620afa643', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33'} Body: b'{"volume": {"id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "status": "awaiting-transfer", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:38.000000", "updated_at": "2020-12-14T02:19:39.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1996875304", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}], "user_id": "21eec2608c394756a6fced2b31462577", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "02757feb81fe4551841e4147d355201e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:39.503 186 INFO tempest.lib.common.rest_client [req-80b9104c-c0a5-456a-8501-65744a245366 ] Request (ServiceProvidersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:19:39.505 186 DEBUG tempest.lib.common.rest_client [req-80b9104c-c0a5-456a-8501-65744a245366 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-80b9104c-c0a5-456a-8501-65744a245366', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["lAQvtMevRp-_cLB3ggNP0Q"], "expires_at": "2020-12-14T03:19:39.000000Z", "issued_at": "2020-12-14T02:19:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:39.526 193 INFO tempest.common.waiters [-] volume 5edc7823-0bc2-42bd-8953-3f06e7073d33 reached awaiting-transfer after waiting for 0.526019 seconds 2020-12-14 02:19:39.528 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:39.574 186 INFO tempest.lib.common.rest_client [req-f8427a19-8c34-412d-a761-6edab4621a4d ] Request (ServiceProvidersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.061s 2020-12-14 02:19:39.576 186 DEBUG tempest.lib.common.rest_client [req-f8427a19-8c34-412d-a761-6edab4621a4d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8427a19-8c34-412d-a761-6edab4621a4d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:39.588 197 INFO tempest.lib.common.rest_client [req-ea1da4c0-e3b2-4937-907d-6662f446d8da ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.222s 2020-12-14 02:19:39.591 197 DEBUG tempest.lib.common.rest_client [req-ea1da4c0-e3b2-4937-907d-6662f446d8da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ea1da4c0-e3b2-4937-907d-6662f446d8da', 'x-compute-request-id': 'req-ea1da4c0-e3b2-4937-907d-6662f446d8da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:39.599 193 INFO tempest.lib.common.rest_client [req-bc6eea27-8cce-4332-88f6-f6b391628000 ] Request (VolumesTransfersV3RbacTest:test_accept_volume_transfer): 200 GET http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles 0.064s 2020-12-14 02:19:39.602 193 DEBUG tempest.lib.common.rest_client [req-bc6eea27-8cce-4332-88f6-f6b391628000 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc6eea27-8cce-4332-88f6-f6b391628000', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:39.652 186 INFO tempest.lib.common.rest_client [req-78cbee27-d694-494e-a675-f451e78e99ac ] Request (ServiceProvidersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.067s 2020-12-14 02:19:39.654 186 DEBUG tempest.lib.common.rest_client [req-78cbee27-d694-494e-a675-f451e78e99ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServiceProvidersRbacTest-1352991695-desc", "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1352991695"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78cbee27-d694-494e-a675-f451e78e99ac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "b8b743b9c9a645b3b3d508c881e7d2a2", "name": "tempest-ServiceProvidersRbacTest-1352991695", "domain_id": "default", "description": "tempest-ServiceProvidersRbacTest-1352991695-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:39.699 193 INFO tempest.lib.common.rest_client [req-36a0be92-09d2-40b4-9962-30aa364806f6 ] Request (VolumesTransfersV3RbacTest:test_accept_volume_transfer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:19:39.703 193 DEBUG tempest.lib.common.rest_client [req-36a0be92-09d2-40b4-9962-30aa364806f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36a0be92-09d2-40b4-9962-30aa364806f6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21eec2608c394756a6fced2b31462577", "name": "tempest-VolumesTransfersV3RbacTest-442473916", "password_expires_at": null}, "audit_ids": ["9mxu4dwnSSinYrrILLEIfw"], "expires_at": "2020-12-14T03:19:39.000000Z", "issued_at": "2020-12-14T02:19:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "02757feb81fe4551841e4147d355201e", "name": "tempest-VolumesTransfersV3RbacTest-442473916"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:39.792 186 INFO tempest.lib.common.rest_client [req-b967139f-d6ae-433d-baa3-85a24c4874e4 ] Request (ServiceProvidersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.129s 2020-12-14 02:19:39.795 186 DEBUG tempest.lib.common.rest_client [req-b967139f-d6ae-433d-baa3-85a24c4874e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServiceProvidersRbacTest-1352991695", "password": "H7!+XGcw^2TFM_u", "project_id": "b8b743b9c9a645b3b3d508c881e7d2a2", "email": "tempest-ServiceProvidersRbacTest-1730295386@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '404', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b967139f-d6ae-433d-baa3-85a24c4874e4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "b8b743b9c9a645b3b3d508c881e7d2a2", "email": "tempest-ServiceProvidersRbacTest-1730295386@example.com", "id": "c737450b12934d37a4a56efebd7c5a15", "name": "tempest-ServiceProvidersRbacTest-1352991695", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/c737450b12934d37a4a56efebd7c5a15"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:39.864 186 INFO tempest.lib.common.rest_client [req-58b6b373-7264-47f0-aec6-de1a46471b2b ] Request (ServiceProvidersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:19:39.867 186 DEBUG tempest.lib.common.rest_client [req-58b6b373-7264-47f0-aec6-de1a46471b2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58b6b373-7264-47f0-aec6-de1a46471b2b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:39.961 186 INFO tempest.lib.common.rest_client [req-7726f8d4-29ae-4975-b7b6-c1693ef96f5d ] Request (ServiceProvidersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.085s 2020-12-14 02:19:39.964 186 DEBUG tempest.lib.common.rest_client [req-7726f8d4-29ae-4975-b7b6-c1693ef96f5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7726f8d4-29ae-4975-b7b6-c1693ef96f5d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:40.058 186 INFO tempest.lib.common.rest_client [req-d6abcd26-0e73-4b2d-99e4-27a4993511e9 ] Request (ServiceProvidersRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2/users/c737450b12934d37a4a56efebd7c5a15/roles/72a4576c553448cd941b052c1ca0cf2d 0.085s 2020-12-14 02:19:40.060 186 DEBUG tempest.lib.common.rest_client [req-d6abcd26-0e73-4b2d-99e4-27a4993511e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6abcd26-0e73-4b2d-99e4-27a4993511e9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2/users/c737450b12934d37a4a56efebd7c5a15/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:40.064 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServiceProvidersRbacTest-1352991695', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'b8b743b9c9a645b3b3d508c881e7d2a2', 'project_name': 'tempest-ServiceProvidersRbacTest-1352991695', 'tenant_id': 'b8b743b9c9a645b3b3d508c881e7d2a2', 'tenant_name': 'tempest-ServiceProvidersRbacTest-1352991695', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c737450b12934d37a4a56efebd7c5a15'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:40.067 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServiceProvidersRbacTest-1352991695', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'b8b743b9c9a645b3b3d508c881e7d2a2', 'project_name': 'tempest-ServiceProvidersRbacTest-1352991695', 'tenant_id': 'b8b743b9c9a645b3b3d508c881e7d2a2', 'tenant_name': 'tempest-ServiceProvidersRbacTest-1352991695', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c737450b12934d37a4a56efebd7c5a15'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:40.090 189 INFO tempest.lib.common.rest_client [req-03309233-4374-4be2-9c46-02c5fd70215a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.215s 2020-12-14 02:19:40.094 189 DEBUG tempest.lib.common.rest_client [req-03309233-4374-4be2-9c46-02c5fd70215a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-03309233-4374-4be2-9c46-02c5fd70215a', 'x-compute-request-id': 'req-03309233-4374-4be2-9c46-02c5fd70215a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:40.265 186 INFO tempest.lib.common.rest_client [req-06ed4841-ef4b-48df-b7f4-78a0024f30c3 ] Request (ServiceProvidersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.124s 2020-12-14 02:19:40.269 186 DEBUG tempest.lib.common.rest_client [req-06ed4841-ef4b-48df-b7f4-78a0024f30c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06ed4841-ef4b-48df-b7f4-78a0024f30c3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c737450b12934d37a4a56efebd7c5a15", "name": "tempest-ServiceProvidersRbacTest-1352991695", "password_expires_at": null}, "audit_ids": ["nxsN4BK6QXCPqdahF4pXgw"], "expires_at": "2020-12-14T03:19:40.000000Z", "issued_at": "2020-12-14T02:19:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b8b743b9c9a645b3b3d508c881e7d2a2", "name": "tempest-ServiceProvidersRbacTest-1352991695"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:40.371 186 INFO tempest.lib.common.rest_client [req-9bc47b70-6123-4fb8-a7fe-e7b5fb4a7716 ] Request (ServiceProvidersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:19:40.373 186 DEBUG tempest.lib.common.rest_client [req-9bc47b70-6123-4fb8-a7fe-e7b5fb4a7716 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9bc47b70-6123-4fb8-a7fe-e7b5fb4a7716', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["8zjOf4mmSzeW_V37kxlrEQ"], "expires_at": "2020-12-14T03:19:40.000000Z", "issued_at": "2020-12-14T02:19:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:40.444 193 INFO tempest.lib.common.rest_client [req-5e0fd58e-0ea4-4e70-adee-07087b6c87c3 ] Request (VolumesTransfersV3RbacTest:test_accept_volume_transfer): 202 POST http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/c7cca436-db64-44bb-a255-543594b12c91/accept 0.733s 2020-12-14 02:19:40.447 193 DEBUG tempest.lib.common.rest_client [req-5e0fd58e-0ea4-4e70-adee-07087b6c87c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"accept": {"auth_key": "c6c0db6ca8ee0454"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5e0fd58e-0ea4-4e70-adee-07087b6c87c3', 'content-length': '433', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5e0fd58e-0ea4-4e70-adee-07087b6c87c3', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/c7cca436-db64-44bb-a255-543594b12c91/accept'} Body: b'{"transfer": {"id": "c7cca436-db64-44bb-a255-543594b12c91", "volume_id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "name": null, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/c7cca436-db64-44bb-a255-543594b12c91"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/os-volume-transfer/c7cca436-db64-44bb-a255-543594b12c91"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:40.474 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:40.486 186 INFO tempest.lib.common.rest_client [req-8ae624ea-9b8e-46a8-969d-d168ccd87999 ] Request (ServiceProvidersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:19:40.489 186 DEBUG tempest.lib.common.rest_client [req-8ae624ea-9b8e-46a8-969d-d168ccd87999 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ae624ea-9b8e-46a8-969d-d168ccd87999', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["-MHJv6w2RySdTzclA7tyJw"], "expires_at": "2020-12-14T03:19:40.000000Z", "issued_at": "2020-12-14T02:19:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:40.565 193 INFO tempest.lib.common.rest_client [req-a59621ef-a436-4263-8131-804e2e5a5bc0 ] Request (VolumesTransfersV3RbacTest:test_accept_volume_transfer): 200 GET http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles 0.084s 2020-12-14 02:19:40.568 193 DEBUG tempest.lib.common.rest_client [req-a59621ef-a436-4263-8131-804e2e5a5bc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a59621ef-a436-4263-8131-804e2e5a5bc0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:40.570 186 INFO tempest.lib.common.rest_client [req-b2f40791-f387-4347-9569-e07a736e8ec7 ] Request (ServiceProvidersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.073s 2020-12-14 02:19:40.572 186 DEBUG tempest.lib.common.rest_client [req-b2f40791-f387-4347-9569-e07a736e8ec7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2f40791-f387-4347-9569-e07a736e8ec7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:40.636 186 INFO tempest.lib.common.rest_client [req-e5b6f600-6de9-4a4c-a4d6-0304d4b72589 ] Request (ServiceProvidersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:19:40.639 186 DEBUG tempest.lib.common.rest_client [req-e5b6f600-6de9-4a4c-a4d6-0304d4b72589 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5b6f600-6de9-4a4c-a4d6-0304d4b72589', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:40.642 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:19:40.644 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:40.664 193 INFO tempest.lib.common.rest_client [req-ee7a3aa0-96f0-4141-a430-7c3d3be3eb61 ] Request (VolumesTransfersV3RbacTest:test_accept_volume_transfer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:19:40.668 193 DEBUG tempest.lib.common.rest_client [req-ee7a3aa0-96f0-4141-a430-7c3d3be3eb61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee7a3aa0-96f0-4141-a430-7c3d3be3eb61', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21eec2608c394756a6fced2b31462577", "name": "tempest-VolumesTransfersV3RbacTest-442473916", "password_expires_at": null}, "audit_ids": ["iXqsMbSYRU6BPrPmZMKVdA"], "expires_at": "2020-12-14T03:19:40.000000Z", "issued_at": "2020-12-14T02:19:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "02757feb81fe4551841e4147d355201e", "name": "tempest-VolumesTransfersV3RbacTest-442473916"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:40.707 186 INFO tempest.lib.common.rest_client [req-844ce7c2-4f08-4a38-a7e0-ce235ae1df2d ] Request (ServiceProvidersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2/users/c737450b12934d37a4a56efebd7c5a15/roles 0.057s 2020-12-14 02:19:40.710 186 DEBUG tempest.lib.common.rest_client [req-844ce7c2-4f08-4a38-a7e0-ce235ae1df2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-844ce7c2-4f08-4a38-a7e0-ce235ae1df2d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2/users/c737450b12934d37a4a56efebd7c5a15/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2/users/c737450b12934d37a4a56efebd7c5a15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:40.779 186 INFO tempest.lib.common.rest_client [req-d072541e-6133-44f4-ae96-4d5a6090a8d6 ] Request (ServiceProvidersRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2/users/c737450b12934d37a4a56efebd7c5a15/roles/72a4576c553448cd941b052c1ca0cf2d 0.062s 2020-12-14 02:19:40.782 186 DEBUG tempest.lib.common.rest_client [req-d072541e-6133-44f4-ae96-4d5a6090a8d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d072541e-6133-44f4-ae96-4d5a6090a8d6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2/users/c737450b12934d37a4a56efebd7c5a15/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:40.858 193 INFO tempest.lib.common.rest_client [req-b4534111-62aa-4cc5-b613-45f4e18ef524 ] Request (VolumesTransfersV3RbacTest:test_accept_volume_transfer): 200 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33 0.181s 2020-12-14 02:19:40.861 193 DEBUG tempest.lib.common.rest_client [req-b4534111-62aa-4cc5-b613-45f4e18ef524 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b4534111-62aa-4cc5-b613-45f4e18ef524', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b4534111-62aa-4cc5-b613-45f4e18ef524', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33'} Body: b'{"volume": {"id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:38.000000", "updated_at": "2020-12-14T02:19:40.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1996875304", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}], "user_id": "21eec2608c394756a6fced2b31462577", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "02757feb81fe4551841e4147d355201e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:40.904 186 INFO tempest.lib.common.rest_client [req-24a7590f-bd94-42a6-9736-925ed88c8cef ] Request (ServiceProvidersRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2/users/c737450b12934d37a4a56efebd7c5a15/roles/a629c95d64b3416fb80ae90af4f69c05 0.116s 2020-12-14 02:19:40.907 186 DEBUG tempest.lib.common.rest_client [req-24a7590f-bd94-42a6-9736-925ed88c8cef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24a7590f-bd94-42a6-9736-925ed88c8cef', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2/users/c737450b12934d37a4a56efebd7c5a15/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:40.949 197 INFO tempest.lib.common.rest_client [req-b485f101-233a-45b5-bbdd-653db6f6432f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.248s 2020-12-14 02:19:40.953 197 DEBUG tempest.lib.common.rest_client [req-b485f101-233a-45b5-bbdd-653db6f6432f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b485f101-233a-45b5-bbdd-653db6f6432f', 'x-compute-request-id': 'req-b485f101-233a-45b5-bbdd-653db6f6432f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:40.958 193 INFO tempest.common.waiters [-] volume 5edc7823-0bc2-42bd-8953-3f06e7073d33 reached available after waiting for 0.957821 seconds 2020-12-14 02:19:40.996 193 INFO tempest.lib.common.rest_client [req-10e3ce2a-9d9f-4838-9ea1-7418fbca376e ] Request (VolumesTransfersV3RbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/c7cca436-db64-44bb-a255-543594b12c91 0.032s 2020-12-14 02:19:40.999 193 DEBUG tempest.lib.common.rest_client [req-10e3ce2a-9d9f-4838-9ea1-7418fbca376e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-10e3ce2a-9d9f-4838-9ea1-7418fbca376e', 'x-openstack-request-id': 'req-10e3ce2a-9d9f-4838-9ea1-7418fbca376e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/c7cca436-db64-44bb-a255-543594b12c91'} Body: b'{"itemNotFound": {"code": 404, "message": "Transfer c7cca436-db64-44bb-a255-543594b12c91 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:41.089 193 INFO tempest.lib.common.rest_client [req-b1785740-b6f1-4907-85eb-e2baffcadb04 ] Request (VolumesTransfersV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33 0.081s 2020-12-14 02:19:41.092 193 DEBUG tempest.lib.common.rest_client [req-b1785740-b6f1-4907-85eb-e2baffcadb04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b1785740-b6f1-4907-85eb-e2baffcadb04', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b1785740-b6f1-4907-85eb-e2baffcadb04', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33'} Body: b'{"volume": {"id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:38.000000", "updated_at": "2020-12-14T02:19:40.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1996875304", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}], "user_id": "21eec2608c394756a6fced2b31462577", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "02757feb81fe4551841e4147d355201e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:41.189 193 INFO tempest.common.waiters [-] volume 5edc7823-0bc2-42bd-8953-3f06e7073d33 reached available after waiting for 0.189279 seconds 2020-12-14 02:19:41.201 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:41.219 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:create_transfer, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:41.222 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:41.334 193 INFO tempest.lib.common.rest_client [req-ed47e91e-52ed-490d-87ab-4a2ec44f17d9 ] Request (VolumesTransfersV3RbacTest:test_create_volume_transfer): 200 GET http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles 0.106s 2020-12-14 02:19:41.337 193 DEBUG tempest.lib.common.rest_client [req-ed47e91e-52ed-490d-87ab-4a2ec44f17d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed47e91e-52ed-490d-87ab-4a2ec44f17d9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:41.435 193 INFO tempest.lib.common.rest_client [req-f4658651-9b97-49fa-9946-14804333705a ] Request (VolumesTransfersV3RbacTest:test_create_volume_transfer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:19:41.439 193 DEBUG tempest.lib.common.rest_client [req-f4658651-9b97-49fa-9946-14804333705a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4658651-9b97-49fa-9946-14804333705a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21eec2608c394756a6fced2b31462577", "name": "tempest-VolumesTransfersV3RbacTest-442473916", "password_expires_at": null}, "audit_ids": ["tK07l-MFTU-Zx7w6ONWxZw"], "expires_at": "2020-12-14T03:19:41.000000Z", "issued_at": "2020-12-14T02:19:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "02757feb81fe4551841e4147d355201e", "name": "tempest-VolumesTransfersV3RbacTest-442473916"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:41.445 189 INFO tempest.lib.common.rest_client [req-2bc4826d-3c09-4989-bc1f-2c0736f6c17c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.244s 2020-12-14 02:19:41.448 189 DEBUG tempest.lib.common.rest_client [req-2bc4826d-3c09-4989-bc1f-2c0736f6c17c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2bc4826d-3c09-4989-bc1f-2c0736f6c17c', 'x-compute-request-id': 'req-2bc4826d-3c09-4989-bc1f-2c0736f6c17c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:41.649 193 INFO tempest.lib.common.rest_client [req-7803e9d5-e9f6-4671-b3ad-fdfc303fb629 ] Request (VolumesTransfersV3RbacTest:test_create_volume_transfer): 202 POST http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer 0.201s 2020-12-14 02:19:41.653 193 DEBUG tempest.lib.common.rest_client [req-7803e9d5-e9f6-4671-b3ad-fdfc303fb629 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"transfer": {"volume_id": "5edc7823-0bc2-42bd-8953-3f06e7073d33"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7803e9d5-e9f6-4671-b3ad-fdfc303fb629', 'content-length': '509', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7803e9d5-e9f6-4671-b3ad-fdfc303fb629', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer'} Body: b'{"transfer": {"id": "720dcac7-15a1-4640-9f6f-219345f7e183", "created_at": "2020-12-14T02:19:41.615220", "name": null, "volume_id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "auth_key": "731af4286070b227", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/720dcac7-15a1-4640-9f6f-219345f7e183"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/os-volume-transfer/720dcac7-15a1-4640-9f6f-219345f7e183"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:41.683 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:41.746 193 INFO tempest.lib.common.rest_client [req-5ffd9558-bdab-43fb-8ee4-10fc1b38c532 ] Request (VolumesTransfersV3RbacTest:test_create_volume_transfer): 200 GET http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles 0.057s 2020-12-14 02:19:41.748 193 DEBUG tempest.lib.common.rest_client [req-5ffd9558-bdab-43fb-8ee4-10fc1b38c532 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ffd9558-bdab-43fb-8ee4-10fc1b38c532', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:41.799 193 INFO tempest.lib.common.rest_client [req-9537dd04-0ba3-47b5-8f75-2ff1c59a3647 ] Request (VolumesTransfersV3RbacTest:test_create_volume_transfer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:19:41.803 193 DEBUG tempest.lib.common.rest_client [req-9537dd04-0ba3-47b5-8f75-2ff1c59a3647 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9537dd04-0ba3-47b5-8f75-2ff1c59a3647', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21eec2608c394756a6fced2b31462577", "name": "tempest-VolumesTransfersV3RbacTest-442473916", "password_expires_at": null}, "audit_ids": ["2H5jCFwaS8yvvaI3o-6HEQ"], "expires_at": "2020-12-14T03:19:41.000000Z", "issued_at": "2020-12-14T02:19:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "02757feb81fe4551841e4147d355201e", "name": "tempest-VolumesTransfersV3RbacTest-442473916"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:41.947 193 INFO tempest.lib.common.rest_client [req-c0c26e1f-d82f-42a6-a165-1f64311aeb95 ] Request (VolumesTransfersV3RbacTest:test_create_volume_transfer): 200 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33 0.135s 2020-12-14 02:19:41.951 193 DEBUG tempest.lib.common.rest_client [req-c0c26e1f-d82f-42a6-a165-1f64311aeb95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c0c26e1f-d82f-42a6-a165-1f64311aeb95', 'content-length': '1078', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c0c26e1f-d82f-42a6-a165-1f64311aeb95', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33'} Body: b'{"volume": {"id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "status": "awaiting-transfer", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:38.000000", "updated_at": "2020-12-14T02:19:42.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1996875304", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}], "user_id": "21eec2608c394756a6fced2b31462577", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "02757feb81fe4551841e4147d355201e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:42.012 186 INFO tempest.lib.common.rest_client [req-6cd5c068-83e8-47ce-9a68-2ad61dacd237 ] Request (ServiceProvidersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:19:42.016 186 DEBUG tempest.lib.common.rest_client [req-6cd5c068-83e8-47ce-9a68-2ad61dacd237 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6cd5c068-83e8-47ce-9a68-2ad61dacd237', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c737450b12934d37a4a56efebd7c5a15", "name": "tempest-ServiceProvidersRbacTest-1352991695", "password_expires_at": null}, "audit_ids": ["RASBE2pfQu6c5xqZaD-WnQ"], "expires_at": "2020-12-14T03:19:41.000000Z", "issued_at": "2020-12-14T02:19:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b8b743b9c9a645b3b3d508c881e7d2a2", "name": "tempest-ServiceProvidersRbacTest-1352991695"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:42.027 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:42.046 193 INFO tempest.common.waiters [-] volume 5edc7823-0bc2-42bd-8953-3f06e7073d33 reached awaiting-transfer after waiting for 0.046596 seconds 2020-12-14 02:19:42.050 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_service_provider, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:42.052 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:42.119 186 INFO tempest.lib.common.rest_client [req-dc5ab849-de96-44c1-b5e3-876662fc8bd9 ] Request (ServiceProvidersRbacTest:test_list_service_providers): 200 GET http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2/users/c737450b12934d37a4a56efebd7c5a15/roles 0.061s 2020-12-14 02:19:42.124 186 DEBUG tempest.lib.common.rest_client [req-dc5ab849-de96-44c1-b5e3-876662fc8bd9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc5ab849-de96-44c1-b5e3-876662fc8bd9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2/users/c737450b12934d37a4a56efebd7c5a15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2/users/c737450b12934d37a4a56efebd7c5a15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:42.176 193 INFO tempest.lib.common.rest_client [req-954329c8-645a-4b0f-8b91-acbf2ba0b455 ] Request (VolumesTransfersV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/720dcac7-15a1-4640-9f6f-219345f7e183 0.121s 2020-12-14 02:19:42.178 186 INFO tempest.lib.common.rest_client [req-a0795f34-bb7e-41a6-9bdc-f0addeaf2ce3 ] Request (ServiceProvidersRbacTest:test_list_service_providers): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:19:42.179 193 DEBUG tempest.lib.common.rest_client [req-954329c8-645a-4b0f-8b91-acbf2ba0b455 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-954329c8-645a-4b0f-8b91-acbf2ba0b455', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/720dcac7-15a1-4640-9f6f-219345f7e183'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:42.181 186 DEBUG tempest.lib.common.rest_client [req-a0795f34-bb7e-41a6-9bdc-f0addeaf2ce3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0795f34-bb7e-41a6-9bdc-f0addeaf2ce3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c737450b12934d37a4a56efebd7c5a15", "name": "tempest-ServiceProvidersRbacTest-1352991695", "password_expires_at": null}, "audit_ids": ["HJZm0ZhtRG-vItl7IOlj4g"], "expires_at": "2020-12-14T03:19:42.000000Z", "issued_at": "2020-12-14T02:19:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b8b743b9c9a645b3b3d508c881e7d2a2", "name": "tempest-ServiceProvidersRbacTest-1352991695"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:42.251 197 INFO tempest.lib.common.rest_client [req-9147ad98-40e8-43fd-a06d-0b5507fb23c6 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.191s 2020-12-14 02:19:42.254 197 DEBUG tempest.lib.common.rest_client [req-9147ad98-40e8-43fd-a06d-0b5507fb23c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9147ad98-40e8-43fd-a06d-0b5507fb23c6', 'x-compute-request-id': 'req-9147ad98-40e8-43fd-a06d-0b5507fb23c6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:42.277 193 INFO tempest.lib.common.rest_client [req-54d5961f-d192-4047-b1fc-3b120bdd68b7 ] Request (VolumesTransfersV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33 0.087s 2020-12-14 02:19:42.281 193 DEBUG tempest.lib.common.rest_client [req-54d5961f-d192-4047-b1fc-3b120bdd68b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-54d5961f-d192-4047-b1fc-3b120bdd68b7', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-54d5961f-d192-4047-b1fc-3b120bdd68b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33'} Body: b'{"volume": {"id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:38.000000", "updated_at": "2020-12-14T02:19:42.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1996875304", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}], "user_id": "21eec2608c394756a6fced2b31462577", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "02757feb81fe4551841e4147d355201e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:42.357 186 INFO tempest.lib.common.rest_client [req-afe548ae-9dca-4440-996e-f51953a54712 ] Request (ServiceProvidersRbacTest:test_list_service_providers): 200 GET http://172.30.13.94:9696/v2.0/service-providers 0.167s 2020-12-14 02:19:42.361 186 DEBUG tempest.lib.common.rest_client [req-afe548ae-9dca-4440-996e-f51953a54712 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '304', 'x-openstack-request-id': 'req-afe548ae-9dca-4440-996e-f51953a54712', 'date': 'Mon, 14 Dec 2020 02:19:42 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/service-providers'} Body: b'{"service_providers": [{"service_type": "L3_ROUTER_NAT", "name": "dvrha", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "dvr", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "ha", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "single_node", "default": false}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:42.364 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:42.398 193 INFO tempest.common.waiters [-] volume 5edc7823-0bc2-42bd-8953-3f06e7073d33 reached available after waiting for 0.398704 seconds 2020-12-14 02:19:42.411 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:42.430 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:delete_transfer, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:42.436 186 INFO tempest.lib.common.rest_client [req-97b715cc-0fd7-40ef-ac74-7b55f209ff43 ] Request (ServiceProvidersRbacTest:test_list_service_providers): 200 GET http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2/users/c737450b12934d37a4a56efebd7c5a15/roles 0.066s 2020-12-14 02:19:42.441 186 DEBUG tempest.lib.common.rest_client [req-97b715cc-0fd7-40ef-ac74-7b55f209ff43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97b715cc-0fd7-40ef-ac74-7b55f209ff43', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2/users/c737450b12934d37a4a56efebd7c5a15/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2/users/c737450b12934d37a4a56efebd7c5a15/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:42.490 186 INFO tempest.lib.common.rest_client [req-8b6e9291-0459-4a90-9131-d845aff97fe8 ] Request (ServiceProvidersRbacTest:test_list_service_providers): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:19:42.493 186 DEBUG tempest.lib.common.rest_client [req-8b6e9291-0459-4a90-9131-d845aff97fe8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b6e9291-0459-4a90-9131-d845aff97fe8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c737450b12934d37a4a56efebd7c5a15", "name": "tempest-ServiceProvidersRbacTest-1352991695", "password_expires_at": null}, "audit_ids": ["u0iEt09BRwyP-Hjs6phCPw"], "expires_at": "2020-12-14T03:19:42.000000Z", "issued_at": "2020-12-14T02:19:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b8b743b9c9a645b3b3d508c881e7d2a2", "name": "tempest-ServiceProvidersRbacTest-1352991695"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b8b743b9c9a645b3b3d508c881e7d2a2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:42.557 193 INFO tempest.lib.common.rest_client [req-261ce552-1266-451f-9420-abd4b7fd2105 ] Request (VolumesTransfersV3RbacTest:test_delete_volume_transfer): 202 POST http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer 0.120s 2020-12-14 02:19:42.560 193 DEBUG tempest.lib.common.rest_client [req-261ce552-1266-451f-9420-abd4b7fd2105 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"transfer": {"volume_id": "5edc7823-0bc2-42bd-8953-3f06e7073d33"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-261ce552-1266-451f-9420-abd4b7fd2105', 'content-length': '509', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-261ce552-1266-451f-9420-abd4b7fd2105', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer'} Body: b'{"transfer": {"id": "0d4c6520-7c8f-408d-9410-0a688b7b3f6d", "created_at": "2020-12-14T02:19:42.516854", "name": null, "volume_id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "auth_key": "caad652231f7fa4a", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/0d4c6520-7c8f-408d-9410-0a688b7b3f6d"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/os-volume-transfer/0d4c6520-7c8f-408d-9410-0a688b7b3f6d"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:42.658 186 INFO tempest.lib.common.rest_client [req-4700a550-2049-4dc1-a3ec-3578f0151ffa ] Request (ServiceProvidersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/c737450b12934d37a4a56efebd7c5a15 0.148s 2020-12-14 02:19:42.662 186 DEBUG tempest.lib.common.rest_client [req-4700a550-2049-4dc1-a3ec-3578f0151ffa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4700a550-2049-4dc1-a3ec-3578f0151ffa', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/c737450b12934d37a4a56efebd7c5a15'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:42.697 193 INFO tempest.lib.common.rest_client [req-45356480-fcaa-4f98-9d59-e2bc1fc5f8c7 ] Request (VolumesTransfersV3RbacTest:test_delete_volume_transfer): 200 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33 0.101s 2020-12-14 02:19:42.700 193 DEBUG tempest.lib.common.rest_client [req-45356480-fcaa-4f98-9d59-e2bc1fc5f8c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-45356480-fcaa-4f98-9d59-e2bc1fc5f8c7', 'content-length': '1078', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-45356480-fcaa-4f98-9d59-e2bc1fc5f8c7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33'} Body: b'{"volume": {"id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "status": "awaiting-transfer", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:38.000000", "updated_at": "2020-12-14T02:19:43.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1996875304", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}], "user_id": "21eec2608c394756a6fced2b31462577", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "02757feb81fe4551841e4147d355201e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:42.760 186 INFO tempest.lib.common.rest_client [req-2e0bde1d-b54d-447e-bdc8-cabc842c4242 ] Request (ServiceProvidersRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:19:42.763 186 DEBUG tempest.lib.common.rest_client [req-2e0bde1d-b54d-447e-bdc8-cabc842c4242 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e0bde1d-b54d-447e-bdc8-cabc842c4242', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Xvz5RUUWRDC5_cc5Yd1NMg"], "expires_at": "2020-12-14T03:19:42.000000Z", "issued_at": "2020-12-14T02:19:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:42.775 189 INFO tempest.lib.common.rest_client [req-70822e3f-3e2f-452f-bf1b-b4d6f2c2c3bd ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.219s 2020-12-14 02:19:42.777 189 DEBUG tempest.lib.common.rest_client [req-70822e3f-3e2f-452f-bf1b-b4d6f2c2c3bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-70822e3f-3e2f-452f-bf1b-b4d6f2c2c3bd', 'x-compute-request-id': 'req-70822e3f-3e2f-452f-bf1b-b4d6f2c2c3bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:42.797 193 INFO tempest.common.waiters [-] volume 5edc7823-0bc2-42bd-8953-3f06e7073d33 reached awaiting-transfer after waiting for 0.796840 seconds 2020-12-14 02:19:42.799 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:42.865 193 INFO tempest.lib.common.rest_client [req-ae082915-41cc-4689-8298-2b25ae12b8e4 ] Request (VolumesTransfersV3RbacTest:test_delete_volume_transfer): 200 GET http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles 0.059s 2020-12-14 02:19:42.868 193 DEBUG tempest.lib.common.rest_client [req-ae082915-41cc-4689-8298-2b25ae12b8e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae082915-41cc-4689-8298-2b25ae12b8e4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:42.959 193 INFO tempest.lib.common.rest_client [req-09a898e7-ec8f-46ef-bed6-7f2391eac1c4 ] Request (VolumesTransfersV3RbacTest:test_delete_volume_transfer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-12-14 02:19:42.963 193 DEBUG tempest.lib.common.rest_client [req-09a898e7-ec8f-46ef-bed6-7f2391eac1c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-09a898e7-ec8f-46ef-bed6-7f2391eac1c4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21eec2608c394756a6fced2b31462577", "name": "tempest-VolumesTransfersV3RbacTest-442473916", "password_expires_at": null}, "audit_ids": ["NTXUKJw2SJGvVXJERM6wnw"], "expires_at": "2020-12-14T03:19:42.000000Z", "issued_at": "2020-12-14T02:19:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "02757feb81fe4551841e4147d355201e", "name": "tempest-VolumesTransfersV3RbacTest-442473916"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.018 186 INFO tempest.lib.common.rest_client [req-eac7ae88-0fc5-470c-9c58-e11809279b6f ] Request (ServiceProvidersRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=b8b743b9c9a645b3b3d508c881e7d2a2&name=default 0.247s 2020-12-14 02:19:43.020 186 DEBUG tempest.lib.common.rest_client [req-eac7ae88-0fc5-470c-9c58-e11809279b6f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-eac7ae88-0fc5-470c-9c58-e11809279b6f', 'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=b8b743b9c9a645b3b3d508c881e7d2a2&name=default'} Body: b'{"security_groups": [{"id": "5850b201-0bd8-4daa-91e9-27f378487da1", "name": "default", "stateful": true, "tenant_id": "b8b743b9c9a645b3b3d508c881e7d2a2", "description": "Default security group", "security_group_rules": [{"id": "4b99fe31-d040-4ed8-b78c-0db3e7e1e4ca", "tenant_id": "b8b743b9c9a645b3b3d508c881e7d2a2", "security_group_id": "5850b201-0bd8-4daa-91e9-27f378487da1", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:42Z", "updated_at": "2020-12-14T02:19:42Z", "revision_number": 0, "project_id": "b8b743b9c9a645b3b3d508c881e7d2a2"}, {"id": "744be571-e9cd-4278-8f52-db2bacaefa40", "tenant_id": "b8b743b9c9a645b3b3d508c881e7d2a2", "security_group_id": "5850b201-0bd8-4daa-91e9-27f378487da1", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5850b201-0bd8-4daa-91e9-27f378487da1", "description": null, "tags": [], "created_at": "2020-12-14T02:19:42Z", "updated_at": "2020-12-14T02:19:42Z", "revision_number": 0, "project_id": "b8b743b9c9a645b3b3d508c881e7d2a2"}, {"id": "ce8bdd13-71da-4e7d-8d36-b377abb78cd9", "tenant_id": "b8b743b9c9a645b3b3d508c881e7d2a2", "security_group_id": "5850b201-0bd8-4daa-91e9-27f378487da1", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:42Z", "updated_at": "2020-12-14T02:19:42Z", "revision_number": 0, "project_id": "b8b743b9c9a645b3b3d508c881e7d2a2"}, {"id": "eec4e1a4-e2d6-48a7-b45e-40cf2f3864c0", "tenant_id": "b8b743b9c9a645b3b3d508c881e7d2a2", "security_group_id": "5850b201-0bd8-4daa-91e9-27f378487da1", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5850b201-0bd8-4daa-91e9-27f378487da1", "description": null, "tags": [], "created_at": "2020-12-14T02:19:42Z", "updated_at": "2020-12-14T02:19:42Z", "revision_number": 0, "project_id": "b8b743b9c9a645b3b3d508c881e7d2a2"}], "tags": [], "created_at": "2020-12-14T02:19:42Z", "updated_at": "2020-12-14T02:19:42Z", "revision_number": 1, "project_id": "b8b743b9c9a645b3b3d508c881e7d2a2"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.159 186 INFO tempest.lib.common.rest_client [req-6d2fa36a-bb9b-413f-8606-a1d31ca3fb46 ] Request (ServiceProvidersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/5850b201-0bd8-4daa-91e9-27f378487da1 0.132s 2020-12-14 02:19:43.162 186 DEBUG tempest.lib.common.rest_client [req-6d2fa36a-bb9b-413f-8606-a1d31ca3fb46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6d2fa36a-bb9b-413f-8606-a1d31ca3fb46', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5850b201-0bd8-4daa-91e9-27f378487da1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.201 193 INFO tempest.lib.common.rest_client [req-843a59a2-a116-458a-a8ea-36da9015e3b9 ] Request (VolumesTransfersV3RbacTest:test_delete_volume_transfer): 202 DELETE http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/0d4c6520-7c8f-408d-9410-0a688b7b3f6d 0.231s 2020-12-14 02:19:43.204 193 DEBUG tempest.lib.common.rest_client [req-843a59a2-a116-458a-a8ea-36da9015e3b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-843a59a2-a116-458a-a8ea-36da9015e3b9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/0d4c6520-7c8f-408d-9410-0a688b7b3f6d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.207 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:43.274 193 INFO tempest.lib.common.rest_client [req-28e76408-1608-4031-b43e-1548ecf6dd0b ] Request (VolumesTransfersV3RbacTest:test_delete_volume_transfer): 200 GET http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles 0.061s 2020-12-14 02:19:43.276 193 DEBUG tempest.lib.common.rest_client [req-28e76408-1608-4031-b43e-1548ecf6dd0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28e76408-1608-4031-b43e-1548ecf6dd0b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.297 186 INFO tempest.lib.common.rest_client [req-c276562d-a8a2-48bf-a5f0-c0ec764cf7e5 ] Request (ServiceProvidersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2 0.127s 2020-12-14 02:19:43.299 186 DEBUG tempest.lib.common.rest_client [req-c276562d-a8a2-48bf-a5f0-c0ec764cf7e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c276562d-a8a2-48bf-a5f0-c0ec764cf7e5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b8b743b9c9a645b3b3d508c881e7d2a2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.365 193 INFO tempest.lib.common.rest_client [req-0c27720f-9660-4487-ad1d-83f836741e20 ] Request (VolumesTransfersV3RbacTest:test_delete_volume_transfer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-12-14 02:19:43.369 193 DEBUG tempest.lib.common.rest_client [req-0c27720f-9660-4487-ad1d-83f836741e20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c27720f-9660-4487-ad1d-83f836741e20', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21eec2608c394756a6fced2b31462577", "name": "tempest-VolumesTransfersV3RbacTest-442473916", "password_expires_at": null}, "audit_ids": ["f3GRoO9NQlOyOjx8pEDF7w"], "expires_at": "2020-12-14T03:19:43.000000Z", "issued_at": "2020-12-14T02:19:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "02757feb81fe4551841e4147d355201e", "name": "tempest-VolumesTransfersV3RbacTest-442473916"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.413 186 INFO tempest.lib.common.rest_client [req-7c95ab05-c361-4de2-ab75-9884b500b195 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:19:43.417 186 DEBUG tempest.lib.common.rest_client [req-7c95ab05-c361-4de2-ab75-9884b500b195 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7c95ab05-c361-4de2-ab75-9884b500b195', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["aI8at_1ZTi621DP9Da31Bw"], "expires_at": "2020-12-14T03:19:43.000000Z", "issued_at": "2020-12-14T02:19:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.512 186 INFO tempest.lib.common.rest_client [req-a512c998-16b6-4b76-8bf8-6b319f1c5a70 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:19:43.515 186 DEBUG tempest.lib.common.rest_client [req-a512c998-16b6-4b76-8bf8-6b319f1c5a70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a512c998-16b6-4b76-8bf8-6b319f1c5a70', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["mCWPqRLASjiepDMq4vil4g"], "expires_at": "2020-12-14T03:19:43.000000Z", "issued_at": "2020-12-14T02:19:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.578 193 INFO tempest.lib.common.rest_client [req-9362b881-4b9e-4c65-8efd-f13e27634650 ] Request (VolumesTransfersV3RbacTest:test_delete_volume_transfer): 200 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33 0.201s 2020-12-14 02:19:43.580 186 INFO tempest.lib.common.rest_client [req-e1e0a901-3b05-4102-ac11-9db08846352c ] Request (TrunksExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.058s 2020-12-14 02:19:43.582 193 DEBUG tempest.lib.common.rest_client [req-9362b881-4b9e-4c65-8efd-f13e27634650 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9362b881-4b9e-4c65-8efd-f13e27634650', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9362b881-4b9e-4c65-8efd-f13e27634650', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33'} Body: b'{"volume": {"id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:38.000000", "updated_at": "2020-12-14T02:19:43.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1996875304", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}], "user_id": "21eec2608c394756a6fced2b31462577", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "02757feb81fe4551841e4147d355201e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.583 186 DEBUG tempest.lib.common.rest_client [req-e1e0a901-3b05-4102-ac11-9db08846352c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1e0a901-3b05-4102-ac11-9db08846352c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.587 197 INFO tempest.lib.common.rest_client [req-aa2a5558-f797-4ed8-97b8-18c828cee7fd ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.226s 2020-12-14 02:19:43.590 197 DEBUG tempest.lib.common.rest_client [req-aa2a5558-f797-4ed8-97b8-18c828cee7fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aa2a5558-f797-4ed8-97b8-18c828cee7fd', 'x-compute-request-id': 'req-aa2a5558-f797-4ed8-97b8-18c828cee7fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.660 186 INFO tempest.lib.common.rest_client [req-42634fe6-d5a7-4843-a56e-8df4b3c64a21 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.069s 2020-12-14 02:19:43.662 186 DEBUG tempest.lib.common.rest_client [req-42634fe6-d5a7-4843-a56e-8df4b3c64a21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-TrunksExtRbacTest-907243346-desc", "domain_id": "default", "name": "tempest-TrunksExtRbacTest-907243346"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '370', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42634fe6-d5a7-4843-a56e-8df4b3c64a21', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346", "domain_id": "default", "description": "tempest-TrunksExtRbacTest-907243346-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.681 193 INFO tempest.common.waiters [-] volume 5edc7823-0bc2-42bd-8953-3f06e7073d33 reached available after waiting for 0.681503 seconds 2020-12-14 02:19:43.735 193 INFO tempest.lib.common.rest_client [req-f90d68f6-ae81-4300-a333-66634e3b9e24 ] Request (VolumesTransfersV3RbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/0d4c6520-7c8f-408d-9410-0a688b7b3f6d 0.042s 2020-12-14 02:19:43.738 193 DEBUG tempest.lib.common.rest_client [req-f90d68f6-ae81-4300-a333-66634e3b9e24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-f90d68f6-ae81-4300-a333-66634e3b9e24', 'x-openstack-request-id': 'req-f90d68f6-ae81-4300-a333-66634e3b9e24', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/0d4c6520-7c8f-408d-9410-0a688b7b3f6d'} Body: b'{"itemNotFound": {"code": 404, "message": "Transfer 0d4c6520-7c8f-408d-9410-0a688b7b3f6d could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.824 186 INFO tempest.lib.common.rest_client [req-4c637fd5-ea66-474c-aa29-6bfaf06e8e85 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.153s 2020-12-14 02:19:43.826 186 DEBUG tempest.lib.common.rest_client [req-4c637fd5-ea66-474c-aa29-6bfaf06e8e85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-TrunksExtRbacTest-907243346", "password": "H4_&5PjzlRsV_Px", "project_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "email": "tempest-TrunksExtRbacTest-1089827435@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '389', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c637fd5-ea66-474c-aa29-6bfaf06e8e85', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "email": "tempest-TrunksExtRbacTest-1089827435@example.com", "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/340bcec773704953be7ef7be3aa3ac96"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.840 193 INFO tempest.lib.common.rest_client [req-1c15082d-2c5e-401b-9a32-2183b5d52935 ] Request (VolumesTransfersV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33 0.091s 2020-12-14 02:19:43.843 193 DEBUG tempest.lib.common.rest_client [req-1c15082d-2c5e-401b-9a32-2183b5d52935 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1c15082d-2c5e-401b-9a32-2183b5d52935', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1c15082d-2c5e-401b-9a32-2183b5d52935', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33'} Body: b'{"volume": {"id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:38.000000", "updated_at": "2020-12-14T02:19:43.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1996875304", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}], "user_id": "21eec2608c394756a6fced2b31462577", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "02757feb81fe4551841e4147d355201e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.892 186 INFO tempest.lib.common.rest_client [req-182149cb-9c15-4785-8a21-daf772129df7 ] Request (TrunksExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-12-14 02:19:43.895 186 DEBUG tempest.lib.common.rest_client [req-182149cb-9c15-4785-8a21-daf772129df7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-182149cb-9c15-4785-8a21-daf772129df7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.940 193 INFO tempest.common.waiters [-] volume 5edc7823-0bc2-42bd-8953-3f06e7073d33 reached available after waiting for 0.940255 seconds 2020-12-14 02:19:43.953 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:43.967 186 INFO tempest.lib.common.rest_client [req-e5631c85-45eb-4a47-b6ce-6215d6cb420b ] Request (TrunksExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:19:43.970 186 DEBUG tempest.lib.common.rest_client [req-e5631c85-45eb-4a47-b6ce-6215d6cb420b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5631c85-45eb-4a47-b6ce-6215d6cb420b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:43.972 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_transfer, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:44.066 186 INFO tempest.lib.common.rest_client [req-1431bb74-3e81-4a86-ae95-073155472f8a ] Request (TrunksExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles/72a4576c553448cd941b052c1ca0cf2d 0.087s 2020-12-14 02:19:44.069 186 DEBUG tempest.lib.common.rest_client [req-1431bb74-3e81-4a86-ae95-073155472f8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1431bb74-3e81-4a86-ae95-073155472f8a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:44.072 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-TrunksExtRbacTest-907243346', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0580a94f4c5f40d4af1ccb4b673c89c6', 'project_name': 'tempest-TrunksExtRbacTest-907243346', 'tenant_id': '0580a94f4c5f40d4af1ccb4b673c89c6', 'tenant_name': 'tempest-TrunksExtRbacTest-907243346', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '340bcec773704953be7ef7be3aa3ac96'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:44.074 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-TrunksExtRbacTest-907243346', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0580a94f4c5f40d4af1ccb4b673c89c6', 'project_name': 'tempest-TrunksExtRbacTest-907243346', 'tenant_id': '0580a94f4c5f40d4af1ccb4b673c89c6', 'tenant_name': 'tempest-TrunksExtRbacTest-907243346', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '340bcec773704953be7ef7be3aa3ac96'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:44.088 193 INFO tempest.lib.common.rest_client [req-c95aabd7-3a38-4276-9137-f223497ae23f ] Request (VolumesTransfersV3RbacTest:test_get_volume_transfer): 202 POST http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer 0.110s 2020-12-14 02:19:44.090 189 INFO tempest.lib.common.rest_client [req-ea305bc4-1162-44b2-a074-c5202eab4342 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.205s 2020-12-14 02:19:44.091 193 DEBUG tempest.lib.common.rest_client [req-c95aabd7-3a38-4276-9137-f223497ae23f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"transfer": {"volume_id": "5edc7823-0bc2-42bd-8953-3f06e7073d33"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c95aabd7-3a38-4276-9137-f223497ae23f', 'content-length': '509', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c95aabd7-3a38-4276-9137-f223497ae23f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer'} Body: b'{"transfer": {"id": "6f1c6f0a-dc86-42a3-8cb2-26787e8e474b", "created_at": "2020-12-14T02:19:44.056723", "name": null, "volume_id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "auth_key": "3e510dfcec130b8e", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/6f1c6f0a-dc86-42a3-8cb2-26787e8e474b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/os-volume-transfer/6f1c6f0a-dc86-42a3-8cb2-26787e8e474b"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:44.093 189 DEBUG tempest.lib.common.rest_client [req-ea305bc4-1162-44b2-a074-c5202eab4342 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ea305bc4-1162-44b2-a074-c5202eab4342', 'x-compute-request-id': 'req-ea305bc4-1162-44b2-a074-c5202eab4342', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:44.196 193 INFO tempest.lib.common.rest_client [req-3e08d20b-133a-48b9-8750-31a83ef3facb ] Request (VolumesTransfersV3RbacTest:test_get_volume_transfer): 200 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33 0.071s 2020-12-14 02:19:44.199 193 DEBUG tempest.lib.common.rest_client [req-3e08d20b-133a-48b9-8750-31a83ef3facb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3e08d20b-133a-48b9-8750-31a83ef3facb', 'content-length': '1078', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3e08d20b-133a-48b9-8750-31a83ef3facb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33'} Body: b'{"volume": {"id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "status": "awaiting-transfer", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:38.000000", "updated_at": "2020-12-14T02:19:44.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1996875304", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}], "user_id": "21eec2608c394756a6fced2b31462577", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "02757feb81fe4551841e4147d355201e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:44.265 186 INFO tempest.lib.common.rest_client [req-ec4e9e82-42f9-497b-ae47-ee624a30f143 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.125s 2020-12-14 02:19:44.268 186 DEBUG tempest.lib.common.rest_client [req-ec4e9e82-42f9-497b-ae47-ee624a30f143 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6563', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec4e9e82-42f9-497b-ae47-ee624a30f143', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["NbT5m8KqS2S8HbfIMm95Ng"], "expires_at": "2020-12-14T03:19:44.000000Z", "issued_at": "2020-12-14T02:19:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:44.272 186 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-12-14 02:19:44.294 193 INFO tempest.common.waiters [-] volume 5edc7823-0bc2-42bd-8953-3f06e7073d33 reached awaiting-transfer after waiting for 0.294669 seconds 2020-12-14 02:19:44.297 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:44.409 186 INFO tempest.lib.common.rest_client [req-b7f5de23-d123-445b-a371-1927e0d30884 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:19:44.413 186 DEBUG tempest.lib.common.rest_client [req-b7f5de23-d123-445b-a371-1927e0d30884 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7f5de23-d123-445b-a371-1927e0d30884', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["w6XdtUb0S8OdRJekU7Zs1w"], "expires_at": "2020-12-14T03:19:44.000000Z", "issued_at": "2020-12-14T02:19:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:44.423 193 INFO tempest.lib.common.rest_client [req-018d34d3-ba2e-472c-a7d8-10288a5ca447 ] Request (VolumesTransfersV3RbacTest:test_get_volume_transfer): 200 GET http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles 0.120s 2020-12-14 02:19:44.427 193 DEBUG tempest.lib.common.rest_client [req-018d34d3-ba2e-472c-a7d8-10288a5ca447 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-018d34d3-ba2e-472c-a7d8-10288a5ca447', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:44.524 186 INFO tempest.lib.common.rest_client [req-ab120176-1343-4a2d-9179-6cb654c11a68 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:19:44.527 186 DEBUG tempest.lib.common.rest_client [req-ab120176-1343-4a2d-9179-6cb654c11a68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ab120176-1343-4a2d-9179-6cb654c11a68', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["k6wO1mgZRt2dQsvwL77A8A"], "expires_at": "2020-12-14T03:19:44.000000Z", "issued_at": "2020-12-14T02:19:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:44.526 193 INFO tempest.lib.common.rest_client [req-fc17fc5f-0168-475d-87b7-7ea8c37afe48 ] Request (VolumesTransfersV3RbacTest:test_get_volume_transfer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:19:44.530 193 DEBUG tempest.lib.common.rest_client [req-fc17fc5f-0168-475d-87b7-7ea8c37afe48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc17fc5f-0168-475d-87b7-7ea8c37afe48', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21eec2608c394756a6fced2b31462577", "name": "tempest-VolumesTransfersV3RbacTest-442473916", "password_expires_at": null}, "audit_ids": ["MvxIEKiTTpWb9eXqGshCYg"], "expires_at": "2020-12-14T03:19:44.000000Z", "issued_at": "2020-12-14T02:19:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "02757feb81fe4551841e4147d355201e", "name": "tempest-VolumesTransfersV3RbacTest-442473916"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:44.592 186 INFO tempest.lib.common.rest_client [req-694a53a0-84ef-4dc9-8a11-418ff4eb9e6a ] Request (TrunksExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.058s 2020-12-14 02:19:44.595 186 DEBUG tempest.lib.common.rest_client [req-694a53a0-84ef-4dc9-8a11-418ff4eb9e6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-694a53a0-84ef-4dc9-8a11-418ff4eb9e6a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:44.662 186 INFO tempest.lib.common.rest_client [req-7341f825-863b-4f33-b18c-9d784018ec6d ] Request (TrunksExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:19:44.666 186 DEBUG tempest.lib.common.rest_client [req-7341f825-863b-4f33-b18c-9d784018ec6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7341f825-863b-4f33-b18c-9d784018ec6d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:44.667 193 INFO tempest.lib.common.rest_client [req-fb7b8e23-20cc-4a4f-86e4-741d1e804b3f ] Request (VolumesTransfersV3RbacTest:test_get_volume_transfer): 200 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/6f1c6f0a-dc86-42a3-8cb2-26787e8e474b 0.131s 2020-12-14 02:19:44.670 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:19:44.670 193 DEBUG tempest.lib.common.rest_client [req-fb7b8e23-20cc-4a4f-86e4-741d1e804b3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fb7b8e23-20cc-4a4f-86e4-741d1e804b3f', 'content-length': '477', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fb7b8e23-20cc-4a4f-86e4-741d1e804b3f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/6f1c6f0a-dc86-42a3-8cb2-26787e8e474b'} Body: b'{"transfer": {"id": "6f1c6f0a-dc86-42a3-8cb2-26787e8e474b", "created_at": "2020-12-14T02:19:44.000000", "name": null, "volume_id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/6f1c6f0a-dc86-42a3-8cb2-26787e8e474b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/os-volume-transfer/6f1c6f0a-dc86-42a3-8cb2-26787e8e474b"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:44.672 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:44.700 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:44.735 186 INFO tempest.lib.common.rest_client [req-e7550de8-2318-46e9-946a-257c7bc7edaa ] Request (TrunksExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles 0.056s 2020-12-14 02:19:44.738 186 DEBUG tempest.lib.common.rest_client [req-e7550de8-2318-46e9-946a-257c7bc7edaa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7550de8-2318-46e9-946a-257c7bc7edaa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:44.766 193 INFO tempest.lib.common.rest_client [req-6383f754-1b44-48a0-b18b-23f966c0997a ] Request (VolumesTransfersV3RbacTest:test_get_volume_transfer): 200 GET http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles 0.059s 2020-12-14 02:19:44.769 193 DEBUG tempest.lib.common.rest_client [req-6383f754-1b44-48a0-b18b-23f966c0997a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6383f754-1b44-48a0-b18b-23f966c0997a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:44.813 186 INFO tempest.lib.common.rest_client [req-cec4ecaf-2e25-45dc-8e3b-9ad9d2e5230f ] Request (TrunksExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-12-14 02:19:44.816 186 DEBUG tempest.lib.common.rest_client [req-cec4ecaf-2e25-45dc-8e3b-9ad9d2e5230f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cec4ecaf-2e25-45dc-8e3b-9ad9d2e5230f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:44.872 193 INFO tempest.lib.common.rest_client [req-0244194e-fadd-47e0-ad5c-ea2966ddd978 ] Request (VolumesTransfersV3RbacTest:test_get_volume_transfer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:19:44.875 193 DEBUG tempest.lib.common.rest_client [req-0244194e-fadd-47e0-ad5c-ea2966ddd978 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0244194e-fadd-47e0-ad5c-ea2966ddd978', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21eec2608c394756a6fced2b31462577", "name": "tempest-VolumesTransfersV3RbacTest-442473916", "password_expires_at": null}, "audit_ids": ["mZxy_rkkQmyvs8JrgPFVVA"], "expires_at": "2020-12-14T03:19:44.000000Z", "issued_at": "2020-12-14T02:19:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "02757feb81fe4551841e4147d355201e", "name": "tempest-VolumesTransfersV3RbacTest-442473916"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:44.930 186 INFO tempest.lib.common.rest_client [req-bf639f49-6980-49ab-9c3f-0f68997be5dd ] Request (TrunksExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles/a629c95d64b3416fb80ae90af4f69c05 0.107s 2020-12-14 02:19:44.933 186 DEBUG tempest.lib.common.rest_client [req-bf639f49-6980-49ab-9c3f-0f68997be5dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf639f49-6980-49ab-9c3f-0f68997be5dd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:45.089 193 INFO tempest.lib.common.rest_client [req-44304c16-c96b-44fa-852f-017d346fd07c ] Request (VolumesTransfersV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/6f1c6f0a-dc86-42a3-8cb2-26787e8e474b 0.204s 2020-12-14 02:19:45.093 193 DEBUG tempest.lib.common.rest_client [req-44304c16-c96b-44fa-852f-017d346fd07c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-44304c16-c96b-44fa-852f-017d346fd07c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/6f1c6f0a-dc86-42a3-8cb2-26787e8e474b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:45.183 193 INFO tempest.lib.common.rest_client [req-7506f5c0-87b5-42c0-8ece-ed11f6442625 ] Request (VolumesTransfersV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33 0.082s 2020-12-14 02:19:45.186 193 DEBUG tempest.lib.common.rest_client [req-7506f5c0-87b5-42c0-8ece-ed11f6442625 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7506f5c0-87b5-42c0-8ece-ed11f6442625', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7506f5c0-87b5-42c0-8ece-ed11f6442625', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33'} Body: b'{"volume": {"id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:38.000000", "updated_at": "2020-12-14T02:19:45.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1996875304", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}], "user_id": "21eec2608c394756a6fced2b31462577", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "02757feb81fe4551841e4147d355201e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:45.280 193 INFO tempest.common.waiters [-] volume 5edc7823-0bc2-42bd-8953-3f06e7073d33 reached available after waiting for 0.280092 seconds 2020-12-14 02:19:45.292 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:45.310 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_all_transfers, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:45.312 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:45.418 189 INFO tempest.lib.common.rest_client [req-cb79b3b3-ecec-40cb-af6f-d82d3d8b8162 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.215s 2020-12-14 02:19:45.422 189 DEBUG tempest.lib.common.rest_client [req-cb79b3b3-ecec-40cb-af6f-d82d3d8b8162 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cb79b3b3-ecec-40cb-af6f-d82d3d8b8162', 'x-compute-request-id': 'req-cb79b3b3-ecec-40cb-af6f-d82d3d8b8162', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:45.428 193 INFO tempest.lib.common.rest_client [req-8422d3c2-5446-46ed-a7fc-f4e7c1e5f35a ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers): 200 GET http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles 0.110s 2020-12-14 02:19:45.432 193 DEBUG tempest.lib.common.rest_client [req-8422d3c2-5446-46ed-a7fc-f4e7c1e5f35a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8422d3c2-5446-46ed-a7fc-f4e7c1e5f35a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:45.606 193 INFO tempest.lib.common.rest_client [req-cb973002-a4a2-4dcb-b040-c2971b66d850 ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.167s 2020-12-14 02:19:45.610 193 DEBUG tempest.lib.common.rest_client [req-cb973002-a4a2-4dcb-b040-c2971b66d850 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb973002-a4a2-4dcb-b040-c2971b66d850', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21eec2608c394756a6fced2b31462577", "name": "tempest-VolumesTransfersV3RbacTest-442473916", "password_expires_at": null}, "audit_ids": ["UIRUA9byQ22FUSpt6Bmtxw"], "expires_at": "2020-12-14T03:19:45.000000Z", "issued_at": "2020-12-14T02:19:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "02757feb81fe4551841e4147d355201e", "name": "tempest-VolumesTransfersV3RbacTest-442473916"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:45.746 193 INFO tempest.lib.common.rest_client [req-d98d58c2-52b7-43bb-8041-48214d36dace ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers): 200 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer 0.129s 2020-12-14 02:19:45.750 193 DEBUG tempest.lib.common.rest_client [req-d98d58c2-52b7-43bb-8041-48214d36dace ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d98d58c2-52b7-43bb-8041-48214d36dace', 'content-length': '17', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d98d58c2-52b7-43bb-8041-48214d36dace', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer'} Body: b'{"transfers": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:45.774 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:45.836 193 INFO tempest.lib.common.rest_client [req-9ee70219-59a3-44c9-8404-02b975f0ecf7 ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers): 200 GET http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles 0.056s 2020-12-14 02:19:45.839 193 DEBUG tempest.lib.common.rest_client [req-9ee70219-59a3-44c9-8404-02b975f0ecf7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ee70219-59a3-44c9-8404-02b975f0ecf7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:45.892 193 INFO tempest.lib.common.rest_client [req-a9548c43-cc5d-4f0b-9012-b79c8a0a8eca ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:19:45.896 193 DEBUG tempest.lib.common.rest_client [req-a9548c43-cc5d-4f0b-9012-b79c8a0a8eca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9548c43-cc5d-4f0b-9012-b79c8a0a8eca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21eec2608c394756a6fced2b31462577", "name": "tempest-VolumesTransfersV3RbacTest-442473916", "password_expires_at": null}, "audit_ids": ["SXxAKj-fTRqlLwEJdU8Z1Q"], "expires_at": "2020-12-14T03:19:45.000000Z", "issued_at": "2020-12-14T02:19:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "02757feb81fe4551841e4147d355201e", "name": "tempest-VolumesTransfersV3RbacTest-442473916"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:45.908 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:45.926 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_all_transfers, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:45.928 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:45.992 193 INFO tempest.lib.common.rest_client [req-7dc0e4c6-0f5b-4c8a-9d57-ff3864f7a61b ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers_details): 200 GET http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles 0.059s 2020-12-14 02:19:45.995 193 DEBUG tempest.lib.common.rest_client [req-7dc0e4c6-0f5b-4c8a-9d57-ff3864f7a61b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7dc0e4c6-0f5b-4c8a-9d57-ff3864f7a61b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:46.035 186 INFO tempest.lib.common.rest_client [req-f33b650c-7403-4132-a150-89b51a435bf4 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:19:46.038 186 DEBUG tempest.lib.common.rest_client [req-f33b650c-7403-4132-a150-89b51a435bf4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f33b650c-7403-4132-a150-89b51a435bf4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["-4ng0VvrSIC5u29iAYfc5A"], "expires_at": "2020-12-14T03:19:45.000000Z", "issued_at": "2020-12-14T02:19:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:46.042 193 INFO tempest.lib.common.rest_client [req-42df85c5-6624-4931-aa26-877f3c7fb8c2 ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:19:46.046 193 DEBUG tempest.lib.common.rest_client [req-42df85c5-6624-4931-aa26-877f3c7fb8c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42df85c5-6624-4931-aa26-877f3c7fb8c2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21eec2608c394756a6fced2b31462577", "name": "tempest-VolumesTransfersV3RbacTest-442473916", "password_expires_at": null}, "audit_ids": ["yYYOoxSnQvmiayN9kmGsYA"], "expires_at": "2020-12-14T03:19:46.000000Z", "issued_at": "2020-12-14T02:19:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "02757feb81fe4551841e4147d355201e", "name": "tempest-VolumesTransfersV3RbacTest-442473916"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:46.087 186 INFO tempest.lib.common.rest_client [req-220f0e5d-63bf-4e41-a590-216e7e721f01 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:19:46.091 186 DEBUG tempest.lib.common.rest_client [req-220f0e5d-63bf-4e41-a590-216e7e721f01 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-220f0e5d-63bf-4e41-a590-216e7e721f01', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["eyQ_cKYrRqmWmWhYvMzapg"], "expires_at": "2020-12-14T03:19:46.000000Z", "issued_at": "2020-12-14T02:19:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:46.144 193 INFO tempest.lib.common.rest_client [req-3257185b-1b94-4ca4-bc95-b3da1df66546 ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers_details): 200 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/detail 0.090s 2020-12-14 02:19:46.147 193 DEBUG tempest.lib.common.rest_client [req-3257185b-1b94-4ca4-bc95-b3da1df66546 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3257185b-1b94-4ca4-bc95-b3da1df66546', 'content-length': '17', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3257185b-1b94-4ca4-bc95-b3da1df66546', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/os-volume-transfer/detail'} Body: b'{"transfers": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:46.173 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:46.237 193 INFO tempest.lib.common.rest_client [req-4748b867-e2af-44dd-815b-06903b07e057 ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers_details): 200 GET http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles 0.058s 2020-12-14 02:19:46.240 193 DEBUG tempest.lib.common.rest_client [req-4748b867-e2af-44dd-815b-06903b07e057 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4748b867-e2af-44dd-815b-06903b07e057', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e/users/21eec2608c394756a6fced2b31462577/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:46.288 193 INFO tempest.lib.common.rest_client [req-9b79b724-3aa2-4451-98ee-6bc395bddadc ] Request (VolumesTransfersV3RbacTest:test_list_volume_transfers_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:19:46.292 193 DEBUG tempest.lib.common.rest_client [req-9b79b724-3aa2-4451-98ee-6bc395bddadc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b79b724-3aa2-4451-98ee-6bc395bddadc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "21eec2608c394756a6fced2b31462577", "name": "tempest-VolumesTransfersV3RbacTest-442473916", "password_expires_at": null}, "audit_ids": ["T9xQCvprRK6lZUZjQ1kwSQ"], "expires_at": "2020-12-14T03:19:46.000000Z", "issued_at": "2020-12-14T02:19:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "02757feb81fe4551841e4147d355201e", "name": "tempest-VolumesTransfersV3RbacTest-442473916"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_02757feb81fe4551841e4147d355201e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:46.448 193 INFO tempest.lib.common.rest_client [req-75c71153-f156-4582-a470-084b49b4b0c3 ] Request (VolumesTransfersV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33 0.141s 2020-12-14 02:19:46.451 193 DEBUG tempest.lib.common.rest_client [req-75c71153-f156-4582-a470-084b49b4b0c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-75c71153-f156-4582-a470-084b49b4b0c3', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:46.539 193 INFO tempest.lib.common.rest_client [req-4ba83b5c-c272-497b-a10b-b4a7beb03e39 ] Request (VolumesTransfersV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33 0.081s 2020-12-14 02:19:46.542 193 DEBUG tempest.lib.common.rest_client [req-4ba83b5c-c272-497b-a10b-b4a7beb03e39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4ba83b5c-c272-497b-a10b-b4a7beb03e39', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4ba83b5c-c272-497b-a10b-b4a7beb03e39', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33'} Body: b'{"volume": {"id": "5edc7823-0bc2-42bd-8953-3f06e7073d33", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:19:38.000000", "updated_at": "2020-12-14T02:19:46.000000", "name": "tempest-VolumesTransfersV3RbacTest-Volume-1996875304", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33"}], "user_id": "21eec2608c394756a6fced2b31462577", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "02757feb81fe4551841e4147d355201e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:46.685 186 INFO tempest.lib.common.rest_client [req-c9898095-9d91-4382-b605-f6220644f812 ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.583s 2020-12-14 02:19:46.688 186 DEBUG tempest.lib.common.rest_client [req-c9898095-9d91-4382-b605-f6220644f812 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-TrunksExtRbacTest-test-network-474617036"}} Response - Headers: {'content-type': 'application/json', 'content-length': '737', 'x-openstack-request-id': 'req-c9898095-9d91-4382-b605-f6220644f812', 'date': 'Mon, 14 Dec 2020 02:19:46 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"15506ed5-010e-4f32-895b-1224448ab0ee","name":"tempest-TrunksExtRbacTest-test-network-474617036","tenant_id":"0580a94f4c5f40d4af1ccb4b673c89c6","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"0580a94f4c5f40d4af1ccb4b673c89c6","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":43,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:19:46Z","updated_at":"2020-12-14T02:19:46Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:46.756 189 INFO tempest.lib.common.rest_client [req-8a449a8d-50d3-4b69-a87c-ebc86764e1eb ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.228s 2020-12-14 02:19:46.758 189 DEBUG tempest.lib.common.rest_client [req-8a449a8d-50d3-4b69-a87c-ebc86764e1eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8a449a8d-50d3-4b69-a87c-ebc86764e1eb', 'x-compute-request-id': 'req-8a449a8d-50d3-4b69-a87c-ebc86764e1eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:47.288 197 INFO tempest.lib.common.rest_client [req-2d7c4b6a-58ec-46dd-82d7-a1392609a2b7 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 2.588s 2020-12-14 02:19:47.291 197 DEBUG tempest.lib.common.rest_client [req-2d7c4b6a-58ec-46dd-82d7-a1392609a2b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2d7c4b6a-58ec-46dd-82d7-a1392609a2b7', 'x-compute-request-id': 'req-2d7c4b6a-58ec-46dd-82d7-a1392609a2b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:47.331 186 INFO tempest.lib.common.rest_client [req-a9f432f4-c69c-4249-9808-81af4690333c ] Request (TrunksExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/ports 0.636s 2020-12-14 02:19:47.334 186 DEBUG tempest.lib.common.rest_client [req-a9f432f4-c69c-4249-9808-81af4690333c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "15506ed5-010e-4f32-895b-1224448ab0ee", "name": "tempest-TrunksExtRbacTest-1281436320"}} Response - Headers: {'content-type': 'application/json', 'content-length': '899', 'x-openstack-request-id': 'req-a9f432f4-c69c-4249-9808-81af4690333c', 'date': 'Mon, 14 Dec 2020 02:19:47 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"9ff28b8a-5206-4070-9a06-bffac3cc32b7","name":"tempest-TrunksExtRbacTest-1281436320","network_id":"15506ed5-010e-4f32-895b-1224448ab0ee","tenant_id":"0580a94f4c5f40d4af1ccb4b673c89c6","mac_address":"fa:16:3e:2b:f5:da","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[],"project_id":"0580a94f4c5f40d4af1ccb4b673c89c6","port_security_enabled":true,"qos_policy_id":null,"security_groups":["a9a11c15-4651-4722-be86-f1d935903c18"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:19:46Z","updated_at":"2020-12-14T02:19:46Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:47.342 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:47.371 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_trunk, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:47.374 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:47.447 186 INFO tempest.lib.common.rest_client [req-54565006-7284-4348-9370-792e7b4d6674 ] Request (TrunksExtRbacTest:test_create_trunk): 200 GET http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles 0.066s 2020-12-14 02:19:47.452 186 DEBUG tempest.lib.common.rest_client [req-54565006-7284-4348-9370-792e7b4d6674 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-54565006-7284-4348-9370-792e7b4d6674', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:47.504 186 INFO tempest.lib.common.rest_client [req-8fdad511-c945-40b6-a174-0f6cd8796f8c ] Request (TrunksExtRbacTest:test_create_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:19:47.507 186 DEBUG tempest.lib.common.rest_client [req-8fdad511-c945-40b6-a174-0f6cd8796f8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8fdad511-c945-40b6-a174-0f6cd8796f8c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["4hnwnzl4T1qPMIamp9Rr4g"], "expires_at": "2020-12-14T03:19:47.000000Z", "issued_at": "2020-12-14T02:19:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:47.556 186 INFO tempest.lib.common.rest_client [req-fae6c921-54ff-4579-bf78-3b0935fe0c33 ] Request (TrunksExtRbacTest:test_create_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:19:47.560 186 DEBUG tempest.lib.common.rest_client [req-fae6c921-54ff-4579-bf78-3b0935fe0c33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fae6c921-54ff-4579-bf78-3b0935fe0c33', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["pfe_8WAmRoydAbv1HbyLQQ"], "expires_at": "2020-12-14T03:19:47.000000Z", "issued_at": "2020-12-14T02:19:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:47.718 193 INFO tempest.lib.common.rest_client [req-d180b62f-82db-4e5c-a6fd-91e3ee1473f4 ] Request (VolumesTransfersV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33 0.076s 2020-12-14 02:19:47.721 193 DEBUG tempest.lib.common.rest_client [req-d180b62f-82db-4e5c-a6fd-91e3ee1473f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-d180b62f-82db-4e5c-a6fd-91e3ee1473f4', 'x-openstack-request-id': 'req-d180b62f-82db-4e5c-a6fd-91e3ee1473f4', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/02757feb81fe4551841e4147d355201e/volumes/5edc7823-0bc2-42bd-8953-3f06e7073d33'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 5edc7823-0bc2-42bd-8953-3f06e7073d33 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:47.911 193 INFO tempest.lib.common.rest_client [req-701fcc09-63ea-40ab-a398-71a2e494acc4 ] Request (VolumesTransfersV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/21eec2608c394756a6fced2b31462577 0.182s 2020-12-14 02:19:47.914 193 DEBUG tempest.lib.common.rest_client [req-701fcc09-63ea-40ab-a398-71a2e494acc4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-701fcc09-63ea-40ab-a398-71a2e494acc4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/21eec2608c394756a6fced2b31462577'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:48.017 193 INFO tempest.lib.common.rest_client [req-4318e7ff-a74f-4a96-98d1-b01632eeff7b ] Request (VolumesTransfersV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:19:48.020 193 DEBUG tempest.lib.common.rest_client [req-4318e7ff-a74f-4a96-98d1-b01632eeff7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4318e7ff-a74f-4a96-98d1-b01632eeff7b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["_ZJZnNuyQNex0ZwMwKFjLQ"], "expires_at": "2020-12-14T03:19:47.000000Z", "issued_at": "2020-12-14T02:19:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:48.081 186 INFO tempest.lib.common.rest_client [req-12037ba4-6ffc-4b4d-90e5-369b45321dd1 ] Request (TrunksExtRbacTest:test_create_trunk): 201 POST http://172.30.13.94:9696/v2.0/trunks 0.513s 2020-12-14 02:19:48.084 186 DEBUG tempest.lib.common.rest_client [req-12037ba4-6ffc-4b4d-90e5-369b45321dd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"trunk": {"port_id": "9ff28b8a-5206-4070-9a06-bffac3cc32b7", "sub_ports": []}} Response - Headers: {'content-type': 'application/json', 'content-length': '407', 'x-openstack-request-id': 'req-12037ba4-6ffc-4b4d-90e5-369b45321dd1', 'date': 'Mon, 14 Dec 2020 02:19:48 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks'} Body: b'{"trunk": {"admin_state_up": true, "id": "a47abb1b-1b42-4c79-a9d2-df9548d139f3", "project_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "", "port_id": "9ff28b8a-5206-4070-9a06-bffac3cc32b7", "status": "DOWN", "sub_ports": [], "revision_number": 0, "description": "", "created_at": "2020-12-14T02:19:48Z", "updated_at": "2020-12-14T02:19:48Z", "tenant_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:48.087 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:48.159 186 INFO tempest.lib.common.rest_client [req-a87a04c6-2be5-40c7-8536-ceeed7b87742 ] Request (TrunksExtRbacTest:test_create_trunk): 200 GET http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles 0.065s 2020-12-14 02:19:48.163 186 DEBUG tempest.lib.common.rest_client [req-a87a04c6-2be5-40c7-8536-ceeed7b87742 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a87a04c6-2be5-40c7-8536-ceeed7b87742', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:48.209 189 INFO tempest.lib.common.rest_client [req-abfd6b50-b87e-47c8-91a2-2488a637087e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.345s 2020-12-14 02:19:48.213 189 DEBUG tempest.lib.common.rest_client [req-abfd6b50-b87e-47c8-91a2-2488a637087e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-abfd6b50-b87e-47c8-91a2-2488a637087e', 'x-compute-request-id': 'req-abfd6b50-b87e-47c8-91a2-2488a637087e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:48.260 186 INFO tempest.lib.common.rest_client [req-287d2b40-ad30-41a3-aa0f-83e3cbd13b37 ] Request (TrunksExtRbacTest:test_create_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:19:48.263 186 DEBUG tempest.lib.common.rest_client [req-287d2b40-ad30-41a3-aa0f-83e3cbd13b37 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-287d2b40-ad30-41a3-aa0f-83e3cbd13b37', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["3-uLJMcOTyuks-9Z8vHSPQ"], "expires_at": "2020-12-14T03:19:48.000000Z", "issued_at": "2020-12-14T02:19:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:48.295 193 INFO tempest.lib.common.rest_client [req-b2d4a456-cb7e-4d01-948b-8a0cdcb46b41 ] Request (VolumesTransfersV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=02757feb81fe4551841e4147d355201e&name=default 0.270s 2020-12-14 02:19:48.298 193 DEBUG tempest.lib.common.rest_client [req-b2d4a456-cb7e-4d01-948b-8a0cdcb46b41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-b2d4a456-cb7e-4d01-948b-8a0cdcb46b41', 'date': 'Mon, 14 Dec 2020 02:19:48 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=02757feb81fe4551841e4147d355201e&name=default'} Body: b'{"security_groups": [{"id": "e7a78127-fb42-462e-aa6b-30718bd6751b", "name": "default", "stateful": true, "tenant_id": "02757feb81fe4551841e4147d355201e", "description": "Default security group", "security_group_rules": [{"id": "24da25a0-b75a-46ad-8164-bb6837107133", "tenant_id": "02757feb81fe4551841e4147d355201e", "security_group_id": "e7a78127-fb42-462e-aa6b-30718bd6751b", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:48Z", "updated_at": "2020-12-14T02:19:48Z", "revision_number": 0, "project_id": "02757feb81fe4551841e4147d355201e"}, {"id": "26d8e801-0ced-48b9-9f9e-b2618633d67d", "tenant_id": "02757feb81fe4551841e4147d355201e", "security_group_id": "e7a78127-fb42-462e-aa6b-30718bd6751b", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "e7a78127-fb42-462e-aa6b-30718bd6751b", "description": null, "tags": [], "created_at": "2020-12-14T02:19:48Z", "updated_at": "2020-12-14T02:19:48Z", "revision_number": 0, "project_id": "02757feb81fe4551841e4147d355201e"}, {"id": "9126cad2-5a41-4eb2-9004-964584f4647e", "tenant_id": "02757feb81fe4551841e4147d355201e", "security_group_id": "e7a78127-fb42-462e-aa6b-30718bd6751b", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "e7a78127-fb42-462e-aa6b-30718bd6751b", "description": null, "tags": [], "created_at": "2020-12-14T02:19:48Z", "updated_at": "2020-12-14T02:19:48Z", "revision_number": 0, "project_id": "02757feb81fe4551841e4147d355201e"}, {"id": "d340f6b9-6663-45ef-b9b2-dd54877dfa1f", "tenant_id": "02757feb81fe4551841e4147d355201e", "security_group_id": "e7a78127-fb42-462e-aa6b-30718bd6751b", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:48Z", "updated_at": "2020-12-14T02:19:48Z", "revision_number": 0, "project_id": "02757feb81fe4551841e4147d355201e"}], "tags": [], "created_at": "2020-12-14T02:19:48Z", "updated_at": "2020-12-14T02:19:48Z", "revision_number": 1, "project_id": "02757feb81fe4551841e4147d355201e"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:48.313 186 INFO tempest.lib.common.rest_client [req-ccc841a3-0166-4624-b445-17fae1c660a6 ] Request (TrunksExtRbacTest:test_create_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:19:48.317 186 DEBUG tempest.lib.common.rest_client [req-ccc841a3-0166-4624-b445-17fae1c660a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ccc841a3-0166-4624-b445-17fae1c660a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["626xTTrJRq28zqd0-XVFOA"], "expires_at": "2020-12-14T03:19:48.000000Z", "issued_at": "2020-12-14T02:19:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:48.471 193 INFO tempest.lib.common.rest_client [req-2d9884b0-9b11-4b30-875d-6b1d33a285e6 ] Request (VolumesTransfersV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/e7a78127-fb42-462e-aa6b-30718bd6751b 0.167s 2020-12-14 02:19:48.474 193 DEBUG tempest.lib.common.rest_client [req-2d9884b0-9b11-4b30-875d-6b1d33a285e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2d9884b0-9b11-4b30-875d-6b1d33a285e6', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:48 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/e7a78127-fb42-462e-aa6b-30718bd6751b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:48.519 186 INFO tempest.lib.common.rest_client [req-151433e3-35d0-4dac-8279-287c547890f6 ] Request (TrunksExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/trunks/a47abb1b-1b42-4c79-a9d2-df9548d139f3 0.193s 2020-12-14 02:19:48.522 186 DEBUG tempest.lib.common.rest_client [req-151433e3-35d0-4dac-8279-287c547890f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-151433e3-35d0-4dac-8279-287c547890f6', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:48 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/a47abb1b-1b42-4c79-a9d2-df9548d139f3'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:48.536 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:48.561 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_trunk, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:48.564 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:48.588 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_trunk, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:48.599 197 INFO tempest.lib.common.rest_client [req-3f14ee33-9334-458a-9ee9-e6a4ae6ef39b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.199s 2020-12-14 02:19:48.602 197 DEBUG tempest.lib.common.rest_client [req-3f14ee33-9334-458a-9ee9-e6a4ae6ef39b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3f14ee33-9334-458a-9ee9-e6a4ae6ef39b', 'x-compute-request-id': 'req-3f14ee33-9334-458a-9ee9-e6a4ae6ef39b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:48.625 193 INFO tempest.lib.common.rest_client [req-ea619c63-b2f5-44ab-af1f-7b7ed26ee4ba ] Request (VolumesTransfersV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e 0.144s 2020-12-14 02:19:48.628 193 DEBUG tempest.lib.common.rest_client [req-ea619c63-b2f5-44ab-af1f-7b7ed26ee4ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea619c63-b2f5-44ab-af1f-7b7ed26ee4ba', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/02757feb81fe4551841e4147d355201e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:48.751 193 INFO tempest.lib.common.rest_client [req-a6906b29-f914-4b71-826d-2ffd173de772 ] Request (VolumeTypesAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:19:48.754 193 DEBUG tempest.lib.common.rest_client [req-a6906b29-f914-4b71-826d-2ffd173de772 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a6906b29-f914-4b71-826d-2ffd173de772', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["kui6D6z8QJ6avo2J11AzJA"], "expires_at": "2020-12-14T03:19:48.000000Z", "issued_at": "2020-12-14T02:19:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:48.855 193 INFO tempest.lib.common.rest_client [req-764e2e70-a257-43c6-a7ef-c9a892d5f727 ] Request (VolumeTypesAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:19:48.858 193 DEBUG tempest.lib.common.rest_client [req-764e2e70-a257-43c6-a7ef-c9a892d5f727 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-764e2e70-a257-43c6-a7ef-c9a892d5f727', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["rw0sIIIYSBqqhNVDl9PCzg"], "expires_at": "2020-12-14T03:19:48.000000Z", "issued_at": "2020-12-14T02:19:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:48.932 193 INFO tempest.lib.common.rest_client [req-725204e5-ade1-4d0c-a850-4db447cbc381 ] Request (VolumeTypesAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.065s 2020-12-14 02:19:48.935 193 DEBUG tempest.lib.common.rest_client [req-725204e5-ade1-4d0c-a850-4db447cbc381 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-725204e5-ade1-4d0c-a850-4db447cbc381', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.018 193 INFO tempest.lib.common.rest_client [req-ba8302c2-71cd-483f-be77-63015bea0e20 ] Request (VolumeTypesAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.074s 2020-12-14 02:19:49.021 193 DEBUG tempest.lib.common.rest_client [req-ba8302c2-71cd-483f-be77-63015bea0e20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeTypesAccessRbacTest-2109066065-desc", "domain_id": "default", "name": "tempest-VolumeTypesAccessRbacTest-2109066065"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba8302c2-71cd-483f-be77-63015bea0e20', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "5114ff3233764a87b2e8fb927b4b3078", "name": "tempest-VolumeTypesAccessRbacTest-2109066065", "domain_id": "default", "description": "tempest-VolumeTypesAccessRbacTest-2109066065-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.148 193 INFO tempest.lib.common.rest_client [req-8f6359c0-bf8a-44be-92cd-f4c753e35b01 ] Request (VolumeTypesAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.118s 2020-12-14 02:19:49.150 193 DEBUG tempest.lib.common.rest_client [req-8f6359c0-bf8a-44be-92cd-f4c753e35b01 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeTypesAccessRbacTest-2109066065", "password": "U6*g%n%ckyJ8~5^", "project_id": "5114ff3233764a87b2e8fb927b4b3078", "email": "tempest-VolumeTypesAccessRbacTest-1857662403@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '406', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f6359c0-bf8a-44be-92cd-f4c753e35b01', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "5114ff3233764a87b2e8fb927b4b3078", "email": "tempest-VolumeTypesAccessRbacTest-1857662403@example.com", "id": "890fa0b67704469395c8cad5fe8605aa", "name": "tempest-VolumeTypesAccessRbacTest-2109066065", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/890fa0b67704469395c8cad5fe8605aa"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.221 193 INFO tempest.lib.common.rest_client [req-ac891e1c-0760-47c6-9825-73b9647fdd39 ] Request (VolumeTypesAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:19:49.225 193 DEBUG tempest.lib.common.rest_client [req-ac891e1c-0760-47c6-9825-73b9647fdd39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac891e1c-0760-47c6-9825-73b9647fdd39', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.258 186 INFO tempest.lib.common.rest_client [req-faa5f93b-1a48-47be-8ca9-2f99ee0f4a6c ] Request (TrunksExtRbacTest:test_delete_trunk): 201 POST http://172.30.13.94:9696/v2.0/trunks 0.662s 2020-12-14 02:19:49.261 186 DEBUG tempest.lib.common.rest_client [req-faa5f93b-1a48-47be-8ca9-2f99ee0f4a6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"trunk": {"port_id": "9ff28b8a-5206-4070-9a06-bffac3cc32b7", "sub_ports": []}} Response - Headers: {'content-type': 'application/json', 'content-length': '407', 'x-openstack-request-id': 'req-faa5f93b-1a48-47be-8ca9-2f99ee0f4a6c', 'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks'} Body: b'{"trunk": {"admin_state_up": true, "id": "894bbdfa-b755-49f0-b68c-1cea987710c7", "project_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "", "port_id": "9ff28b8a-5206-4070-9a06-bffac3cc32b7", "status": "DOWN", "sub_ports": [], "revision_number": 0, "description": "", "created_at": "2020-12-14T02:19:48Z", "updated_at": "2020-12-14T02:19:48Z", "tenant_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.264 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:49.298 193 INFO tempest.lib.common.rest_client [req-beb76009-6b47-4b55-9112-36f2909f75fb ] Request (VolumeTypesAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-12-14 02:19:49.301 193 DEBUG tempest.lib.common.rest_client [req-beb76009-6b47-4b55-9112-36f2909f75fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-beb76009-6b47-4b55-9112-36f2909f75fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.337 186 INFO tempest.lib.common.rest_client [req-0f020beb-23ef-4f90-b02c-bf20e07c271c ] Request (TrunksExtRbacTest:test_delete_trunk): 200 GET http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles 0.067s 2020-12-14 02:19:49.341 186 DEBUG tempest.lib.common.rest_client [req-0f020beb-23ef-4f90-b02c-bf20e07c271c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f020beb-23ef-4f90-b02c-bf20e07c271c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.390 193 INFO tempest.lib.common.rest_client [req-0e27ab12-ad2c-419c-8351-43ab2345c128 ] Request (VolumeTypesAccessRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles/72a4576c553448cd941b052c1ca0cf2d 0.081s 2020-12-14 02:19:49.393 193 DEBUG tempest.lib.common.rest_client [req-0e27ab12-ad2c-419c-8351-43ab2345c128 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e27ab12-ad2c-419c-8351-43ab2345c128', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.396 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeTypesAccessRbacTest-2109066065', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5114ff3233764a87b2e8fb927b4b3078', 'project_name': 'tempest-VolumeTypesAccessRbacTest-2109066065', 'tenant_id': '5114ff3233764a87b2e8fb927b4b3078', 'tenant_name': 'tempest-VolumeTypesAccessRbacTest-2109066065', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '890fa0b67704469395c8cad5fe8605aa'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:49.398 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeTypesAccessRbacTest-2109066065', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5114ff3233764a87b2e8fb927b4b3078', 'project_name': 'tempest-VolumeTypesAccessRbacTest-2109066065', 'tenant_id': '5114ff3233764a87b2e8fb927b4b3078', 'tenant_name': 'tempest-VolumeTypesAccessRbacTest-2109066065', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '890fa0b67704469395c8cad5fe8605aa'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:49.450 186 INFO tempest.lib.common.rest_client [req-fbc0ba5b-488b-440d-b460-8cc6743a66ca ] Request (TrunksExtRbacTest:test_delete_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:19:49.453 186 DEBUG tempest.lib.common.rest_client [req-fbc0ba5b-488b-440d-b460-8cc6743a66ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fbc0ba5b-488b-440d-b460-8cc6743a66ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["CTZSoeg-SyGd_B-fhxX0HA"], "expires_at": "2020-12-14T03:19:49.000000Z", "issued_at": "2020-12-14T02:19:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.506 186 INFO tempest.lib.common.rest_client [req-96ff2e48-4083-44f5-b247-808bc60c6db6 ] Request (TrunksExtRbacTest:test_delete_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:19:49.510 186 DEBUG tempest.lib.common.rest_client [req-96ff2e48-4083-44f5-b247-808bc60c6db6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96ff2e48-4083-44f5-b247-808bc60c6db6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["fNhnlN3VRwin9O3NwUbaBQ"], "expires_at": "2020-12-14T03:19:49.000000Z", "issued_at": "2020-12-14T02:19:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.586 193 INFO tempest.lib.common.rest_client [req-2bb70176-eb4c-429d-a1b9-d29bed6fd97c ] Request (VolumeTypesAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.127s 2020-12-14 02:19:49.589 193 DEBUG tempest.lib.common.rest_client [req-2bb70176-eb4c-429d-a1b9-d29bed6fd97c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2bb70176-eb4c-429d-a1b9-d29bed6fd97c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "890fa0b67704469395c8cad5fe8605aa", "name": "tempest-VolumeTypesAccessRbacTest-2109066065", "password_expires_at": null}, "audit_ids": ["MzNe4PnFRn6vHSSK7e523w"], "expires_at": "2020-12-14T03:19:49.000000Z", "issued_at": "2020-12-14T02:19:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5114ff3233764a87b2e8fb927b4b3078", "name": "tempest-VolumeTypesAccessRbacTest-2109066065"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.698 193 INFO tempest.lib.common.rest_client [req-c7ea4d6c-4850-469a-8a98-1b2fab3b6ad1 ] Request (VolumeTypesAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:19:49.702 193 DEBUG tempest.lib.common.rest_client [req-c7ea4d6c-4850-469a-8a98-1b2fab3b6ad1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7ea4d6c-4850-469a-8a98-1b2fab3b6ad1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["OMrL_v5iQZuepr38SyfBrQ"], "expires_at": "2020-12-14T03:19:49.000000Z", "issued_at": "2020-12-14T02:19:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.799 186 INFO tempest.lib.common.rest_client [req-488612f9-8de9-488a-98cb-9f8b1fc449dd ] Request (TrunksExtRbacTest:test_delete_trunk): 204 DELETE http://172.30.13.94:9696/v2.0/trunks/894bbdfa-b755-49f0-b68c-1cea987710c7 0.282s 2020-12-14 02:19:49.803 186 DEBUG tempest.lib.common.rest_client [req-488612f9-8de9-488a-98cb-9f8b1fc449dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-488612f9-8de9-488a-98cb-9f8b1fc449dd', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/894bbdfa-b755-49f0-b68c-1cea987710c7'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.805 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:49.822 193 INFO tempest.lib.common.rest_client [req-3d5c6a54-e39c-409f-af93-c1fbb0ad635e ] Request (VolumeTypesAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-12-14 02:19:49.825 193 DEBUG tempest.lib.common.rest_client [req-3d5c6a54-e39c-409f-af93-c1fbb0ad635e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d5c6a54-e39c-409f-af93-c1fbb0ad635e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["jkNcwcq3S1aFrhLFnVGjVg"], "expires_at": "2020-12-14T03:19:49.000000Z", "issued_at": "2020-12-14T02:19:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.876 186 INFO tempest.lib.common.rest_client [req-b170a7b5-256a-4bce-ab89-f5c9a6a121f3 ] Request (TrunksExtRbacTest:test_delete_trunk): 200 GET http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles 0.064s 2020-12-14 02:19:49.879 186 DEBUG tempest.lib.common.rest_client [req-b170a7b5-256a-4bce-ab89-f5c9a6a121f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b170a7b5-256a-4bce-ab89-f5c9a6a121f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.896 193 INFO tempest.lib.common.rest_client [req-1a9a244a-73f5-4b70-bb2d-0099e9490d02 ] Request (VolumeTypesAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.064s 2020-12-14 02:19:49.899 193 DEBUG tempest.lib.common.rest_client [req-1a9a244a-73f5-4b70-bb2d-0099e9490d02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a9a244a-73f5-4b70-bb2d-0099e9490d02', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.938 197 INFO tempest.lib.common.rest_client [req-b1170ddc-71b0-4b9c-b579-9ff4be846efe ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.227s 2020-12-14 02:19:49.941 197 DEBUG tempest.lib.common.rest_client [req-b1170ddc-71b0-4b9c-b579-9ff4be846efe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b1170ddc-71b0-4b9c-b579-9ff4be846efe', 'x-compute-request-id': 'req-b1170ddc-71b0-4b9c-b579-9ff4be846efe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:49.984 186 INFO tempest.lib.common.rest_client [req-49394084-d728-47fb-acf4-2fca442a4663 ] Request (TrunksExtRbacTest:test_delete_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:19:49.988 186 DEBUG tempest.lib.common.rest_client [req-49394084-d728-47fb-acf4-2fca442a4663 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-49394084-d728-47fb-acf4-2fca442a4663', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["nbMvqmIET4ao3HgMwfUskg"], "expires_at": "2020-12-14T03:19:49.000000Z", "issued_at": "2020-12-14T02:19:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:50.002 193 INFO tempest.lib.common.rest_client [req-68409c4e-6b1d-4a95-89ae-18e494b12f9b ] Request (VolumeTypesAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.095s 2020-12-14 02:19:50.005 193 DEBUG tempest.lib.common.rest_client [req-68409c4e-6b1d-4a95-89ae-18e494b12f9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68409c4e-6b1d-4a95-89ae-18e494b12f9b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:50.009 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:19:50.011 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:50.041 186 INFO tempest.lib.common.rest_client [req-2ef2261f-3ad2-4d4d-8b71-73d7a0fda81d ] Request (TrunksExtRbacTest:test_delete_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:19:50.045 186 DEBUG tempest.lib.common.rest_client [req-2ef2261f-3ad2-4d4d-8b71-73d7a0fda81d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ef2261f-3ad2-4d4d-8b71-73d7a0fda81d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["DJjjPF_tS3eYAd4zPnFQvQ"], "expires_at": "2020-12-14T03:19:50.000000Z", "issued_at": "2020-12-14T02:19:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:50.091 193 INFO tempest.lib.common.rest_client [req-4c690490-b8fd-4e31-b809-07500249fe7f ] Request (VolumeTypesAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles 0.075s 2020-12-14 02:19:50.094 193 DEBUG tempest.lib.common.rest_client [req-4c690490-b8fd-4e31-b809-07500249fe7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c690490-b8fd-4e31-b809-07500249fe7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:50.166 186 INFO tempest.lib.common.rest_client [req-0904f043-4c82-4e19-8f24-0f36d5c551c1 ] Request (TrunksExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/trunks/894bbdfa-b755-49f0-b68c-1cea987710c7 0.110s 2020-12-14 02:19:50.170 186 DEBUG tempest.lib.common.rest_client [req-0904f043-4c82-4e19-8f24-0f36d5c551c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '134', 'x-openstack-request-id': 'req-0904f043-4c82-4e19-8f24-0f36d5c551c1', 'date': 'Mon, 14 Dec 2020 02:19:50 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/894bbdfa-b755-49f0-b68c-1cea987710c7'} Body: b'{"NeutronError": {"type": "TrunkNotFound", "message": "Trunk 894bbdfa-b755-49f0-b68c-1cea987710c7 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:50.174 193 INFO tempest.lib.common.rest_client [req-cd82e22a-08b1-4956-b6fd-7505e3e8b2c2 ] Request (VolumeTypesAccessRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles/72a4576c553448cd941b052c1ca0cf2d 0.075s 2020-12-14 02:19:50.176 193 DEBUG tempest.lib.common.rest_client [req-cd82e22a-08b1-4956-b6fd-7505e3e8b2c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd82e22a-08b1-4956-b6fd-7505e3e8b2c2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:50.186 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:50.213 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_trunk, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:50.283 193 INFO tempest.lib.common.rest_client [req-da651ec3-efa3-43ad-8b6f-43f5b59c2a7c ] Request (VolumeTypesAccessRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles/a629c95d64b3416fb80ae90af4f69c05 0.101s 2020-12-14 02:19:50.285 193 DEBUG tempest.lib.common.rest_client [req-da651ec3-efa3-43ad-8b6f-43f5b59c2a7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da651ec3-efa3-43ad-8b6f-43f5b59c2a7c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:50.649 186 INFO tempest.lib.common.rest_client [req-f9033de1-b936-490e-a4a1-0ec845025a0b ] Request (TrunksExtRbacTest:test_list_trunks): 201 POST http://172.30.13.94:9696/v2.0/trunks 0.429s 2020-12-14 02:19:50.653 186 DEBUG tempest.lib.common.rest_client [req-f9033de1-b936-490e-a4a1-0ec845025a0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"trunk": {"port_id": "9ff28b8a-5206-4070-9a06-bffac3cc32b7", "sub_ports": []}} Response - Headers: {'content-type': 'application/json', 'content-length': '407', 'x-openstack-request-id': 'req-f9033de1-b936-490e-a4a1-0ec845025a0b', 'date': 'Mon, 14 Dec 2020 02:19:50 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks'} Body: b'{"trunk": {"admin_state_up": true, "id": "2c75803e-c8ca-4b65-ace7-e10f8e60004a", "project_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "", "port_id": "9ff28b8a-5206-4070-9a06-bffac3cc32b7", "status": "DOWN", "sub_ports": [], "revision_number": 0, "description": "", "created_at": "2020-12-14T02:19:50Z", "updated_at": "2020-12-14T02:19:50Z", "tenant_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:50.656 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:50.776 186 INFO tempest.lib.common.rest_client [req-0a670608-467f-4cfe-af63-43ca3236d470 ] Request (TrunksExtRbacTest:test_list_trunks): 200 GET http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles 0.114s 2020-12-14 02:19:50.780 186 DEBUG tempest.lib.common.rest_client [req-0a670608-467f-4cfe-af63-43ca3236d470 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0a670608-467f-4cfe-af63-43ca3236d470', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:50.885 186 INFO tempest.lib.common.rest_client [req-a6991924-17a0-4fd7-84d4-20e7fd7dc923 ] Request (TrunksExtRbacTest:test_list_trunks): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:19:50.888 186 DEBUG tempest.lib.common.rest_client [req-a6991924-17a0-4fd7-84d4-20e7fd7dc923 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a6991924-17a0-4fd7-84d4-20e7fd7dc923', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["FFVdHRWlTNibZHXurDw1GQ"], "expires_at": "2020-12-14T03:19:50.000000Z", "issued_at": "2020-12-14T02:19:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:50.941 186 INFO tempest.lib.common.rest_client [req-1bc78352-2ab7-485a-bef4-ff925da0ee55 ] Request (TrunksExtRbacTest:test_list_trunks): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:19:50.944 186 DEBUG tempest.lib.common.rest_client [req-1bc78352-2ab7-485a-bef4-ff925da0ee55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1bc78352-2ab7-485a-bef4-ff925da0ee55', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["eA5dyUlnSQCRt9yYK1bRRQ"], "expires_at": "2020-12-14T03:19:50.000000Z", "issued_at": "2020-12-14T02:19:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:51.163 186 INFO tempest.lib.common.rest_client [req-b1c71bcd-5b4e-433c-86e1-ea5caad1146d ] Request (TrunksExtRbacTest:test_list_trunks): 200 GET http://172.30.13.94:9696/v2.0/trunks?id=2c75803e-c8ca-4b65-ace7-e10f8e60004a 0.212s 2020-12-14 02:19:51.168 186 DEBUG tempest.lib.common.rest_client [req-b1c71bcd-5b4e-433c-86e1-ea5caad1146d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '410', 'x-openstack-request-id': 'req-b1c71bcd-5b4e-433c-86e1-ea5caad1146d', 'date': 'Mon, 14 Dec 2020 02:19:51 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks?id=2c75803e-c8ca-4b65-ace7-e10f8e60004a'} Body: b'{"trunks": [{"admin_state_up": true, "id": "2c75803e-c8ca-4b65-ace7-e10f8e60004a", "project_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "", "port_id": "9ff28b8a-5206-4070-9a06-bffac3cc32b7", "status": "DOWN", "sub_ports": [], "revision_number": 0, "description": "", "created_at": "2020-12-14T02:19:50Z", "updated_at": "2020-12-14T02:19:50Z", "tenant_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "tags": []}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:51.171 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:51.285 197 INFO tempest.lib.common.rest_client [req-6d0f1096-fd1c-43be-bd0e-af1e1565d85b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.231s 2020-12-14 02:19:51.288 197 DEBUG tempest.lib.common.rest_client [req-6d0f1096-fd1c-43be-bd0e-af1e1565d85b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6d0f1096-fd1c-43be-bd0e-af1e1565d85b', 'x-compute-request-id': 'req-6d0f1096-fd1c-43be-bd0e-af1e1565d85b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:51.342 186 INFO tempest.lib.common.rest_client [req-f034686f-635a-49f5-ae9e-e9b0f5d12dff ] Request (TrunksExtRbacTest:test_list_trunks): 200 GET http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles 0.164s 2020-12-14 02:19:51.345 186 DEBUG tempest.lib.common.rest_client [req-f034686f-635a-49f5-ae9e-e9b0f5d12dff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f034686f-635a-49f5-ae9e-e9b0f5d12dff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:51.392 193 INFO tempest.lib.common.rest_client [req-3893a786-5f24-4946-bc24-23652e1da646 ] Request (VolumeTypesAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:19:51.397 193 DEBUG tempest.lib.common.rest_client [req-3893a786-5f24-4946-bc24-23652e1da646 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3893a786-5f24-4946-bc24-23652e1da646', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "890fa0b67704469395c8cad5fe8605aa", "name": "tempest-VolumeTypesAccessRbacTest-2109066065", "password_expires_at": null}, "audit_ids": ["mE1QdTmMRNmH_6Ej0cOBpA"], "expires_at": "2020-12-14T03:19:51.000000Z", "issued_at": "2020-12-14T02:19:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5114ff3233764a87b2e8fb927b4b3078", "name": "tempest-VolumeTypesAccessRbacTest-2109066065"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:51.447 186 INFO tempest.lib.common.rest_client [req-7563cf51-5d84-416e-a710-63dbb3a41683 ] Request (TrunksExtRbacTest:test_list_trunks): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:19:51.450 186 DEBUG tempest.lib.common.rest_client [req-7563cf51-5d84-416e-a710-63dbb3a41683 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7563cf51-5d84-416e-a710-63dbb3a41683', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["YPh5vTTLSW6LVx31xrmvRQ"], "expires_at": "2020-12-14T03:19:51.000000Z", "issued_at": "2020-12-14T02:19:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:51.503 186 INFO tempest.lib.common.rest_client [req-06caf7d0-31b1-4887-b4df-7e75319014e9 ] Request (TrunksExtRbacTest:test_list_trunks): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:19:51.506 186 DEBUG tempest.lib.common.rest_client [req-06caf7d0-31b1-4887-b4df-7e75319014e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06caf7d0-31b1-4887-b4df-7e75319014e9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["hX-2EFpWQ2yQDM-bhJBkmA"], "expires_at": "2020-12-14T03:19:51.000000Z", "issued_at": "2020-12-14T02:19:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:51.643 193 INFO tempest.lib.common.rest_client [req-4bb8270b-4a00-453d-9fc7-cadce29bb1c3 ] Request (VolumeTypesAccessRbacTest:setUpClass): 200 POST http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types 0.234s 2020-12-14 02:19:51.647 193 DEBUG tempest.lib.common.rest_client [req-4bb8270b-4a00-453d-9fc7-cadce29bb1c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeTypesAccessRbacTest-volume-type-1049204553", "os-volume-type-access:is_public": false}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4bb8270b-4a00-453d-9fc7-cadce29bb1c3', 'content-length': '233', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4bb8270b-4a00-453d-9fc7-cadce29bb1c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types'} Body: b'{"volume_type": {"id": "49dcce99-67e5-45e5-ba4c-11ae093f2463", "name": "tempest-VolumeTypesAccessRbacTest-volume-type-1049204553", "is_public": false, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": false}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:51.690 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:51.720 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_type_access:addProjectAccess, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:51.723 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:51.814 186 INFO tempest.lib.common.rest_client [req-64cedb0b-e488-4063-a7fb-27514f297db0 ] Request (TrunksExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/trunks/2c75803e-c8ca-4b65-ace7-e10f8e60004a 0.299s 2020-12-14 02:19:51.817 186 DEBUG tempest.lib.common.rest_client [req-64cedb0b-e488-4063-a7fb-27514f297db0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-64cedb0b-e488-4063-a7fb-27514f297db0', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:51 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/2c75803e-c8ca-4b65-ace7-e10f8e60004a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:51.830 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:51.854 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_trunk, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:51.865 193 INFO tempest.lib.common.rest_client [req-5675c80c-3c93-4a7b-a990-a9155b38cff1 ] Request (VolumeTypesAccessRbacTest:test_add_type_access): 200 GET http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles 0.133s 2020-12-14 02:19:51.869 193 DEBUG tempest.lib.common.rest_client [req-5675c80c-3c93-4a7b-a990-a9155b38cff1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5675c80c-3c93-4a7b-a990-a9155b38cff1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:51.975 193 INFO tempest.lib.common.rest_client [req-2b2adc09-3c3b-4cd7-85ce-4e1956b88686 ] Request (VolumeTypesAccessRbacTest:test_add_type_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:19:51.978 193 DEBUG tempest.lib.common.rest_client [req-2b2adc09-3c3b-4cd7-85ce-4e1956b88686 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b2adc09-3c3b-4cd7-85ce-4e1956b88686', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "890fa0b67704469395c8cad5fe8605aa", "name": "tempest-VolumeTypesAccessRbacTest-2109066065", "password_expires_at": null}, "audit_ids": ["ZZHH9_gDQiKgKa8QN748TA"], "expires_at": "2020-12-14T03:19:51.000000Z", "issued_at": "2020-12-14T02:19:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5114ff3233764a87b2e8fb927b4b3078", "name": "tempest-VolumeTypesAccessRbacTest-2109066065"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:52.135 193 INFO tempest.lib.common.rest_client [req-e8b04445-5f94-43f0-be93-33d8cd7149a2 ] Request (VolumeTypesAccessRbacTest:test_add_type_access): 202 POST http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463/action 0.150s 2020-12-14 02:19:52.137 193 DEBUG tempest.lib.common.rest_client [req-e8b04445-5f94-43f0-be93-33d8cd7149a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addProjectAccess": {"project": "5114ff3233764a87b2e8fb927b4b3078"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e8b04445-5f94-43f0-be93-33d8cd7149a2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:52.140 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:52.254 193 INFO tempest.lib.common.rest_client [req-fff1e174-928a-488b-b459-e6838703f5ba ] Request (VolumeTypesAccessRbacTest:test_add_type_access): 200 GET http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles 0.108s 2020-12-14 02:19:52.256 193 DEBUG tempest.lib.common.rest_client [req-fff1e174-928a-488b-b459-e6838703f5ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fff1e174-928a-488b-b459-e6838703f5ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:52.310 186 INFO tempest.lib.common.rest_client [req-3f5f3803-14bd-4d24-b446-6f42038d62b1 ] Request (TrunksExtRbacTest:test_show_trunk): 201 POST http://172.30.13.94:9696/v2.0/trunks 0.450s 2020-12-14 02:19:52.314 186 DEBUG tempest.lib.common.rest_client [req-3f5f3803-14bd-4d24-b446-6f42038d62b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"trunk": {"port_id": "9ff28b8a-5206-4070-9a06-bffac3cc32b7", "sub_ports": []}} Response - Headers: {'content-type': 'application/json', 'content-length': '407', 'x-openstack-request-id': 'req-3f5f3803-14bd-4d24-b446-6f42038d62b1', 'date': 'Mon, 14 Dec 2020 02:19:52 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks'} Body: b'{"trunk": {"admin_state_up": true, "id": "645b5f6a-5f2f-419c-a3f5-939b532b31ba", "project_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "", "port_id": "9ff28b8a-5206-4070-9a06-bffac3cc32b7", "status": "DOWN", "sub_ports": [], "revision_number": 0, "description": "", "created_at": "2020-12-14T02:19:52Z", "updated_at": "2020-12-14T02:19:52Z", "tenant_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:52.317 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:52.358 193 INFO tempest.lib.common.rest_client [req-106e33cb-71a0-4a3f-8685-7b03b461154a ] Request (VolumeTypesAccessRbacTest:test_add_type_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:19:52.362 193 DEBUG tempest.lib.common.rest_client [req-106e33cb-71a0-4a3f-8685-7b03b461154a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-106e33cb-71a0-4a3f-8685-7b03b461154a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "890fa0b67704469395c8cad5fe8605aa", "name": "tempest-VolumeTypesAccessRbacTest-2109066065", "password_expires_at": null}, "audit_ids": ["wmd6Cw2WRNeZfWSMQxP-jw"], "expires_at": "2020-12-14T03:19:52.000000Z", "issued_at": "2020-12-14T02:19:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5114ff3233764a87b2e8fb927b4b3078", "name": "tempest-VolumeTypesAccessRbacTest-2109066065"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:52.389 186 INFO tempest.lib.common.rest_client [req-73e6d3b8-4450-4387-8e03-dec414650fb3 ] Request (TrunksExtRbacTest:test_show_trunk): 200 GET http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles 0.067s 2020-12-14 02:19:52.392 186 DEBUG tempest.lib.common.rest_client [req-73e6d3b8-4450-4387-8e03-dec414650fb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73e6d3b8-4450-4387-8e03-dec414650fb3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:52.504 186 INFO tempest.lib.common.rest_client [req-f3fe8a92-f04b-44ae-b4dd-b20c85031511 ] Request (TrunksExtRbacTest:test_show_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:19:52.507 186 DEBUG tempest.lib.common.rest_client [req-f3fe8a92-f04b-44ae-b4dd-b20c85031511 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3fe8a92-f04b-44ae-b4dd-b20c85031511', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["qVxYVLUNRh2ONe_oLiQISQ"], "expires_at": "2020-12-14T03:19:52.000000Z", "issued_at": "2020-12-14T02:19:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:52.526 193 INFO tempest.lib.common.rest_client [req-6a3dadbe-de15-4607-8218-d9cf800e3a20 ] Request (VolumeTypesAccessRbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463/action 0.154s 2020-12-14 02:19:52.530 193 DEBUG tempest.lib.common.rest_client [req-6a3dadbe-de15-4607-8218-d9cf800e3a20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeProjectAccess": {"project": "5114ff3233764a87b2e8fb927b4b3078"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6a3dadbe-de15-4607-8218-d9cf800e3a20', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:52.541 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:52.558 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_type_access, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:52.561 186 INFO tempest.lib.common.rest_client [req-6f13f8c4-40a4-49b1-aeb8-f2abacc75e68 ] Request (TrunksExtRbacTest:test_show_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:19:52.566 186 DEBUG tempest.lib.common.rest_client [req-6f13f8c4-40a4-49b1-aeb8-f2abacc75e68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f13f8c4-40a4-49b1-aeb8-f2abacc75e68', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["4eumbcuoS0ajfcdT3sdiRA"], "expires_at": "2020-12-14T03:19:52.000000Z", "issued_at": "2020-12-14T02:19:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:52.611 193 INFO tempest.lib.common.rest_client [req-d068ff75-79ac-4fb2-9f7c-28c9c5f08a8a ] Request (VolumeTypesAccessRbacTest:test_list_type_access): 202 POST http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463/action 0.047s 2020-12-14 02:19:52.613 197 INFO tempest.lib.common.rest_client [req-07344419-0e02-4aa3-b18e-53af9c140ffb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.217s 2020-12-14 02:19:52.614 193 DEBUG tempest.lib.common.rest_client [req-d068ff75-79ac-4fb2-9f7c-28c9c5f08a8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addProjectAccess": {"project": "5114ff3233764a87b2e8fb927b4b3078"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d068ff75-79ac-4fb2-9f7c-28c9c5f08a8a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:52.616 197 DEBUG tempest.lib.common.rest_client [req-07344419-0e02-4aa3-b18e-53af9c140ffb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-07344419-0e02-4aa3-b18e-53af9c140ffb', 'x-compute-request-id': 'req-07344419-0e02-4aa3-b18e-53af9c140ffb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:52.618 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:52.744 186 INFO tempest.lib.common.rest_client [req-d358fb57-3c45-4b1b-8f4f-f22bb4e53e86 ] Request (TrunksExtRbacTest:test_show_trunk): 200 GET http://172.30.13.94:9696/v2.0/trunks/645b5f6a-5f2f-419c-a3f5-939b532b31ba 0.166s 2020-12-14 02:19:52.748 186 DEBUG tempest.lib.common.rest_client [req-d358fb57-3c45-4b1b-8f4f-f22bb4e53e86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '407', 'x-openstack-request-id': 'req-d358fb57-3c45-4b1b-8f4f-f22bb4e53e86', 'date': 'Mon, 14 Dec 2020 02:19:52 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/645b5f6a-5f2f-419c-a3f5-939b532b31ba'} Body: b'{"trunk": {"admin_state_up": true, "id": "645b5f6a-5f2f-419c-a3f5-939b532b31ba", "project_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "", "port_id": "9ff28b8a-5206-4070-9a06-bffac3cc32b7", "status": "DOWN", "sub_ports": [], "revision_number": 0, "description": "", "created_at": "2020-12-14T02:19:52Z", "updated_at": "2020-12-14T02:19:52Z", "tenant_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:52.751 193 INFO tempest.lib.common.rest_client [req-2aca9da3-9ffe-400e-a8f7-b93685b8a0b1 ] Request (VolumeTypesAccessRbacTest:test_list_type_access): 200 GET http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles 0.128s 2020-12-14 02:19:52.753 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:52.755 193 DEBUG tempest.lib.common.rest_client [req-2aca9da3-9ffe-400e-a8f7-b93685b8a0b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2aca9da3-9ffe-400e-a8f7-b93685b8a0b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:52.865 193 INFO tempest.lib.common.rest_client [req-114e7dfc-6377-493c-bc60-9b749a17cad6 ] Request (VolumeTypesAccessRbacTest:test_list_type_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:19:52.869 193 DEBUG tempest.lib.common.rest_client [req-114e7dfc-6377-493c-bc60-9b749a17cad6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-114e7dfc-6377-493c-bc60-9b749a17cad6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "890fa0b67704469395c8cad5fe8605aa", "name": "tempest-VolumeTypesAccessRbacTest-2109066065", "password_expires_at": null}, "audit_ids": ["RXWLkuQoTqCt17zbfLayrA"], "expires_at": "2020-12-14T03:19:52.000000Z", "issued_at": "2020-12-14T02:19:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5114ff3233764a87b2e8fb927b4b3078", "name": "tempest-VolumeTypesAccessRbacTest-2109066065"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:52.883 186 INFO tempest.lib.common.rest_client [req-ce8dc6f4-3191-4094-8ae1-a06f0740a3ea ] Request (TrunksExtRbacTest:test_show_trunk): 200 GET http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles 0.123s 2020-12-14 02:19:52.886 186 DEBUG tempest.lib.common.rest_client [req-ce8dc6f4-3191-4094-8ae1-a06f0740a3ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce8dc6f4-3191-4094-8ae1-a06f0740a3ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6/users/340bcec773704953be7ef7be3aa3ac96/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:53.010 186 INFO tempest.lib.common.rest_client [req-2765dde8-fd9c-4e90-8677-f9983d0e535f ] Request (TrunksExtRbacTest:test_show_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.118s 2020-12-14 02:19:53.013 186 DEBUG tempest.lib.common.rest_client [req-2765dde8-fd9c-4e90-8677-f9983d0e535f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2765dde8-fd9c-4e90-8677-f9983d0e535f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["AvcIIwBRQXGa9shhFTLd4Q"], "expires_at": "2020-12-14T03:19:52.000000Z", "issued_at": "2020-12-14T02:19:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:53.072 193 INFO tempest.lib.common.rest_client [req-71372f9e-65c0-41d2-a0f0-ba9dc5cdf876 ] Request (VolumeTypesAccessRbacTest:test_list_type_access): 200 GET http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463/os-volume-type-access 0.195s 2020-12-14 02:19:53.075 186 INFO tempest.lib.common.rest_client [req-a901a026-3cb2-484e-8d1f-3d443ca3f6ac ] Request (TrunksExtRbacTest:test_show_trunk): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.055s 2020-12-14 02:19:53.077 193 DEBUG tempest.lib.common.rest_client [req-71372f9e-65c0-41d2-a0f0-ba9dc5cdf876 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-71372f9e-65c0-41d2-a0f0-ba9dc5cdf876', 'content-length': '134', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-71372f9e-65c0-41d2-a0f0-ba9dc5cdf876', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463/os-volume-type-access'} Body: b'{"volume_type_access": [{"volume_type_id": "49dcce99-67e5-45e5-ba4c-11ae093f2463", "project_id": "5114ff3233764a87b2e8fb927b4b3078"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:53.078 186 DEBUG tempest.lib.common.rest_client [req-a901a026-3cb2-484e-8d1f-3d443ca3f6ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a901a026-3cb2-484e-8d1f-3d443ca3f6ac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "340bcec773704953be7ef7be3aa3ac96", "name": "tempest-TrunksExtRbacTest-907243346", "password_expires_at": null}, "audit_ids": ["DLhMSfK1RMum7rnf19cNPg"], "expires_at": "2020-12-14T03:19:53.000000Z", "issued_at": "2020-12-14T02:19:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0580a94f4c5f40d4af1ccb4b673c89c6", "name": "tempest-TrunksExtRbacTest-907243346"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0580a94f4c5f40d4af1ccb4b673c89c6", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:53.105 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:53.197 193 INFO tempest.lib.common.rest_client [req-ebcd39dc-1217-419a-b980-454b392bb159 ] Request (VolumeTypesAccessRbacTest:test_list_type_access): 200 GET http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles 0.086s 2020-12-14 02:19:53.201 193 DEBUG tempest.lib.common.rest_client [req-ebcd39dc-1217-419a-b980-454b392bb159 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ebcd39dc-1217-419a-b980-454b392bb159', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:53.261 193 INFO tempest.lib.common.rest_client [req-7887cf2a-d600-4e55-aea8-7c2b95e89a37 ] Request (VolumeTypesAccessRbacTest:test_list_type_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:19:53.267 193 DEBUG tempest.lib.common.rest_client [req-7887cf2a-d600-4e55-aea8-7c2b95e89a37 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7887cf2a-d600-4e55-aea8-7c2b95e89a37', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "890fa0b67704469395c8cad5fe8605aa", "name": "tempest-VolumeTypesAccessRbacTest-2109066065", "password_expires_at": null}, "audit_ids": ["NMnAOyMZSCWQCBzW2nQq0w"], "expires_at": "2020-12-14T03:19:53.000000Z", "issued_at": "2020-12-14T02:19:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5114ff3233764a87b2e8fb927b4b3078", "name": "tempest-VolumeTypesAccessRbacTest-2109066065"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:53.327 186 INFO tempest.lib.common.rest_client [req-11a4368c-2227-4e52-86c8-2a535b3fff24 ] Request (TrunksExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/trunks/645b5f6a-5f2f-419c-a3f5-939b532b31ba 0.239s 2020-12-14 02:19:53.330 186 DEBUG tempest.lib.common.rest_client [req-11a4368c-2227-4e52-86c8-2a535b3fff24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-11a4368c-2227-4e52-86c8-2a535b3fff24', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:53 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/645b5f6a-5f2f-419c-a3f5-939b532b31ba'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:53.409 193 INFO tempest.lib.common.rest_client [req-d9329681-f5aa-4410-9fc3-c5b238447879 ] Request (VolumeTypesAccessRbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463/action 0.131s 2020-12-14 02:19:53.412 193 DEBUG tempest.lib.common.rest_client [req-d9329681-f5aa-4410-9fc3-c5b238447879 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeProjectAccess": {"project": "5114ff3233764a87b2e8fb927b4b3078"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d9329681-f5aa-4410-9fc3-c5b238447879', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:53.425 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:53.443 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_type_access:removeProjectAccess, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:53.498 193 INFO tempest.lib.common.rest_client [req-77ab41e1-72f8-473e-ab7d-cdb2b3c01fe2 ] Request (VolumeTypesAccessRbacTest:test_remove_type_access): 202 POST http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463/action 0.048s 2020-12-14 02:19:53.502 193 DEBUG tempest.lib.common.rest_client [req-77ab41e1-72f8-473e-ab7d-cdb2b3c01fe2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addProjectAccess": {"project": "5114ff3233764a87b2e8fb927b4b3078"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-77ab41e1-72f8-473e-ab7d-cdb2b3c01fe2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:53.504 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:53.571 193 INFO tempest.lib.common.rest_client [req-eb8e463f-05e9-4f6b-9cf9-5331568e6749 ] Request (VolumeTypesAccessRbacTest:test_remove_type_access): 200 GET http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles 0.060s 2020-12-14 02:19:53.574 193 DEBUG tempest.lib.common.rest_client [req-eb8e463f-05e9-4f6b-9cf9-5331568e6749 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb8e463f-05e9-4f6b-9cf9-5331568e6749', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:53.619 193 INFO tempest.lib.common.rest_client [req-266f7d05-b4c9-4394-9163-de84ba08330a ] Request (VolumeTypesAccessRbacTest:test_remove_type_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:19:53.622 193 DEBUG tempest.lib.common.rest_client [req-266f7d05-b4c9-4394-9163-de84ba08330a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-266f7d05-b4c9-4394-9163-de84ba08330a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "890fa0b67704469395c8cad5fe8605aa", "name": "tempest-VolumeTypesAccessRbacTest-2109066065", "password_expires_at": null}, "audit_ids": ["DO1xZnbyT7uw81m7Y_hgBg"], "expires_at": "2020-12-14T03:19:53.000000Z", "issued_at": "2020-12-14T02:19:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5114ff3233764a87b2e8fb927b4b3078", "name": "tempest-VolumeTypesAccessRbacTest-2109066065"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:53.818 193 INFO tempest.lib.common.rest_client [req-dcc5c9d6-fbec-49b5-aecf-45dfa6d2af06 ] Request (VolumeTypesAccessRbacTest:test_remove_type_access): 202 POST http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463/action 0.188s 2020-12-14 02:19:53.822 193 DEBUG tempest.lib.common.rest_client [req-dcc5c9d6-fbec-49b5-aecf-45dfa6d2af06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeProjectAccess": {"project": "5114ff3233764a87b2e8fb927b4b3078"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-dcc5c9d6-fbec-49b5-aecf-45dfa6d2af06', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:53.824 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:53.841 186 INFO tempest.lib.common.rest_client [req-c8a92cc9-0f7d-496f-92e9-72010ef85d72 ] Request (TrunksExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/9ff28b8a-5206-4070-9a06-bffac3cc32b7 0.494s 2020-12-14 02:19:53.844 186 DEBUG tempest.lib.common.rest_client [req-c8a92cc9-0f7d-496f-92e9-72010ef85d72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-c8a92cc9-0f7d-496f-92e9-72010ef85d72', 'date': 'Mon, 14 Dec 2020 02:19:53 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/9ff28b8a-5206-4070-9a06-bffac3cc32b7'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:53.938 193 INFO tempest.lib.common.rest_client [req-b023e7a3-f0ac-4833-8505-a46463be078c ] Request (VolumeTypesAccessRbacTest:test_remove_type_access): 200 GET http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles 0.109s 2020-12-14 02:19:53.942 193 DEBUG tempest.lib.common.rest_client [req-b023e7a3-f0ac-4833-8505-a46463be078c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b023e7a3-f0ac-4833-8505-a46463be078c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078/users/890fa0b67704469395c8cad5fe8605aa/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:53.991 193 INFO tempest.lib.common.rest_client [req-a608d1fd-dbb5-412b-aae4-1f540d8b2c94 ] Request (VolumeTypesAccessRbacTest:test_remove_type_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:19:53.996 193 DEBUG tempest.lib.common.rest_client [req-a608d1fd-dbb5-412b-aae4-1f540d8b2c94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a608d1fd-dbb5-412b-aae4-1f540d8b2c94', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "890fa0b67704469395c8cad5fe8605aa", "name": "tempest-VolumeTypesAccessRbacTest-2109066065", "password_expires_at": null}, "audit_ids": ["GnuiPaWNTr6OK39C3YwiRg"], "expires_at": "2020-12-14T03:19:53.000000Z", "issued_at": "2020-12-14T02:19:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5114ff3233764a87b2e8fb927b4b3078", "name": "tempest-VolumeTypesAccessRbacTest-2109066065"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5114ff3233764a87b2e8fb927b4b3078", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:54.106 197 INFO tempest.lib.common.rest_client [req-81f69b79-14d9-4500-875b-980ad2a227be ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.386s 2020-12-14 02:19:54.109 197 DEBUG tempest.lib.common.rest_client [req-81f69b79-14d9-4500-875b-980ad2a227be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-81f69b79-14d9-4500-875b-980ad2a227be', 'x-compute-request-id': 'req-81f69b79-14d9-4500-875b-980ad2a227be', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:54.123 193 INFO tempest.lib.common.rest_client [req-d5f16fea-6542-410b-9cdc-7dbbe460cff3 ] Request (VolumeTypesAccessRbacTest:_run_cleanups): 404 POST http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463/action 0.116s 2020-12-14 02:19:54.127 193 DEBUG tempest.lib.common.rest_client [req-d5f16fea-6542-410b-9cdc-7dbbe460cff3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeProjectAccess": {"project": "5114ff3233764a87b2e8fb927b4b3078"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '163', 'content-type': 'application/json', 'x-compute-request-id': 'req-d5f16fea-6542-410b-9cdc-7dbbe460cff3', 'x-openstack-request-id': 'req-d5f16fea-6542-410b-9cdc-7dbbe460cff3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463/action'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type access not found for 49dcce99-67e5-45e5-ba4c-11ae093f2463 / 5114ff3233764a87b2e8fb927b4b3078 combination."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:54.230 193 INFO tempest.lib.common.rest_client [req-729e2661-ddca-4b73-96f8-eedfa11f11c1 ] Request (VolumeTypesAccessRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463 0.089s 2020-12-14 02:19:54.233 193 DEBUG tempest.lib.common.rest_client [req-729e2661-ddca-4b73-96f8-eedfa11f11c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-729e2661-ddca-4b73-96f8-eedfa11f11c1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:54.272 193 INFO tempest.lib.common.rest_client [req-8e463220-ce23-4d77-b553-6c7fe28de3cc ] Request (VolumeTypesAccessRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463 0.033s 2020-12-14 02:19:54.274 193 DEBUG tempest.lib.common.rest_client [req-8e463220-ce23-4d77-b553-6c7fe28de3cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-8e463220-ce23-4d77-b553-6c7fe28de3cc', 'x-openstack-request-id': 'req-8e463220-ce23-4d77-b553-6c7fe28de3cc', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/5114ff3233764a87b2e8fb927b4b3078/types/49dcce99-67e5-45e5-ba4c-11ae093f2463'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 49dcce99-67e5-45e5-ba4c-11ae093f2463 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:54.426 193 INFO tempest.lib.common.rest_client [req-9fadc74e-c2de-4dd5-a2d6-8ca87e5a8dcf ] Request (VolumeTypesAccessRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/890fa0b67704469395c8cad5fe8605aa 0.145s 2020-12-14 02:19:54.428 193 DEBUG tempest.lib.common.rest_client [req-9fadc74e-c2de-4dd5-a2d6-8ca87e5a8dcf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9fadc74e-c2de-4dd5-a2d6-8ca87e5a8dcf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/890fa0b67704469395c8cad5fe8605aa'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:54.509 186 INFO tempest.lib.common.rest_client [req-a028c4c9-3a06-45c7-8c7c-636539e25d48 ] Request (TrunksExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/15506ed5-010e-4f32-895b-1224448ab0ee 0.658s 2020-12-14 02:19:54.511 186 DEBUG tempest.lib.common.rest_client [req-a028c4c9-3a06-45c7-8c7c-636539e25d48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-a028c4c9-3a06-45c7-8c7c-636539e25d48', 'date': 'Mon, 14 Dec 2020 02:19:54 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/15506ed5-010e-4f32-895b-1224448ab0ee'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:54.529 193 INFO tempest.lib.common.rest_client [req-04d5b884-d3b7-4fcf-9313-239645a66403 ] Request (VolumeTypesAccessRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:19:54.532 193 DEBUG tempest.lib.common.rest_client [req-04d5b884-d3b7-4fcf-9313-239645a66403 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04d5b884-d3b7-4fcf-9313-239645a66403', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["WooWHxldSe641ZrPZF6rcA"], "expires_at": "2020-12-14T03:19:54.000000Z", "issued_at": "2020-12-14T02:19:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:54.653 186 INFO tempest.lib.common.rest_client [req-163b3ba9-c8a5-4e65-b650-c359ec21bc0e ] Request (TrunksExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/340bcec773704953be7ef7be3aa3ac96 0.134s 2020-12-14 02:19:54.655 186 DEBUG tempest.lib.common.rest_client [req-163b3ba9-c8a5-4e65-b650-c359ec21bc0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-163b3ba9-c8a5-4e65-b650-c359ec21bc0e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/340bcec773704953be7ef7be3aa3ac96'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:54.758 186 INFO tempest.lib.common.rest_client [req-6d0735a8-4f6c-487d-8d49-385a6d4a53b6 ] Request (TrunksExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:19:54.761 186 DEBUG tempest.lib.common.rest_client [req-6d0735a8-4f6c-487d-8d49-385a6d4a53b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d0735a8-4f6c-487d-8d49-385a6d4a53b6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["yk7RcaiuRU6_eE4Fk3XM0Q"], "expires_at": "2020-12-14T03:19:54.000000Z", "issued_at": "2020-12-14T02:19:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:54.869 193 INFO tempest.lib.common.rest_client [req-4f3ed775-a5d5-4304-be41-59eaecb9fc55 ] Request (VolumeTypesAccessRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5114ff3233764a87b2e8fb927b4b3078&name=default 0.329s 2020-12-14 02:19:54.871 193 DEBUG tempest.lib.common.rest_client [req-4f3ed775-a5d5-4304-be41-59eaecb9fc55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-4f3ed775-a5d5-4304-be41-59eaecb9fc55', 'date': 'Mon, 14 Dec 2020 02:19:54 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5114ff3233764a87b2e8fb927b4b3078&name=default'} Body: b'{"security_groups": [{"id": "287fe7be-1c75-4887-b8c7-9a1edacd9b55", "name": "default", "stateful": true, "tenant_id": "5114ff3233764a87b2e8fb927b4b3078", "description": "Default security group", "security_group_rules": [{"id": "0568e752-b4d4-4ac5-b954-0f920da7ce7e", "tenant_id": "5114ff3233764a87b2e8fb927b4b3078", "security_group_id": "287fe7be-1c75-4887-b8c7-9a1edacd9b55", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:54Z", "updated_at": "2020-12-14T02:19:54Z", "revision_number": 0, "project_id": "5114ff3233764a87b2e8fb927b4b3078"}, {"id": "52034996-3c45-4db5-86b4-84bb0ab58fec", "tenant_id": "5114ff3233764a87b2e8fb927b4b3078", "security_group_id": "287fe7be-1c75-4887-b8c7-9a1edacd9b55", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:54Z", "updated_at": "2020-12-14T02:19:54Z", "revision_number": 0, "project_id": "5114ff3233764a87b2e8fb927b4b3078"}, {"id": "cea90075-aff7-4504-a7b4-aecdfca6b73c", "tenant_id": "5114ff3233764a87b2e8fb927b4b3078", "security_group_id": "287fe7be-1c75-4887-b8c7-9a1edacd9b55", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "287fe7be-1c75-4887-b8c7-9a1edacd9b55", "description": null, "tags": [], "created_at": "2020-12-14T02:19:54Z", "updated_at": "2020-12-14T02:19:54Z", "revision_number": 0, "project_id": "5114ff3233764a87b2e8fb927b4b3078"}, {"id": "e4fa9242-6db4-4e46-aafd-5ef741c606fd", "tenant_id": "5114ff3233764a87b2e8fb927b4b3078", "security_group_id": "287fe7be-1c75-4887-b8c7-9a1edacd9b55", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "287fe7be-1c75-4887-b8c7-9a1edacd9b55", "description": null, "tags": [], "created_at": "2020-12-14T02:19:54Z", "updated_at": "2020-12-14T02:19:54Z", "revision_number": 0, "project_id": "5114ff3233764a87b2e8fb927b4b3078"}], "tags": [], "created_at": "2020-12-14T02:19:54Z", "updated_at": "2020-12-14T02:19:54Z", "revision_number": 1, "project_id": "5114ff3233764a87b2e8fb927b4b3078"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:54.913 186 INFO tempest.lib.common.rest_client [req-cfb4676f-0f8b-4cb0-82cc-7903aa88c321 ] Request (TrunksExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0580a94f4c5f40d4af1ccb4b673c89c6&name=default 0.147s 2020-12-14 02:19:54.916 186 DEBUG tempest.lib.common.rest_client [req-cfb4676f-0f8b-4cb0-82cc-7903aa88c321 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-cfb4676f-0f8b-4cb0-82cc-7903aa88c321', 'date': 'Mon, 14 Dec 2020 02:19:54 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0580a94f4c5f40d4af1ccb4b673c89c6&name=default'} Body: b'{"security_groups": [{"id": "a9a11c15-4651-4722-be86-f1d935903c18", "name": "default", "stateful": true, "tenant_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "description": "Default security group", "security_group_rules": [{"id": "09ffb126-bf35-4b28-9842-8638e896c0f0", "tenant_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "security_group_id": "a9a11c15-4651-4722-be86-f1d935903c18", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:46Z", "updated_at": "2020-12-14T02:19:46Z", "revision_number": 0, "project_id": "0580a94f4c5f40d4af1ccb4b673c89c6"}, {"id": "0a3b20ab-fde2-423b-88ef-244482f41d39", "tenant_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "security_group_id": "a9a11c15-4651-4722-be86-f1d935903c18", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a9a11c15-4651-4722-be86-f1d935903c18", "description": null, "tags": [], "created_at": "2020-12-14T02:19:46Z", "updated_at": "2020-12-14T02:19:46Z", "revision_number": 0, "project_id": "0580a94f4c5f40d4af1ccb4b673c89c6"}, {"id": "18f3d90f-040a-4507-ae09-a7356f9585b7", "tenant_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "security_group_id": "a9a11c15-4651-4722-be86-f1d935903c18", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a9a11c15-4651-4722-be86-f1d935903c18", "description": null, "tags": [], "created_at": "2020-12-14T02:19:46Z", "updated_at": "2020-12-14T02:19:46Z", "revision_number": 0, "project_id": "0580a94f4c5f40d4af1ccb4b673c89c6"}, {"id": "85bdc242-5538-49d0-a27f-453582e7ede2", "tenant_id": "0580a94f4c5f40d4af1ccb4b673c89c6", "security_group_id": "a9a11c15-4651-4722-be86-f1d935903c18", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:19:46Z", "updated_at": "2020-12-14T02:19:46Z", "revision_number": 0, "project_id": "0580a94f4c5f40d4af1ccb4b673c89c6"}], "tags": [], "created_at": "2020-12-14T02:19:46Z", "updated_at": "2020-12-14T02:19:46Z", "revision_number": 1, "project_id": "0580a94f4c5f40d4af1ccb4b673c89c6"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.041 193 INFO tempest.lib.common.rest_client [req-69973900-62f0-4852-ab12-e58b42183ee2 ] Request (VolumeTypesAccessRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/287fe7be-1c75-4887-b8c7-9a1edacd9b55 0.163s 2020-12-14 02:19:55.044 193 DEBUG tempest.lib.common.rest_client [req-69973900-62f0-4852-ab12-e58b42183ee2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-69973900-62f0-4852-ab12-e58b42183ee2', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/287fe7be-1c75-4887-b8c7-9a1edacd9b55'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.050 189 INFO tempest.lib.common.rest_client [req-b38250fc-b623-493a-82c6-97219dc02497 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 5.730s 2020-12-14 02:19:55.053 189 DEBUG tempest.lib.common.rest_client [req-b38250fc-b623-493a-82c6-97219dc02497 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b38250fc-b623-493a-82c6-97219dc02497', 'x-compute-request-id': 'req-b38250fc-b623-493a-82c6-97219dc02497', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.079 186 INFO tempest.lib.common.rest_client [req-8c5e351d-88ed-4772-849f-f3c9610c3d55 ] Request (TrunksExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/a9a11c15-4651-4722-be86-f1d935903c18 0.156s 2020-12-14 02:19:55.082 186 DEBUG tempest.lib.common.rest_client [req-8c5e351d-88ed-4772-849f-f3c9610c3d55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8c5e351d-88ed-4772-849f-f3c9610c3d55', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/a9a11c15-4651-4722-be86-f1d935903c18'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.269 186 INFO tempest.lib.common.rest_client [req-df1ee657-4e1b-41e1-96f3-6bd9edd9ff53 ] Request (TrunksExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6 0.179s 2020-12-14 02:19:55.272 186 DEBUG tempest.lib.common.rest_client [req-df1ee657-4e1b-41e1-96f3-6bd9edd9ff53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df1ee657-4e1b-41e1-96f3-6bd9edd9ff53', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0580a94f4c5f40d4af1ccb4b673c89c6'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.292 193 INFO tempest.lib.common.rest_client [req-fa3f922f-da68-4dfa-9a34-5a1b55a6dca6 ] Request (VolumeTypesAccessRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078 0.241s 2020-12-14 02:19:55.296 193 DEBUG tempest.lib.common.rest_client [req-fa3f922f-da68-4dfa-9a34-5a1b55a6dca6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa3f922f-da68-4dfa-9a34-5a1b55a6dca6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5114ff3233764a87b2e8fb927b4b3078'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.391 186 INFO tempest.lib.common.rest_client [req-39a51fec-b9e3-4333-91bc-aa80015e09fd ] Request (GroupTypeSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:19:55.394 186 DEBUG tempest.lib.common.rest_client [req-39a51fec-b9e3-4333-91bc-aa80015e09fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39a51fec-b9e3-4333-91bc-aa80015e09fd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["uBRGnlFIRR6mGY_KeSjUtA"], "expires_at": "2020-12-14T03:19:55.000000Z", "issued_at": "2020-12-14T02:19:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.401 193 INFO tempest.lib.common.rest_client [req-45a86916-9ff9-49cb-9b64-f0cfabddc073 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-14 02:19:55.405 193 DEBUG tempest.lib.common.rest_client [req-45a86916-9ff9-49cb-9b64-f0cfabddc073 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45a86916-9ff9-49cb-9b64-f0cfabddc073', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["scD8Ed9tTkCcAKORWCjW9A"], "expires_at": "2020-12-14T03:19:55.000000Z", "issued_at": "2020-12-14T02:19:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.436 197 INFO tempest.lib.common.rest_client [req-2df1b44a-393f-460a-a34b-94dbec97380f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.219s 2020-12-14 02:19:55.440 197 DEBUG tempest.lib.common.rest_client [req-2df1b44a-393f-460a-a34b-94dbec97380f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2df1b44a-393f-460a-a34b-94dbec97380f', 'x-compute-request-id': 'req-2df1b44a-393f-460a-a34b-94dbec97380f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.490 186 INFO tempest.lib.common.rest_client [req-b8383418-9427-4948-b0ad-856ba883b9ca ] Request (GroupTypeSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:19:55.493 186 DEBUG tempest.lib.common.rest_client [req-b8383418-9427-4948-b0ad-856ba883b9ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8383418-9427-4948-b0ad-856ba883b9ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ClXwNWq0QvadLxorScLPiQ"], "expires_at": "2020-12-14T03:19:55.000000Z", "issued_at": "2020-12-14T02:19:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.521 193 INFO tempest.lib.common.rest_client [req-2cbb2b78-f50c-49c4-a6a5-55fde27d8052 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.058s 2020-12-14 02:19:55.525 193 DEBUG tempest.lib.common.rest_client [req-2cbb2b78-f50c-49c4-a6a5-55fde27d8052 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2cbb2b78-f50c-49c4-a6a5-55fde27d8052', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["NrT3BhQ3T4mf_5MYJeTXEg"], "expires_at": "2020-12-14T03:19:55.000000Z", "issued_at": "2020-12-14T02:19:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.563 186 INFO tempest.lib.common.rest_client [req-d9b45c89-8da5-4ed7-82d8-1bbede71abfa ] Request (GroupTypeSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.062s 2020-12-14 02:19:55.566 186 DEBUG tempest.lib.common.rest_client [req-d9b45c89-8da5-4ed7-82d8-1bbede71abfa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9b45c89-8da5-4ed7-82d8-1bbede71abfa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.587 193 INFO tempest.lib.common.rest_client [req-4b050d09-36e5-4bda-819b-9619bbb93040 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.055s 2020-12-14 02:19:55.591 193 DEBUG tempest.lib.common.rest_client [req-4b050d09-36e5-4bda-819b-9619bbb93040 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b050d09-36e5-4bda-819b-9619bbb93040', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.652 186 INFO tempest.lib.common.rest_client [req-d0762137-7f36-46a3-aa16-9c762f585b42 ] Request (GroupTypeSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.078s 2020-12-14 02:19:55.655 186 DEBUG tempest.lib.common.rest_client [req-d0762137-7f36-46a3-aa16-9c762f585b42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-GroupTypeSpecsRbacTest-1789829407-desc", "domain_id": "default", "name": "tempest-GroupTypeSpecsRbacTest-1789829407"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0762137-7f36-46a3-aa16-9c762f585b42', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "fd4cc19984854eafba36a80901bdbda8", "name": "tempest-GroupTypeSpecsRbacTest-1789829407", "domain_id": "default", "description": "tempest-GroupTypeSpecsRbacTest-1789829407-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.702 193 INFO tempest.lib.common.rest_client [req-b0861aab-e1f6-4bd3-b70c-b6cd7753e0a6 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.103s 2020-12-14 02:19:55.705 193 DEBUG tempest.lib.common.rest_client [req-b0861aab-e1f6-4bd3-b70c-b6cd7753e0a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402-desc", "domain_id": "default", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '396', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b0861aab-e1f6-4bd3-b70c-b6cd7753e0a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "62ae6831eaa2476e83d44f73edd4b565", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402", "domain_id": "default", "description": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.790 186 INFO tempest.lib.common.rest_client [req-3fc5ac0d-8aaf-44f9-8b87-e51ba8e6062e ] Request (GroupTypeSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.124s 2020-12-14 02:19:55.793 186 DEBUG tempest.lib.common.rest_client [req-3fc5ac0d-8aaf-44f9-8b87-e51ba8e6062e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-GroupTypeSpecsRbacTest-1789829407", "password": "I8~*YEMP++B2#UT", "project_id": "fd4cc19984854eafba36a80901bdbda8", "email": "tempest-GroupTypeSpecsRbacTest-1628576026@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '400', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3fc5ac0d-8aaf-44f9-8b87-e51ba8e6062e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "fd4cc19984854eafba36a80901bdbda8", "email": "tempest-GroupTypeSpecsRbacTest-1628576026@example.com", "id": "11d47b4c6c9545f18f92a4a6c91ff059", "name": "tempest-GroupTypeSpecsRbacTest-1789829407", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/11d47b4c6c9545f18f92a4a6c91ff059"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.812 193 INFO tempest.lib.common.rest_client [req-07ae46c0-8929-4a84-bad3-a4e7ca265962 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.098s 2020-12-14 02:19:55.816 193 DEBUG tempest.lib.common.rest_client [req-07ae46c0-8929-4a84-bad3-a4e7ca265962 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402", "password": "W7_v=64!dNF*kXa", "project_id": "62ae6831eaa2476e83d44f73edd4b565", "email": "tempest-VolumeTypesExtraSpecsRbacTest-2109421715@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '414', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07ae46c0-8929-4a84-bad3-a4e7ca265962', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "62ae6831eaa2476e83d44f73edd4b565", "email": "tempest-VolumeTypesExtraSpecsRbacTest-2109421715@example.com", "id": "a038b071c61845fb9dff5433d2703eee", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/a038b071c61845fb9dff5433d2703eee"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.861 186 INFO tempest.lib.common.rest_client [req-5d2e61a1-3497-4d2d-9d1e-213f78f43821 ] Request (GroupTypeSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:19:55.863 186 DEBUG tempest.lib.common.rest_client [req-5d2e61a1-3497-4d2d-9d1e-213f78f43821 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d2e61a1-3497-4d2d-9d1e-213f78f43821', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.885 193 INFO tempest.lib.common.rest_client [req-754d847b-0e9f-4514-b29d-628da229d7c2 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:19:55.889 193 DEBUG tempest.lib.common.rest_client [req-754d847b-0e9f-4514-b29d-628da229d7c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-754d847b-0e9f-4514-b29d-628da229d7c2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.931 186 INFO tempest.lib.common.rest_client [req-72c9a44f-69d8-473d-a638-f4629c088351 ] Request (GroupTypeSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:19:55.934 186 DEBUG tempest.lib.common.rest_client [req-72c9a44f-69d8-473d-a638-f4629c088351 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-72c9a44f-69d8-473d-a638-f4629c088351', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:55.954 193 INFO tempest.lib.common.rest_client [req-3ee412d7-69b8-4df0-ae73-88c238dc9431 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:19:55.957 193 DEBUG tempest.lib.common.rest_client [req-3ee412d7-69b8-4df0-ae73-88c238dc9431 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ee412d7-69b8-4df0-ae73-88c238dc9431', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.003 186 INFO tempest.lib.common.rest_client [req-12b9b6b4-04eb-4013-be0b-482aa76437c9 ] Request (GroupTypeSpecsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles/72a4576c553448cd941b052c1ca0cf2d 0.061s 2020-12-14 02:19:56.005 186 DEBUG tempest.lib.common.rest_client [req-12b9b6b4-04eb-4013-be0b-482aa76437c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-12b9b6b4-04eb-4013-be0b-482aa76437c9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.007 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupTypeSpecsRbacTest-1789829407', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'fd4cc19984854eafba36a80901bdbda8', 'project_name': 'tempest-GroupTypeSpecsRbacTest-1789829407', 'tenant_id': 'fd4cc19984854eafba36a80901bdbda8', 'tenant_name': 'tempest-GroupTypeSpecsRbacTest-1789829407', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '11d47b4c6c9545f18f92a4a6c91ff059'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:56.009 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupTypeSpecsRbacTest-1789829407', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'fd4cc19984854eafba36a80901bdbda8', 'project_name': 'tempest-GroupTypeSpecsRbacTest-1789829407', 'tenant_id': 'fd4cc19984854eafba36a80901bdbda8', 'tenant_name': 'tempest-GroupTypeSpecsRbacTest-1789829407', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '11d47b4c6c9545f18f92a4a6c91ff059'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:56.079 193 INFO tempest.lib.common.rest_client [req-f07b6c0d-d50b-47d0-9aff-7da124cfe882 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles/72a4576c553448cd941b052c1ca0cf2d 0.113s 2020-12-14 02:19:56.082 193 DEBUG tempest.lib.common.rest_client [req-f07b6c0d-d50b-47d0-9aff-7da124cfe882 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f07b6c0d-d50b-47d0-9aff-7da124cfe882', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.086 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeTypesExtraSpecsRbacTest-1954559402', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '62ae6831eaa2476e83d44f73edd4b565', 'project_name': 'tempest-VolumeTypesExtraSpecsRbacTest-1954559402', 'tenant_id': '62ae6831eaa2476e83d44f73edd4b565', 'tenant_name': 'tempest-VolumeTypesExtraSpecsRbacTest-1954559402', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'a038b071c61845fb9dff5433d2703eee'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:56.088 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeTypesExtraSpecsRbacTest-1954559402', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '62ae6831eaa2476e83d44f73edd4b565', 'project_name': 'tempest-VolumeTypesExtraSpecsRbacTest-1954559402', 'tenant_id': '62ae6831eaa2476e83d44f73edd4b565', 'tenant_name': 'tempest-VolumeTypesExtraSpecsRbacTest-1954559402', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'a038b071c61845fb9dff5433d2703eee'}, Network: None, Subnet: None, Router: None 2020-12-14 02:19:56.168 186 INFO tempest.lib.common.rest_client [req-c634c357-adff-4944-99f5-a1460e364457 ] Request (GroupTypeSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:19:56.171 186 DEBUG tempest.lib.common.rest_client [req-c634c357-adff-4944-99f5-a1460e364457 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c634c357-adff-4944-99f5-a1460e364457', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11d47b4c6c9545f18f92a4a6c91ff059", "name": "tempest-GroupTypeSpecsRbacTest-1789829407", "password_expires_at": null}, "audit_ids": ["2eVWH4I5Tx273CCMwowgmQ"], "expires_at": "2020-12-14T03:19:56.000000Z", "issued_at": "2020-12-14T02:19:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd4cc19984854eafba36a80901bdbda8", "name": "tempest-GroupTypeSpecsRbacTest-1789829407"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.255 186 INFO tempest.lib.common.rest_client [req-5a55637b-34b5-48a6-8050-80f204aed687 ] Request (GroupTypeSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.074s 2020-12-14 02:19:56.258 186 DEBUG tempest.lib.common.rest_client [req-5a55637b-34b5-48a6-8050-80f204aed687 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a55637b-34b5-48a6-8050-80f204aed687', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["vmqmO6WHQHO1GMsJNXS2Mw"], "expires_at": "2020-12-14T03:19:56.000000Z", "issued_at": "2020-12-14T02:19:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.269 193 INFO tempest.lib.common.rest_client [req-adfdbd5e-c65a-46f1-adfa-97a5237fb364 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.118s 2020-12-14 02:19:56.273 193 DEBUG tempest.lib.common.rest_client [req-adfdbd5e-c65a-46f1-adfa-97a5237fb364 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6589', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-adfdbd5e-c65a-46f1-adfa-97a5237fb364', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a038b071c61845fb9dff5433d2703eee", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402", "password_expires_at": null}, "audit_ids": ["5XniI9L4Tg60CrmfAuRfow"], "expires_at": "2020-12-14T03:19:56.000000Z", "issued_at": "2020-12-14T02:19:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62ae6831eaa2476e83d44f73edd4b565", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.326 193 INFO tempest.lib.common.rest_client [req-a71502fb-630c-4d60-8642-0baffdcaef48 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:19:56.329 193 DEBUG tempest.lib.common.rest_client [req-a71502fb-630c-4d60-8642-0baffdcaef48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a71502fb-630c-4d60-8642-0baffdcaef48', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["r8gfwSD_R2uPBZJ0qXMziw"], "expires_at": "2020-12-14T03:19:56.000000Z", "issued_at": "2020-12-14T02:19:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.349 186 INFO tempest.lib.common.rest_client [req-cc1c727d-6a99-44dd-b1cd-e366a611c4ff ] Request (GroupTypeSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:19:56.352 186 DEBUG tempest.lib.common.rest_client [req-cc1c727d-6a99-44dd-b1cd-e366a611c4ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cc1c727d-6a99-44dd-b1cd-e366a611c4ff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["plCRCo1pQXemKrB0e1U55g"], "expires_at": "2020-12-14T03:19:56.000000Z", "issued_at": "2020-12-14T02:19:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.362 189 INFO tempest.lib.common.rest_client [req-f2621c11-1a48-4782-8bb6-968d4ce61cda ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.218s 2020-12-14 02:19:56.366 189 DEBUG tempest.lib.common.rest_client [req-f2621c11-1a48-4782-8bb6-968d4ce61cda ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f2621c11-1a48-4782-8bb6-968d4ce61cda', 'x-compute-request-id': 'req-f2621c11-1a48-4782-8bb6-968d4ce61cda', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.415 186 INFO tempest.lib.common.rest_client [req-c2e17ba2-129c-446e-b239-82d4149fe4db ] Request (GroupTypeSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.056s 2020-12-14 02:19:56.417 186 DEBUG tempest.lib.common.rest_client [req-c2e17ba2-129c-446e-b239-82d4149fe4db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2e17ba2-129c-446e-b239-82d4149fe4db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.479 193 INFO tempest.lib.common.rest_client [req-07e2cc92-65bd-4479-90f7-53e2bdb332d3 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-12-14 02:19:56.482 193 DEBUG tempest.lib.common.rest_client [req-07e2cc92-65bd-4479-90f7-53e2bdb332d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07e2cc92-65bd-4479-90f7-53e2bdb332d3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["H1qT7QudRWOX60vB5oRbWg"], "expires_at": "2020-12-14T03:19:56.000000Z", "issued_at": "2020-12-14T02:19:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.521 186 INFO tempest.lib.common.rest_client [req-a2259d56-26c7-49e1-9a62-29de31bcc9b4 ] Request (GroupTypeSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.099s 2020-12-14 02:19:56.524 186 DEBUG tempest.lib.common.rest_client [req-a2259d56-26c7-49e1-9a62-29de31bcc9b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2259d56-26c7-49e1-9a62-29de31bcc9b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.527 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:19:56.529 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:56.539 193 INFO tempest.lib.common.rest_client [req-a43f7756-b78d-4f5f-abf7-94388fac6f2c ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.050s 2020-12-14 02:19:56.542 193 DEBUG tempest.lib.common.rest_client [req-a43f7756-b78d-4f5f-abf7-94388fac6f2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a43f7756-b78d-4f5f-abf7-94388fac6f2c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.590 186 INFO tempest.lib.common.rest_client [req-94dd0a9e-77b5-4ff6-98e8-1d65929b4ad6 ] Request (GroupTypeSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles 0.056s 2020-12-14 02:19:56.592 186 DEBUG tempest.lib.common.rest_client [req-94dd0a9e-77b5-4ff6-98e8-1d65929b4ad6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94dd0a9e-77b5-4ff6-98e8-1d65929b4ad6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.600 193 INFO tempest.lib.common.rest_client [req-4825593b-8597-42ea-9ea3-d5a462c8b5c1 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-12-14 02:19:56.604 193 DEBUG tempest.lib.common.rest_client [req-4825593b-8597-42ea-9ea3-d5a462c8b5c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4825593b-8597-42ea-9ea3-d5a462c8b5c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.607 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:19:56.609 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:56.667 186 INFO tempest.lib.common.rest_client [req-b167188d-4348-4ee9-a89b-188822f78526 ] Request (GroupTypeSpecsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-12-14 02:19:56.670 186 DEBUG tempest.lib.common.rest_client [req-b167188d-4348-4ee9-a89b-188822f78526 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b167188d-4348-4ee9-a89b-188822f78526', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.674 193 INFO tempest.lib.common.rest_client [req-9fcc8161-5491-4499-ac15-f9fa3cd5ce9c ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles 0.060s 2020-12-14 02:19:56.676 193 DEBUG tempest.lib.common.rest_client [req-9fcc8161-5491-4499-ac15-f9fa3cd5ce9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9fcc8161-5491-4499-ac15-f9fa3cd5ce9c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.786 186 INFO tempest.lib.common.rest_client [req-7057edba-9ef5-4a69-aac3-927a29b535e0 ] Request (GroupTypeSpecsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles/a629c95d64b3416fb80ae90af4f69c05 0.109s 2020-12-14 02:19:56.789 186 DEBUG tempest.lib.common.rest_client [req-7057edba-9ef5-4a69-aac3-927a29b535e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7057edba-9ef5-4a69-aac3-927a29b535e0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.803 193 INFO tempest.lib.common.rest_client [req-1eed25cb-83f7-4c0b-8924-d68b4acc4a36 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles/72a4576c553448cd941b052c1ca0cf2d 0.120s 2020-12-14 02:19:56.803 197 INFO tempest.lib.common.rest_client [req-30f136f9-27a2-4347-9ed1-192935a4b20f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.244s 2020-12-14 02:19:56.806 193 DEBUG tempest.lib.common.rest_client [req-1eed25cb-83f7-4c0b-8924-d68b4acc4a36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1eed25cb-83f7-4c0b-8924-d68b4acc4a36', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.807 197 DEBUG tempest.lib.common.rest_client [req-30f136f9-27a2-4347-9ed1-192935a4b20f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-30f136f9-27a2-4347-9ed1-192935a4b20f', 'x-compute-request-id': 'req-30f136f9-27a2-4347-9ed1-192935a4b20f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:56.896 193 INFO tempest.lib.common.rest_client [req-7082569c-6f42-478e-aca3-afb063afe8eb ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles/a629c95d64b3416fb80ae90af4f69c05 0.083s 2020-12-14 02:19:56.899 193 DEBUG tempest.lib.common.rest_client [req-7082569c-6f42-478e-aca3-afb063afe8eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7082569c-6f42-478e-aca3-afb063afe8eb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:57.675 189 INFO tempest.lib.common.rest_client [req-f064743b-683e-4c22-b229-fae20929b319 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.203s 2020-12-14 02:19:57.678 189 DEBUG tempest.lib.common.rest_client [req-f064743b-683e-4c22-b229-fae20929b319 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f064743b-683e-4c22-b229-fae20929b319', 'x-compute-request-id': 'req-f064743b-683e-4c22-b229-fae20929b319', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:57.874 186 INFO tempest.lib.common.rest_client [req-864c01ea-332d-4b9c-b1d1-9fd294cd0b54 ] Request (GroupTypeSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-12-14 02:19:57.877 186 DEBUG tempest.lib.common.rest_client [req-864c01ea-332d-4b9c-b1d1-9fd294cd0b54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-864c01ea-332d-4b9c-b1d1-9fd294cd0b54', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11d47b4c6c9545f18f92a4a6c91ff059", "name": "tempest-GroupTypeSpecsRbacTest-1789829407", "password_expires_at": null}, "audit_ids": ["ziouFoRLSPy8_HH5TQ5aCw"], "expires_at": "2020-12-14T03:19:57.000000Z", "issued_at": "2020-12-14T02:19:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd4cc19984854eafba36a80901bdbda8", "name": "tempest-GroupTypeSpecsRbacTest-1789829407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:57.889 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:58.002 193 INFO tempest.lib.common.rest_client [req-6bf9cce3-4ae8-4efc-bb9d-ede07506fcba ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:19:58.005 193 DEBUG tempest.lib.common.rest_client [req-6bf9cce3-4ae8-4efc-bb9d-ede07506fcba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6bf9cce3-4ae8-4efc-bb9d-ede07506fcba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a038b071c61845fb9dff5433d2703eee", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402", "password_expires_at": null}, "audit_ids": ["HbIwldaUSJCpuQUVkwv5Lw"], "expires_at": "2020-12-14T03:19:57.000000Z", "issued_at": "2020-12-14T02:19:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62ae6831eaa2476e83d44f73edd4b565", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.075 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:group_types_specs, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:58.110 197 INFO tempest.lib.common.rest_client [req-afb98223-a522-4d19-9c30-c6ef903e1c85 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.196s 2020-12-14 02:19:58.114 197 DEBUG tempest.lib.common.rest_client [req-afb98223-a522-4d19-9c30-c6ef903e1c85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-afb98223-a522-4d19-9c30-c6ef903e1c85', 'x-compute-request-id': 'req-afb98223-a522-4d19-9c30-c6ef903e1c85', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.222 193 INFO tempest.lib.common.rest_client [req-928ff4c5-9171-4898-be51-e21721033395 ] Request (VolumeTypesExtraSpecsRbacTest:setUpClass): 200 POST http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types 0.207s 2020-12-14 02:19:58.224 193 DEBUG tempest.lib.common.rest_client [req-928ff4c5-9171-4898-be51-e21721033395 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeTypesExtraSpecsRbacTest-volume-type-1825412090"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-928ff4c5-9171-4898-be51-e21721033395', 'content-length': '235', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-928ff4c5-9171-4898-be51-e21721033395', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types'} Body: b'{"volume_type": {"id": "ab15aca1-a23a-4b62-bb5d-e58675c78983", "name": "tempest-VolumeTypesExtraSpecsRbacTest-volume-type-1825412090", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.252 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:58.261 186 INFO tempest.lib.common.rest_client [req-de561341-3304-4e91-8169-068e9e04324d ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_create): 202 POST http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types 0.179s 2020-12-14 02:19:58.265 186 DEBUG tempest.lib.common.rest_client [req-de561341-3304-4e91-8169-068e9e04324d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypeSpecsRbacTest-group-type-1514072312"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-de561341-3304-4e91-8169-068e9e04324d', 'content-length': '185', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-de561341-3304-4e91-8169-068e9e04324d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types'} Body: b'{"group_type": {"id": "664d9c5d-1a9f-4351-9480-7311a3bfaa36", "name": "tempest-GroupTypeSpecsRbacTest-group-type-1514072312", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.271 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:types_extra_specs:create, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:58.273 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:58.288 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:58.387 193 INFO tempest.lib.common.rest_client [req-c6617a44-e3db-4412-a65c-05ee1b5050fc ] Request (VolumeTypesExtraSpecsRbacTest:test_create_volume_type_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles 0.105s 2020-12-14 02:19:58.391 193 DEBUG tempest.lib.common.rest_client [req-c6617a44-e3db-4412-a65c-05ee1b5050fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6617a44-e3db-4412-a65c-05ee1b5050fc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.406 186 INFO tempest.lib.common.rest_client [req-dbf3eebe-24a9-4ee8-a9ae-5ea62bc9f38d ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_create): 200 GET http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles 0.111s 2020-12-14 02:19:58.408 186 DEBUG tempest.lib.common.rest_client [req-dbf3eebe-24a9-4ee8-a9ae-5ea62bc9f38d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dbf3eebe-24a9-4ee8-a9ae-5ea62bc9f38d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.451 193 INFO tempest.lib.common.rest_client [req-a3c8947b-2927-45ac-86f6-0e5b2b5d11c4 ] Request (VolumeTypesExtraSpecsRbacTest:test_create_volume_type_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:19:58.456 193 DEBUG tempest.lib.common.rest_client [req-a3c8947b-2927-45ac-86f6-0e5b2b5d11c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3c8947b-2927-45ac-86f6-0e5b2b5d11c4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a038b071c61845fb9dff5433d2703eee", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402", "password_expires_at": null}, "audit_ids": ["-c-J0_sXTr-GR2SRLx_xYw"], "expires_at": "2020-12-14T03:19:58.000000Z", "issued_at": "2020-12-14T02:19:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62ae6831eaa2476e83d44f73edd4b565", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.462 186 INFO tempest.lib.common.rest_client [req-680b081d-c013-4975-8274-b31ed6149d43 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_create): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:19:58.466 186 DEBUG tempest.lib.common.rest_client [req-680b081d-c013-4975-8274-b31ed6149d43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-680b081d-c013-4975-8274-b31ed6149d43', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11d47b4c6c9545f18f92a4a6c91ff059", "name": "tempest-GroupTypeSpecsRbacTest-1789829407", "password_expires_at": null}, "audit_ids": ["2P9UQACRQFeoAU0spVoMLQ"], "expires_at": "2020-12-14T03:19:58.000000Z", "issued_at": "2020-12-14T02:19:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd4cc19984854eafba36a80901bdbda8", "name": "tempest-GroupTypeSpecsRbacTest-1789829407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.579 186 INFO tempest.lib.common.rest_client [req-bd19a557-6612-4b15-81ed-9723d59f3420 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_create): 202 POST http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/664d9c5d-1a9f-4351-9480-7311a3bfaa36/group_specs 0.106s 2020-12-14 02:19:58.582 186 DEBUG tempest.lib.common.rest_client [req-bd19a557-6612-4b15-81ed-9723d59f3420 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_specs": {"key1": "value1", "key2": "value2"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bd19a557-6612-4b15-81ed-9723d59f3420', 'content-length': '53', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bd19a557-6612-4b15-81ed-9723d59f3420', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/664d9c5d-1a9f-4351-9480-7311a3bfaa36/group_specs'} Body: b'{"group_specs": {"key1": "value1", "key2": "value2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.595 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:58.626 193 INFO tempest.lib.common.rest_client [req-aa0bb7c8-ace8-4a0b-80ac-811f38adb0f5 ] Request (VolumeTypesExtraSpecsRbacTest:test_create_volume_type_extra_specs): 200 POST http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs 0.161s 2020-12-14 02:19:58.629 193 DEBUG tempest.lib.common.rest_client [req-aa0bb7c8-ace8-4a0b-80ac-811f38adb0f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678": "val1"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-aa0bb7c8-ace8-4a0b-80ac-811f38adb0f5', 'content-length': '80', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-aa0bb7c8-ace8-4a0b-80ac-811f38adb0f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs'} Body: b'{"extra_specs": {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678": "val1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.644 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:58.662 186 INFO tempest.lib.common.rest_client [req-3c549a29-1512-4bcd-a867-92f7df007b3c ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_create): 200 GET http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles 0.061s 2020-12-14 02:19:58.665 186 DEBUG tempest.lib.common.rest_client [req-3c549a29-1512-4bcd-a867-92f7df007b3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c549a29-1512-4bcd-a867-92f7df007b3c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.707 186 INFO tempest.lib.common.rest_client [req-71140a82-8b2e-4c7d-bcc9-c2f7969eb42a ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_create): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-12-14 02:19:58.707 193 INFO tempest.lib.common.rest_client [req-6db12e4b-5429-4f74-9105-dcaa9de342e3 ] Request (VolumeTypesExtraSpecsRbacTest:test_create_volume_type_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles 0.058s 2020-12-14 02:19:58.709 186 DEBUG tempest.lib.common.rest_client [req-71140a82-8b2e-4c7d-bcc9-c2f7969eb42a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-71140a82-8b2e-4c7d-bcc9-c2f7969eb42a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11d47b4c6c9545f18f92a4a6c91ff059", "name": "tempest-GroupTypeSpecsRbacTest-1789829407", "password_expires_at": null}, "audit_ids": ["a6WhwES3T6OIULgWXRbGKg"], "expires_at": "2020-12-14T03:19:58.000000Z", "issued_at": "2020-12-14T02:19:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd4cc19984854eafba36a80901bdbda8", "name": "tempest-GroupTypeSpecsRbacTest-1789829407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.710 193 DEBUG tempest.lib.common.rest_client [req-6db12e4b-5429-4f74-9105-dcaa9de342e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6db12e4b-5429-4f74-9105-dcaa9de342e3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.771 193 INFO tempest.lib.common.rest_client [req-20d58c20-acdd-4923-a952-ec8e57bff8a5 ] Request (VolumeTypesExtraSpecsRbacTest:test_create_volume_type_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:19:58.775 193 DEBUG tempest.lib.common.rest_client [req-20d58c20-acdd-4923-a952-ec8e57bff8a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20d58c20-acdd-4923-a952-ec8e57bff8a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a038b071c61845fb9dff5433d2703eee", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402", "password_expires_at": null}, "audit_ids": ["lKPu7gjFTGqVfPNsKYr4lA"], "expires_at": "2020-12-14T03:19:58.000000Z", "issued_at": "2020-12-14T02:19:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62ae6831eaa2476e83d44f73edd4b565", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.843 186 INFO tempest.lib.common.rest_client [req-36b4396d-6b58-441d-84b0-a410ed6e25e4 ] Request (GroupTypeSpecsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/664d9c5d-1a9f-4351-9480-7311a3bfaa36 0.123s 2020-12-14 02:19:58.846 186 DEBUG tempest.lib.common.rest_client [req-36b4396d-6b58-441d-84b0-a410ed6e25e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-36b4396d-6b58-441d-84b0-a410ed6e25e4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/664d9c5d-1a9f-4351-9480-7311a3bfaa36'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.858 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:58.875 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:group_types_specs, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:58.946 193 INFO tempest.lib.common.rest_client [req-87211852-9dbb-4c8b-88c8-73294fde2645 ] Request (VolumeTypesExtraSpecsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678 0.162s 2020-12-14 02:19:58.950 193 DEBUG tempest.lib.common.rest_client [req-87211852-9dbb-4c8b-88c8-73294fde2645 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-87211852-9dbb-4c8b-88c8-73294fde2645', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-87211852-9dbb-4c8b-88c8-73294fde2645', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.950 186 INFO tempest.lib.common.rest_client [req-a4c6534c-a90a-4041-971a-f5ec6d0d3df8 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_delete): 202 POST http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types 0.069s 2020-12-14 02:19:58.953 186 DEBUG tempest.lib.common.rest_client [req-a4c6534c-a90a-4041-971a-f5ec6d0d3df8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypeSpecsRbacTest-group-type-144069980"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a4c6534c-a90a-4041-971a-f5ec6d0d3df8', 'content-length': '184', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a4c6534c-a90a-4041-971a-f5ec6d0d3df8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types'} Body: b'{"group_type": {"id": "0db4d53e-5d1c-4b59-bdb7-00e841464d5a", "name": "tempest-GroupTypeSpecsRbacTest-group-type-144069980", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:58.962 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:58.979 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:types_extra_specs:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:58.980 189 INFO tempest.lib.common.rest_client [req-15a33916-0be5-4a35-bd38-0ed960359757 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.198s 2020-12-14 02:19:58.983 189 DEBUG tempest.lib.common.rest_client [req-15a33916-0be5-4a35-bd38-0ed960359757 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-15a33916-0be5-4a35-bd38-0ed960359757', 'x-compute-request-id': 'req-15a33916-0be5-4a35-bd38-0ed960359757', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.019 186 INFO tempest.lib.common.rest_client [req-5ec9f547-009b-4a0f-a54d-3dd8e7598e09 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_delete): 202 POST http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/0db4d53e-5d1c-4b59-bdb7-00e841464d5a/group_specs 0.039s 2020-12-14 02:19:59.022 186 DEBUG tempest.lib.common.rest_client [req-5ec9f547-009b-4a0f-a54d-3dd8e7598e09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_specs": {"key1": "value1"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5ec9f547-009b-4a0f-a54d-3dd8e7598e09', 'content-length': '35', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5ec9f547-009b-4a0f-a54d-3dd8e7598e09', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/0db4d53e-5d1c-4b59-bdb7-00e841464d5a/group_specs'} Body: b'{"group_specs": {"key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.035 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:59.066 193 INFO tempest.lib.common.rest_client [req-a2a89236-27c9-42d8-b351-01300747f265 ] Request (VolumeTypesExtraSpecsRbacTest:test_delete_volume_type_extra_specs): 200 POST http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs 0.081s 2020-12-14 02:19:59.069 193 DEBUG tempest.lib.common.rest_client [req-a2a89236-27c9-42d8-b351-01300747f265 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678": "val1"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a2a89236-27c9-42d8-b351-01300747f265', 'content-length': '80', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a2a89236-27c9-42d8-b351-01300747f265', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs'} Body: b'{"extra_specs": {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678": "val1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.084 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:59.102 186 INFO tempest.lib.common.rest_client [req-ccb89a55-94b9-4592-afad-7ecac5476036 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_delete): 200 GET http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles 0.059s 2020-12-14 02:19:59.105 186 DEBUG tempest.lib.common.rest_client [req-ccb89a55-94b9-4592-afad-7ecac5476036 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ccb89a55-94b9-4592-afad-7ecac5476036', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.152 193 INFO tempest.lib.common.rest_client [req-21d67346-009b-43cf-b81b-6a63ef8dbc47 ] Request (VolumeTypesExtraSpecsRbacTest:test_delete_volume_type_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles 0.061s 2020-12-14 02:19:59.155 186 INFO tempest.lib.common.rest_client [req-a82484a7-98fb-4e27-8134-e87d1d287d4b ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_delete): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:19:59.155 193 DEBUG tempest.lib.common.rest_client [req-21d67346-009b-43cf-b81b-6a63ef8dbc47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21d67346-009b-43cf-b81b-6a63ef8dbc47', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.158 186 DEBUG tempest.lib.common.rest_client [req-a82484a7-98fb-4e27-8134-e87d1d287d4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a82484a7-98fb-4e27-8134-e87d1d287d4b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11d47b4c6c9545f18f92a4a6c91ff059", "name": "tempest-GroupTypeSpecsRbacTest-1789829407", "password_expires_at": null}, "audit_ids": ["U1TAMFQ1TFO5WTgU43bZtg"], "expires_at": "2020-12-14T03:19:59.000000Z", "issued_at": "2020-12-14T02:19:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd4cc19984854eafba36a80901bdbda8", "name": "tempest-GroupTypeSpecsRbacTest-1789829407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.204 193 INFO tempest.lib.common.rest_client [req-3f81187d-e7d8-4b57-941b-7ce4f980ad41 ] Request (VolumeTypesExtraSpecsRbacTest:test_delete_volume_type_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:19:59.207 193 DEBUG tempest.lib.common.rest_client [req-3f81187d-e7d8-4b57-941b-7ce4f980ad41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f81187d-e7d8-4b57-941b-7ce4f980ad41', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a038b071c61845fb9dff5433d2703eee", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402", "password_expires_at": null}, "audit_ids": ["XMmAo4daQjCw0-ju1PMsug"], "expires_at": "2020-12-14T03:19:59.000000Z", "issued_at": "2020-12-14T02:19:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62ae6831eaa2476e83d44f73edd4b565", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.263 186 INFO tempest.lib.common.rest_client [req-c31965da-379d-4648-aeb8-9110bd61bef4 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_delete): 202 DELETE http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/0db4d53e-5d1c-4b59-bdb7-00e841464d5a/group_specs/key1 0.098s 2020-12-14 02:19:59.267 186 DEBUG tempest.lib.common.rest_client [req-c31965da-379d-4648-aeb8-9110bd61bef4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c31965da-379d-4648-aeb8-9110bd61bef4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/0db4d53e-5d1c-4b59-bdb7-00e841464d5a/group_specs/key1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.270 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:59.337 186 INFO tempest.lib.common.rest_client [req-1fea9164-c8e5-4c0a-b0d4-d86e2d4ca733 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_delete): 200 GET http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles 0.061s 2020-12-14 02:19:59.341 186 DEBUG tempest.lib.common.rest_client [req-1fea9164-c8e5-4c0a-b0d4-d86e2d4ca733 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1fea9164-c8e5-4c0a-b0d4-d86e2d4ca733', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.343 193 INFO tempest.lib.common.rest_client [req-76ce72e2-2dc2-4810-bfac-b148ce1d2171 ] Request (VolumeTypesExtraSpecsRbacTest:test_delete_volume_type_extra_specs): 202 DELETE http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678 0.130s 2020-12-14 02:19:59.346 193 DEBUG tempest.lib.common.rest_client [req-76ce72e2-2dc2-4810-bfac-b148ce1d2171 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-76ce72e2-2dc2-4810-bfac-b148ce1d2171', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-76ce72e2-2dc2-4810-bfac-b148ce1d2171', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.350 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:59.387 186 INFO tempest.lib.common.rest_client [req-85bdb2e8-e545-4d31-8070-12be8933eef2 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_delete): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:19:59.390 186 DEBUG tempest.lib.common.rest_client [req-85bdb2e8-e545-4d31-8070-12be8933eef2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85bdb2e8-e545-4d31-8070-12be8933eef2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11d47b4c6c9545f18f92a4a6c91ff059", "name": "tempest-GroupTypeSpecsRbacTest-1789829407", "password_expires_at": null}, "audit_ids": ["UOgqdUJmSjm1ZqNZyodg7w"], "expires_at": "2020-12-14T03:19:59.000000Z", "issued_at": "2020-12-14T02:19:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd4cc19984854eafba36a80901bdbda8", "name": "tempest-GroupTypeSpecsRbacTest-1789829407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.417 193 INFO tempest.lib.common.rest_client [req-78248974-cf9a-4ae8-9496-f6a45234411a ] Request (VolumeTypesExtraSpecsRbacTest:test_delete_volume_type_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles 0.060s 2020-12-14 02:19:59.419 193 DEBUG tempest.lib.common.rest_client [req-78248974-cf9a-4ae8-9496-f6a45234411a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78248974-cf9a-4ae8-9496-f6a45234411a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.451 197 INFO tempest.lib.common.rest_client [req-c05253b8-3544-4dea-8b87-2a5b9ffb0652 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.225s 2020-12-14 02:19:59.454 197 DEBUG tempest.lib.common.rest_client [req-c05253b8-3544-4dea-8b87-2a5b9ffb0652 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c05253b8-3544-4dea-8b87-2a5b9ffb0652', 'x-compute-request-id': 'req-c05253b8-3544-4dea-8b87-2a5b9ffb0652', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.466 193 INFO tempest.lib.common.rest_client [req-e0d9834f-356f-484e-b959-139cda10af58 ] Request (VolumeTypesExtraSpecsRbacTest:test_delete_volume_type_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:19:59.469 193 DEBUG tempest.lib.common.rest_client [req-e0d9834f-356f-484e-b959-139cda10af58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0d9834f-356f-484e-b959-139cda10af58', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a038b071c61845fb9dff5433d2703eee", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402", "password_expires_at": null}, "audit_ids": ["nPMqheu8Ry-AklzruNsxBQ"], "expires_at": "2020-12-14T03:19:59.000000Z", "issued_at": "2020-12-14T02:19:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62ae6831eaa2476e83d44f73edd4b565", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.527 186 INFO tempest.lib.common.rest_client [req-94ed10c9-256f-4b1f-9d8a-955f9f0edced ] Request (GroupTypeSpecsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/0db4d53e-5d1c-4b59-bdb7-00e841464d5a 0.127s 2020-12-14 02:19:59.530 186 DEBUG tempest.lib.common.rest_client [req-94ed10c9-256f-4b1f-9d8a-955f9f0edced ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-94ed10c9-256f-4b1f-9d8a-955f9f0edced', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/0db4d53e-5d1c-4b59-bdb7-00e841464d5a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.543 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:59.561 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:group_types_specs, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:59.605 193 INFO tempest.lib.common.rest_client [req-f6365f9c-9677-4d60-bbdc-7fa69489b0e2 ] Request (VolumeTypesExtraSpecsRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678 0.127s 2020-12-14 02:19:59.609 193 DEBUG tempest.lib.common.rest_client [req-f6365f9c-9677-4d60-bbdc-7fa69489b0e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '175', 'content-type': 'application/json', 'x-compute-request-id': 'req-f6365f9c-9677-4d60-bbdc-7fa69489b0e2', 'x-openstack-request-id': 'req-f6365f9c-9677-4d60-bbdc-7fa69489b0e2', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume Type ab15aca1-a23a-4b62-bb5d-e58675c78983 has no extra specs with key tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.621 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:19:59.630 186 INFO tempest.lib.common.rest_client [req-c90c641d-bfd3-44b7-bee4-fcb9c3a2b54c ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_list): 202 POST http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types 0.064s 2020-12-14 02:19:59.634 186 DEBUG tempest.lib.common.rest_client [req-c90c641d-bfd3-44b7-bee4-fcb9c3a2b54c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypeSpecsRbacTest-group-type-903005504"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c90c641d-bfd3-44b7-bee4-fcb9c3a2b54c', 'content-length': '184', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c90c641d-bfd3-44b7-bee4-fcb9c3a2b54c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types'} Body: b'{"group_type": {"id": "3a4c7535-8e5f-42b8-9141-1f214de0398e", "name": "tempest-GroupTypeSpecsRbacTest-group-type-903005504", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.638 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:types_extra_specs:index, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:19:59.640 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:59.657 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:59.700 193 INFO tempest.lib.common.rest_client [req-e43fcceb-eb5c-4607-b21a-0c6a6bb3f65e ] Request (VolumeTypesExtraSpecsRbacTest:test_list_volume_types_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles 0.054s 2020-12-14 02:19:59.703 193 DEBUG tempest.lib.common.rest_client [req-e43fcceb-eb5c-4607-b21a-0c6a6bb3f65e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e43fcceb-eb5c-4607-b21a-0c6a6bb3f65e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.733 186 INFO tempest.lib.common.rest_client [req-f9711c0f-15b9-43fa-ade4-1279ba3b3d32 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_list): 200 GET http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles 0.069s 2020-12-14 02:19:59.736 186 DEBUG tempest.lib.common.rest_client [req-f9711c0f-15b9-43fa-ade4-1279ba3b3d32 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9711c0f-15b9-43fa-ade4-1279ba3b3d32', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.752 193 INFO tempest.lib.common.rest_client [req-2fe5c823-bfb6-4fce-8049-c0a7741e4da7 ] Request (VolumeTypesExtraSpecsRbacTest:test_list_volume_types_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:19:59.756 193 DEBUG tempest.lib.common.rest_client [req-2fe5c823-bfb6-4fce-8049-c0a7741e4da7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2fe5c823-bfb6-4fce-8049-c0a7741e4da7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a038b071c61845fb9dff5433d2703eee", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402", "password_expires_at": null}, "audit_ids": ["XLBNtuEiTyGn5dYCpXfZ4g"], "expires_at": "2020-12-14T03:19:59.000000Z", "issued_at": "2020-12-14T02:19:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62ae6831eaa2476e83d44f73edd4b565", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.783 186 INFO tempest.lib.common.rest_client [req-a990f377-a1ce-41f9-a57f-72f1234583fc ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_list): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:19:59.786 186 DEBUG tempest.lib.common.rest_client [req-a990f377-a1ce-41f9-a57f-72f1234583fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a990f377-a1ce-41f9-a57f-72f1234583fc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11d47b4c6c9545f18f92a4a6c91ff059", "name": "tempest-GroupTypeSpecsRbacTest-1789829407", "password_expires_at": null}, "audit_ids": ["_Y4xTHSKQVWpAIQU-xwjgQ"], "expires_at": "2020-12-14T03:19:59.000000Z", "issued_at": "2020-12-14T02:19:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd4cc19984854eafba36a80901bdbda8", "name": "tempest-GroupTypeSpecsRbacTest-1789829407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.854 193 INFO tempest.lib.common.rest_client [req-ff08d125-ff0d-496b-a1e6-918e9d934d35 ] Request (VolumeTypesExtraSpecsRbacTest:test_list_volume_types_extra_specs): 200 GET http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs 0.091s 2020-12-14 02:19:59.857 193 DEBUG tempest.lib.common.rest_client [req-ff08d125-ff0d-496b-a1e6-918e9d934d35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ff08d125-ff0d-496b-a1e6-918e9d934d35', 'content-length': '19', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ff08d125-ff0d-496b-a1e6-918e9d934d35', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs'} Body: b'{"extra_specs": {}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.872 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:59.884 186 INFO tempest.lib.common.rest_client [req-92fe2fbc-1937-41f8-a8f2-129a2f08b1bd ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_list): 200 GET http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/3a4c7535-8e5f-42b8-9141-1f214de0398e/group_specs 0.090s 2020-12-14 02:19:59.888 186 DEBUG tempest.lib.common.rest_client [req-92fe2fbc-1937-41f8-a8f2-129a2f08b1bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-92fe2fbc-1937-41f8-a8f2-129a2f08b1bd', 'content-length': '19', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-92fe2fbc-1937-41f8-a8f2-129a2f08b1bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/3a4c7535-8e5f-42b8-9141-1f214de0398e/group_specs'} Body: b'{"group_specs": {}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.902 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:19:59.936 193 INFO tempest.lib.common.rest_client [req-b228bd84-3625-41ca-8206-2042aecd11c1 ] Request (VolumeTypesExtraSpecsRbacTest:test_list_volume_types_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles 0.058s 2020-12-14 02:19:59.939 193 DEBUG tempest.lib.common.rest_client [req-b228bd84-3625-41ca-8206-2042aecd11c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b228bd84-3625-41ca-8206-2042aecd11c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.977 186 INFO tempest.lib.common.rest_client [req-b4c526c3-f9c9-48c6-9bcd-3d9b5c90c69a ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_list): 200 GET http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles 0.069s 2020-12-14 02:19:59.980 186 DEBUG tempest.lib.common.rest_client [req-b4c526c3-f9c9-48c6-9bcd-3d9b5c90c69a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4c526c3-f9c9-48c6-9bcd-3d9b5c90c69a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:19:59.988 193 INFO tempest.lib.common.rest_client [req-657376fb-a784-4947-a315-8962aa130d2c ] Request (VolumeTypesExtraSpecsRbacTest:test_list_volume_types_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:19:59.991 193 DEBUG tempest.lib.common.rest_client [req-657376fb-a784-4947-a315-8962aa130d2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-657376fb-a784-4947-a315-8962aa130d2c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a038b071c61845fb9dff5433d2703eee", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402", "password_expires_at": null}, "audit_ids": ["jYZBaIf1Q8uoNcUh7wXmWw"], "expires_at": "2020-12-14T03:19:59.000000Z", "issued_at": "2020-12-14T02:19:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62ae6831eaa2476e83d44f73edd4b565", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.006 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:00.023 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:types_extra_specs:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:00.028 186 INFO tempest.lib.common.rest_client [req-b70935f0-78ef-410d-907f-c0c8a0c9d284 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_list): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:20:00.031 186 DEBUG tempest.lib.common.rest_client [req-b70935f0-78ef-410d-907f-c0c8a0c9d284 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:19:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b70935f0-78ef-410d-907f-c0c8a0c9d284', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11d47b4c6c9545f18f92a4a6c91ff059", "name": "tempest-GroupTypeSpecsRbacTest-1789829407", "password_expires_at": null}, "audit_ids": ["qhkDzxSmSWubLw9pSyAo8g"], "expires_at": "2020-12-14T03:20:00.000000Z", "issued_at": "2020-12-14T02:20:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd4cc19984854eafba36a80901bdbda8", "name": "tempest-GroupTypeSpecsRbacTest-1789829407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.158 186 INFO tempest.lib.common.rest_client [req-d64a3d6a-aac4-4937-8f07-c230ce975f52 ] Request (GroupTypeSpecsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/3a4c7535-8e5f-42b8-9141-1f214de0398e 0.117s 2020-12-14 02:20:00.161 186 DEBUG tempest.lib.common.rest_client [req-d64a3d6a-aac4-4937-8f07-c230ce975f52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d64a3d6a-aac4-4937-8f07-c230ce975f52', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/3a4c7535-8e5f-42b8-9141-1f214de0398e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.174 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:00.180 193 INFO tempest.lib.common.rest_client [req-038a36ec-b2c8-4333-bf5b-c8d8e92bbe63 ] Request (VolumeTypesExtraSpecsRbacTest:test_show_volume_type_extra_specs): 200 POST http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs 0.151s 2020-12-14 02:20:00.183 193 DEBUG tempest.lib.common.rest_client [req-038a36ec-b2c8-4333-bf5b-c8d8e92bbe63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678": "val1"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-038a36ec-b2c8-4333-bf5b-c8d8e92bbe63', 'content-length': '80', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-038a36ec-b2c8-4333-bf5b-c8d8e92bbe63', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs'} Body: b'{"extra_specs": {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678": "val1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.192 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:group_types_specs, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:00.198 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:00.250 186 INFO tempest.lib.common.rest_client [req-958fcadf-f49e-4eb0-9db0-58f24159254f ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_show): 202 POST http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types 0.051s 2020-12-14 02:20:00.254 186 DEBUG tempest.lib.common.rest_client [req-958fcadf-f49e-4eb0-9db0-58f24159254f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypeSpecsRbacTest-group-type-80791337"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-958fcadf-f49e-4eb0-9db0-58f24159254f', 'content-length': '183', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-958fcadf-f49e-4eb0-9db0-58f24159254f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types'} Body: b'{"group_type": {"id": "96ebdb22-a065-4032-8af0-bbf3c1b1db97", "name": "tempest-GroupTypeSpecsRbacTest-group-type-80791337", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.264 193 INFO tempest.lib.common.rest_client [req-fd6193b5-d6f5-4d2e-98c8-18c1e3cf512e ] Request (VolumeTypesExtraSpecsRbacTest:test_show_volume_type_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles 0.060s 2020-12-14 02:20:00.267 193 DEBUG tempest.lib.common.rest_client [req-fd6193b5-d6f5-4d2e-98c8-18c1e3cf512e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd6193b5-d6f5-4d2e-98c8-18c1e3cf512e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.307 189 INFO tempest.lib.common.rest_client [req-49b527fd-f5a7-405b-b6a4-cd24bda4aa0c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.218s 2020-12-14 02:20:00.309 189 DEBUG tempest.lib.common.rest_client [req-49b527fd-f5a7-405b-b6a4-cd24bda4aa0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-49b527fd-f5a7-405b-b6a4-cd24bda4aa0c', 'x-compute-request-id': 'req-49b527fd-f5a7-405b-b6a4-cd24bda4aa0c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.324 193 INFO tempest.lib.common.rest_client [req-ad33f713-a7e7-44ac-8606-78349506afc6 ] Request (VolumeTypesExtraSpecsRbacTest:test_show_volume_type_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:20:00.327 193 DEBUG tempest.lib.common.rest_client [req-ad33f713-a7e7-44ac-8606-78349506afc6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad33f713-a7e7-44ac-8606-78349506afc6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a038b071c61845fb9dff5433d2703eee", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402", "password_expires_at": null}, "audit_ids": ["cqV4gY3XToOg8_wxGWDk2g"], "expires_at": "2020-12-14T03:20:00.000000Z", "issued_at": "2020-12-14T02:20:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62ae6831eaa2476e83d44f73edd4b565", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.333 186 INFO tempest.lib.common.rest_client [req-5b53fd6f-5ced-4c1b-85f7-ae2c66578513 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_show): 202 POST http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/96ebdb22-a065-4032-8af0-bbf3c1b1db97/group_specs 0.050s 2020-12-14 02:20:00.336 186 DEBUG tempest.lib.common.rest_client [req-5b53fd6f-5ced-4c1b-85f7-ae2c66578513 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_specs": {"key1": "value1", "key2": "value2"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5b53fd6f-5ced-4c1b-85f7-ae2c66578513', 'content-length': '53', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5b53fd6f-5ced-4c1b-85f7-ae2c66578513', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/96ebdb22-a065-4032-8af0-bbf3c1b1db97/group_specs'} Body: b'{"group_specs": {"key1": "value1", "key2": "value2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.350 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:00.421 186 INFO tempest.lib.common.rest_client [req-25d80822-562d-4f4d-8374-8f0d7c4875c2 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_show): 200 GET http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles 0.064s 2020-12-14 02:20:00.425 186 DEBUG tempest.lib.common.rest_client [req-25d80822-562d-4f4d-8374-8f0d7c4875c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25d80822-562d-4f4d-8374-8f0d7c4875c2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.470 193 INFO tempest.lib.common.rest_client [req-3d1f2579-dde6-4e03-a3e9-d921c671acf1 ] Request (VolumeTypesExtraSpecsRbacTest:test_show_volume_type_extra_specs): 200 GET http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678 0.136s 2020-12-14 02:20:00.473 193 DEBUG tempest.lib.common.rest_client [req-3d1f2579-dde6-4e03-a3e9-d921c671acf1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3d1f2579-dde6-4e03-a3e9-d921c671acf1', 'content-length': '63', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3d1f2579-dde6-4e03-a3e9-d921c671acf1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678'} Body: b'{"tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678": "val1"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.480 186 INFO tempest.lib.common.rest_client [req-35aae62e-af4d-42ed-be3c-6d4905872b51 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_show): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:20:00.483 186 DEBUG tempest.lib.common.rest_client [req-35aae62e-af4d-42ed-be3c-6d4905872b51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-35aae62e-af4d-42ed-be3c-6d4905872b51', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11d47b4c6c9545f18f92a4a6c91ff059", "name": "tempest-GroupTypeSpecsRbacTest-1789829407", "password_expires_at": null}, "audit_ids": ["ADt0jGcmQH-73Qf5dYjLhg"], "expires_at": "2020-12-14T03:20:00.000000Z", "issued_at": "2020-12-14T02:20:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd4cc19984854eafba36a80901bdbda8", "name": "tempest-GroupTypeSpecsRbacTest-1789829407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.484 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:00.552 193 INFO tempest.lib.common.rest_client [req-02f32127-5fa6-469d-bb3e-dceaf6ada54b ] Request (VolumeTypesExtraSpecsRbacTest:test_show_volume_type_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles 0.062s 2020-12-14 02:20:00.555 193 DEBUG tempest.lib.common.rest_client [req-02f32127-5fa6-469d-bb3e-dceaf6ada54b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02f32127-5fa6-469d-bb3e-dceaf6ada54b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.582 186 INFO tempest.lib.common.rest_client [req-c53cd90d-3989-4efb-b0af-d4ee0e4e9faa ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_show): 200 GET http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/96ebdb22-a065-4032-8af0-bbf3c1b1db97/group_specs/key2 0.091s 2020-12-14 02:20:00.586 186 DEBUG tempest.lib.common.rest_client [req-c53cd90d-3989-4efb-b0af-d4ee0e4e9faa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c53cd90d-3989-4efb-b0af-d4ee0e4e9faa', 'content-length': '18', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c53cd90d-3989-4efb-b0af-d4ee0e4e9faa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/96ebdb22-a065-4032-8af0-bbf3c1b1db97/group_specs/key2'} Body: b'{"key2": "value2"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.598 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:00.606 193 INFO tempest.lib.common.rest_client [req-1c002125-b720-4dc4-a30d-35b1ad769372 ] Request (VolumeTypesExtraSpecsRbacTest:test_show_volume_type_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:20:00.610 193 DEBUG tempest.lib.common.rest_client [req-1c002125-b720-4dc4-a30d-35b1ad769372 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c002125-b720-4dc4-a30d-35b1ad769372', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a038b071c61845fb9dff5433d2703eee", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402", "password_expires_at": null}, "audit_ids": ["ewwYQEJlT1iPAaqpnK3-ww"], "expires_at": "2020-12-14T03:20:00.000000Z", "issued_at": "2020-12-14T02:20:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62ae6831eaa2476e83d44f73edd4b565", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.662 186 INFO tempest.lib.common.rest_client [req-81bffc0a-6e66-4f14-b532-6a0703021ca8 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_show): 200 GET http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles 0.058s 2020-12-14 02:20:00.665 186 DEBUG tempest.lib.common.rest_client [req-81bffc0a-6e66-4f14-b532-6a0703021ca8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81bffc0a-6e66-4f14-b532-6a0703021ca8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.718 186 INFO tempest.lib.common.rest_client [req-5fb9eb30-342a-42e0-aaef-1ee88c82c28e ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_show): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:20:00.721 186 DEBUG tempest.lib.common.rest_client [req-5fb9eb30-342a-42e0-aaef-1ee88c82c28e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5fb9eb30-342a-42e0-aaef-1ee88c82c28e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11d47b4c6c9545f18f92a4a6c91ff059", "name": "tempest-GroupTypeSpecsRbacTest-1789829407", "password_expires_at": null}, "audit_ids": ["chjDn6CBTtybrULDZzlnzA"], "expires_at": "2020-12-14T03:20:00.000000Z", "issued_at": "2020-12-14T02:20:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd4cc19984854eafba36a80901bdbda8", "name": "tempest-GroupTypeSpecsRbacTest-1789829407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.761 193 INFO tempest.lib.common.rest_client [req-8360cd27-fcef-4c46-b205-1d51a1393659 ] Request (VolumeTypesExtraSpecsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678 0.142s 2020-12-14 02:20:00.764 193 DEBUG tempest.lib.common.rest_client [req-8360cd27-fcef-4c46-b205-1d51a1393659 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-8360cd27-fcef-4c46-b205-1d51a1393659', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8360cd27-fcef-4c46-b205-1d51a1393659', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.776 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:00.794 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:types_extra_specs:update, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:00.808 197 INFO tempest.lib.common.rest_client [req-13a69ebc-246e-4610-8142-a0154407a353 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.229s 2020-12-14 02:20:00.811 197 DEBUG tempest.lib.common.rest_client [req-13a69ebc-246e-4610-8142-a0154407a353 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-13a69ebc-246e-4610-8142-a0154407a353', 'x-compute-request-id': 'req-13a69ebc-246e-4610-8142-a0154407a353', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.837 186 INFO tempest.lib.common.rest_client [req-f1a11553-2e6b-47ed-b325-ed1d6c4ab4ae ] Request (GroupTypeSpecsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/96ebdb22-a065-4032-8af0-bbf3c1b1db97 0.107s 2020-12-14 02:20:00.839 186 DEBUG tempest.lib.common.rest_client [req-f1a11553-2e6b-47ed-b325-ed1d6c4ab4ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f1a11553-2e6b-47ed-b325-ed1d6c4ab4ae', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/96ebdb22-a065-4032-8af0-bbf3c1b1db97'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.851 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:00.868 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:group_types_specs, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:00.910 193 INFO tempest.lib.common.rest_client [req-05a62227-b7a4-414b-9762-87fbf227e91d ] Request (VolumeTypesExtraSpecsRbacTest:test_update_volume_type_extra_specs): 200 POST http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs 0.109s 2020-12-14 02:20:00.912 193 DEBUG tempest.lib.common.rest_client [req-05a62227-b7a4-414b-9762-87fbf227e91d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678": "val1"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-05a62227-b7a4-414b-9762-87fbf227e91d', 'content-length': '80', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-05a62227-b7a4-414b-9762-87fbf227e91d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs'} Body: b'{"extra_specs": {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678": "val1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.923 186 INFO tempest.lib.common.rest_client [req-223cb395-080a-43fb-8feb-47891588f2d5 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_update): 202 POST http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types 0.049s 2020-12-14 02:20:00.926 186 DEBUG tempest.lib.common.rest_client [req-223cb395-080a-43fb-8feb-47891588f2d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypeSpecsRbacTest-group-type-1146975993"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-223cb395-080a-43fb-8feb-47891588f2d5', 'content-length': '185', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-223cb395-080a-43fb-8feb-47891588f2d5', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types'} Body: b'{"group_type": {"id": "05cb545f-93e4-429d-9868-1cbf6b6c6964", "name": "tempest-GroupTypeSpecsRbacTest-group-type-1146975993", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.927 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:00.992 193 INFO tempest.lib.common.rest_client [req-7cdde8ec-2b46-4276-b514-6c611e0cd948 ] Request (VolumeTypesExtraSpecsRbacTest:test_update_volume_type_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles 0.059s 2020-12-14 02:20:00.996 193 DEBUG tempest.lib.common.rest_client [req-7cdde8ec-2b46-4276-b514-6c611e0cd948 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7cdde8ec-2b46-4276-b514-6c611e0cd948', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:00.998 186 INFO tempest.lib.common.rest_client [req-30cba337-80ed-49cc-a158-6101e591c7ac ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_update): 202 POST http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/05cb545f-93e4-429d-9868-1cbf6b6c6964/group_specs 0.046s 2020-12-14 02:20:01.001 186 DEBUG tempest.lib.common.rest_client [req-30cba337-80ed-49cc-a158-6101e591c7ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_specs": {"key3": "value3-updated"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-30cba337-80ed-49cc-a158-6101e591c7ac', 'content-length': '43', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-30cba337-80ed-49cc-a158-6101e591c7ac', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/05cb545f-93e4-429d-9868-1cbf6b6c6964/group_specs'} Body: b'{"group_specs": {"key3": "value3-updated"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.015 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:01.044 193 INFO tempest.lib.common.rest_client [req-4f607475-ac5d-418f-8f24-44f617b6f0b7 ] Request (VolumeTypesExtraSpecsRbacTest:test_update_volume_type_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:20:01.048 193 DEBUG tempest.lib.common.rest_client [req-4f607475-ac5d-418f-8f24-44f617b6f0b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f607475-ac5d-418f-8f24-44f617b6f0b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a038b071c61845fb9dff5433d2703eee", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402", "password_expires_at": null}, "audit_ids": ["gxA6cvb4SBK20ztnXXO_NQ"], "expires_at": "2020-12-14T03:20:01.000000Z", "issued_at": "2020-12-14T02:20:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62ae6831eaa2476e83d44f73edd4b565", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.083 186 INFO tempest.lib.common.rest_client [req-606e5dcd-7003-4234-b6d5-b8319e7c0151 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_update): 200 GET http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles 0.061s 2020-12-14 02:20:01.087 186 DEBUG tempest.lib.common.rest_client [req-606e5dcd-7003-4234-b6d5-b8319e7c0151 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-606e5dcd-7003-4234-b6d5-b8319e7c0151', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.139 186 INFO tempest.lib.common.rest_client [req-2c86a1dc-3bbc-472d-984b-a4de27e7d039 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_update): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:20:01.142 186 DEBUG tempest.lib.common.rest_client [req-2c86a1dc-3bbc-472d-984b-a4de27e7d039 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2c86a1dc-3bbc-472d-984b-a4de27e7d039', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11d47b4c6c9545f18f92a4a6c91ff059", "name": "tempest-GroupTypeSpecsRbacTest-1789829407", "password_expires_at": null}, "audit_ids": ["Ra7elFp4TKiNKcnkH7vdbA"], "expires_at": "2020-12-14T03:20:01.000000Z", "issued_at": "2020-12-14T02:20:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd4cc19984854eafba36a80901bdbda8", "name": "tempest-GroupTypeSpecsRbacTest-1789829407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.189 193 INFO tempest.lib.common.rest_client [req-a1f9a02e-2cbc-4980-8b15-e39f5088a72c ] Request (VolumeTypesExtraSpecsRbacTest:test_update_volume_type_extra_specs): 200 PUT http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678 0.133s 2020-12-14 02:20:01.193 193 DEBUG tempest.lib.common.rest_client [req-a1f9a02e-2cbc-4980-8b15-e39f5088a72c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678": "val2"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a1f9a02e-2cbc-4980-8b15-e39f5088a72c', 'content-length': '63', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a1f9a02e-2cbc-4980-8b15-e39f5088a72c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678'} Body: b'{"tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678": "val2"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.203 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:01.243 186 INFO tempest.lib.common.rest_client [req-2ca74589-5ac2-4a6e-b4d4-c9b7ed965ce7 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_update): 200 PUT http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/05cb545f-93e4-429d-9868-1cbf6b6c6964/group_specs/key3 0.093s 2020-12-14 02:20:01.247 186 DEBUG tempest.lib.common.rest_client [req-2ca74589-5ac2-4a6e-b4d4-c9b7ed965ce7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"key3": "value3-updated"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2ca74589-5ac2-4a6e-b4d4-c9b7ed965ce7', 'content-length': '26', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2ca74589-5ac2-4a6e-b4d4-c9b7ed965ce7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/05cb545f-93e4-429d-9868-1cbf6b6c6964/group_specs/key3'} Body: b'{"key3": "value3-updated"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.258 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:01.273 193 INFO tempest.lib.common.rest_client [req-3fd94d87-3300-4461-a317-ddcd99c59b12 ] Request (VolumeTypesExtraSpecsRbacTest:test_update_volume_type_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles 0.063s 2020-12-14 02:20:01.277 193 DEBUG tempest.lib.common.rest_client [req-3fd94d87-3300-4461-a317-ddcd99c59b12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3fd94d87-3300-4461-a317-ddcd99c59b12', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565/users/a038b071c61845fb9dff5433d2703eee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.325 186 INFO tempest.lib.common.rest_client [req-97c9f06f-1127-401d-b109-c7935d9ccf22 ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_update): 200 GET http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles 0.061s 2020-12-14 02:20:01.326 193 INFO tempest.lib.common.rest_client [req-d3e647d5-b9fb-4ab0-b028-1a66b62897c2 ] Request (VolumeTypesExtraSpecsRbacTest:test_update_volume_type_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:20:01.328 186 DEBUG tempest.lib.common.rest_client [req-97c9f06f-1127-401d-b109-c7935d9ccf22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97c9f06f-1127-401d-b109-c7935d9ccf22', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8/users/11d47b4c6c9545f18f92a4a6c91ff059/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.329 193 DEBUG tempest.lib.common.rest_client [req-d3e647d5-b9fb-4ab0-b028-1a66b62897c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6650', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3e647d5-b9fb-4ab0-b028-1a66b62897c2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a038b071c61845fb9dff5433d2703eee", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402", "password_expires_at": null}, "audit_ids": ["Fy5CSoUdTHShjgfEI8Arww"], "expires_at": "2020-12-14T03:20:01.000000Z", "issued_at": "2020-12-14T02:20:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "62ae6831eaa2476e83d44f73edd4b565", "name": "tempest-VolumeTypesExtraSpecsRbacTest-1954559402"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_62ae6831eaa2476e83d44f73edd4b565", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.369 186 INFO tempest.lib.common.rest_client [req-28a6617a-b9f1-42cf-837e-535836df901e ] Request (GroupTypeSpecsRbacTest:test_group_type_specs_update): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-12-14 02:20:01.371 186 DEBUG tempest.lib.common.rest_client [req-28a6617a-b9f1-42cf-837e-535836df901e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28a6617a-b9f1-42cf-837e-535836df901e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "11d47b4c6c9545f18f92a4a6c91ff059", "name": "tempest-GroupTypeSpecsRbacTest-1789829407", "password_expires_at": null}, "audit_ids": ["BX_RGT_9S-e0xkw00BMyPQ"], "expires_at": "2020-12-14T03:20:01.000000Z", "issued_at": "2020-12-14T02:20:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fd4cc19984854eafba36a80901bdbda8", "name": "tempest-GroupTypeSpecsRbacTest-1789829407"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fd4cc19984854eafba36a80901bdbda8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.464 193 INFO tempest.lib.common.rest_client [req-791486a9-11d3-4f9e-8589-70e9db9497a2 ] Request (VolumeTypesExtraSpecsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678 0.127s 2020-12-14 02:20:01.468 193 DEBUG tempest.lib.common.rest_client [req-791486a9-11d3-4f9e-8589-70e9db9497a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-791486a9-11d3-4f9e-8589-70e9db9497a2', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-791486a9-11d3-4f9e-8589-70e9db9497a2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983/extra_specs/tempest-VolumeTypesExtraSpecsRbacTest-Spec-33065678'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.484 186 INFO tempest.lib.common.rest_client [req-63f59a0e-0b92-4f6d-8e9e-23d82faf802a ] Request (GroupTypeSpecsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/05cb545f-93e4-429d-9868-1cbf6b6c6964 0.101s 2020-12-14 02:20:01.488 186 DEBUG tempest.lib.common.rest_client [req-63f59a0e-0b92-4f6d-8e9e-23d82faf802a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-63f59a0e-0b92-4f6d-8e9e-23d82faf802a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/fd4cc19984854eafba36a80901bdbda8/group_types/05cb545f-93e4-429d-9868-1cbf6b6c6964'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.568 193 INFO tempest.lib.common.rest_client [req-66f95bac-7cc1-4b70-b2f3-ac81d565bf7c ] Request (VolumeTypesExtraSpecsRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983 0.085s 2020-12-14 02:20:01.571 193 DEBUG tempest.lib.common.rest_client [req-66f95bac-7cc1-4b70-b2f3-ac81d565bf7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-66f95bac-7cc1-4b70-b2f3-ac81d565bf7c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.609 193 INFO tempest.lib.common.rest_client [req-788d7c14-85c3-4900-9a84-4ba1361d4354 ] Request (VolumeTypesExtraSpecsRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983 0.032s 2020-12-14 02:20:01.612 193 DEBUG tempest.lib.common.rest_client [req-788d7c14-85c3-4900-9a84-4ba1361d4354 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-788d7c14-85c3-4900-9a84-4ba1361d4354', 'x-openstack-request-id': 'req-788d7c14-85c3-4900-9a84-4ba1361d4354', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/62ae6831eaa2476e83d44f73edd4b565/types/ab15aca1-a23a-4b62-bb5d-e58675c78983'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type ab15aca1-a23a-4b62-bb5d-e58675c78983 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.654 186 INFO tempest.lib.common.rest_client [req-51e8b761-98e5-4162-b420-d9fda083d27c ] Request (GroupTypeSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/11d47b4c6c9545f18f92a4a6c91ff059 0.148s 2020-12-14 02:20:01.657 186 DEBUG tempest.lib.common.rest_client [req-51e8b761-98e5-4162-b420-d9fda083d27c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51e8b761-98e5-4162-b420-d9fda083d27c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/11d47b4c6c9545f18f92a4a6c91ff059'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.662 189 INFO tempest.lib.common.rest_client [req-742e7d8a-1777-4157-b94a-bbf378cd61b5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.215s 2020-12-14 02:20:01.665 189 DEBUG tempest.lib.common.rest_client [req-742e7d8a-1777-4157-b94a-bbf378cd61b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-742e7d8a-1777-4157-b94a-bbf378cd61b5', 'x-compute-request-id': 'req-742e7d8a-1777-4157-b94a-bbf378cd61b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.754 193 INFO tempest.lib.common.rest_client [req-f7961875-bbbc-4689-9d17-e5bb79772d8d ] Request (VolumeTypesExtraSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/a038b071c61845fb9dff5433d2703eee 0.134s 2020-12-14 02:20:01.757 193 DEBUG tempest.lib.common.rest_client [req-f7961875-bbbc-4689-9d17-e5bb79772d8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f7961875-bbbc-4689-9d17-e5bb79772d8d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/a038b071c61845fb9dff5433d2703eee'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.761 186 INFO tempest.lib.common.rest_client [req-aba16e32-5bfc-43fd-b7c5-d69fe85de64e ] Request (GroupTypeSpecsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:20:01.763 186 DEBUG tempest.lib.common.rest_client [req-aba16e32-5bfc-43fd-b7c5-d69fe85de64e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aba16e32-5bfc-43fd-b7c5-d69fe85de64e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["-dCCzST4T_660DJl5xqqzw"], "expires_at": "2020-12-14T03:20:01.000000Z", "issued_at": "2020-12-14T02:20:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:01.859 193 INFO tempest.lib.common.rest_client [req-457698a0-2581-44c7-a906-98f178698b34 ] Request (VolumeTypesExtraSpecsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:20:01.861 193 DEBUG tempest.lib.common.rest_client [req-457698a0-2581-44c7-a906-98f178698b34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-457698a0-2581-44c7-a906-98f178698b34', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["6OPpxsY4QYq8BzBiVKMZEw"], "expires_at": "2020-12-14T03:20:01.000000Z", "issued_at": "2020-12-14T02:20:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:02.173 197 INFO tempest.lib.common.rest_client [req-21db8f60-3a95-4dc2-85ee-cd17b43c7d2d ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.236s 2020-12-14 02:20:02.177 197 DEBUG tempest.lib.common.rest_client [req-21db8f60-3a95-4dc2-85ee-cd17b43c7d2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-21db8f60-3a95-4dc2-85ee-cd17b43c7d2d', 'x-compute-request-id': 'req-21db8f60-3a95-4dc2-85ee-cd17b43c7d2d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:02.177 186 INFO tempest.lib.common.rest_client [req-15b8d369-a626-4a2f-8820-f00776a473cb ] Request (GroupTypeSpecsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=fd4cc19984854eafba36a80901bdbda8&name=default 0.406s 2020-12-14 02:20:02.181 186 DEBUG tempest.lib.common.rest_client [req-15b8d369-a626-4a2f-8820-f00776a473cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-15b8d369-a626-4a2f-8820-f00776a473cb', 'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=fd4cc19984854eafba36a80901bdbda8&name=default'} Body: b'{"security_groups": [{"id": "1f6ffe6e-c563-412a-81ba-14e4f1bc527b", "name": "default", "stateful": true, "tenant_id": "fd4cc19984854eafba36a80901bdbda8", "description": "Default security group", "security_group_rules": [{"id": "03ed15e5-a3c6-4d4f-a06d-0042f2313a92", "tenant_id": "fd4cc19984854eafba36a80901bdbda8", "security_group_id": "1f6ffe6e-c563-412a-81ba-14e4f1bc527b", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:20:02Z", "updated_at": "2020-12-14T02:20:02Z", "revision_number": 0, "project_id": "fd4cc19984854eafba36a80901bdbda8"}, {"id": "1df19b42-8d62-4162-a9d5-27d7f9a4a008", "tenant_id": "fd4cc19984854eafba36a80901bdbda8", "security_group_id": "1f6ffe6e-c563-412a-81ba-14e4f1bc527b", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:20:02Z", "updated_at": "2020-12-14T02:20:02Z", "revision_number": 0, "project_id": "fd4cc19984854eafba36a80901bdbda8"}, {"id": "292d52cc-ecf9-4cc5-9a89-aaeacff86abd", "tenant_id": "fd4cc19984854eafba36a80901bdbda8", "security_group_id": "1f6ffe6e-c563-412a-81ba-14e4f1bc527b", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1f6ffe6e-c563-412a-81ba-14e4f1bc527b", "description": null, "tags": [], "created_at": "2020-12-14T02:20:01Z", "updated_at": "2020-12-14T02:20:01Z", "revision_number": 0, "project_id": "fd4cc19984854eafba36a80901bdbda8"}, {"id": "ff4ef3c4-7510-4139-91bd-211fcd0071fc", "tenant_id": "fd4cc19984854eafba36a80901bdbda8", "security_group_id": "1f6ffe6e-c563-412a-81ba-14e4f1bc527b", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1f6ffe6e-c563-412a-81ba-14e4f1bc527b", "description": null, "tags": [], "created_at": "2020-12-14T02:20:02Z", "updated_at": "2020-12-14T02:20:02Z", "revision_number": 0, "project_id": "fd4cc19984854eafba36a80901bdbda8"}], "tags": [], "created_at": "2020-12-14T02:20:01Z", "updated_at": "2020-12-14T02:20:02Z", "revision_number": 1, "project_id": "fd4cc19984854eafba36a80901bdbda8"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:02.258 193 INFO tempest.lib.common.rest_client [req-148d9b78-3583-4d58-b499-9bc931a39325 ] Request (VolumeTypesExtraSpecsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=62ae6831eaa2476e83d44f73edd4b565&name=default 0.389s 2020-12-14 02:20:02.261 193 DEBUG tempest.lib.common.rest_client [req-148d9b78-3583-4d58-b499-9bc931a39325 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-148d9b78-3583-4d58-b499-9bc931a39325', 'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=62ae6831eaa2476e83d44f73edd4b565&name=default'} Body: b'{"security_groups": [{"id": "9ca62d50-ecac-468c-960a-ec812ce6af6d", "name": "default", "stateful": true, "tenant_id": "62ae6831eaa2476e83d44f73edd4b565", "description": "Default security group", "security_group_rules": [{"id": "4d094de3-4b53-4d24-9b1f-a4137d917d53", "tenant_id": "62ae6831eaa2476e83d44f73edd4b565", "security_group_id": "9ca62d50-ecac-468c-960a-ec812ce6af6d", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:20:02Z", "updated_at": "2020-12-14T02:20:02Z", "revision_number": 0, "project_id": "62ae6831eaa2476e83d44f73edd4b565"}, {"id": "cf81201c-0464-432a-8d9f-c145db93799b", "tenant_id": "62ae6831eaa2476e83d44f73edd4b565", "security_group_id": "9ca62d50-ecac-468c-960a-ec812ce6af6d", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "9ca62d50-ecac-468c-960a-ec812ce6af6d", "description": null, "tags": [], "created_at": "2020-12-14T02:20:02Z", "updated_at": "2020-12-14T02:20:02Z", "revision_number": 0, "project_id": "62ae6831eaa2476e83d44f73edd4b565"}, {"id": "db2d63b3-747d-4265-8569-72d54ec72ff4", "tenant_id": "62ae6831eaa2476e83d44f73edd4b565", "security_group_id": "9ca62d50-ecac-468c-960a-ec812ce6af6d", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "9ca62d50-ecac-468c-960a-ec812ce6af6d", "description": null, "tags": [], "created_at": "2020-12-14T02:20:02Z", "updated_at": "2020-12-14T02:20:02Z", "revision_number": 0, "project_id": "62ae6831eaa2476e83d44f73edd4b565"}, {"id": "e1ad297e-747f-42c0-a125-4a0f57e96e22", "tenant_id": "62ae6831eaa2476e83d44f73edd4b565", "security_group_id": "9ca62d50-ecac-468c-960a-ec812ce6af6d", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:20:02Z", "updated_at": "2020-12-14T02:20:02Z", "revision_number": 0, "project_id": "62ae6831eaa2476e83d44f73edd4b565"}], "tags": [], "created_at": "2020-12-14T02:20:02Z", "updated_at": "2020-12-14T02:20:02Z", "revision_number": 1, "project_id": "62ae6831eaa2476e83d44f73edd4b565"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:02.343 186 INFO tempest.lib.common.rest_client [req-7579e93f-6184-4a63-9af1-aac7b046fca1 ] Request (GroupTypeSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/1f6ffe6e-c563-412a-81ba-14e4f1bc527b 0.155s 2020-12-14 02:20:02.346 186 DEBUG tempest.lib.common.rest_client [req-7579e93f-6184-4a63-9af1-aac7b046fca1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-7579e93f-6184-4a63-9af1-aac7b046fca1', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/1f6ffe6e-c563-412a-81ba-14e4f1bc527b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:02.447 193 INFO tempest.lib.common.rest_client [req-4ac0f2ce-bd6b-494f-adf5-775db3485eaf ] Request (VolumeTypesExtraSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/9ca62d50-ecac-468c-960a-ec812ce6af6d 0.178s 2020-12-14 02:20:02.449 193 DEBUG tempest.lib.common.rest_client [req-4ac0f2ce-bd6b-494f-adf5-775db3485eaf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-4ac0f2ce-bd6b-494f-adf5-775db3485eaf', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/9ca62d50-ecac-468c-960a-ec812ce6af6d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:02.471 186 INFO tempest.lib.common.rest_client [req-7890cdae-96bf-4f5a-b680-654e9dd09879 ] Request (GroupTypeSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8 0.119s 2020-12-14 02:20:02.475 186 DEBUG tempest.lib.common.rest_client [req-7890cdae-96bf-4f5a-b680-654e9dd09879 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7890cdae-96bf-4f5a-b680-654e9dd09879', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fd4cc19984854eafba36a80901bdbda8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:02.534 186 INFO tempest.lib.common.rest_client [req-e4a96291-84f6-4944-94ca-1543b42b4b73 ] Request (VolumeQOSV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:20:02.536 186 DEBUG tempest.lib.common.rest_client [req-e4a96291-84f6-4944-94ca-1543b42b4b73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4a96291-84f6-4944-94ca-1543b42b4b73', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Gmf3bGoVS7-bgULUlsM6BA"], "expires_at": "2020-12-14T03:20:02.000000Z", "issued_at": "2020-12-14T02:20:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:02.625 193 INFO tempest.lib.common.rest_client [req-607b8f60-641c-44c5-9e8a-04fbc6d48e85 ] Request (VolumeTypesExtraSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565 0.171s 2020-12-14 02:20:02.628 193 DEBUG tempest.lib.common.rest_client [req-607b8f60-641c-44c5-9e8a-04fbc6d48e85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-607b8f60-641c-44c5-9e8a-04fbc6d48e85', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/62ae6831eaa2476e83d44f73edd4b565'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:02.677 186 INFO tempest.lib.common.rest_client [req-e443e491-30c1-4969-864e-eaea6a703d25 ] Request (VolumeQOSV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-12-14 02:20:02.680 186 DEBUG tempest.lib.common.rest_client [req-e443e491-30c1-4969-864e-eaea6a703d25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e443e491-30c1-4969-864e-eaea6a703d25', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["EBHB1L7qSIOgqfRRG4A4-Q"], "expires_at": "2020-12-14T03:20:02.000000Z", "issued_at": "2020-12-14T02:20:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:02.694 193 INFO tempest.lib.common.rest_client [req-3dc62306-0a6a-44eb-85e4-6940f4d041be ] Request (VolumesBackupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:20:02.697 193 DEBUG tempest.lib.common.rest_client [req-3dc62306-0a6a-44eb-85e4-6940f4d041be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3dc62306-0a6a-44eb-85e4-6940f4d041be', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["PJ-p6kr8TuuYF9jv7otscQ"], "expires_at": "2020-12-14T03:20:02.000000Z", "issued_at": "2020-12-14T02:20:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:02.741 186 INFO tempest.lib.common.rest_client [req-2da3e7aa-49ff-42b2-a8f8-846ecef3b414 ] Request (VolumeQOSV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.053s 2020-12-14 02:20:02.743 186 DEBUG tempest.lib.common.rest_client [req-2da3e7aa-49ff-42b2-a8f8-846ecef3b414 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2da3e7aa-49ff-42b2-a8f8-846ecef3b414', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:02.800 193 INFO tempest.lib.common.rest_client [req-c45dfa45-2fdd-4bc2-bdd3-f415246f6654 ] Request (VolumesBackupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:20:02.804 193 DEBUG tempest.lib.common.rest_client [req-c45dfa45-2fdd-4bc2-bdd3-f415246f6654 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c45dfa45-2fdd-4bc2-bdd3-f415246f6654', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["88hVcEW5QTqfcz6owzwMOw"], "expires_at": "2020-12-14T03:20:02.000000Z", "issued_at": "2020-12-14T02:20:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:02.822 186 INFO tempest.lib.common.rest_client [req-d4c674c4-dfd9-4019-8f05-9dbb3c0b7906 ] Request (VolumeQOSV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.071s 2020-12-14 02:20:02.825 186 DEBUG tempest.lib.common.rest_client [req-d4c674c4-dfd9-4019-8f05-9dbb3c0b7906 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeQOSV3RbacTest-2102603755-desc", "domain_id": "default", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4c674c4-dfd9-4019-8f05-9dbb3c0b7906', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "domain_id": "default", "description": "tempest-VolumeQOSV3RbacTest-2102603755-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:02.926 193 INFO tempest.lib.common.rest_client [req-8ac8b90c-c3b5-4361-8e33-7a00ade44b7f ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.112s 2020-12-14 02:20:02.929 193 DEBUG tempest.lib.common.rest_client [req-8ac8b90c-c3b5-4361-8e33-7a00ade44b7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ac8b90c-c3b5-4361-8e33-7a00ade44b7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:02.948 186 INFO tempest.lib.common.rest_client [req-6b8f3618-c12a-4bd9-8af2-18594a6732b8 ] Request (VolumeQOSV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.115s 2020-12-14 02:20:02.951 186 DEBUG tempest.lib.common.rest_client [req-6b8f3618-c12a-4bd9-8af2-18594a6732b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeQOSV3RbacTest-2102603755", "password": "O6~SUW&Er^KDTZ4", "project_id": "97ddab75898941e4a1a6dfb868f86011", "email": "tempest-VolumeQOSV3RbacTest-409978037@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '393', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b8f3618-c12a-4bd9-8af2-18594a6732b8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "97ddab75898941e4a1a6dfb868f86011", "email": "tempest-VolumeQOSV3RbacTest-409978037@example.com", "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/7f7174d9793a4746a3258d04c9821a25"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.008 193 INFO tempest.lib.common.rest_client [req-1edf0a72-e4bc-480e-aed0-13988d1b961b ] Request (VolumesBackupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.072s 2020-12-14 02:20:03.009 189 INFO tempest.lib.common.rest_client [req-bdb1a7ac-c958-4f5e-a3e9-f50dc14218b3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.236s 2020-12-14 02:20:03.010 193 DEBUG tempest.lib.common.rest_client [req-1edf0a72-e4bc-480e-aed0-13988d1b961b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesBackupsV3RbacTest-1599138395-desc", "domain_id": "default", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1edf0a72-e4bc-480e-aed0-13988d1b961b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "domain_id": "default", "description": "tempest-VolumesBackupsV3RbacTest-1599138395-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.010 186 INFO tempest.lib.common.rest_client [req-77285726-3165-41e6-9349-0d3d0a35954a ] Request (VolumeQOSV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-12-14 02:20:03.013 189 DEBUG tempest.lib.common.rest_client [req-bdb1a7ac-c958-4f5e-a3e9-f50dc14218b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bdb1a7ac-c958-4f5e-a3e9-f50dc14218b3', 'x-compute-request-id': 'req-bdb1a7ac-c958-4f5e-a3e9-f50dc14218b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.013 186 DEBUG tempest.lib.common.rest_client [req-77285726-3165-41e6-9349-0d3d0a35954a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-77285726-3165-41e6-9349-0d3d0a35954a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.129 186 INFO tempest.lib.common.rest_client [req-2d5476c9-74c3-4379-8c2e-4b07cfdb213b ] Request (VolumeQOSV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.107s 2020-12-14 02:20:03.130 193 INFO tempest.lib.common.rest_client [req-d6031905-8449-4e87-974a-d917d5d65bd3 ] Request (VolumesBackupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.111s 2020-12-14 02:20:03.132 186 DEBUG tempest.lib.common.rest_client [req-2d5476c9-74c3-4379-8c2e-4b07cfdb213b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2d5476c9-74c3-4379-8c2e-4b07cfdb213b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.132 193 DEBUG tempest.lib.common.rest_client [req-d6031905-8449-4e87-974a-d917d5d65bd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password": "M5@UBfXlgj17e5_", "project_id": "f10b46c459c54d6d96bcedc01e4f091f", "email": "tempest-VolumesBackupsV3RbacTest-84151014@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '402', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6031905-8449-4e87-974a-d917d5d65bd3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "f10b46c459c54d6d96bcedc01e4f091f", "email": "tempest-VolumesBackupsV3RbacTest-84151014@example.com", "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/690e42d9412443b5a57db3b4600b742d"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.200 193 INFO tempest.lib.common.rest_client [req-b413b4e2-2760-42ff-8ce7-704ae36c8c58 ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:20:03.203 193 DEBUG tempest.lib.common.rest_client [req-b413b4e2-2760-42ff-8ce7-704ae36c8c58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b413b4e2-2760-42ff-8ce7-704ae36c8c58', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.211 186 INFO tempest.lib.common.rest_client [req-1a32e0b3-62ca-41d8-a3e6-0053a0c15c38 ] Request (VolumeQOSV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles/72a4576c553448cd941b052c1ca0cf2d 0.072s 2020-12-14 02:20:03.214 186 DEBUG tempest.lib.common.rest_client [req-1a32e0b3-62ca-41d8-a3e6-0053a0c15c38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a32e0b3-62ca-41d8-a3e6-0053a0c15c38', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.217 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeQOSV3RbacTest-2102603755', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '97ddab75898941e4a1a6dfb868f86011', 'project_name': 'tempest-VolumeQOSV3RbacTest-2102603755', 'tenant_id': '97ddab75898941e4a1a6dfb868f86011', 'tenant_name': 'tempest-VolumeQOSV3RbacTest-2102603755', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '7f7174d9793a4746a3258d04c9821a25'}, Network: None, Subnet: None, Router: None 2020-12-14 02:20:03.219 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeQOSV3RbacTest-2102603755', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '97ddab75898941e4a1a6dfb868f86011', 'project_name': 'tempest-VolumeQOSV3RbacTest-2102603755', 'tenant_id': '97ddab75898941e4a1a6dfb868f86011', 'tenant_name': 'tempest-VolumeQOSV3RbacTest-2102603755', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '7f7174d9793a4746a3258d04c9821a25'}, Network: None, Subnet: None, Router: None 2020-12-14 02:20:03.350 193 INFO tempest.lib.common.rest_client [req-1240b85c-e06a-44ab-ab26-d88454d681d7 ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.140s 2020-12-14 02:20:03.353 193 DEBUG tempest.lib.common.rest_client [req-1240b85c-e06a-44ab-ab26-d88454d681d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1240b85c-e06a-44ab-ab26-d88454d681d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.374 186 INFO tempest.lib.common.rest_client [req-5a7530e4-3e9c-47df-9f73-7698cca3a835 ] Request (VolumeQOSV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:20:03.376 186 DEBUG tempest.lib.common.rest_client [req-5a7530e4-3e9c-47df-9f73-7698cca3a835 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a7530e4-3e9c-47df-9f73-7698cca3a835', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["mU-VXHWRQdSfna9Nq1KtQA"], "expires_at": "2020-12-14T03:20:03.000000Z", "issued_at": "2020-12-14T02:20:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.437 193 INFO tempest.lib.common.rest_client [req-dc73813d-c80b-4566-8bce-2b2fc7458265 ] Request (VolumesBackupsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles/72a4576c553448cd941b052c1ca0cf2d 0.076s 2020-12-14 02:20:03.439 186 INFO tempest.lib.common.rest_client [req-5491379e-7c74-44d4-bf66-c4d2d0e1129a ] Request (VolumeQOSV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:20:03.440 193 DEBUG tempest.lib.common.rest_client [req-dc73813d-c80b-4566-8bce-2b2fc7458265 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc73813d-c80b-4566-8bce-2b2fc7458265', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.442 186 DEBUG tempest.lib.common.rest_client [req-5491379e-7c74-44d4-bf66-c4d2d0e1129a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5491379e-7c74-44d4-bf66-c4d2d0e1129a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["2ygtQKTXQZiAxyaAZfjdJQ"], "expires_at": "2020-12-14T03:20:03.000000Z", "issued_at": "2020-12-14T02:20:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.444 193 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesBackupsV3RbacTest-1599138395', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'f10b46c459c54d6d96bcedc01e4f091f', 'project_name': 'tempest-VolumesBackupsV3RbacTest-1599138395', 'tenant_id': 'f10b46c459c54d6d96bcedc01e4f091f', 'tenant_name': 'tempest-VolumesBackupsV3RbacTest-1599138395', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '690e42d9412443b5a57db3b4600b742d'}, Network: None, Subnet: None, Router: None 2020-12-14 02:20:03.446 193 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesBackupsV3RbacTest-1599138395', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'f10b46c459c54d6d96bcedc01e4f091f', 'project_name': 'tempest-VolumesBackupsV3RbacTest-1599138395', 'tenant_id': 'f10b46c459c54d6d96bcedc01e4f091f', 'tenant_name': 'tempest-VolumesBackupsV3RbacTest-1599138395', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '690e42d9412443b5a57db3b4600b742d'}, Network: None, Subnet: None, Router: None 2020-12-14 02:20:03.526 197 INFO tempest.lib.common.rest_client [req-29bf8bba-19e7-42d9-b933-9814038bcd13 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.242s 2020-12-14 02:20:03.530 197 DEBUG tempest.lib.common.rest_client [req-29bf8bba-19e7-42d9-b933-9814038bcd13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-29bf8bba-19e7-42d9-b933-9814038bcd13', 'x-compute-request-id': 'req-29bf8bba-19e7-42d9-b933-9814038bcd13', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.600 186 INFO tempest.lib.common.rest_client [req-daa9d167-9ad0-4d96-a4ac-0d26af4d47a5 ] Request (VolumeQOSV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:20:03.603 186 DEBUG tempest.lib.common.rest_client [req-daa9d167-9ad0-4d96-a4ac-0d26af4d47a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-daa9d167-9ad0-4d96-a4ac-0d26af4d47a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Nw_VYMMMRTGeWinjPNqzRQ"], "expires_at": "2020-12-14T03:20:03.000000Z", "issued_at": "2020-12-14T02:20:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.619 193 INFO tempest.lib.common.rest_client [req-1d51c71e-4807-42e2-9254-f09d64d38cd8 ] Request (VolumesBackupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-12-14 02:20:03.623 193 DEBUG tempest.lib.common.rest_client [req-1d51c71e-4807-42e2-9254-f09d64d38cd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d51c71e-4807-42e2-9254-f09d64d38cd8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["k_D464bGStuYX9r5ffOf7g"], "expires_at": "2020-12-14T03:20:03.000000Z", "issued_at": "2020-12-14T02:20:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.670 186 INFO tempest.lib.common.rest_client [req-a4463894-b373-44ae-96f9-932f73bef3ea ] Request (VolumeQOSV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.059s 2020-12-14 02:20:03.673 186 DEBUG tempest.lib.common.rest_client [req-a4463894-b373-44ae-96f9-932f73bef3ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a4463894-b373-44ae-96f9-932f73bef3ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.678 193 INFO tempest.lib.common.rest_client [req-23af04c8-fc80-4485-94d7-099d42425a60 ] Request (VolumesBackupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:20:03.680 193 DEBUG tempest.lib.common.rest_client [req-23af04c8-fc80-4485-94d7-099d42425a60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-23af04c8-fc80-4485-94d7-099d42425a60', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["wkHhrAOSQCqoOv_jtI4SRA"], "expires_at": "2020-12-14T03:20:03.000000Z", "issued_at": "2020-12-14T02:20:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.731 186 INFO tempest.lib.common.rest_client [req-c6682659-3bbb-4263-9f98-b7540758f440 ] Request (VolumeQOSV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-12-14 02:20:03.733 186 DEBUG tempest.lib.common.rest_client [req-c6682659-3bbb-4263-9f98-b7540758f440 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6682659-3bbb-4263-9f98-b7540758f440', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.736 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:20:03.738 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:03.803 193 INFO tempest.lib.common.rest_client [req-d5cdffb0-c173-46fe-a086-ec08ba3a201a ] Request (VolumesBackupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:20:03.804 186 INFO tempest.lib.common.rest_client [req-1bc862fb-c01a-4fdc-b9d7-8de5c70f432a ] Request (VolumeQOSV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.060s 2020-12-14 02:20:03.806 193 DEBUG tempest.lib.common.rest_client [req-d5cdffb0-c173-46fe-a086-ec08ba3a201a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5cdffb0-c173-46fe-a086-ec08ba3a201a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Mb_i2r44RHqhuqsv0Y6AWQ"], "expires_at": "2020-12-14T03:20:03.000000Z", "issued_at": "2020-12-14T02:20:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.806 186 DEBUG tempest.lib.common.rest_client [req-1bc862fb-c01a-4fdc-b9d7-8de5c70f432a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1bc862fb-c01a-4fdc-b9d7-8de5c70f432a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.866 193 INFO tempest.lib.common.rest_client [req-5e4ed8f2-f773-41d2-9d59-4f8f17f6daf8 ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.053s 2020-12-14 02:20:03.868 193 DEBUG tempest.lib.common.rest_client [req-5e4ed8f2-f773-41d2-9d59-4f8f17f6daf8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e4ed8f2-f773-41d2-9d59-4f8f17f6daf8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.878 186 INFO tempest.lib.common.rest_client [req-7b71f2dc-8d76-483e-8042-1a818946e01b ] Request (VolumeQOSV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-12-14 02:20:03.881 186 DEBUG tempest.lib.common.rest_client [req-7b71f2dc-8d76-483e-8042-1a818946e01b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7b71f2dc-8d76-483e-8042-1a818946e01b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.978 193 INFO tempest.lib.common.rest_client [req-b241362d-5185-4729-8ed7-ace0d3be4001 ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.103s 2020-12-14 02:20:03.981 193 DEBUG tempest.lib.common.rest_client [req-b241362d-5185-4729-8ed7-ace0d3be4001 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b241362d-5185-4729-8ed7-ace0d3be4001', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:03.984 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:20:03.987 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:04.000 186 INFO tempest.lib.common.rest_client [req-82328b36-dddb-43ac-abc0-fe533ad52a48 ] Request (VolumeQOSV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles/a629c95d64b3416fb80ae90af4f69c05 0.112s 2020-12-14 02:20:04.004 186 DEBUG tempest.lib.common.rest_client [req-82328b36-dddb-43ac-abc0-fe533ad52a48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-82328b36-dddb-43ac-abc0-fe533ad52a48', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:04.106 193 INFO tempest.lib.common.rest_client [req-84cd3c07-dd2e-49cb-ad72-c9350c041d40 ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.113s 2020-12-14 02:20:04.109 193 DEBUG tempest.lib.common.rest_client [req-84cd3c07-dd2e-49cb-ad72-c9350c041d40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84cd3c07-dd2e-49cb-ad72-c9350c041d40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:04.189 193 INFO tempest.lib.common.rest_client [req-b681812d-796c-4caa-9f6d-ef100b97ad38 ] Request (VolumesBackupsV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles/72a4576c553448cd941b052c1ca0cf2d 0.072s 2020-12-14 02:20:04.193 193 DEBUG tempest.lib.common.rest_client [req-b681812d-796c-4caa-9f6d-ef100b97ad38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b681812d-796c-4caa-9f6d-ef100b97ad38', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:04.308 193 INFO tempest.lib.common.rest_client [req-5f658aeb-b79f-4cf7-8b63-9c5611d3d4c5 ] Request (VolumesBackupsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles/a629c95d64b3416fb80ae90af4f69c05 0.109s 2020-12-14 02:20:04.310 193 DEBUG tempest.lib.common.rest_client [req-5f658aeb-b79f-4cf7-8b63-9c5611d3d4c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f658aeb-b79f-4cf7-8b63-9c5611d3d4c5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:04.540 189 INFO tempest.lib.common.rest_client [req-237c3f13-9f3c-4e4a-99b9-48f404c4a86b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.423s 2020-12-14 02:20:04.543 189 DEBUG tempest.lib.common.rest_client [req-237c3f13-9f3c-4e4a-99b9-48f404c4a86b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-237c3f13-9f3c-4e4a-99b9-48f404c4a86b', 'x-compute-request-id': 'req-237c3f13-9f3c-4e4a-99b9-48f404c4a86b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:04.912 197 INFO tempest.lib.common.rest_client [req-8a36436f-ae19-4945-9def-634a757aab79 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.274s 2020-12-14 02:20:04.915 197 DEBUG tempest.lib.common.rest_client [req-8a36436f-ae19-4945-9def-634a757aab79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8a36436f-ae19-4945-9def-634a757aab79', 'x-compute-request-id': 'req-8a36436f-ae19-4945-9def-634a757aab79', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:05.103 186 INFO tempest.lib.common.rest_client [req-905d5618-d087-480a-a861-13b62698782d ] Request (VolumeQOSV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:20:05.106 186 DEBUG tempest.lib.common.rest_client [req-905d5618-d087-480a-a861-13b62698782d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-905d5618-d087-480a-a861-13b62698782d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["fWWtk5YvQKiZAsHHeO6flg"], "expires_at": "2020-12-14T03:20:05.000000Z", "issued_at": "2020-12-14T02:20:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:05.118 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:05.138 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:update, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:05.335 186 INFO tempest.lib.common.rest_client [req-de581a3c-1f2f-4369-9205-6f2aab80f362 ] Request (VolumeQOSV3RbacTest:test_associate_qos): 200 POST http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs 0.190s 2020-12-14 02:20:05.338 186 DEBUG tempest.lib.common.rest_client [req-de581a3c-1f2f-4369-9205-6f2aab80f362 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-1224813243", "consumer": "front-end"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-de581a3c-1f2f-4369-9205-6f2aab80f362', 'content-length': '441', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-de581a3c-1f2f-4369-9205-6f2aab80f362', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs'} Body: b'{"qos_specs": {"id": "81bbc4ba-5d6e-4103-bde5-7907b5c10b18", "name": "tempest-VolumeQOSV3RbacTest-QoS-1224813243", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/81bbc4ba-5d6e-4103-bde5-7907b5c10b18"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/97ddab75898941e4a1a6dfb868f86011/qos-specs/81bbc4ba-5d6e-4103-bde5-7907b5c10b18"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:05.409 193 INFO tempest.lib.common.rest_client [req-ae4dab00-17c4-4ef0-b754-b78c67916d3c ] Request (VolumesBackupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:20:05.411 193 DEBUG tempest.lib.common.rest_client [req-ae4dab00-17c4-4ef0-b754-b78c67916d3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae4dab00-17c4-4ef0-b754-b78c67916d3c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["c3p3FpKeRkSQg_0ZwyDmnQ"], "expires_at": "2020-12-14T03:20:05.000000Z", "issued_at": "2020-12-14T02:20:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:05.422 186 INFO tempest.lib.common.rest_client [req-e50b6bb6-b91e-48b3-9763-66ddfb5e9928 ] Request (VolumeQOSV3RbacTest:test_associate_qos): 200 POST http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types 0.052s 2020-12-14 02:20:05.425 186 DEBUG tempest.lib.common.rest_client [req-e50b6bb6-b91e-48b3-9763-66ddfb5e9928 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeQOSV3RbacTest-volume-type-1298498953"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e50b6bb6-b91e-48b3-9763-66ddfb5e9928', 'content-length': '225', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e50b6bb6-b91e-48b3-9763-66ddfb5e9928', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types'} Body: b'{"volume_type": {"id": "7f3bba2f-9843-4cb9-8d5c-0769e14c346f", "name": "tempest-VolumeQOSV3RbacTest-volume-type-1298498953", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:05.448 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:05.570 186 INFO tempest.lib.common.rest_client [req-fdd99b09-a7ce-47f8-ac85-1e4fd75bdac7 ] Request (VolumeQOSV3RbacTest:test_associate_qos): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.114s 2020-12-14 02:20:05.573 186 DEBUG tempest.lib.common.rest_client [req-fdd99b09-a7ce-47f8-ac85-1e4fd75bdac7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fdd99b09-a7ce-47f8-ac85-1e4fd75bdac7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:05.626 186 INFO tempest.lib.common.rest_client [req-d06ee9e1-7f18-4b6b-87b7-f677b47d2c06 ] Request (VolumeQOSV3RbacTest:test_associate_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:20:05.630 186 DEBUG tempest.lib.common.rest_client [req-d06ee9e1-7f18-4b6b-87b7-f677b47d2c06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d06ee9e1-7f18-4b6b-87b7-f677b47d2c06', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["pS8vIqizR6SCuCR6BlMtdA"], "expires_at": "2020-12-14T03:20:05.000000Z", "issued_at": "2020-12-14T02:20:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:05.766 186 INFO tempest.lib.common.rest_client [req-7ae34feb-bc4d-494e-b760-cfd9ba068190 ] Request (VolumeQOSV3RbacTest:test_associate_qos): 202 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/81bbc4ba-5d6e-4103-bde5-7907b5c10b18/associate?vol_type_id=7f3bba2f-9843-4cb9-8d5c-0769e14c346f 0.127s 2020-12-14 02:20:05.770 186 DEBUG tempest.lib.common.rest_client [req-7ae34feb-bc4d-494e-b760-cfd9ba068190 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7ae34feb-bc4d-494e-b760-cfd9ba068190', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/81bbc4ba-5d6e-4103-bde5-7907b5c10b18/associate?vol_type_id=7f3bba2f-9843-4cb9-8d5c-0769e14c346f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:05.772 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:05.840 186 INFO tempest.lib.common.rest_client [req-c779bcbc-3bae-4e40-bb1d-34fde943c238 ] Request (VolumeQOSV3RbacTest:test_associate_qos): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.061s 2020-12-14 02:20:05.843 186 DEBUG tempest.lib.common.rest_client [req-c779bcbc-3bae-4e40-bb1d-34fde943c238 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c779bcbc-3bae-4e40-bb1d-34fde943c238', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:05.934 193 INFO tempest.lib.common.rest_client [req-ff3b9db2-0ee5-4431-b68f-8f146622507a ] Request (VolumesBackupsV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes 0.512s 2020-12-14 02:20:05.937 193 DEBUG tempest.lib.common.rest_client [req-ff3b9db2-0ee5-4431-b68f-8f146622507a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesBackupsV3RbacTest-Volume-1478667370"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ff3b9db2-0ee5-4431-b68f-8f146622507a', 'content-length': '845', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ff3b9db2-0ee5-4431-b68f-8f146622507a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes'} Body: b'{"volume": {"id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:06.000000", "updated_at": null, "name": "tempest-VolumesBackupsV3RbacTest-Volume-1478667370", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}], "user_id": "690e42d9412443b5a57db3b4600b742d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:06.004 186 INFO tempest.lib.common.rest_client [req-e945ee27-2e8f-43ec-a9d9-44845a914e79 ] Request (VolumeQOSV3RbacTest:test_associate_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.153s 2020-12-14 02:20:06.009 186 DEBUG tempest.lib.common.rest_client [req-e945ee27-2e8f-43ec-a9d9-44845a914e79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e945ee27-2e8f-43ec-a9d9-44845a914e79', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["c_gUzVwvSz6Bpmm5e9C4rQ"], "expires_at": "2020-12-14T03:20:05.000000Z", "issued_at": "2020-12-14T02:20:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:06.028 189 INFO tempest.lib.common.rest_client [req-a9dc11b3-e37c-4d7d-a9e7-933fc2d27168 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.378s 2020-12-14 02:20:06.031 189 DEBUG tempest.lib.common.rest_client [req-a9dc11b3-e37c-4d7d-a9e7-933fc2d27168 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a9dc11b3-e37c-4d7d-a9e7-933fc2d27168', 'x-compute-request-id': 'req-a9dc11b3-e37c-4d7d-a9e7-933fc2d27168', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:06.144 186 INFO tempest.lib.common.rest_client [req-53d2a02e-2499-4231-b167-3a8d099d8fcb ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/81bbc4ba-5d6e-4103-bde5-7907b5c10b18/disassociate?vol_type_id=7f3bba2f-9843-4cb9-8d5c-0769e14c346f 0.127s 2020-12-14 02:20:06.146 186 DEBUG tempest.lib.common.rest_client [req-53d2a02e-2499-4231-b167-3a8d099d8fcb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-53d2a02e-2499-4231-b167-3a8d099d8fcb', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/81bbc4ba-5d6e-4103-bde5-7907b5c10b18/disassociate?vol_type_id=7f3bba2f-9843-4cb9-8d5c-0769e14c346f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:06.191 193 INFO tempest.lib.common.rest_client [req-dfb372b5-e339-48ba-9def-29ab493b5aa7 ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821 0.152s 2020-12-14 02:20:06.194 193 DEBUG tempest.lib.common.rest_client [req-dfb372b5-e339-48ba-9def-29ab493b5aa7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-dfb372b5-e339-48ba-9def-29ab493b5aa7', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-dfb372b5-e339-48ba-9def-29ab493b5aa7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821'} Body: b'{"volume": {"id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:06.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-1478667370", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}], "user_id": "690e42d9412443b5a57db3b4600b742d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "f10b46c459c54d6d96bcedc01e4f091f"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:06.206 186 INFO tempest.lib.common.rest_client [req-3d4d0ae8-4c27-46d3-851b-08874b262407 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/81bbc4ba-5d6e-4103-bde5-7907b5c10b18?force=False 0.053s 2020-12-14 02:20:06.208 186 DEBUG tempest.lib.common.rest_client [req-3d4d0ae8-4c27-46d3-851b-08874b262407 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3d4d0ae8-4c27-46d3-851b-08874b262407', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/81bbc4ba-5d6e-4103-bde5-7907b5c10b18?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:06.221 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:06.238 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:create, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:06.240 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:06.287 193 INFO tempest.common.waiters [-] volume 10f94d47-2015-4501-bbdd-1535ba5f2821 reached available after waiting for 0.287017 seconds 2020-12-14 02:20:06.325 186 INFO tempest.lib.common.rest_client [req-4d1d164d-5761-4d58-8288-5ffd83460392 ] Request (VolumeQOSV3RbacTest:test_create_qos_with_consumer): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.079s 2020-12-14 02:20:06.328 186 DEBUG tempest.lib.common.rest_client [req-4d1d164d-5761-4d58-8288-5ffd83460392 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d1d164d-5761-4d58-8288-5ffd83460392', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:06.377 186 INFO tempest.lib.common.rest_client [req-a773cc98-a28d-4918-80d9-991b4237f561 ] Request (VolumeQOSV3RbacTest:test_create_qos_with_consumer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:20:06.381 186 DEBUG tempest.lib.common.rest_client [req-a773cc98-a28d-4918-80d9-991b4237f561 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a773cc98-a28d-4918-80d9-991b4237f561', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["uWtgaCdZQlSeQXwtH8iOdQ"], "expires_at": "2020-12-14T03:20:06.000000Z", "issued_at": "2020-12-14T02:20:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:06.397 197 INFO tempest.lib.common.rest_client [req-832dfe43-d364-4f45-9854-b76606f556e2 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.375s 2020-12-14 02:20:06.401 197 DEBUG tempest.lib.common.rest_client [req-832dfe43-d364-4f45-9854-b76606f556e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-832dfe43-d364-4f45-9854-b76606f556e2', 'x-compute-request-id': 'req-832dfe43-d364-4f45-9854-b76606f556e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:06.484 186 INFO tempest.lib.common.rest_client [req-e678203c-f2e1-4938-905e-d57462308a22 ] Request (VolumeQOSV3RbacTest:test_create_qos_with_consumer): 200 POST http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs 0.095s 2020-12-14 02:20:06.489 186 DEBUG tempest.lib.common.rest_client [req-e678203c-f2e1-4938-905e-d57462308a22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-1994983463", "consumer": "front-end"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e678203c-f2e1-4938-905e-d57462308a22', 'content-length': '441', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e678203c-f2e1-4938-905e-d57462308a22', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs'} Body: b'{"qos_specs": {"id": "2d61e82c-72dd-4534-957f-06139496df8d", "name": "tempest-VolumeQOSV3RbacTest-QoS-1994983463", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/2d61e82c-72dd-4534-957f-06139496df8d"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/97ddab75898941e4a1a6dfb868f86011/qos-specs/2d61e82c-72dd-4534-957f-06139496df8d"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:06.495 193 INFO tempest.lib.common.rest_client [req-b4f64f68-9d2d-4eb3-8f02-afbb556475df ] Request (VolumesBackupsV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups 0.203s 2020-12-14 02:20:06.497 193 DEBUG tempest.lib.common.rest_client [req-b4f64f68-9d2d-4eb3-8f02-afbb556475df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"backup": {"volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1072014888"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b4f64f68-9d2d-4eb3-8f02-afbb556475df', 'content-length': '404', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b4f64f68-9d2d-4eb3-8f02-afbb556475df', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups'} Body: b'{"backup": {"id": "2d764829-8184-42a9-8a61-4d07717fdcee", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1072014888", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:06.517 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:06.566 193 INFO tempest.lib.common.rest_client [req-008eece9-8fe8-4e1b-9078-7c800a615b9a ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee 0.038s 2020-12-14 02:20:06.568 193 DEBUG tempest.lib.common.rest_client [req-008eece9-8fe8-4e1b-9078-7c800a615b9a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-008eece9-8fe8-4e1b-9078-7c800a615b9a', 'content-length': '811', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-008eece9-8fe8-4e1b-9078-7c800a615b9a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee'} Body: b'{"backup": {"id": "2d764829-8184-42a9-8a61-4d07717fdcee", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": null, "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:07.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1072014888", "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:06.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:06.583 186 INFO tempest.lib.common.rest_client [req-1a14b040-ed9a-4d4e-ad17-3ce83ecbe641 ] Request (VolumeQOSV3RbacTest:test_create_qos_with_consumer): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.060s 2020-12-14 02:20:06.586 186 DEBUG tempest.lib.common.rest_client [req-1a14b040-ed9a-4d4e-ad17-3ce83ecbe641 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a14b040-ed9a-4d4e-ad17-3ce83ecbe641', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:06.637 186 INFO tempest.lib.common.rest_client [req-9ed316d0-af9f-47f2-a7d5-8a2baddd19b4 ] Request (VolumeQOSV3RbacTest:test_create_qos_with_consumer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:20:06.641 186 DEBUG tempest.lib.common.rest_client [req-9ed316d0-af9f-47f2-a7d5-8a2baddd19b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ed316d0-af9f-47f2-a7d5-8a2baddd19b4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["fNRGaqadQGCnyfET4uCIVA"], "expires_at": "2020-12-14T03:20:06.000000Z", "issued_at": "2020-12-14T02:20:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:06.779 186 INFO tempest.lib.common.rest_client [req-1619c0d1-98df-40b7-9249-b50e88d8ecbf ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/2d61e82c-72dd-4534-957f-06139496df8d?force=False 0.127s 2020-12-14 02:20:06.781 186 DEBUG tempest.lib.common.rest_client [req-1619c0d1-98df-40b7-9249-b50e88d8ecbf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1619c0d1-98df-40b7-9249-b50e88d8ecbf', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/2d61e82c-72dd-4534-957f-06139496df8d?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:06.793 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:06.810 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:06.910 186 INFO tempest.lib.common.rest_client [req-6d54c02f-4608-4902-835d-33ed76383700 ] Request (VolumeQOSV3RbacTest:test_delete_qos_with_consumer): 200 POST http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs 0.094s 2020-12-14 02:20:06.913 186 DEBUG tempest.lib.common.rest_client [req-6d54c02f-4608-4902-835d-33ed76383700 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-1947148044", "consumer": "front-end"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6d54c02f-4608-4902-835d-33ed76383700', 'content-length': '441', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6d54c02f-4608-4902-835d-33ed76383700', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs'} Body: b'{"qos_specs": {"id": "4c86814f-abc7-4dc4-bfc9-dec4c07b4cb8", "name": "tempest-VolumeQOSV3RbacTest-QoS-1947148044", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/4c86814f-abc7-4dc4-bfc9-dec4c07b4cb8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/97ddab75898941e4a1a6dfb868f86011/qos-specs/4c86814f-abc7-4dc4-bfc9-dec4c07b4cb8"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:06.940 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:07.012 186 INFO tempest.lib.common.rest_client [req-e0915477-aa87-4abf-9d7a-b6850ded7735 ] Request (VolumeQOSV3RbacTest:test_delete_qos_with_consumer): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.065s 2020-12-14 02:20:07.016 186 DEBUG tempest.lib.common.rest_client [req-e0915477-aa87-4abf-9d7a-b6850ded7735 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0915477-aa87-4abf-9d7a-b6850ded7735', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:07.068 186 INFO tempest.lib.common.rest_client [req-fffbf853-fe5e-416b-ae85-1bebf2a353be ] Request (VolumeQOSV3RbacTest:test_delete_qos_with_consumer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:20:07.072 186 DEBUG tempest.lib.common.rest_client [req-fffbf853-fe5e-416b-ae85-1bebf2a353be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fffbf853-fe5e-416b-ae85-1bebf2a353be', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["Q0ik5SFcSz-u0zLqGjwF5Q"], "expires_at": "2020-12-14T03:20:07.000000Z", "issued_at": "2020-12-14T02:20:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:07.203 186 INFO tempest.lib.common.rest_client [req-28c47051-6120-40af-b8e0-eb0f6d6d30be ] Request (VolumeQOSV3RbacTest:test_delete_qos_with_consumer): 202 DELETE http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/4c86814f-abc7-4dc4-bfc9-dec4c07b4cb8?force=False 0.123s 2020-12-14 02:20:07.206 186 DEBUG tempest.lib.common.rest_client [req-28c47051-6120-40af-b8e0-eb0f6d6d30be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-28c47051-6120-40af-b8e0-eb0f6d6d30be', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/4c86814f-abc7-4dc4-bfc9-dec4c07b4cb8?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:07.209 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:07.277 186 INFO tempest.lib.common.rest_client [req-3db4c4f8-67b8-4d35-ae2d-506649e3e0f2 ] Request (VolumeQOSV3RbacTest:test_delete_qos_with_consumer): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.061s 2020-12-14 02:20:07.280 186 DEBUG tempest.lib.common.rest_client [req-3db4c4f8-67b8-4d35-ae2d-506649e3e0f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3db4c4f8-67b8-4d35-ae2d-506649e3e0f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:07.330 186 INFO tempest.lib.common.rest_client [req-808a06c1-8b2f-4215-b07e-3d6e06f42998 ] Request (VolumeQOSV3RbacTest:test_delete_qos_with_consumer): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:20:07.333 186 DEBUG tempest.lib.common.rest_client [req-808a06c1-8b2f-4215-b07e-3d6e06f42998 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-808a06c1-8b2f-4215-b07e-3d6e06f42998', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["Nj7BTld5TraV7I8B8lAV5w"], "expires_at": "2020-12-14T03:20:07.000000Z", "issued_at": "2020-12-14T02:20:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:07.430 186 INFO tempest.lib.common.rest_client [req-3801fcfc-aef5-4e87-b570-668d14a35881 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/4c86814f-abc7-4dc4-bfc9-dec4c07b4cb8?force=False 0.087s 2020-12-14 02:20:07.434 186 DEBUG tempest.lib.common.rest_client [req-3801fcfc-aef5-4e87-b570-668d14a35881 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '100', 'content-type': 'application/json', 'x-compute-request-id': 'req-3801fcfc-aef5-4e87-b570-668d14a35881', 'x-openstack-request-id': 'req-3801fcfc-aef5-4e87-b570-668d14a35881', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/4c86814f-abc7-4dc4-bfc9-dec4c07b4cb8?force=False'} Body: b'{"itemNotFound": {"code": 404, "message": "No such QoS spec 4c86814f-abc7-4dc4-bfc9-dec4c07b4cb8."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:07.446 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:07.464 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:update, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:07.506 186 INFO tempest.lib.common.rest_client [req-085bb1c7-fefd-4797-84ce-0a327a2af9c5 ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 200 POST http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs 0.036s 2020-12-14 02:20:07.509 186 DEBUG tempest.lib.common.rest_client [req-085bb1c7-fefd-4797-84ce-0a327a2af9c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-736427513", "consumer": "front-end"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-085bb1c7-fefd-4797-84ce-0a327a2af9c5', 'content-length': '440', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-085bb1c7-fefd-4797-84ce-0a327a2af9c5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs'} Body: b'{"qos_specs": {"id": "9466a38f-ee02-4d11-8a4a-cba4d35b505d", "name": "tempest-VolumeQOSV3RbacTest-QoS-736427513", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/9466a38f-ee02-4d11-8a4a-cba4d35b505d"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/97ddab75898941e4a1a6dfb868f86011/qos-specs/9466a38f-ee02-4d11-8a4a-cba4d35b505d"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:07.510 189 INFO tempest.lib.common.rest_client [req-6855e0d1-26ca-482d-9164-41e8bbfedf7d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.369s 2020-12-14 02:20:07.514 189 DEBUG tempest.lib.common.rest_client [req-6855e0d1-26ca-482d-9164-41e8bbfedf7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6855e0d1-26ca-482d-9164-41e8bbfedf7d', 'x-compute-request-id': 'req-6855e0d1-26ca-482d-9164-41e8bbfedf7d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:07.593 186 INFO tempest.lib.common.rest_client [req-b20243a8-6f45-4fd5-a9fe-baa268683125 ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 200 POST http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types 0.054s 2020-12-14 02:20:07.597 186 DEBUG tempest.lib.common.rest_client [req-b20243a8-6f45-4fd5-a9fe-baa268683125 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeQOSV3RbacTest-volume-type-1643557396"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b20243a8-6f45-4fd5-a9fe-baa268683125', 'content-length': '225', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b20243a8-6f45-4fd5-a9fe-baa268683125', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types'} Body: b'{"volume_type": {"id": "9c5b2629-20d3-453c-afd9-abd9df28284b", "name": "tempest-VolumeQOSV3RbacTest-volume-type-1643557396", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:07.673 193 INFO tempest.lib.common.rest_client [req-849e2c35-b5a4-455d-9ada-8cdeb732c0f6 ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee 0.046s 2020-12-14 02:20:07.675 193 DEBUG tempest.lib.common.rest_client [req-849e2c35-b5a4-455d-9ada-8cdeb732c0f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-849e2c35-b5a4-455d-9ada-8cdeb732c0f6', 'content-length': '816', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-849e2c35-b5a4-455d-9ada-8cdeb732c0f6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee'} Body: b'{"backup": {"id": "2d764829-8184-42a9-8a61-4d07717fdcee", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:07.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1072014888", "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:06.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:07.689 186 INFO tempest.lib.common.rest_client [req-f6a111ba-2a1c-4d9c-857e-3c2f5b0cf04a ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 202 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/9466a38f-ee02-4d11-8a4a-cba4d35b505d/associate?vol_type_id=9c5b2629-20d3-453c-afd9-abd9df28284b 0.066s 2020-12-14 02:20:07.692 186 DEBUG tempest.lib.common.rest_client [req-f6a111ba-2a1c-4d9c-857e-3c2f5b0cf04a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f6a111ba-2a1c-4d9c-857e-3c2f5b0cf04a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/9466a38f-ee02-4d11-8a4a-cba4d35b505d/associate?vol_type_id=9c5b2629-20d3-453c-afd9-abd9df28284b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:07.696 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:07.763 186 INFO tempest.lib.common.rest_client [req-a0b397c0-d44a-459b-8cf7-5094d5f2fe8b ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.061s 2020-12-14 02:20:07.766 186 DEBUG tempest.lib.common.rest_client [req-a0b397c0-d44a-459b-8cf7-5094d5f2fe8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0b397c0-d44a-459b-8cf7-5094d5f2fe8b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:07.816 186 INFO tempest.lib.common.rest_client [req-e2c64b58-04d4-411e-906a-4ea170fc6ba7 ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:20:07.820 186 DEBUG tempest.lib.common.rest_client [req-e2c64b58-04d4-411e-906a-4ea170fc6ba7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2c64b58-04d4-411e-906a-4ea170fc6ba7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["uBKxylQUS_yVaIvsnOuFIg"], "expires_at": "2020-12-14T03:20:07.000000Z", "issued_at": "2020-12-14T02:20:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:07.925 186 INFO tempest.lib.common.rest_client [req-aac78a5e-2376-4468-b452-0dffdd645edd ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 202 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/9466a38f-ee02-4d11-8a4a-cba4d35b505d/disassociate_all 0.097s 2020-12-14 02:20:07.929 186 DEBUG tempest.lib.common.rest_client [req-aac78a5e-2376-4468-b452-0dffdd645edd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-aac78a5e-2376-4468-b452-0dffdd645edd', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/9466a38f-ee02-4d11-8a4a-cba4d35b505d/disassociate_all'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:07.930 197 INFO tempest.lib.common.rest_client [req-7bc9f91d-084c-4b5d-a89e-a2172e169498 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.391s 2020-12-14 02:20:07.931 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:07.934 197 DEBUG tempest.lib.common.rest_client [req-7bc9f91d-084c-4b5d-a89e-a2172e169498 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7bc9f91d-084c-4b5d-a89e-a2172e169498', 'x-compute-request-id': 'req-7bc9f91d-084c-4b5d-a89e-a2172e169498', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:07.999 186 INFO tempest.lib.common.rest_client [req-5f08ecca-35b3-4550-a03c-f9792d2f9c92 ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.061s 2020-12-14 02:20:08.003 186 DEBUG tempest.lib.common.rest_client [req-5f08ecca-35b3-4550-a03c-f9792d2f9c92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f08ecca-35b3-4550-a03c-f9792d2f9c92', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:08.059 186 INFO tempest.lib.common.rest_client [req-65420ee3-c79e-4da8-ace5-42ca6e3fee36 ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:20:08.062 186 DEBUG tempest.lib.common.rest_client [req-65420ee3-c79e-4da8-ace5-42ca6e3fee36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-65420ee3-c79e-4da8-ace5-42ca6e3fee36', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["nOEATrnNSSCjQKrROlolZg"], "expires_at": "2020-12-14T03:20:08.000000Z", "issued_at": "2020-12-14T02:20:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:08.198 186 INFO tempest.lib.common.rest_client [req-a560a8c6-5ecf-4e7e-a89d-171ac502373b ] Request (VolumeQOSV3RbacTest:test_disassociate_all_qos): 200 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/9466a38f-ee02-4d11-8a4a-cba4d35b505d/associations 0.127s 2020-12-14 02:20:08.202 186 DEBUG tempest.lib.common.rest_client [req-a560a8c6-5ecf-4e7e-a89d-171ac502373b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a560a8c6-5ecf-4e7e-a89d-171ac502373b', 'content-length': '24', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a560a8c6-5ecf-4e7e-a89d-171ac502373b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/9466a38f-ee02-4d11-8a4a-cba4d35b505d/associations'} Body: b'{"qos_associations": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:08.289 186 INFO tempest.lib.common.rest_client [req-d76dcfd8-aedf-4d7d-973b-0ec7b350a565 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/9466a38f-ee02-4d11-8a4a-cba4d35b505d/disassociate?vol_type_id=9c5b2629-20d3-453c-afd9-abd9df28284b 0.055s 2020-12-14 02:20:08.292 186 DEBUG tempest.lib.common.rest_client [req-d76dcfd8-aedf-4d7d-973b-0ec7b350a565 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d76dcfd8-aedf-4d7d-973b-0ec7b350a565', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/9466a38f-ee02-4d11-8a4a-cba4d35b505d/disassociate?vol_type_id=9c5b2629-20d3-453c-afd9-abd9df28284b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:08.371 186 INFO tempest.lib.common.rest_client [req-e4344535-cfff-43c4-92b7-d246e04f9e0f ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/9466a38f-ee02-4d11-8a4a-cba4d35b505d?force=False 0.072s 2020-12-14 02:20:08.375 186 DEBUG tempest.lib.common.rest_client [req-e4344535-cfff-43c4-92b7-d246e04f9e0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e4344535-cfff-43c4-92b7-d246e04f9e0f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/9466a38f-ee02-4d11-8a4a-cba4d35b505d?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:08.390 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:08.407 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:update, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:08.448 186 INFO tempest.lib.common.rest_client [req-e1bbaa50-c204-4f45-81d2-502c2c20eaad ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 200 POST http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs 0.035s 2020-12-14 02:20:08.451 186 DEBUG tempest.lib.common.rest_client [req-e1bbaa50-c204-4f45-81d2-502c2c20eaad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-820749826", "consumer": "front-end"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e1bbaa50-c204-4f45-81d2-502c2c20eaad', 'content-length': '440', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e1bbaa50-c204-4f45-81d2-502c2c20eaad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs'} Body: b'{"qos_specs": {"id": "ce78e844-7031-46d4-b7a2-bdcb19295c1a", "name": "tempest-VolumeQOSV3RbacTest-QoS-820749826", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/ce78e844-7031-46d4-b7a2-bdcb19295c1a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/97ddab75898941e4a1a6dfb868f86011/qos-specs/ce78e844-7031-46d4-b7a2-bdcb19295c1a"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:08.538 186 INFO tempest.lib.common.rest_client [req-6aaa1ba3-46ba-4009-9827-60b262bbd217 ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 200 POST http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types 0.055s 2020-12-14 02:20:08.542 186 DEBUG tempest.lib.common.rest_client [req-6aaa1ba3-46ba-4009-9827-60b262bbd217 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeQOSV3RbacTest-volume-type-149179374"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6aaa1ba3-46ba-4009-9827-60b262bbd217', 'content-length': '224', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6aaa1ba3-46ba-4009-9827-60b262bbd217', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types'} Body: b'{"volume_type": {"id": "0aca4be4-bc72-408d-a82e-d49836941649", "name": "tempest-VolumeQOSV3RbacTest-volume-type-149179374", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:08.628 186 INFO tempest.lib.common.rest_client [req-3e2b834e-785c-4f8a-b47c-1f6155251b5c ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 202 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/ce78e844-7031-46d4-b7a2-bdcb19295c1a/associate?vol_type_id=0aca4be4-bc72-408d-a82e-d49836941649 0.062s 2020-12-14 02:20:08.631 186 DEBUG tempest.lib.common.rest_client [req-3e2b834e-785c-4f8a-b47c-1f6155251b5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3e2b834e-785c-4f8a-b47c-1f6155251b5c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/ce78e844-7031-46d4-b7a2-bdcb19295c1a/associate?vol_type_id=0aca4be4-bc72-408d-a82e-d49836941649'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:08.634 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:08.701 186 INFO tempest.lib.common.rest_client [req-76052c95-24b1-475e-b8b7-cbc7dde2458b ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.059s 2020-12-14 02:20:08.704 186 DEBUG tempest.lib.common.rest_client [req-76052c95-24b1-475e-b8b7-cbc7dde2458b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76052c95-24b1-475e-b8b7-cbc7dde2458b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:08.749 186 INFO tempest.lib.common.rest_client [req-da02fd9b-706d-4e8b-a5fb-ebc43aa16582 ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:20:08.752 186 DEBUG tempest.lib.common.rest_client [req-da02fd9b-706d-4e8b-a5fb-ebc43aa16582 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da02fd9b-706d-4e8b-a5fb-ebc43aa16582', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["3j25YS_6QE-szxmASHkW_A"], "expires_at": "2020-12-14T03:20:08.000000Z", "issued_at": "2020-12-14T02:20:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:08.775 193 INFO tempest.lib.common.rest_client [req-f926c131-64ce-4269-bb9e-56ec8ce47dc9 ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee 0.040s 2020-12-14 02:20:08.778 193 DEBUG tempest.lib.common.rest_client [req-f926c131-64ce-4269-bb9e-56ec8ce47dc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f926c131-64ce-4269-bb9e-56ec8ce47dc9', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f926c131-64ce-4269-bb9e-56ec8ce47dc9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee'} Body: b'{"backup": {"id": "2d764829-8184-42a9-8a61-4d07717fdcee", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:08.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1072014888", "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:06.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:08.830 193 INFO tempest.common.waiters [-] backup 2d764829-8184-42a9-8a61-4d07717fdcee reached available after waiting for 2.829858 seconds 2020-12-14 02:20:08.877 189 INFO tempest.lib.common.rest_client [req-8d5a668d-6bae-49dd-9a89-4df04c87fb79 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.256s 2020-12-14 02:20:08.882 189 DEBUG tempest.lib.common.rest_client [req-8d5a668d-6bae-49dd-9a89-4df04c87fb79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8d5a668d-6bae-49dd-9a89-4df04c87fb79', 'x-compute-request-id': 'req-8d5a668d-6bae-49dd-9a89-4df04c87fb79', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:08.895 186 INFO tempest.lib.common.rest_client [req-699d7439-1c9a-40f4-83e5-7ee042b3d9f7 ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 202 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/ce78e844-7031-46d4-b7a2-bdcb19295c1a/disassociate?vol_type_id=0aca4be4-bc72-408d-a82e-d49836941649 0.135s 2020-12-14 02:20:08.898 186 DEBUG tempest.lib.common.rest_client [req-699d7439-1c9a-40f4-83e5-7ee042b3d9f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-699d7439-1c9a-40f4-83e5-7ee042b3d9f7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/ce78e844-7031-46d4-b7a2-bdcb19295c1a/disassociate?vol_type_id=0aca4be4-bc72-408d-a82e-d49836941649'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:08.901 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:08.921 193 INFO tempest.lib.common.rest_client [req-3df0d587-0995-4a04-801f-af4003b45aec ] Request (VolumesBackupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821 0.086s 2020-12-14 02:20:08.924 193 DEBUG tempest.lib.common.rest_client [req-3df0d587-0995-4a04-801f-af4003b45aec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3df0d587-0995-4a04-801f-af4003b45aec', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3df0d587-0995-4a04-801f-af4003b45aec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821'} Body: b'{"volume": {"id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:08.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-1478667370", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}], "user_id": "690e42d9412443b5a57db3b4600b742d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "f10b46c459c54d6d96bcedc01e4f091f"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:08.982 186 INFO tempest.lib.common.rest_client [req-eb34243c-1364-43a2-81bd-dad324a778fe ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.075s 2020-12-14 02:20:08.985 186 DEBUG tempest.lib.common.rest_client [req-eb34243c-1364-43a2-81bd-dad324a778fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb34243c-1364-43a2-81bd-dad324a778fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.020 193 INFO tempest.common.waiters [-] volume 10f94d47-2015-4501-bbdd-1535ba5f2821 reached available after waiting for 0.019842 seconds 2020-12-14 02:20:09.025 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:09.040 186 INFO tempest.lib.common.rest_client [req-82922e89-a76c-42d7-9fae-b9837bb0047e ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:20:09.045 186 DEBUG tempest.lib.common.rest_client [req-82922e89-a76c-42d7-9fae-b9837bb0047e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-82922e89-a76c-42d7-9fae-b9837bb0047e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["NCZ_ds3yT5m-SPatOjT4Lw"], "expires_at": "2020-12-14T03:20:09.000000Z", "issued_at": "2020-12-14T02:20:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.046 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:create, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:09.050 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:09.128 193 INFO tempest.lib.common.rest_client [req-f5586a59-52c4-4009-bbde-c1b9d14591db ] Request (VolumesBackupsV3RbacTest:test_create_backup): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.071s 2020-12-14 02:20:09.131 193 DEBUG tempest.lib.common.rest_client [req-f5586a59-52c4-4009-bbde-c1b9d14591db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f5586a59-52c4-4009-bbde-c1b9d14591db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.164 186 INFO tempest.lib.common.rest_client [req-d399a5fa-9e81-4780-a025-4f2d78076461 ] Request (VolumeQOSV3RbacTest:test_disassociate_qos): 200 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/ce78e844-7031-46d4-b7a2-bdcb19295c1a/associations 0.112s 2020-12-14 02:20:09.168 186 DEBUG tempest.lib.common.rest_client [req-d399a5fa-9e81-4780-a025-4f2d78076461 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d399a5fa-9e81-4780-a025-4f2d78076461', 'content-length': '24', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d399a5fa-9e81-4780-a025-4f2d78076461', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/ce78e844-7031-46d4-b7a2-bdcb19295c1a/associations'} Body: b'{"qos_associations": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.190 193 INFO tempest.lib.common.rest_client [req-82ac3be4-c4f7-4c00-be0e-0b5f48269033 ] Request (VolumesBackupsV3RbacTest:test_create_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:20:09.194 193 DEBUG tempest.lib.common.rest_client [req-82ac3be4-c4f7-4c00-be0e-0b5f48269033 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-82ac3be4-c4f7-4c00-be0e-0b5f48269033', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["flq3hDlqQgKsFzOusT_t3A"], "expires_at": "2020-12-14T03:20:09.000000Z", "issued_at": "2020-12-14T02:20:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.245 186 INFO tempest.lib.common.rest_client [req-4c36bc43-47ca-4aed-85f7-86fdd4a3b3ae ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/ce78e844-7031-46d4-b7a2-bdcb19295c1a/disassociate?vol_type_id=0aca4be4-bc72-408d-a82e-d49836941649 0.053s 2020-12-14 02:20:09.248 186 DEBUG tempest.lib.common.rest_client [req-4c36bc43-47ca-4aed-85f7-86fdd4a3b3ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4c36bc43-47ca-4aed-85f7-86fdd4a3b3ae', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/ce78e844-7031-46d4-b7a2-bdcb19295c1a/disassociate?vol_type_id=0aca4be4-bc72-408d-a82e-d49836941649'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.259 197 INFO tempest.lib.common.rest_client [req-9da1526c-b815-41ff-a2e7-813dc03bf85e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.213s 2020-12-14 02:20:09.263 197 DEBUG tempest.lib.common.rest_client [req-9da1526c-b815-41ff-a2e7-813dc03bf85e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9da1526c-b815-41ff-a2e7-813dc03bf85e', 'x-compute-request-id': 'req-9da1526c-b815-41ff-a2e7-813dc03bf85e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.331 186 INFO tempest.lib.common.rest_client [req-e43c0d97-2dec-42a9-8dbc-528bbbb38e36 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/ce78e844-7031-46d4-b7a2-bdcb19295c1a?force=False 0.073s 2020-12-14 02:20:09.335 186 DEBUG tempest.lib.common.rest_client [req-e43c0d97-2dec-42a9-8dbc-528bbbb38e36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e43c0d97-2dec-42a9-8dbc-528bbbb38e36', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/ce78e844-7031-46d4-b7a2-bdcb19295c1a?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.355 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:09.379 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:get_all, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:09.426 186 INFO tempest.lib.common.rest_client [req-d7248668-827a-4f3c-bf90-c45e504ad43a ] Request (VolumeQOSV3RbacTest:test_get_association_qos): 200 POST http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs 0.042s 2020-12-14 02:20:09.428 186 DEBUG tempest.lib.common.rest_client [req-d7248668-827a-4f3c-bf90-c45e504ad43a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-539164263", "consumer": "front-end"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d7248668-827a-4f3c-bf90-c45e504ad43a', 'content-length': '440', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d7248668-827a-4f3c-bf90-c45e504ad43a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs'} Body: b'{"qos_specs": {"id": "1d4abf27-5328-48a5-b2da-e18d3e89d10e", "name": "tempest-VolumeQOSV3RbacTest-QoS-539164263", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/1d4abf27-5328-48a5-b2da-e18d3e89d10e"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/97ddab75898941e4a1a6dfb868f86011/qos-specs/1d4abf27-5328-48a5-b2da-e18d3e89d10e"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.438 193 INFO tempest.lib.common.rest_client [req-ff43c64b-153b-4ee5-9406-7d3a96fabb63 ] Request (VolumesBackupsV3RbacTest:test_create_backup): 202 POST http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups 0.236s 2020-12-14 02:20:09.442 193 DEBUG tempest.lib.common.rest_client [req-ff43c64b-153b-4ee5-9406-7d3a96fabb63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"backup": {"volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1944274738"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ff43c64b-153b-4ee5-9406-7d3a96fabb63', 'content-length': '404', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ff43c64b-153b-4ee5-9406-7d3a96fabb63', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups'} Body: b'{"backup": {"id": "7baa0c43-af5b-4733-b22a-0498b23892cb", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1944274738", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/7baa0c43-af5b-4733-b22a-0498b23892cb"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/7baa0c43-af5b-4733-b22a-0498b23892cb"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.468 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:09.522 186 INFO tempest.lib.common.rest_client [req-a726cf49-5b63-451e-badb-b1784a8da7c1 ] Request (VolumeQOSV3RbacTest:test_get_association_qos): 200 POST http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types 0.069s 2020-12-14 02:20:09.527 186 DEBUG tempest.lib.common.rest_client [req-a726cf49-5b63-451e-badb-b1784a8da7c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeQOSV3RbacTest-volume-type-1915593946"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a726cf49-5b63-451e-badb-b1784a8da7c1', 'content-length': '225', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a726cf49-5b63-451e-badb-b1784a8da7c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types'} Body: b'{"volume_type": {"id": "cc0ae3b8-7a32-4f0a-8542-1f345635a6c3", "name": "tempest-VolumeQOSV3RbacTest-volume-type-1915593946", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.548 193 INFO tempest.lib.common.rest_client [req-d9bc86e9-aa2e-4f29-b1c0-ca4609350bd7 ] Request (VolumesBackupsV3RbacTest:test_create_backup): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.073s 2020-12-14 02:20:09.551 193 DEBUG tempest.lib.common.rest_client [req-d9bc86e9-aa2e-4f29-b1c0-ca4609350bd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9bc86e9-aa2e-4f29-b1c0-ca4609350bd7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.604 193 INFO tempest.lib.common.rest_client [req-d4f5cb16-f052-443f-b9d3-6573c3f32144 ] Request (VolumesBackupsV3RbacTest:test_create_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:20:09.609 193 DEBUG tempest.lib.common.rest_client [req-d4f5cb16-f052-443f-b9d3-6573c3f32144 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4f5cb16-f052-443f-b9d3-6573c3f32144', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["_etilTX6QLOmaWa7fUaYng"], "expires_at": "2020-12-14T03:20:09.000000Z", "issued_at": "2020-12-14T02:20:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.625 186 INFO tempest.lib.common.rest_client [req-028f8928-b2d0-4380-bc89-19aa64c132a0 ] Request (VolumeQOSV3RbacTest:test_get_association_qos): 202 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/1d4abf27-5328-48a5-b2da-e18d3e89d10e/associate?vol_type_id=cc0ae3b8-7a32-4f0a-8542-1f345635a6c3 0.078s 2020-12-14 02:20:09.628 186 DEBUG tempest.lib.common.rest_client [req-028f8928-b2d0-4380-bc89-19aa64c132a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-028f8928-b2d0-4380-bc89-19aa64c132a0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/1d4abf27-5328-48a5-b2da-e18d3e89d10e/associate?vol_type_id=cc0ae3b8-7a32-4f0a-8542-1f345635a6c3'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.631 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:09.702 186 INFO tempest.lib.common.rest_client [req-05f64052-4eeb-4e18-895f-9164bba5183e ] Request (VolumeQOSV3RbacTest:test_get_association_qos): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.065s 2020-12-14 02:20:09.705 186 DEBUG tempest.lib.common.rest_client [req-05f64052-4eeb-4e18-895f-9164bba5183e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05f64052-4eeb-4e18-895f-9164bba5183e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.709 193 INFO tempest.lib.common.rest_client [req-d7e42ba6-e04c-4ef5-b51b-429f7e2ddf3f ] Request (VolumesBackupsV3RbacTest:test_create_backup): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/7baa0c43-af5b-4733-b22a-0498b23892cb 0.092s 2020-12-14 02:20:09.713 193 DEBUG tempest.lib.common.rest_client [req-d7e42ba6-e04c-4ef5-b51b-429f7e2ddf3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d7e42ba6-e04c-4ef5-b51b-429f7e2ddf3f', 'content-length': '811', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d7e42ba6-e04c-4ef5-b51b-429f7e2ddf3f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/7baa0c43-af5b-4733-b22a-0498b23892cb'} Body: b'{"backup": {"id": "7baa0c43-af5b-4733-b22a-0498b23892cb", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": null, "created_at": "2020-12-14T02:20:09.000000", "updated_at": "2020-12-14T02:20:10.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1944274738", "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/7baa0c43-af5b-4733-b22a-0498b23892cb"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/7baa0c43-af5b-4733-b22a-0498b23892cb"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:09.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.760 186 INFO tempest.lib.common.rest_client [req-22ce73a1-b560-4f00-b77a-0963efb983b9 ] Request (VolumeQOSV3RbacTest:test_get_association_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:20:09.763 186 DEBUG tempest.lib.common.rest_client [req-22ce73a1-b560-4f00-b77a-0963efb983b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-22ce73a1-b560-4f00-b77a-0963efb983b9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["H1-75e6IQY2Pc2AgmbkQXg"], "expires_at": "2020-12-14T03:20:09.000000Z", "issued_at": "2020-12-14T02:20:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.871 186 INFO tempest.lib.common.rest_client [req-785dd83e-6ee7-4740-872a-0450a82f6fa5 ] Request (VolumeQOSV3RbacTest:test_get_association_qos): 200 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/1d4abf27-5328-48a5-b2da-e18d3e89d10e/associations 0.102s 2020-12-14 02:20:09.874 186 DEBUG tempest.lib.common.rest_client [req-785dd83e-6ee7-4740-872a-0450a82f6fa5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-785dd83e-6ee7-4740-872a-0450a82f6fa5', 'content-length': '167', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-785dd83e-6ee7-4740-872a-0450a82f6fa5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/1d4abf27-5328-48a5-b2da-e18d3e89d10e/associations'} Body: b'{"qos_associations": [{"association_type": "volume_type", "name": "tempest-VolumeQOSV3RbacTest-volume-type-1915593946", "id": "cc0ae3b8-7a32-4f0a-8542-1f345635a6c3"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:09.891 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:09.958 186 INFO tempest.lib.common.rest_client [req-527fefb9-a014-44dd-ac2a-91cbdbfcef5b ] Request (VolumeQOSV3RbacTest:test_get_association_qos): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.061s 2020-12-14 02:20:09.961 186 DEBUG tempest.lib.common.rest_client [req-527fefb9-a014-44dd-ac2a-91cbdbfcef5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-527fefb9-a014-44dd-ac2a-91cbdbfcef5b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:10.018 186 INFO tempest.lib.common.rest_client [req-32930e41-e8ae-4604-8058-50794641d927 ] Request (VolumeQOSV3RbacTest:test_get_association_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:20:10.022 186 DEBUG tempest.lib.common.rest_client [req-32930e41-e8ae-4604-8058-50794641d927 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32930e41-e8ae-4604-8058-50794641d927', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["yKipHh6aR3WjT4Zpv1_SPw"], "expires_at": "2020-12-14T03:20:09.000000Z", "issued_at": "2020-12-14T02:20:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:10.156 186 INFO tempest.lib.common.rest_client [req-d88b7372-15b2-4e6d-a7af-51604fdb54b8 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/1d4abf27-5328-48a5-b2da-e18d3e89d10e/disassociate?vol_type_id=cc0ae3b8-7a32-4f0a-8542-1f345635a6c3 0.125s 2020-12-14 02:20:10.159 186 DEBUG tempest.lib.common.rest_client [req-d88b7372-15b2-4e6d-a7af-51604fdb54b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d88b7372-15b2-4e6d-a7af-51604fdb54b8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/1d4abf27-5328-48a5-b2da-e18d3e89d10e/disassociate?vol_type_id=cc0ae3b8-7a32-4f0a-8542-1f345635a6c3'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:10.220 186 INFO tempest.lib.common.rest_client [req-dc08be25-b4a8-45ab-9af5-cca15bb9ce4d ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/1d4abf27-5328-48a5-b2da-e18d3e89d10e?force=False 0.054s 2020-12-14 02:20:10.224 186 DEBUG tempest.lib.common.rest_client [req-dc08be25-b4a8-45ab-9af5-cca15bb9ce4d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-dc08be25-b4a8-45ab-9af5-cca15bb9ce4d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/1d4abf27-5328-48a5-b2da-e18d3e89d10e?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:10.236 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:10.244 189 INFO tempest.lib.common.rest_client [req-7e2c8830-ed45-4d5d-9d68-46111904ceee ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.235s 2020-12-14 02:20:10.248 189 DEBUG tempest.lib.common.rest_client [req-7e2c8830-ed45-4d5d-9d68-46111904ceee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7e2c8830-ed45-4d5d-9d68-46111904ceee', 'x-compute-request-id': 'req-7e2c8830-ed45-4d5d-9d68-46111904ceee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:10.254 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:get_all, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:10.257 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:10.337 186 INFO tempest.lib.common.rest_client [req-cae65c8c-9a82-4881-bec2-c2508643cc33 ] Request (VolumeQOSV3RbacTest:test_list_qos): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.073s 2020-12-14 02:20:10.341 186 DEBUG tempest.lib.common.rest_client [req-cae65c8c-9a82-4881-bec2-c2508643cc33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cae65c8c-9a82-4881-bec2-c2508643cc33', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:10.394 186 INFO tempest.lib.common.rest_client [req-824f869d-b5fa-4ef7-b2c5-0a8c0d8bd083 ] Request (VolumeQOSV3RbacTest:test_list_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:20:10.397 186 DEBUG tempest.lib.common.rest_client [req-824f869d-b5fa-4ef7-b2c5-0a8c0d8bd083 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-824f869d-b5fa-4ef7-b2c5-0a8c0d8bd083', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["73I3kUJpSkylmHakqvUCMw"], "expires_at": "2020-12-14T03:20:10.000000Z", "issued_at": "2020-12-14T02:20:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:10.497 186 INFO tempest.lib.common.rest_client [req-f1e50baa-3914-49ad-ba5b-97773f6d2104 ] Request (VolumeQOSV3RbacTest:test_list_qos): 200 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs 0.092s 2020-12-14 02:20:10.501 186 DEBUG tempest.lib.common.rest_client [req-f1e50baa-3914-49ad-ba5b-97773f6d2104 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f1e50baa-3914-49ad-ba5b-97773f6d2104', 'content-length': '17', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f1e50baa-3914-49ad-ba5b-97773f6d2104', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs'} Body: b'{"qos_specs": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:10.518 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:10.578 186 INFO tempest.lib.common.rest_client [req-efa3ea02-af33-4180-bd89-13aabe07ef72 ] Request (VolumeQOSV3RbacTest:test_list_qos): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.055s 2020-12-14 02:20:10.581 186 DEBUG tempest.lib.common.rest_client [req-efa3ea02-af33-4180-bd89-13aabe07ef72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-efa3ea02-af33-4180-bd89-13aabe07ef72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:10.630 197 INFO tempest.lib.common.rest_client [req-6f99463a-e739-4f08-9b37-ea50f5d5a2b1 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.235s 2020-12-14 02:20:10.631 186 INFO tempest.lib.common.rest_client [req-a2bc528d-5fb4-404c-acaa-a80da30e2971 ] Request (VolumeQOSV3RbacTest:test_list_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:20:10.634 197 DEBUG tempest.lib.common.rest_client [req-6f99463a-e739-4f08-9b37-ea50f5d5a2b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6f99463a-e739-4f08-9b37-ea50f5d5a2b1', 'x-compute-request-id': 'req-6f99463a-e739-4f08-9b37-ea50f5d5a2b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:10.635 186 DEBUG tempest.lib.common.rest_client [req-a2bc528d-5fb4-404c-acaa-a80da30e2971 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2bc528d-5fb4-404c-acaa-a80da30e2971', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["4i29aCNxTAev35U5turGHg"], "expires_at": "2020-12-14T03:20:10.000000Z", "issued_at": "2020-12-14T02:20:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:10.646 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:10.660 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:update, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:10.746 186 INFO tempest.lib.common.rest_client [req-9b2de07a-d12c-4bf7-9b57-112624be78c2 ] Request (VolumeQOSV3RbacTest:test_set_qos_key): 200 POST http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs 0.082s 2020-12-14 02:20:10.749 186 DEBUG tempest.lib.common.rest_client [req-9b2de07a-d12c-4bf7-9b57-112624be78c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-1708014982", "consumer": "front-end"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9b2de07a-d12c-4bf7-9b57-112624be78c2', 'content-length': '441', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9b2de07a-d12c-4bf7-9b57-112624be78c2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs'} Body: b'{"qos_specs": {"id": "1923f3f2-14de-45b6-a99f-616c7ada0baf", "name": "tempest-VolumeQOSV3RbacTest-QoS-1708014982", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/1923f3f2-14de-45b6-a99f-616c7ada0baf"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/97ddab75898941e4a1a6dfb868f86011/qos-specs/1923f3f2-14de-45b6-a99f-616c7ada0baf"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:10.772 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:10.821 193 INFO tempest.lib.common.rest_client [req-475fe3de-8d88-4008-8c6a-32b60c563534 ] Request (VolumesBackupsV3RbacTest:test_create_backup): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/7baa0c43-af5b-4733-b22a-0498b23892cb 0.052s 2020-12-14 02:20:10.824 193 DEBUG tempest.lib.common.rest_client [req-475fe3de-8d88-4008-8c6a-32b60c563534 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-475fe3de-8d88-4008-8c6a-32b60c563534', 'content-length': '816', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-475fe3de-8d88-4008-8c6a-32b60c563534', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/7baa0c43-af5b-4733-b22a-0498b23892cb'} Body: b'{"backup": {"id": "7baa0c43-af5b-4733-b22a-0498b23892cb", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:20:09.000000", "updated_at": "2020-12-14T02:20:10.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1944274738", "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/7baa0c43-af5b-4733-b22a-0498b23892cb"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/7baa0c43-af5b-4733-b22a-0498b23892cb"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:09.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:10.864 186 INFO tempest.lib.common.rest_client [req-e7370f44-1d46-4659-a26d-0562914bfd01 ] Request (VolumeQOSV3RbacTest:test_set_qos_key): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.087s 2020-12-14 02:20:10.867 186 DEBUG tempest.lib.common.rest_client [req-e7370f44-1d46-4659-a26d-0562914bfd01 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7370f44-1d46-4659-a26d-0562914bfd01', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:10.916 186 INFO tempest.lib.common.rest_client [req-884e9c7c-12a9-433a-a8fc-646ac10fdc27 ] Request (VolumeQOSV3RbacTest:test_set_qos_key): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:20:10.919 186 DEBUG tempest.lib.common.rest_client [req-884e9c7c-12a9-433a-a8fc-646ac10fdc27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-884e9c7c-12a9-433a-a8fc-646ac10fdc27', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["WxjnPqzQRE6kI6_ytBfGvg"], "expires_at": "2020-12-14T03:20:10.000000Z", "issued_at": "2020-12-14T02:20:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:11.025 186 INFO tempest.lib.common.rest_client [req-50789371-509e-4d02-8995-96c3b259b15e ] Request (VolumeQOSV3RbacTest:test_set_qos_key): 200 PUT http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/1923f3f2-14de-45b6-a99f-616c7ada0baf 0.098s 2020-12-14 02:20:11.027 186 DEBUG tempest.lib.common.rest_client [req-50789371-509e-4d02-8995-96c3b259b15e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"iops_bytes": "500"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-50789371-509e-4d02-8995-96c3b259b15e', 'content-length': '36', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-50789371-509e-4d02-8995-96c3b259b15e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/1923f3f2-14de-45b6-a99f-616c7ada0baf'} Body: b'{"qos_specs": {"iops_bytes": "500"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:11.040 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:11.103 186 INFO tempest.lib.common.rest_client [req-2ea80bbf-162c-4d91-906e-47e56f6f8e51 ] Request (VolumeQOSV3RbacTest:test_set_qos_key): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.058s 2020-12-14 02:20:11.106 186 DEBUG tempest.lib.common.rest_client [req-2ea80bbf-162c-4d91-906e-47e56f6f8e51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ea80bbf-162c-4d91-906e-47e56f6f8e51', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:11.155 186 INFO tempest.lib.common.rest_client [req-e1b60ba5-3e50-4172-a7a9-da253d4ebc9d ] Request (VolumeQOSV3RbacTest:test_set_qos_key): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:20:11.158 186 DEBUG tempest.lib.common.rest_client [req-e1b60ba5-3e50-4172-a7a9-da253d4ebc9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1b60ba5-3e50-4172-a7a9-da253d4ebc9d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["Tv5aGTIiR9ypTS7t0drD6A"], "expires_at": "2020-12-14T03:20:11.000000Z", "issued_at": "2020-12-14T02:20:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:11.275 186 INFO tempest.lib.common.rest_client [req-c50393d6-2357-4b80-9777-63539c3898b9 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/1923f3f2-14de-45b6-a99f-616c7ada0baf?force=False 0.107s 2020-12-14 02:20:11.278 186 DEBUG tempest.lib.common.rest_client [req-c50393d6-2357-4b80-9777-63539c3898b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c50393d6-2357-4b80-9777-63539c3898b9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/1923f3f2-14de-45b6-a99f-616c7ada0baf?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:11.290 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:11.309 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:get, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:11.362 186 INFO tempest.lib.common.rest_client [req-1bb35e72-95c7-4db2-af87-23a4ae0932e2 ] Request (VolumeQOSV3RbacTest:test_show_qos): 200 POST http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs 0.046s 2020-12-14 02:20:11.364 186 DEBUG tempest.lib.common.rest_client [req-1bb35e72-95c7-4db2-af87-23a4ae0932e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-227184006", "consumer": "front-end"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1bb35e72-95c7-4db2-af87-23a4ae0932e2', 'content-length': '440', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1bb35e72-95c7-4db2-af87-23a4ae0932e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs'} Body: b'{"qos_specs": {"id": "c9e37ef0-d70b-4e4f-9b1c-769ea61ec25d", "name": "tempest-VolumeQOSV3RbacTest-QoS-227184006", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/c9e37ef0-d70b-4e4f-9b1c-769ea61ec25d"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/97ddab75898941e4a1a6dfb868f86011/qos-specs/c9e37ef0-d70b-4e4f-9b1c-769ea61ec25d"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:11.391 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:11.459 186 INFO tempest.lib.common.rest_client [req-f3e01118-7b51-4e9a-9f21-7a558c309a9f ] Request (VolumeQOSV3RbacTest:test_show_qos): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.061s 2020-12-14 02:20:11.462 186 DEBUG tempest.lib.common.rest_client [req-f3e01118-7b51-4e9a-9f21-7a558c309a9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3e01118-7b51-4e9a-9f21-7a558c309a9f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:11.516 186 INFO tempest.lib.common.rest_client [req-a72d92b6-e3f1-4cff-ac57-472cb692d915 ] Request (VolumeQOSV3RbacTest:test_show_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:20:11.519 186 DEBUG tempest.lib.common.rest_client [req-a72d92b6-e3f1-4cff-ac57-472cb692d915 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a72d92b6-e3f1-4cff-ac57-472cb692d915', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["ePxvAgrVQ_CcA3vC_YutCw"], "expires_at": "2020-12-14T03:20:11.000000Z", "issued_at": "2020-12-14T02:20:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:11.589 189 INFO tempest.lib.common.rest_client [req-0f1a55f5-e9de-4c43-af7e-a3e02574a9fa ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.227s 2020-12-14 02:20:11.591 189 DEBUG tempest.lib.common.rest_client [req-0f1a55f5-e9de-4c43-af7e-a3e02574a9fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0f1a55f5-e9de-4c43-af7e-a3e02574a9fa', 'x-compute-request-id': 'req-0f1a55f5-e9de-4c43-af7e-a3e02574a9fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:11.620 186 INFO tempest.lib.common.rest_client [req-9541ef37-9386-455d-bac5-86d4067806fc ] Request (VolumeQOSV3RbacTest:test_show_qos): 200 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/c9e37ef0-d70b-4e4f-9b1c-769ea61ec25d 0.094s 2020-12-14 02:20:11.624 186 DEBUG tempest.lib.common.rest_client [req-9541ef37-9386-455d-bac5-86d4067806fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9541ef37-9386-455d-bac5-86d4067806fc', 'content-length': '440', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9541ef37-9386-455d-bac5-86d4067806fc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/c9e37ef0-d70b-4e4f-9b1c-769ea61ec25d'} Body: b'{"qos_specs": {"id": "c9e37ef0-d70b-4e4f-9b1c-769ea61ec25d", "name": "tempest-VolumeQOSV3RbacTest-QoS-227184006", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/c9e37ef0-d70b-4e4f-9b1c-769ea61ec25d"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/97ddab75898941e4a1a6dfb868f86011/qos-specs/c9e37ef0-d70b-4e4f-9b1c-769ea61ec25d"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:11.650 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:11.715 186 INFO tempest.lib.common.rest_client [req-47234fcc-8bc8-42dc-adef-386cab6f41f5 ] Request (VolumeQOSV3RbacTest:test_show_qos): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.059s 2020-12-14 02:20:11.719 186 DEBUG tempest.lib.common.rest_client [req-47234fcc-8bc8-42dc-adef-386cab6f41f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47234fcc-8bc8-42dc-adef-386cab6f41f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:11.772 186 INFO tempest.lib.common.rest_client [req-81f83e8a-8617-4340-8f56-76cc0180788b ] Request (VolumeQOSV3RbacTest:test_show_qos): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:20:11.777 186 DEBUG tempest.lib.common.rest_client [req-81f83e8a-8617-4340-8f56-76cc0180788b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81f83e8a-8617-4340-8f56-76cc0180788b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["snrR32aJTDG3QbTDnIu-Ig"], "expires_at": "2020-12-14T03:20:11.000000Z", "issued_at": "2020-12-14T02:20:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:11.908 186 INFO tempest.lib.common.rest_client [req-9b800b06-c835-4b12-ac84-9122eee681d7 ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/c9e37ef0-d70b-4e4f-9b1c-769ea61ec25d?force=False 0.118s 2020-12-14 02:20:11.911 186 DEBUG tempest.lib.common.rest_client [req-9b800b06-c835-4b12-ac84-9122eee681d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9b800b06-c835-4b12-ac84-9122eee681d7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/c9e37ef0-d70b-4e4f-9b1c-769ea61ec25d?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:11.923 193 INFO tempest.lib.common.rest_client [req-264dc4c7-92c9-43dd-be05-a326de063d70 ] Request (VolumesBackupsV3RbacTest:test_create_backup): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/7baa0c43-af5b-4733-b22a-0498b23892cb 0.043s 2020-12-14 02:20:11.925 193 DEBUG tempest.lib.common.rest_client [req-264dc4c7-92c9-43dd-be05-a326de063d70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-264dc4c7-92c9-43dd-be05-a326de063d70', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-264dc4c7-92c9-43dd-be05-a326de063d70', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/7baa0c43-af5b-4733-b22a-0498b23892cb'} Body: b'{"backup": {"id": "7baa0c43-af5b-4733-b22a-0498b23892cb", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:20:09.000000", "updated_at": "2020-12-14T02:20:12.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1944274738", "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/7baa0c43-af5b-4733-b22a-0498b23892cb"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/7baa0c43-af5b-4733-b22a-0498b23892cb"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:09.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:11.926 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:11.945 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:qos_specs_manage:update, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:11.987 186 INFO tempest.lib.common.rest_client [req-111f9157-d99b-44e4-832e-4c1f3e3a0c48 ] Request (VolumeQOSV3RbacTest:test_unset_qos_key): 200 POST http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs 0.036s 2020-12-14 02:20:11.989 186 DEBUG tempest.lib.common.rest_client [req-111f9157-d99b-44e4-832e-4c1f3e3a0c48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"name": "tempest-VolumeQOSV3RbacTest-QoS-778956485", "consumer": "front-end"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-111f9157-d99b-44e4-832e-4c1f3e3a0c48', 'content-length': '440', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-111f9157-d99b-44e4-832e-4c1f3e3a0c48', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs'} Body: b'{"qos_specs": {"id": "310618dc-ec2d-4f2c-8607-077a9f90276f", "name": "tempest-VolumeQOSV3RbacTest-QoS-778956485", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/310618dc-ec2d-4f2c-8607-077a9f90276f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/97ddab75898941e4a1a6dfb868f86011/qos-specs/310618dc-ec2d-4f2c-8607-077a9f90276f"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:11.990 197 INFO tempest.lib.common.rest_client [req-d0d1885d-5016-4158-b48a-99f3a307ebb9 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.247s 2020-12-14 02:20:11.994 197 DEBUG tempest.lib.common.rest_client [req-d0d1885d-5016-4158-b48a-99f3a307ebb9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d0d1885d-5016-4158-b48a-99f3a307ebb9', 'x-compute-request-id': 'req-d0d1885d-5016-4158-b48a-99f3a307ebb9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.005 193 INFO tempest.common.waiters [-] backup 7baa0c43-af5b-4733-b22a-0498b23892cb reached available after waiting for 3.004831 seconds 2020-12-14 02:20:12.065 186 INFO tempest.lib.common.rest_client [req-0f2eb073-d80d-4a2d-82b0-a5050c0cd495 ] Request (VolumeQOSV3RbacTest:test_unset_qos_key): 200 PUT http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/310618dc-ec2d-4f2c-8607-077a9f90276f 0.046s 2020-12-14 02:20:12.068 186 DEBUG tempest.lib.common.rest_client [req-0f2eb073-d80d-4a2d-82b0-a5050c0cd495 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"qos_specs": {"iops_bytes": "500"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0f2eb073-d80d-4a2d-82b0-a5050c0cd495', 'content-length': '36', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0f2eb073-d80d-4a2d-82b0-a5050c0cd495', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/310618dc-ec2d-4f2c-8607-077a9f90276f'} Body: b'{"qos_specs": {"iops_bytes": "500"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.082 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:12.096 193 INFO tempest.lib.common.rest_client [req-a9daea60-7334-4063-9e89-c70400859878 ] Request (VolumesBackupsV3RbacTest:test_create_backup): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821 0.083s 2020-12-14 02:20:12.100 193 DEBUG tempest.lib.common.rest_client [req-a9daea60-7334-4063-9e89-c70400859878 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a9daea60-7334-4063-9e89-c70400859878', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a9daea60-7334-4063-9e89-c70400859878', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821'} Body: b'{"volume": {"id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:12.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-1478667370", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}], "user_id": "690e42d9412443b5a57db3b4600b742d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "f10b46c459c54d6d96bcedc01e4f091f"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.151 186 INFO tempest.lib.common.rest_client [req-1cb2e8c1-bf21-4d9d-8c26-01eeab23577c ] Request (VolumeQOSV3RbacTest:test_unset_qos_key): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.063s 2020-12-14 02:20:12.155 186 DEBUG tempest.lib.common.rest_client [req-1cb2e8c1-bf21-4d9d-8c26-01eeab23577c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1cb2e8c1-bf21-4d9d-8c26-01eeab23577c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.193 193 INFO tempest.common.waiters [-] volume 10f94d47-2015-4501-bbdd-1535ba5f2821 reached available after waiting for 0.193609 seconds 2020-12-14 02:20:12.208 186 INFO tempest.lib.common.rest_client [req-31dcd99f-5f1c-4956-971a-c5405fb2f732 ] Request (VolumeQOSV3RbacTest:test_unset_qos_key): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:20:12.212 186 DEBUG tempest.lib.common.rest_client [req-31dcd99f-5f1c-4956-971a-c5405fb2f732 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31dcd99f-5f1c-4956-971a-c5405fb2f732', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["DUubj10RQKm_hJA3XZ71vg"], "expires_at": "2020-12-14T03:20:12.000000Z", "issued_at": "2020-12-14T02:20:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.269 193 INFO tempest.lib.common.rest_client [req-e3160884-3db5-4697-bbbd-d40967727b25 ] Request (VolumesBackupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/7baa0c43-af5b-4733-b22a-0498b23892cb 0.068s 2020-12-14 02:20:12.272 193 DEBUG tempest.lib.common.rest_client [req-e3160884-3db5-4697-bbbd-d40967727b25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-e3160884-3db5-4697-bbbd-d40967727b25', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e3160884-3db5-4697-bbbd-d40967727b25', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/7baa0c43-af5b-4733-b22a-0498b23892cb'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.285 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:12.303 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:12.324 186 INFO tempest.lib.common.rest_client [req-4be88bdc-1dad-4117-87ff-881b796cd18f ] Request (VolumeQOSV3RbacTest:test_unset_qos_key): 202 PUT http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/310618dc-ec2d-4f2c-8607-077a9f90276f/delete_keys 0.103s 2020-12-14 02:20:12.327 186 DEBUG tempest.lib.common.rest_client [req-4be88bdc-1dad-4117-87ff-881b796cd18f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"keys": ["iops_bytes"]} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4be88bdc-1dad-4117-87ff-881b796cd18f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/310618dc-ec2d-4f2c-8607-077a9f90276f/delete_keys'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.329 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:12.395 186 INFO tempest.lib.common.rest_client [req-ba3e8cb8-49d6-4670-96f0-11bd51da9ed2 ] Request (VolumeQOSV3RbacTest:test_unset_qos_key): 200 GET http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles 0.060s 2020-12-14 02:20:12.398 186 DEBUG tempest.lib.common.rest_client [req-ba3e8cb8-49d6-4670-96f0-11bd51da9ed2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba3e8cb8-49d6-4670-96f0-11bd51da9ed2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011/users/7f7174d9793a4746a3258d04c9821a25/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.458 186 INFO tempest.lib.common.rest_client [req-f8a2b27d-97ef-47e0-8b9d-cd515a115cfb ] Request (VolumeQOSV3RbacTest:test_unset_qos_key): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:20:12.460 186 DEBUG tempest.lib.common.rest_client [req-f8a2b27d-97ef-47e0-8b9d-cd515a115cfb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8a2b27d-97ef-47e0-8b9d-cd515a115cfb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7f7174d9793a4746a3258d04c9821a25", "name": "tempest-VolumeQOSV3RbacTest-2102603755", "password_expires_at": null}, "audit_ids": ["uMxS6hbwSd211lUHW-qz1g"], "expires_at": "2020-12-14T03:20:12.000000Z", "issued_at": "2020-12-14T02:20:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "97ddab75898941e4a1a6dfb868f86011", "name": "tempest-VolumeQOSV3RbacTest-2102603755"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_97ddab75898941e4a1a6dfb868f86011", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.484 193 INFO tempest.lib.common.rest_client [req-20e31b26-51df-4638-922e-a44bb95c17da ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 202 POST http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups 0.175s 2020-12-14 02:20:12.488 193 DEBUG tempest.lib.common.rest_client [req-20e31b26-51df-4638-922e-a44bb95c17da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"backup": {"volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-20e31b26-51df-4638-922e-a44bb95c17da', 'content-length': '356', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-20e31b26-51df-4638-922e-a44bb95c17da', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups'} Body: b'{"backup": {"id": "961bdae3-3113-4745-ba58-448205fc9dad", "name": null, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.556 186 INFO tempest.lib.common.rest_client [req-9794e0c9-db19-4b26-b83d-b6222363a94e ] Request (VolumeQOSV3RbacTest:test_unset_qos_key): 200 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/310618dc-ec2d-4f2c-8607-077a9f90276f 0.088s 2020-12-14 02:20:12.559 186 DEBUG tempest.lib.common.rest_client [req-9794e0c9-db19-4b26-b83d-b6222363a94e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9794e0c9-db19-4b26-b83d-b6222363a94e', 'content-length': '440', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9794e0c9-db19-4b26-b83d-b6222363a94e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/310618dc-ec2d-4f2c-8607-077a9f90276f'} Body: b'{"qos_specs": {"id": "310618dc-ec2d-4f2c-8607-077a9f90276f", "name": "tempest-VolumeQOSV3RbacTest-QoS-778956485", "consumer": "front-end", "specs": {}}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/310618dc-ec2d-4f2c-8607-077a9f90276f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/97ddab75898941e4a1a6dfb868f86011/qos-specs/310618dc-ec2d-4f2c-8607-077a9f90276f"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.581 193 INFO tempest.lib.common.rest_client [req-6aedf0f5-e5c9-4592-90c4-6fa2a7a9c6a7 ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad 0.043s 2020-12-14 02:20:12.584 193 DEBUG tempest.lib.common.rest_client [req-6aedf0f5-e5c9-4592-90c4-6fa2a7a9c6a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6aedf0f5-e5c9-4592-90c4-6fa2a7a9c6a7', 'content-length': '763', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6aedf0f5-e5c9-4592-90c4-6fa2a7a9c6a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad'} Body: b'{"backup": {"id": "961bdae3-3113-4745-ba58-448205fc9dad", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": null, "created_at": "2020-12-14T02:20:12.000000", "updated_at": "2020-12-14T02:20:13.000000", "name": null, "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:12.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.660 186 INFO tempest.lib.common.rest_client [req-14004886-2dea-4657-a71a-d2296a5e081f ] Request (VolumeQOSV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/310618dc-ec2d-4f2c-8607-077a9f90276f?force=False 0.068s 2020-12-14 02:20:12.663 186 DEBUG tempest.lib.common.rest_client [req-14004886-2dea-4657-a71a-d2296a5e081f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-14004886-2dea-4657-a71a-d2296a5e081f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/qos-specs/310618dc-ec2d-4f2c-8607-077a9f90276f?force=False'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.772 186 INFO tempest.lib.common.rest_client [req-8287e0a5-03a6-4be3-81fe-11dee6e16d2d ] Request (VolumeQOSV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types/cc0ae3b8-7a32-4f0a-8542-1f345635a6c3 0.093s 2020-12-14 02:20:12.774 186 DEBUG tempest.lib.common.rest_client [req-8287e0a5-03a6-4be3-81fe-11dee6e16d2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8287e0a5-03a6-4be3-81fe-11dee6e16d2d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types/cc0ae3b8-7a32-4f0a-8542-1f345635a6c3'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.817 186 INFO tempest.lib.common.rest_client [req-904af4b3-54ba-488c-b770-d1a9391b8c64 ] Request (VolumeQOSV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types/cc0ae3b8-7a32-4f0a-8542-1f345635a6c3 0.037s 2020-12-14 02:20:12.820 186 DEBUG tempest.lib.common.rest_client [req-904af4b3-54ba-488c-b770-d1a9391b8c64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-904af4b3-54ba-488c-b770-d1a9391b8c64', 'x-openstack-request-id': 'req-904af4b3-54ba-488c-b770-d1a9391b8c64', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types/cc0ae3b8-7a32-4f0a-8542-1f345635a6c3'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type cc0ae3b8-7a32-4f0a-8542-1f345635a6c3 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.918 186 INFO tempest.lib.common.rest_client [req-f176973d-5850-451f-8b30-3c220b963ba6 ] Request (VolumeQOSV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types/0aca4be4-bc72-408d-a82e-d49836941649 0.091s 2020-12-14 02:20:12.921 186 DEBUG tempest.lib.common.rest_client [req-f176973d-5850-451f-8b30-3c220b963ba6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f176973d-5850-451f-8b30-3c220b963ba6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types/0aca4be4-bc72-408d-a82e-d49836941649'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.922 189 INFO tempest.lib.common.rest_client [req-b4e59fb2-315f-48f7-b8a0-8983666724ea ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.225s 2020-12-14 02:20:12.925 189 DEBUG tempest.lib.common.rest_client [req-b4e59fb2-315f-48f7-b8a0-8983666724ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b4e59fb2-315f-48f7-b8a0-8983666724ea', 'x-compute-request-id': 'req-b4e59fb2-315f-48f7-b8a0-8983666724ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:12.958 186 INFO tempest.lib.common.rest_client [req-3dd6f40f-00e0-484e-8839-e2dc522a4769 ] Request (VolumeQOSV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types/0aca4be4-bc72-408d-a82e-d49836941649 0.031s 2020-12-14 02:20:12.960 186 DEBUG tempest.lib.common.rest_client [req-3dd6f40f-00e0-484e-8839-e2dc522a4769 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-3dd6f40f-00e0-484e-8839-e2dc522a4769', 'x-openstack-request-id': 'req-3dd6f40f-00e0-484e-8839-e2dc522a4769', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types/0aca4be4-bc72-408d-a82e-d49836941649'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 0aca4be4-bc72-408d-a82e-d49836941649 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:13.051 186 INFO tempest.lib.common.rest_client [req-dbe6f212-e45c-49e4-b41c-0c10b8425566 ] Request (VolumeQOSV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types/9c5b2629-20d3-453c-afd9-abd9df28284b 0.085s 2020-12-14 02:20:13.053 186 DEBUG tempest.lib.common.rest_client [req-dbe6f212-e45c-49e4-b41c-0c10b8425566 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-dbe6f212-e45c-49e4-b41c-0c10b8425566', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types/9c5b2629-20d3-453c-afd9-abd9df28284b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:13.090 186 INFO tempest.lib.common.rest_client [req-dc770a08-f7ff-414f-8d26-38f934dea9f1 ] Request (VolumeQOSV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types/9c5b2629-20d3-453c-afd9-abd9df28284b 0.032s 2020-12-14 02:20:13.093 186 DEBUG tempest.lib.common.rest_client [req-dc770a08-f7ff-414f-8d26-38f934dea9f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-dc770a08-f7ff-414f-8d26-38f934dea9f1', 'x-openstack-request-id': 'req-dc770a08-f7ff-414f-8d26-38f934dea9f1', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types/9c5b2629-20d3-453c-afd9-abd9df28284b'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 9c5b2629-20d3-453c-afd9-abd9df28284b could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:13.191 186 INFO tempest.lib.common.rest_client [req-ee0f8e84-db08-493c-aef8-61f738a421e7 ] Request (VolumeQOSV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types/7f3bba2f-9843-4cb9-8d5c-0769e14c346f 0.091s 2020-12-14 02:20:13.194 186 DEBUG tempest.lib.common.rest_client [req-ee0f8e84-db08-493c-aef8-61f738a421e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ee0f8e84-db08-493c-aef8-61f738a421e7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types/7f3bba2f-9843-4cb9-8d5c-0769e14c346f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:13.232 186 INFO tempest.lib.common.rest_client [req-dc956848-930e-4170-afa4-c899f79bfb96 ] Request (VolumeQOSV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types/7f3bba2f-9843-4cb9-8d5c-0769e14c346f 0.031s 2020-12-14 02:20:13.235 186 DEBUG tempest.lib.common.rest_client [req-dc956848-930e-4170-afa4-c899f79bfb96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-dc956848-930e-4170-afa4-c899f79bfb96', 'x-openstack-request-id': 'req-dc956848-930e-4170-afa4-c899f79bfb96', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/97ddab75898941e4a1a6dfb868f86011/types/7f3bba2f-9843-4cb9-8d5c-0769e14c346f'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 7f3bba2f-9843-4cb9-8d5c-0769e14c346f could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:13.339 197 INFO tempest.lib.common.rest_client [req-256612fe-37db-4685-8e3c-d1737fed3af5 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.237s 2020-12-14 02:20:13.344 197 DEBUG tempest.lib.common.rest_client [req-256612fe-37db-4685-8e3c-d1737fed3af5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-256612fe-37db-4685-8e3c-d1737fed3af5', 'x-compute-request-id': 'req-256612fe-37db-4685-8e3c-d1737fed3af5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:13.397 186 INFO tempest.lib.common.rest_client [req-defbf251-4d10-46f0-9b19-895a088046d0 ] Request (VolumeQOSV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/7f7174d9793a4746a3258d04c9821a25 0.155s 2020-12-14 02:20:13.399 186 DEBUG tempest.lib.common.rest_client [req-defbf251-4d10-46f0-9b19-895a088046d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-defbf251-4d10-46f0-9b19-895a088046d0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/7f7174d9793a4746a3258d04c9821a25'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:13.501 186 INFO tempest.lib.common.rest_client [req-ddd0aa70-88f6-460b-bad3-80cada9ba140 ] Request (VolumeQOSV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:20:13.504 186 DEBUG tempest.lib.common.rest_client [req-ddd0aa70-88f6-460b-bad3-80cada9ba140 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ddd0aa70-88f6-460b-bad3-80cada9ba140', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["zj1pnVOKQ_Wa_J60FfbuXg"], "expires_at": "2020-12-14T03:20:13.000000Z", "issued_at": "2020-12-14T02:20:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:13.688 193 INFO tempest.lib.common.rest_client [req-06adbce4-9c0d-429f-95e7-18979b372ccb ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad 0.047s 2020-12-14 02:20:13.691 193 DEBUG tempest.lib.common.rest_client [req-06adbce4-9c0d-429f-95e7-18979b372ccb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-06adbce4-9c0d-429f-95e7-18979b372ccb', 'content-length': '768', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-06adbce4-9c0d-429f-95e7-18979b372ccb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad'} Body: b'{"backup": {"id": "961bdae3-3113-4745-ba58-448205fc9dad", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:20:12.000000", "updated_at": "2020-12-14T02:20:13.000000", "name": null, "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:12.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:13.796 186 INFO tempest.lib.common.rest_client [req-6f663f0d-2406-4c79-8e77-a7a9735518f9 ] Request (VolumeQOSV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=97ddab75898941e4a1a6dfb868f86011&name=default 0.285s 2020-12-14 02:20:13.800 186 DEBUG tempest.lib.common.rest_client [req-6f663f0d-2406-4c79-8e77-a7a9735518f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-6f663f0d-2406-4c79-8e77-a7a9735518f9', 'date': 'Mon, 14 Dec 2020 02:20:13 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=97ddab75898941e4a1a6dfb868f86011&name=default'} Body: b'{"security_groups": [{"id": "a68ac0df-7c43-4713-aa68-4a14b9abd140", "name": "default", "stateful": true, "tenant_id": "97ddab75898941e4a1a6dfb868f86011", "description": "Default security group", "security_group_rules": [{"id": "0ebaf6f9-d42b-4fa0-9431-b1612f010bd8", "tenant_id": "97ddab75898941e4a1a6dfb868f86011", "security_group_id": "a68ac0df-7c43-4713-aa68-4a14b9abd140", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:20:13Z", "updated_at": "2020-12-14T02:20:13Z", "revision_number": 0, "project_id": "97ddab75898941e4a1a6dfb868f86011"}, {"id": "61dce869-52a1-4945-a980-62fbab7e4502", "tenant_id": "97ddab75898941e4a1a6dfb868f86011", "security_group_id": "a68ac0df-7c43-4713-aa68-4a14b9abd140", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a68ac0df-7c43-4713-aa68-4a14b9abd140", "description": null, "tags": [], "created_at": "2020-12-14T02:20:13Z", "updated_at": "2020-12-14T02:20:13Z", "revision_number": 0, "project_id": "97ddab75898941e4a1a6dfb868f86011"}, {"id": "6c3c4dfa-1430-46b1-a0b5-f3635a02ccb7", "tenant_id": "97ddab75898941e4a1a6dfb868f86011", "security_group_id": "a68ac0df-7c43-4713-aa68-4a14b9abd140", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a68ac0df-7c43-4713-aa68-4a14b9abd140", "description": null, "tags": [], "created_at": "2020-12-14T02:20:13Z", "updated_at": "2020-12-14T02:20:13Z", "revision_number": 0, "project_id": "97ddab75898941e4a1a6dfb868f86011"}, {"id": "a4c68fa0-b3b8-4c57-b40b-1b31326168fc", "tenant_id": "97ddab75898941e4a1a6dfb868f86011", "security_group_id": "a68ac0df-7c43-4713-aa68-4a14b9abd140", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:20:13Z", "updated_at": "2020-12-14T02:20:13Z", "revision_number": 0, "project_id": "97ddab75898941e4a1a6dfb868f86011"}], "tags": [], "created_at": "2020-12-14T02:20:13Z", "updated_at": "2020-12-14T02:20:13Z", "revision_number": 1, "project_id": "97ddab75898941e4a1a6dfb868f86011"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:13.968 186 INFO tempest.lib.common.rest_client [req-afcffb47-8e0d-45b3-8a22-034b7bf301be ] Request (VolumeQOSV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/a68ac0df-7c43-4713-aa68-4a14b9abd140 0.161s 2020-12-14 02:20:13.970 186 DEBUG tempest.lib.common.rest_client [req-afcffb47-8e0d-45b3-8a22-034b7bf301be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-afcffb47-8e0d-45b3-8a22-034b7bf301be', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:20:13 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/a68ac0df-7c43-4713-aa68-4a14b9abd140'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:14.124 186 INFO tempest.lib.common.rest_client [req-d7bcd346-3547-4b1a-9114-a0dc1c6685d3 ] Request (VolumeQOSV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011 0.146s 2020-12-14 02:20:14.128 186 DEBUG tempest.lib.common.rest_client [req-d7bcd346-3547-4b1a-9114-a0dc1c6685d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d7bcd346-3547-4b1a-9114-a0dc1c6685d3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/97ddab75898941e4a1a6dfb868f86011'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:14.230 186 INFO tempest.lib.common.rest_client [req-962a8666-73be-446a-b9c5-012734609c42 ] Request (VolumesActionsV312RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-12-14 02:20:14.233 186 DEBUG tempest.lib.common.rest_client [req-962a8666-73be-446a-b9c5-012734609c42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-962a8666-73be-446a-b9c5-012734609c42', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["LCKbnVbgTBKOcdsH0pb07Q"], "expires_at": "2020-12-14T03:20:14.000000Z", "issued_at": "2020-12-14T02:20:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:14.329 186 INFO tempest.lib.common.rest_client [req-83c832a6-a684-41dd-b77c-1a6f527c931e ] Request (VolumesActionsV312RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:20:14.331 186 DEBUG tempest.lib.common.rest_client [req-83c832a6-a684-41dd-b77c-1a6f527c931e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83c832a6-a684-41dd-b77c-1a6f527c931e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["CES6xbUTQLuUB9TI-wK1fg"], "expires_at": "2020-12-14T03:20:14.000000Z", "issued_at": "2020-12-14T02:20:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:14.401 186 INFO tempest.lib.common.rest_client [req-dda9eaa1-491d-418c-9686-713772e43b28 ] Request (VolumesActionsV312RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.062s 2020-12-14 02:20:14.402 186 DEBUG tempest.lib.common.rest_client [req-dda9eaa1-491d-418c-9686-713772e43b28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dda9eaa1-491d-418c-9686-713772e43b28', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:14.485 186 INFO tempest.lib.common.rest_client [req-f6ba1ef8-f13e-4aa1-985f-f44ed54d22e5 ] Request (VolumesActionsV312RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.075s 2020-12-14 02:20:14.487 186 DEBUG tempest.lib.common.rest_client [req-f6ba1ef8-f13e-4aa1-985f-f44ed54d22e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesActionsV312RbacTest-1214594384-desc", "domain_id": "default", "name": "tempest-VolumesActionsV312RbacTest-1214594384"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6ba1ef8-f13e-4aa1-985f-f44ed54d22e5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "6d8e7edd4f234cb9bb22e3f917251e0c", "name": "tempest-VolumesActionsV312RbacTest-1214594384", "domain_id": "default", "description": "tempest-VolumesActionsV312RbacTest-1214594384-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:14.613 186 INFO tempest.lib.common.rest_client [req-d16c99bc-7366-4829-a4f8-33022bb2e7e3 ] Request (VolumesActionsV312RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.118s 2020-12-14 02:20:14.616 186 DEBUG tempest.lib.common.rest_client [req-d16c99bc-7366-4829-a4f8-33022bb2e7e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesActionsV312RbacTest-1214594384", "password": "F3@nfqvcbnZx%ip", "project_id": "6d8e7edd4f234cb9bb22e3f917251e0c", "email": "tempest-VolumesActionsV312RbacTest-1781895114@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '408', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d16c99bc-7366-4829-a4f8-33022bb2e7e3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "6d8e7edd4f234cb9bb22e3f917251e0c", "email": "tempest-VolumesActionsV312RbacTest-1781895114@example.com", "id": "2598a4d39197416abce44209268d7918", "name": "tempest-VolumesActionsV312RbacTest-1214594384", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/2598a4d39197416abce44209268d7918"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:14.681 186 INFO tempest.lib.common.rest_client [req-3bcf468c-b64b-433d-beb4-c7e3de8bcba1 ] Request (VolumesActionsV312RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:20:14.685 186 DEBUG tempest.lib.common.rest_client [req-3bcf468c-b64b-433d-beb4-c7e3de8bcba1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3bcf468c-b64b-433d-beb4-c7e3de8bcba1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:14.741 186 INFO tempest.lib.common.rest_client [req-3cc19ccc-e743-4d64-a6af-2c6d88bb066e ] Request (VolumesActionsV312RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-12-14 02:20:14.744 186 DEBUG tempest.lib.common.rest_client [req-3cc19ccc-e743-4d64-a6af-2c6d88bb066e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3cc19ccc-e743-4d64-a6af-2c6d88bb066e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:14.794 193 INFO tempest.lib.common.rest_client [req-82c38402-015c-4aaa-9416-be1b940081ba ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad 0.047s 2020-12-14 02:20:14.798 193 DEBUG tempest.lib.common.rest_client [req-82c38402-015c-4aaa-9416-be1b940081ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-82c38402-015c-4aaa-9416-be1b940081ba', 'content-length': '769', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-82c38402-015c-4aaa-9416-be1b940081ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad'} Body: b'{"backup": {"id": "961bdae3-3113-4745-ba58-448205fc9dad", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:20:12.000000", "updated_at": "2020-12-14T02:20:15.000000", "name": null, "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:12.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:14.832 186 INFO tempest.lib.common.rest_client [req-ca46941e-2a13-4819-a64d-bcebbc2b2890 ] Request (VolumesActionsV312RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c/users/2598a4d39197416abce44209268d7918/roles/72a4576c553448cd941b052c1ca0cf2d 0.080s 2020-12-14 02:20:14.834 186 DEBUG tempest.lib.common.rest_client [req-ca46941e-2a13-4819-a64d-bcebbc2b2890 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca46941e-2a13-4819-a64d-bcebbc2b2890', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c/users/2598a4d39197416abce44209268d7918/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:14.838 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesActionsV312RbacTest-1214594384', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6d8e7edd4f234cb9bb22e3f917251e0c', 'project_name': 'tempest-VolumesActionsV312RbacTest-1214594384', 'tenant_id': '6d8e7edd4f234cb9bb22e3f917251e0c', 'tenant_name': 'tempest-VolumesActionsV312RbacTest-1214594384', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '2598a4d39197416abce44209268d7918'}, Network: None, Subnet: None, Router: None 2020-12-14 02:20:14.840 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesActionsV312RbacTest-1214594384', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6d8e7edd4f234cb9bb22e3f917251e0c', 'project_name': 'tempest-VolumesActionsV312RbacTest-1214594384', 'tenant_id': '6d8e7edd4f234cb9bb22e3f917251e0c', 'tenant_name': 'tempest-VolumesActionsV312RbacTest-1214594384', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '2598a4d39197416abce44209268d7918'}, Network: None, Subnet: None, Router: None 2020-12-14 02:20:14.847 193 INFO tempest.common.waiters [-] backup 961bdae3-3113-4745-ba58-448205fc9dad reached available after waiting for 2.847640 seconds 2020-12-14 02:20:14.931 193 INFO tempest.lib.common.rest_client [req-31a03283-5d86-4186-8664-69e93a9c8bfc ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821 0.078s 2020-12-14 02:20:14.935 193 DEBUG tempest.lib.common.rest_client [req-31a03283-5d86-4186-8664-69e93a9c8bfc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-31a03283-5d86-4186-8664-69e93a9c8bfc', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-31a03283-5d86-4186-8664-69e93a9c8bfc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821'} Body: b'{"volume": {"id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:15.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-1478667370", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}], "user_id": "690e42d9412443b5a57db3b4600b742d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "f10b46c459c54d6d96bcedc01e4f091f"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:15.010 186 INFO tempest.lib.common.rest_client [req-151a2b90-32ff-4c48-b4f8-9f40c2aee4ad ] Request (VolumesActionsV312RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-12-14 02:20:15.014 186 DEBUG tempest.lib.common.rest_client [req-151a2b90-32ff-4c48-b4f8-9f40c2aee4ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6583', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-151a2b90-32ff-4c48-b4f8-9f40c2aee4ad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2598a4d39197416abce44209268d7918", "name": "tempest-VolumesActionsV312RbacTest-1214594384", "password_expires_at": null}, "audit_ids": ["gNZbbnbyT5S1EVk4_Xw1PQ"], "expires_at": "2020-12-14T03:20:14.000000Z", "issued_at": "2020-12-14T02:20:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6d8e7edd4f234cb9bb22e3f917251e0c", "name": "tempest-VolumesActionsV312RbacTest-1214594384"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:15.032 193 INFO tempest.common.waiters [-] volume 10f94d47-2015-4501-bbdd-1535ba5f2821 reached available after waiting for 0.031648 seconds 2020-12-14 02:20:15.034 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:15.109 186 INFO tempest.lib.common.rest_client [req-1705110d-46dc-4800-8822-85e4eba4ebaa ] Request (VolumesActionsV312RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-12-14 02:20:15.112 186 DEBUG tempest.lib.common.rest_client [req-1705110d-46dc-4800-8822-85e4eba4ebaa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1705110d-46dc-4800-8822-85e4eba4ebaa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Y_8sz0HNR7OrTfMDtUFUcw"], "expires_at": "2020-12-14T03:20:15.000000Z", "issued_at": "2020-12-14T02:20:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:15.155 193 INFO tempest.lib.common.rest_client [req-ad9d374e-6965-49a1-9baa-9069aef4a06b ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.113s 2020-12-14 02:20:15.159 193 DEBUG tempest.lib.common.rest_client [req-ad9d374e-6965-49a1-9baa-9069aef4a06b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad9d374e-6965-49a1-9baa-9069aef4a06b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:15.233 186 INFO tempest.lib.common.rest_client [req-c38a31fd-90be-49f1-a7e0-9c1a99f8e89e ] Request (VolumesActionsV312RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:20:15.236 186 DEBUG tempest.lib.common.rest_client [req-c38a31fd-90be-49f1-a7e0-9c1a99f8e89e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c38a31fd-90be-49f1-a7e0-9c1a99f8e89e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["n4FQnmxxS5iN03-30xlXaw"], "expires_at": "2020-12-14T03:20:15.000000Z", "issued_at": "2020-12-14T02:20:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:15.276 193 INFO tempest.lib.common.rest_client [req-1c788dea-b15c-4536-90cb-cf099d4d801a ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-12-14 02:20:15.280 193 DEBUG tempest.lib.common.rest_client [req-1c788dea-b15c-4536-90cb-cf099d4d801a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c788dea-b15c-4536-90cb-cf099d4d801a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["oX9xMyZ6SRawRY-fzu_J2Q"], "expires_at": "2020-12-14T03:20:15.000000Z", "issued_at": "2020-12-14T02:20:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:15.299 186 INFO tempest.lib.common.rest_client [req-34870076-8970-422a-99f3-feffa5be1179 ] Request (VolumesActionsV312RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.055s 2020-12-14 02:20:15.303 186 DEBUG tempest.lib.common.rest_client [req-34870076-8970-422a-99f3-feffa5be1179 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34870076-8970-422a-99f3-feffa5be1179', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:15.368 186 INFO tempest.lib.common.rest_client [req-c1ffe12b-e665-4573-aaf0-8d55ad15f2f8 ] Request (VolumesActionsV312RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:20:15.370 186 DEBUG tempest.lib.common.rest_client [req-c1ffe12b-e665-4573-aaf0-8d55ad15f2f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c1ffe12b-e665-4573-aaf0-8d55ad15f2f8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:15.373 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:20:15.376 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:15.444 186 INFO tempest.lib.common.rest_client [req-a4506a05-7356-48db-ad6f-410f26337137 ] Request (VolumesActionsV312RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c/users/2598a4d39197416abce44209268d7918/roles 0.061s 2020-12-14 02:20:15.446 186 DEBUG tempest.lib.common.rest_client [req-a4506a05-7356-48db-ad6f-410f26337137 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a4506a05-7356-48db-ad6f-410f26337137', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c/users/2598a4d39197416abce44209268d7918/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c/users/2598a4d39197416abce44209268d7918/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:15.452 193 INFO tempest.lib.common.rest_client [req-fb07152b-c138-4d9d-901f-e03f2889e8b7 ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 202 DELETE http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad 0.163s 2020-12-14 02:20:15.455 193 DEBUG tempest.lib.common.rest_client [req-fb07152b-c138-4d9d-901f-e03f2889e8b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-fb07152b-c138-4d9d-901f-e03f2889e8b7', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fb07152b-c138-4d9d-901f-e03f2889e8b7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:15.459 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:15.527 193 INFO tempest.lib.common.rest_client [req-8ed88953-9bde-49cc-bffc-091e3d639741 ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.062s 2020-12-14 02:20:15.530 193 DEBUG tempest.lib.common.rest_client [req-8ed88953-9bde-49cc-bffc-091e3d639741 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ed88953-9bde-49cc-bffc-091e3d639741', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:15.548 186 INFO tempest.lib.common.rest_client [req-ea3a41be-d8dc-430e-b891-cdfb857b35c5 ] Request (VolumesActionsV312RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c/users/2598a4d39197416abce44209268d7918/roles/72a4576c553448cd941b052c1ca0cf2d 0.094s 2020-12-14 02:20:15.551 186 DEBUG tempest.lib.common.rest_client [req-ea3a41be-d8dc-430e-b891-cdfb857b35c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea3a41be-d8dc-430e-b891-cdfb857b35c5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c/users/2598a4d39197416abce44209268d7918/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:15.621 193 INFO tempest.lib.common.rest_client [req-3486faff-e035-4075-a3c8-14478f95a9bd ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-12-14 02:20:15.625 193 DEBUG tempest.lib.common.rest_client [req-3486faff-e035-4075-a3c8-14478f95a9bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3486faff-e035-4075-a3c8-14478f95a9bd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["ReXfFIMqRZatTMdCpCMVSA"], "expires_at": "2020-12-14T03:20:15.000000Z", "issued_at": "2020-12-14T02:20:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:15.672 186 INFO tempest.lib.common.rest_client [req-09800bba-cd07-4ab0-b160-04d5b9332488 ] Request (VolumesActionsV312RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c/users/2598a4d39197416abce44209268d7918/roles/a629c95d64b3416fb80ae90af4f69c05 0.114s 2020-12-14 02:20:15.675 186 DEBUG tempest.lib.common.rest_client [req-09800bba-cd07-4ab0-b160-04d5b9332488 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-09800bba-cd07-4ab0-b160-04d5b9332488', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c/users/2598a4d39197416abce44209268d7918/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:15.838 193 INFO tempest.lib.common.rest_client [req-55b8d176-5474-4546-8b00-208d2cad08f0 ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad 0.206s 2020-12-14 02:20:15.842 193 DEBUG tempest.lib.common.rest_client [req-55b8d176-5474-4546-8b00-208d2cad08f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-55b8d176-5474-4546-8b00-208d2cad08f0', 'content-length': '768', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-55b8d176-5474-4546-8b00-208d2cad08f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad'} Body: b'{"backup": {"id": "961bdae3-3113-4745-ba58-448205fc9dad", "status": "deleting", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:20:12.000000", "updated_at": "2020-12-14T02:20:15.000000", "name": null, "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:12.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:16.774 186 INFO tempest.lib.common.rest_client [req-ac0ff8cc-0e94-42fe-8631-4e5382beba7b ] Request (VolumesActionsV312RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:20:16.777 186 DEBUG tempest.lib.common.rest_client [req-ac0ff8cc-0e94-42fe-8631-4e5382beba7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac0ff8cc-0e94-42fe-8631-4e5382beba7b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2598a4d39197416abce44209268d7918", "name": "tempest-VolumesActionsV312RbacTest-1214594384", "password_expires_at": null}, "audit_ids": ["nkCwyCjhRYWDK5uHQ4LdCw"], "expires_at": "2020-12-14T03:20:16.000000Z", "issued_at": "2020-12-14T02:20:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6d8e7edd4f234cb9bb22e3f917251e0c", "name": "tempest-VolumesActionsV312RbacTest-1214594384"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:16.788 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:16.807 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_all, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:16.809 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:16.951 193 INFO tempest.lib.common.rest_client [req-48436738-2f8d-4b2b-b7c7-0f3cfb26cb95 ] Request (VolumesBackupsV3RbacTest:test_delete_backup): 404 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad 0.048s 2020-12-14 02:20:16.952 186 INFO tempest.lib.common.rest_client [req-474fcf97-37ee-4984-83f3-0dc14a470af2 ] Request (VolumesActionsV312RbacTest:test_show_volume_summary): 200 GET http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c/users/2598a4d39197416abce44209268d7918/roles 0.138s 2020-12-14 02:20:16.954 193 DEBUG tempest.lib.common.rest_client [req-48436738-2f8d-4b2b-b7c7-0f3cfb26cb95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-48436738-2f8d-4b2b-b7c7-0f3cfb26cb95', 'x-openstack-request-id': 'req-48436738-2f8d-4b2b-b7c7-0f3cfb26cb95', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad'} Body: b'{"itemNotFound": {"code": 404, "message": "Backup 961bdae3-3113-4745-ba58-448205fc9dad could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:16.956 186 DEBUG tempest.lib.common.rest_client [req-474fcf97-37ee-4984-83f3-0dc14a470af2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-474fcf97-37ee-4984-83f3-0dc14a470af2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c/users/2598a4d39197416abce44209268d7918/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c/users/2598a4d39197416abce44209268d7918/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.004 193 INFO tempest.lib.common.rest_client [req-9dabb303-d6f2-41bc-a46a-5101d64a2162 ] Request (VolumesBackupsV3RbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad 0.040s 2020-12-14 02:20:17.007 193 DEBUG tempest.lib.common.rest_client [req-9dabb303-d6f2-41bc-a46a-5101d64a2162 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-9dabb303-d6f2-41bc-a46a-5101d64a2162', 'x-openstack-request-id': 'req-9dabb303-d6f2-41bc-a46a-5101d64a2162', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/961bdae3-3113-4745-ba58-448205fc9dad'} Body: b'{"itemNotFound": {"code": 404, "message": "Backup 961bdae3-3113-4745-ba58-448205fc9dad could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.008 186 INFO tempest.lib.common.rest_client [req-69101dff-8574-4edc-8355-0f53abfee855 ] Request (VolumesActionsV312RbacTest:test_show_volume_summary): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:20:17.011 186 DEBUG tempest.lib.common.rest_client [req-69101dff-8574-4edc-8355-0f53abfee855 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69101dff-8574-4edc-8355-0f53abfee855', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2598a4d39197416abce44209268d7918", "name": "tempest-VolumesActionsV312RbacTest-1214594384", "password_expires_at": null}, "audit_ids": ["lfaUS99zQpGQYKQqvsIbWQ"], "expires_at": "2020-12-14T03:20:16.000000Z", "issued_at": "2020-12-14T02:20:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6d8e7edd4f234cb9bb22e3f917251e0c", "name": "tempest-VolumesActionsV312RbacTest-1214594384"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.021 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:17.039 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:export-import, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:17.042 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:17.106 186 INFO tempest.lib.common.rest_client [req-07136acc-4b8f-4f3e-b96a-226eef3902d6 ] Request (VolumesActionsV312RbacTest:test_show_volume_summary): 200 GET http://172.30.13.94/volume/v3/6d8e7edd4f234cb9bb22e3f917251e0c/volumes/summary 0.086s 2020-12-14 02:20:17.109 186 DEBUG tempest.lib.common.rest_client [req-07136acc-4b8f-4f3e-b96a-226eef3902d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.12', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-07136acc-4b8f-4f3e-b96a-226eef3902d6', 'content-length': '55', 'openstack-api-version': 'volume 3.12', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-07136acc-4b8f-4f3e-b96a-226eef3902d6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/6d8e7edd4f234cb9bb22e3f917251e0c/volumes/summary'} Body: b'{"volume-summary": {"total_count": 0, "total_size": 0}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.109 193 INFO tempest.lib.common.rest_client [req-c4c8c607-5098-4a6d-ab56-3fe387d1c1e4 ] Request (VolumesBackupsV3RbacTest:test_export_backup): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.062s 2020-12-14 02:20:17.113 193 DEBUG tempest.lib.common.rest_client [req-c4c8c607-5098-4a6d-ab56-3fe387d1c1e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c4c8c607-5098-4a6d-ab56-3fe387d1c1e4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.130 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:17.164 193 INFO tempest.lib.common.rest_client [req-a6528394-4884-4d8a-bd2d-c339be061f0f ] Request (VolumesBackupsV3RbacTest:test_export_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:20:17.168 193 DEBUG tempest.lib.common.rest_client [req-a6528394-4884-4d8a-bd2d-c339be061f0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a6528394-4884-4d8a-bd2d-c339be061f0f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["WcRcblw2SeaZ54tkd21D8g"], "expires_at": "2020-12-14T03:20:17.000000Z", "issued_at": "2020-12-14T02:20:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.187 186 INFO tempest.lib.common.rest_client [req-7f606234-0080-4f28-96fd-401308b44d1c ] Request (VolumesActionsV312RbacTest:test_show_volume_summary): 200 GET http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c/users/2598a4d39197416abce44209268d7918/roles 0.051s 2020-12-14 02:20:17.190 186 DEBUG tempest.lib.common.rest_client [req-7f606234-0080-4f28-96fd-401308b44d1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f606234-0080-4f28-96fd-401308b44d1c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c/users/2598a4d39197416abce44209268d7918/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c/users/2598a4d39197416abce44209268d7918/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.236 186 INFO tempest.lib.common.rest_client [req-f375cb3f-e9cb-4f47-b142-a9d5bc9b0a1e ] Request (VolumesActionsV312RbacTest:test_show_volume_summary): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:20:17.240 186 DEBUG tempest.lib.common.rest_client [req-f375cb3f-e9cb-4f47-b142-a9d5bc9b0a1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f375cb3f-e9cb-4f47-b142-a9d5bc9b0a1e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2598a4d39197416abce44209268d7918", "name": "tempest-VolumesActionsV312RbacTest-1214594384", "password_expires_at": null}, "audit_ids": ["LkBucrl3Si-WdycQ3G_1iA"], "expires_at": "2020-12-14T03:20:17.000000Z", "issued_at": "2020-12-14T02:20:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6d8e7edd4f234cb9bb22e3f917251e0c", "name": "tempest-VolumesActionsV312RbacTest-1214594384"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6d8e7edd4f234cb9bb22e3f917251e0c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.299 193 INFO tempest.lib.common.rest_client [req-8bb3965e-cc2b-4d64-b6ae-6a2f6a81b473 ] Request (VolumesBackupsV3RbacTest:test_export_backup): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee/export_record 0.123s 2020-12-14 02:20:17.303 193 DEBUG tempest.lib.common.rest_client [req-8bb3965e-cc2b-4d64-b6ae-6a2f6a81b473 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8bb3965e-cc2b-4d64-b6ae-6a2f6a81b473', 'content-length': '1426', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8bb3965e-cc2b-4d64-b6ae-6a2f6a81b473', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee/export_record'} Body: b'{"backup-record": {"backup_service": "cinder.backup.drivers.ceph.CephBackupDriver", "backup_url": "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"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.320 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:17.385 193 INFO tempest.lib.common.rest_client [req-e2724710-1990-4ce5-ba4e-a3c35daeb432 ] Request (VolumesBackupsV3RbacTest:test_export_backup): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.059s 2020-12-14 02:20:17.389 193 DEBUG tempest.lib.common.rest_client [req-e2724710-1990-4ce5-ba4e-a3c35daeb432 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2724710-1990-4ce5-ba4e-a3c35daeb432', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.398 186 INFO tempest.lib.common.rest_client [req-9a9de7a4-75f1-455f-9769-aa39100dc98b ] Request (VolumesActionsV312RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/2598a4d39197416abce44209268d7918 0.142s 2020-12-14 02:20:17.401 186 DEBUG tempest.lib.common.rest_client [req-9a9de7a4-75f1-455f-9769-aa39100dc98b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9a9de7a4-75f1-455f-9769-aa39100dc98b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/2598a4d39197416abce44209268d7918'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.492 186 INFO tempest.lib.common.rest_client [req-1775543d-23e5-40d1-aa96-febf6ae1e679 ] Request (VolumesActionsV312RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-12-14 02:20:17.492 193 INFO tempest.lib.common.rest_client [req-c96e103f-72aa-44aa-905e-ed33eec2b512 ] Request (VolumesBackupsV3RbacTest:test_export_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:20:17.495 186 DEBUG tempest.lib.common.rest_client [req-1775543d-23e5-40d1-aa96-febf6ae1e679 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1775543d-23e5-40d1-aa96-febf6ae1e679', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["GxxowsvwSg-I13Xmbd6RiQ"], "expires_at": "2020-12-14T03:20:17.000000Z", "issued_at": "2020-12-14T02:20:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.496 193 DEBUG tempest.lib.common.rest_client [req-c96e103f-72aa-44aa-905e-ed33eec2b512 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c96e103f-72aa-44aa-905e-ed33eec2b512', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["ssWJJSnVT6ypin9CtXxobA"], "expires_at": "2020-12-14T03:20:17.000000Z", "issued_at": "2020-12-14T02:20:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.510 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:17.527 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:backup-import, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:17.707 193 INFO tempest.lib.common.rest_client [req-bb758c94-a549-4afd-a372-18d95fa0e464 ] Request (VolumesBackupsV3RbacTest:test_import_backup): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee/export_record 0.174s 2020-12-14 02:20:17.710 193 DEBUG tempest.lib.common.rest_client [req-bb758c94-a549-4afd-a372-18d95fa0e464 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bb758c94-a549-4afd-a372-18d95fa0e464', 'content-length': '1426', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bb758c94-a549-4afd-a372-18d95fa0e464', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee/export_record'} Body: b'{"backup-record": {"backup_service": "cinder.backup.drivers.ceph.CephBackupDriver", "backup_url": "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"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.729 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:17.777 186 INFO tempest.lib.common.rest_client [req-d9e8fb49-f8b4-42b6-86fc-f99853b7135c ] Request (VolumesActionsV312RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6d8e7edd4f234cb9bb22e3f917251e0c&name=default 0.275s 2020-12-14 02:20:17.781 186 DEBUG tempest.lib.common.rest_client [req-d9e8fb49-f8b4-42b6-86fc-f99853b7135c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-d9e8fb49-f8b4-42b6-86fc-f99853b7135c', 'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6d8e7edd4f234cb9bb22e3f917251e0c&name=default'} Body: b'{"security_groups": [{"id": "86e78d72-2a58-4cf5-b2c8-24b2b1a90a93", "name": "default", "stateful": true, "tenant_id": "6d8e7edd4f234cb9bb22e3f917251e0c", "description": "Default security group", "security_group_rules": [{"id": "9cf4dc3d-e3a6-45e8-adf3-00c36969cd62", "tenant_id": "6d8e7edd4f234cb9bb22e3f917251e0c", "security_group_id": "86e78d72-2a58-4cf5-b2c8-24b2b1a90a93", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:20:17Z", "updated_at": "2020-12-14T02:20:17Z", "revision_number": 0, "project_id": "6d8e7edd4f234cb9bb22e3f917251e0c"}, {"id": "ae5f3bfb-801d-4ebf-871a-a5973e8666b7", "tenant_id": "6d8e7edd4f234cb9bb22e3f917251e0c", "security_group_id": "86e78d72-2a58-4cf5-b2c8-24b2b1a90a93", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "86e78d72-2a58-4cf5-b2c8-24b2b1a90a93", "description": null, "tags": [], "created_at": "2020-12-14T02:20:17Z", "updated_at": "2020-12-14T02:20:17Z", "revision_number": 0, "project_id": "6d8e7edd4f234cb9bb22e3f917251e0c"}, {"id": "e55c1bf1-f164-4e9c-8cba-55d6541d1eed", "tenant_id": "6d8e7edd4f234cb9bb22e3f917251e0c", "security_group_id": "86e78d72-2a58-4cf5-b2c8-24b2b1a90a93", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:20:17Z", "updated_at": "2020-12-14T02:20:17Z", "revision_number": 0, "project_id": "6d8e7edd4f234cb9bb22e3f917251e0c"}, {"id": "f8dbc2ba-e414-48de-9faa-a415c80cb4d9", "tenant_id": "6d8e7edd4f234cb9bb22e3f917251e0c", "security_group_id": "86e78d72-2a58-4cf5-b2c8-24b2b1a90a93", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "86e78d72-2a58-4cf5-b2c8-24b2b1a90a93", "description": null, "tags": [], "created_at": "2020-12-14T02:20:17Z", "updated_at": "2020-12-14T02:20:17Z", "revision_number": 0, "project_id": "6d8e7edd4f234cb9bb22e3f917251e0c"}], "tags": [], "created_at": "2020-12-14T02:20:17Z", "updated_at": "2020-12-14T02:20:17Z", "revision_number": 1, "project_id": "6d8e7edd4f234cb9bb22e3f917251e0c"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.806 193 INFO tempest.lib.common.rest_client [req-4c93f549-8c48-4a8b-a852-9db4cfd2d193 ] Request (VolumesBackupsV3RbacTest:test_import_backup): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.071s 2020-12-14 02:20:17.810 193 DEBUG tempest.lib.common.rest_client [req-4c93f549-8c48-4a8b-a852-9db4cfd2d193 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c93f549-8c48-4a8b-a852-9db4cfd2d193', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.866 193 INFO tempest.lib.common.rest_client [req-b6b25c84-2c5e-4381-8a17-4b196715f83d ] Request (VolumesBackupsV3RbacTest:test_import_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:20:17.868 193 DEBUG tempest.lib.common.rest_client [req-b6b25c84-2c5e-4381-8a17-4b196715f83d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6b25c84-2c5e-4381-8a17-4b196715f83d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["Jmmok6h7TGe6fgjLRoxigg"], "expires_at": "2020-12-14T03:20:17.000000Z", "issued_at": "2020-12-14T02:20:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:17.946 186 INFO tempest.lib.common.rest_client [req-0e12d4e2-af4c-44bf-b536-5806ad88591c ] Request (VolumesActionsV312RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/86e78d72-2a58-4cf5-b2c8-24b2b1a90a93 0.158s 2020-12-14 02:20:17.950 186 DEBUG tempest.lib.common.rest_client [req-0e12d4e2-af4c-44bf-b536-5806ad88591c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-0e12d4e2-af4c-44bf-b536-5806ad88591c', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/86e78d72-2a58-4cf5-b2c8-24b2b1a90a93'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.054 193 INFO tempest.lib.common.rest_client [req-bd8fbee8-aed8-4186-bb0a-d1b95ea14d8e ] Request (VolumesBackupsV3RbacTest:test_import_backup): 201 POST http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/import_record 0.179s 2020-12-14 02:20:18.057 193 DEBUG tempest.lib.common.rest_client [req-bd8fbee8-aed8-4186-bb0a-d1b95ea14d8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"backup-record": {"backup_service": "cinder.backup.drivers.ceph.CephBackupDriver", "backup_url": "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"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bd8fbee8-aed8-4186-bb0a-d1b95ea14d8e', 'content-length': '356', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bd8fbee8-aed8-4186-bb0a-d1b95ea14d8e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/import_record'} Body: b'{"backup": {"id": "8bf6b1c2-6aa0-49bb-b502-649e99c0a8af", "name": null, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/8bf6b1c2-6aa0-49bb-b502-649e99c0a8af"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/8bf6b1c2-6aa0-49bb-b502-649e99c0a8af"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.082 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:18.096 186 INFO tempest.lib.common.rest_client [req-7a14dafe-9d86-4608-9bcc-69c574cdddd6 ] Request (VolumesActionsV312RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c 0.137s 2020-12-14 02:20:18.100 186 DEBUG tempest.lib.common.rest_client [req-7a14dafe-9d86-4608-9bcc-69c574cdddd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a14dafe-9d86-4608-9bcc-69c574cdddd6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6d8e7edd4f234cb9bb22e3f917251e0c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.199 193 INFO tempest.lib.common.rest_client [req-cb485562-2ea6-4651-ac42-9fb162cf533f ] Request (VolumesBackupsV3RbacTest:test_import_backup): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.110s 2020-12-14 02:20:18.202 193 DEBUG tempest.lib.common.rest_client [req-cb485562-2ea6-4651-ac42-9fb162cf533f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb485562-2ea6-4651-ac42-9fb162cf533f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.217 186 INFO tempest.lib.common.rest_client [req-af1e5bdc-bd3b-4e7a-8ef7-8e29ab55c5da ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:20:18.219 186 DEBUG tempest.lib.common.rest_client [req-af1e5bdc-bd3b-4e7a-8ef7-8e29ab55c5da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af1e5bdc-bd3b-4e7a-8ef7-8e29ab55c5da', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["AZ4LAqVISFia5u3oMo6ZYw"], "expires_at": "2020-12-14T03:20:18.000000Z", "issued_at": "2020-12-14T02:20:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.305 193 INFO tempest.lib.common.rest_client [req-b704a971-0d15-4be9-92ce-a69171837157 ] Request (VolumesBackupsV3RbacTest:test_import_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:20:18.308 193 DEBUG tempest.lib.common.rest_client [req-b704a971-0d15-4be9-92ce-a69171837157 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b704a971-0d15-4be9-92ce-a69171837157', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["CvUsRAs8S5K2jBjHJgaHwg"], "expires_at": "2020-12-14T03:20:18.000000Z", "issued_at": "2020-12-14T02:20:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.322 186 INFO tempest.lib.common.rest_client [req-3856dc2c-9d29-41ec-a18e-4cb581411f54 ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:20:18.324 186 DEBUG tempest.lib.common.rest_client [req-3856dc2c-9d29-41ec-a18e-4cb581411f54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3856dc2c-9d29-41ec-a18e-4cb581411f54', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["fWN5SOPkR9Wjw1WHhMfzTg"], "expires_at": "2020-12-14T03:20:18.000000Z", "issued_at": "2020-12-14T02:20:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.396 186 INFO tempest.lib.common.rest_client [req-b5fbcfed-7462-4718-893d-0cb4652d48cc ] Request (VolumesActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.066s 2020-12-14 02:20:18.398 186 DEBUG tempest.lib.common.rest_client [req-b5fbcfed-7462-4718-893d-0cb4652d48cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b5fbcfed-7462-4718-893d-0cb4652d48cc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.420 189 INFO tempest.lib.common.rest_client [req-34301ce8-68e4-4617-ae77-acfd636694de ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 4.388s 2020-12-14 02:20:18.422 189 DEBUG tempest.lib.common.rest_client [req-34301ce8-68e4-4617-ae77-acfd636694de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-34301ce8-68e4-4617-ae77-acfd636694de', 'x-compute-request-id': 'req-34301ce8-68e4-4617-ae77-acfd636694de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.427 197 INFO tempest.lib.common.rest_client [req-5af5478a-0c0f-4e4e-bb1c-469ab7998d7b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 3.961s 2020-12-14 02:20:18.430 197 DEBUG tempest.lib.common.rest_client [req-5af5478a-0c0f-4e4e-bb1c-469ab7998d7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5af5478a-0c0f-4e4e-bb1c-469ab7998d7b', 'x-compute-request-id': 'req-5af5478a-0c0f-4e4e-bb1c-469ab7998d7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.463 193 INFO tempest.lib.common.rest_client [req-1cba4650-cb3b-405b-bc21-87d095fba42b ] Request (VolumesBackupsV3RbacTest:test_import_backup): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/8bf6b1c2-6aa0-49bb-b502-649e99c0a8af 0.147s 2020-12-14 02:20:18.466 193 DEBUG tempest.lib.common.rest_client [req-1cba4650-cb3b-405b-bc21-87d095fba42b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1cba4650-cb3b-405b-bc21-87d095fba42b', 'content-length': '819', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1cba4650-cb3b-405b-bc21-87d095fba42b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/8bf6b1c2-6aa0-49bb-b502-649e99c0a8af'} Body: b'{"backup": {"id": "8bf6b1c2-6aa0-49bb-b502-649e99c0a8af", "status": "available", "size": 1, "object_count": 0, "availability_zone": "nova", "container": "backups", "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:18.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1072014888", "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/8bf6b1c2-6aa0-49bb-b502-649e99c0a8af"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/8bf6b1c2-6aa0-49bb-b502-649e99c0a8af"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:06.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.484 186 INFO tempest.lib.common.rest_client [req-d8b9757d-475c-4f6c-bbc3-76a443520b40 ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.079s 2020-12-14 02:20:18.487 186 DEBUG tempest.lib.common.rest_client [req-d8b9757d-475c-4f6c-bbc3-76a443520b40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesActionsV3RbacTest-96799587-desc", "domain_id": "default", "name": "tempest-VolumesActionsV3RbacTest-96799587"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8b9757d-475c-4f6c-bbc3-76a443520b40', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587", "domain_id": "default", "description": "tempest-VolumesActionsV3RbacTest-96799587-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.518 193 INFO tempest.common.waiters [-] backup 8bf6b1c2-6aa0-49bb-b502-649e99c0a8af reached available after waiting for 0.517951 seconds 2020-12-14 02:20:18.587 193 INFO tempest.lib.common.rest_client [req-4c7fc08b-526d-4e9e-bac7-c6e2cb59fadc ] Request (VolumesBackupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/8bf6b1c2-6aa0-49bb-b502-649e99c0a8af 0.063s 2020-12-14 02:20:18.590 193 DEBUG tempest.lib.common.rest_client [req-4c7fc08b-526d-4e9e-bac7-c6e2cb59fadc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-4c7fc08b-526d-4e9e-bac7-c6e2cb59fadc', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4c7fc08b-526d-4e9e-bac7-c6e2cb59fadc', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/8bf6b1c2-6aa0-49bb-b502-649e99c0a8af'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.604 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:18.610 186 INFO tempest.lib.common.rest_client [req-a7f5a741-1966-4771-b5e7-164cba3a2734 ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.115s 2020-12-14 02:20:18.613 186 DEBUG tempest.lib.common.rest_client [req-a7f5a741-1966-4771-b5e7-164cba3a2734 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesActionsV3RbacTest-96799587", "password": "T6#=HfAc4rMs^lP", "project_id": "3477ecc8785a4bd49948e0b216b9f219", "email": "tempest-VolumesActionsV3RbacTest-959611105@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '401', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7f5a741-1966-4771-b5e7-164cba3a2734', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "3477ecc8785a4bd49948e0b216b9f219", "email": "tempest-VolumesActionsV3RbacTest-959611105@example.com", "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/850df44ed8594e168ef24e572f40ef31"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.622 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:get_all, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:18.624 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:18.683 186 INFO tempest.lib.common.rest_client [req-a462bc27-dcfd-41f2-ab25-f8c3e17c8acc ] Request (VolumesActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:20:18.686 186 DEBUG tempest.lib.common.rest_client [req-a462bc27-dcfd-41f2-ab25-f8c3e17c8acc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a462bc27-dcfd-41f2-ab25-f8c3e17c8acc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.701 193 INFO tempest.lib.common.rest_client [req-dc35bfe3-c1e2-4746-8887-28b702d982c5 ] Request (VolumesBackupsV3RbacTest:test_list_backups): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.070s 2020-12-14 02:20:18.704 193 DEBUG tempest.lib.common.rest_client [req-dc35bfe3-c1e2-4746-8887-28b702d982c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc35bfe3-c1e2-4746-8887-28b702d982c5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.755 186 INFO tempest.lib.common.rest_client [req-0986bb16-1f59-45a8-8090-8c0a8a1ce7ef ] Request (VolumesActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:20:18.757 186 DEBUG tempest.lib.common.rest_client [req-0986bb16-1f59-45a8-8090-8c0a8a1ce7ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0986bb16-1f59-45a8-8090-8c0a8a1ce7ef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.821 193 INFO tempest.lib.common.rest_client [req-1f35cdec-a460-468b-a10b-4304add60bc5 ] Request (VolumesBackupsV3RbacTest:test_list_backups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:20:18.825 193 DEBUG tempest.lib.common.rest_client [req-1f35cdec-a460-468b-a10b-4304add60bc5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f35cdec-a460-468b-a10b-4304add60bc5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["lubHU9H6TOWylIU5GQ7tpg"], "expires_at": "2020-12-14T03:20:18.000000Z", "issued_at": "2020-12-14T02:20:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.844 186 INFO tempest.lib.common.rest_client [req-4a2eb1ba-b447-4745-a113-2fc5ac76bf74 ] Request (VolumesActionsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles/72a4576c553448cd941b052c1ca0cf2d 0.080s 2020-12-14 02:20:18.846 186 DEBUG tempest.lib.common.rest_client [req-4a2eb1ba-b447-4745-a113-2fc5ac76bf74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a2eb1ba-b447-4745-a113-2fc5ac76bf74', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:18.849 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesActionsV3RbacTest-96799587', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3477ecc8785a4bd49948e0b216b9f219', 'project_name': 'tempest-VolumesActionsV3RbacTest-96799587', 'tenant_id': '3477ecc8785a4bd49948e0b216b9f219', 'tenant_name': 'tempest-VolumesActionsV3RbacTest-96799587', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '850df44ed8594e168ef24e572f40ef31'}, Network: None, Subnet: None, Router: None 2020-12-14 02:20:18.959 186 INFO tempest.lib.common.rest_client [req-0b20099a-abd7-4384-8089-c8dda3059fb3 ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:20:18.961 186 DEBUG tempest.lib.common.rest_client [req-0b20099a-abd7-4384-8089-c8dda3059fb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b20099a-abd7-4384-8089-c8dda3059fb3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["uVJm9xpcQYqWiUOrLKbF2g"], "expires_at": "2020-12-14T03:20:18.000000Z", "issued_at": "2020-12-14T02:20:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:19.072 193 INFO tempest.lib.common.rest_client [req-6f00d774-4db7-4ec9-b506-c012db6950a9 ] Request (VolumesBackupsV3RbacTest:test_list_backups): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups 0.239s 2020-12-14 02:20:19.075 193 DEBUG tempest.lib.common.rest_client [req-6f00d774-4db7-4ec9-b506-c012db6950a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6f00d774-4db7-4ec9-b506-c012db6950a9', 'content-length': '407', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6f00d774-4db7-4ec9-b506-c012db6950a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups'} Body: b'{"backups": [{"id": "2d764829-8184-42a9-8a61-4d07717fdcee", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1072014888", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:19.105 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:19.177 193 INFO tempest.lib.common.rest_client [req-34f5af49-4935-4647-ac22-a8a9e825ef25 ] Request (VolumesBackupsV3RbacTest:test_list_backups): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.064s 2020-12-14 02:20:19.181 193 DEBUG tempest.lib.common.rest_client [req-34f5af49-4935-4647-ac22-a8a9e825ef25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34f5af49-4935-4647-ac22-a8a9e825ef25', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:19.238 193 INFO tempest.lib.common.rest_client [req-e245ff95-be06-4949-8e60-5adac8a085c9 ] Request (VolumesBackupsV3RbacTest:test_list_backups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:20:19.242 193 DEBUG tempest.lib.common.rest_client [req-e245ff95-be06-4949-8e60-5adac8a085c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e245ff95-be06-4949-8e60-5adac8a085c9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["MIIUP1BITxSFcp4KJcSaiQ"], "expires_at": "2020-12-14T03:20:19.000000Z", "issued_at": "2020-12-14T02:20:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:19.257 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:19.276 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:get_all, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:19.278 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:19.350 193 INFO tempest.lib.common.rest_client [req-8db7640d-4616-42e1-8067-76cb184413e2 ] Request (VolumesBackupsV3RbacTest:test_list_backups_with_details): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.066s 2020-12-14 02:20:19.353 193 DEBUG tempest.lib.common.rest_client [req-8db7640d-4616-42e1-8067-76cb184413e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8db7640d-4616-42e1-8067-76cb184413e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:19.407 193 INFO tempest.lib.common.rest_client [req-5ce71b56-c62e-4df5-9ba6-12187d5c5449 ] Request (VolumesBackupsV3RbacTest:test_list_backups_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:20:19.410 193 DEBUG tempest.lib.common.rest_client [req-5ce71b56-c62e-4df5-9ba6-12187d5c5449 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ce71b56-c62e-4df5-9ba6-12187d5c5449', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["HLVU7lvXSRe_0I71m-YfBw"], "expires_at": "2020-12-14T03:20:19.000000Z", "issued_at": "2020-12-14T02:20:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:19.518 193 INFO tempest.lib.common.rest_client [req-98919766-1894-44b5-a989-fbe23185c398 ] Request (VolumesBackupsV3RbacTest:test_list_backups_with_details): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/detail 0.100s 2020-12-14 02:20:19.522 193 DEBUG tempest.lib.common.rest_client [req-98919766-1894-44b5-a989-fbe23185c398 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-98919766-1894-44b5-a989-fbe23185c398', 'content-length': '820', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-98919766-1894-44b5-a989-fbe23185c398', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/detail'} Body: b'{"backups": [{"id": "2d764829-8184-42a9-8a61-4d07717fdcee", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:18.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1072014888", "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:06.000000"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:19.578 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:19.652 193 INFO tempest.lib.common.rest_client [req-b0ca416b-4774-45f7-9271-c064e4f67059 ] Request (VolumesBackupsV3RbacTest:test_list_backups_with_details): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.068s 2020-12-14 02:20:19.656 193 DEBUG tempest.lib.common.rest_client [req-b0ca416b-4774-45f7-9271-c064e4f67059 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b0ca416b-4774-45f7-9271-c064e4f67059', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:19.706 193 INFO tempest.lib.common.rest_client [req-1d954911-146d-4bad-8bfc-0858cbb76bcd ] Request (VolumesBackupsV3RbacTest:test_list_backups_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:20:19.710 193 DEBUG tempest.lib.common.rest_client [req-1d954911-146d-4bad-8bfc-0858cbb76bcd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d954911-146d-4bad-8bfc-0858cbb76bcd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["YH-P9pP-T7ieY8IWRY5wMA"], "expires_at": "2020-12-14T03:20:19.000000Z", "issued_at": "2020-12-14T02:20:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:19.723 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:19.729 186 INFO tempest.lib.common.rest_client [req-18e6da9a-4244-4df8-bc59-fcafd88af2ae ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.759s 2020-12-14 02:20:19.731 186 DEBUG tempest.lib.common.rest_client [req-18e6da9a-4244-4df8-bc59-fcafd88af2ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-VolumesActionsV3RbacTest-639497835-network", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}} Response - Headers: {'content-type': 'application/json', 'content-length': '739', 'x-openstack-request-id': 'req-18e6da9a-4244-4df8-bc59-fcafd88af2ae', 'date': 'Mon, 14 Dec 2020 02:20:19 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"54c4a38a-1e6f-45c8-b018-54fcb643111b","name":"tempest-VolumesActionsV3RbacTest-639497835-network","tenant_id":"3477ecc8785a4bd49948e0b216b9f219","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"3477ecc8785a4bd49948e0b216b9f219","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":61,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:20:19Z","updated_at":"2020-12-14T02:20:19Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:19.741 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:backup_admin_actions:reset_status, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:19.759 197 INFO tempest.lib.common.rest_client [req-e2f306fb-8283-4a21-99d6-519554a2e6e4 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.221s 2020-12-14 02:20:19.762 197 DEBUG tempest.lib.common.rest_client [req-e2f306fb-8283-4a21-99d6-519554a2e6e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e2f306fb-8283-4a21-99d6-519554a2e6e4', 'x-compute-request-id': 'req-e2f306fb-8283-4a21-99d6-519554a2e6e4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:19.803 189 INFO tempest.lib.common.rest_client [req-6f131b99-105b-46f3-8aea-c5265cef7f48 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.277s 2020-12-14 02:20:19.806 189 DEBUG tempest.lib.common.rest_client [req-6f131b99-105b-46f3-8aea-c5265cef7f48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6f131b99-105b-46f3-8aea-c5265cef7f48', 'x-compute-request-id': 'req-6f131b99-105b-46f3-8aea-c5265cef7f48', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:19.997 193 INFO tempest.lib.common.rest_client [req-f76a4196-fa7f-427d-86e1-53dadf852f01 ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 202 POST http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups 0.250s 2020-12-14 02:20:20.001 193 DEBUG tempest.lib.common.rest_client [req-f76a4196-fa7f-427d-86e1-53dadf852f01 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"backup": {"volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1981852071"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f76a4196-fa7f-427d-86e1-53dadf852f01', 'content-length': '404', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f76a4196-fa7f-427d-86e1-53dadf852f01', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups'} Body: b'{"backup": {"id": "aa83053c-ad16-4fae-aa50-b7bbaaa45a17", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1981852071", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:20.073 193 INFO tempest.lib.common.rest_client [req-7071e323-6b4c-4b47-bfa0-48760b676ee9 ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17 0.042s 2020-12-14 02:20:20.076 193 DEBUG tempest.lib.common.rest_client [req-7071e323-6b4c-4b47-bfa0-48760b676ee9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7071e323-6b4c-4b47-bfa0-48760b676ee9', 'content-length': '811', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7071e323-6b4c-4b47-bfa0-48760b676ee9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17'} Body: b'{"backup": {"id": "aa83053c-ad16-4fae-aa50-b7bbaaa45a17", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": null, "created_at": "2020-12-14T02:20:20.000000", "updated_at": "2020-12-14T02:20:20.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1981852071", "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:20.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:20.531 186 INFO tempest.lib.common.rest_client [req-fd6e1824-190f-44e2-b357-d74533b27984 ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.792s 2020-12-14 02:20:20.533 186 DEBUG tempest.lib.common.rest_client [req-fd6e1824-190f-44e2-b357-d74533b27984 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "54c4a38a-1e6f-45c8-b018-54fcb643111b", "cidr": "192.168.120.0/28", "name": "tempest-VolumesActionsV3RbacTest-639497835-subnet", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '711', 'x-openstack-request-id': 'req-fd6e1824-190f-44e2-b357-d74533b27984', 'date': 'Mon, 14 Dec 2020 02:20:20 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"a201f9eb-bba5-44e5-89a4-ea8b3492644c","name":"tempest-VolumesActionsV3RbacTest-639497835-subnet","tenant_id":"3477ecc8785a4bd49948e0b216b9f219","network_id":"54c4a38a-1e6f-45c8-b018-54fcb643111b","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:20:20Z","updated_at":"2020-12-14T02:20:20Z","revision_number":0,"project_id":"3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:21.089 197 INFO tempest.lib.common.rest_client [req-92bfca88-f835-4d45-a3a2-d79a0a97179e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.217s 2020-12-14 02:20:21.094 197 DEBUG tempest.lib.common.rest_client [req-92bfca88-f835-4d45-a3a2-d79a0a97179e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-92bfca88-f835-4d45-a3a2-d79a0a97179e', 'x-compute-request-id': 'req-92bfca88-f835-4d45-a3a2-d79a0a97179e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:21.098 189 INFO tempest.lib.common.rest_client [req-cf8369da-4a7e-45a2-ae92-e80456d159ce ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.187s 2020-12-14 02:20:21.101 189 DEBUG tempest.lib.common.rest_client [req-cf8369da-4a7e-45a2-ae92-e80456d159ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cf8369da-4a7e-45a2-ae92-e80456d159ce', 'x-compute-request-id': 'req-cf8369da-4a7e-45a2-ae92-e80456d159ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:21.174 193 INFO tempest.lib.common.rest_client [req-5dacc00b-2a76-4cbe-b937-af89cab53773 ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17 0.040s 2020-12-14 02:20:21.177 193 DEBUG tempest.lib.common.rest_client [req-5dacc00b-2a76-4cbe-b937-af89cab53773 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5dacc00b-2a76-4cbe-b937-af89cab53773', 'content-length': '816', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5dacc00b-2a76-4cbe-b937-af89cab53773', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17'} Body: b'{"backup": {"id": "aa83053c-ad16-4fae-aa50-b7bbaaa45a17", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:20:20.000000", "updated_at": "2020-12-14T02:20:21.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1981852071", "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:20.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:22.276 193 INFO tempest.lib.common.rest_client [req-d892e6fc-e207-4b1e-9758-6e850b7a538d ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17 0.043s 2020-12-14 02:20:22.279 193 DEBUG tempest.lib.common.rest_client [req-d892e6fc-e207-4b1e-9758-6e850b7a538d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d892e6fc-e207-4b1e-9758-6e850b7a538d', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d892e6fc-e207-4b1e-9758-6e850b7a538d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17'} Body: b'{"backup": {"id": "aa83053c-ad16-4fae-aa50-b7bbaaa45a17", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:20:20.000000", "updated_at": "2020-12-14T02:20:22.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1981852071", "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:20.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:22.330 193 INFO tempest.common.waiters [-] backup aa83053c-ad16-4fae-aa50-b7bbaaa45a17 reached available after waiting for 2.330246 seconds 2020-12-14 02:20:22.422 189 INFO tempest.lib.common.rest_client [req-4be60b20-c849-4749-8232-1c7b8339b34b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.213s 2020-12-14 02:20:22.426 189 DEBUG tempest.lib.common.rest_client [req-4be60b20-c849-4749-8232-1c7b8339b34b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4be60b20-c849-4749-8232-1c7b8339b34b', 'x-compute-request-id': 'req-4be60b20-c849-4749-8232-1c7b8339b34b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:22.428 193 INFO tempest.lib.common.rest_client [req-3e4d3731-5f98-4e74-8c9b-ec127a3c78fe ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821 0.093s 2020-12-14 02:20:22.431 193 DEBUG tempest.lib.common.rest_client [req-3e4d3731-5f98-4e74-8c9b-ec127a3c78fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3e4d3731-5f98-4e74-8c9b-ec127a3c78fe', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3e4d3731-5f98-4e74-8c9b-ec127a3c78fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821'} Body: b'{"volume": {"id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:22.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-1478667370", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}], "user_id": "690e42d9412443b5a57db3b4600b742d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "f10b46c459c54d6d96bcedc01e4f091f"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:22.440 197 INFO tempest.lib.common.rest_client [req-1eb30a45-e2cf-49df-8e84-e8fc7e9a17e0 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.224s 2020-12-14 02:20:22.443 197 DEBUG tempest.lib.common.rest_client [req-1eb30a45-e2cf-49df-8e84-e8fc7e9a17e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1eb30a45-e2cf-49df-8e84-e8fc7e9a17e0', 'x-compute-request-id': 'req-1eb30a45-e2cf-49df-8e84-e8fc7e9a17e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:22.524 193 INFO tempest.common.waiters [-] volume 10f94d47-2015-4501-bbdd-1535ba5f2821 reached available after waiting for 0.523788 seconds 2020-12-14 02:20:22.526 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:22.606 193 INFO tempest.lib.common.rest_client [req-418968b5-62f3-4933-84c8-8f7058b026b3 ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.074s 2020-12-14 02:20:22.609 193 DEBUG tempest.lib.common.rest_client [req-418968b5-62f3-4933-84c8-8f7058b026b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-418968b5-62f3-4933-84c8-8f7058b026b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:22.667 193 INFO tempest.lib.common.rest_client [req-d45a82a5-086b-4b4e-97bf-6b098acdc38f ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:20:22.671 193 DEBUG tempest.lib.common.rest_client [req-d45a82a5-086b-4b4e-97bf-6b098acdc38f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d45a82a5-086b-4b4e-97bf-6b098acdc38f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["vaZL7_IWS9aAXmFnjtHdZg"], "expires_at": "2020-12-14T03:20:22.000000Z", "issued_at": "2020-12-14T02:20:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:22.813 193 INFO tempest.lib.common.rest_client [req-a9aea5b3-0584-4aeb-b054-eafe6adb3970 ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 202 POST http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17/action 0.134s 2020-12-14 02:20:22.817 193 DEBUG tempest.lib.common.rest_client [req-a9aea5b3-0584-4aeb-b054-eafe6adb3970 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "error"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-a9aea5b3-0584-4aeb-b054-eafe6adb3970', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a9aea5b3-0584-4aeb-b054-eafe6adb3970', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:22.819 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:22.872 186 INFO tempest.lib.common.rest_client [req-7b899408-54ee-484b-8519-4ab47a5409b1 ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 2.333s 2020-12-14 02:20:22.875 186 DEBUG tempest.lib.common.rest_client [req-7b899408-54ee-484b-8519-4ab47a5409b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-VolumesActionsV3RbacTest-639497835-router", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '813', 'x-openstack-request-id': 'req-7b899408-54ee-484b-8519-4ab47a5409b1', 'date': 'Mon, 14 Dec 2020 02:20:22 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "5ff79e18-a845-4b5f-a44a-68506a54eba7", "name": "tempest-VolumesActionsV3RbacTest-639497835-router", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.157"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::129"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:20:20Z", "updated_at": "2020-12-14T02:20:22Z", "revision_number": 3, "project_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:22.901 193 INFO tempest.lib.common.rest_client [req-15ed81e6-e0f1-4b8a-843c-18d739bd1b48 ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.076s 2020-12-14 02:20:22.904 193 DEBUG tempest.lib.common.rest_client [req-15ed81e6-e0f1-4b8a-843c-18d739bd1b48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15ed81e6-e0f1-4b8a-843c-18d739bd1b48', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:22.959 193 INFO tempest.lib.common.rest_client [req-069ab8ba-7140-4e38-b69c-2e5237ecc3f2 ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:20:22.963 193 DEBUG tempest.lib.common.rest_client [req-069ab8ba-7140-4e38-b69c-2e5237ecc3f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-069ab8ba-7140-4e38-b69c-2e5237ecc3f2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["fzeRE-rBR0Gh0eIhz3ohKQ"], "expires_at": "2020-12-14T03:20:22.000000Z", "issued_at": "2020-12-14T02:20:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:23.073 193 INFO tempest.lib.common.rest_client [req-c87d8d78-d7af-4502-8884-1ee5e1f6dafe ] Request (VolumesBackupsV3RbacTest:test_reset_backup_status): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17 0.102s 2020-12-14 02:20:23.077 193 DEBUG tempest.lib.common.rest_client [req-c87d8d78-d7af-4502-8884-1ee5e1f6dafe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c87d8d78-d7af-4502-8884-1ee5e1f6dafe', 'content-length': '813', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c87d8d78-d7af-4502-8884-1ee5e1f6dafe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17'} Body: b'{"backup": {"id": "aa83053c-ad16-4fae-aa50-b7bbaaa45a17", "status": "error", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:20:20.000000", "updated_at": "2020-12-14T02:20:23.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1981852071", "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:20.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:23.134 193 INFO tempest.common.waiters [-] backup aa83053c-ad16-4fae-aa50-b7bbaaa45a17 reached error after waiting for 0.134146 seconds 2020-12-14 02:20:23.208 193 INFO tempest.lib.common.rest_client [req-a2f895ff-eaea-4bcc-8f31-5d66812fcaea ] Request (VolumesBackupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17 0.067s 2020-12-14 02:20:23.211 193 DEBUG tempest.lib.common.rest_client [req-a2f895ff-eaea-4bcc-8f31-5d66812fcaea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-a2f895ff-eaea-4bcc-8f31-5d66812fcaea', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a2f895ff-eaea-4bcc-8f31-5d66812fcaea', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/aa83053c-ad16-4fae-aa50-b7bbaaa45a17'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:23.225 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:23.243 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:restore, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:23.245 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:23.317 193 INFO tempest.lib.common.rest_client [req-841b0e75-a41a-4056-ba6a-1ddf4cf58ea3 ] Request (VolumesBackupsV3RbacTest:test_restore_backup): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.066s 2020-12-14 02:20:23.320 193 DEBUG tempest.lib.common.rest_client [req-841b0e75-a41a-4056-ba6a-1ddf4cf58ea3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-841b0e75-a41a-4056-ba6a-1ddf4cf58ea3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:23.373 193 INFO tempest.lib.common.rest_client [req-05cb6e64-ddb5-4782-9e86-77cb6595f19a ] Request (VolumesBackupsV3RbacTest:test_restore_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:20:23.376 193 DEBUG tempest.lib.common.rest_client [req-05cb6e64-ddb5-4782-9e86-77cb6595f19a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05cb6e64-ddb5-4782-9e86-77cb6595f19a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["Z6LX0T2zQVer78SWd5H9zg"], "expires_at": "2020-12-14T03:20:23.000000Z", "issued_at": "2020-12-14T02:20:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:23.771 189 INFO tempest.lib.common.rest_client [req-e41caa58-5707-49d9-af27-94f5a08ce005 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.241s 2020-12-14 02:20:23.774 189 DEBUG tempest.lib.common.rest_client [req-e41caa58-5707-49d9-af27-94f5a08ce005 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e41caa58-5707-49d9-af27-94f5a08ce005', 'x-compute-request-id': 'req-e41caa58-5707-49d9-af27-94f5a08ce005', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:23.794 197 INFO tempest.lib.common.rest_client [req-25d98c36-575e-4d55-a5fd-2d1d731a2898 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.246s 2020-12-14 02:20:23.797 197 DEBUG tempest.lib.common.rest_client [req-25d98c36-575e-4d55-a5fd-2d1d731a2898 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-25d98c36-575e-4d55-a5fd-2d1d731a2898', 'x-compute-request-id': 'req-25d98c36-575e-4d55-a5fd-2d1d731a2898', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:25.004 193 INFO tempest.lib.common.rest_client [req-62945d0e-1cae-409d-89d9-744eaeae763c ] Request (VolumesBackupsV3RbacTest:test_restore_backup): 202 POST http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee/restore 1.621s 2020-12-14 02:20:25.008 193 DEBUG tempest.lib.common.rest_client [req-62945d0e-1cae-409d-89d9-744eaeae763c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"restore": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-62945d0e-1cae-409d-89d9-744eaeae763c', 'content-length': '189', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-62945d0e-1cae-409d-89d9-744eaeae763c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee/restore'} Body: b'{"restore": {"backup_id": "2d764829-8184-42a9-8a61-4d07717fdcee", "volume_id": "4d46d11b-f8ba-43ab-8fe9-b781f053e7f8", "volume_name": "restore_backup_2d764829-8184-42a9-8a61-4d07717fdcee"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:25.026 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:25.103 193 INFO tempest.lib.common.rest_client [req-2490caf0-b5a9-464f-939a-6ccf0294ae32 ] Request (VolumesBackupsV3RbacTest:test_restore_backup): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.070s 2020-12-14 02:20:25.107 193 DEBUG tempest.lib.common.rest_client [req-2490caf0-b5a9-464f-939a-6ccf0294ae32 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2490caf0-b5a9-464f-939a-6ccf0294ae32', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:25.131 189 INFO tempest.lib.common.rest_client [req-4594a156-c7a3-4695-87fc-a0c44b7c9587 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.249s 2020-12-14 02:20:25.131 197 INFO tempest.lib.common.rest_client [req-deea2434-95d5-4791-8695-a4d1184ed7ac ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.227s 2020-12-14 02:20:25.134 189 DEBUG tempest.lib.common.rest_client [req-4594a156-c7a3-4695-87fc-a0c44b7c9587 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4594a156-c7a3-4695-87fc-a0c44b7c9587', 'x-compute-request-id': 'req-4594a156-c7a3-4695-87fc-a0c44b7c9587', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:25.135 197 DEBUG tempest.lib.common.rest_client [req-deea2434-95d5-4791-8695-a4d1184ed7ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-deea2434-95d5-4791-8695-a4d1184ed7ac', 'x-compute-request-id': 'req-deea2434-95d5-4791-8695-a4d1184ed7ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:25.176 193 INFO tempest.lib.common.rest_client [req-1965bcd7-b86f-420b-a3d6-7a72c213af9c ] Request (VolumesBackupsV3RbacTest:test_restore_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.059s 2020-12-14 02:20:25.179 193 DEBUG tempest.lib.common.rest_client [req-1965bcd7-b86f-420b-a3d6-7a72c213af9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1965bcd7-b86f-420b-a3d6-7a72c213af9c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["02VhFOPhSIyaonipk7-Iqg"], "expires_at": "2020-12-14T03:20:25.000000Z", "issued_at": "2020-12-14T02:20:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:25.301 193 INFO tempest.lib.common.rest_client [req-2d04c1be-a87f-433f-8983-370529adbcbb ] Request (VolumesBackupsV3RbacTest:test_restore_backup): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee 0.113s 2020-12-14 02:20:25.305 193 DEBUG tempest.lib.common.rest_client [req-2d04c1be-a87f-433f-8983-370529adbcbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2d04c1be-a87f-433f-8983-370529adbcbb', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2d04c1be-a87f-433f-8983-370529adbcbb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee'} Body: b'{"backup": {"id": "2d764829-8184-42a9-8a61-4d07717fdcee", "status": "restoring", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:25.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1072014888", "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:06.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:26.407 193 INFO tempest.lib.common.rest_client [req-b0bedc51-6df1-484e-814e-ccca57d4b39d ] Request (VolumesBackupsV3RbacTest:test_restore_backup): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee 0.046s 2020-12-14 02:20:26.412 193 DEBUG tempest.lib.common.rest_client [req-b0bedc51-6df1-484e-814e-ccca57d4b39d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b0bedc51-6df1-484e-814e-ccca57d4b39d', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b0bedc51-6df1-484e-814e-ccca57d4b39d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee'} Body: b'{"backup": {"id": "2d764829-8184-42a9-8a61-4d07717fdcee", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:26.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1072014888", "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:06.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:26.463 197 INFO tempest.lib.common.rest_client [req-4fe75c47-9c73-416d-924e-935fa2d3067b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.223s 2020-12-14 02:20:26.463 189 INFO tempest.lib.common.rest_client [req-0f96cffb-c663-45ad-89f9-cf3f55624e91 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.222s 2020-12-14 02:20:26.465 193 INFO tempest.common.waiters [-] backup 2d764829-8184-42a9-8a61-4d07717fdcee reached available after waiting for 1.465305 seconds 2020-12-14 02:20:26.466 197 DEBUG tempest.lib.common.rest_client [req-4fe75c47-9c73-416d-924e-935fa2d3067b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4fe75c47-9c73-416d-924e-935fa2d3067b', 'x-compute-request-id': 'req-4fe75c47-9c73-416d-924e-935fa2d3067b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:26.466 189 DEBUG tempest.lib.common.rest_client [req-0f96cffb-c663-45ad-89f9-cf3f55624e91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0f96cffb-c663-45ad-89f9-cf3f55624e91', 'x-compute-request-id': 'req-0f96cffb-c663-45ad-89f9-cf3f55624e91', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:26.559 193 INFO tempest.lib.common.rest_client [req-128aca31-face-4817-91a2-e0d0c7b9f9b7 ] Request (VolumesBackupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/4d46d11b-f8ba-43ab-8fe9-b781f053e7f8 0.087s 2020-12-14 02:20:26.563 193 DEBUG tempest.lib.common.rest_client [req-128aca31-face-4817-91a2-e0d0c7b9f9b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-128aca31-face-4817-91a2-e0d0c7b9f9b7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/4d46d11b-f8ba-43ab-8fe9-b781f053e7f8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:26.575 193 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:26.594 193 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:get, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:26.596 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:26.671 193 INFO tempest.lib.common.rest_client [req-56381ae9-19ca-48f4-bf82-01be522c717e ] Request (VolumesBackupsV3RbacTest:test_show_backup): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.069s 2020-12-14 02:20:26.675 193 DEBUG tempest.lib.common.rest_client [req-56381ae9-19ca-48f4-bf82-01be522c717e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56381ae9-19ca-48f4-bf82-01be522c717e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:26.732 193 INFO tempest.lib.common.rest_client [req-dc070fff-c008-4f69-acd4-3febf155d257 ] Request (VolumesBackupsV3RbacTest:test_show_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:20:26.736 193 DEBUG tempest.lib.common.rest_client [req-dc070fff-c008-4f69-acd4-3febf155d257 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc070fff-c008-4f69-acd4-3febf155d257', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["dHnwAaTgTYWQiF3F8tMc9A"], "expires_at": "2020-12-14T03:20:26.000000Z", "issued_at": "2020-12-14T02:20:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:26.844 193 INFO tempest.lib.common.rest_client [req-19c22941-aad4-4356-b649-7d7524c508de ] Request (VolumesBackupsV3RbacTest:test_show_backup): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee 0.100s 2020-12-14 02:20:26.847 193 DEBUG tempest.lib.common.rest_client [req-19c22941-aad4-4356-b649-7d7524c508de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-19c22941-aad4-4356-b649-7d7524c508de', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-19c22941-aad4-4356-b649-7d7524c508de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee'} Body: b'{"backup": {"id": "2d764829-8184-42a9-8a61-4d07717fdcee", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:26.000000", "name": "tempest-VolumesBackupsV3RbacTest-Backup-1072014888", "description": null, "fail_reason": null, "volume_id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:20:06.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:26.899 193 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:26.965 193 INFO tempest.lib.common.rest_client [req-748a28af-4974-42f0-b6d8-ec2c05f8889f ] Request (VolumesBackupsV3RbacTest:test_show_backup): 200 GET http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles 0.060s 2020-12-14 02:20:26.968 193 DEBUG tempest.lib.common.rest_client [req-748a28af-4974-42f0-b6d8-ec2c05f8889f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-748a28af-4974-42f0-b6d8-ec2c05f8889f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f/users/690e42d9412443b5a57db3b4600b742d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:27.024 193 INFO tempest.lib.common.rest_client [req-95df7e46-a4f4-4445-967b-ee6f2927354d ] Request (VolumesBackupsV3RbacTest:test_show_backup): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:20:27.027 193 DEBUG tempest.lib.common.rest_client [req-95df7e46-a4f4-4445-967b-ee6f2927354d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95df7e46-a4f4-4445-967b-ee6f2927354d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "690e42d9412443b5a57db3b4600b742d", "name": "tempest-VolumesBackupsV3RbacTest-1599138395", "password_expires_at": null}, "audit_ids": ["271V5BMkTjeCQnRNnVoI3A"], "expires_at": "2020-12-14T03:20:27.000000Z", "issued_at": "2020-12-14T02:20:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f10b46c459c54d6d96bcedc01e4f091f", "name": "tempest-VolumesBackupsV3RbacTest-1599138395"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f10b46c459c54d6d96bcedc01e4f091f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:27.370 193 INFO tempest.lib.common.rest_client [req-45fd14cd-2e22-45f3-8667-bc1ac2ab38ca ] Request (VolumesBackupsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee 0.118s 2020-12-14 02:20:27.372 193 DEBUG tempest.lib.common.rest_client [req-45fd14cd-2e22-45f3-8667-bc1ac2ab38ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-45fd14cd-2e22-45f3-8667-bc1ac2ab38ca', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-45fd14cd-2e22-45f3-8667-bc1ac2ab38ca', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/backups/2d764829-8184-42a9-8a61-4d07717fdcee'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:27.462 193 INFO tempest.lib.common.rest_client [req-560ecfcb-0d5e-47f2-b6ca-8da6a6987771 ] Request (VolumesBackupsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821 0.083s 2020-12-14 02:20:27.464 193 DEBUG tempest.lib.common.rest_client [req-560ecfcb-0d5e-47f2-b6ca-8da6a6987771 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-560ecfcb-0d5e-47f2-b6ca-8da6a6987771', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:27.558 193 INFO tempest.lib.common.rest_client [req-0fb7af47-6570-4b73-a55d-ee5214cc7c4c ] Request (VolumesBackupsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821 0.087s 2020-12-14 02:20:27.562 193 DEBUG tempest.lib.common.rest_client [req-0fb7af47-6570-4b73-a55d-ee5214cc7c4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0fb7af47-6570-4b73-a55d-ee5214cc7c4c', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0fb7af47-6570-4b73-a55d-ee5214cc7c4c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821'} Body: b'{"volume": {"id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:27.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-1478667370", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}], "user_id": "690e42d9412443b5a57db3b4600b742d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "f10b46c459c54d6d96bcedc01e4f091f"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:27.816 197 INFO tempest.lib.common.rest_client [req-edc8725c-354c-4a25-8a8c-6a071a72da00 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.242s 2020-12-14 02:20:27.819 197 DEBUG tempest.lib.common.rest_client [req-edc8725c-354c-4a25-8a8c-6a071a72da00 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-edc8725c-354c-4a25-8a8c-6a071a72da00', 'x-compute-request-id': 'req-edc8725c-354c-4a25-8a8c-6a071a72da00', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:27.838 189 INFO tempest.lib.common.rest_client [req-0bfb5e63-e502-489d-a707-e75cf18cc504 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.263s 2020-12-14 02:20:27.842 189 DEBUG tempest.lib.common.rest_client [req-0bfb5e63-e502-489d-a707-e75cf18cc504 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0bfb5e63-e502-489d-a707-e75cf18cc504', 'x-compute-request-id': 'req-0bfb5e63-e502-489d-a707-e75cf18cc504', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:28.754 193 INFO tempest.lib.common.rest_client [req-ffdcd8b3-2517-4e63-9090-18cc3a5a4949 ] Request (VolumesBackupsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821 0.085s 2020-12-14 02:20:28.757 193 DEBUG tempest.lib.common.rest_client [req-ffdcd8b3-2517-4e63-9090-18cc3a5a4949 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ffdcd8b3-2517-4e63-9090-18cc3a5a4949', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ffdcd8b3-2517-4e63-9090-18cc3a5a4949', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821'} Body: b'{"volume": {"id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:27.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-1478667370", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}], "user_id": "690e42d9412443b5a57db3b4600b742d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "f10b46c459c54d6d96bcedc01e4f091f"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:29.132 197 INFO tempest.lib.common.rest_client [req-9248e8a1-3d1c-4798-b1bc-db61ede3bc7f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.205s 2020-12-14 02:20:29.135 197 DEBUG tempest.lib.common.rest_client [req-9248e8a1-3d1c-4798-b1bc-db61ede3bc7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9248e8a1-3d1c-4798-b1bc-db61ede3bc7f', 'x-compute-request-id': 'req-9248e8a1-3d1c-4798-b1bc-db61ede3bc7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:29.209 189 INFO tempest.lib.common.rest_client [req-db57b31f-fe86-4dcc-b481-0423b544c387 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.252s 2020-12-14 02:20:29.213 189 DEBUG tempest.lib.common.rest_client [req-db57b31f-fe86-4dcc-b481-0423b544c387 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-db57b31f-fe86-4dcc-b481-0423b544c387', 'x-compute-request-id': 'req-db57b31f-fe86-4dcc-b481-0423b544c387', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:29.941 193 INFO tempest.lib.common.rest_client [req-97ece1ee-900a-4ea9-bc17-0891fba5bb55 ] Request (VolumesBackupsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821 0.082s 2020-12-14 02:20:29.944 193 DEBUG tempest.lib.common.rest_client [req-97ece1ee-900a-4ea9-bc17-0891fba5bb55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-97ece1ee-900a-4ea9-bc17-0891fba5bb55', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-97ece1ee-900a-4ea9-bc17-0891fba5bb55', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821'} Body: b'{"volume": {"id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:27.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-1478667370", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}], "user_id": "690e42d9412443b5a57db3b4600b742d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "f10b46c459c54d6d96bcedc01e4f091f"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:30.309 186 INFO tempest.lib.common.rest_client [req-c3538a28-c366-4186-9d9a-3393c714bc9b ] Request (VolumesActionsV3RbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/5ff79e18-a845-4b5f-a44a-68506a54eba7/add_router_interface 7.424s 2020-12-14 02:20:30.311 186 DEBUG tempest.lib.common.rest_client [req-c3538a28-c366-4186-9d9a-3393c714bc9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "a201f9eb-bba5-44e5-89a4-ea8b3492644c"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-c3538a28-c366-4186-9d9a-3393c714bc9b', 'date': 'Mon, 14 Dec 2020 02:20:30 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/5ff79e18-a845-4b5f-a44a-68506a54eba7/add_router_interface'} Body: b'{"id": "5ff79e18-a845-4b5f-a44a-68506a54eba7", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "port_id": "afb76b4e-818f-46eb-b795-44f6b750e4a1", "network_id": "54c4a38a-1e6f-45c8-b018-54fcb643111b", "subnet_id": "a201f9eb-bba5-44e5-89a4-ea8b3492644c", "subnet_ids": ["a201f9eb-bba5-44e5-89a4-ea8b3492644c"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:30.314 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesActionsV3RbacTest-96799587', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3477ecc8785a4bd49948e0b216b9f219', 'project_name': 'tempest-VolumesActionsV3RbacTest-96799587', 'tenant_id': '3477ecc8785a4bd49948e0b216b9f219', 'tenant_name': 'tempest-VolumesActionsV3RbacTest-96799587', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '850df44ed8594e168ef24e572f40ef31'}, Network: {'id': '54c4a38a-1e6f-45c8-b018-54fcb643111b', 'name': 'tempest-VolumesActionsV3RbacTest-639497835-network', 'tenant_id': '3477ecc8785a4bd49948e0b216b9f219', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3477ecc8785a4bd49948e0b216b9f219', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 61, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:20:19Z', 'updated_at': '2020-12-14T02:20:19Z', 'revision_number': 1}, Subnet: {'id': 'a201f9eb-bba5-44e5-89a4-ea8b3492644c', 'name': 'tempest-VolumesActionsV3RbacTest-639497835-subnet', 'tenant_id': '3477ecc8785a4bd49948e0b216b9f219', 'network_id': '54c4a38a-1e6f-45c8-b018-54fcb643111b', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:20:20Z', 'updated_at': '2020-12-14T02:20:20Z', 'revision_number': 0, 'project_id': '3477ecc8785a4bd49948e0b216b9f219'}, Router: {'id': '5ff79e18-a845-4b5f-a44a-68506a54eba7', 'name': 'tempest-VolumesActionsV3RbacTest-639497835-router', 'tenant_id': '3477ecc8785a4bd49948e0b216b9f219', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.157'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::129'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:20:20Z', 'updated_at': '2020-12-14T02:20:22Z', 'revision_number': 3, 'project_id': '3477ecc8785a4bd49948e0b216b9f219'} 2020-12-14 02:20:30.489 186 INFO tempest.lib.common.rest_client [req-ed0b50f6-7cc1-4b85-ad17-6a1c19ebfa70 ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.112s 2020-12-14 02:20:30.493 186 DEBUG tempest.lib.common.rest_client [req-ed0b50f6-7cc1-4b85-ad17-6a1c19ebfa70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed0b50f6-7cc1-4b85-ad17-6a1c19ebfa70', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["_KsAN-jvRfOE0U7nd2t8hg"], "expires_at": "2020-12-14T03:20:30.000000Z", "issued_at": "2020-12-14T02:20:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:30.495 197 INFO tempest.lib.common.rest_client [req-2cb97b34-ed02-41d4-adda-34d3e2cc74eb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.253s 2020-12-14 02:20:30.499 197 DEBUG tempest.lib.common.rest_client [req-2cb97b34-ed02-41d4-adda-34d3e2cc74eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2cb97b34-ed02-41d4-adda-34d3e2cc74eb', 'x-compute-request-id': 'req-2cb97b34-ed02-41d4-adda-34d3e2cc74eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:30.555 186 INFO tempest.lib.common.rest_client [req-05a45869-214e-4c47-ab6a-1173f57b7653 ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:20:30.555 189 INFO tempest.lib.common.rest_client [req-0114b3a0-f94e-4fd7-83eb-fc8a9f2bcd9b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.232s 2020-12-14 02:20:30.558 186 DEBUG tempest.lib.common.rest_client [req-05a45869-214e-4c47-ab6a-1173f57b7653 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05a45869-214e-4c47-ab6a-1173f57b7653', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["iAMADZKGQT-Cgj4zf9mJyg"], "expires_at": "2020-12-14T03:20:30.000000Z", "issued_at": "2020-12-14T02:20:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:30.558 189 DEBUG tempest.lib.common.rest_client [req-0114b3a0-f94e-4fd7-83eb-fc8a9f2bcd9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0114b3a0-f94e-4fd7-83eb-fc8a9f2bcd9b', 'x-compute-request-id': 'req-0114b3a0-f94e-4fd7-83eb-fc8a9f2bcd9b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:30.672 186 INFO tempest.lib.common.rest_client [req-26dca194-bc9f-437c-8687-d61052ca00ed ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:20:30.676 186 DEBUG tempest.lib.common.rest_client [req-26dca194-bc9f-437c-8687-d61052ca00ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26dca194-bc9f-437c-8687-d61052ca00ed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["V_rXclUKTFSuhinI5IAK1Q"], "expires_at": "2020-12-14T03:20:30.000000Z", "issued_at": "2020-12-14T02:20:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:30.741 186 INFO tempest.lib.common.rest_client [req-725fd77d-0389-4aaf-81cf-ef23999252d5 ] Request (VolumesActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.057s 2020-12-14 02:20:30.744 186 DEBUG tempest.lib.common.rest_client [req-725fd77d-0389-4aaf-81cf-ef23999252d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-725fd77d-0389-4aaf-81cf-ef23999252d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:30.808 186 INFO tempest.lib.common.rest_client [req-ada92c1d-ad7e-413a-8319-aa9c53abb7de ] Request (VolumesActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:20:30.811 186 DEBUG tempest.lib.common.rest_client [req-ada92c1d-ad7e-413a-8319-aa9c53abb7de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ada92c1d-ad7e-413a-8319-aa9c53abb7de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:30.814 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:20:30.817 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:30.885 186 INFO tempest.lib.common.rest_client [req-70d646f6-c455-48b6-b816-cf979369fe1e ] Request (VolumesActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.061s 2020-12-14 02:20:30.888 186 DEBUG tempest.lib.common.rest_client [req-70d646f6-c455-48b6-b816-cf979369fe1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70d646f6-c455-48b6-b816-cf979369fe1e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:30.962 186 INFO tempest.lib.common.rest_client [req-2f6e8866-9ab5-4f57-9372-d77dad4f02d1 ] Request (VolumesActionsV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles/72a4576c553448cd941b052c1ca0cf2d 0.067s 2020-12-14 02:20:30.964 186 DEBUG tempest.lib.common.rest_client [req-2f6e8866-9ab5-4f57-9372-d77dad4f02d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f6e8866-9ab5-4f57-9372-d77dad4f02d1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:31.085 186 INFO tempest.lib.common.rest_client [req-bb6258a7-a4a3-4176-ba67-3ed089b7d86d ] Request (VolumesActionsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles/a629c95d64b3416fb80ae90af4f69c05 0.112s 2020-12-14 02:20:31.088 186 DEBUG tempest.lib.common.rest_client [req-bb6258a7-a4a3-4176-ba67-3ed089b7d86d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb6258a7-a4a3-4176-ba67-3ed089b7d86d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:31.136 193 INFO tempest.lib.common.rest_client [req-0bdd55f1-1d64-48e2-984a-09652a6234ea ] Request (VolumesBackupsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821 0.089s 2020-12-14 02:20:31.139 193 DEBUG tempest.lib.common.rest_client [req-0bdd55f1-1d64-48e2-984a-09652a6234ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0bdd55f1-1d64-48e2-984a-09652a6234ea', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0bdd55f1-1d64-48e2-984a-09652a6234ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821'} Body: b'{"volume": {"id": "10f94d47-2015-4501-bbdd-1535ba5f2821", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:06.000000", "updated_at": "2020-12-14T02:20:27.000000", "name": "tempest-VolumesBackupsV3RbacTest-Volume-1478667370", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821"}], "user_id": "690e42d9412443b5a57db3b4600b742d", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "f10b46c459c54d6d96bcedc01e4f091f"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:31.850 197 INFO tempest.lib.common.rest_client [req-ce91ce3f-763a-4196-9789-79ff70c1b660 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.244s 2020-12-14 02:20:31.854 197 DEBUG tempest.lib.common.rest_client [req-ce91ce3f-763a-4196-9789-79ff70c1b660 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ce91ce3f-763a-4196-9789-79ff70c1b660', 'x-compute-request-id': 'req-ce91ce3f-763a-4196-9789-79ff70c1b660', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:31.927 189 INFO tempest.lib.common.rest_client [req-aa2a860d-5509-434f-9fc7-5a9e5401977a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.261s 2020-12-14 02:20:31.931 189 DEBUG tempest.lib.common.rest_client [req-aa2a860d-5509-434f-9fc7-5a9e5401977a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aa2a860d-5509-434f-9fc7-5a9e5401977a', 'x-compute-request-id': 'req-aa2a860d-5509-434f-9fc7-5a9e5401977a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:32.204 186 INFO tempest.lib.common.rest_client [req-5e656bb6-af1e-4b73-b940-eaf2e14046be ] Request (VolumesActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-12-14 02:20:32.208 186 DEBUG tempest.lib.common.rest_client [req-5e656bb6-af1e-4b73-b940-eaf2e14046be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e656bb6-af1e-4b73-b940-eaf2e14046be', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["iK2pw0Y_TK-iriXDyUEO6A"], "expires_at": "2020-12-14T03:20:32.000000Z", "issued_at": "2020-12-14T02:20:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:32.308 193 INFO tempest.lib.common.rest_client [req-98d506e5-5302-4ca7-a1e3-d5d0476e69cb ] Request (VolumesBackupsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821 0.064s 2020-12-14 02:20:32.310 193 DEBUG tempest.lib.common.rest_client [req-98d506e5-5302-4ca7-a1e3-d5d0476e69cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-98d506e5-5302-4ca7-a1e3-d5d0476e69cb', 'x-openstack-request-id': 'req-98d506e5-5302-4ca7-a1e3-d5d0476e69cb', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/f10b46c459c54d6d96bcedc01e4f091f/volumes/10f94d47-2015-4501-bbdd-1535ba5f2821'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 10f94d47-2015-4501-bbdd-1535ba5f2821 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:32.528 193 INFO tempest.lib.common.rest_client [req-51e3efac-b230-4480-be7e-b8779867d2fa ] Request (VolumesBackupsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/690e42d9412443b5a57db3b4600b742d 0.211s 2020-12-14 02:20:32.532 193 DEBUG tempest.lib.common.rest_client [req-51e3efac-b230-4480-be7e-b8779867d2fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51e3efac-b230-4480-be7e-b8779867d2fa', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/690e42d9412443b5a57db3b4600b742d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:32.645 193 INFO tempest.lib.common.rest_client [req-67e98b64-cc39-4e38-bb7b-87e4756a5f03 ] Request (VolumesBackupsV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:20:32.648 193 DEBUG tempest.lib.common.rest_client [req-67e98b64-cc39-4e38-bb7b-87e4756a5f03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67e98b64-cc39-4e38-bb7b-87e4756a5f03', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["qJsq9xbtQuCs361YY3a5jQ"], "expires_at": "2020-12-14T03:20:32.000000Z", "issued_at": "2020-12-14T02:20:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:32.682 186 INFO tempest.lib.common.rest_client [req-6524b125-2096-475c-916c-29220719d162 ] Request (VolumesActionsV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes 0.460s 2020-12-14 02:20:32.686 186 DEBUG tempest.lib.common.rest_client [req-6524b125-2096-475c-916c-29220719d162 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesActionsV3RbacTest-Volume-1568188414"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6524b125-2096-475c-916c-29220719d162', 'content-length': '845', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6524b125-2096-475c-916c-29220719d162', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes'} Body: b'{"volume": {"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:33.000000", "updated_at": null, "name": "tempest-VolumesActionsV3RbacTest-Volume-1568188414", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:32.878 186 INFO tempest.lib.common.rest_client [req-304bdf1b-1cca-48c8-aabb-fbd4362b2160 ] Request (VolumesActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74 0.080s 2020-12-14 02:20:32.881 186 DEBUG tempest.lib.common.rest_client [req-304bdf1b-1cca-48c8-aabb-fbd4362b2160 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-304bdf1b-1cca-48c8-aabb-fbd4362b2160', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-304bdf1b-1cca-48c8-aabb-fbd4362b2160', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74'} Body: b'{"volume": {"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:33.000000", "updated_at": "2020-12-14T02:20:33.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1568188414", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:32.934 193 INFO tempest.lib.common.rest_client [req-b6376c24-ff82-4136-bfd5-068546d4eff6 ] Request (VolumesBackupsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=f10b46c459c54d6d96bcedc01e4f091f&name=default 0.280s 2020-12-14 02:20:32.937 193 DEBUG tempest.lib.common.rest_client [req-b6376c24-ff82-4136-bfd5-068546d4eff6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-b6376c24-ff82-4136-bfd5-068546d4eff6', 'date': 'Mon, 14 Dec 2020 02:20:32 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=f10b46c459c54d6d96bcedc01e4f091f&name=default'} Body: b'{"security_groups": [{"id": "f1011420-9b2a-474b-aeab-3ff09c0e18c0", "name": "default", "stateful": true, "tenant_id": "f10b46c459c54d6d96bcedc01e4f091f", "description": "Default security group", "security_group_rules": [{"id": "1e3b5412-8eb5-4fe2-b064-c13024b25d7c", "tenant_id": "f10b46c459c54d6d96bcedc01e4f091f", "security_group_id": "f1011420-9b2a-474b-aeab-3ff09c0e18c0", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:20:32Z", "updated_at": "2020-12-14T02:20:32Z", "revision_number": 0, "project_id": "f10b46c459c54d6d96bcedc01e4f091f"}, {"id": "322305df-bc86-4047-9ebb-228fae8dc76f", "tenant_id": "f10b46c459c54d6d96bcedc01e4f091f", "security_group_id": "f1011420-9b2a-474b-aeab-3ff09c0e18c0", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f1011420-9b2a-474b-aeab-3ff09c0e18c0", "description": null, "tags": [], "created_at": "2020-12-14T02:20:32Z", "updated_at": "2020-12-14T02:20:32Z", "revision_number": 0, "project_id": "f10b46c459c54d6d96bcedc01e4f091f"}, {"id": "4989bb35-797f-4701-86e3-3e84459f7693", "tenant_id": "f10b46c459c54d6d96bcedc01e4f091f", "security_group_id": "f1011420-9b2a-474b-aeab-3ff09c0e18c0", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:20:32Z", "updated_at": "2020-12-14T02:20:32Z", "revision_number": 0, "project_id": "f10b46c459c54d6d96bcedc01e4f091f"}, {"id": "4dee9eff-2a46-44e5-89b4-6e138db57459", "tenant_id": "f10b46c459c54d6d96bcedc01e4f091f", "security_group_id": "f1011420-9b2a-474b-aeab-3ff09c0e18c0", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f1011420-9b2a-474b-aeab-3ff09c0e18c0", "description": null, "tags": [], "created_at": "2020-12-14T02:20:32Z", "updated_at": "2020-12-14T02:20:32Z", "revision_number": 0, "project_id": "f10b46c459c54d6d96bcedc01e4f091f"}], "tags": [], "created_at": "2020-12-14T02:20:32Z", "updated_at": "2020-12-14T02:20:32Z", "revision_number": 1, "project_id": "f10b46c459c54d6d96bcedc01e4f091f"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:33.059 193 INFO tempest.lib.common.rest_client [req-4b6e4a4a-c4a4-462a-bc78-ea04fcd5c7ab ] Request (VolumesBackupsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/f1011420-9b2a-474b-aeab-3ff09c0e18c0 0.116s 2020-12-14 02:20:33.062 193 DEBUG tempest.lib.common.rest_client [req-4b6e4a4a-c4a4-462a-bc78-ea04fcd5c7ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-4b6e4a4a-c4a4-462a-bc78-ea04fcd5c7ab', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:20:33 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/f1011420-9b2a-474b-aeab-3ff09c0e18c0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:33.199 193 INFO tempest.lib.common.rest_client [req-43a8f3d5-4f26-4779-9acb-cc255917e9c6 ] Request (VolumesBackupsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f 0.132s 2020-12-14 02:20:33.202 193 DEBUG tempest.lib.common.rest_client [req-43a8f3d5-4f26-4779-9acb-cc255917e9c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43a8f3d5-4f26-4779-9acb-cc255917e9c6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f10b46c459c54d6d96bcedc01e4f091f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:33.242 197 INFO tempest.lib.common.rest_client [req-18a7cf28-3cde-4e48-acea-8b979b854c07 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.282s 2020-12-14 02:20:33.245 197 DEBUG tempest.lib.common.rest_client [req-18a7cf28-3cde-4e48-acea-8b979b854c07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-18a7cf28-3cde-4e48-acea-8b979b854c07', 'x-compute-request-id': 'req-18a7cf28-3cde-4e48-acea-8b979b854c07', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:33.303 189 INFO tempest.lib.common.rest_client [req-f934e501-ef05-4371-8624-19a1b1e0d553 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.262s 2020-12-14 02:20:33.306 189 DEBUG tempest.lib.common.rest_client [req-f934e501-ef05-4371-8624-19a1b1e0d553 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f934e501-ef05-4371-8624-19a1b1e0d553', 'x-compute-request-id': 'req-f934e501-ef05-4371-8624-19a1b1e0d553', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:34.080 186 INFO tempest.lib.common.rest_client [req-a28efaad-76b4-473c-bca9-2c75d989bc52 ] Request (VolumesActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74 0.095s 2020-12-14 02:20:34.082 186 DEBUG tempest.lib.common.rest_client [req-a28efaad-76b4-473c-bca9-2c75d989bc52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a28efaad-76b4-473c-bca9-2c75d989bc52', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a28efaad-76b4-473c-bca9-2c75d989bc52', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74'} Body: b'{"volume": {"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:33.000000", "updated_at": "2020-12-14T02:20:33.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1568188414", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:34.178 186 INFO tempest.common.waiters [-] volume 4ea6b478-822c-4a36-97eb-50a679c8aa74 reached available after waiting for 2.178084 seconds 2020-12-14 02:20:34.186 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:34.205 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_actions:attach, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:34.378 186 INFO tempest.lib.common.rest_client [req-0b21a847-e31d-432f-9cea-4b01c06486a5 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:20:34.381 186 DEBUG tempest.lib.common.rest_client [req-0b21a847-e31d-432f-9cea-4b01c06486a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b21a847-e31d-432f-9cea-4b01c06486a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["Vl_UJx_GS0OADzz293x0jQ"], "expires_at": "2020-12-14T03:20:34.000000Z", "issued_at": "2020-12-14T02:20:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:34.386 186 INFO tempest.lib.common.fixed_network [-] (VolumesActionsV3RbacTest:test_attach_volume_to_instance) Found network {'id': '54c4a38a-1e6f-45c8-b018-54fcb643111b', 'name': 'tempest-VolumesActionsV3RbacTest-639497835-network', 'tenant_id': '3477ecc8785a4bd49948e0b216b9f219', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3477ecc8785a4bd49948e0b216b9f219', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 61, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:20:19Z', 'updated_at': '2020-12-14T02:20:19Z', 'revision_number': 1} available for tenant 2020-12-14 02:20:34.678 189 INFO tempest.lib.common.rest_client [req-fad9061a-4102-4fd4-933f-4b91f3049991 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.261s 2020-12-14 02:20:34.682 189 DEBUG tempest.lib.common.rest_client [req-fad9061a-4102-4fd4-933f-4b91f3049991 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fad9061a-4102-4fd4-933f-4b91f3049991', 'x-compute-request-id': 'req-fad9061a-4102-4fd4-933f-4b91f3049991', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:34.843 197 INFO tempest.lib.common.rest_client [req-bc013b2b-bbc7-43f8-8f5b-4e1d3ee6ae07 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.464s 2020-12-14 02:20:34.846 197 DEBUG tempest.lib.common.rest_client [req-bc013b2b-bbc7-43f8-8f5b-4e1d3ee6ae07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bc013b2b-bbc7-43f8-8f5b-4e1d3ee6ae07', 'x-compute-request-id': 'req-bc013b2b-bbc7-43f8-8f5b-4e1d3ee6ae07', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:35.243 186 INFO tempest.lib.common.rest_client [req-768db22e-5ffd-4e4f-8193-1e491a8a8ca1 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 202 POST http://172.30.13.94/compute/v2.1/servers 0.847s 2020-12-14 02:20:35.245 186 DEBUG tempest.lib.common.rest_client [req-768db22e-5ffd-4e4f-8193-1e491a8a8ca1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-tempest.common.compute-instance-2006968408", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "54c4a38a-1e6f-45c8-b018-54fcb643111b"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-768db22e-5ffd-4e4f-8193-1e491a8a8ca1', 'x-compute-request-id': 'req-768db22e-5ffd-4e4f-8193-1e491a8a8ca1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "57982a7c-50c8-40ba-92d8-c2b7d8076851", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "AnWJXaY2F6yZ"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:35.393 186 INFO tempest.lib.common.rest_client [req-b722cc34-ef0b-4463-b23d-989c0f45c4a2 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851 0.107s 2020-12-14 02:20:35.397 186 DEBUG tempest.lib.common.rest_client [req-b722cc34-ef0b-4463-b23d-989c0f45c4a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1400', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b722cc34-ef0b-4463-b23d-989c0f45c4a2', 'x-compute-request-id': 'req-b722cc34-ef0b-4463-b23d-989c0f45c4a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851'} Body: b'{"server": {"id": "57982a7c-50c8-40ba-92d8-c2b7d8076851", "name": "tempest-tempest.common.compute-instance-2006968408", "status": "BUILD", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:20:35Z", "updated": "2020-12-14T02:20:35Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:36.099 189 INFO tempest.lib.common.rest_client [req-f2411a68-e5bf-4e7f-bd7d-46a951d955b1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.308s 2020-12-14 02:20:36.103 189 DEBUG tempest.lib.common.rest_client [req-f2411a68-e5bf-4e7f-bd7d-46a951d955b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f2411a68-e5bf-4e7f-bd7d-46a951d955b1', 'x-compute-request-id': 'req-f2411a68-e5bf-4e7f-bd7d-46a951d955b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:36.170 197 INFO tempest.lib.common.rest_client [req-ae139f94-4d73-4a7c-b073-148428872544 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.220s 2020-12-14 02:20:36.174 197 DEBUG tempest.lib.common.rest_client [req-ae139f94-4d73-4a7c-b073-148428872544 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ae139f94-4d73-4a7c-b073-148428872544', 'x-compute-request-id': 'req-ae139f94-4d73-4a7c-b073-148428872544', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:36.680 186 INFO tempest.lib.common.rest_client [req-328e5972-341d-40c0-abfa-4a3bae39565f ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851 0.158s 2020-12-14 02:20:36.683 186 DEBUG tempest.lib.common.rest_client [req-328e5972-341d-40c0-abfa-4a3bae39565f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1487', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-328e5972-341d-40c0-abfa-4a3bae39565f', 'x-compute-request-id': 'req-328e5972-341d-40c0-abfa-4a3bae39565f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851'} Body: b'{"server": {"id": "57982a7c-50c8-40ba-92d8-c2b7d8076851", "name": "tempest-tempest.common.compute-instance-2006968408", "status": "BUILD", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:20:35Z", "updated": "2020-12-14T02:20:36Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:36.783 186 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 1 second wait 2020-12-14 02:20:37.433 189 INFO tempest.lib.common.rest_client [req-7c8a6ed5-522b-420f-baa4-759ae3a3eb61 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.223s 2020-12-14 02:20:37.436 189 DEBUG tempest.lib.common.rest_client [req-7c8a6ed5-522b-420f-baa4-759ae3a3eb61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7c8a6ed5-522b-420f-baa4-759ae3a3eb61', 'x-compute-request-id': 'req-7c8a6ed5-522b-420f-baa4-759ae3a3eb61', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:37.488 197 INFO tempest.lib.common.rest_client [req-331d6d2c-9089-4d15-9d27-3644732a063d ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.208s 2020-12-14 02:20:37.491 197 DEBUG tempest.lib.common.rest_client [req-331d6d2c-9089-4d15-9d27-3644732a063d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-331d6d2c-9089-4d15-9d27-3644732a063d', 'x-compute-request-id': 'req-331d6d2c-9089-4d15-9d27-3644732a063d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:38.032 186 INFO tempest.lib.common.rest_client [req-34a9a25d-d1c6-44d4-a025-e6b28fb6ceed ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851 0.240s 2020-12-14 02:20:38.036 186 DEBUG tempest.lib.common.rest_client [req-34a9a25d-d1c6-44d4-a025-e6b28fb6ceed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-34a9a25d-d1c6-44d4-a025-e6b28fb6ceed', 'x-compute-request-id': 'req-34a9a25d-d1c6-44d4-a025-e6b28fb6ceed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851'} Body: b'{"server": {"id": "57982a7c-50c8-40ba-92d8-c2b7d8076851", "name": "tempest-tempest.common.compute-instance-2006968408", "status": "BUILD", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:20:35Z", "updated": "2020-12-14T02:20:37Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:38.151 186 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 3 second wait 2020-12-14 02:20:38.745 189 INFO tempest.lib.common.rest_client [req-a995c2b6-23fe-4313-818c-2086b3846d5d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.200s 2020-12-14 02:20:38.747 189 DEBUG tempest.lib.common.rest_client [req-a995c2b6-23fe-4313-818c-2086b3846d5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a995c2b6-23fe-4313-818c-2086b3846d5d', 'x-compute-request-id': 'req-a995c2b6-23fe-4313-818c-2086b3846d5d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:38.797 197 INFO tempest.lib.common.rest_client [req-3eb58945-4bc0-49d3-bb91-894c5de33af1 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.196s 2020-12-14 02:20:38.800 197 DEBUG tempest.lib.common.rest_client [req-3eb58945-4bc0-49d3-bb91-894c5de33af1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3eb58945-4bc0-49d3-bb91-894c5de33af1', 'x-compute-request-id': 'req-3eb58945-4bc0-49d3-bb91-894c5de33af1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:39.457 186 INFO tempest.lib.common.rest_client [req-d8313a85-589c-4ffe-8a56-325906760500 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851 0.297s 2020-12-14 02:20:39.461 186 DEBUG tempest.lib.common.rest_client [req-d8313a85-589c-4ffe-8a56-325906760500 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d8313a85-589c-4ffe-8a56-325906760500', 'x-compute-request-id': 'req-d8313a85-589c-4ffe-8a56-325906760500', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851'} Body: b'{"server": {"id": "57982a7c-50c8-40ba-92d8-c2b7d8076851", "name": "tempest-tempest.common.compute-instance-2006968408", "status": "BUILD", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:20:35Z", "updated": "2020-12-14T02:20:37Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:40.164 189 INFO tempest.lib.common.rest_client [req-c97bbc77-8f55-4865-a398-12100176b542 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.311s 2020-12-14 02:20:40.165 197 INFO tempest.lib.common.rest_client [req-ce9fd880-7652-40fe-97ef-76e767c84ec4 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.255s 2020-12-14 02:20:40.167 189 DEBUG tempest.lib.common.rest_client [req-c97bbc77-8f55-4865-a398-12100176b542 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c97bbc77-8f55-4865-a398-12100176b542', 'x-compute-request-id': 'req-c97bbc77-8f55-4865-a398-12100176b542', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:40.168 197 DEBUG tempest.lib.common.rest_client [req-ce9fd880-7652-40fe-97ef-76e767c84ec4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ce9fd880-7652-40fe-97ef-76e767c84ec4', 'x-compute-request-id': 'req-ce9fd880-7652-40fe-97ef-76e767c84ec4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:40.789 186 INFO tempest.lib.common.rest_client [req-0fa515f0-33db-47af-af5f-64103a600bf9 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851 0.223s 2020-12-14 02:20:40.791 186 DEBUG tempest.lib.common.rest_client [req-0fa515f0-33db-47af-af5f-64103a600bf9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0fa515f0-33db-47af-af5f-64103a600bf9', 'x-compute-request-id': 'req-0fa515f0-33db-47af-af5f-64103a600bf9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851'} Body: b'{"server": {"id": "57982a7c-50c8-40ba-92d8-c2b7d8076851", "name": "tempest-tempest.common.compute-instance-2006968408", "status": "BUILD", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:20:35Z", "updated": "2020-12-14T02:20:37Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:41.579 197 INFO tempest.lib.common.rest_client [req-5088fbd8-07ac-49c4-a228-889237dfa908 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.302s 2020-12-14 02:20:41.581 197 DEBUG tempest.lib.common.rest_client [req-5088fbd8-07ac-49c4-a228-889237dfa908 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5088fbd8-07ac-49c4-a228-889237dfa908', 'x-compute-request-id': 'req-5088fbd8-07ac-49c4-a228-889237dfa908', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:41.582 189 INFO tempest.lib.common.rest_client [req-bdf951d8-9615-4469-8910-3c1eeaa69417 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.309s 2020-12-14 02:20:41.586 189 DEBUG tempest.lib.common.rest_client [req-bdf951d8-9615-4469-8910-3c1eeaa69417 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bdf951d8-9615-4469-8910-3c1eeaa69417', 'x-compute-request-id': 'req-bdf951d8-9615-4469-8910-3c1eeaa69417', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:42.168 186 INFO tempest.lib.common.rest_client [req-f9bca14c-d690-41d9-8c28-63a130d426a3 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851 0.267s 2020-12-14 02:20:42.171 186 DEBUG tempest.lib.common.rest_client [req-f9bca14c-d690-41d9-8c28-63a130d426a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1535', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f9bca14c-d690-41d9-8c28-63a130d426a3', 'x-compute-request-id': 'req-f9bca14c-d690-41d9-8c28-63a130d426a3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851'} Body: b'{"server": {"id": "57982a7c-50c8-40ba-92d8-c2b7d8076851", "name": "tempest-tempest.common.compute-instance-2006968408", "status": "BUILD", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:20:35Z", "updated": "2020-12-14T02:20:37Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:42.884 197 INFO tempest.lib.common.rest_client [req-2eb86cec-1a94-444b-bdfe-22efb90fcc50 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.221s 2020-12-14 02:20:42.887 197 DEBUG tempest.lib.common.rest_client [req-2eb86cec-1a94-444b-bdfe-22efb90fcc50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2eb86cec-1a94-444b-bdfe-22efb90fcc50', 'x-compute-request-id': 'req-2eb86cec-1a94-444b-bdfe-22efb90fcc50', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:42.923 189 INFO tempest.lib.common.rest_client [req-7b9b0ac1-9992-48e2-948e-a1514478931e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.229s 2020-12-14 02:20:42.926 189 DEBUG tempest.lib.common.rest_client [req-7b9b0ac1-9992-48e2-948e-a1514478931e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7b9b0ac1-9992-48e2-948e-a1514478931e', 'x-compute-request-id': 'req-7b9b0ac1-9992-48e2-948e-a1514478931e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:43.495 186 INFO tempest.lib.common.rest_client [req-a986109c-0eb2-4894-8b7f-3033883474e5 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851 0.222s 2020-12-14 02:20:43.498 186 DEBUG tempest.lib.common.rest_client [req-a986109c-0eb2-4894-8b7f-3033883474e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a986109c-0eb2-4894-8b7f-3033883474e5', 'x-compute-request-id': 'req-a986109c-0eb2-4894-8b7f-3033883474e5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851'} Body: b'{"server": {"id": "57982a7c-50c8-40ba-92d8-c2b7d8076851", "name": "tempest-tempest.common.compute-instance-2006968408", "status": "ACTIVE", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:20:35Z", "updated": "2020-12-14T02:20:43Z", "addresses": {"tempest-VolumesActionsV3RbacTest-639497835-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:33:35:e1"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:20:42.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:43.570 186 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 8 second wait 2020-12-14 02:20:43.572 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:43.697 186 INFO tempest.lib.common.rest_client [req-83c05df2-595f-4624-ba7a-aeca9fbd1de3 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.120s 2020-12-14 02:20:43.701 186 DEBUG tempest.lib.common.rest_client [req-83c05df2-595f-4624-ba7a-aeca9fbd1de3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83c05df2-595f-4624-ba7a-aeca9fbd1de3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:43.747 186 INFO tempest.lib.common.rest_client [req-e96b3004-ab60-478a-8058-0a2a904c2744 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:20:43.750 186 DEBUG tempest.lib.common.rest_client [req-e96b3004-ab60-478a-8058-0a2a904c2744 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e96b3004-ab60-478a-8058-0a2a904c2744', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["PhiRNvI4RluOxWWsWEHWuA"], "expires_at": "2020-12-14T03:20:43.000000Z", "issued_at": "2020-12-14T02:20:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:44.219 197 INFO tempest.lib.common.rest_client [req-2ba4cd5f-1378-42cb-81a0-c9c9c5971e03 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.223s 2020-12-14 02:20:44.223 197 DEBUG tempest.lib.common.rest_client [req-2ba4cd5f-1378-42cb-81a0-c9c9c5971e03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2ba4cd5f-1378-42cb-81a0-c9c9c5971e03', 'x-compute-request-id': 'req-2ba4cd5f-1378-42cb-81a0-c9c9c5971e03', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:44.268 186 INFO tempest.lib.common.rest_client [req-30214e7a-6a8c-4882-aa67-d1b613b96f5a ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 POST http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851/os-volume_attachments 0.511s 2020-12-14 02:20:44.271 186 DEBUG tempest.lib.common.rest_client [req-30214e7a-6a8c-4882-aa67-d1b613b96f5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volumeAttachment": {"volumeId": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "device": "/dev/sdb"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-30214e7a-6a8c-4882-aa67-d1b613b96f5a', 'x-compute-request-id': 'req-30214e7a-6a8c-4882-aa67-d1b613b96f5a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851/os-volume_attachments'} Body: b'{"volumeAttachment": {"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "serverId": "57982a7c-50c8-40ba-92d8-c2b7d8076851", "volumeId": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "device": "/dev/sdb"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:44.287 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:44.319 189 INFO tempest.lib.common.rest_client [req-407abe4f-439a-4a12-ab43-61dd9d0e2b4a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.288s 2020-12-14 02:20:44.321 189 DEBUG tempest.lib.common.rest_client [req-407abe4f-439a-4a12-ab43-61dd9d0e2b4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-407abe4f-439a-4a12-ab43-61dd9d0e2b4a', 'x-compute-request-id': 'req-407abe4f-439a-4a12-ab43-61dd9d0e2b4a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:44.358 186 INFO tempest.lib.common.rest_client [req-a4c74d38-dfc5-430a-97ad-a73ba6edc594 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.067s 2020-12-14 02:20:44.361 186 DEBUG tempest.lib.common.rest_client [req-a4c74d38-dfc5-430a-97ad-a73ba6edc594 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a4c74d38-dfc5-430a-97ad-a73ba6edc594', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:44.418 186 INFO tempest.lib.common.rest_client [req-4766468d-4e2f-47ae-96e7-1d6121a8499a ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:20:44.421 186 DEBUG tempest.lib.common.rest_client [req-4766468d-4e2f-47ae-96e7-1d6121a8499a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4766468d-4e2f-47ae-96e7-1d6121a8499a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["06zg06eDRDCQcDreQPVYPA"], "expires_at": "2020-12-14T03:20:44.000000Z", "issued_at": "2020-12-14T02:20:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:44.623 186 INFO tempest.lib.common.rest_client [req-fdcb2d2d-9976-4590-8b17-6c154448adf0 ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74 0.185s 2020-12-14 02:20:44.627 186 DEBUG tempest.lib.common.rest_client [req-fdcb2d2d-9976-4590-8b17-6c154448adf0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fdcb2d2d-9976-4590-8b17-6c154448adf0', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fdcb2d2d-9976-4590-8b17-6c154448adf0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74'} Body: b'{"volume": {"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "status": "reserved", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:33.000000", "updated_at": "2020-12-14T02:20:44.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1568188414", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:45.581 197 INFO tempest.lib.common.rest_client [req-15715927-09a6-4f4a-8321-a8694eefb2b7 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.248s 2020-12-14 02:20:45.585 197 DEBUG tempest.lib.common.rest_client [req-15715927-09a6-4f4a-8321-a8694eefb2b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-15715927-09a6-4f4a-8321-a8694eefb2b7', 'x-compute-request-id': 'req-15715927-09a6-4f4a-8321-a8694eefb2b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:45.639 189 INFO tempest.lib.common.rest_client [req-50ee72cd-5e86-49ff-bd88-fa1204ca55e8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.209s 2020-12-14 02:20:45.642 189 DEBUG tempest.lib.common.rest_client [req-50ee72cd-5e86-49ff-bd88-fa1204ca55e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-50ee72cd-5e86-49ff-bd88-fa1204ca55e8', 'x-compute-request-id': 'req-50ee72cd-5e86-49ff-bd88-fa1204ca55e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:45.815 186 INFO tempest.lib.common.rest_client [req-acc1a437-b1e3-4ff6-a7bc-9fd56c2c6e3b ] Request (VolumesActionsV3RbacTest:test_attach_volume_to_instance): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74 0.090s 2020-12-14 02:20:45.819 186 DEBUG tempest.lib.common.rest_client [req-acc1a437-b1e3-4ff6-a7bc-9fd56c2c6e3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-acc1a437-b1e3-4ff6-a7bc-9fd56c2c6e3b', 'content-length': '1369', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-acc1a437-b1e3-4ff6-a7bc-9fd56c2c6e3b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74'} Body: b'{"volume": {"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:33.000000", "updated_at": "2020-12-14T02:20:45.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1568188414", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "attachment_id": "6c72b962-0022-45ba-a68d-9fbd015418c7", "volume_id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "server_id": "57982a7c-50c8-40ba-92d8-c2b7d8076851", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-12-14T02:20:45.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:45.912 186 INFO tempest.common.waiters [-] volume 4ea6b478-822c-4a36-97eb-50a679c8aa74 reached in-use after waiting for 1.912382 seconds 2020-12-14 02:20:46.090 186 INFO tempest.lib.common.rest_client [req-5ee11269-5707-4e86-b0b7-b5a0eb5c80cf ] Request (VolumesActionsV3RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74/action 0.170s 2020-12-14 02:20:46.094 186 DEBUG tempest.lib.common.rest_client [req-5ee11269-5707-4e86-b0b7-b5a0eb5c80cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-detach": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-5ee11269-5707-4e86-b0b7-b5a0eb5c80cf', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5ee11269-5707-4e86-b0b7-b5a0eb5c80cf', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:46.183 186 INFO tempest.lib.common.rest_client [req-c8f7ce02-a567-4d64-b4c3-ae19a263a476 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74 0.081s 2020-12-14 02:20:46.186 186 DEBUG tempest.lib.common.rest_client [req-c8f7ce02-a567-4d64-b4c3-ae19a263a476 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c8f7ce02-a567-4d64-b4c3-ae19a263a476', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c8f7ce02-a567-4d64-b4c3-ae19a263a476', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74'} Body: b'{"volume": {"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:33.000000", "updated_at": "2020-12-14T02:20:45.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1568188414", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:46.276 186 INFO tempest.common.waiters [-] volume 4ea6b478-822c-4a36-97eb-50a679c8aa74 reached available after waiting for 0.276390 seconds 2020-12-14 02:20:46.458 186 INFO tempest.lib.common.rest_client [req-4856513e-04f9-4ffa-809e-346554607954 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851 0.174s 2020-12-14 02:20:46.462 186 DEBUG tempest.lib.common.rest_client [req-4856513e-04f9-4ffa-809e-346554607954 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4856513e-04f9-4ffa-809e-346554607954', 'x-compute-request-id': 'req-4856513e-04f9-4ffa-809e-346554607954', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:46.692 186 INFO tempest.lib.common.rest_client [req-3677c73e-c02f-41c3-ae90-c031016f6449 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851 0.224s 2020-12-14 02:20:46.694 186 DEBUG tempest.lib.common.rest_client [req-3677c73e-c02f-41c3-ae90-c031016f6449 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1775', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3677c73e-c02f-41c3-ae90-c031016f6449', 'x-compute-request-id': 'req-3677c73e-c02f-41c3-ae90-c031016f6449', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851'} Body: b'{"server": {"id": "57982a7c-50c8-40ba-92d8-c2b7d8076851", "name": "tempest-tempest.common.compute-instance-2006968408", "status": "ACTIVE", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:20:35Z", "updated": "2020-12-14T02:20:46Z", "addresses": {"tempest-VolumesActionsV3RbacTest-639497835-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:33:35:e1"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:20:42.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:46.967 189 INFO tempest.lib.common.rest_client [req-3a43bc52-e611-4d14-a1f3-87dcaa6b6ccc ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.220s 2020-12-14 02:20:46.970 189 DEBUG tempest.lib.common.rest_client [req-3a43bc52-e611-4d14-a1f3-87dcaa6b6ccc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3a43bc52-e611-4d14-a1f3-87dcaa6b6ccc', 'x-compute-request-id': 'req-3a43bc52-e611-4d14-a1f3-87dcaa6b6ccc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:47.040 197 INFO tempest.lib.common.rest_client [req-56a171cd-f168-4fdf-a6eb-f16e86101a08 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.347s 2020-12-14 02:20:47.045 197 DEBUG tempest.lib.common.rest_client [req-56a171cd-f168-4fdf-a6eb-f16e86101a08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-56a171cd-f168-4fdf-a6eb-f16e86101a08', 'x-compute-request-id': 'req-56a171cd-f168-4fdf-a6eb-f16e86101a08', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:47.971 186 INFO tempest.lib.common.rest_client [req-d944ae10-6655-4170-bbf1-a8053752265b ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851 0.167s 2020-12-14 02:20:47.974 186 DEBUG tempest.lib.common.rest_client [req-d944ae10-6655-4170-bbf1-a8053752265b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1733', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d944ae10-6655-4170-bbf1-a8053752265b', 'x-compute-request-id': 'req-d944ae10-6655-4170-bbf1-a8053752265b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851'} Body: b'{"server": {"id": "57982a7c-50c8-40ba-92d8-c2b7d8076851", "name": "tempest-tempest.common.compute-instance-2006968408", "status": "ACTIVE", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:20:35Z", "updated": "2020-12-14T02:20:47Z", "addresses": {"tempest-VolumesActionsV3RbacTest-639497835-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:33:35:e1"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:20:42.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd8", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:48.324 189 INFO tempest.lib.common.rest_client [req-5035625b-1b10-4b57-a793-c6722e171eb4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.239s 2020-12-14 02:20:48.326 189 DEBUG tempest.lib.common.rest_client [req-5035625b-1b10-4b57-a793-c6722e171eb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5035625b-1b10-4b57-a793-c6722e171eb4', 'x-compute-request-id': 'req-5035625b-1b10-4b57-a793-c6722e171eb4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:48.382 197 INFO tempest.lib.common.rest_client [req-e13cfc03-920d-46c9-b709-00e10d990d51 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.227s 2020-12-14 02:20:48.387 197 DEBUG tempest.lib.common.rest_client [req-e13cfc03-920d-46c9-b709-00e10d990d51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e13cfc03-920d-46c9-b709-00e10d990d51', 'x-compute-request-id': 'req-e13cfc03-920d-46c9-b709-00e10d990d51', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:49.162 186 INFO tempest.lib.common.rest_client [req-a8846a67-fa3d-4d5a-bd87-d4de2668d9d3 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851 0.078s 2020-12-14 02:20:49.165 186 DEBUG tempest.lib.common.rest_client [req-a8846a67-fa3d-4d5a-bd87-d4de2668d9d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-a8846a67-fa3d-4d5a-bd87-d4de2668d9d3', 'x-compute-request-id': 'req-a8846a67-fa3d-4d5a-bd87-d4de2668d9d3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/57982a7c-50c8-40ba-92d8-c2b7d8076851'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 57982a7c-50c8-40ba-92d8-c2b7d8076851 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:49.189 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:20:49.208 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_actions:detach, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:20:49.328 186 INFO tempest.lib.common.rest_client [req-f3bf4112-4731-4884-89b4-9a4ae1aab0a4 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:20:49.333 186 DEBUG tempest.lib.common.rest_client [req-f3bf4112-4731-4884-89b4-9a4ae1aab0a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3bf4112-4731-4884-89b4-9a4ae1aab0a4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["Mw_GAwRCSJu6UimO4qAjoA"], "expires_at": "2020-12-14T03:20:49.000000Z", "issued_at": "2020-12-14T02:20:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:49.339 186 INFO tempest.lib.common.fixed_network [-] (VolumesActionsV3RbacTest:test_detach_volume_from_instance) Found network {'id': '54c4a38a-1e6f-45c8-b018-54fcb643111b', 'name': 'tempest-VolumesActionsV3RbacTest-639497835-network', 'tenant_id': '3477ecc8785a4bd49948e0b216b9f219', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3477ecc8785a4bd49948e0b216b9f219', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 61, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:20:19Z', 'updated_at': '2020-12-14T02:20:19Z', 'revision_number': 1} available for tenant 2020-12-14 02:20:49.728 189 INFO tempest.lib.common.rest_client [req-8f900d5e-dbb6-4392-b365-521b240e87e1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.294s 2020-12-14 02:20:49.731 189 DEBUG tempest.lib.common.rest_client [req-8f900d5e-dbb6-4392-b365-521b240e87e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8f900d5e-dbb6-4392-b365-521b240e87e1', 'x-compute-request-id': 'req-8f900d5e-dbb6-4392-b365-521b240e87e1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:49.736 197 INFO tempest.lib.common.rest_client [req-53559b19-741c-43ad-8238-26d17235ae5b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.240s 2020-12-14 02:20:49.739 197 DEBUG tempest.lib.common.rest_client [req-53559b19-741c-43ad-8238-26d17235ae5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-53559b19-741c-43ad-8238-26d17235ae5b', 'x-compute-request-id': 'req-53559b19-741c-43ad-8238-26d17235ae5b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:50.121 186 INFO tempest.lib.common.rest_client [req-07cd92a5-1a89-445b-a79a-533a121f482b ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 202 POST http://172.30.13.94/compute/v2.1/servers 0.773s 2020-12-14 02:20:50.124 186 DEBUG tempest.lib.common.rest_client [req-07cd92a5-1a89-445b-a79a-533a121f482b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-tempest.common.compute-instance-816472105", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "54c4a38a-1e6f-45c8-b018-54fcb643111b"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-07cd92a5-1a89-445b-a79a-533a121f482b', 'x-compute-request-id': 'req-07cd92a5-1a89-445b-a79a-533a121f482b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "11eec41a-5407-4470-8058-ebf58f47533d", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/11eec41a-5407-4470-8058-ebf58f47533d"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "SsE4DetePBxS"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:50.259 186 INFO tempest.lib.common.rest_client [req-d931b70c-95e8-4b34-8aa4-f13eaf61b80a ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d 0.104s 2020-12-14 02:20:50.263 186 DEBUG tempest.lib.common.rest_client [req-d931b70c-95e8-4b34-8aa4-f13eaf61b80a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1399', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d931b70c-95e8-4b34-8aa4-f13eaf61b80a', 'x-compute-request-id': 'req-d931b70c-95e8-4b34-8aa4-f13eaf61b80a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d'} Body: b'{"server": {"id": "11eec41a-5407-4470-8058-ebf58f47533d", "name": "tempest-tempest.common.compute-instance-816472105", "status": "BUILD", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:20:50Z", "updated": "2020-12-14T02:20:50Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/11eec41a-5407-4470-8058-ebf58f47533d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:51.055 197 INFO tempest.lib.common.rest_client [req-7311430c-c817-4f3a-b70a-081e9c63beaf ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.212s 2020-12-14 02:20:51.058 197 DEBUG tempest.lib.common.rest_client [req-7311430c-c817-4f3a-b70a-081e9c63beaf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7311430c-c817-4f3a-b70a-081e9c63beaf', 'x-compute-request-id': 'req-7311430c-c817-4f3a-b70a-081e9c63beaf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:51.233 189 INFO tempest.lib.common.rest_client [req-ba02e2c3-4885-42df-87b3-196448a2af22 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.397s 2020-12-14 02:20:51.237 189 DEBUG tempest.lib.common.rest_client [req-ba02e2c3-4885-42df-87b3-196448a2af22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ba02e2c3-4885-42df-87b3-196448a2af22', 'x-compute-request-id': 'req-ba02e2c3-4885-42df-87b3-196448a2af22', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:51.525 186 INFO tempest.lib.common.rest_client [req-15b32ec2-be83-4a66-a518-5aecc9e9b1fa ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d 0.154s 2020-12-14 02:20:51.529 186 DEBUG tempest.lib.common.rest_client [req-15b32ec2-be83-4a66-a518-5aecc9e9b1fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1494', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-15b32ec2-be83-4a66-a518-5aecc9e9b1fa', 'x-compute-request-id': 'req-15b32ec2-be83-4a66-a518-5aecc9e9b1fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d'} Body: b'{"server": {"id": "11eec41a-5407-4470-8058-ebf58f47533d", "name": "tempest-tempest.common.compute-instance-816472105", "status": "BUILD", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:20:50Z", "updated": "2020-12-14T02:20:51Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/11eec41a-5407-4470-8058-ebf58f47533d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:51.627 186 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/networking" after 1 second wait 2020-12-14 02:20:52.437 197 INFO tempest.lib.common.rest_client [req-261ec26f-0566-4f3f-95c3-e5c38f4d2e4f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.271s 2020-12-14 02:20:52.439 197 DEBUG tempest.lib.common.rest_client [req-261ec26f-0566-4f3f-95c3-e5c38f4d2e4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-261ec26f-0566-4f3f-95c3-e5c38f4d2e4f', 'x-compute-request-id': 'req-261ec26f-0566-4f3f-95c3-e5c38f4d2e4f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:52.595 189 INFO tempest.lib.common.rest_client [req-064b34ab-d9f3-4858-bfd9-abd3259548d8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.220s 2020-12-14 02:20:52.598 189 DEBUG tempest.lib.common.rest_client [req-064b34ab-d9f3-4858-bfd9-abd3259548d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-064b34ab-d9f3-4858-bfd9-abd3259548d8', 'x-compute-request-id': 'req-064b34ab-d9f3-4858-bfd9-abd3259548d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:52.853 186 INFO tempest.lib.common.rest_client [req-33fab847-ce88-46bb-9a25-804b0f699f9e ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d 0.217s 2020-12-14 02:20:52.857 186 DEBUG tempest.lib.common.rest_client [req-33fab847-ce88-46bb-9a25-804b0f699f9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1534', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-33fab847-ce88-46bb-9a25-804b0f699f9e', 'x-compute-request-id': 'req-33fab847-ce88-46bb-9a25-804b0f699f9e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d'} Body: b'{"server": {"id": "11eec41a-5407-4470-8058-ebf58f47533d", "name": "tempest-tempest.common.compute-instance-816472105", "status": "BUILD", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:20:50Z", "updated": "2020-12-14T02:20:52Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/11eec41a-5407-4470-8058-ebf58f47533d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:52.964 186 INFO tempest.common.waiters [-] State transition "BUILD/networking" ==> "BUILD/spawning" after 2 second wait 2020-12-14 02:20:53.783 197 INFO tempest.lib.common.rest_client [req-a6c87770-6822-401e-8e5d-5eafc778c81c ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.236s 2020-12-14 02:20:53.787 197 DEBUG tempest.lib.common.rest_client [req-a6c87770-6822-401e-8e5d-5eafc778c81c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a6c87770-6822-401e-8e5d-5eafc778c81c', 'x-compute-request-id': 'req-a6c87770-6822-401e-8e5d-5eafc778c81c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:53.938 189 INFO tempest.lib.common.rest_client [req-c51455c1-a2bb-4dc4-8a77-3d8efbe22828 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.235s 2020-12-14 02:20:53.942 189 DEBUG tempest.lib.common.rest_client [req-c51455c1-a2bb-4dc4-8a77-3d8efbe22828 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c51455c1-a2bb-4dc4-8a77-3d8efbe22828', 'x-compute-request-id': 'req-c51455c1-a2bb-4dc4-8a77-3d8efbe22828', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:55.126 197 INFO tempest.lib.common.rest_client [req-5ade4521-35cb-4270-9c3a-e5d0d3000897 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.230s 2020-12-14 02:20:55.130 197 DEBUG tempest.lib.common.rest_client [req-5ade4521-35cb-4270-9c3a-e5d0d3000897 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5ade4521-35cb-4270-9c3a-e5d0d3000897', 'x-compute-request-id': 'req-5ade4521-35cb-4270-9c3a-e5d0d3000897', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:55.290 189 INFO tempest.lib.common.rest_client [req-6c739390-1e28-4352-9b00-96c80ad3b131 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.241s 2020-12-14 02:20:55.294 189 DEBUG tempest.lib.common.rest_client [req-6c739390-1e28-4352-9b00-96c80ad3b131 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6c739390-1e28-4352-9b00-96c80ad3b131', 'x-compute-request-id': 'req-6c739390-1e28-4352-9b00-96c80ad3b131', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:56.480 197 INFO tempest.lib.common.rest_client [req-17e90f4f-c985-478a-a652-7e877e0b762a ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.243s 2020-12-14 02:20:56.483 197 DEBUG tempest.lib.common.rest_client [req-17e90f4f-c985-478a-a652-7e877e0b762a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-17e90f4f-c985-478a-a652-7e877e0b762a', 'x-compute-request-id': 'req-17e90f4f-c985-478a-a652-7e877e0b762a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:56.630 186 INFO tempest.lib.common.rest_client [req-27631ce1-1e55-4c53-9ebf-9c64f1d9c9d8 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d 2.656s 2020-12-14 02:20:56.634 186 DEBUG tempest.lib.common.rest_client [req-27631ce1-1e55-4c53-9ebf-9c64f1d9c9d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1534', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-27631ce1-1e55-4c53-9ebf-9c64f1d9c9d8', 'x-compute-request-id': 'req-27631ce1-1e55-4c53-9ebf-9c64f1d9c9d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d'} Body: b'{"server": {"id": "11eec41a-5407-4470-8058-ebf58f47533d", "name": "tempest-tempest.common.compute-instance-816472105", "status": "BUILD", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:20:50Z", "updated": "2020-12-14T02:20:52Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/11eec41a-5407-4470-8058-ebf58f47533d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:56.643 189 INFO tempest.lib.common.rest_client [req-5f1661a5-6b3c-4a65-b638-e7fed2d6b2d0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.242s 2020-12-14 02:20:56.647 189 DEBUG tempest.lib.common.rest_client [req-5f1661a5-6b3c-4a65-b638-e7fed2d6b2d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5f1661a5-6b3c-4a65-b638-e7fed2d6b2d0', 'x-compute-request-id': 'req-5f1661a5-6b3c-4a65-b638-e7fed2d6b2d0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:57.847 197 INFO tempest.lib.common.rest_client [req-fdf04b6e-da67-4c4a-8e2c-636eba7acc6f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.255s 2020-12-14 02:20:57.851 197 DEBUG tempest.lib.common.rest_client [req-fdf04b6e-da67-4c4a-8e2c-636eba7acc6f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fdf04b6e-da67-4c4a-8e2c-636eba7acc6f', 'x-compute-request-id': 'req-fdf04b6e-da67-4c4a-8e2c-636eba7acc6f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:57.989 186 INFO tempest.lib.common.rest_client [req-35cf3bd2-f46e-4cdb-8e0d-303994d08da7 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d 0.254s 2020-12-14 02:20:57.992 186 DEBUG tempest.lib.common.rest_client [req-35cf3bd2-f46e-4cdb-8e0d-303994d08da7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1722', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-35cf3bd2-f46e-4cdb-8e0d-303994d08da7', 'x-compute-request-id': 'req-35cf3bd2-f46e-4cdb-8e0d-303994d08da7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d'} Body: b'{"server": {"id": "11eec41a-5407-4470-8058-ebf58f47533d", "name": "tempest-tempest.common.compute-instance-816472105", "status": "ACTIVE", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:20:50Z", "updated": "2020-12-14T02:20:57Z", "addresses": {"tempest-VolumesActionsV3RbacTest-639497835-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:a7:48:11"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/11eec41a-5407-4470-8058-ebf58f47533d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:20:57.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:57.999 189 INFO tempest.lib.common.rest_client [req-b18983e6-6915-4be7-9717-19e0b2fb657c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.240s 2020-12-14 02:20:58.005 189 DEBUG tempest.lib.common.rest_client [req-b18983e6-6915-4be7-9717-19e0b2fb657c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b18983e6-6915-4be7-9717-19e0b2fb657c', 'x-compute-request-id': 'req-b18983e6-6915-4be7-9717-19e0b2fb657c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:58.095 186 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 8 second wait 2020-12-14 02:20:58.514 186 INFO tempest.lib.common.rest_client [req-c9238331-4fa9-4601-b438-c8acab5f6da2 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 POST http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d/os-volume_attachments 0.410s 2020-12-14 02:20:58.518 186 DEBUG tempest.lib.common.rest_client [req-c9238331-4fa9-4601-b438-c8acab5f6da2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volumeAttachment": {"volumeId": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "device": "/dev/sdb"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c9238331-4fa9-4601-b438-c8acab5f6da2', 'x-compute-request-id': 'req-c9238331-4fa9-4601-b438-c8acab5f6da2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d/os-volume_attachments'} Body: b'{"volumeAttachment": {"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "serverId": "11eec41a-5407-4470-8058-ebf58f47533d", "volumeId": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "device": "/dev/sdb"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:58.625 186 INFO tempest.lib.common.rest_client [req-735516b5-6bbd-46b6-b9dd-d7ec3222784d ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74 0.082s 2020-12-14 02:20:58.628 186 DEBUG tempest.lib.common.rest_client [req-735516b5-6bbd-46b6-b9dd-d7ec3222784d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-735516b5-6bbd-46b6-b9dd-d7ec3222784d', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-735516b5-6bbd-46b6-b9dd-d7ec3222784d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74'} Body: b'{"volume": {"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "status": "reserved", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:33.000000", "updated_at": "2020-12-14T02:20:58.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1568188414", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:59.179 197 INFO tempest.lib.common.rest_client [req-ed9608ac-f606-4052-839e-bedbe86a119d ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.222s 2020-12-14 02:20:59.183 197 DEBUG tempest.lib.common.rest_client [req-ed9608ac-f606-4052-839e-bedbe86a119d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ed9608ac-f606-4052-839e-bedbe86a119d', 'x-compute-request-id': 'req-ed9608ac-f606-4052-839e-bedbe86a119d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:59.384 189 INFO tempest.lib.common.rest_client [req-3054a553-1a99-4127-8b3e-d8e87950e14d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.264s 2020-12-14 02:20:59.387 189 DEBUG tempest.lib.common.rest_client [req-3054a553-1a99-4127-8b3e-d8e87950e14d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3054a553-1a99-4127-8b3e-d8e87950e14d', 'x-compute-request-id': 'req-3054a553-1a99-4127-8b3e-d8e87950e14d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:59.821 186 INFO tempest.lib.common.rest_client [req-b61d0699-5777-4578-aabc-89b63009241a ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74 0.085s 2020-12-14 02:20:59.824 186 DEBUG tempest.lib.common.rest_client [req-b61d0699-5777-4578-aabc-89b63009241a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b61d0699-5777-4578-aabc-89b63009241a', 'content-length': '1369', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b61d0699-5777-4578-aabc-89b63009241a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74'} Body: b'{"volume": {"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:33.000000", "updated_at": "2020-12-14T02:21:00.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1568188414", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "attachment_id": "317147c8-2704-4591-815d-9e477b2492a4", "volume_id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "server_id": "11eec41a-5407-4470-8058-ebf58f47533d", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-12-14T02:20:59.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:20:59.907 186 INFO tempest.common.waiters [-] volume 4ea6b478-822c-4a36-97eb-50a679c8aa74 reached in-use after waiting for 1.907229 seconds 2020-12-14 02:20:59.909 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:20:59.970 186 INFO tempest.lib.common.rest_client [req-c8a53123-a655-4e4c-b48b-854b1c72f67e ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.056s 2020-12-14 02:20:59.972 186 DEBUG tempest.lib.common.rest_client [req-c8a53123-a655-4e4c-b48b-854b1c72f67e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8a53123-a655-4e4c-b48b-854b1c72f67e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:00.018 186 INFO tempest.lib.common.rest_client [req-c5a29c1c-b371-4ee5-80f3-dd35826c4010 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:21:00.021 186 DEBUG tempest.lib.common.rest_client [req-c5a29c1c-b371-4ee5-80f3-dd35826c4010 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:20:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c5a29c1c-b371-4ee5-80f3-dd35826c4010', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["RnV3vew_TgG_mlqY0kk4xg"], "expires_at": "2020-12-14T03:21:00.000000Z", "issued_at": "2020-12-14T02:21:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:00.250 186 INFO tempest.lib.common.rest_client [req-f22caf6e-7cd9-4fd4-a77c-7bcb550007c7 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74/action 0.222s 2020-12-14 02:21:00.254 186 DEBUG tempest.lib.common.rest_client [req-f22caf6e-7cd9-4fd4-a77c-7bcb550007c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-detach": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-f22caf6e-7cd9-4fd4-a77c-7bcb550007c7', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f22caf6e-7cd9-4fd4-a77c-7bcb550007c7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:00.256 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:00.327 186 INFO tempest.lib.common.rest_client [req-019c79aa-e523-48e7-acbb-e0ad7687c9fe ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.065s 2020-12-14 02:21:00.330 186 DEBUG tempest.lib.common.rest_client [req-019c79aa-e523-48e7-acbb-e0ad7687c9fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-019c79aa-e523-48e7-acbb-e0ad7687c9fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:00.383 186 INFO tempest.lib.common.rest_client [req-a3a143d6-ae34-49fa-bfd0-1144d9d2c0b2 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:21:00.387 186 DEBUG tempest.lib.common.rest_client [req-a3a143d6-ae34-49fa-bfd0-1144d9d2c0b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3a143d6-ae34-49fa-bfd0-1144d9d2c0b2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["DUjk81bqQk-ii3hS501keg"], "expires_at": "2020-12-14T03:21:00.000000Z", "issued_at": "2020-12-14T02:21:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:00.543 186 INFO tempest.lib.common.rest_client [req-58f8fe79-1287-4e4c-9dd1-670631db5d64 ] Request (VolumesActionsV3RbacTest:test_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74 0.147s 2020-12-14 02:21:00.546 186 DEBUG tempest.lib.common.rest_client [req-58f8fe79-1287-4e4c-9dd1-670631db5d64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-58f8fe79-1287-4e4c-9dd1-670631db5d64', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-58f8fe79-1287-4e4c-9dd1-670631db5d64', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74'} Body: b'{"volume": {"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:33.000000", "updated_at": "2020-12-14T02:21:00.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1568188414", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:00.578 197 INFO tempest.lib.common.rest_client [req-81942312-b030-444a-9b1a-1539f4384a8f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.289s 2020-12-14 02:21:00.580 197 DEBUG tempest.lib.common.rest_client [req-81942312-b030-444a-9b1a-1539f4384a8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-81942312-b030-444a-9b1a-1539f4384a8f', 'x-compute-request-id': 'req-81942312-b030-444a-9b1a-1539f4384a8f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:00.638 186 INFO tempest.common.waiters [-] volume 4ea6b478-822c-4a36-97eb-50a679c8aa74 reached available after waiting for 0.638176 seconds 2020-12-14 02:21:00.696 189 INFO tempest.lib.common.rest_client [req-152884f8-446b-4907-b080-82fd26a583bc ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.195s 2020-12-14 02:21:00.699 189 DEBUG tempest.lib.common.rest_client [req-152884f8-446b-4907-b080-82fd26a583bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-152884f8-446b-4907-b080-82fd26a583bc', 'x-compute-request-id': 'req-152884f8-446b-4907-b080-82fd26a583bc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:00.750 186 INFO tempest.lib.common.rest_client [req-bb685001-181e-4d2c-b79f-e5539826a3a4 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74/action 0.103s 2020-12-14 02:21:00.754 186 DEBUG tempest.lib.common.rest_client [req-bb685001-181e-4d2c-b79f-e5539826a3a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-detach": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-bb685001-181e-4d2c-b79f-e5539826a3a4', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bb685001-181e-4d2c-b79f-e5539826a3a4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:00.847 186 INFO tempest.lib.common.rest_client [req-b21c19cc-31a7-4829-a06c-32c4013e98d5 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74 0.084s 2020-12-14 02:21:00.850 186 DEBUG tempest.lib.common.rest_client [req-b21c19cc-31a7-4829-a06c-32c4013e98d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b21c19cc-31a7-4829-a06c-32c4013e98d5', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b21c19cc-31a7-4829-a06c-32c4013e98d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74'} Body: b'{"volume": {"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:33.000000", "updated_at": "2020-12-14T02:21:01.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1568188414", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:00.945 186 INFO tempest.common.waiters [-] volume 4ea6b478-822c-4a36-97eb-50a679c8aa74 reached available after waiting for 0.944952 seconds 2020-12-14 02:21:01.125 186 INFO tempest.lib.common.rest_client [req-8e3c47b7-bde2-4cee-b5b5-dfd6b303abe3 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d 0.172s 2020-12-14 02:21:01.127 186 DEBUG tempest.lib.common.rest_client [req-8e3c47b7-bde2-4cee-b5b5-dfd6b303abe3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8e3c47b7-bde2-4cee-b5b5-dfd6b303abe3', 'x-compute-request-id': 'req-8e3c47b7-bde2-4cee-b5b5-dfd6b303abe3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:01.385 186 INFO tempest.lib.common.rest_client [req-d4de975b-535d-4332-8a22-f7a0b5d651fa ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d 0.250s 2020-12-14 02:21:01.388 186 DEBUG tempest.lib.common.rest_client [req-d4de975b-535d-4332-8a22-f7a0b5d651fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1774', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d4de975b-535d-4332-8a22-f7a0b5d651fa', 'x-compute-request-id': 'req-d4de975b-535d-4332-8a22-f7a0b5d651fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d'} Body: b'{"server": {"id": "11eec41a-5407-4470-8058-ebf58f47533d", "name": "tempest-tempest.common.compute-instance-816472105", "status": "ACTIVE", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:20:50Z", "updated": "2020-12-14T02:21:01Z", "addresses": {"tempest-VolumesActionsV3RbacTest-639497835-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:a7:48:11"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/11eec41a-5407-4470-8058-ebf58f47533d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:20:57.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:01.959 197 INFO tempest.lib.common.rest_client [req-b50e4ff8-aed4-41ee-ba61-24b22a451361 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.270s 2020-12-14 02:21:01.963 197 DEBUG tempest.lib.common.rest_client [req-b50e4ff8-aed4-41ee-ba61-24b22a451361 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b50e4ff8-aed4-41ee-ba61-24b22a451361', 'x-compute-request-id': 'req-b50e4ff8-aed4-41ee-ba61-24b22a451361', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:02.020 189 INFO tempest.lib.common.rest_client [req-4512f8da-0fb5-4310-82dd-7a16f3d36fbe ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.214s 2020-12-14 02:21:02.024 189 DEBUG tempest.lib.common.rest_client [req-4512f8da-0fb5-4310-82dd-7a16f3d36fbe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4512f8da-0fb5-4310-82dd-7a16f3d36fbe', 'x-compute-request-id': 'req-4512f8da-0fb5-4310-82dd-7a16f3d36fbe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:02.719 186 INFO tempest.lib.common.rest_client [req-02c9f4eb-49d3-47f1-8273-f03c8200cc53 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d 0.225s 2020-12-14 02:21:02.722 186 DEBUG tempest.lib.common.rest_client [req-02c9f4eb-49d3-47f1-8273-f03c8200cc53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1774', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-02c9f4eb-49d3-47f1-8273-f03c8200cc53', 'x-compute-request-id': 'req-02c9f4eb-49d3-47f1-8273-f03c8200cc53', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d'} Body: b'{"server": {"id": "11eec41a-5407-4470-8058-ebf58f47533d", "name": "tempest-tempest.common.compute-instance-816472105", "status": "ACTIVE", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:20:50Z", "updated": "2020-12-14T02:21:02Z", "addresses": {"tempest-VolumesActionsV3RbacTest-639497835-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:a7:48:11"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/11eec41a-5407-4470-8058-ebf58f47533d"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:20:57.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd9", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:03.410 197 INFO tempest.lib.common.rest_client [req-1c9940e3-854b-45cb-956f-21b3f74f9f7e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.339s 2020-12-14 02:21:03.414 197 DEBUG tempest.lib.common.rest_client [req-1c9940e3-854b-45cb-956f-21b3f74f9f7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1c9940e3-854b-45cb-956f-21b3f74f9f7e', 'x-compute-request-id': 'req-1c9940e3-854b-45cb-956f-21b3f74f9f7e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:03.414 189 INFO tempest.lib.common.rest_client [req-993330dd-076f-4adf-b03d-3e4c942cee05 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.277s 2020-12-14 02:21:03.418 189 DEBUG tempest.lib.common.rest_client [req-993330dd-076f-4adf-b03d-3e4c942cee05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-993330dd-076f-4adf-b03d-3e4c942cee05', 'x-compute-request-id': 'req-993330dd-076f-4adf-b03d-3e4c942cee05', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:03.923 186 INFO tempest.lib.common.rest_client [req-fcaa49db-9559-4657-b000-eb3f52774fe4 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d 0.088s 2020-12-14 02:21:03.927 186 DEBUG tempest.lib.common.rest_client [req-fcaa49db-9559-4657-b000-eb3f52774fe4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-fcaa49db-9559-4657-b000-eb3f52774fe4', 'x-compute-request-id': 'req-fcaa49db-9559-4657-b000-eb3f52774fe4', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/11eec41a-5407-4470-8058-ebf58f47533d'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 11eec41a-5407-4470-8058-ebf58f47533d could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:03.955 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:21:03.974 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_admin_actions:force_detach, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:21:04.292 186 INFO tempest.lib.common.rest_client [req-7c7afcb1-1d1b-4fb7-8ec6-9f4251a309d2 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes 0.311s 2020-12-14 02:21:04.296 186 DEBUG tempest.lib.common.rest_client [req-7c7afcb1-1d1b-4fb7-8ec6-9f4251a309d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesActionsV3RbacTest-Volume-771435504"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7c7afcb1-1d1b-4fb7-8ec6-9f4251a309d2', 'content-length': '844', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7c7afcb1-1d1b-4fb7-8ec6-9f4251a309d2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes'} Body: b'{"volume": {"id": "2641470e-67a4-44b2-803c-b22beea743a2", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:04.000000", "updated_at": null, "name": "tempest-VolumesActionsV3RbacTest-Volume-771435504", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:04.464 186 INFO tempest.lib.common.rest_client [req-6183c96e-1b80-4590-a9aa-6777c8181997 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2 0.081s 2020-12-14 02:21:04.468 186 DEBUG tempest.lib.common.rest_client [req-6183c96e-1b80-4590-a9aa-6777c8181997 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6183c96e-1b80-4590-a9aa-6777c8181997', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6183c96e-1b80-4590-a9aa-6777c8181997', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2'} Body: b'{"volume": {"id": "2641470e-67a4-44b2-803c-b22beea743a2", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:04.000000", "updated_at": "2020-12-14T02:21:04.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-771435504", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:04.776 197 INFO tempest.lib.common.rest_client [req-b473ee95-a37d-4f1e-b44e-9e4bf8db624e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.255s 2020-12-14 02:21:04.780 197 DEBUG tempest.lib.common.rest_client [req-b473ee95-a37d-4f1e-b44e-9e4bf8db624e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b473ee95-a37d-4f1e-b44e-9e4bf8db624e', 'x-compute-request-id': 'req-b473ee95-a37d-4f1e-b44e-9e4bf8db624e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:04.816 189 INFO tempest.lib.common.rest_client [req-85d309ca-8c73-4571-a771-238410d3c237 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.291s 2020-12-14 02:21:04.819 189 DEBUG tempest.lib.common.rest_client [req-85d309ca-8c73-4571-a771-238410d3c237 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-85d309ca-8c73-4571-a771-238410d3c237', 'x-compute-request-id': 'req-85d309ca-8c73-4571-a771-238410d3c237', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:05.655 186 INFO tempest.lib.common.rest_client [req-4325db46-12a8-4730-9cfd-0509a222789a ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2 0.083s 2020-12-14 02:21:05.658 186 DEBUG tempest.lib.common.rest_client [req-4325db46-12a8-4730-9cfd-0509a222789a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4325db46-12a8-4730-9cfd-0509a222789a', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4325db46-12a8-4730-9cfd-0509a222789a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2'} Body: b'{"volume": {"id": "2641470e-67a4-44b2-803c-b22beea743a2", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:04.000000", "updated_at": "2020-12-14T02:21:05.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-771435504", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:05.748 186 INFO tempest.common.waiters [-] volume 2641470e-67a4-44b2-803c-b22beea743a2 reached available after waiting for 1.748105 seconds 2020-12-14 02:21:05.856 186 INFO tempest.lib.common.rest_client [req-124b73a6-a9bb-4928-a7bd-c4f216370b4a ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:21:05.859 186 DEBUG tempest.lib.common.rest_client [req-124b73a6-a9bb-4928-a7bd-c4f216370b4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-124b73a6-a9bb-4928-a7bd-c4f216370b4a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["Xyz0ffNJSc-9b-etmCbCmQ"], "expires_at": "2020-12-14T03:21:05.000000Z", "issued_at": "2020-12-14T02:21:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:05.864 186 INFO tempest.lib.common.fixed_network [-] (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance) Found network {'id': '54c4a38a-1e6f-45c8-b018-54fcb643111b', 'name': 'tempest-VolumesActionsV3RbacTest-639497835-network', 'tenant_id': '3477ecc8785a4bd49948e0b216b9f219', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3477ecc8785a4bd49948e0b216b9f219', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 61, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:20:19Z', 'updated_at': '2020-12-14T02:20:19Z', 'revision_number': 1} available for tenant 2020-12-14 02:21:06.189 189 INFO tempest.lib.common.rest_client [req-4fe0bc55-5a74-4228-9c72-3097cd029692 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.257s 2020-12-14 02:21:06.193 189 DEBUG tempest.lib.common.rest_client [req-4fe0bc55-5a74-4228-9c72-3097cd029692 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4fe0bc55-5a74-4228-9c72-3097cd029692', 'x-compute-request-id': 'req-4fe0bc55-5a74-4228-9c72-3097cd029692', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:06.389 197 INFO tempest.lib.common.rest_client [req-e7dcd0eb-86cd-4fdf-8beb-0f892f76e578 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.504s 2020-12-14 02:21:06.393 197 DEBUG tempest.lib.common.rest_client [req-e7dcd0eb-86cd-4fdf-8beb-0f892f76e578 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e7dcd0eb-86cd-4fdf-8beb-0f892f76e578', 'x-compute-request-id': 'req-e7dcd0eb-86cd-4fdf-8beb-0f892f76e578', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:06.658 186 INFO tempest.lib.common.rest_client [req-43b52b0a-5021-4c56-a2ad-7ed308b434ab ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 202 POST http://172.30.13.94/compute/v2.1/servers 0.784s 2020-12-14 02:21:06.661 186 DEBUG tempest.lib.common.rest_client [req-43b52b0a-5021-4c56-a2ad-7ed308b434ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-tempest.common.compute-instance-556767863", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "54c4a38a-1e6f-45c8-b018-54fcb643111b"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-43b52b0a-5021-4c56-a2ad-7ed308b434ab', 'x-compute-request-id': 'req-43b52b0a-5021-4c56-a2ad-7ed308b434ab', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "c56c4d9b-24d6-42fe-874c-4f0df1947aa9", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "EwiJ9kM5Qj55"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:06.800 186 INFO tempest.lib.common.rest_client [req-c16cfdcb-6830-4166-a0c6-b35b2f25765d ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9 0.109s 2020-12-14 02:21:06.803 186 DEBUG tempest.lib.common.rest_client [req-c16cfdcb-6830-4166-a0c6-b35b2f25765d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1399', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c16cfdcb-6830-4166-a0c6-b35b2f25765d', 'x-compute-request-id': 'req-c16cfdcb-6830-4166-a0c6-b35b2f25765d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9'} Body: b'{"server": {"id": "c56c4d9b-24d6-42fe-874c-4f0df1947aa9", "name": "tempest-tempest.common.compute-instance-556767863", "status": "BUILD", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:07Z", "updated": "2020-12-14T02:21:06Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:07.648 189 INFO tempest.lib.common.rest_client [req-735dae98-e007-4d98-bc01-04d32aeb8408 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.347s 2020-12-14 02:21:07.651 189 DEBUG tempest.lib.common.rest_client [req-735dae98-e007-4d98-bc01-04d32aeb8408 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-735dae98-e007-4d98-bc01-04d32aeb8408', 'x-compute-request-id': 'req-735dae98-e007-4d98-bc01-04d32aeb8408', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:07.736 197 INFO tempest.lib.common.rest_client [req-5b438adc-1858-4388-aefd-bea89f182c8f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.220s 2020-12-14 02:21:07.740 197 DEBUG tempest.lib.common.rest_client [req-5b438adc-1858-4388-aefd-bea89f182c8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5b438adc-1858-4388-aefd-bea89f182c8f', 'x-compute-request-id': 'req-5b438adc-1858-4388-aefd-bea89f182c8f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:08.127 186 INFO tempest.lib.common.rest_client [req-b6749f07-cffc-4709-b316-04c11c977d0f ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9 0.218s 2020-12-14 02:21:08.130 186 DEBUG tempest.lib.common.rest_client [req-b6749f07-cffc-4709-b316-04c11c977d0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1504', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b6749f07-cffc-4709-b316-04c11c977d0f', 'x-compute-request-id': 'req-b6749f07-cffc-4709-b316-04c11c977d0f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9'} Body: b'{"server": {"id": "c56c4d9b-24d6-42fe-874c-4f0df1947aa9", "name": "tempest-tempest.common.compute-instance-556767863", "status": "BUILD", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:06Z", "updated": "2020-12-14T02:21:08Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbda", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "block_device_mapping", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:08.233 186 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/block_device_mapping" after 2 second wait 2020-12-14 02:21:09.072 189 INFO tempest.lib.common.rest_client [req-3f0d056e-2925-4136-84be-06d88e6824aa ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.311s 2020-12-14 02:21:09.073 197 INFO tempest.lib.common.rest_client [req-57e0db9b-1a1b-4717-9c24-aae283523fb1 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.249s 2020-12-14 02:21:09.075 189 DEBUG tempest.lib.common.rest_client [req-3f0d056e-2925-4136-84be-06d88e6824aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3f0d056e-2925-4136-84be-06d88e6824aa', 'x-compute-request-id': 'req-3f0d056e-2925-4136-84be-06d88e6824aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:09.077 197 DEBUG tempest.lib.common.rest_client [req-57e0db9b-1a1b-4717-9c24-aae283523fb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-57e0db9b-1a1b-4717-9c24-aae283523fb1', 'x-compute-request-id': 'req-57e0db9b-1a1b-4717-9c24-aae283523fb1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:09.428 186 INFO tempest.lib.common.rest_client [req-858fca32-7a95-45a8-84ca-99feb85a81f7 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9 0.186s 2020-12-14 02:21:09.431 186 DEBUG tempest.lib.common.rest_client [req-858fca32-7a95-45a8-84ca-99feb85a81f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1534', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-858fca32-7a95-45a8-84ca-99feb85a81f7', 'x-compute-request-id': 'req-858fca32-7a95-45a8-84ca-99feb85a81f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9'} Body: b'{"server": {"id": "c56c4d9b-24d6-42fe-874c-4f0df1947aa9", "name": "tempest-tempest.common.compute-instance-556767863", "status": "BUILD", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:06Z", "updated": "2020-12-14T02:21:08Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbda", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:09.527 186 INFO tempest.common.waiters [-] State transition "BUILD/block_device_mapping" ==> "BUILD/spawning" after 3 second wait 2020-12-14 02:21:10.410 197 INFO tempest.lib.common.rest_client [req-e2340dee-8321-46e4-b322-951b9a751190 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.224s 2020-12-14 02:21:10.413 197 DEBUG tempest.lib.common.rest_client [req-e2340dee-8321-46e4-b322-951b9a751190 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e2340dee-8321-46e4-b322-951b9a751190', 'x-compute-request-id': 'req-e2340dee-8321-46e4-b322-951b9a751190', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:10.457 189 INFO tempest.lib.common.rest_client [req-62387d63-4f3b-4c7a-9ec3-60776b753738 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.269s 2020-12-14 02:21:10.461 189 DEBUG tempest.lib.common.rest_client [req-62387d63-4f3b-4c7a-9ec3-60776b753738 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-62387d63-4f3b-4c7a-9ec3-60776b753738', 'x-compute-request-id': 'req-62387d63-4f3b-4c7a-9ec3-60776b753738', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:10.740 186 INFO tempest.lib.common.rest_client [req-06c15d0e-9986-4f09-8c50-3361e6eea399 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9 0.204s 2020-12-14 02:21:10.743 186 DEBUG tempest.lib.common.rest_client [req-06c15d0e-9986-4f09-8c50-3361e6eea399 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1534', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-06c15d0e-9986-4f09-8c50-3361e6eea399', 'x-compute-request-id': 'req-06c15d0e-9986-4f09-8c50-3361e6eea399', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9'} Body: b'{"server": {"id": "c56c4d9b-24d6-42fe-874c-4f0df1947aa9", "name": "tempest-tempest.common.compute-instance-556767863", "status": "BUILD", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:06Z", "updated": "2020-12-14T02:21:08Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbda", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:11.772 197 INFO tempest.lib.common.rest_client [req-82ddc70f-9195-48b6-bd17-97d9cd676863 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.250s 2020-12-14 02:21:11.775 197 DEBUG tempest.lib.common.rest_client [req-82ddc70f-9195-48b6-bd17-97d9cd676863 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-82ddc70f-9195-48b6-bd17-97d9cd676863', 'x-compute-request-id': 'req-82ddc70f-9195-48b6-bd17-97d9cd676863', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:11.818 189 INFO tempest.lib.common.rest_client [req-b216ec95-bd41-427e-b1c2-394a9b9ed884 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.245s 2020-12-14 02:21:11.822 189 DEBUG tempest.lib.common.rest_client [req-b216ec95-bd41-427e-b1c2-394a9b9ed884 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b216ec95-bd41-427e-b1c2-394a9b9ed884', 'x-compute-request-id': 'req-b216ec95-bd41-427e-b1c2-394a9b9ed884', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:12.066 186 INFO tempest.lib.common.rest_client [req-c64af71e-19ce-47ab-a5b4-ee837d438e0c ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9 0.217s 2020-12-14 02:21:12.070 186 DEBUG tempest.lib.common.rest_client [req-c64af71e-19ce-47ab-a5b4-ee837d438e0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1534', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c64af71e-19ce-47ab-a5b4-ee837d438e0c', 'x-compute-request-id': 'req-c64af71e-19ce-47ab-a5b4-ee837d438e0c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9'} Body: b'{"server": {"id": "c56c4d9b-24d6-42fe-874c-4f0df1947aa9", "name": "tempest-tempest.common.compute-instance-556767863", "status": "BUILD", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:06Z", "updated": "2020-12-14T02:21:08Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbda", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:13.121 197 INFO tempest.lib.common.rest_client [req-7e9675cd-7ec8-443e-8ec3-0b943bba2a6a ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.236s 2020-12-14 02:21:13.126 197 DEBUG tempest.lib.common.rest_client [req-7e9675cd-7ec8-443e-8ec3-0b943bba2a6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7e9675cd-7ec8-443e-8ec3-0b943bba2a6a', 'x-compute-request-id': 'req-7e9675cd-7ec8-443e-8ec3-0b943bba2a6a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:13.157 189 INFO tempest.lib.common.rest_client [req-da26c949-0470-4b3d-a56c-6d6e0fd120a4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.224s 2020-12-14 02:21:13.160 189 DEBUG tempest.lib.common.rest_client [req-da26c949-0470-4b3d-a56c-6d6e0fd120a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-da26c949-0470-4b3d-a56c-6d6e0fd120a4', 'x-compute-request-id': 'req-da26c949-0470-4b3d-a56c-6d6e0fd120a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:13.415 186 INFO tempest.lib.common.rest_client [req-9463b119-09e6-4bbd-b30e-6187c7c46a24 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9 0.238s 2020-12-14 02:21:13.418 186 DEBUG tempest.lib.common.rest_client [req-9463b119-09e6-4bbd-b30e-6187c7c46a24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1534', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9463b119-09e6-4bbd-b30e-6187c7c46a24', 'x-compute-request-id': 'req-9463b119-09e6-4bbd-b30e-6187c7c46a24', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9'} Body: b'{"server": {"id": "c56c4d9b-24d6-42fe-874c-4f0df1947aa9", "name": "tempest-tempest.common.compute-instance-556767863", "status": "BUILD", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:06Z", "updated": "2020-12-14T02:21:08Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbda", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:14.503 197 INFO tempest.lib.common.rest_client [req-99fa9ab3-4ce0-4b73-b5a8-00828148add3 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.268s 2020-12-14 02:21:14.507 197 DEBUG tempest.lib.common.rest_client [req-99fa9ab3-4ce0-4b73-b5a8-00828148add3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-99fa9ab3-4ce0-4b73-b5a8-00828148add3', 'x-compute-request-id': 'req-99fa9ab3-4ce0-4b73-b5a8-00828148add3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:14.511 189 INFO tempest.lib.common.rest_client [req-7ddab469-65ad-464b-a523-c0220db02955 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.233s 2020-12-14 02:21:14.515 189 DEBUG tempest.lib.common.rest_client [req-7ddab469-65ad-464b-a523-c0220db02955 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7ddab469-65ad-464b-a523-c0220db02955', 'x-compute-request-id': 'req-7ddab469-65ad-464b-a523-c0220db02955', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:14.744 186 INFO tempest.lib.common.rest_client [req-d8302506-ca1c-410c-979f-c42fc0259a5a ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9 0.221s 2020-12-14 02:21:14.746 186 DEBUG tempest.lib.common.rest_client [req-d8302506-ca1c-410c-979f-c42fc0259a5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1722', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d8302506-ca1c-410c-979f-c42fc0259a5a', 'x-compute-request-id': 'req-d8302506-ca1c-410c-979f-c42fc0259a5a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9'} Body: b'{"server": {"id": "c56c4d9b-24d6-42fe-874c-4f0df1947aa9", "name": "tempest-tempest.common.compute-instance-556767863", "status": "ACTIVE", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:06Z", "updated": "2020-12-14T02:21:14Z", "addresses": {"tempest-VolumesActionsV3RbacTest-639497835-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:31:94:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbda", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:14.847 186 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 8 second wait 2020-12-14 02:21:15.233 186 INFO tempest.lib.common.rest_client [req-4ae13f68-1ca3-4c21-a5b3-9e9f9a581847 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 POST http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9/os-volume_attachments 0.380s 2020-12-14 02:21:15.237 186 DEBUG tempest.lib.common.rest_client [req-4ae13f68-1ca3-4c21-a5b3-9e9f9a581847 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volumeAttachment": {"volumeId": "2641470e-67a4-44b2-803c-b22beea743a2", "device": "/dev/sdb"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4ae13f68-1ca3-4c21-a5b3-9e9f9a581847', 'x-compute-request-id': 'req-4ae13f68-1ca3-4c21-a5b3-9e9f9a581847', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9/os-volume_attachments'} Body: b'{"volumeAttachment": {"id": "2641470e-67a4-44b2-803c-b22beea743a2", "serverId": "c56c4d9b-24d6-42fe-874c-4f0df1947aa9", "volumeId": "2641470e-67a4-44b2-803c-b22beea743a2", "device": "/dev/sdb"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:15.360 186 INFO tempest.lib.common.rest_client [req-b83ae3d1-2915-4548-8173-4c4e29a11716 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2 0.100s 2020-12-14 02:21:15.362 186 DEBUG tempest.lib.common.rest_client [req-b83ae3d1-2915-4548-8173-4c4e29a11716 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b83ae3d1-2915-4548-8173-4c4e29a11716', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b83ae3d1-2915-4548-8173-4c4e29a11716', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2'} Body: b'{"volume": {"id": "2641470e-67a4-44b2-803c-b22beea743a2", "status": "reserved", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:04.000000", "updated_at": "2020-12-14T02:21:15.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-771435504", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:15.828 197 INFO tempest.lib.common.rest_client [req-6a110159-0688-4445-bb3e-7d27ca288d28 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.215s 2020-12-14 02:21:15.831 197 DEBUG tempest.lib.common.rest_client [req-6a110159-0688-4445-bb3e-7d27ca288d28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6a110159-0688-4445-bb3e-7d27ca288d28', 'x-compute-request-id': 'req-6a110159-0688-4445-bb3e-7d27ca288d28', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:15.854 189 INFO tempest.lib.common.rest_client [req-af2d9e72-4cc6-4c5d-b790-c3117face7da ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.230s 2020-12-14 02:21:15.858 189 DEBUG tempest.lib.common.rest_client [req-af2d9e72-4cc6-4c5d-b790-c3117face7da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-af2d9e72-4cc6-4c5d-b790-c3117face7da', 'x-compute-request-id': 'req-af2d9e72-4cc6-4c5d-b790-c3117face7da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:16.560 186 INFO tempest.lib.common.rest_client [req-020f8ae4-6da5-4bfa-8ead-009d244465ea ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2 0.098s 2020-12-14 02:21:16.563 186 DEBUG tempest.lib.common.rest_client [req-020f8ae4-6da5-4bfa-8ead-009d244465ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-020f8ae4-6da5-4bfa-8ead-009d244465ea', 'content-length': '1368', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-020f8ae4-6da5-4bfa-8ead-009d244465ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2'} Body: b'{"volume": {"id": "2641470e-67a4-44b2-803c-b22beea743a2", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:04.000000", "updated_at": "2020-12-14T02:21:16.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-771435504", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "2641470e-67a4-44b2-803c-b22beea743a2", "attachment_id": "9f4862ae-d3a1-42b5-a203-1ed14232541f", "volume_id": "2641470e-67a4-44b2-803c-b22beea743a2", "server_id": "c56c4d9b-24d6-42fe-874c-4f0df1947aa9", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-12-14T02:21:16.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:16.667 186 INFO tempest.common.waiters [-] volume 2641470e-67a4-44b2-803c-b22beea743a2 reached in-use after waiting for 1.666763 seconds 2020-12-14 02:21:16.755 186 INFO tempest.lib.common.rest_client [req-57eb2525-573d-4fa3-ae1a-14f6c5158f6c ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2 0.083s 2020-12-14 02:21:16.758 186 DEBUG tempest.lib.common.rest_client [req-57eb2525-573d-4fa3-ae1a-14f6c5158f6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-57eb2525-573d-4fa3-ae1a-14f6c5158f6c', 'content-length': '1368', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-57eb2525-573d-4fa3-ae1a-14f6c5158f6c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2'} Body: b'{"volume": {"id": "2641470e-67a4-44b2-803c-b22beea743a2", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:04.000000", "updated_at": "2020-12-14T02:21:16.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-771435504", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "2641470e-67a4-44b2-803c-b22beea743a2", "attachment_id": "9f4862ae-d3a1-42b5-a203-1ed14232541f", "volume_id": "2641470e-67a4-44b2-803c-b22beea743a2", "server_id": "c56c4d9b-24d6-42fe-874c-4f0df1947aa9", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-12-14T02:21:16.000000"}], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:17.032 186 INFO tempest.lib.common.rest_client [req-7c943eb1-f953-4b81-8bad-230b64128fff ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2/action 0.179s 2020-12-14 02:21:17.035 186 DEBUG tempest.lib.common.rest_client [req-7c943eb1-f953-4b81-8bad-230b64128fff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "error"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-7c943eb1-f953-4b81-8bad-230b64128fff', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7c943eb1-f953-4b81-8bad-230b64128fff', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:17.038 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:17.110 186 INFO tempest.lib.common.rest_client [req-21304e98-d770-4926-83c6-4f828b6ad2d1 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.065s 2020-12-14 02:21:17.114 186 DEBUG tempest.lib.common.rest_client [req-21304e98-d770-4926-83c6-4f828b6ad2d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21304e98-d770-4926-83c6-4f828b6ad2d1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:17.159 197 INFO tempest.lib.common.rest_client [req-86998dda-7f4c-4cf2-baeb-2173f80f98fb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.219s 2020-12-14 02:21:17.164 197 DEBUG tempest.lib.common.rest_client [req-86998dda-7f4c-4cf2-baeb-2173f80f98fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-86998dda-7f4c-4cf2-baeb-2173f80f98fb', 'x-compute-request-id': 'req-86998dda-7f4c-4cf2-baeb-2173f80f98fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:17.178 186 INFO tempest.lib.common.rest_client [req-47f915c5-2abd-4eab-9c66-0aa0bf64eccc ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.055s 2020-12-14 02:21:17.182 186 DEBUG tempest.lib.common.rest_client [req-47f915c5-2abd-4eab-9c66-0aa0bf64eccc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47f915c5-2abd-4eab-9c66-0aa0bf64eccc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["wQg197xMTae2G7ESWAegNQ"], "expires_at": "2020-12-14T03:21:17.000000Z", "issued_at": "2020-12-14T02:21:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:17.276 189 INFO tempest.lib.common.rest_client [req-13b33b65-707e-44f4-aa17-ea942c48305c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.307s 2020-12-14 02:21:17.279 189 DEBUG tempest.lib.common.rest_client [req-13b33b65-707e-44f4-aa17-ea942c48305c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-13b33b65-707e-44f4-aa17-ea942c48305c', 'x-compute-request-id': 'req-13b33b65-707e-44f4-aa17-ea942c48305c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:16:14Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:17.470 186 INFO tempest.lib.common.rest_client [req-c843693a-b287-4bc5-bfcd-9ca454cb5044 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2/action 0.280s 2020-12-14 02:21:17.474 186 DEBUG tempest.lib.common.rest_client [req-c843693a-b287-4bc5-bfcd-9ca454cb5044 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-force_detach": {"connector": null, "attachment_id": "9f4862ae-d3a1-42b5-a203-1ed14232541f"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-c843693a-b287-4bc5-bfcd-9ca454cb5044', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c843693a-b287-4bc5-bfcd-9ca454cb5044', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:17.476 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:17.543 186 INFO tempest.lib.common.rest_client [req-8dfac12c-ac83-4492-84c1-fecbf8d627e0 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.061s 2020-12-14 02:21:17.547 186 DEBUG tempest.lib.common.rest_client [req-8dfac12c-ac83-4492-84c1-fecbf8d627e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8dfac12c-ac83-4492-84c1-fecbf8d627e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:17.611 186 INFO tempest.lib.common.rest_client [req-66255369-95fa-42af-a85e-faa62addc220 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.058s 2020-12-14 02:21:17.614 186 DEBUG tempest.lib.common.rest_client [req-66255369-95fa-42af-a85e-faa62addc220 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66255369-95fa-42af-a85e-faa62addc220', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["fqmWFG2rTrqsop50RjQeLQ"], "expires_at": "2020-12-14T03:21:17.000000Z", "issued_at": "2020-12-14T02:21:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:17.760 186 INFO tempest.lib.common.rest_client [req-659ccca7-49a5-4b50-8f87-a77a0cd324a9 ] Request (VolumesActionsV3RbacTest:test_force_detach_volume_from_instance): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2 0.140s 2020-12-14 02:21:17.763 186 DEBUG tempest.lib.common.rest_client [req-659ccca7-49a5-4b50-8f87-a77a0cd324a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-659ccca7-49a5-4b50-8f87-a77a0cd324a9', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-659ccca7-49a5-4b50-8f87-a77a0cd324a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2'} Body: b'{"volume": {"id": "2641470e-67a4-44b2-803c-b22beea743a2", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:04.000000", "updated_at": "2020-12-14T02:21:17.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-771435504", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:17.856 186 INFO tempest.common.waiters [-] volume 2641470e-67a4-44b2-803c-b22beea743a2 reached available after waiting for 0.855809 seconds 2020-12-14 02:21:17.956 186 INFO tempest.lib.common.rest_client [req-c8d13815-7db1-4c7e-8c37-7669a9318d22 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2/action 0.094s 2020-12-14 02:21:17.959 186 DEBUG tempest.lib.common.rest_client [req-c8d13815-7db1-4c7e-8c37-7669a9318d22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-detach": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-c8d13815-7db1-4c7e-8c37-7669a9318d22', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c8d13815-7db1-4c7e-8c37-7669a9318d22', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:18.047 186 INFO tempest.lib.common.rest_client [req-b7ad1eb8-7043-487f-9e93-5f1bb57743f5 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2 0.082s 2020-12-14 02:21:18.050 186 DEBUG tempest.lib.common.rest_client [req-b7ad1eb8-7043-487f-9e93-5f1bb57743f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b7ad1eb8-7043-487f-9e93-5f1bb57743f5', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b7ad1eb8-7043-487f-9e93-5f1bb57743f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2'} Body: b'{"volume": {"id": "2641470e-67a4-44b2-803c-b22beea743a2", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:04.000000", "updated_at": "2020-12-14T02:21:18.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-771435504", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:18.143 186 INFO tempest.common.waiters [-] volume 2641470e-67a4-44b2-803c-b22beea743a2 reached available after waiting for 0.142788 seconds 2020-12-14 02:21:18.309 186 INFO tempest.lib.common.rest_client [req-a82af546-88bd-4414-b8c5-7131e36ecde4 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9 0.159s 2020-12-14 02:21:18.311 186 DEBUG tempest.lib.common.rest_client [req-a82af546-88bd-4414-b8c5-7131e36ecde4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a82af546-88bd-4414-b8c5-7131e36ecde4', 'x-compute-request-id': 'req-a82af546-88bd-4414-b8c5-7131e36ecde4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:18.510 197 INFO tempest.lib.common.rest_client [req-c40af25b-3234-43f6-b614-a4991d3de641 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.221s 2020-12-14 02:21:18.513 197 DEBUG tempest.lib.common.rest_client [req-c40af25b-3234-43f6-b614-a4991d3de641 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c40af25b-3234-43f6-b614-a4991d3de641', 'x-compute-request-id': 'req-c40af25b-3234-43f6-b614-a4991d3de641', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:18.547 186 INFO tempest.lib.common.rest_client [req-29d3d16a-5fe6-48ef-8101-b4622ad22855 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9 0.228s 2020-12-14 02:21:18.551 186 DEBUG tempest.lib.common.rest_client [req-29d3d16a-5fe6-48ef-8101-b4622ad22855 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1774', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-29d3d16a-5fe6-48ef-8101-b4622ad22855', 'x-compute-request-id': 'req-29d3d16a-5fe6-48ef-8101-b4622ad22855', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9'} Body: b'{"server": {"id": "c56c4d9b-24d6-42fe-874c-4f0df1947aa9", "name": "tempest-tempest.common.compute-instance-556767863", "status": "ACTIVE", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:06Z", "updated": "2020-12-14T02:21:18Z", "addresses": {"tempest-VolumesActionsV3RbacTest-639497835-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:31:94:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbda", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "2641470e-67a4-44b2-803c-b22beea743a2"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:19.873 186 INFO tempest.lib.common.rest_client [req-f620954c-38e8-4fd6-8000-51c68dcba008 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9 0.163s 2020-12-14 02:21:19.875 186 DEBUG tempest.lib.common.rest_client [req-f620954c-38e8-4fd6-8000-51c68dcba008 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1561', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f620954c-38e8-4fd6-8000-51c68dcba008', 'x-compute-request-id': 'req-f620954c-38e8-4fd6-8000-51c68dcba008', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9'} Body: b'{"server": {"id": "c56c4d9b-24d6-42fe-874c-4f0df1947aa9", "name": "tempest-tempest.common.compute-instance-556767863", "status": "ACTIVE", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "user_id": "850df44ed8594e168ef24e572f40ef31", "metadata": {}, "hostId": "122762b403b62209f0f34955192db9d29bdf8f4eac155c522cc2f48b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:06Z", "updated": "2020-12-14T02:21:19Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:13.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbda", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "2641470e-67a4-44b2-803c-b22beea743a2"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:19.881 197 INFO tempest.lib.common.rest_client [req-d5fc3dd7-16f5-4c91-97a3-8d848dbcc9f1 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.260s 2020-12-14 02:21:19.884 197 DEBUG tempest.lib.common.rest_client [req-d5fc3dd7-16f5-4c91-97a3-8d848dbcc9f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d5fc3dd7-16f5-4c91-97a3-8d848dbcc9f1', 'x-compute-request-id': 'req-d5fc3dd7-16f5-4c91-97a3-8d848dbcc9f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:20.196 189 INFO tempest.lib.common.rest_client [req-2c3360a0-56e5-400b-9853-5fd345c758cd ] Request (ServerActionsRbacTest:setUp): 204 DELETE http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 2.810s 2020-12-14 02:21:20.199 189 DEBUG tempest.lib.common.rest_client [req-2c3360a0-56e5-400b-9853-5fd345c758cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2c3360a0-56e5-400b-9853-5fd345c758cd', 'x-compute-request-id': 'req-2c3360a0-56e5-400b-9853-5fd345c758cd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:20.430 189 INFO tempest.lib.common.rest_client [req-a9ef0c94-4a2c-4e1d-a06b-0a625cdbe57e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.224s 2020-12-14 02:21:20.432 189 DEBUG tempest.lib.common.rest_client [req-a9ef0c94-4a2c-4e1d-a06b-0a625cdbe57e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a9ef0c94-4a2c-4e1d-a06b-0a625cdbe57e', 'x-compute-request-id': 'req-a9ef0c94-4a2c-4e1d-a06b-0a625cdbe57e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:21:20Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:21.061 186 INFO tempest.lib.common.rest_client [req-a349e12d-fe53-40fe-936c-4a7d6cf14ffc ] Request (VolumesActionsV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9 0.081s 2020-12-14 02:21:21.063 186 DEBUG tempest.lib.common.rest_client [req-a349e12d-fe53-40fe-936c-4a7d6cf14ffc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-a349e12d-fe53-40fe-936c-4a7d6cf14ffc', 'x-compute-request-id': 'req-a349e12d-fe53-40fe-936c-4a7d6cf14ffc', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/c56c4d9b-24d6-42fe-874c-4f0df1947aa9'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance c56c4d9b-24d6-42fe-874c-4f0df1947aa9 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:21.101 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:21:21.118 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_admin_actions:force_delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:21:21.211 197 INFO tempest.lib.common.rest_client [req-37e7933f-564b-4e5d-9695-c4e2e85d7c61 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.219s 2020-12-14 02:21:21.214 197 DEBUG tempest.lib.common.rest_client [req-37e7933f-564b-4e5d-9695-c4e2e85d7c61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-37e7933f-564b-4e5d-9695-c4e2e85d7c61', 'x-compute-request-id': 'req-37e7933f-564b-4e5d-9695-c4e2e85d7c61', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:21.548 186 INFO tempest.lib.common.rest_client [req-0371ce74-2a53-4876-9c98-00087531bb87 ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes 0.424s 2020-12-14 02:21:21.550 186 DEBUG tempest.lib.common.rest_client [req-0371ce74-2a53-4876-9c98-00087531bb87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesActionsV3RbacTest-Volume-761518992"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0371ce74-2a53-4876-9c98-00087531bb87', 'content-length': '844', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0371ce74-2a53-4876-9c98-00087531bb87', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes'} Body: b'{"volume": {"id": "5b87dda8-ef45-47f8-b381-40f4b2ae77a3", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:21.000000", "updated_at": null, "name": "tempest-VolumesActionsV3RbacTest-Volume-761518992", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:21.717 186 INFO tempest.lib.common.rest_client [req-bb2fb9b1-1f75-4c7b-bb0c-ecb7e68b477d ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3 0.082s 2020-12-14 02:21:21.720 186 DEBUG tempest.lib.common.rest_client [req-bb2fb9b1-1f75-4c7b-bb0c-ecb7e68b477d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bb2fb9b1-1f75-4c7b-bb0c-ecb7e68b477d', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bb2fb9b1-1f75-4c7b-bb0c-ecb7e68b477d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3'} Body: b'{"volume": {"id": "5b87dda8-ef45-47f8-b381-40f4b2ae77a3", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:21.000000", "updated_at": "2020-12-14T02:21:22.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-761518992", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:21.765 189 INFO tempest.lib.common.rest_client [req-ca924925-e8fa-46c7-b728-2114d6388bf2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.212s 2020-12-14 02:21:21.768 189 DEBUG tempest.lib.common.rest_client [req-ca924925-e8fa-46c7-b728-2114d6388bf2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ca924925-e8fa-46c7-b728-2114d6388bf2', 'x-compute-request-id': 'req-ca924925-e8fa-46c7-b728-2114d6388bf2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:21:21Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:22.556 197 INFO tempest.lib.common.rest_client [req-d1b20822-b045-4cd1-bfe1-5f767e862fa3 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.234s 2020-12-14 02:21:22.560 197 DEBUG tempest.lib.common.rest_client [req-d1b20822-b045-4cd1-bfe1-5f767e862fa3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d1b20822-b045-4cd1-bfe1-5f767e862fa3', 'x-compute-request-id': 'req-d1b20822-b045-4cd1-bfe1-5f767e862fa3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:22.921 186 INFO tempest.lib.common.rest_client [req-1100d3e5-e8ef-403b-a2c1-f77191f948ff ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3 0.098s 2020-12-14 02:21:22.924 186 DEBUG tempest.lib.common.rest_client [req-1100d3e5-e8ef-403b-a2c1-f77191f948ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1100d3e5-e8ef-403b-a2c1-f77191f948ff', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1100d3e5-e8ef-403b-a2c1-f77191f948ff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3'} Body: b'{"volume": {"id": "5b87dda8-ef45-47f8-b381-40f4b2ae77a3", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:21.000000", "updated_at": "2020-12-14T02:21:22.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-761518992", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:23.024 186 INFO tempest.common.waiters [-] volume 5b87dda8-ef45-47f8-b381-40f4b2ae77a3 reached available after waiting for 2.023616 seconds 2020-12-14 02:21:23.170 189 INFO tempest.lib.common.rest_client [req-09148690-6afc-49ea-a1df-3afc0c3c5632 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.281s 2020-12-14 02:21:23.173 189 DEBUG tempest.lib.common.rest_client [req-09148690-6afc-49ea-a1df-3afc0c3c5632 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-09148690-6afc-49ea-a1df-3afc0c3c5632', 'x-compute-request-id': 'req-09148690-6afc-49ea-a1df-3afc0c3c5632', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:21:21Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:23.220 186 INFO tempest.lib.common.rest_client [req-7e5bd98c-4d6f-41dd-9118-1b7c7ebe4821 ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3/action 0.190s 2020-12-14 02:21:23.223 186 DEBUG tempest.lib.common.rest_client [req-7e5bd98c-4d6f-41dd-9118-1b7c7ebe4821 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "error"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-7e5bd98c-4d6f-41dd-9118-1b7c7ebe4821', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7e5bd98c-4d6f-41dd-9118-1b7c7ebe4821', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:23.227 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:23.300 186 INFO tempest.lib.common.rest_client [req-ba0f8548-560f-4008-ad71-8f47f4746352 ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.066s 2020-12-14 02:21:23.303 186 DEBUG tempest.lib.common.rest_client [req-ba0f8548-560f-4008-ad71-8f47f4746352 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba0f8548-560f-4008-ad71-8f47f4746352', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:23.359 186 INFO tempest.lib.common.rest_client [req-fe550141-87da-4855-b52f-02fbff942087 ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:21:23.362 186 DEBUG tempest.lib.common.rest_client [req-fe550141-87da-4855-b52f-02fbff942087 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe550141-87da-4855-b52f-02fbff942087', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["W6CcstWvSoSZb-31X4yZ2g"], "expires_at": "2020-12-14T03:21:23.000000Z", "issued_at": "2020-12-14T02:21:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:23.526 186 INFO tempest.lib.common.rest_client [req-8d1b21e3-1aff-46ac-890a-a3efe6914fde ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3/action 0.156s 2020-12-14 02:21:23.528 186 DEBUG tempest.lib.common.rest_client [req-8d1b21e3-1aff-46ac-890a-a3efe6914fde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-force_delete": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-8d1b21e3-1aff-46ac-890a-a3efe6914fde', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8d1b21e3-1aff-46ac-890a-a3efe6914fde', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:23.531 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:23.608 186 INFO tempest.lib.common.rest_client [req-a9a6902d-cf35-44c6-b68f-3340cf8c089e ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.071s 2020-12-14 02:21:23.611 186 DEBUG tempest.lib.common.rest_client [req-a9a6902d-cf35-44c6-b68f-3340cf8c089e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9a6902d-cf35-44c6-b68f-3340cf8c089e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:23.662 186 INFO tempest.lib.common.rest_client [req-9fb59416-9a5b-416f-bee6-e4ed8a2a376e ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:21:23.665 186 DEBUG tempest.lib.common.rest_client [req-9fb59416-9a5b-416f-bee6-e4ed8a2a376e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9fb59416-9a5b-416f-bee6-e4ed8a2a376e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["ZKLI9aXWSxmCcMmbqVy6hw"], "expires_at": "2020-12-14T03:21:23.000000Z", "issued_at": "2020-12-14T02:21:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:23.794 186 INFO tempest.lib.common.rest_client [req-90266bc4-e2fd-4aa3-a6be-955d26298ed9 ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3 0.122s 2020-12-14 02:21:23.798 186 DEBUG tempest.lib.common.rest_client [req-90266bc4-e2fd-4aa3-a6be-955d26298ed9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-90266bc4-e2fd-4aa3-a6be-955d26298ed9', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-90266bc4-e2fd-4aa3-a6be-955d26298ed9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3'} Body: b'{"volume": {"id": "5b87dda8-ef45-47f8-b381-40f4b2ae77a3", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:21.000000", "updated_at": "2020-12-14T02:21:23.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-761518992", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:23.904 197 INFO tempest.lib.common.rest_client [req-bf81d99c-c3e8-49aa-86c3-c9c22d9199c4 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.229s 2020-12-14 02:21:23.907 197 DEBUG tempest.lib.common.rest_client [req-bf81d99c-c3e8-49aa-86c3-c9c22d9199c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bf81d99c-c3e8-49aa-86c3-c9c22d9199c4', 'x-compute-request-id': 'req-bf81d99c-c3e8-49aa-86c3-c9c22d9199c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:24.497 189 INFO tempest.lib.common.rest_client [req-aba12209-8903-44d3-9c89-64d1951b4327 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.206s 2020-12-14 02:21:24.501 189 DEBUG tempest.lib.common.rest_client [req-aba12209-8903-44d3-9c89-64d1951b4327 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aba12209-8903-44d3-9c89-64d1951b4327', 'x-compute-request-id': 'req-aba12209-8903-44d3-9c89-64d1951b4327', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:21:21Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:24.963 186 INFO tempest.lib.common.rest_client [req-fc6938b8-fa03-4d69-b9d5-6945ef3a52eb ] Request (VolumesActionsV3RbacTest:test_volume_force_delete): 404 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3 0.070s 2020-12-14 02:21:24.966 186 DEBUG tempest.lib.common.rest_client [req-fc6938b8-fa03-4d69-b9d5-6945ef3a52eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-fc6938b8-fa03-4d69-b9d5-6945ef3a52eb', 'x-openstack-request-id': 'req-fc6938b8-fa03-4d69-b9d5-6945ef3a52eb', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 5b87dda8-ef45-47f8-b381-40f4b2ae77a3 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:24.982 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:21:25.002 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:update_readonly_flag, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:21:25.004 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:25.086 186 INFO tempest.lib.common.rest_client [req-e5e9e46b-8530-45ca-b1c8-0167cc2b272c ] Request (VolumesActionsV3RbacTest:test_volume_readonly_update): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.075s 2020-12-14 02:21:25.090 186 DEBUG tempest.lib.common.rest_client [req-e5e9e46b-8530-45ca-b1c8-0167cc2b272c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5e9e46b-8530-45ca-b1c8-0167cc2b272c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:25.135 186 INFO tempest.lib.common.rest_client [req-6a5d51ed-4285-4fb0-9641-3f557cb2040d ] Request (VolumesActionsV3RbacTest:test_volume_readonly_update): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:21:25.138 186 DEBUG tempest.lib.common.rest_client [req-6a5d51ed-4285-4fb0-9641-3f557cb2040d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a5d51ed-4285-4fb0-9641-3f557cb2040d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["XW96SQTSTlSAUKmNlsNwmg"], "expires_at": "2020-12-14T03:21:25.000000Z", "issued_at": "2020-12-14T02:21:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:25.236 197 INFO tempest.lib.common.rest_client [req-17818913-28f4-40f7-a493-9cae375af5cf ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.221s 2020-12-14 02:21:25.240 197 DEBUG tempest.lib.common.rest_client [req-17818913-28f4-40f7-a493-9cae375af5cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-17818913-28f4-40f7-a493-9cae375af5cf', 'x-compute-request-id': 'req-17818913-28f4-40f7-a493-9cae375af5cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:25.280 186 INFO tempest.lib.common.rest_client [req-71d9599e-67ee-49d7-8e85-995064598a01 ] Request (VolumesActionsV3RbacTest:test_volume_readonly_update): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74/action 0.133s 2020-12-14 02:21:25.284 186 DEBUG tempest.lib.common.rest_client [req-71d9599e-67ee-49d7-8e85-995064598a01 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-update_readonly_flag": {"readonly": true}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-71d9599e-67ee-49d7-8e85-995064598a01', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-71d9599e-67ee-49d7-8e85-995064598a01', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:25.287 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:25.358 186 INFO tempest.lib.common.rest_client [req-a319477e-5f7d-4248-b5bd-d8599c54a0a3 ] Request (VolumesActionsV3RbacTest:test_volume_readonly_update): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.065s 2020-12-14 02:21:25.361 186 DEBUG tempest.lib.common.rest_client [req-a319477e-5f7d-4248-b5bd-d8599c54a0a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a319477e-5f7d-4248-b5bd-d8599c54a0a3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:25.419 186 INFO tempest.lib.common.rest_client [req-8451e74f-2cc8-4976-8a84-803380b5152a ] Request (VolumesActionsV3RbacTest:test_volume_readonly_update): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:21:25.422 186 DEBUG tempest.lib.common.rest_client [req-8451e74f-2cc8-4976-8a84-803380b5152a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8451e74f-2cc8-4976-8a84-803380b5152a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["uP_DdzErTVmFtmmhAq8d-g"], "expires_at": "2020-12-14T03:21:25.000000Z", "issued_at": "2020-12-14T02:21:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:25.575 186 INFO tempest.lib.common.rest_client [req-7de5a848-c227-4ba0-8482-faf888a70219 ] Request (VolumesActionsV3RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74/action 0.143s 2020-12-14 02:21:25.578 186 DEBUG tempest.lib.common.rest_client [req-7de5a848-c227-4ba0-8482-faf888a70219 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-update_readonly_flag": {"readonly": false}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-7de5a848-c227-4ba0-8482-faf888a70219', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7de5a848-c227-4ba0-8482-faf888a70219', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:25.590 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:21:25.608 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_actions:reserve, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:21:25.610 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:25.686 186 INFO tempest.lib.common.rest_client [req-ae62e765-d91c-4103-9225-3421fc81a215 ] Request (VolumesActionsV3RbacTest:test_volume_reserve): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.069s 2020-12-14 02:21:25.689 186 DEBUG tempest.lib.common.rest_client [req-ae62e765-d91c-4103-9225-3421fc81a215 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae62e765-d91c-4103-9225-3421fc81a215', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:25.741 186 INFO tempest.lib.common.rest_client [req-79dc6c62-e357-42f5-93e8-817240b0e772 ] Request (VolumesActionsV3RbacTest:test_volume_reserve): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:21:25.744 186 DEBUG tempest.lib.common.rest_client [req-79dc6c62-e357-42f5-93e8-817240b0e772 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79dc6c62-e357-42f5-93e8-817240b0e772', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["Xh4yjee3SpWf-qN3nKfsUw"], "expires_at": "2020-12-14T03:21:25.000000Z", "issued_at": "2020-12-14T02:21:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:25.776 189 INFO tempest.lib.common.rest_client [req-d9872bb6-cb6c-4280-b77d-b8a39036afeb ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.158s 2020-12-14 02:21:25.779 189 DEBUG tempest.lib.common.rest_client [req-d9872bb6-cb6c-4280-b77d-b8a39036afeb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1676', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d9872bb6-cb6c-4280-b77d-b8a39036afeb', 'x-compute-request-id': 'req-d9872bb6-cb6c-4280-b77d-b8a39036afeb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"server": {"id": "8a964bf0-ede1-4949-849b-ad52455f93cf", "name": "tempest-ServerActionsRbacTest-server-1660550320", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:14:19Z", "updated": "2020-12-14T02:21:21Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.7", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:71:f2:56"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/8a964bf0-ede1-4949-849b-ad52455f93cf"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:13.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbc4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:25.900 186 INFO tempest.lib.common.rest_client [req-38be468d-8b75-40ef-98fb-2e281e560e92 ] Request (VolumesActionsV3RbacTest:test_volume_reserve): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74/action 0.149s 2020-12-14 02:21:25.903 186 DEBUG tempest.lib.common.rest_client [req-38be468d-8b75-40ef-98fb-2e281e560e92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reserve": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-38be468d-8b75-40ef-98fb-2e281e560e92', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-38be468d-8b75-40ef-98fb-2e281e560e92', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:25.905 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:25.972 186 INFO tempest.lib.common.rest_client [req-17147f67-ca7a-4a25-8d02-62600b5c3f6c ] Request (VolumesActionsV3RbacTest:test_volume_reserve): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.060s 2020-12-14 02:21:25.975 186 DEBUG tempest.lib.common.rest_client [req-17147f67-ca7a-4a25-8d02-62600b5c3f6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17147f67-ca7a-4a25-8d02-62600b5c3f6c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:26.026 186 INFO tempest.lib.common.rest_client [req-67ea488e-b7ae-4e7b-99b1-480367dfb1d6 ] Request (VolumesActionsV3RbacTest:test_volume_reserve): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:21:26.029 186 DEBUG tempest.lib.common.rest_client [req-67ea488e-b7ae-4e7b-99b1-480367dfb1d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67ea488e-b7ae-4e7b-99b1-480367dfb1d6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["OPxrIJB1QtO7awWqkiaf4w"], "expires_at": "2020-12-14T03:21:26.000000Z", "issued_at": "2020-12-14T02:21:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:26.044 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:21:26.062 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_admin_actions:reset_status, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:21:26.437 186 INFO tempest.lib.common.rest_client [req-811a78c6-39a6-4125-a65a-9a3d402c1118 ] Request (VolumesActionsV3RbacTest:test_volume_reset_status): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes 0.369s 2020-12-14 02:21:26.440 186 DEBUG tempest.lib.common.rest_client [req-811a78c6-39a6-4125-a65a-9a3d402c1118 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesActionsV3RbacTest-Volume-730014311"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-811a78c6-39a6-4125-a65a-9a3d402c1118', 'content-length': '844', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-811a78c6-39a6-4125-a65a-9a3d402c1118', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes'} Body: b'{"volume": {"id": "fd0d06af-5d1d-45ca-b996-1c9b32c33ad6", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:26.000000", "updated_at": null, "name": "tempest-VolumesActionsV3RbacTest-Volume-730014311", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:26.587 197 INFO tempest.lib.common.rest_client [req-a910399f-22e6-4a9e-bd38-dab1040477cb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.237s 2020-12-14 02:21:26.591 197 DEBUG tempest.lib.common.rest_client [req-a910399f-22e6-4a9e-bd38-dab1040477cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a910399f-22e6-4a9e-bd38-dab1040477cb', 'x-compute-request-id': 'req-a910399f-22e6-4a9e-bd38-dab1040477cb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:26.611 186 INFO tempest.lib.common.rest_client [req-c9987024-6a86-47f9-9f22-71ffe92db024 ] Request (VolumesActionsV3RbacTest:test_volume_reset_status): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6 0.082s 2020-12-14 02:21:26.614 186 DEBUG tempest.lib.common.rest_client [req-c9987024-6a86-47f9-9f22-71ffe92db024 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c9987024-6a86-47f9-9f22-71ffe92db024', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c9987024-6a86-47f9-9f22-71ffe92db024', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6'} Body: b'{"volume": {"id": "fd0d06af-5d1d-45ca-b996-1c9b32c33ad6", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:26.000000", "updated_at": "2020-12-14T02:21:26.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-730014311", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:26.990 189 INFO tempest.lib.common.rest_client [req-4471b6b9-2ae3-4d9e-9245-b001ee0a2997 ] Request (ServerActionsRbacTest:setUp): 404 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.088s 2020-12-14 02:21:26.993 189 DEBUG tempest.lib.common.rest_client [req-4471b6b9-2ae3-4d9e-9245-b001ee0a2997 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-4471b6b9-2ae3-4d9e-9245-b001ee0a2997', 'x-compute-request-id': 'req-4471b6b9-2ae3-4d9e-9245-b001ee0a2997', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 8a964bf0-ede1-4949-849b-ad52455f93cf could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:27.002 189 DEBUG tempest.lib.common.validation_resources [-] Requested validation resources keypair True, floating IP True, security group True create_validation_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/validation_resources.py:186 2020-12-14 02:21:27.206 189 INFO tempest.lib.common.rest_client [req-9a2ef4a3-8de7-4f4d-bbdd-24333e9919e0 ] Request (ServerActionsRbacTest:setUp): 200 POST http://172.30.13.94/compute/v2.1/os-keypairs 0.197s 2020-12-14 02:21:27.210 189 DEBUG tempest.lib.common.rest_client [req-9a2ef4a3-8de7-4f4d-bbdd-24333e9919e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"keypair": {"name": "tempest-keypair-175601893"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2304', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9a2ef4a3-8de7-4f4d-bbdd-24333e9919e0', 'x-compute-request-id': 'req-9a2ef4a3-8de7-4f4d-bbdd-24333e9919e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs'} Body: b'{"keypair": {"private_key": "-----BEGIN RSA PRIVATE KEY-----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\\ny7rD159TIo2j827ZJfyrsBjo9ko2fmb6YfCzs5taBO4zZ1KjZB9Ydg==\\n-----END RSA PRIVATE KEY-----\\n", "name": "tempest-keypair-175601893", "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfrM0N80ZkZBC+wfR2XUDCzdlNtOnRksVmNg61I8E+zTC1R3Z4n8r1Of8jLtJUGWNP8UwAznadjuQAdBpl6xKDSV7S7kAKr7KPaUzQofYVAda/KG1XyC/SDD5WGDbvVSD4fhEtbx/dh4R2MrIwTM7TbdZB2BrzM7PeWWi5A9vFgs8SOLVxN/+bwoh2brftA484ZNZDi8gktUOr2cckwekBTFt6dJMNY1ELuy07P/Z783M3QgXlWcoELX6OflGQh8r9gxNKaWeh6XvzQfUpS6uGa+EgRBuWsjybusbXEzbBPzl2Xu3jmVA+43r8oi19mKwZpjJ1EN/pivhOozet4Yo7 Generated-by-Nova", "fingerprint": "fd:47:e5:83:92:0a:6a:91:78:fe:2a:79:08:d4:5e:47", "user_id": "fc49b78fc1304d33aaa92419232a1e0d"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:27.232 189 DEBUG tempest.lib.common.validation_resources [-] Validation resource key tempest-keypair-175601893 created create_validation_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/validation_resources.py:194 2020-12-14 02:21:27.593 189 INFO tempest.lib.common.rest_client [req-579f8552-c1d8-458f-9fed-5b3ecdac28fe ] Request (ServerActionsRbacTest:setUp): 201 POST http://172.30.13.94:9696/v2.0/security-groups 0.351s 2020-12-14 02:21:27.597 189 DEBUG tempest.lib.common.rest_client [req-579f8552-c1d8-458f-9fed-5b3ecdac28fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-securitygroup--644261201", "description": "tempest-description--2031095052"}} Response - Headers: {'content-type': 'application/json', 'content-length': '1413', 'x-openstack-request-id': 'req-579f8552-c1d8-458f-9fed-5b3ecdac28fe', 'date': 'Mon, 14 Dec 2020 02:21:27 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups'} Body: b'{"security_group": {"id": "80a59580-8b3e-4bc8-bfa2-6a0abe825893", "name": "tempest-securitygroup--644261201", "stateful": true, "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "description": "tempest-description--2031095052", "security_group_rules": [{"id": "b4bdb038-d84f-43c8-a329-e9c09ff8b1bf", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "security_group_id": "80a59580-8b3e-4bc8-bfa2-6a0abe825893", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:21:27Z", "updated_at": "2020-12-14T02:21:27Z", "revision_number": 0, "project_id": "3400d8caa66043d0b7fa128b68a28ecc"}, {"id": "c225319c-81fc-4b39-acd4-1489dbd7052b", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "security_group_id": "80a59580-8b3e-4bc8-bfa2-6a0abe825893", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:21:27Z", "updated_at": "2020-12-14T02:21:27Z", "revision_number": 0, "project_id": "3400d8caa66043d0b7fa128b68a28ecc"}], "tags": [], "created_at": "2020-12-14T02:21:27Z", "updated_at": "2020-12-14T02:21:27Z", "revision_number": 1, "project_id": "3400d8caa66043d0b7fa128b68a28ecc"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:27.795 186 INFO tempest.lib.common.rest_client [req-3a7c29a5-7993-45e1-9133-e70b0feda9f7 ] Request (VolumesActionsV3RbacTest:test_volume_reset_status): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6 0.084s 2020-12-14 02:21:27.799 186 DEBUG tempest.lib.common.rest_client [req-3a7c29a5-7993-45e1-9133-e70b0feda9f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3a7c29a5-7993-45e1-9133-e70b0feda9f7', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3a7c29a5-7993-45e1-9133-e70b0feda9f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6'} Body: b'{"volume": {"id": "fd0d06af-5d1d-45ca-b996-1c9b32c33ad6", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:26.000000", "updated_at": "2020-12-14T02:21:27.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-730014311", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:27.862 189 INFO tempest.lib.common.rest_client [req-a03da1ad-ac9f-4eee-bc48-e46e5f906956 ] Request (ServerActionsRbacTest:setUp): 201 POST http://172.30.13.94:9696/v2.0/security-group-rules 0.257s 2020-12-14 02:21:27.866 189 DEBUG tempest.lib.common.rest_client [req-a03da1ad-ac9f-4eee-bc48-e46e5f906956 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group_rule": {"security_group_id": "80a59580-8b3e-4bc8-bfa2-6a0abe825893", "protocol": "tcp", "ethertype": "IPv4", "port_range_min": 22, "port_range_max": 22, "direction": "ingress"}} Response - Headers: {'content-type': 'application/json', 'content-length': '507', 'x-openstack-request-id': 'req-a03da1ad-ac9f-4eee-bc48-e46e5f906956', 'date': 'Mon, 14 Dec 2020 02:21:27 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules'} Body: b'{"security_group_rule": {"id": "50dc576f-9c48-4d5c-8a9d-8f825418b815", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "security_group_id": "80a59580-8b3e-4bc8-bfa2-6a0abe825893", "ethertype": "IPv4", "direction": "ingress", "protocol": "tcp", "port_range_min": 22, "port_range_max": 22, "remote_ip_prefix": null, "remote_group_id": null, "description": "", "created_at": "2020-12-14T02:21:27Z", "updated_at": "2020-12-14T02:21:27Z", "revision_number": 0, "project_id": "3400d8caa66043d0b7fa128b68a28ecc"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:27.890 186 INFO tempest.common.waiters [-] volume fd0d06af-5d1d-45ca-b996-1c9b32c33ad6 reached available after waiting for 1.890083 seconds 2020-12-14 02:21:27.892 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:27.935 197 INFO tempest.lib.common.rest_client [req-78f3054f-1de8-472a-a1cf-29d125da7a79 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.238s 2020-12-14 02:21:27.938 197 DEBUG tempest.lib.common.rest_client [req-78f3054f-1de8-472a-a1cf-29d125da7a79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-78f3054f-1de8-472a-a1cf-29d125da7a79', 'x-compute-request-id': 'req-78f3054f-1de8-472a-a1cf-29d125da7a79', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:27.956 186 INFO tempest.lib.common.rest_client [req-806089c7-d302-4e86-9f43-a5f90f530f0e ] Request (VolumesActionsV3RbacTest:test_volume_reset_status): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.057s 2020-12-14 02:21:27.959 186 DEBUG tempest.lib.common.rest_client [req-806089c7-d302-4e86-9f43-a5f90f530f0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-806089c7-d302-4e86-9f43-a5f90f530f0e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:28.007 186 INFO tempest.lib.common.rest_client [req-d0365ff2-c97c-40b3-9c35-723d3918ba88 ] Request (VolumesActionsV3RbacTest:test_volume_reset_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:21:28.010 186 DEBUG tempest.lib.common.rest_client [req-d0365ff2-c97c-40b3-9c35-723d3918ba88 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0365ff2-c97c-40b3-9c35-723d3918ba88', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["ONqoYrcTRICxCk0HbOL3-A"], "expires_at": "2020-12-14T03:21:27.000000Z", "issued_at": "2020-12-14T02:21:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:28.229 189 INFO tempest.lib.common.rest_client [req-a0200497-838e-4dbf-b070-0ed8e558c613 ] Request (ServerActionsRbacTest:setUp): 201 POST http://172.30.13.94:9696/v2.0/security-group-rules 0.354s 2020-12-14 02:21:28.233 189 DEBUG tempest.lib.common.rest_client [req-a0200497-838e-4dbf-b070-0ed8e558c613 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group_rule": {"security_group_id": "80a59580-8b3e-4bc8-bfa2-6a0abe825893", "protocol": "icmp", "ethertype": "IPv4", "direction": "ingress"}} Response - Headers: {'content-type': 'application/json', 'content-length': '512', 'x-openstack-request-id': 'req-a0200497-838e-4dbf-b070-0ed8e558c613', 'date': 'Mon, 14 Dec 2020 02:21:28 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/security-group-rules'} Body: b'{"security_group_rule": {"id": "b9d66902-f2f6-4054-b1ee-aa76674f5559", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "security_group_id": "80a59580-8b3e-4bc8-bfa2-6a0abe825893", "ethertype": "IPv4", "direction": "ingress", "protocol": "icmp", "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": "", "created_at": "2020-12-14T02:21:28Z", "updated_at": "2020-12-14T02:21:28Z", "revision_number": 0, "project_id": "3400d8caa66043d0b7fa128b68a28ecc"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:28.236 189 DEBUG tempest.lib.common.validation_resources [-] SSH Validation resource security group with tcp and icmp rules tempest-securitygroup--644261201 created create_ssh_security_group /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/validation_resources.py:120 2020-12-14 02:21:28.290 186 INFO tempest.lib.common.rest_client [req-f393bb31-d4d8-4acb-92c9-5cb497833c53 ] Request (VolumesActionsV3RbacTest:test_volume_reset_status): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6/action 0.272s 2020-12-14 02:21:28.294 186 DEBUG tempest.lib.common.rest_client [req-f393bb31-d4d8-4acb-92c9-5cb497833c53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "error"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-f393bb31-d4d8-4acb-92c9-5cb497833c53', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f393bb31-d4d8-4acb-92c9-5cb497833c53', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:28.296 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:28.369 186 INFO tempest.lib.common.rest_client [req-83d66124-064e-4e34-8be0-59c7dceff756 ] Request (VolumesActionsV3RbacTest:test_volume_reset_status): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.067s 2020-12-14 02:21:28.372 186 DEBUG tempest.lib.common.rest_client [req-83d66124-064e-4e34-8be0-59c7dceff756 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83d66124-064e-4e34-8be0-59c7dceff756', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:28.430 186 INFO tempest.lib.common.rest_client [req-ddea3202-f657-4af6-8b74-5ad851a57173 ] Request (VolumesActionsV3RbacTest:test_volume_reset_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:21:28.434 186 DEBUG tempest.lib.common.rest_client [req-ddea3202-f657-4af6-8b74-5ad851a57173 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ddea3202-f657-4af6-8b74-5ad851a57173', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["DAL7FDM3Tv6lm6qISaX5xg"], "expires_at": "2020-12-14T03:21:28.000000Z", "issued_at": "2020-12-14T02:21:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:28.449 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:21:28.473 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:retype, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:21:28.599 186 INFO tempest.lib.common.rest_client [req-d04513b7-b619-4039-bce0-e51bd69104c2 ] Request (VolumesActionsV3RbacTest:test_volume_retype): 200 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/types 0.119s 2020-12-14 02:21:28.603 186 DEBUG tempest.lib.common.rest_client [req-d04513b7-b619-4039-bce0-e51bd69104c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumesActionsV3RbacTest-volume-type-193951222"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d04513b7-b619-4039-bce0-e51bd69104c2', 'content-length': '229', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d04513b7-b619-4039-bce0-e51bd69104c2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/types'} Body: b'{"volume_type": {"id": "21c9b385-7088-465c-9923-6c14b4c4d41d", "name": "tempest-VolumesActionsV3RbacTest-volume-type-193951222", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:28.939 186 INFO tempest.lib.common.rest_client [req-4d2c255c-08ca-4440-bf7f-7cd5d190cdbe ] Request (VolumesActionsV3RbacTest:test_volume_retype): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes 0.308s 2020-12-14 02:21:28.942 186 DEBUG tempest.lib.common.rest_client [req-4d2c255c-08ca-4440-bf7f-7cd5d190cdbe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesActionsV3RbacTest-Volume-528118061"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4d2c255c-08ca-4440-bf7f-7cd5d190cdbe', 'content-length': '844', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4d2c255c-08ca-4440-bf7f-7cd5d190cdbe', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes'} Body: b'{"volume": {"id": "0b10407a-651a-49f3-aa77-b884a83dc378", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:29.000000", "updated_at": null, "name": "tempest-VolumesActionsV3RbacTest-Volume-528118061", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:29.119 186 INFO tempest.lib.common.rest_client [req-27cff37f-ef96-4ea2-bdad-2d03fc6390af ] Request (VolumesActionsV3RbacTest:test_volume_retype): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378 0.091s 2020-12-14 02:21:29.122 186 DEBUG tempest.lib.common.rest_client [req-27cff37f-ef96-4ea2-bdad-2d03fc6390af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-27cff37f-ef96-4ea2-bdad-2d03fc6390af', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-27cff37f-ef96-4ea2-bdad-2d03fc6390af', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378'} Body: b'{"volume": {"id": "0b10407a-651a-49f3-aa77-b884a83dc378", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:29.000000", "updated_at": "2020-12-14T02:21:29.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-528118061", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:29.308 197 INFO tempest.lib.common.rest_client [req-46b4dc65-4b7d-461e-80d5-2de31ce7bcbd ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.253s 2020-12-14 02:21:29.311 197 DEBUG tempest.lib.common.rest_client [req-46b4dc65-4b7d-461e-80d5-2de31ce7bcbd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-46b4dc65-4b7d-461e-80d5-2de31ce7bcbd', 'x-compute-request-id': 'req-46b4dc65-4b7d-461e-80d5-2de31ce7bcbd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:29.577 189 INFO tempest.lib.common.rest_client [req-67004735-350c-4a4d-b497-b92c5fe645ef ] Request (ServerActionsRbacTest:setUp): 201 POST http://172.30.13.94:9696/v2.0/floatingips 1.334s 2020-12-14 02:21:29.581 189 DEBUG tempest.lib.common.rest_client [req-67004735-350c-4a4d-b497-b92c5fe645ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"floatingip": {"floating_network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}} Response - Headers: {'content-type': 'application/json', 'content-length': '574', 'x-openstack-request-id': 'req-67004735-350c-4a4d-b497-b92c5fe645ef', 'date': 'Mon, 14 Dec 2020 02:21:29 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips'} Body: b'{"floatingip": {"id": "178e1afc-6c88-4c8e-8967-60e69d98e2c0", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "floating_ip_address": "172.24.4.45", "floating_network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "project_id": "3400d8caa66043d0b7fa128b68a28ecc", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-12-14T02:21:29Z", "updated_at": "2020-12-14T02:21:29Z", "revision_number": 0}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:29.584 189 DEBUG tempest.lib.common.validation_resources [-] Validation resource floating IP {'id': '178e1afc-6c88-4c8e-8967-60e69d98e2c0', 'tenant_id': '3400d8caa66043d0b7fa128b68a28ecc', 'floating_ip_address': '172.24.4.45', 'floating_network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'router_id': None, 'port_id': None, 'fixed_ip_address': None, 'status': 'DOWN', 'project_id': '3400d8caa66043d0b7fa128b68a28ecc', 'description': '', 'qos_policy_id': None, 'port_details': None, 'dns_domain': '', 'dns_name': '', 'port_forwardings': [], 'tags': [], 'created_at': '2020-12-14T02:21:29Z', 'updated_at': '2020-12-14T02:21:29Z', 'revision_number': 0, 'ip': '172.24.4.45'} created create_validation_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/validation_resources.py:218 2020-12-14 02:21:29.737 189 INFO tempest.lib.common.rest_client [req-091213a5-9255-4214-8686-aa5381fa123a ] Request (ServerActionsRbacTest:setUp): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:21:29.741 189 DEBUG tempest.lib.common.rest_client [req-091213a5-9255-4214-8686-aa5381fa123a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-091213a5-9255-4214-8686-aa5381fa123a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["9XZ4i5cdSMmLsZI3SyzpjQ"], "expires_at": "2020-12-14T03:21:29.000000Z", "issued_at": "2020-12-14T02:21:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:29.747 189 INFO tempest.lib.common.fixed_network [-] (ServerActionsRbacTest:setUp) Found network {'id': '1c085583-16aa-4f2c-b48c-e9cce6ab197b', 'name': 'tempest-ServerActionsRbacTest-2074532455-network', 'tenant_id': '3400d8caa66043d0b7fa128b68a28ecc', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3400d8caa66043d0b7fa128b68a28ecc', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:14:02Z', 'updated_at': '2020-12-14T02:14:02Z', 'revision_number': 1} available for tenant 2020-12-14 02:21:30.313 186 INFO tempest.lib.common.rest_client [req-3b83aec3-723c-4705-b8d9-a39e38234ce3 ] Request (VolumesActionsV3RbacTest:test_volume_retype): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378 0.088s 2020-12-14 02:21:30.316 186 DEBUG tempest.lib.common.rest_client [req-3b83aec3-723c-4705-b8d9-a39e38234ce3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3b83aec3-723c-4705-b8d9-a39e38234ce3', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3b83aec3-723c-4705-b8d9-a39e38234ce3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378'} Body: b'{"volume": {"id": "0b10407a-651a-49f3-aa77-b884a83dc378", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:29.000000", "updated_at": "2020-12-14T02:21:29.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-528118061", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:30.406 189 INFO tempest.lib.common.rest_client [req-3515dfb9-b157-4f18-951b-35e017a1688b ] Request (ServerActionsRbacTest:setUp): 202 POST http://172.30.13.94/compute/v2.1/servers 0.650s 2020-12-14 02:21:30.407 186 INFO tempest.common.waiters [-] volume 0b10407a-651a-49f3-aa77-b884a83dc378 reached available after waiting for 1.407193 seconds 2020-12-14 02:21:30.409 189 DEBUG tempest.lib.common.rest_client [req-3515dfb9-b157-4f18-951b-35e017a1688b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerActionsRbacTest-server-1369510427", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "adminPass": "K1!tmNkF86tCRN0", "networks": [{"uuid": "1c085583-16aa-4f2c-b48c-e9cce6ab197b"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '385', 'location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3515dfb9-b157-4f18-951b-35e017a1688b', 'x-compute-request-id': 'req-3515dfb9-b157-4f18-951b-35e017a1688b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "K1!tmNkF86tCRN0"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:30.409 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:30.497 186 INFO tempest.lib.common.rest_client [req-e0bb70a8-0987-4d16-9ff0-17ddafb17493 ] Request (VolumesActionsV3RbacTest:test_volume_retype): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.082s 2020-12-14 02:21:30.500 186 DEBUG tempest.lib.common.rest_client [req-e0bb70a8-0987-4d16-9ff0-17ddafb17493 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0bb70a8-0987-4d16-9ff0-17ddafb17493', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:30.550 186 INFO tempest.lib.common.rest_client [req-745fb04f-a99b-47fe-9187-c8ce0407f641 ] Request (VolumesActionsV3RbacTest:test_volume_retype): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:21:30.554 186 DEBUG tempest.lib.common.rest_client [req-745fb04f-a99b-47fe-9187-c8ce0407f641 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-745fb04f-a99b-47fe-9187-c8ce0407f641', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["t6dagqLHTRGfC-n6gx2eHQ"], "expires_at": "2020-12-14T03:21:30.000000Z", "issued_at": "2020-12-14T02:21:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:30.566 189 INFO tempest.lib.common.rest_client [req-b11c25aa-1184-4029-8c29-bb6ad18200c2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.126s 2020-12-14 02:21:30.570 189 DEBUG tempest.lib.common.rest_client [req-b11c25aa-1184-4029-8c29-bb6ad18200c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1397', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b11c25aa-1184-4029-8c29-bb6ad18200c2', 'x-compute-request-id': 'req-b11c25aa-1184-4029-8c29-bb6ad18200c2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:30Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:30.651 197 INFO tempest.lib.common.rest_client [req-88b8f73e-0321-432d-805e-bfe74b1e9b8e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.233s 2020-12-14 02:21:30.655 197 DEBUG tempest.lib.common.rest_client [req-88b8f73e-0321-432d-805e-bfe74b1e9b8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-88b8f73e-0321-432d-805e-bfe74b1e9b8e', 'x-compute-request-id': 'req-88b8f73e-0321-432d-805e-bfe74b1e9b8e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:30.907 186 INFO tempest.lib.common.rest_client [req-15baf699-fa3a-4af1-9e29-d7ce181fdecd ] Request (VolumesActionsV3RbacTest:test_volume_retype): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378/action 0.344s 2020-12-14 02:21:30.909 186 DEBUG tempest.lib.common.rest_client [req-15baf699-fa3a-4af1-9e29-d7ce181fdecd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-retype": {"new_type": "tempest-VolumesActionsV3RbacTest-volume-type-193951222"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-15baf699-fa3a-4af1-9e29-d7ce181fdecd', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-15baf699-fa3a-4af1-9e29-d7ce181fdecd', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:30.912 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:31.008 186 INFO tempest.lib.common.rest_client [req-e062e8db-9d37-4c33-b4fc-9acb60018cf6 ] Request (VolumesActionsV3RbacTest:test_volume_retype): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.089s 2020-12-14 02:21:31.011 186 DEBUG tempest.lib.common.rest_client [req-e062e8db-9d37-4c33-b4fc-9acb60018cf6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e062e8db-9d37-4c33-b4fc-9acb60018cf6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:31.071 186 INFO tempest.lib.common.rest_client [req-aa342ed2-02b1-4f05-93da-0d7dd253b721 ] Request (VolumesActionsV3RbacTest:test_volume_retype): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:21:31.076 186 DEBUG tempest.lib.common.rest_client [req-aa342ed2-02b1-4f05-93da-0d7dd253b721 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa342ed2-02b1-4f05-93da-0d7dd253b721', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["cFhkezILSUGD0xI8HCekrA"], "expires_at": "2020-12-14T03:21:31.000000Z", "issued_at": "2020-12-14T02:21:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:31.224 186 INFO tempest.lib.common.rest_client [req-1d58a5f1-e65c-4669-a320-be9c72a41af3 ] Request (VolumesActionsV3RbacTest:test_volume_retype): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378 0.139s 2020-12-14 02:21:31.226 186 DEBUG tempest.lib.common.rest_client [req-1d58a5f1-e65c-4669-a320-be9c72a41af3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1d58a5f1-e65c-4669-a320-be9c72a41af3', 'content-length': '1117', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1d58a5f1-e65c-4669-a320-be9c72a41af3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378'} Body: b'{"volume": {"id": "0b10407a-651a-49f3-aa77-b884a83dc378", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:29.000000", "updated_at": "2020-12-14T02:21:31.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-528118061", "description": null, "volume_type": "tempest-VolumesActionsV3RbacTest-volume-type-193951222", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:31.305 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:21:31.319 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:update, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:21:31.320 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:31.384 186 INFO tempest.lib.common.rest_client [req-808471bf-a8d4-46d9-8def-9091ed9cbabd ] Request (VolumesActionsV3RbacTest:test_volume_set_bootable): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.058s 2020-12-14 02:21:31.388 186 DEBUG tempest.lib.common.rest_client [req-808471bf-a8d4-46d9-8def-9091ed9cbabd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-808471bf-a8d4-46d9-8def-9091ed9cbabd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:31.435 186 INFO tempest.lib.common.rest_client [req-60092364-2fda-49b4-81b3-1ebd01d9be88 ] Request (VolumesActionsV3RbacTest:test_volume_set_bootable): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:21:31.438 186 DEBUG tempest.lib.common.rest_client [req-60092364-2fda-49b4-81b3-1ebd01d9be88 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60092364-2fda-49b4-81b3-1ebd01d9be88', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["fw44Gd7iQw2TCTSL3IK0yQ"], "expires_at": "2020-12-14T03:21:31.000000Z", "issued_at": "2020-12-14T02:21:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:31.561 186 INFO tempest.lib.common.rest_client [req-7d1af719-21f5-45e8-a742-5a974a6556da ] Request (VolumesActionsV3RbacTest:test_volume_set_bootable): 200 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74/action 0.116s 2020-12-14 02:21:31.564 186 DEBUG tempest.lib.common.rest_client [req-7d1af719-21f5-45e8-a742-5a974a6556da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-set_bootable": {"bootable": true}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-7d1af719-21f5-45e8-a742-5a974a6556da', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7d1af719-21f5-45e8-a742-5a974a6556da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:31.567 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:31.640 186 INFO tempest.lib.common.rest_client [req-e29eb225-baf5-4247-ab78-49eb13287d89 ] Request (VolumesActionsV3RbacTest:test_volume_set_bootable): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.067s 2020-12-14 02:21:31.642 186 DEBUG tempest.lib.common.rest_client [req-e29eb225-baf5-4247-ab78-49eb13287d89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e29eb225-baf5-4247-ab78-49eb13287d89', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:31.689 186 INFO tempest.lib.common.rest_client [req-1779fa0f-34a4-43e2-8bb3-68af9b504bcd ] Request (VolumesActionsV3RbacTest:test_volume_set_bootable): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:21:31.691 186 DEBUG tempest.lib.common.rest_client [req-1779fa0f-34a4-43e2-8bb3-68af9b504bcd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1779fa0f-34a4-43e2-8bb3-68af9b504bcd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["QSO7JcYzSvuKIPsgYYhXhg"], "expires_at": "2020-12-14T03:21:31.000000Z", "issued_at": "2020-12-14T02:21:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:31.701 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:21:31.715 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_actions:unreserve, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:21:31.717 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:31.782 186 INFO tempest.lib.common.rest_client [req-3b561e0a-d56b-4caa-8561-495091d1c904 ] Request (VolumesActionsV3RbacTest:test_volume_unreserve): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.060s 2020-12-14 02:21:31.786 186 DEBUG tempest.lib.common.rest_client [req-3b561e0a-d56b-4caa-8561-495091d1c904 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b561e0a-d56b-4caa-8561-495091d1c904', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:31.834 186 INFO tempest.lib.common.rest_client [req-c9001508-d73d-48d1-8d43-e01bfe7837e0 ] Request (VolumesActionsV3RbacTest:test_volume_unreserve): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:21:31.838 186 DEBUG tempest.lib.common.rest_client [req-c9001508-d73d-48d1-8d43-e01bfe7837e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9001508-d73d-48d1-8d43-e01bfe7837e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["BJin1MvASCeJWecsXoNn8Q"], "expires_at": "2020-12-14T03:21:31.000000Z", "issued_at": "2020-12-14T02:21:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:31.856 189 INFO tempest.lib.common.rest_client [req-05849843-3b69-4d63-abf1-bcf8766f9556 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.168s 2020-12-14 02:21:31.859 189 DEBUG tempest.lib.common.rest_client [req-05849843-3b69-4d63-abf1-bcf8766f9556 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1490', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-05849843-3b69-4d63-abf1-bcf8766f9556', 'x-compute-request-id': 'req-05849843-3b69-4d63-abf1-bcf8766f9556', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:32Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:31.969 189 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/spawning" after 1 second wait 2020-12-14 02:21:31.990 197 INFO tempest.lib.common.rest_client [req-aa6311dd-8166-498b-af83-76ed43d9752c ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.229s 2020-12-14 02:21:31.993 197 DEBUG tempest.lib.common.rest_client [req-aa6311dd-8166-498b-af83-76ed43d9752c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aa6311dd-8166-498b-af83-76ed43d9752c', 'x-compute-request-id': 'req-aa6311dd-8166-498b-af83-76ed43d9752c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:32.013 186 INFO tempest.lib.common.rest_client [req-efc2de38-f746-4fa4-aa10-d53426fdc314 ] Request (VolumesActionsV3RbacTest:test_volume_unreserve): 202 POST http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74/action 0.166s 2020-12-14 02:21:32.016 186 DEBUG tempest.lib.common.rest_client [req-efc2de38-f746-4fa4-aa10-d53426fdc314 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-unreserve": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-efc2de38-f746-4fa4-aa10-d53426fdc314', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-efc2de38-f746-4fa4-aa10-d53426fdc314', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:32.019 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:32.090 186 INFO tempest.lib.common.rest_client [req-7e8c8cd2-38b4-4137-8104-ba7ca12bd802 ] Request (VolumesActionsV3RbacTest:test_volume_unreserve): 200 GET http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles 0.065s 2020-12-14 02:21:32.093 186 DEBUG tempest.lib.common.rest_client [req-7e8c8cd2-38b4-4137-8104-ba7ca12bd802 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e8c8cd2-38b4-4137-8104-ba7ca12bd802', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219/users/850df44ed8594e168ef24e572f40ef31/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:32.153 186 INFO tempest.lib.common.rest_client [req-10699595-a8cc-4150-95e4-540ab1202d23 ] Request (VolumesActionsV3RbacTest:test_volume_unreserve): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:21:32.158 186 DEBUG tempest.lib.common.rest_client [req-10699595-a8cc-4150-95e4-540ab1202d23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10699595-a8cc-4150-95e4-540ab1202d23', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "850df44ed8594e168ef24e572f40ef31", "name": "tempest-VolumesActionsV3RbacTest-96799587", "password_expires_at": null}, "audit_ids": ["N31cmQYdRru7jzDykM8iUw"], "expires_at": "2020-12-14T03:21:32.000000Z", "issued_at": "2020-12-14T02:21:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3477ecc8785a4bd49948e0b216b9f219", "name": "tempest-VolumesActionsV3RbacTest-96799587"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3477ecc8785a4bd49948e0b216b9f219", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:32.325 186 INFO tempest.lib.common.rest_client [req-43017637-ecca-4ef1-b424-687824b0c974 ] Request (VolumesActionsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378 0.148s 2020-12-14 02:21:32.328 186 DEBUG tempest.lib.common.rest_client [req-43017637-ecca-4ef1-b424-687824b0c974 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-43017637-ecca-4ef1-b424-687824b0c974', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:32.409 186 INFO tempest.lib.common.rest_client [req-d1c8f541-ef64-43cf-85d6-edadb5ad6682 ] Request (VolumesActionsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378 0.076s 2020-12-14 02:21:32.411 186 DEBUG tempest.lib.common.rest_client [req-d1c8f541-ef64-43cf-85d6-edadb5ad6682 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d1c8f541-ef64-43cf-85d6-edadb5ad6682', 'content-length': '1116', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d1c8f541-ef64-43cf-85d6-edadb5ad6682', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378'} Body: b'{"volume": {"id": "0b10407a-651a-49f3-aa77-b884a83dc378", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:29.000000", "updated_at": "2020-12-14T02:21:32.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-528118061", "description": null, "volume_type": "tempest-VolumesActionsV3RbacTest-volume-type-193951222", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:33.214 189 INFO tempest.lib.common.rest_client [req-d7473138-19ff-4c98-87f9-28f86e0d9851 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.235s 2020-12-14 02:21:33.218 189 DEBUG tempest.lib.common.rest_client [req-d7473138-19ff-4c98-87f9-28f86e0d9851 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d7473138-19ff-4c98-87f9-28f86e0d9851', 'x-compute-request-id': 'req-d7473138-19ff-4c98-87f9-28f86e0d9851', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:32Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:33.355 197 INFO tempest.lib.common.rest_client [req-3bb9cda1-ad30-4edb-94cc-90b8f75f966a ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.254s 2020-12-14 02:21:33.358 197 DEBUG tempest.lib.common.rest_client [req-3bb9cda1-ad30-4edb-94cc-90b8f75f966a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3bb9cda1-ad30-4edb-94cc-90b8f75f966a', 'x-compute-request-id': 'req-3bb9cda1-ad30-4edb-94cc-90b8f75f966a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:33.578 186 INFO tempest.lib.common.rest_client [req-5c5fc9d9-ab4e-4cce-a88b-fdafa3fdfcc3 ] Request (VolumesActionsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378 0.065s 2020-12-14 02:21:33.580 186 DEBUG tempest.lib.common.rest_client [req-5c5fc9d9-ab4e-4cce-a88b-fdafa3fdfcc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-5c5fc9d9-ab4e-4cce-a88b-fdafa3fdfcc3', 'x-openstack-request-id': 'req-5c5fc9d9-ab4e-4cce-a88b-fdafa3fdfcc3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/0b10407a-651a-49f3-aa77-b884a83dc378'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 0b10407a-651a-49f3-aa77-b884a83dc378 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:33.667 186 INFO tempest.lib.common.rest_client [req-92856875-4d71-422e-92a8-26844995a5ba ] Request (VolumesActionsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/types/21c9b385-7088-465c-9923-6c14b4c4d41d 0.080s 2020-12-14 02:21:33.670 186 DEBUG tempest.lib.common.rest_client [req-92856875-4d71-422e-92a8-26844995a5ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-92856875-4d71-422e-92a8-26844995a5ba', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/types/21c9b385-7088-465c-9923-6c14b4c4d41d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:33.708 186 INFO tempest.lib.common.rest_client [req-7292f09d-cc36-4a63-ab74-624af1c718ca ] Request (VolumesActionsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/types/21c9b385-7088-465c-9923-6c14b4c4d41d 0.032s 2020-12-14 02:21:33.711 186 DEBUG tempest.lib.common.rest_client [req-7292f09d-cc36-4a63-ab74-624af1c718ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-7292f09d-cc36-4a63-ab74-624af1c718ca', 'x-openstack-request-id': 'req-7292f09d-cc36-4a63-ab74-624af1c718ca', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/types/21c9b385-7088-465c-9923-6c14b4c4d41d'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 21c9b385-7088-465c-9923-6c14b4c4d41d could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:33.790 186 INFO tempest.lib.common.rest_client [req-406c6905-c7d0-4392-9908-b6b896f09e75 ] Request (VolumesActionsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6 0.072s 2020-12-14 02:21:33.793 186 DEBUG tempest.lib.common.rest_client [req-406c6905-c7d0-4392-9908-b6b896f09e75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-406c6905-c7d0-4392-9908-b6b896f09e75', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:33.874 186 INFO tempest.lib.common.rest_client [req-9a11cc5a-213d-4d95-9d2b-0e7737a7d5ac ] Request (VolumesActionsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6 0.076s 2020-12-14 02:21:33.876 186 DEBUG tempest.lib.common.rest_client [req-9a11cc5a-213d-4d95-9d2b-0e7737a7d5ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9a11cc5a-213d-4d95-9d2b-0e7737a7d5ac', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9a11cc5a-213d-4d95-9d2b-0e7737a7d5ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6'} Body: b'{"volume": {"id": "fd0d06af-5d1d-45ca-b996-1c9b32c33ad6", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:26.000000", "updated_at": "2020-12-14T02:21:34.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-730014311", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:34.573 189 INFO tempest.lib.common.rest_client [req-37605558-c86b-4a25-bf42-63e3db579de2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.235s 2020-12-14 02:21:34.577 189 DEBUG tempest.lib.common.rest_client [req-37605558-c86b-4a25-bf42-63e3db579de2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-37605558-c86b-4a25-bf42-63e3db579de2', 'x-compute-request-id': 'req-37605558-c86b-4a25-bf42-63e3db579de2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:32Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:34.731 197 INFO tempest.lib.common.rest_client [req-5cd51df4-dfe2-4c1b-a8cc-bcec7b5e8ebb ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.265s 2020-12-14 02:21:34.735 197 DEBUG tempest.lib.common.rest_client [req-5cd51df4-dfe2-4c1b-a8cc-bcec7b5e8ebb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5cd51df4-dfe2-4c1b-a8cc-bcec7b5e8ebb', 'x-compute-request-id': 'req-5cd51df4-dfe2-4c1b-a8cc-bcec7b5e8ebb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:35.021 186 INFO tempest.lib.common.rest_client [req-6400277b-b685-4dce-9791-19ec45395910 ] Request (VolumesActionsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6 0.063s 2020-12-14 02:21:35.023 186 DEBUG tempest.lib.common.rest_client [req-6400277b-b685-4dce-9791-19ec45395910 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-6400277b-b685-4dce-9791-19ec45395910', 'x-openstack-request-id': 'req-6400277b-b685-4dce-9791-19ec45395910', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/fd0d06af-5d1d-45ca-b996-1c9b32c33ad6'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume fd0d06af-5d1d-45ca-b996-1c9b32c33ad6 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:35.091 186 INFO tempest.lib.common.rest_client [req-da5e19de-9721-4908-8e4f-27a4c5b11449 ] Request (VolumesActionsV3RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3 0.060s 2020-12-14 02:21:35.095 186 DEBUG tempest.lib.common.rest_client [req-da5e19de-9721-4908-8e4f-27a4c5b11449 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-da5e19de-9721-4908-8e4f-27a4c5b11449', 'x-openstack-request-id': 'req-da5e19de-9721-4908-8e4f-27a4c5b11449', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/5b87dda8-ef45-47f8-b381-40f4b2ae77a3'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 5b87dda8-ef45-47f8-b381-40f4b2ae77a3 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:35.190 186 INFO tempest.lib.common.rest_client [req-4f3c7671-b6fb-4405-ad93-1ffe904845b3 ] Request (VolumesActionsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2 0.087s 2020-12-14 02:21:35.192 186 DEBUG tempest.lib.common.rest_client [req-4f3c7671-b6fb-4405-ad93-1ffe904845b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4f3c7671-b6fb-4405-ad93-1ffe904845b3', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:35.280 186 INFO tempest.lib.common.rest_client [req-85d60e22-82c8-402e-95dc-3a39ed7a5694 ] Request (VolumesActionsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2 0.082s 2020-12-14 02:21:35.282 186 DEBUG tempest.lib.common.rest_client [req-85d60e22-82c8-402e-95dc-3a39ed7a5694 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-85d60e22-82c8-402e-95dc-3a39ed7a5694', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-85d60e22-82c8-402e-95dc-3a39ed7a5694', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2'} Body: b'{"volume": {"id": "2641470e-67a4-44b2-803c-b22beea743a2", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:04.000000", "updated_at": "2020-12-14T02:21:35.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-771435504", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:35.921 189 INFO tempest.lib.common.rest_client [req-90e529fa-1cc9-4dc6-b6e0-1ffbff618281 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.225s 2020-12-14 02:21:35.924 189 DEBUG tempest.lib.common.rest_client [req-90e529fa-1cc9-4dc6-b6e0-1ffbff618281 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-90e529fa-1cc9-4dc6-b6e0-1ffbff618281', 'x-compute-request-id': 'req-90e529fa-1cc9-4dc6-b6e0-1ffbff618281', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:32Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:36.048 197 INFO tempest.lib.common.rest_client [req-26ace4ff-f3d6-4841-9b3e-53fa657077fc ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.201s 2020-12-14 02:21:36.052 197 DEBUG tempest.lib.common.rest_client [req-26ace4ff-f3d6-4841-9b3e-53fa657077fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-26ace4ff-f3d6-4841-9b3e-53fa657077fc', 'x-compute-request-id': 'req-26ace4ff-f3d6-4841-9b3e-53fa657077fc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:36.451 186 INFO tempest.lib.common.rest_client [req-44206960-df7b-4c34-96cb-d47e56f31ea3 ] Request (VolumesActionsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2 0.068s 2020-12-14 02:21:36.454 186 DEBUG tempest.lib.common.rest_client [req-44206960-df7b-4c34-96cb-d47e56f31ea3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-44206960-df7b-4c34-96cb-d47e56f31ea3', 'x-openstack-request-id': 'req-44206960-df7b-4c34-96cb-d47e56f31ea3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/2641470e-67a4-44b2-803c-b22beea743a2'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 2641470e-67a4-44b2-803c-b22beea743a2 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:36.551 186 INFO tempest.lib.common.rest_client [req-6e191f2d-9db3-4229-84ff-a0185521eab9 ] Request (VolumesActionsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74 0.090s 2020-12-14 02:21:36.554 186 DEBUG tempest.lib.common.rest_client [req-6e191f2d-9db3-4229-84ff-a0185521eab9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6e191f2d-9db3-4229-84ff-a0185521eab9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:36.643 186 INFO tempest.lib.common.rest_client [req-d001519b-c832-4e6d-ba40-ddbf881de31a ] Request (VolumesActionsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74 0.081s 2020-12-14 02:21:36.646 186 DEBUG tempest.lib.common.rest_client [req-d001519b-c832-4e6d-ba40-ddbf881de31a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d001519b-c832-4e6d-ba40-ddbf881de31a', 'content-length': '1085', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d001519b-c832-4e6d-ba40-ddbf881de31a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74'} Body: b'{"volume": {"id": "4ea6b478-822c-4a36-97eb-50a679c8aa74", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:20:33.000000", "updated_at": "2020-12-14T02:21:37.000000", "name": "tempest-VolumesActionsV3RbacTest-Volume-1568188414", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {"readonly": "False"}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74"}], "user_id": "850df44ed8594e168ef24e572f40ef31", "bootable": "true", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "3477ecc8785a4bd49948e0b216b9f219"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:37.252 189 INFO tempest.lib.common.rest_client [req-0923a52e-0863-407e-8b3a-976928315cb1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.212s 2020-12-14 02:21:37.255 189 DEBUG tempest.lib.common.rest_client [req-0923a52e-0863-407e-8b3a-976928315cb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0923a52e-0863-407e-8b3a-976928315cb1', 'x-compute-request-id': 'req-0923a52e-0863-407e-8b3a-976928315cb1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:32Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:37.395 197 INFO tempest.lib.common.rest_client [req-7ef3ec6e-f2d6-4aa9-a24c-7c61a02cf68f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.235s 2020-12-14 02:21:37.398 197 DEBUG tempest.lib.common.rest_client [req-7ef3ec6e-f2d6-4aa9-a24c-7c61a02cf68f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7ef3ec6e-f2d6-4aa9-a24c-7c61a02cf68f', 'x-compute-request-id': 'req-7ef3ec6e-f2d6-4aa9-a24c-7c61a02cf68f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:37.811 186 INFO tempest.lib.common.rest_client [req-a5bcb86d-41d7-467a-b396-b8b40e44be7e ] Request (VolumesActionsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74 0.064s 2020-12-14 02:21:37.814 186 DEBUG tempest.lib.common.rest_client [req-a5bcb86d-41d7-467a-b396-b8b40e44be7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-a5bcb86d-41d7-467a-b396-b8b40e44be7e', 'x-openstack-request-id': 'req-a5bcb86d-41d7-467a-b396-b8b40e44be7e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3477ecc8785a4bd49948e0b216b9f219/volumes/4ea6b478-822c-4a36-97eb-50a679c8aa74'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 4ea6b478-822c-4a36-97eb-50a679c8aa74 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:37.817 186 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '54c4a38a-1e6f-45c8-b018-54fcb643111b', 'name': 'tempest-VolumesActionsV3RbacTest-639497835-network', 'tenant_id': '3477ecc8785a4bd49948e0b216b9f219', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3477ecc8785a4bd49948e0b216b9f219', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 61, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:20:19Z', 'updated_at': '2020-12-14T02:20:19Z', 'revision_number': 1}, subnet: {'id': 'a201f9eb-bba5-44e5-89a4-ea8b3492644c', 'name': 'tempest-VolumesActionsV3RbacTest-639497835-subnet', 'tenant_id': '3477ecc8785a4bd49948e0b216b9f219', 'network_id': '54c4a38a-1e6f-45c8-b018-54fcb643111b', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:20:20Z', 'updated_at': '2020-12-14T02:20:20Z', 'revision_number': 0, 'project_id': '3477ecc8785a4bd49948e0b216b9f219'}, router: {'id': '5ff79e18-a845-4b5f-a44a-68506a54eba7', 'name': 'tempest-VolumesActionsV3RbacTest-639497835-router', 'tenant_id': '3477ecc8785a4bd49948e0b216b9f219', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.157'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::129'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:20:20Z', 'updated_at': '2020-12-14T02:20:22Z', 'revision_number': 3, 'project_id': '3477ecc8785a4bd49948e0b216b9f219'} _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:21:38.600 189 INFO tempest.lib.common.rest_client [req-0c4ad60c-88e3-40d0-8316-469261d0990f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.224s 2020-12-14 02:21:38.603 189 DEBUG tempest.lib.common.rest_client [req-0c4ad60c-88e3-40d0-8316-469261d0990f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0c4ad60c-88e3-40d0-8316-469261d0990f', 'x-compute-request-id': 'req-0c4ad60c-88e3-40d0-8316-469261d0990f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:37Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:38.714 189 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 8 second wait 2020-12-14 02:21:38.718 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:21:38.722 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.726 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.729 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.732 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.736 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.739 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.744 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.747 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.750 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.752 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.755 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.758 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.761 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.764 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.767 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.770 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.773 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.776 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.778 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.781 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.784 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.787 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.789 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.792 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.795 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.798 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.800 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.802 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.804 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.806 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.808 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.810 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.812 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.814 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.816 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.818 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.820 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.823 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.825 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.827 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.830 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.831 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.834 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.836 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.838 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.840 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.842 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.844 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.847 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.849 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.851 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.853 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.855 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.857 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.860 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.862 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.866 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.868 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.870 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.873 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.875 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.877 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.880 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.882 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.884 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.886 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.888 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.891 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.893 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.895 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.897 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:21:38.906 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:revert_resize, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:21:39.261 189 INFO tempest.lib.common.rest_client [req-c39a0508-8faa-46da-9a5f-ceab44b9da21 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.350s 2020-12-14 02:21:39.265 189 DEBUG tempest.lib.common.rest_client [req-c39a0508-8faa-46da-9a5f-ceab44b9da21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c39a0508-8faa-46da-9a5f-ceab44b9da21', 'x-compute-request-id': 'req-c39a0508-8faa-46da-9a5f-ceab44b9da21', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:37Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:39.661 189 INFO tempest.lib.common.rest_client [req-5033b1fc-fbf4-4abc-90c9-15bb64116364 ] Request (ServerActionsRbacTest:test_revert_resize_server): 202 POST http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1/action 0.317s 2020-12-14 02:21:39.665 189 DEBUG tempest.lib.common.rest_client [req-5033b1fc-fbf4-4abc-90c9-15bb64116364 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"resize": {"flavorRef": "8a56823e-8563-423c-896d-50c73f98dd64"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5033b1fc-fbf4-4abc-90c9-15bb64116364', 'x-compute-request-id': 'req-5033b1fc-fbf4-4abc-90c9-15bb64116364', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:39.895 189 INFO tempest.lib.common.rest_client [req-96ff0615-63dd-4568-9496-4b9dfe1e834e ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.215s 2020-12-14 02:21:39.898 189 DEBUG tempest.lib.common.rest_client [req-96ff0615-63dd-4568-9496-4b9dfe1e834e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-96ff0615-63dd-4568-9496-4b9dfe1e834e', 'x-compute-request-id': 'req-96ff0615-63dd-4568-9496-4b9dfe1e834e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:40Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:41.269 189 INFO tempest.lib.common.rest_client [req-5c5acd58-1f36-43c1-96d5-b3a8242bb042 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.258s 2020-12-14 02:21:41.271 189 DEBUG tempest.lib.common.rest_client [req-5c5acd58-1f36-43c1-96d5-b3a8242bb042 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1727', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5c5acd58-1f36-43c1-96d5-b3a8242bb042', 'x-compute-request-id': 'req-5c5acd58-1f36-43c1-96d5-b3a8242bb042', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:40Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_prep", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:42.145 197 INFO tempest.lib.common.rest_client [req-69b9fd94-2598-429b-8e27-eb31370bd6b6 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 3.640s 2020-12-14 02:21:42.148 197 DEBUG tempest.lib.common.rest_client [req-69b9fd94-2598-429b-8e27-eb31370bd6b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-69b9fd94-2598-429b-8e27-eb31370bd6b6', 'x-compute-request-id': 'req-69b9fd94-2598-429b-8e27-eb31370bd6b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:42.714 189 INFO tempest.lib.common.rest_client [req-9ebf91ac-68c0-4860-84ad-d8057805265f ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.330s 2020-12-14 02:21:42.718 189 DEBUG tempest.lib.common.rest_client [req-9ebf91ac-68c0-4860-84ad-d8057805265f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9ebf91ac-68c0-4860-84ad-d8057805265f', 'x-compute-request-id': 'req-9ebf91ac-68c0-4860-84ad-d8057805265f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:42Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:42.817 189 INFO tempest.common.waiters [-] State transition "RESIZE/resize_prep" ==> "RESIZE/resize_migrating" after 2 second wait 2020-12-14 02:21:43.488 197 INFO tempest.lib.common.rest_client [req-90dc3c9e-84e5-4701-9c94-68c8facea017 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.246s 2020-12-14 02:21:43.491 197 DEBUG tempest.lib.common.rest_client [req-90dc3c9e-84e5-4701-9c94-68c8facea017 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-90dc3c9e-84e5-4701-9c94-68c8facea017', 'x-compute-request-id': 'req-90dc3c9e-84e5-4701-9c94-68c8facea017', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:44.035 189 INFO tempest.lib.common.rest_client [req-25a913ee-9cbb-4b09-a88b-30d9d914757a ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.210s 2020-12-14 02:21:44.039 189 DEBUG tempest.lib.common.rest_client [req-25a913ee-9cbb-4b09-a88b-30d9d914757a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-25a913ee-9cbb-4b09-a88b-30d9d914757a', 'x-compute-request-id': 'req-25a913ee-9cbb-4b09-a88b-30d9d914757a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:42Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:44.385 186 INFO tempest.lib.common.rest_client [req-ceae0615-b50d-43a5-bf20-ba0433c20597 ] Request (VolumesActionsV3RbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/5ff79e18-a845-4b5f-a44a-68506a54eba7/remove_router_interface 6.560s 2020-12-14 02:21:44.387 186 DEBUG tempest.lib.common.rest_client [req-ceae0615-b50d-43a5-bf20-ba0433c20597 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "a201f9eb-bba5-44e5-89a4-ea8b3492644c"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-ceae0615-b50d-43a5-bf20-ba0433c20597', 'date': 'Mon, 14 Dec 2020 02:21:44 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/5ff79e18-a845-4b5f-a44a-68506a54eba7/remove_router_interface'} Body: b'{"id": "5ff79e18-a845-4b5f-a44a-68506a54eba7", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "port_id": "afb76b4e-818f-46eb-b795-44f6b750e4a1", "network_id": "54c4a38a-1e6f-45c8-b018-54fcb643111b", "subnet_id": "a201f9eb-bba5-44e5-89a4-ea8b3492644c", "subnet_ids": ["a201f9eb-bba5-44e5-89a4-ea8b3492644c"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:44.816 197 INFO tempest.lib.common.rest_client [req-07a99717-877f-4118-b8b7-07fa47920663 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.239s 2020-12-14 02:21:44.819 197 DEBUG tempest.lib.common.rest_client [req-07a99717-877f-4118-b8b7-07fa47920663 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-07a99717-877f-4118-b8b7-07fa47920663', 'x-compute-request-id': 'req-07a99717-877f-4118-b8b7-07fa47920663', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:45.646 189 INFO tempest.lib.common.rest_client [req-6bdf6e35-f7d1-4957-9b54-18e6fc1f651b ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.499s 2020-12-14 02:21:45.649 189 DEBUG tempest.lib.common.rest_client [req-6bdf6e35-f7d1-4957-9b54-18e6fc1f651b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6bdf6e35-f7d1-4957-9b54-18e6fc1f651b', 'x-compute-request-id': 'req-6bdf6e35-f7d1-4957-9b54-18e6fc1f651b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:42Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_migrating", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:45.679 186 INFO tempest.lib.common.rest_client [req-cf12c983-7dc4-4219-9dff-a7485ffc8428 ] Request (VolumesActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/5ff79e18-a845-4b5f-a44a-68506a54eba7 1.286s 2020-12-14 02:21:45.684 186 DEBUG tempest.lib.common.rest_client [req-cf12c983-7dc4-4219-9dff-a7485ffc8428 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-cf12c983-7dc4-4219-9dff-a7485ffc8428', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:21:45 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/5ff79e18-a845-4b5f-a44a-68506a54eba7'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:46.160 197 INFO tempest.lib.common.rest_client [req-9c13231f-4cca-415a-af30-4aa673e200b4 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.236s 2020-12-14 02:21:46.164 197 DEBUG tempest.lib.common.rest_client [req-9c13231f-4cca-415a-af30-4aa673e200b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9c13231f-4cca-415a-af30-4aa673e200b4', 'x-compute-request-id': 'req-9c13231f-4cca-415a-af30-4aa673e200b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:46.211 186 INFO tempest.lib.common.rest_client [req-641060a7-4fbd-45be-9c38-7c6361a7ead5 ] Request (VolumesActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/a201f9eb-bba5-44e5-89a4-ea8b3492644c 0.520s 2020-12-14 02:21:46.213 186 DEBUG tempest.lib.common.rest_client [req-641060a7-4fbd-45be-9c38-7c6361a7ead5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-641060a7-4fbd-45be-9c38-7c6361a7ead5', 'date': 'Mon, 14 Dec 2020 02:21:46 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/a201f9eb-bba5-44e5-89a4-ea8b3492644c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:46.993 189 INFO tempest.lib.common.rest_client [req-74638d00-0cd6-443e-b6a9-bb8b2cb868a3 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.207s 2020-12-14 02:21:46.996 189 DEBUG tempest.lib.common.rest_client [req-74638d00-0cd6-443e-b6a9-bb8b2cb868a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-74638d00-0cd6-443e-b6a9-bb8b2cb868a3', 'x-compute-request-id': 'req-74638d00-0cd6-443e-b6a9-bb8b2cb868a3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:45Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_migrated", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:47.003 186 INFO tempest.lib.common.rest_client [req-f2772f01-d469-440b-bc49-ee7051f71623 ] Request (VolumesActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/54c4a38a-1e6f-45c8-b018-54fcb643111b 0.785s 2020-12-14 02:21:47.005 186 DEBUG tempest.lib.common.rest_client [req-f2772f01-d469-440b-bc49-ee7051f71623 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-f2772f01-d469-440b-bc49-ee7051f71623', 'date': 'Mon, 14 Dec 2020 02:21:46 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/54c4a38a-1e6f-45c8-b018-54fcb643111b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:47.116 189 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrating" ==> "RESIZE/resize_migrated" after 7 second wait 2020-12-14 02:21:47.193 186 INFO tempest.lib.common.rest_client [req-81e289a3-a330-488d-ae24-964c44065fd3 ] Request (VolumesActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/850df44ed8594e168ef24e572f40ef31 0.182s 2020-12-14 02:21:47.196 186 DEBUG tempest.lib.common.rest_client [req-81e289a3-a330-488d-ae24-964c44065fd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81e289a3-a330-488d-ae24-964c44065fd3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/850df44ed8594e168ef24e572f40ef31'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:47.252 186 INFO tempest.lib.common.rest_client [req-017c32b8-42ee-4583-9fdc-486b24d0bbd7 ] Request (VolumesActionsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3477ecc8785a4bd49948e0b216b9f219&name=default 0.050s 2020-12-14 02:21:47.254 186 DEBUG tempest.lib.common.rest_client [req-017c32b8-42ee-4583-9fdc-486b24d0bbd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-017c32b8-42ee-4583-9fdc-486b24d0bbd7', 'date': 'Mon, 14 Dec 2020 02:21:47 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3477ecc8785a4bd49948e0b216b9f219&name=default'} Body: b'{"security_groups": [{"id": "07076a90-45cf-4d03-a670-fa90a363d2c8", "name": "default", "stateful": true, "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "description": "Default security group", "security_group_rules": [{"id": "3f3cbfec-5565-402d-8ba3-5d8b14a86ffc", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "security_group_id": "07076a90-45cf-4d03-a670-fa90a363d2c8", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:20:19Z", "updated_at": "2020-12-14T02:20:19Z", "revision_number": 0, "project_id": "3477ecc8785a4bd49948e0b216b9f219"}, {"id": "6ec6a613-c348-46ef-9213-6f70ad0ccd9d", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "security_group_id": "07076a90-45cf-4d03-a670-fa90a363d2c8", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:20:19Z", "updated_at": "2020-12-14T02:20:19Z", "revision_number": 0, "project_id": "3477ecc8785a4bd49948e0b216b9f219"}, {"id": "b8b0d0d7-5fa1-41bc-85f6-c558a273debd", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "security_group_id": "07076a90-45cf-4d03-a670-fa90a363d2c8", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "07076a90-45cf-4d03-a670-fa90a363d2c8", "description": null, "tags": [], "created_at": "2020-12-14T02:20:19Z", "updated_at": "2020-12-14T02:20:19Z", "revision_number": 0, "project_id": "3477ecc8785a4bd49948e0b216b9f219"}, {"id": "ea611322-7f65-46a2-be58-df3934f71e65", "tenant_id": "3477ecc8785a4bd49948e0b216b9f219", "security_group_id": "07076a90-45cf-4d03-a670-fa90a363d2c8", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "07076a90-45cf-4d03-a670-fa90a363d2c8", "description": null, "tags": [], "created_at": "2020-12-14T02:20:19Z", "updated_at": "2020-12-14T02:20:19Z", "revision_number": 0, "project_id": "3477ecc8785a4bd49948e0b216b9f219"}], "tags": [], "created_at": "2020-12-14T02:20:19Z", "updated_at": "2020-12-14T02:20:19Z", "revision_number": 1, "project_id": "3477ecc8785a4bd49948e0b216b9f219"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:47.416 186 INFO tempest.lib.common.rest_client [req-814f9132-6e79-4bdf-81e5-f61ab5d89293 ] Request (VolumesActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/07076a90-45cf-4d03-a670-fa90a363d2c8 0.154s 2020-12-14 02:21:47.419 186 DEBUG tempest.lib.common.rest_client [req-814f9132-6e79-4bdf-81e5-f61ab5d89293 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-814f9132-6e79-4bdf-81e5-f61ab5d89293', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:21:47 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/07076a90-45cf-4d03-a670-fa90a363d2c8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:47.490 197 INFO tempest.lib.common.rest_client [req-f0bba6d8-3be8-4c5b-8b67-50cf142972f3 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.219s 2020-12-14 02:21:47.493 197 DEBUG tempest.lib.common.rest_client [req-f0bba6d8-3be8-4c5b-8b67-50cf142972f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f0bba6d8-3be8-4c5b-8b67-50cf142972f3', 'x-compute-request-id': 'req-f0bba6d8-3be8-4c5b-8b67-50cf142972f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:47.645 186 INFO tempest.lib.common.rest_client [req-20330a7a-e2af-4886-98ac-0d1f9b70ca6b ] Request (VolumesActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219 0.218s 2020-12-14 02:21:47.647 186 DEBUG tempest.lib.common.rest_client [req-20330a7a-e2af-4886-98ac-0d1f9b70ca6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20330a7a-e2af-4886-98ac-0d1f9b70ca6b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3477ecc8785a4bd49948e0b216b9f219'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:47.764 186 INFO tempest.lib.common.rest_client [req-a3905c30-f506-4db8-b643-892fad01790c ] Request (VolumesBackupsV39RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:21:47.766 186 DEBUG tempest.lib.common.rest_client [req-a3905c30-f506-4db8-b643-892fad01790c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3905c30-f506-4db8-b643-892fad01790c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["xh3ykzp5RjOCDLk_E2-E2Q"], "expires_at": "2020-12-14T03:21:47.000000Z", "issued_at": "2020-12-14T02:21:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:47.855 186 INFO tempest.lib.common.rest_client [req-d721c3e2-6329-416e-8722-e762b5dfab9c ] Request (VolumesBackupsV39RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:21:47.858 186 DEBUG tempest.lib.common.rest_client [req-d721c3e2-6329-416e-8722-e762b5dfab9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d721c3e2-6329-416e-8722-e762b5dfab9c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["HwwOmEoFQYK9XltRL3Gr_w"], "expires_at": "2020-12-14T03:21:47.000000Z", "issued_at": "2020-12-14T02:21:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:47.938 186 INFO tempest.lib.common.rest_client [req-ff9a20c5-cf2a-40da-aaf2-2bba2a8d961a ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.073s 2020-12-14 02:21:47.941 186 DEBUG tempest.lib.common.rest_client [req-ff9a20c5-cf2a-40da-aaf2-2bba2a8d961a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff9a20c5-cf2a-40da-aaf2-2bba2a8d961a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:48.051 186 INFO tempest.lib.common.rest_client [req-17dd6534-ccf8-4604-8dd9-024a6e0d4dde ] Request (VolumesBackupsV39RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.102s 2020-12-14 02:21:48.053 186 DEBUG tempest.lib.common.rest_client [req-17dd6534-ccf8-4604-8dd9-024a6e0d4dde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesBackupsV39RbacTest-80083155-desc", "domain_id": "default", "name": "tempest-VolumesBackupsV39RbacTest-80083155"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17dd6534-ccf8-4604-8dd9-024a6e0d4dde', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "7de39419c83b45f5972fcc1eb500d05c", "name": "tempest-VolumesBackupsV39RbacTest-80083155", "domain_id": "default", "description": "tempest-VolumesBackupsV39RbacTest-80083155-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:48.194 186 INFO tempest.lib.common.rest_client [req-f2547988-81da-46d6-8c9b-75e6c72a202b ] Request (VolumesBackupsV39RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.134s 2020-12-14 02:21:48.197 186 DEBUG tempest.lib.common.rest_client [req-f2547988-81da-46d6-8c9b-75e6c72a202b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesBackupsV39RbacTest-80083155", "password": "F0&yjOGRE^P~a@5", "project_id": "7de39419c83b45f5972fcc1eb500d05c", "email": "tempest-VolumesBackupsV39RbacTest-801814671@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '403', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2547988-81da-46d6-8c9b-75e6c72a202b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "7de39419c83b45f5972fcc1eb500d05c", "email": "tempest-VolumesBackupsV39RbacTest-801814671@example.com", "id": "598a70319811422cba85c1b441d003f0", "name": "tempest-VolumesBackupsV39RbacTest-80083155", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/598a70319811422cba85c1b441d003f0"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:48.266 186 INFO tempest.lib.common.rest_client [req-5fa01e0d-2ee2-427e-83b2-ca65968c1343 ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:21:48.268 186 DEBUG tempest.lib.common.rest_client [req-5fa01e0d-2ee2-427e-83b2-ca65968c1343 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5fa01e0d-2ee2-427e-83b2-ca65968c1343', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:48.335 186 INFO tempest.lib.common.rest_client [req-6521d014-ea71-4680-ae5a-43631e841f2d ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:21:48.338 186 DEBUG tempest.lib.common.rest_client [req-6521d014-ea71-4680-ae5a-43631e841f2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6521d014-ea71-4680-ae5a-43631e841f2d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:48.340 189 INFO tempest.lib.common.rest_client [req-bfde4622-d62c-4fb1-9c33-d7c6b6892575 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.213s 2020-12-14 02:21:48.343 189 DEBUG tempest.lib.common.rest_client [req-bfde4622-d62c-4fb1-9c33-d7c6b6892575 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1729', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bfde4622-d62c-4fb1-9c33-d7c6b6892575', 'x-compute-request-id': 'req-bfde4622-d62c-4fb1-9c33-d7c6b6892575', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:48.428 186 INFO tempest.lib.common.rest_client [req-789bf4fb-2642-4c90-b57c-23818c438e24 ] Request (VolumesBackupsV39RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c/users/598a70319811422cba85c1b441d003f0/roles/72a4576c553448cd941b052c1ca0cf2d 0.083s 2020-12-14 02:21:48.431 186 DEBUG tempest.lib.common.rest_client [req-789bf4fb-2642-4c90-b57c-23818c438e24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-789bf4fb-2642-4c90-b57c-23818c438e24', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c/users/598a70319811422cba85c1b441d003f0/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:48.435 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesBackupsV39RbacTest-80083155', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '7de39419c83b45f5972fcc1eb500d05c', 'project_name': 'tempest-VolumesBackupsV39RbacTest-80083155', 'tenant_id': '7de39419c83b45f5972fcc1eb500d05c', 'tenant_name': 'tempest-VolumesBackupsV39RbacTest-80083155', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '598a70319811422cba85c1b441d003f0'}, Network: None, Subnet: None, Router: None 2020-12-14 02:21:48.437 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesBackupsV39RbacTest-80083155', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '7de39419c83b45f5972fcc1eb500d05c', 'project_name': 'tempest-VolumesBackupsV39RbacTest-80083155', 'tenant_id': '7de39419c83b45f5972fcc1eb500d05c', 'tenant_name': 'tempest-VolumesBackupsV39RbacTest-80083155', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '598a70319811422cba85c1b441d003f0'}, Network: None, Subnet: None, Router: None 2020-12-14 02:21:48.446 189 INFO tempest.common.waiters [-] State transition "RESIZE/resize_migrated" ==> "RESIZE/resize_finish" after 8 second wait 2020-12-14 02:21:48.635 186 INFO tempest.lib.common.rest_client [req-bedf7f8b-cc9c-4f1b-9ec6-1a344fa509ad ] Request (VolumesBackupsV39RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.121s 2020-12-14 02:21:48.638 186 DEBUG tempest.lib.common.rest_client [req-bedf7f8b-cc9c-4f1b-9ec6-1a344fa509ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bedf7f8b-cc9c-4f1b-9ec6-1a344fa509ad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "598a70319811422cba85c1b441d003f0", "name": "tempest-VolumesBackupsV39RbacTest-80083155", "password_expires_at": null}, "audit_ids": ["0dKK9m-bQbmDd1bVbXosVg"], "expires_at": "2020-12-14T03:21:48.000000Z", "issued_at": "2020-12-14T02:21:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7de39419c83b45f5972fcc1eb500d05c", "name": "tempest-VolumesBackupsV39RbacTest-80083155"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:48.746 186 INFO tempest.lib.common.rest_client [req-a5820218-27a2-4480-ad35-95982651c837 ] Request (VolumesBackupsV39RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:21:48.749 186 DEBUG tempest.lib.common.rest_client [req-a5820218-27a2-4480-ad35-95982651c837 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5820218-27a2-4480-ad35-95982651c837', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["kT3QjJlURgChPSlGYTD_SQ"], "expires_at": "2020-12-14T03:21:48.000000Z", "issued_at": "2020-12-14T02:21:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:48.839 197 INFO tempest.lib.common.rest_client [req-14d56ce9-0367-4253-8c8c-d01fa6911279 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.234s 2020-12-14 02:21:48.842 197 DEBUG tempest.lib.common.rest_client [req-14d56ce9-0367-4253-8c8c-d01fa6911279 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-14d56ce9-0367-4253-8c8c-d01fa6911279', 'x-compute-request-id': 'req-14d56ce9-0367-4253-8c8c-d01fa6911279', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:48.863 186 INFO tempest.lib.common.rest_client [req-8c465dcf-d92e-4099-9cc5-dd2347be07de ] Request (VolumesBackupsV39RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:21:48.866 186 DEBUG tempest.lib.common.rest_client [req-8c465dcf-d92e-4099-9cc5-dd2347be07de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c465dcf-d92e-4099-9cc5-dd2347be07de', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["T5euP-DWQ4KkWJlsy6-J0w"], "expires_at": "2020-12-14T03:21:48.000000Z", "issued_at": "2020-12-14T02:21:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:48.933 186 INFO tempest.lib.common.rest_client [req-131669e7-8d0d-4f14-9cb9-62917decd0ad ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.060s 2020-12-14 02:21:48.937 186 DEBUG tempest.lib.common.rest_client [req-131669e7-8d0d-4f14-9cb9-62917decd0ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-131669e7-8d0d-4f14-9cb9-62917decd0ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:49.005 186 INFO tempest.lib.common.rest_client [req-967db826-b598-414f-acfc-abd71f820290 ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:21:49.009 186 DEBUG tempest.lib.common.rest_client [req-967db826-b598-414f-acfc-abd71f820290 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-967db826-b598-414f-acfc-abd71f820290', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:49.012 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:21:49.014 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:49.081 186 INFO tempest.lib.common.rest_client [req-e75fbe41-4ee1-4d9c-bdaf-c69f31d580ac ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c/users/598a70319811422cba85c1b441d003f0/roles 0.061s 2020-12-14 02:21:49.084 186 DEBUG tempest.lib.common.rest_client [req-e75fbe41-4ee1-4d9c-bdaf-c69f31d580ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e75fbe41-4ee1-4d9c-bdaf-c69f31d580ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c/users/598a70319811422cba85c1b441d003f0/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c/users/598a70319811422cba85c1b441d003f0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:49.158 186 INFO tempest.lib.common.rest_client [req-939f023c-aa24-4ac1-a916-f3a7cc1a68d0 ] Request (VolumesBackupsV39RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c/users/598a70319811422cba85c1b441d003f0/roles/72a4576c553448cd941b052c1ca0cf2d 0.067s 2020-12-14 02:21:49.161 186 DEBUG tempest.lib.common.rest_client [req-939f023c-aa24-4ac1-a916-f3a7cc1a68d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-939f023c-aa24-4ac1-a916-f3a7cc1a68d0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c/users/598a70319811422cba85c1b441d003f0/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:49.279 186 INFO tempest.lib.common.rest_client [req-389ffb66-2788-428b-8b2a-eb9c83cb31c7 ] Request (VolumesBackupsV39RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c/users/598a70319811422cba85c1b441d003f0/roles/a629c95d64b3416fb80ae90af4f69c05 0.111s 2020-12-14 02:21:49.281 186 DEBUG tempest.lib.common.rest_client [req-389ffb66-2788-428b-8b2a-eb9c83cb31c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-389ffb66-2788-428b-8b2a-eb9c83cb31c7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c/users/598a70319811422cba85c1b441d003f0/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:49.696 189 INFO tempest.lib.common.rest_client [req-e355afec-2d9f-422b-823f-83f0a0498d84 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.242s 2020-12-14 02:21:49.699 189 DEBUG tempest.lib.common.rest_client [req-e355afec-2d9f-422b-823f-83f0a0498d84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1729', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e355afec-2d9f-422b-823f-83f0a0498d84', 'x-compute-request-id': 'req-e355afec-2d9f-422b-823f-83f0a0498d84', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_finish", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:50.171 197 INFO tempest.lib.common.rest_client [req-ed3ceb6c-73b5-4e41-a8a2-ee2c27255706 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.218s 2020-12-14 02:21:50.174 197 DEBUG tempest.lib.common.rest_client [req-ed3ceb6c-73b5-4e41-a8a2-ee2c27255706 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ed3ceb6c-73b5-4e41-a8a2-ee2c27255706', 'x-compute-request-id': 'req-ed3ceb6c-73b5-4e41-a8a2-ee2c27255706', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:50.379 186 INFO tempest.lib.common.rest_client [req-4ffd2376-4da6-4bf3-9cff-3986fd2698fd ] Request (VolumesBackupsV39RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:21:50.382 186 DEBUG tempest.lib.common.rest_client [req-4ffd2376-4da6-4bf3-9cff-3986fd2698fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ffd2376-4da6-4bf3-9cff-3986fd2698fd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "598a70319811422cba85c1b441d003f0", "name": "tempest-VolumesBackupsV39RbacTest-80083155", "password_expires_at": null}, "audit_ids": ["2oanO9uUTZG2Qzoj7kZB7A"], "expires_at": "2020-12-14T03:21:50.000000Z", "issued_at": "2020-12-14T02:21:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7de39419c83b45f5972fcc1eb500d05c", "name": "tempest-VolumesBackupsV39RbacTest-80083155"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:50.963 186 INFO tempest.lib.common.rest_client [req-8c5acb9c-78c1-4ac9-9087-d184cf1b0f0f ] Request (VolumesBackupsV39RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes 0.569s 2020-12-14 02:21:50.966 186 DEBUG tempest.lib.common.rest_client [req-8c5acb9c-78c1-4ac9-9087-d184cf1b0f0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesBackupsV39RbacTest-Volume-1780630000"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8c5acb9c-78c1-4ac9-9087-d184cf1b0f0f', 'content-length': '846', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8c5acb9c-78c1-4ac9-9087-d184cf1b0f0f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes'} Body: b'{"volume": {"id": "44413a34-2d13-459a-99bc-e9e90c5e6329", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:51.000000", "updated_at": null, "name": "tempest-VolumesBackupsV39RbacTest-Volume-1780630000", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329"}], "user_id": "598a70319811422cba85c1b441d003f0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:51.053 189 INFO tempest.lib.common.rest_client [req-632ac3bc-9059-498d-b87d-593af1f8049b ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.243s 2020-12-14 02:21:51.058 189 DEBUG tempest.lib.common.rest_client [req-632ac3bc-9059-498d-b87d-593af1f8049b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-632ac3bc-9059-498d-b87d-593af1f8049b', 'x-compute-request-id': 'req-632ac3bc-9059-498d-b87d-593af1f8049b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "VERIFY_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:50Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:51.138 186 INFO tempest.lib.common.rest_client [req-605264dc-35d2-43bc-ba3c-3d959762979d ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329 0.084s 2020-12-14 02:21:51.140 186 DEBUG tempest.lib.common.rest_client [req-605264dc-35d2-43bc-ba3c-3d959762979d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-605264dc-35d2-43bc-ba3c-3d959762979d', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-605264dc-35d2-43bc-ba3c-3d959762979d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329'} Body: b'{"volume": {"id": "44413a34-2d13-459a-99bc-e9e90c5e6329", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:51.000000", "updated_at": "2020-12-14T02:21:51.000000", "name": "tempest-VolumesBackupsV39RbacTest-Volume-1780630000", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329"}], "user_id": "598a70319811422cba85c1b441d003f0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "7de39419c83b45f5972fcc1eb500d05c"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:51.161 189 INFO tempest.common.waiters [-] State transition "RESIZE/resize_finish" ==> "VERIFY_RESIZE/None" after 11 second wait 2020-12-14 02:21:51.163 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:51.276 189 INFO tempest.lib.common.rest_client [req-e7c9614e-e612-4ced-8ee7-fff4faf497ce ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.107s 2020-12-14 02:21:51.279 189 DEBUG tempest.lib.common.rest_client [req-e7c9614e-e612-4ced-8ee7-fff4faf497ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7c9614e-e612-4ced-8ee7-fff4faf497ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:51.379 189 INFO tempest.lib.common.rest_client [req-7b2bdf9d-202a-4063-a067-feb0c5c2eec6 ] Request (ServerActionsRbacTest:test_revert_resize_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:21:51.382 189 DEBUG tempest.lib.common.rest_client [req-7b2bdf9d-202a-4063-a067-feb0c5c2eec6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7b2bdf9d-202a-4063-a067-feb0c5c2eec6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["Wyr0gDcoQSK4xZXEGkyEMQ"], "expires_at": "2020-12-14T03:21:51.000000Z", "issued_at": "2020-12-14T02:21:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:51.504 197 INFO tempest.lib.common.rest_client [req-55ce75a0-2382-4b98-afea-f093ec34ce55 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.223s 2020-12-14 02:21:51.507 197 DEBUG tempest.lib.common.rest_client [req-55ce75a0-2382-4b98-afea-f093ec34ce55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-55ce75a0-2382-4b98-afea-f093ec34ce55', 'x-compute-request-id': 'req-55ce75a0-2382-4b98-afea-f093ec34ce55', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:51.739 189 INFO tempest.lib.common.rest_client [req-08406fa0-760c-4379-8ac0-20da060a04b7 ] Request (ServerActionsRbacTest:test_revert_resize_server): 202 POST http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1/action 0.350s 2020-12-14 02:21:51.743 189 DEBUG tempest.lib.common.rest_client [req-08406fa0-760c-4379-8ac0-20da060a04b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"revertResize": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-08406fa0-760c-4379-8ac0-20da060a04b7', 'x-compute-request-id': 'req-08406fa0-760c-4379-8ac0-20da060a04b7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:51.745 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:51.814 189 INFO tempest.lib.common.rest_client [req-1ca514d4-3e7d-441b-b3f6-fe62948a0d18 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.062s 2020-12-14 02:21:51.817 189 DEBUG tempest.lib.common.rest_client [req-1ca514d4-3e7d-441b-b3f6-fe62948a0d18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ca514d4-3e7d-441b-b3f6-fe62948a0d18', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:51.862 189 INFO tempest.lib.common.rest_client [req-779bf3de-eae6-4f74-b8bc-3d6d7201c71d ] Request (ServerActionsRbacTest:test_revert_resize_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:21:51.866 189 DEBUG tempest.lib.common.rest_client [req-779bf3de-eae6-4f74-b8bc-3d6d7201c71d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-779bf3de-eae6-4f74-b8bc-3d6d7201c71d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["FDVOBFokQSazS6FVuFPEfA"], "expires_at": "2020-12-14T03:21:51.000000Z", "issued_at": "2020-12-14T02:21:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:52.173 189 INFO tempest.lib.common.rest_client [req-d0516bdc-bba0-4d26-b542-282fbcca5e7a ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.297s 2020-12-14 02:21:52.176 189 DEBUG tempest.lib.common.rest_client [req-d0516bdc-bba0-4d26-b542-282fbcca5e7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d0516bdc-bba0-4d26-b542-282fbcca5e7a', 'x-compute-request-id': 'req-d0516bdc-bba0-4d26-b542-282fbcca5e7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "REVERT_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:52Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_reverting", "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:52.341 186 INFO tempest.lib.common.rest_client [req-6b257fe5-1a02-4369-9205-cf27121c926a ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329 0.094s 2020-12-14 02:21:52.345 186 DEBUG tempest.lib.common.rest_client [req-6b257fe5-1a02-4369-9205-cf27121c926a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6b257fe5-1a02-4369-9205-cf27121c926a', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6b257fe5-1a02-4369-9205-cf27121c926a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329'} Body: b'{"volume": {"id": "44413a34-2d13-459a-99bc-e9e90c5e6329", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:51.000000", "updated_at": "2020-12-14T02:21:51.000000", "name": "tempest-VolumesBackupsV39RbacTest-Volume-1780630000", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329"}], "user_id": "598a70319811422cba85c1b441d003f0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "7de39419c83b45f5972fcc1eb500d05c"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:52.438 186 INFO tempest.common.waiters [-] volume 44413a34-2d13-459a-99bc-e9e90c5e6329 reached available after waiting for 1.438070 seconds 2020-12-14 02:21:52.623 186 INFO tempest.lib.common.rest_client [req-3d2edc07-ff37-4567-9f4d-8860e673e351 ] Request (VolumesBackupsV39RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups 0.178s 2020-12-14 02:21:52.627 186 DEBUG tempest.lib.common.rest_client [req-3d2edc07-ff37-4567-9f4d-8860e673e351 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"backup": {"volume_id": "44413a34-2d13-459a-99bc-e9e90c5e6329", "name": "tempest-VolumesBackupsV39RbacTest-Backup-1310162836"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3d2edc07-ff37-4567-9f4d-8860e673e351', 'content-length': '405', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3d2edc07-ff37-4567-9f4d-8860e673e351', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups'} Body: b'{"backup": {"id": "f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7", "name": "tempest-VolumesBackupsV39RbacTest-Backup-1310162836", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:52.699 186 INFO tempest.lib.common.rest_client [req-e806c7eb-3680-4716-a097-3eddd3d1a2e6 ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7 0.041s 2020-12-14 02:21:52.702 186 DEBUG tempest.lib.common.rest_client [req-e806c7eb-3680-4716-a097-3eddd3d1a2e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e806c7eb-3680-4716-a097-3eddd3d1a2e6', 'content-length': '812', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e806c7eb-3680-4716-a097-3eddd3d1a2e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7'} Body: b'{"backup": {"id": "f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": null, "created_at": "2020-12-14T02:21:53.000000", "updated_at": "2020-12-14T02:21:53.000000", "name": "tempest-VolumesBackupsV39RbacTest-Backup-1310162836", "description": null, "fail_reason": null, "volume_id": "44413a34-2d13-459a-99bc-e9e90c5e6329", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:21:53.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:53.520 189 INFO tempest.lib.common.rest_client [req-6245cbd5-8102-415c-95d0-1553a1167365 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.220s 2020-12-14 02:21:53.523 189 DEBUG tempest.lib.common.rest_client [req-6245cbd5-8102-415c-95d0-1553a1167365 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6245cbd5-8102-415c-95d0-1553a1167365', 'x-compute-request-id': 'req-6245cbd5-8102-415c-95d0-1553a1167365', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "REVERT_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "d4d2c0f143dcbad14d9434da15f63d466c4e9262d3860c5424645f9d", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "8a56823e-8563-423c-896d-50c73f98dd64", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/8a56823e-8563-423c-896d-50c73f98dd64"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:52Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resize_reverting", "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:53.815 186 INFO tempest.lib.common.rest_client [req-242456c8-5775-4492-8ebe-e63f19a8743c ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7 0.053s 2020-12-14 02:21:53.818 186 DEBUG tempest.lib.common.rest_client [req-242456c8-5775-4492-8ebe-e63f19a8743c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-242456c8-5775-4492-8ebe-e63f19a8743c', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-242456c8-5775-4492-8ebe-e63f19a8743c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7'} Body: b'{"backup": {"id": "f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:21:53.000000", "updated_at": "2020-12-14T02:21:53.000000", "name": "tempest-VolumesBackupsV39RbacTest-Backup-1310162836", "description": null, "fail_reason": null, "volume_id": "44413a34-2d13-459a-99bc-e9e90c5e6329", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:21:53.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:54.925 186 INFO tempest.lib.common.rest_client [req-82bbe682-de33-4b1b-bb17-90b79626be70 ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7 0.045s 2020-12-14 02:21:54.927 186 DEBUG tempest.lib.common.rest_client [req-82bbe682-de33-4b1b-bb17-90b79626be70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-82bbe682-de33-4b1b-bb17-90b79626be70', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-82bbe682-de33-4b1b-bb17-90b79626be70', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7'} Body: b'{"backup": {"id": "f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:21:53.000000", "updated_at": "2020-12-14T02:21:53.000000", "name": "tempest-VolumesBackupsV39RbacTest-Backup-1310162836", "description": null, "fail_reason": null, "volume_id": "44413a34-2d13-459a-99bc-e9e90c5e6329", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:21:53.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:56.027 186 INFO tempest.lib.common.rest_client [req-4961471a-5cdb-45cb-9fe9-4619f36320fb ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7 0.046s 2020-12-14 02:21:56.030 186 DEBUG tempest.lib.common.rest_client [req-4961471a-5cdb-45cb-9fe9-4619f36320fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4961471a-5cdb-45cb-9fe9-4619f36320fb', 'content-length': '818', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4961471a-5cdb-45cb-9fe9-4619f36320fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7'} Body: b'{"backup": {"id": "f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:21:53.000000", "updated_at": "2020-12-14T02:21:56.000000", "name": "tempest-VolumesBackupsV39RbacTest-Backup-1310162836", "description": null, "fail_reason": null, "volume_id": "44413a34-2d13-459a-99bc-e9e90c5e6329", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:21:53.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:56.079 186 INFO tempest.common.waiters [-] backup f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7 reached available after waiting for 4.079154 seconds 2020-12-14 02:21:56.173 186 INFO tempest.lib.common.rest_client [req-8d513e07-23e1-46f5-92a0-2d3f63a7e52b ] Request (VolumesBackupsV39RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329 0.088s 2020-12-14 02:21:56.176 186 DEBUG tempest.lib.common.rest_client [req-8d513e07-23e1-46f5-92a0-2d3f63a7e52b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8d513e07-23e1-46f5-92a0-2d3f63a7e52b', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8d513e07-23e1-46f5-92a0-2d3f63a7e52b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329'} Body: b'{"volume": {"id": "44413a34-2d13-459a-99bc-e9e90c5e6329", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:51.000000", "updated_at": "2020-12-14T02:21:56.000000", "name": "tempest-VolumesBackupsV39RbacTest-Volume-1780630000", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329"}], "user_id": "598a70319811422cba85c1b441d003f0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "7de39419c83b45f5972fcc1eb500d05c"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:56.268 186 INFO tempest.common.waiters [-] volume 44413a34-2d13-459a-99bc-e9e90c5e6329 reached available after waiting for 0.268295 seconds 2020-12-14 02:21:56.275 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:21:56.293 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:update, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:21:56.295 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:56.360 186 INFO tempest.lib.common.rest_client [req-0661bafb-190e-45ad-b656-a6ff59a65095 ] Request (VolumesBackupsV39RbacTest:test_backup_update): 200 GET http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c/users/598a70319811422cba85c1b441d003f0/roles 0.059s 2020-12-14 02:21:56.363 186 DEBUG tempest.lib.common.rest_client [req-0661bafb-190e-45ad-b656-a6ff59a65095 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0661bafb-190e-45ad-b656-a6ff59a65095', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c/users/598a70319811422cba85c1b441d003f0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c/users/598a70319811422cba85c1b441d003f0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:56.414 186 INFO tempest.lib.common.rest_client [req-209d0737-f5d8-43ce-8bf7-bf6e8dc5133a ] Request (VolumesBackupsV39RbacTest:test_backup_update): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:21:56.418 186 DEBUG tempest.lib.common.rest_client [req-209d0737-f5d8-43ce-8bf7-bf6e8dc5133a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-209d0737-f5d8-43ce-8bf7-bf6e8dc5133a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "598a70319811422cba85c1b441d003f0", "name": "tempest-VolumesBackupsV39RbacTest-80083155", "password_expires_at": null}, "audit_ids": ["Igscg5p4Tha5WSzjK6u8Rw"], "expires_at": "2020-12-14T03:21:56.000000Z", "issued_at": "2020-12-14T02:21:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7de39419c83b45f5972fcc1eb500d05c", "name": "tempest-VolumesBackupsV39RbacTest-80083155"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:56.540 186 INFO tempest.lib.common.rest_client [req-08e92c4e-3e66-4237-9b2e-d9fe38f01f48 ] Request (VolumesBackupsV39RbacTest:test_backup_update): 200 PUT http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7 0.114s 2020-12-14 02:21:56.544 186 DEBUG tempest.lib.common.rest_client [req-08e92c4e-3e66-4237-9b2e-d9fe38f01f48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.9', 'X-Auth-Token': ''} Body: {"backup": {"name": "tempest-VolumesBackupsV39RbacTest-Backup-1567207776", "description": "tempest-volume-backup-description-1354573642"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-08e92c4e-3e66-4237-9b2e-d9fe38f01f48', 'content-length': '405', 'openstack-api-version': 'volume 3.9', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-08e92c4e-3e66-4237-9b2e-d9fe38f01f48', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7'} Body: b'{"backup": {"id": "f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7", "name": "tempest-VolumesBackupsV39RbacTest-Backup-1567207776", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:56.570 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:21:56.638 186 INFO tempest.lib.common.rest_client [req-63a9a952-7b1c-44c7-99bf-8311ae959c26 ] Request (VolumesBackupsV39RbacTest:test_backup_update): 200 GET http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c/users/598a70319811422cba85c1b441d003f0/roles 0.061s 2020-12-14 02:21:56.641 186 DEBUG tempest.lib.common.rest_client [req-63a9a952-7b1c-44c7-99bf-8311ae959c26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63a9a952-7b1c-44c7-99bf-8311ae959c26', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c/users/598a70319811422cba85c1b441d003f0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c/users/598a70319811422cba85c1b441d003f0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:56.691 186 INFO tempest.lib.common.rest_client [req-271f630d-82c6-4ffe-b66d-cef7d1569329 ] Request (VolumesBackupsV39RbacTest:test_backup_update): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:21:56.695 186 DEBUG tempest.lib.common.rest_client [req-271f630d-82c6-4ffe-b66d-cef7d1569329 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-271f630d-82c6-4ffe-b66d-cef7d1569329', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "598a70319811422cba85c1b441d003f0", "name": "tempest-VolumesBackupsV39RbacTest-80083155", "password_expires_at": null}, "audit_ids": ["JzpS57pWS0Ccpt362XaPpQ"], "expires_at": "2020-12-14T03:21:56.000000Z", "issued_at": "2020-12-14T02:21:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7de39419c83b45f5972fcc1eb500d05c", "name": "tempest-VolumesBackupsV39RbacTest-80083155"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7de39419c83b45f5972fcc1eb500d05c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:56.819 186 INFO tempest.lib.common.rest_client [req-844ecc66-12b5-47d0-a192-177618cc766f ] Request (VolumesBackupsV39RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7 0.107s 2020-12-14 02:21:56.822 186 DEBUG tempest.lib.common.rest_client [req-844ecc66-12b5-47d0-a192-177618cc766f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-844ecc66-12b5-47d0-a192-177618cc766f', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-844ecc66-12b5-47d0-a192-177618cc766f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/backups/f8bceb7a-eaa2-4495-8a4d-67a443f5f3e7'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:56.872 197 INFO tempest.lib.common.rest_client [req-4d71f25b-2f82-4f4e-a4a2-110a0da3af23 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 4.257s 2020-12-14 02:21:56.874 197 DEBUG tempest.lib.common.rest_client [req-4d71f25b-2f82-4f4e-a4a2-110a0da3af23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4d71f25b-2f82-4f4e-a4a2-110a0da3af23', 'x-compute-request-id': 'req-4d71f25b-2f82-4f4e-a4a2-110a0da3af23', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:56.910 186 INFO tempest.lib.common.rest_client [req-e9a76882-c903-4945-8f63-f8a9677b9877 ] Request (VolumesBackupsV39RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329 0.082s 2020-12-14 02:21:56.912 186 DEBUG tempest.lib.common.rest_client [req-e9a76882-c903-4945-8f63-f8a9677b9877 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e9a76882-c903-4945-8f63-f8a9677b9877', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:57.000 186 INFO tempest.lib.common.rest_client [req-b077499c-4fa3-48d7-ac1e-3b7b0ce76952 ] Request (VolumesBackupsV39RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329 0.081s 2020-12-14 02:21:57.003 186 DEBUG tempest.lib.common.rest_client [req-b077499c-4fa3-48d7-ac1e-3b7b0ce76952 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b077499c-4fa3-48d7-ac1e-3b7b0ce76952', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b077499c-4fa3-48d7-ac1e-3b7b0ce76952', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329'} Body: b'{"volume": {"id": "44413a34-2d13-459a-99bc-e9e90c5e6329", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:21:51.000000", "updated_at": "2020-12-14T02:21:57.000000", "name": "tempest-VolumesBackupsV39RbacTest-Volume-1780630000", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329"}], "user_id": "598a70319811422cba85c1b441d003f0", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "7de39419c83b45f5972fcc1eb500d05c"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:57.138 189 INFO tempest.lib.common.rest_client [req-aa48917a-31d4-4107-889d-52d73449eb8a ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 2.503s 2020-12-14 02:21:57.141 189 DEBUG tempest.lib.common.rest_client [req-aa48917a-31d4-4107-889d-52d73449eb8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aa48917a-31d4-4107-889d-52d73449eb8a', 'x-compute-request-id': 'req-aa48917a-31d4-4107-889d-52d73449eb8a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "REVERT_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:54Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_reverting", "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:58.171 186 INFO tempest.lib.common.rest_client [req-69c064c4-9e39-42a5-8d28-c7187e6da3cb ] Request (VolumesBackupsV39RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329 0.067s 2020-12-14 02:21:58.174 186 DEBUG tempest.lib.common.rest_client [req-69c064c4-9e39-42a5-8d28-c7187e6da3cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-69c064c4-9e39-42a5-8d28-c7187e6da3cb', 'x-openstack-request-id': 'req-69c064c4-9e39-42a5-8d28-c7187e6da3cb', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/7de39419c83b45f5972fcc1eb500d05c/volumes/44413a34-2d13-459a-99bc-e9e90c5e6329'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 44413a34-2d13-459a-99bc-e9e90c5e6329 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:58.198 197 INFO tempest.lib.common.rest_client [req-02bb67f7-4423-4466-a600-06c0611a15ca ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.239s 2020-12-14 02:21:58.201 197 DEBUG tempest.lib.common.rest_client [req-02bb67f7-4423-4466-a600-06c0611a15ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-02bb67f7-4423-4466-a600-06c0611a15ca', 'x-compute-request-id': 'req-02bb67f7-4423-4466-a600-06c0611a15ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:58.324 186 INFO tempest.lib.common.rest_client [req-1db00d14-a3c1-4b6a-a3de-a7bec74198fe ] Request (VolumesBackupsV39RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/598a70319811422cba85c1b441d003f0 0.142s 2020-12-14 02:21:58.327 186 DEBUG tempest.lib.common.rest_client [req-1db00d14-a3c1-4b6a-a3de-a7bec74198fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1db00d14-a3c1-4b6a-a3de-a7bec74198fe', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/598a70319811422cba85c1b441d003f0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:58.438 186 INFO tempest.lib.common.rest_client [req-75cc1b02-dcfa-4570-9f34-dc5661befbb0 ] Request (VolumesBackupsV39RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:21:58.440 186 DEBUG tempest.lib.common.rest_client [req-75cc1b02-dcfa-4570-9f34-dc5661befbb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-75cc1b02-dcfa-4570-9f34-dc5661befbb0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["HGhf4oZvTc28IFjAfLjKNQ"], "expires_at": "2020-12-14T03:21:58.000000Z", "issued_at": "2020-12-14T02:21:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:58.464 189 INFO tempest.lib.common.rest_client [req-71bc3ceb-ac73-4aa5-a5a6-1a9c7d984e38 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.208s 2020-12-14 02:21:58.468 189 DEBUG tempest.lib.common.rest_client [req-71bc3ceb-ac73-4aa5-a5a6-1a9c7d984e38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-71bc3ceb-ac73-4aa5-a5a6-1a9c7d984e38', 'x-compute-request-id': 'req-71bc3ceb-ac73-4aa5-a5a6-1a9c7d984e38', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "REVERT_RESIZE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:21:54Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:50.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "resize_reverting", "OS-EXT-STS:vm_state": "resized", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:58.814 186 INFO tempest.lib.common.rest_client [req-a11de815-dfc2-46f3-83c7-80b9601e9ec6 ] Request (VolumesBackupsV39RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=7de39419c83b45f5972fcc1eb500d05c&name=default 0.368s 2020-12-14 02:21:58.817 186 DEBUG tempest.lib.common.rest_client [req-a11de815-dfc2-46f3-83c7-80b9601e9ec6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-a11de815-dfc2-46f3-83c7-80b9601e9ec6', 'date': 'Mon, 14 Dec 2020 02:21:58 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=7de39419c83b45f5972fcc1eb500d05c&name=default'} Body: b'{"security_groups": [{"id": "81fa5c5d-8432-4676-98a6-50668817da9f", "name": "default", "stateful": true, "tenant_id": "7de39419c83b45f5972fcc1eb500d05c", "description": "Default security group", "security_group_rules": [{"id": "25f31080-bbcc-4619-a2f9-1eca5a8f4f39", "tenant_id": "7de39419c83b45f5972fcc1eb500d05c", "security_group_id": "81fa5c5d-8432-4676-98a6-50668817da9f", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "81fa5c5d-8432-4676-98a6-50668817da9f", "description": null, "tags": [], "created_at": "2020-12-14T02:21:58Z", "updated_at": "2020-12-14T02:21:58Z", "revision_number": 0, "project_id": "7de39419c83b45f5972fcc1eb500d05c"}, {"id": "4e907ed3-ff7a-472d-aca7-3cc952b72fd3", "tenant_id": "7de39419c83b45f5972fcc1eb500d05c", "security_group_id": "81fa5c5d-8432-4676-98a6-50668817da9f", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:21:58Z", "updated_at": "2020-12-14T02:21:58Z", "revision_number": 0, "project_id": "7de39419c83b45f5972fcc1eb500d05c"}, {"id": "c4ff8dee-e529-4ce4-b805-665ba543832c", "tenant_id": "7de39419c83b45f5972fcc1eb500d05c", "security_group_id": "81fa5c5d-8432-4676-98a6-50668817da9f", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:21:58Z", "updated_at": "2020-12-14T02:21:58Z", "revision_number": 0, "project_id": "7de39419c83b45f5972fcc1eb500d05c"}, {"id": "e6aeb20c-5e93-4815-b8cb-2d98e47a6215", "tenant_id": "7de39419c83b45f5972fcc1eb500d05c", "security_group_id": "81fa5c5d-8432-4676-98a6-50668817da9f", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "81fa5c5d-8432-4676-98a6-50668817da9f", "description": null, "tags": [], "created_at": "2020-12-14T02:21:58Z", "updated_at": "2020-12-14T02:21:58Z", "revision_number": 0, "project_id": "7de39419c83b45f5972fcc1eb500d05c"}], "tags": [], "created_at": "2020-12-14T02:21:58Z", "updated_at": "2020-12-14T02:21:58Z", "revision_number": 1, "project_id": "7de39419c83b45f5972fcc1eb500d05c"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:59.031 186 INFO tempest.lib.common.rest_client [req-e5f73bad-db49-4c71-95d4-3a973bcb77d1 ] Request (VolumesBackupsV39RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/81fa5c5d-8432-4676-98a6-50668817da9f 0.208s 2020-12-14 02:21:59.033 186 DEBUG tempest.lib.common.rest_client [req-e5f73bad-db49-4c71-95d4-3a973bcb77d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e5f73bad-db49-4c71-95d4-3a973bcb77d1', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:21:59 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/81fa5c5d-8432-4676-98a6-50668817da9f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:59.182 186 INFO tempest.lib.common.rest_client [req-28289bc1-e43b-4a86-aea6-d050793623d4 ] Request (VolumesBackupsV39RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c 0.142s 2020-12-14 02:21:59.185 186 DEBUG tempest.lib.common.rest_client [req-28289bc1-e43b-4a86-aea6-d050793623d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28289bc1-e43b-4a86-aea6-d050793623d4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7de39419c83b45f5972fcc1eb500d05c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:59.305 186 INFO tempest.lib.common.rest_client [req-fad7ba46-62a2-40e1-8e50-cce1bc85a21b ] Request (VolumesManageV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:21:59.308 186 DEBUG tempest.lib.common.rest_client [req-fad7ba46-62a2-40e1-8e50-cce1bc85a21b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fad7ba46-62a2-40e1-8e50-cce1bc85a21b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["VSka_iiRSju8JbF_kX_ntQ"], "expires_at": "2020-12-14T03:21:59.000000Z", "issued_at": "2020-12-14T02:21:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:59.415 186 INFO tempest.lib.common.rest_client [req-e80be26b-a428-4a7f-a29e-e9fad2d81476 ] Request (VolumesManageV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:21:59.418 186 DEBUG tempest.lib.common.rest_client [req-e80be26b-a428-4a7f-a29e-e9fad2d81476 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e80be26b-a428-4a7f-a29e-e9fad2d81476', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["7fPBt0nzTJSibwTLt-iNhg"], "expires_at": "2020-12-14T03:21:59.000000Z", "issued_at": "2020-12-14T02:21:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:59.517 186 INFO tempest.lib.common.rest_client [req-26cc33c8-c448-459e-8101-0d414f375dd1 ] Request (VolumesManageV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.090s 2020-12-14 02:21:59.521 186 DEBUG tempest.lib.common.rest_client [req-26cc33c8-c448-459e-8101-0d414f375dd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26cc33c8-c448-459e-8101-0d414f375dd1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:59.542 197 INFO tempest.lib.common.rest_client [req-7977797f-d966-4690-bd73-9b635b1fdb12 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.234s 2020-12-14 02:21:59.545 197 DEBUG tempest.lib.common.rest_client [req-7977797f-d966-4690-bd73-9b635b1fdb12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7977797f-d966-4690-bd73-9b635b1fdb12', 'x-compute-request-id': 'req-7977797f-d966-4690-bd73-9b635b1fdb12', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:59.624 186 INFO tempest.lib.common.rest_client [req-ddb12a18-c1fd-4cc1-8f74-c43099c1256c ] Request (VolumesManageV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.095s 2020-12-14 02:21:59.626 186 DEBUG tempest.lib.common.rest_client [req-ddb12a18-c1fd-4cc1-8f74-c43099c1256c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesManageV3RbacTest-1652099908-desc", "domain_id": "default", "name": "tempest-VolumesManageV3RbacTest-1652099908"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ddb12a18-c1fd-4cc1-8f74-c43099c1256c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "65d62c584bfc4f619a6ef3670b76ff71", "name": "tempest-VolumesManageV3RbacTest-1652099908", "domain_id": "default", "description": "tempest-VolumesManageV3RbacTest-1652099908-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:59.761 186 INFO tempest.lib.common.rest_client [req-0bed0722-6926-4611-bb49-e895bf262ed9 ] Request (VolumesManageV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.127s 2020-12-14 02:21:59.764 186 DEBUG tempest.lib.common.rest_client [req-0bed0722-6926-4611-bb49-e895bf262ed9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesManageV3RbacTest-1652099908", "password": "G2#vWy%O&rqfm7o", "project_id": "65d62c584bfc4f619a6ef3670b76ff71", "email": "tempest-VolumesManageV3RbacTest-1541031328@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '402', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0bed0722-6926-4611-bb49-e895bf262ed9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "65d62c584bfc4f619a6ef3670b76ff71", "email": "tempest-VolumesManageV3RbacTest-1541031328@example.com", "id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "name": "tempest-VolumesManageV3RbacTest-1652099908", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/2ea8e62f84b74f0b96a37e6dda5a2cc3"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:59.827 186 INFO tempest.lib.common.rest_client [req-a0714f14-639b-433e-a0fc-63b3ce8b043a ] Request (VolumesManageV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:21:59.830 186 DEBUG tempest.lib.common.rest_client [req-a0714f14-639b-433e-a0fc-63b3ce8b043a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0714f14-639b-433e-a0fc-63b3ce8b043a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:59.864 189 INFO tempest.lib.common.rest_client [req-75070124-0a3d-41da-b51c-d9480db47ce6 ] Request (ServerActionsRbacTest:test_revert_resize_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.272s 2020-12-14 02:21:59.867 189 DEBUG tempest.lib.common.rest_client [req-75070124-0a3d-41da-b51c-d9480db47ce6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-75070124-0a3d-41da-b51c-d9480db47ce6', 'x-compute-request-id': 'req-75070124-0a3d-41da-b51c-d9480db47ce6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:00Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:59.897 186 INFO tempest.lib.common.rest_client [req-9223a863-52f9-4663-9021-9f619f6f1c30 ] Request (VolumesManageV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:21:59.899 186 DEBUG tempest.lib.common.rest_client [req-9223a863-52f9-4663-9021-9f619f6f1c30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9223a863-52f9-4663-9021-9f619f6f1c30', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:59.971 189 INFO tempest.common.waiters [-] State transition "REVERT_RESIZE/resize_reverting" ==> "ACTIVE/None" after 7 second wait 2020-12-14 02:21:59.983 186 INFO tempest.lib.common.rest_client [req-704adfa9-8c41-4877-b5bb-0369d0139e21 ] Request (VolumesManageV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles/72a4576c553448cd941b052c1ca0cf2d 0.076s 2020-12-14 02:21:59.985 186 DEBUG tempest.lib.common.rest_client [req-704adfa9-8c41-4877-b5bb-0369d0139e21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:21:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-704adfa9-8c41-4877-b5bb-0369d0139e21', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:21:59.988 186 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesManageV3RbacTest-1652099908', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '65d62c584bfc4f619a6ef3670b76ff71', 'project_name': 'tempest-VolumesManageV3RbacTest-1652099908', 'tenant_id': '65d62c584bfc4f619a6ef3670b76ff71', 'tenant_name': 'tempest-VolumesManageV3RbacTest-1652099908', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '2ea8e62f84b74f0b96a37e6dda5a2cc3'}, Network: None, Subnet: None, Router: None 2020-12-14 02:21:59.990 186 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesManageV3RbacTest-1652099908', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '65d62c584bfc4f619a6ef3670b76ff71', 'project_name': 'tempest-VolumesManageV3RbacTest-1652099908', 'tenant_id': '65d62c584bfc4f619a6ef3670b76ff71', 'tenant_name': 'tempest-VolumesManageV3RbacTest-1652099908', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '2ea8e62f84b74f0b96a37e6dda5a2cc3'}, Network: None, Subnet: None, Router: None 2020-12-14 02:22:00.178 186 INFO tempest.lib.common.rest_client [req-2c358979-dc2d-4166-b4ab-1f25aa7f60f6 ] Request (VolumesManageV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.122s 2020-12-14 02:22:00.182 186 DEBUG tempest.lib.common.rest_client [req-2c358979-dc2d-4166-b4ab-1f25aa7f60f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2c358979-dc2d-4166-b4ab-1f25aa7f60f6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "name": "tempest-VolumesManageV3RbacTest-1652099908", "password_expires_at": null}, "audit_ids": ["N_2xstApQ5q6ytW44ZvmoA"], "expires_at": "2020-12-14T03:22:00.000000Z", "issued_at": "2020-12-14T02:22:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "65d62c584bfc4f619a6ef3670b76ff71", "name": "tempest-VolumesManageV3RbacTest-1652099908"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:00.281 186 INFO tempest.lib.common.rest_client [req-a505d3b6-d63e-4eb1-ab89-a9cac0280145 ] Request (VolumesManageV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-14 02:22:00.283 186 DEBUG tempest.lib.common.rest_client [req-a505d3b6-d63e-4eb1-ab89-a9cac0280145 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a505d3b6-d63e-4eb1-ab89-a9cac0280145', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["24z-eLnORVi0COTraSdv0Q"], "expires_at": "2020-12-14T03:22:00.000000Z", "issued_at": "2020-12-14T02:22:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:00.471 186 INFO tempest.lib.common.rest_client [req-b7eb80e1-7412-4ea0-bdf9-061a3b3d098d ] Request (VolumesManageV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.122s 2020-12-14 02:22:00.474 186 DEBUG tempest.lib.common.rest_client [req-b7eb80e1-7412-4ea0-bdf9-061a3b3d098d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7eb80e1-7412-4ea0-bdf9-061a3b3d098d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["PoSLDsvUQuebsiOKlBJiuA"], "expires_at": "2020-12-14T03:22:00.000000Z", "issued_at": "2020-12-14T02:22:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:00.539 186 INFO tempest.lib.common.rest_client [req-27b21a85-4c95-42a6-b64e-c3ec36216dd9 ] Request (VolumesManageV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.057s 2020-12-14 02:22:00.541 186 DEBUG tempest.lib.common.rest_client [req-27b21a85-4c95-42a6-b64e-c3ec36216dd9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27b21a85-4c95-42a6-b64e-c3ec36216dd9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:00.628 186 INFO tempest.lib.common.rest_client [req-a62b985d-d0d4-400a-bdde-5a3435ba26d9 ] Request (VolumesManageV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.079s 2020-12-14 02:22:00.632 186 DEBUG tempest.lib.common.rest_client [req-a62b985d-d0d4-400a-bdde-5a3435ba26d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a62b985d-d0d4-400a-bdde-5a3435ba26d9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:00.635 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:22:00.637 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:00.703 186 INFO tempest.lib.common.rest_client [req-9f64199a-9bf7-4cdf-a1ca-89e4062a11ea ] Request (VolumesManageV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles 0.060s 2020-12-14 02:22:00.706 186 DEBUG tempest.lib.common.rest_client [req-9f64199a-9bf7-4cdf-a1ca-89e4062a11ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f64199a-9bf7-4cdf-a1ca-89e4062a11ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:00.775 186 INFO tempest.lib.common.rest_client [req-df821490-9973-4a36-a287-eab78ffae750 ] Request (VolumesManageV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles/72a4576c553448cd941b052c1ca0cf2d 0.062s 2020-12-14 02:22:00.778 186 DEBUG tempest.lib.common.rest_client [req-df821490-9973-4a36-a287-eab78ffae750 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df821490-9973-4a36-a287-eab78ffae750', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:00.829 189 INFO tempest.lib.common.rest_client [req-eb77aecf-0e98-4a85-a30c-94b8ac3a376c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.291s 2020-12-14 02:22:00.833 189 DEBUG tempest.lib.common.rest_client [req-eb77aecf-0e98-4a85-a30c-94b8ac3a376c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eb77aecf-0e98-4a85-a30c-94b8ac3a376c', 'x-compute-request-id': 'req-eb77aecf-0e98-4a85-a30c-94b8ac3a376c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:00Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:00.894 186 INFO tempest.lib.common.rest_client [req-be5a61b8-8793-4cc7-84b2-9f4c4dc023a7 ] Request (VolumesManageV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-12-14 02:22:00.897 186 DEBUG tempest.lib.common.rest_client [req-be5a61b8-8793-4cc7-84b2-9f4c4dc023a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be5a61b8-8793-4cc7-84b2-9f4c4dc023a7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:00.929 197 INFO tempest.lib.common.rest_client [req-62e7e0f9-e036-41cb-a62c-f9fc20588c08 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.280s 2020-12-14 02:22:00.933 197 DEBUG tempest.lib.common.rest_client [req-62e7e0f9-e036-41cb-a62c-f9fc20588c08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-62e7e0f9-e036-41cb-a62c-f9fc20588c08', 'x-compute-request-id': 'req-62e7e0f9-e036-41cb-a62c-f9fc20588c08', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:16:59Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:00.938 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:00.943 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:00.947 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:00.950 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:00.953 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:00.957 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:00.960 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:00.965 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:00.968 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:00.970 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:00.973 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:00.976 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:00.980 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:00.984 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:00.988 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:00.993 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:00.999 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.003 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.007 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.012 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.016 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.020 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.025 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.029 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.033 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.037 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.041 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.046 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.050 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.052 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.055 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.058 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.061 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.064 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.066 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.069 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.072 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.075 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.077 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.080 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.083 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.086 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.089 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.091 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.095 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.098 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.100 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.103 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.106 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.108 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.111 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.114 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.116 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.119 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.122 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.126 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.129 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.135 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.138 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.140 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.143 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.146 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.149 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.151 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.154 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.157 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.159 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.162 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.165 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.168 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.170 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.173 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:01.185 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:detail, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:01.187 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:01.214 197 INFO tempest.lib.common.rest_client [req-0e0e7e70-a4c3-4be7-b6d0-c74abb145191 ] Request (MiscPolicyActionsRbacTest:setUp): 204 DELETE http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.177s 2020-12-14 02:22:01.218 197 DEBUG tempest.lib.common.rest_client [req-0e0e7e70-a4c3-4be7-b6d0-c74abb145191 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0e0e7e70-a4c3-4be7-b6d0-c74abb145191', 'x-compute-request-id': 'req-0e0e7e70-a4c3-4be7-b6d0-c74abb145191', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:01.304 189 INFO tempest.lib.common.rest_client [req-c8bf251e-b8bb-4134-b9b9-12ce8e85bb6d ] Request (ServerActionsRbacTest:test_server_detail): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.111s 2020-12-14 02:22:01.307 189 DEBUG tempest.lib.common.rest_client [req-c8bf251e-b8bb-4134-b9b9-12ce8e85bb6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8bf251e-b8bb-4134-b9b9-12ce8e85bb6d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:01.405 189 INFO tempest.lib.common.rest_client [req-d79608a1-7534-4ad0-99e8-2d1cc2a44b94 ] Request (ServerActionsRbacTest:test_server_detail): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:22:01.408 189 DEBUG tempest.lib.common.rest_client [req-d79608a1-7534-4ad0-99e8-2d1cc2a44b94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d79608a1-7534-4ad0-99e8-2d1cc2a44b94', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["xEX5pjw8Ry21GdvGpstoRw"], "expires_at": "2020-12-14T03:22:01.000000Z", "issued_at": "2020-12-14T02:22:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:01.460 197 INFO tempest.lib.common.rest_client [req-d889ebd9-5c05-4e2a-bff9-904d99fa9a61 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.236s 2020-12-14 02:22:01.462 197 DEBUG tempest.lib.common.rest_client [req-d889ebd9-5c05-4e2a-bff9-904d99fa9a61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1717', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d889ebd9-5c05-4e2a-bff9-904d99fa9a61', 'x-compute-request-id': 'req-d889ebd9-5c05-4e2a-bff9-904d99fa9a61', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:22:01Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:01.998 186 INFO tempest.lib.common.rest_client [req-3497774c-9a8d-42e8-b67f-90ec0ed77fdf ] Request (VolumesManageV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:22:02.002 186 DEBUG tempest.lib.common.rest_client [req-3497774c-9a8d-42e8-b67f-90ec0ed77fdf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3497774c-9a8d-42e8-b67f-90ec0ed77fdf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "name": "tempest-VolumesManageV3RbacTest-1652099908", "password_expires_at": null}, "audit_ids": ["dWQ3f1IySKiAI9I0wgVNDg"], "expires_at": "2020-12-14T03:22:01.000000Z", "issued_at": "2020-12-14T02:22:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "65d62c584bfc4f619a6ef3670b76ff71", "name": "tempest-VolumesManageV3RbacTest-1652099908"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:02.014 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:02.032 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_manage, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:02.058 189 INFO tempest.lib.common.rest_client [req-e8483c90-8cad-4be9-aa53-0c5a369d3f0f ] Request (ServerActionsRbacTest:test_server_detail): 200 GET http://172.30.13.94/compute/v2.1/servers/detail 0.641s 2020-12-14 02:22:02.062 189 DEBUG tempest.lib.common.rest_client [req-e8483c90-8cad-4be9-aa53-0c5a369d3f0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1721', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e8483c90-8cad-4be9-aa53-0c5a369d3f0f', 'x-compute-request-id': 'req-e8483c90-8cad-4be9-aa53-0c5a369d3f0f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/detail'} Body: b'{"servers": [{"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:00Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "security_groups": [{"name": "default"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:02.170 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:02.237 189 INFO tempest.lib.common.rest_client [req-9e4a3b13-d4b8-4851-b1e7-058e23029295 ] Request (ServerActionsRbacTest:test_server_detail): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.061s 2020-12-14 02:22:02.240 189 DEBUG tempest.lib.common.rest_client [req-9e4a3b13-d4b8-4851-b1e7-058e23029295 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e4a3b13-d4b8-4851-b1e7-058e23029295', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:02.292 189 INFO tempest.lib.common.rest_client [req-88caffbd-56cc-4546-ae38-afbf1ef658a9 ] Request (ServerActionsRbacTest:test_server_detail): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:22:02.295 189 DEBUG tempest.lib.common.rest_client [req-88caffbd-56cc-4546-ae38-afbf1ef658a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88caffbd-56cc-4546-ae38-afbf1ef658a9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["tJpgMWMATAqSAk0M7Dg8wA"], "expires_at": "2020-12-14T03:22:02.000000Z", "issued_at": "2020-12-14T02:22:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:02.518 186 INFO tempest.lib.common.rest_client [req-06e56a63-73c8-4ee2-8489-541c4f46d2d1 ] Request (VolumesManageV3RbacTest:test_volume_manage): 202 POST http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes 0.480s 2020-12-14 02:22:02.522 186 DEBUG tempest.lib.common.rest_client [req-06e56a63-73c8-4ee2-8489-541c4f46d2d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesManageV3RbacTest-Volume-1280110909"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-06e56a63-73c8-4ee2-8489-541c4f46d2d1', 'content-length': '844', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-06e56a63-73c8-4ee2-8489-541c4f46d2d1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes'} Body: b'{"volume": {"id": "e12063dc-2c57-4d1d-a8ee-bcf88b90eba5", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:22:02.000000", "updated_at": null, "name": "tempest-VolumesManageV3RbacTest-Volume-1280110909", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5"}], "user_id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:02.610 189 INFO tempest.lib.common.rest_client [req-57d3cb7f-ab45-47f2-9cfb-0588ac8b81b7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.282s 2020-12-14 02:22:02.612 189 DEBUG tempest.lib.common.rest_client [req-57d3cb7f-ab45-47f2-9cfb-0588ac8b81b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-57d3cb7f-ab45-47f2-9cfb-0588ac8b81b7', 'x-compute-request-id': 'req-57d3cb7f-ab45-47f2-9cfb-0588ac8b81b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:00Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:02.702 186 INFO tempest.lib.common.rest_client [req-c7249c96-efb2-417c-a767-545cbf36d1ad ] Request (VolumesManageV3RbacTest:test_volume_manage): 200 GET http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5 0.091s 2020-12-14 02:22:02.705 186 DEBUG tempest.lib.common.rest_client [req-c7249c96-efb2-417c-a767-545cbf36d1ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c7249c96-efb2-417c-a767-545cbf36d1ad', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c7249c96-efb2-417c-a767-545cbf36d1ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5'} Body: b'{"volume": {"id": "e12063dc-2c57-4d1d-a8ee-bcf88b90eba5", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:22:02.000000", "updated_at": "2020-12-14T02:22:03.000000", "name": "tempest-VolumesManageV3RbacTest-Volume-1280110909", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5"}], "user_id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "65d62c584bfc4f619a6ef3670b76ff71"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:02.716 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:02.720 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.723 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.726 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.729 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.733 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.737 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.741 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.744 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.746 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.749 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.752 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.754 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.757 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.760 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.763 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.766 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.769 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.771 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.774 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.777 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.779 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.782 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.784 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.787 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.790 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.792 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.795 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.798 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.800 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.803 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.805 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.808 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.808 197 INFO tempest.lib.common.rest_client [req-8cf842dd-5ab1-459e-b84e-73af72dcd757 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.230s 2020-12-14 02:22:02.811 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.811 197 DEBUG tempest.lib.common.rest_client [req-8cf842dd-5ab1-459e-b84e-73af72dcd757 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1717', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8cf842dd-5ab1-459e-b84e-73af72dcd757', 'x-compute-request-id': 'req-8cf842dd-5ab1-459e-b84e-73af72dcd757', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"server": {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "updated": "2020-12-14T02:22:02Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:02:18:75"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/6f32b799-3a71-4df3-a397-802b4088c9c6"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:16:58.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbd0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:02.813 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.816 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.819 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.821 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.824 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.827 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.830 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.833 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.835 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.838 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.841 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.844 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.847 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.849 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.851 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.853 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.855 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.857 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.859 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.861 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.863 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.866 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.868 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.872 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.874 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.876 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.879 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.880 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.882 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.884 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.886 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.888 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.890 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.892 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.894 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.896 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.898 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.900 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:02.906 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:detail:get_all_tenants, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:02.908 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:02.980 189 INFO tempest.lib.common.rest_client [req-aa7505a1-fd30-42fb-b299-c6d77f98eeac ] Request (ServerActionsRbacTest:test_server_detail_all_tenants): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.066s 2020-12-14 02:22:02.982 189 DEBUG tempest.lib.common.rest_client [req-aa7505a1-fd30-42fb-b299-c6d77f98eeac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa7505a1-fd30-42fb-b299-c6d77f98eeac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:03.029 189 INFO tempest.lib.common.rest_client [req-e5f37585-2104-48ab-8231-964cd6eb2aa7 ] Request (ServerActionsRbacTest:test_server_detail_all_tenants): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:22:03.033 189 DEBUG tempest.lib.common.rest_client [req-e5f37585-2104-48ab-8231-964cd6eb2aa7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5f37585-2104-48ab-8231-964cd6eb2aa7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["s3QZvTI8RzCOTFUIlEqYAg"], "expires_at": "2020-12-14T03:22:03.000000Z", "issued_at": "2020-12-14T02:22:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:03.403 189 INFO tempest.lib.common.rest_client [req-16abf4b9-5826-4bf7-b3f8-4c02568d67c8 ] Request (ServerActionsRbacTest:test_server_detail_all_tenants): 200 GET http://172.30.13.94/compute/v2.1/servers/detail?all_tenants=1 0.362s 2020-12-14 02:22:03.406 189 DEBUG tempest.lib.common.rest_client [req-16abf4b9-5826-4bf7-b3f8-4c02568d67c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '4909', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-16abf4b9-5826-4bf7-b3f8-4c02568d67c8', 'x-compute-request-id': 'req-16abf4b9-5826-4bf7-b3f8-4c02568d67c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/detail?all_tenants=1'} Body: b'{"servers": [{"id": "abc3d4e2-b448-4356-92a1-5cdb4006264a", "name": "tempest-server-tempest-TestSecurityGroupsBasicOps-181956275-access_point-331536561", "status": "BUILD", "tenant_id": "52bf6b4fb43f4f2192e443703f579e3f", "user_id": "51f1c47e76974d2a835ca69862a9e887", "metadata": {}, "hostId": "68dd894363d10f35eaf918610d5abac44f0286f4184bb565f7ab968e", "image": {"id": "376dbc58-0ba1-441a-afe9-cf0b703c7011", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/376dbc58-0ba1-441a-afe9-cf0b703c7011"}]}, "flavor": {"id": "d26caef2-25c6-4210-b3eb-833b2e732bdc", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/d26caef2-25c6-4210-b3eb-833b2e732bdc"}]}, "created": "2020-12-14T02:21:57Z", "updated": "2020-12-14T02:21:59Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/abc3d4e2-b448-4356-92a1-5cdb4006264a"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/abc3d4e2-b448-4356-92a1-5cdb4006264a"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": "tempest-TestSecurityGroupsBasicOps-1820268322", "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdd", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "security_groups": [{"name": "tempest-secgroup_general--352064593"}, {"name": "tempest-secgroup_access--1566024427"}]}, {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:00Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "security_groups": [{"name": "default"}]}, {"id": "6f32b799-3a71-4df3-a397-802b4088c9c6", "name": "tempest-MiscPolicyActionsRbacTest-server-294781168", "status": "DELETED", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:16:33Z", "up _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:03.542 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:03.617 189 INFO tempest.lib.common.rest_client [req-f910409f-e89e-4f75-91f1-69ff4111353b ] Request (ServerActionsRbacTest:test_server_detail_all_tenants): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.068s 2020-12-14 02:22:03.620 189 DEBUG tempest.lib.common.rest_client [req-f910409f-e89e-4f75-91f1-69ff4111353b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f910409f-e89e-4f75-91f1-69ff4111353b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:03.672 189 INFO tempest.lib.common.rest_client [req-0288fb42-5cab-4f88-9d5d-7d570ebe15f1 ] Request (ServerActionsRbacTest:test_server_detail_all_tenants): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:22:03.676 189 DEBUG tempest.lib.common.rest_client [req-0288fb42-5cab-4f88-9d5d-7d570ebe15f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0288fb42-5cab-4f88-9d5d-7d570ebe15f1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["K0R-ZapXQnyEOPB0CBw3kw"], "expires_at": "2020-12-14T03:22:03.000000Z", "issued_at": "2020-12-14T02:22:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:03.896 186 INFO tempest.lib.common.rest_client [req-bf32e5f5-0c6b-4100-85fd-b191a5bcd2a5 ] Request (VolumesManageV3RbacTest:test_volume_manage): 200 GET http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5 0.096s 2020-12-14 02:22:03.901 186 DEBUG tempest.lib.common.rest_client [req-bf32e5f5-0c6b-4100-85fd-b191a5bcd2a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bf32e5f5-0c6b-4100-85fd-b191a5bcd2a5', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bf32e5f5-0c6b-4100-85fd-b191a5bcd2a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5'} Body: b'{"volume": {"id": "e12063dc-2c57-4d1d-a8ee-bcf88b90eba5", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:22:02.000000", "updated_at": "2020-12-14T02:22:03.000000", "name": "tempest-VolumesManageV3RbacTest-Volume-1280110909", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5"}], "user_id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "65d62c584bfc4f619a6ef3670b76ff71"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:03.993 186 INFO tempest.common.waiters [-] volume e12063dc-2c57-4d1d-a8ee-bcf88b90eba5 reached available after waiting for 1.992872 seconds 2020-12-14 02:22:04.001 197 INFO tempest.lib.common.rest_client [req-b08380c9-dcb6-43e2-a1a8-345ada453b31 ] Request (MiscPolicyActionsRbacTest:setUp): 404 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.077s 2020-12-14 02:22:04.005 197 DEBUG tempest.lib.common.rest_client [req-b08380c9-dcb6-43e2-a1a8-345ada453b31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-b08380c9-dcb6-43e2-a1a8-345ada453b31', 'x-compute-request-id': 'req-b08380c9-dcb6-43e2-a1a8-345ada453b31', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 6f32b799-3a71-4df3-a397-802b4088c9c6 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:04.020 189 INFO tempest.lib.common.rest_client [req-2477b9f3-28c3-4c6a-aed2-c6e4d77a59bf ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.309s 2020-12-14 02:22:04.023 189 DEBUG tempest.lib.common.rest_client [req-2477b9f3-28c3-4c6a-aed2-c6e4d77a59bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2477b9f3-28c3-4c6a-aed2-c6e4d77a59bf', 'x-compute-request-id': 'req-2477b9f3-28c3-4c6a-aed2-c6e4d77a59bf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:00Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:04.076 186 INFO tempest.lib.common.rest_client [req-7e7a9e40-5f04-4973-854f-ad41f9b993dc ] Request (VolumesManageV3RbacTest:test_volume_manage): 200 GET http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5 0.077s 2020-12-14 02:22:04.079 186 DEBUG tempest.lib.common.rest_client [req-7e7a9e40-5f04-4973-854f-ad41f9b993dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7e7a9e40-5f04-4973-854f-ad41f9b993dc', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7e7a9e40-5f04-4973-854f-ad41f9b993dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5'} Body: b'{"volume": {"id": "e12063dc-2c57-4d1d-a8ee-bcf88b90eba5", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:22:02.000000", "updated_at": "2020-12-14T02:22:03.000000", "name": "tempest-VolumesManageV3RbacTest-Volume-1280110909", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5"}], "user_id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "65d62c584bfc4f619a6ef3670b76ff71"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:04.133 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:04.138 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.141 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.144 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.147 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.151 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.155 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.160 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.163 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.166 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.168 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.171 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.174 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.177 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.180 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.180 197 INFO tempest.lib.common.rest_client [req-3d0d77ba-97c0-48a4-aff6-b7ab2bfaba17 ] Request (MiscPolicyActionsRbacTest:setUp): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:22:04.183 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.184 197 DEBUG tempest.lib.common.rest_client [req-3d0d77ba-97c0-48a4-aff6-b7ab2bfaba17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d0d77ba-97c0-48a4-aff6-b7ab2bfaba17', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["EONT0uo_QvCbQOBmcKf7kw"], "expires_at": "2020-12-14T03:22:04.000000Z", "issued_at": "2020-12-14T02:22:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:04.187 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.189 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.190 197 INFO tempest.lib.common.fixed_network [-] (MiscPolicyActionsRbacTest:setUp) Found network {'id': '25a7ce63-636c-4fcd-bf14-ab20366f9481', 'name': 'tempest-MiscPolicyActionsRbacTest-2031429312-network', 'tenant_id': 'a836f1fb2f90434abc04b768f968fb5b', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'a836f1fb2f90434abc04b768f968fb5b', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 65, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:15:55Z', 'updated_at': '2020-12-14T02:15:55Z', 'revision_number': 1} available for tenant 2020-12-14 02:22:04.192 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.195 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.198 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.201 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.203 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.206 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.209 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.212 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.215 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.217 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.220 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.223 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.226 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.229 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.231 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.234 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.237 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.240 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.243 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.246 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.248 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.252 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.255 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.258 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.261 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.263 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.266 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.268 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.271 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.273 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.275 186 INFO tempest.lib.common.rest_client [req-904c0919-98aa-4ec7-8114-bfbd9901cf37 ] Request (VolumesManageV3RbacTest:test_volume_manage): 202 POST http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5/action 0.098s 2020-12-14 02:22:04.275 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.278 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.277 186 DEBUG tempest.lib.common.rest_client [req-904c0919-98aa-4ec7-8114-bfbd9901cf37 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-unmanage": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-904c0919-98aa-4ec7-8114-bfbd9901cf37', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:04.280 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.282 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.284 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.287 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.289 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.292 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.295 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.299 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.302 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.304 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.307 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.309 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.311 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.313 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.315 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.318 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.320 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.322 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.324 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.326 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.329 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.331 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:04.340 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:index, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:04.342 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:04.364 186 INFO tempest.lib.common.rest_client [req-09a9a852-2855-4a66-a7f4-6d145d8552ca ] Request (VolumesManageV3RbacTest:test_volume_manage): 200 GET http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5 0.080s 2020-12-14 02:22:04.367 186 DEBUG tempest.lib.common.rest_client [req-09a9a852-2855-4a66-a7f4-6d145d8552ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-09a9a852-2855-4a66-a7f4-6d145d8552ca', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-09a9a852-2855-4a66-a7f4-6d145d8552ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5'} Body: b'{"volume": {"id": "e12063dc-2c57-4d1d-a8ee-bcf88b90eba5", "status": "unmanaging", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:22:02.000000", "updated_at": "2020-12-14T02:22:04.000000", "name": "tempest-VolumesManageV3RbacTest-Volume-1280110909", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5"}], "user_id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "65d62c584bfc4f619a6ef3670b76ff71"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:04.403 189 INFO tempest.lib.common.rest_client [req-aa54ed7a-0f69-4031-8918-b7ea7b9271fd ] Request (ServerActionsRbacTest:test_server_index): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.056s 2020-12-14 02:22:04.405 189 DEBUG tempest.lib.common.rest_client [req-aa54ed7a-0f69-4031-8918-b7ea7b9271fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa54ed7a-0f69-4031-8918-b7ea7b9271fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:04.451 189 INFO tempest.lib.common.rest_client [req-0eb9b36b-f787-43eb-840e-71e0fb36d013 ] Request (ServerActionsRbacTest:test_server_index): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:22:04.455 189 DEBUG tempest.lib.common.rest_client [req-0eb9b36b-f787-43eb-840e-71e0fb36d013 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0eb9b36b-f787-43eb-840e-71e0fb36d013', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["OksDrzO3RKyv0CBqSN2JPQ"], "expires_at": "2020-12-14T03:22:04.000000Z", "issued_at": "2020-12-14T02:22:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:04.701 189 INFO tempest.lib.common.rest_client [req-ed94ac4d-eaf5-49a2-97ff-e647190dcf7b ] Request (ServerActionsRbacTest:test_server_index): 200 GET http://172.30.13.94/compute/v2.1/servers?minimal=True 0.238s 2020-12-14 02:22:04.705 189 DEBUG tempest.lib.common.rest_client [req-ed94ac4d-eaf5-49a2-97ff-e647190dcf7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '342', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ed94ac4d-eaf5-49a2-97ff-e647190dcf7b', 'x-compute-request-id': 'req-ed94ac4d-eaf5-49a2-97ff-e647190dcf7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers?minimal=True'} Body: b'{"servers": [{"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:04.728 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:04.798 189 INFO tempest.lib.common.rest_client [req-19dec997-0cb9-4555-8b1d-0dadd12d63bc ] Request (ServerActionsRbacTest:test_server_index): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.064s 2020-12-14 02:22:04.801 189 DEBUG tempest.lib.common.rest_client [req-19dec997-0cb9-4555-8b1d-0dadd12d63bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19dec997-0cb9-4555-8b1d-0dadd12d63bc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:04.854 189 INFO tempest.lib.common.rest_client [req-eff5d646-b5f4-49d4-8e46-3cd97fc57331 ] Request (ServerActionsRbacTest:test_server_index): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:22:04.858 189 DEBUG tempest.lib.common.rest_client [req-eff5d646-b5f4-49d4-8e46-3cd97fc57331 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eff5d646-b5f4-49d4-8e46-3cd97fc57331', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["u_e0R0Z-TbaX35SSKh1cwg"], "expires_at": "2020-12-14T03:22:04.000000Z", "issued_at": "2020-12-14T02:22:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:05.081 197 INFO tempest.lib.common.rest_client [req-ce8e7489-01ee-4297-8824-c4285c13cf64 ] Request (MiscPolicyActionsRbacTest:setUp): 202 POST http://172.30.13.94/compute/v2.1/servers 0.881s 2020-12-14 02:22:05.084 197 DEBUG tempest.lib.common.rest_client [req-ce8e7489-01ee-4297-8824-c4285c13cf64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "adminPass": "Y8@1j5gbSeQIXZJ", "networks": [{"uuid": "25a7ce63-636c-4fcd-bf14-ab20366f9481"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '385', 'location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ce8e7489-01ee-4297-8824-c4285c13cf64', 'x-compute-request-id': 'req-ce8e7489-01ee-4297-8824-c4285c13cf64', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "Y8@1j5gbSeQIXZJ"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:05.166 189 INFO tempest.lib.common.rest_client [req-e75c6756-4810-49dd-b831-1d89ea5ce063 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.268s 2020-12-14 02:22:05.168 189 DEBUG tempest.lib.common.rest_client [req-e75c6756-4810-49dd-b831-1d89ea5ce063 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e75c6756-4810-49dd-b831-1d89ea5ce063', 'x-compute-request-id': 'req-e75c6756-4810-49dd-b831-1d89ea5ce063', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:00Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:05.232 197 INFO tempest.lib.common.rest_client [req-d6f74aea-0b69-4eaa-bd48-3324d855b012 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.116s 2020-12-14 02:22:05.236 197 DEBUG tempest.lib.common.rest_client [req-d6f74aea-0b69-4eaa-bd48-3324d855b012 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1401', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d6f74aea-0b69-4eaa-bd48-3324d855b012', 'x-compute-request-id': 'req-d6f74aea-0b69-4eaa-bd48-3324d855b012', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:05Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:05.255 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:05.259 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.261 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.264 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.267 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.270 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.273 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.277 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.279 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.281 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.283 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.285 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.287 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.290 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.292 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.295 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.297 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.299 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.302 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.304 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.306 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.308 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.310 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.312 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.314 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.316 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.319 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.321 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.323 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.325 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.327 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.329 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.331 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.334 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.336 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.338 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.340 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.343 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.345 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.348 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.350 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.352 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.355 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.357 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.361 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.364 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.369 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.373 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.375 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.378 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.381 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.384 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.387 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.390 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.392 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.396 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.399 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.405 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.408 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.411 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.415 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.420 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.422 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.426 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.429 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.431 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.434 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.437 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.440 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.443 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.446 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.449 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:05.458 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:index:get_all_tenants, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:05.460 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:05.530 186 INFO tempest.lib.common.rest_client [req-e2729c18-42d4-4d6a-9417-5c9ff4d7b502 ] Request (VolumesManageV3RbacTest:test_volume_manage): 404 GET http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5 0.062s 2020-12-14 02:22:05.533 189 INFO tempest.lib.common.rest_client [req-c98887d7-f40c-48c1-93df-28a5423330e1 ] Request (ServerActionsRbacTest:test_server_index_all_tenants): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.067s 2020-12-14 02:22:05.534 186 DEBUG tempest.lib.common.rest_client [req-e2729c18-42d4-4d6a-9417-5c9ff4d7b502 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-e2729c18-42d4-4d6a-9417-5c9ff4d7b502', 'x-openstack-request-id': 'req-e2729c18-42d4-4d6a-9417-5c9ff4d7b502', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume e12063dc-2c57-4d1d-a8ee-bcf88b90eba5 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:05.537 189 DEBUG tempest.lib.common.rest_client [req-c98887d7-f40c-48c1-93df-28a5423330e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c98887d7-f40c-48c1-93df-28a5423330e1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:05.538 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:05.587 189 INFO tempest.lib.common.rest_client [req-58a866c6-0085-4026-9e35-8205067f526a ] Request (ServerActionsRbacTest:test_server_index_all_tenants): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:22:05.590 189 DEBUG tempest.lib.common.rest_client [req-58a866c6-0085-4026-9e35-8205067f526a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58a866c6-0085-4026-9e35-8205067f526a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["c44DvIzGRPaHKz0xXk-DsA"], "expires_at": "2020-12-14T03:22:05.000000Z", "issued_at": "2020-12-14T02:22:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:05.611 186 INFO tempest.lib.common.rest_client [req-8232df48-8b6b-4182-a5a3-e8f9b14104b0 ] Request (VolumesManageV3RbacTest:test_volume_manage): 200 GET http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles 0.066s 2020-12-14 02:22:05.615 186 DEBUG tempest.lib.common.rest_client [req-8232df48-8b6b-4182-a5a3-e8f9b14104b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8232df48-8b6b-4182-a5a3-e8f9b14104b0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:05.662 186 INFO tempest.lib.common.rest_client [req-3d379e7e-3eba-4c42-8666-97ff8956619f ] Request (VolumesManageV3RbacTest:test_volume_manage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:22:05.666 186 DEBUG tempest.lib.common.rest_client [req-3d379e7e-3eba-4c42-8666-97ff8956619f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d379e7e-3eba-4c42-8666-97ff8956619f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "name": "tempest-VolumesManageV3RbacTest-1652099908", "password_expires_at": null}, "audit_ids": ["_LrX8QnfS0aXw5A39pUWtA"], "expires_at": "2020-12-14T03:22:05.000000Z", "issued_at": "2020-12-14T02:22:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "65d62c584bfc4f619a6ef3670b76ff71", "name": "tempest-VolumesManageV3RbacTest-1652099908"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:05.821 189 INFO tempest.lib.common.rest_client [req-5bb2747a-5762-4983-81cf-f7c7f4167cb4 ] Request (ServerActionsRbacTest:test_server_index_all_tenants): 200 GET http://172.30.13.94/compute/v2.1/servers?minimal=True&all_tenants=1 0.223s 2020-12-14 02:22:05.823 189 DEBUG tempest.lib.common.rest_client [req-5bb2747a-5762-4983-81cf-f7c7f4167cb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1039', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5bb2747a-5762-4983-81cf-f7c7f4167cb4', 'x-compute-request-id': 'req-5bb2747a-5762-4983-81cf-f7c7f4167cb4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers?minimal=True&all_tenants=1'} Body: b'{"servers": [{"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}]}, {"id": "abc3d4e2-b448-4356-92a1-5cdb4006264a", "name": "tempest-server-tempest-TestSecurityGroupsBasicOps-181956275-access_point-331536561", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/abc3d4e2-b448-4356-92a1-5cdb4006264a"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/abc3d4e2-b448-4356-92a1-5cdb4006264a"}]}, {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}]}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:05.858 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:05.939 189 INFO tempest.lib.common.rest_client [req-cdcc4172-f6ee-410e-a3dc-e401a9b67dbb ] Request (ServerActionsRbacTest:test_server_index_all_tenants): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.075s 2020-12-14 02:22:05.942 189 DEBUG tempest.lib.common.rest_client [req-cdcc4172-f6ee-410e-a3dc-e401a9b67dbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cdcc4172-f6ee-410e-a3dc-e401a9b67dbb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:05.971 186 INFO tempest.lib.common.rest_client [req-39ded247-0820-49d5-a5ff-6089d331a030 ] Request (VolumesManageV3RbacTest:test_volume_manage): 202 POST http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/os-volume-manage 0.298s 2020-12-14 02:22:05.974 186 DEBUG tempest.lib.common.rest_client [req-39ded247-0820-49d5-a5ff-6089d331a030 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"name": "tempest-VolumesManageV3RbacTest-volume-1811360057", "host": "lf-virtual8@ceph#ceph", "ref": {"source-name": "volume-e12063dc-2c57-4d1d-a8ee-bcf88b90eba5"}, "volume_type": "ceph", "availability_zone": "nova"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-39ded247-0820-49d5-a5ff-6089d331a030', 'content-length': '844', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-39ded247-0820-49d5-a5ff-6089d331a030', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/os-volume-manage'} Body: b'{"volume": {"id": "1cca14ff-472d-470b-9810-4953b7735664", "status": "creating", "size": 0, "availability_zone": "nova", "created_at": "2020-12-14T02:22:05.876772", "updated_at": null, "name": "tempest-VolumesManageV3RbacTest-volume-1811360057", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/1cca14ff-472d-470b-9810-4953b7735664"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/65d62c584bfc4f619a6ef3670b76ff71/volumes/1cca14ff-472d-470b-9810-4953b7735664"}], "user_id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:05.993 189 INFO tempest.lib.common.rest_client [req-2822ec00-ba69-4000-ae09-01c467413a52 ] Request (ServerActionsRbacTest:test_server_index_all_tenants): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:22:05.997 189 DEBUG tempest.lib.common.rest_client [req-2822ec00-ba69-4000-ae09-01c467413a52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2822ec00-ba69-4000-ae09-01c467413a52', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["MJxoU_TbSd2_TYwmVhD7vQ"], "expires_at": "2020-12-14T03:22:05.000000Z", "issued_at": "2020-12-14T02:22:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:06.063 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:06.131 186 INFO tempest.lib.common.rest_client [req-aee506c3-a73b-4e2a-8468-6a99ebc11521 ] Request (VolumesManageV3RbacTest:test_volume_manage): 200 GET http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles 0.061s 2020-12-14 02:22:06.134 186 DEBUG tempest.lib.common.rest_client [req-aee506c3-a73b-4e2a-8468-6a99ebc11521 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aee506c3-a73b-4e2a-8468-6a99ebc11521', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:06.184 186 INFO tempest.lib.common.rest_client [req-a3223b07-a9f1-464b-9426-2df6e4073f4f ] Request (VolumesManageV3RbacTest:test_volume_manage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:22:06.186 186 DEBUG tempest.lib.common.rest_client [req-a3223b07-a9f1-464b-9426-2df6e4073f4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3223b07-a9f1-464b-9426-2df6e4073f4f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "name": "tempest-VolumesManageV3RbacTest-1652099908", "password_expires_at": null}, "audit_ids": ["3lrYSP0gSvqo3rcGsgs5jQ"], "expires_at": "2020-12-14T03:22:06.000000Z", "issued_at": "2020-12-14T02:22:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "65d62c584bfc4f619a6ef3670b76ff71", "name": "tempest-VolumesManageV3RbacTest-1652099908"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:06.280 189 INFO tempest.lib.common.rest_client [req-705c928a-c040-433a-8837-f1a6333733c1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.250s 2020-12-14 02:22:06.284 189 DEBUG tempest.lib.common.rest_client [req-705c928a-c040-433a-8837-f1a6333733c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-705c928a-c040-433a-8837-f1a6333733c1', 'x-compute-request-id': 'req-705c928a-c040-433a-8837-f1a6333733c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:00Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:06.334 186 INFO tempest.lib.common.rest_client [req-e9dc887b-257b-4289-a5d6-d119294b8098 ] Request (VolumesManageV3RbacTest:test_volume_manage): 200 GET http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/1cca14ff-472d-470b-9810-4953b7735664 0.138s 2020-12-14 02:22:06.337 186 DEBUG tempest.lib.common.rest_client [req-e9dc887b-257b-4289-a5d6-d119294b8098 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e9dc887b-257b-4289-a5d6-d119294b8098', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e9dc887b-257b-4289-a5d6-d119294b8098', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/1cca14ff-472d-470b-9810-4953b7735664'} Body: b'{"volume": {"id": "1cca14ff-472d-470b-9810-4953b7735664", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:22:06.000000", "updated_at": "2020-12-14T02:22:06.000000", "name": "tempest-VolumesManageV3RbacTest-volume-1811360057", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/1cca14ff-472d-470b-9810-4953b7735664"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/65d62c584bfc4f619a6ef3670b76ff71/volumes/1cca14ff-472d-470b-9810-4953b7735664"}], "user_id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "65d62c584bfc4f619a6ef3670b76ff71"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:06.395 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:06.400 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.403 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.406 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.409 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.413 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.416 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.421 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.424 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.427 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.430 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.433 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.436 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.438 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.439 186 INFO tempest.common.waiters [-] volume 1cca14ff-472d-470b-9810-4953b7735664 reached available after waiting for 0.439602 seconds 2020-12-14 02:22:06.441 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.444 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.447 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.450 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.452 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.455 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.458 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.460 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.463 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.465 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.468 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.471 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.473 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.476 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.478 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.481 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.484 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.486 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.489 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.491 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.494 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.497 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.499 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.502 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.505 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.508 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.511 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.514 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.516 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.519 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.523 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.525 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.528 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.531 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.533 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.534 186 INFO tempest.lib.common.rest_client [req-f3d4631f-6e8e-40eb-8330-68185c9883b0 ] Request (VolumesManageV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/1cca14ff-472d-470b-9810-4953b7735664 0.086s 2020-12-14 02:22:06.536 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.536 186 DEBUG tempest.lib.common.rest_client [req-f3d4631f-6e8e-40eb-8330-68185c9883b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f3d4631f-6e8e-40eb-8330-68185c9883b0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/1cca14ff-472d-470b-9810-4953b7735664'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:06.539 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.540 197 INFO tempest.lib.common.rest_client [req-e96c18d6-9bbc-4921-8553-524557b64f0e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.165s 2020-12-14 02:22:06.541 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.543 197 DEBUG tempest.lib.common.rest_client [req-e96c18d6-9bbc-4921-8553-524557b64f0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1494', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e96c18d6-9bbc-4921-8553-524557b64f0e', 'x-compute-request-id': 'req-e96c18d6-9bbc-4921-8553-524557b64f0e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:06Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:06.544 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.547 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.549 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.553 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.556 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.562 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.564 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.567 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.570 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.573 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.575 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.578 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.581 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.584 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.586 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.589 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.592 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.595 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.597 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.600 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:06.610 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-shelve:shelve, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:06.612 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:06.626 186 INFO tempest.lib.common.rest_client [req-4e985b63-4fa9-4b9f-a27e-964105001dfc ] Request (VolumesManageV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/1cca14ff-472d-470b-9810-4953b7735664 0.082s 2020-12-14 02:22:06.630 186 DEBUG tempest.lib.common.rest_client [req-4e985b63-4fa9-4b9f-a27e-964105001dfc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4e985b63-4fa9-4b9f-a27e-964105001dfc', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4e985b63-4fa9-4b9f-a27e-964105001dfc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/1cca14ff-472d-470b-9810-4953b7735664'} Body: b'{"volume": {"id": "1cca14ff-472d-470b-9810-4953b7735664", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:22:06.000000", "updated_at": "2020-12-14T02:22:07.000000", "name": "tempest-VolumesManageV3RbacTest-volume-1811360057", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/1cca14ff-472d-470b-9810-4953b7735664"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/65d62c584bfc4f619a6ef3670b76ff71/volumes/1cca14ff-472d-470b-9810-4953b7735664"}], "user_id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "65d62c584bfc4f619a6ef3670b76ff71"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:06.682 189 INFO tempest.lib.common.rest_client [req-f0f50389-530e-4e8c-914d-018c96693131 ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.064s 2020-12-14 02:22:06.685 189 DEBUG tempest.lib.common.rest_client [req-f0f50389-530e-4e8c-914d-018c96693131 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0f50389-530e-4e8c-914d-018c96693131', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:06.703 197 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/spawning" after 1 second wait 2020-12-14 02:22:06.739 189 INFO tempest.lib.common.rest_client [req-a90fc45c-b887-4742-9ee6-ba5aea8805b4 ] Request (ServerActionsRbacTest:test_shelve_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:22:06.742 189 DEBUG tempest.lib.common.rest_client [req-a90fc45c-b887-4742-9ee6-ba5aea8805b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a90fc45c-b887-4742-9ee6-ba5aea8805b4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["EbJ59rNqQhKlYE_KNUIaiA"], "expires_at": "2020-12-14T03:22:06.000000Z", "issued_at": "2020-12-14T02:22:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:07.150 189 INFO tempest.lib.common.rest_client [req-9cb6f00b-d2c0-4ede-b81b-e9a25acce321 ] Request (ServerActionsRbacTest:test_shelve_server): 202 POST http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1/action 0.402s 2020-12-14 02:22:07.152 189 DEBUG tempest.lib.common.rest_client [req-9cb6f00b-d2c0-4ede-b81b-e9a25acce321 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"shelve": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9cb6f00b-d2c0-4ede-b81b-e9a25acce321', 'x-compute-request-id': 'req-9cb6f00b-d2c0-4ede-b81b-e9a25acce321', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:07.446 189 INFO tempest.lib.common.rest_client [req-977f2532-08a4-4823-98a2-f3ef6a846fb6 ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.287s 2020-12-14 02:22:07.450 189 DEBUG tempest.lib.common.rest_client [req-977f2532-08a4-4823-98a2-f3ef6a846fb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1724', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-977f2532-08a4-4823-98a2-f3ef6a846fb6', 'x-compute-request-id': 'req-977f2532-08a4-4823-98a2-f3ef6a846fb6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:07Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:07.806 186 INFO tempest.lib.common.rest_client [req-e9b6af4f-4e5b-49d4-90eb-8d145b3f8d5a ] Request (VolumesManageV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/1cca14ff-472d-470b-9810-4953b7735664 0.076s 2020-12-14 02:22:07.809 186 DEBUG tempest.lib.common.rest_client [req-e9b6af4f-4e5b-49d4-90eb-8d145b3f8d5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-e9b6af4f-4e5b-49d4-90eb-8d145b3f8d5a', 'x-openstack-request-id': 'req-e9b6af4f-4e5b-49d4-90eb-8d145b3f8d5a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/1cca14ff-472d-470b-9810-4953b7735664'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 1cca14ff-472d-470b-9810-4953b7735664 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:07.824 186 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:07.841 186 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_unmanage, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:07.963 197 INFO tempest.lib.common.rest_client [req-d84f6a84-4f5c-458f-9c06-bcd41309231b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.250s 2020-12-14 02:22:07.966 197 DEBUG tempest.lib.common.rest_client [req-d84f6a84-4f5c-458f-9c06-bcd41309231b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d84f6a84-4f5c-458f-9c06-bcd41309231b', 'x-compute-request-id': 'req-d84f6a84-4f5c-458f-9c06-bcd41309231b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:06Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:08.226 186 INFO tempest.lib.common.rest_client [req-1dd92371-2de6-489d-9bfa-b22085398873 ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 202 POST http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes 0.379s 2020-12-14 02:22:08.230 186 DEBUG tempest.lib.common.rest_client [req-1dd92371-2de6-489d-9bfa-b22085398873 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesManageV3RbacTest-Volume-2110224417"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1dd92371-2de6-489d-9bfa-b22085398873', 'content-length': '844', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1dd92371-2de6-489d-9bfa-b22085398873', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes'} Body: b'{"volume": {"id": "60ca502f-9cc5-40f9-a063-2c14ec7b7970", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:22:08.000000", "updated_at": null, "name": "tempest-VolumesManageV3RbacTest-Volume-2110224417", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970"}], "user_id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:08.420 186 INFO tempest.lib.common.rest_client [req-d37949d2-517e-4fa1-b133-bdcf4c9417bd ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 200 GET http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970 0.104s 2020-12-14 02:22:08.425 186 DEBUG tempest.lib.common.rest_client [req-d37949d2-517e-4fa1-b133-bdcf4c9417bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d37949d2-517e-4fa1-b133-bdcf4c9417bd', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d37949d2-517e-4fa1-b133-bdcf4c9417bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970'} Body: b'{"volume": {"id": "60ca502f-9cc5-40f9-a063-2c14ec7b7970", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:22:08.000000", "updated_at": "2020-12-14T02:22:08.000000", "name": "tempest-VolumesManageV3RbacTest-Volume-2110224417", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970"}], "user_id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "65d62c584bfc4f619a6ef3670b76ff71"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:08.776 189 INFO tempest.lib.common.rest_client [req-a820a4c7-2e43-421c-a510-c4e90e5db3db ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.218s 2020-12-14 02:22:08.779 189 DEBUG tempest.lib.common.rest_client [req-a820a4c7-2e43-421c-a510-c4e90e5db3db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1740', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a820a4c7-2e43-421c-a510-c4e90e5db3db', 'x-compute-request-id': 'req-a820a4c7-2e43-421c-a510-c4e90e5db3db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:08Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:08.883 189 INFO tempest.common.waiters [-] State transition "ACTIVE/shelving" ==> "ACTIVE/shelving_image_uploading" after 1 second wait 2020-12-14 02:22:09.354 197 INFO tempest.lib.common.rest_client [req-463e40f8-dc69-4240-b2ed-45646a19a156 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.272s 2020-12-14 02:22:09.358 197 DEBUG tempest.lib.common.rest_client [req-463e40f8-dc69-4240-b2ed-45646a19a156 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-463e40f8-dc69-4240-b2ed-45646a19a156', 'x-compute-request-id': 'req-463e40f8-dc69-4240-b2ed-45646a19a156', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:06Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:09.606 186 INFO tempest.lib.common.rest_client [req-49b446b0-30fb-4fd7-bc46-790eaec44b79 ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 200 GET http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970 0.081s 2020-12-14 02:22:09.609 186 DEBUG tempest.lib.common.rest_client [req-49b446b0-30fb-4fd7-bc46-790eaec44b79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-49b446b0-30fb-4fd7-bc46-790eaec44b79', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-49b446b0-30fb-4fd7-bc46-790eaec44b79', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970'} Body: b'{"volume": {"id": "60ca502f-9cc5-40f9-a063-2c14ec7b7970", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:22:08.000000", "updated_at": "2020-12-14T02:22:08.000000", "name": "tempest-VolumesManageV3RbacTest-Volume-2110224417", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970"}], "user_id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "65d62c584bfc4f619a6ef3670b76ff71"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:09.708 186 INFO tempest.common.waiters [-] volume 60ca502f-9cc5-40f9-a063-2c14ec7b7970 reached available after waiting for 1.708139 seconds 2020-12-14 02:22:09.797 186 INFO tempest.lib.common.rest_client [req-8ce98149-31d3-4911-855d-d55d01ecc34a ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 200 GET http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970 0.084s 2020-12-14 02:22:09.801 186 DEBUG tempest.lib.common.rest_client [req-8ce98149-31d3-4911-855d-d55d01ecc34a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8ce98149-31d3-4911-855d-d55d01ecc34a', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8ce98149-31d3-4911-855d-d55d01ecc34a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970'} Body: b'{"volume": {"id": "60ca502f-9cc5-40f9-a063-2c14ec7b7970", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:22:08.000000", "updated_at": "2020-12-14T02:22:08.000000", "name": "tempest-VolumesManageV3RbacTest-Volume-2110224417", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970"}], "user_id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "65d62c584bfc4f619a6ef3670b76ff71"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:09.895 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:09.976 186 INFO tempest.lib.common.rest_client [req-ebb37357-291b-42ae-8f2d-d74cd0868a92 ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 200 GET http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles 0.074s 2020-12-14 02:22:09.980 186 DEBUG tempest.lib.common.rest_client [req-ebb37357-291b-42ae-8f2d-d74cd0868a92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ebb37357-291b-42ae-8f2d-d74cd0868a92', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:10.045 186 INFO tempest.lib.common.rest_client [req-f9658376-c4d0-420e-967d-948e13d8e4d8 ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-12-14 02:22:10.051 186 DEBUG tempest.lib.common.rest_client [req-f9658376-c4d0-420e-967d-948e13d8e4d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9658376-c4d0-420e-967d-948e13d8e4d8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "name": "tempest-VolumesManageV3RbacTest-1652099908", "password_expires_at": null}, "audit_ids": ["5_0jwqAeQQWTzsV1DyFb8Q"], "expires_at": "2020-12-14T03:22:10.000000Z", "issued_at": "2020-12-14T02:22:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "65d62c584bfc4f619a6ef3670b76ff71", "name": "tempest-VolumesManageV3RbacTest-1652099908"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:10.119 189 INFO tempest.lib.common.rest_client [req-fa968494-aee7-40eb-b762-34adcc15a89c ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.227s 2020-12-14 02:22:10.121 189 DEBUG tempest.lib.common.rest_client [req-fa968494-aee7-40eb-b762-34adcc15a89c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1740', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fa968494-aee7-40eb-b762-34adcc15a89c', 'x-compute-request-id': 'req-fa968494-aee7-40eb-b762-34adcc15a89c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:08Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:10.220 186 INFO tempest.lib.common.rest_client [req-ec44e993-8639-492b-881d-ac2f63f7cd78 ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 202 POST http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970/action 0.161s 2020-12-14 02:22:10.224 186 DEBUG tempest.lib.common.rest_client [req-ec44e993-8639-492b-881d-ac2f63f7cd78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-unmanage": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ec44e993-8639-492b-881d-ac2f63f7cd78', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:10.227 186 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:10.300 186 INFO tempest.lib.common.rest_client [req-cf075de2-617d-4e97-9d73-52b63abe61e0 ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 200 GET http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles 0.066s 2020-12-14 02:22:10.303 186 DEBUG tempest.lib.common.rest_client [req-cf075de2-617d-4e97-9d73-52b63abe61e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf075de2-617d-4e97-9d73-52b63abe61e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71/users/2ea8e62f84b74f0b96a37e6dda5a2cc3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:10.359 186 INFO tempest.lib.common.rest_client [req-2b5f0ff3-313a-404e-b6c5-60d6ce706626 ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:22:10.362 186 DEBUG tempest.lib.common.rest_client [req-2b5f0ff3-313a-404e-b6c5-60d6ce706626 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b5f0ff3-313a-404e-b6c5-60d6ce706626', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "name": "tempest-VolumesManageV3RbacTest-1652099908", "password_expires_at": null}, "audit_ids": ["eCT2xDYFQymXE156N6CrXw"], "expires_at": "2020-12-14T03:22:10.000000Z", "issued_at": "2020-12-14T02:22:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "65d62c584bfc4f619a6ef3670b76ff71", "name": "tempest-VolumesManageV3RbacTest-1652099908"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_65d62c584bfc4f619a6ef3670b76ff71", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:10.488 186 INFO tempest.lib.common.rest_client [req-b4bbfc76-4ef7-4a34-902e-1b171cf09a76 ] Request (VolumesManageV3RbacTest:test_volume_unmanage): 404 GET http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970 0.118s 2020-12-14 02:22:10.492 186 DEBUG tempest.lib.common.rest_client [req-b4bbfc76-4ef7-4a34-902e-1b171cf09a76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-b4bbfc76-4ef7-4a34-902e-1b171cf09a76', 'x-openstack-request-id': 'req-b4bbfc76-4ef7-4a34-902e-1b171cf09a76', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 60ca502f-9cc5-40f9-a063-2c14ec7b7970 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:10.706 197 INFO tempest.lib.common.rest_client [req-ff31c4b8-6616-4531-a991-c8b4f6bd92c7 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.234s 2020-12-14 02:22:10.710 197 DEBUG tempest.lib.common.rest_client [req-ff31c4b8-6616-4531-a991-c8b4f6bd92c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ff31c4b8-6616-4531-a991-c8b4f6bd92c7', 'x-compute-request-id': 'req-ff31c4b8-6616-4531-a991-c8b4f6bd92c7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "BUILD", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:06Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:10.742 186 INFO tempest.lib.common.rest_client [req-5e05905c-2fd7-4ee6-bf1a-4ada96959ce4 ] Request (VolumesManageV3RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/os-volume-manage 0.242s 2020-12-14 02:22:10.745 186 DEBUG tempest.lib.common.rest_client [req-5e05905c-2fd7-4ee6-bf1a-4ada96959ce4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"name": "tempest-VolumesManageV3RbacTest-volume-868207919", "host": "lf-virtual8@ceph#ceph", "ref": {"source-name": "volume-60ca502f-9cc5-40f9-a063-2c14ec7b7970"}, "volume_type": "ceph", "availability_zone": "nova"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5e05905c-2fd7-4ee6-bf1a-4ada96959ce4', 'content-length': '843', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5e05905c-2fd7-4ee6-bf1a-4ada96959ce4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/os-volume-manage'} Body: b'{"volume": {"id": "420224a6-1c8d-4c0b-ae59-9e819951a526", "status": "creating", "size": 0, "availability_zone": "nova", "created_at": "2020-12-14T02:22:10.647217", "updated_at": null, "name": "tempest-VolumesManageV3RbacTest-volume-868207919", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526"}], "user_id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:10.915 186 INFO tempest.lib.common.rest_client [req-4220dc52-aa5f-4d4e-b926-55de8a71571b ] Request (VolumesManageV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526 0.073s 2020-12-14 02:22:10.918 186 DEBUG tempest.lib.common.rest_client [req-4220dc52-aa5f-4d4e-b926-55de8a71571b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4220dc52-aa5f-4d4e-b926-55de8a71571b', 'content-length': '1065', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4220dc52-aa5f-4d4e-b926-55de8a71571b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526'} Body: b'{"volume": {"id": "420224a6-1c8d-4c0b-ae59-9e819951a526", "status": "creating", "size": 0, "availability_zone": "nova", "created_at": "2020-12-14T02:22:11.000000", "updated_at": "2020-12-14T02:22:11.000000", "name": "tempest-VolumesManageV3RbacTest-volume-868207919", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526"}], "user_id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "65d62c584bfc4f619a6ef3670b76ff71"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:11.452 189 INFO tempest.lib.common.rest_client [req-e4eb0732-ea01-415a-a368-5afeff622a06 ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.221s 2020-12-14 02:22:11.455 189 DEBUG tempest.lib.common.rest_client [req-e4eb0732-ea01-415a-a368-5afeff622a06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1740', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e4eb0732-ea01-415a-a368-5afeff622a06', 'x-compute-request-id': 'req-e4eb0732-ea01-415a-a368-5afeff622a06', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:08Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:12.048 197 INFO tempest.lib.common.rest_client [req-8f7ad7fc-8216-43bf-8b29-2219d6437d07 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.225s 2020-12-14 02:22:12.052 197 DEBUG tempest.lib.common.rest_client [req-8f7ad7fc-8216-43bf-8b29-2219d6437d07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8f7ad7fc-8216-43bf-8b29-2219d6437d07', 'x-compute-request-id': 'req-8f7ad7fc-8216-43bf-8b29-2219d6437d07', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:11Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:12.104 186 INFO tempest.lib.common.rest_client [req-93f0498a-0083-43ec-97c2-cd74f18ac098 ] Request (VolumesManageV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526 0.087s 2020-12-14 02:22:12.107 186 DEBUG tempest.lib.common.rest_client [req-93f0498a-0083-43ec-97c2-cd74f18ac098 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-93f0498a-0083-43ec-97c2-cd74f18ac098', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-93f0498a-0083-43ec-97c2-cd74f18ac098', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526'} Body: b'{"volume": {"id": "420224a6-1c8d-4c0b-ae59-9e819951a526", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:22:11.000000", "updated_at": "2020-12-14T02:22:11.000000", "name": "tempest-VolumesManageV3RbacTest-volume-868207919", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526"}], "user_id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "65d62c584bfc4f619a6ef3670b76ff71"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:12.163 197 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 7 second wait 2020-12-14 02:22:12.167 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:12.172 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.175 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.178 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.181 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.185 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.189 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.194 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.196 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.199 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.199 186 INFO tempest.common.waiters [-] volume 420224a6-1c8d-4c0b-ae59-9e819951a526 reached available after waiting for 1.199351 seconds 2020-12-14 02:22:12.202 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.204 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.207 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.210 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.213 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.216 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.219 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.222 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.225 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.227 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.230 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.233 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.235 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.238 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.241 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.244 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.246 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.249 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.252 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.254 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.257 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.260 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.262 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.265 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.267 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.270 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.272 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.274 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.276 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.279 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.282 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.284 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.286 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.289 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.292 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.295 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.297 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.299 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.302 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.304 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.306 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.306 186 INFO tempest.lib.common.rest_client [req-8d17c449-618b-4971-9a47-d2b0540bb036 ] Request (VolumesManageV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526 0.100s 2020-12-14 02:22:12.308 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.310 186 DEBUG tempest.lib.common.rest_client [req-8d17c449-618b-4971-9a47-d2b0540bb036 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8d17c449-618b-4971-9a47-d2b0540bb036', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:12.311 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.313 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.315 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.318 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.320 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.325 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.327 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.330 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.332 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.334 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.336 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.339 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.341 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.343 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.345 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.347 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.350 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.352 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.354 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.356 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:12.364 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-admin-actions:reset_state, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:12.366 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:12.390 186 INFO tempest.lib.common.rest_client [req-09910226-e578-4483-a831-6639f0675d23 ] Request (VolumesManageV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526 0.074s 2020-12-14 02:22:12.393 186 DEBUG tempest.lib.common.rest_client [req-09910226-e578-4483-a831-6639f0675d23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-09910226-e578-4483-a831-6639f0675d23', 'content-length': '1065', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-09910226-e578-4483-a831-6639f0675d23', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526'} Body: b'{"volume": {"id": "420224a6-1c8d-4c0b-ae59-9e819951a526", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:22:11.000000", "updated_at": "2020-12-14T02:22:12.000000", "name": "tempest-VolumesManageV3RbacTest-volume-868207919", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526"}], "user_id": "2ea8e62f84b74f0b96a37e6dda5a2cc3", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "65d62c584bfc4f619a6ef3670b76ff71"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:12.429 197 INFO tempest.lib.common.rest_client [req-a10cb3fb-48dd-4e0b-bb9a-a8f014856c26 ] Request (MiscPolicyActionsRbacTest:test_reset_server_state): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.058s 2020-12-14 02:22:12.432 197 DEBUG tempest.lib.common.rest_client [req-a10cb3fb-48dd-4e0b-bb9a-a8f014856c26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a10cb3fb-48dd-4e0b-bb9a-a8f014856c26', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:12.474 197 INFO tempest.lib.common.rest_client [req-9977285a-bc58-45a8-b346-c3f870fa46ee ] Request (MiscPolicyActionsRbacTest:test_reset_server_state): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-12-14 02:22:12.477 197 DEBUG tempest.lib.common.rest_client [req-9977285a-bc58-45a8-b346-c3f870fa46ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9977285a-bc58-45a8-b346-c3f870fa46ee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["sFlZMukQQ0OcODJEt88n-A"], "expires_at": "2020-12-14T03:22:12.000000Z", "issued_at": "2020-12-14T02:22:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:12.724 197 INFO tempest.lib.common.rest_client [req-fcfb8ee2-4a35-40ba-835c-669009ccf1bf ] Request (MiscPolicyActionsRbacTest:test_reset_server_state): 202 POST http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action 0.242s 2020-12-14 02:22:12.727 197 DEBUG tempest.lib.common.rest_client [req-fcfb8ee2-4a35-40ba-835c-669009ccf1bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-resetState": {"state": "error"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fcfb8ee2-4a35-40ba-835c-669009ccf1bf', 'x-compute-request-id': 'req-fcfb8ee2-4a35-40ba-835c-669009ccf1bf', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:12.729 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:12.791 189 INFO tempest.lib.common.rest_client [req-354b85c6-0b6a-410a-bc6a-be7661b68d6b ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.224s 2020-12-14 02:22:12.794 189 DEBUG tempest.lib.common.rest_client [req-354b85c6-0b6a-410a-bc6a-be7661b68d6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1740', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-354b85c6-0b6a-410a-bc6a-be7661b68d6b', 'x-compute-request-id': 'req-354b85c6-0b6a-410a-bc6a-be7661b68d6b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:08Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:12.801 197 INFO tempest.lib.common.rest_client [req-66a2b6dc-2fd9-472a-b112-d149ab5a4aab ] Request (MiscPolicyActionsRbacTest:test_reset_server_state): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.067s 2020-12-14 02:22:12.804 197 DEBUG tempest.lib.common.rest_client [req-66a2b6dc-2fd9-472a-b112-d149ab5a4aab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66a2b6dc-2fd9-472a-b112-d149ab5a4aab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:12.854 197 INFO tempest.lib.common.rest_client [req-1e01ae16-833a-4503-8176-78e066147f52 ] Request (MiscPolicyActionsRbacTest:test_reset_server_state): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:22:12.857 197 DEBUG tempest.lib.common.rest_client [req-1e01ae16-833a-4503-8176-78e066147f52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e01ae16-833a-4503-8176-78e066147f52', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["VGdT47V3TmSg2_YRyKzgkQ"], "expires_at": "2020-12-14T03:22:12.000000Z", "issued_at": "2020-12-14T02:22:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:13.193 197 INFO tempest.lib.common.rest_client [req-6c8bc66a-1ff6-4f58-97e9-f2ab612433e0 ] Request (MiscPolicyActionsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action 0.328s 2020-12-14 02:22:13.195 197 DEBUG tempest.lib.common.rest_client [req-6c8bc66a-1ff6-4f58-97e9-f2ab612433e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-resetState": {"state": "active"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6c8bc66a-1ff6-4f58-97e9-f2ab612433e0', 'x-compute-request-id': 'req-6c8bc66a-1ff6-4f58-97e9-f2ab612433e0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:13.553 186 INFO tempest.lib.common.rest_client [req-65a2ce1d-3674-4729-957c-9d15b7b6f4cc ] Request (VolumesManageV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526 0.065s 2020-12-14 02:22:13.556 186 DEBUG tempest.lib.common.rest_client [req-65a2ce1d-3674-4729-957c-9d15b7b6f4cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-65a2ce1d-3674-4729-957c-9d15b7b6f4cc', 'x-openstack-request-id': 'req-65a2ce1d-3674-4729-957c-9d15b7b6f4cc', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/420224a6-1c8d-4c0b-ae59-9e819951a526'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 420224a6-1c8d-4c0b-ae59-9e819951a526 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:13.835 186 INFO tempest.lib.common.rest_client [req-4e4c79f6-7727-4677-b7d6-2d07090d85f9 ] Request (VolumesManageV3RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970 0.057s 2020-12-14 02:22:13.837 186 DEBUG tempest.lib.common.rest_client [req-4e4c79f6-7727-4677-b7d6-2d07090d85f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-4e4c79f6-7727-4677-b7d6-2d07090d85f9', 'x-openstack-request-id': 'req-4e4c79f6-7727-4677-b7d6-2d07090d85f9', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/60ca502f-9cc5-40f9-a063-2c14ec7b7970'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 60ca502f-9cc5-40f9-a063-2c14ec7b7970 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:13.863 197 INFO tempest.lib.common.rest_client [req-742bc340-6ab1-480a-a271-c72953f3e29f ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.252s 2020-12-14 02:22:13.866 197 DEBUG tempest.lib.common.rest_client [req-742bc340-6ab1-480a-a271-c72953f3e29f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-742bc340-6ab1-480a-a271-c72953f3e29f', 'x-compute-request-id': 'req-742bc340-6ab1-480a-a271-c72953f3e29f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:13Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:13.899 186 INFO tempest.lib.common.rest_client [req-c42701ae-08ae-4697-8ae9-466d9c61b984 ] Request (VolumesManageV3RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5 0.055s 2020-12-14 02:22:13.901 186 DEBUG tempest.lib.common.rest_client [req-c42701ae-08ae-4697-8ae9-466d9c61b984 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-c42701ae-08ae-4697-8ae9-466d9c61b984', 'x-openstack-request-id': 'req-c42701ae-08ae-4697-8ae9-466d9c61b984', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/65d62c584bfc4f619a6ef3670b76ff71/volumes/e12063dc-2c57-4d1d-a8ee-bcf88b90eba5'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume e12063dc-2c57-4d1d-a8ee-bcf88b90eba5 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:13.968 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:13.973 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:13.976 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:13.979 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:13.982 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:13.986 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:13.990 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:13.994 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:13.997 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.000 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.002 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.005 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.008 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.011 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.013 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.016 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.020 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.022 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.025 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.028 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.030 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.033 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.036 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.038 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.041 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.044 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.046 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.048 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.051 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.053 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.055 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.058 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.060 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.062 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.064 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.065 186 INFO tempest.lib.common.rest_client [req-ba7c27e8-cc6d-4527-8910-be43858fc082 ] Request (VolumesManageV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/2ea8e62f84b74f0b96a37e6dda5a2cc3 0.159s 2020-12-14 02:22:14.067 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.068 186 DEBUG tempest.lib.common.rest_client [req-ba7c27e8-cc6d-4527-8910-be43858fc082 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba7c27e8-cc6d-4527-8910-be43858fc082', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/2ea8e62f84b74f0b96a37e6dda5a2cc3'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:14.069 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.072 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.074 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.077 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.080 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.082 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.084 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.087 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.090 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.092 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.095 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.097 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.099 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.102 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.101 189 INFO tempest.lib.common.rest_client [req-baa470cf-ad6c-4306-964c-845c2109d9f2 ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.199s 2020-12-14 02:22:14.104 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.106 189 DEBUG tempest.lib.common.rest_client [req-baa470cf-ad6c-4306-964c-845c2109d9f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1740', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-baa470cf-ad6c-4306-964c-845c2109d9f2', 'x-compute-request-id': 'req-baa470cf-ad6c-4306-964c-845c2109d9f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:08Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:14.106 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.109 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.111 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.114 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.117 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.119 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.125 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.127 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.130 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.132 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.135 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.137 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.139 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.142 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.144 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.146 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.148 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.151 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.153 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.156 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.158 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:14.167 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-suspend-server:resume, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:14.178 186 INFO tempest.lib.common.rest_client [req-f855c3ea-a914-43f2-8c25-3842e21e3a72 ] Request (VolumesManageV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:22:14.182 186 DEBUG tempest.lib.common.rest_client [req-f855c3ea-a914-43f2-8c25-3842e21e3a72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f855c3ea-a914-43f2-8c25-3842e21e3a72', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["D3zvZCw_TwunB6iH9K8X-g"], "expires_at": "2020-12-14T03:22:14.000000Z", "issued_at": "2020-12-14T02:22:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:14.349 197 INFO tempest.lib.common.rest_client [req-b1bdfe73-4551-478d-b910-5795144de6c7 ] Request (MiscPolicyActionsRbacTest:test_resume_server): 202 POST http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action 0.177s 2020-12-14 02:22:14.351 197 DEBUG tempest.lib.common.rest_client [req-b1bdfe73-4551-478d-b910-5795144de6c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"suspend": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b1bdfe73-4551-478d-b910-5795144de6c7', 'x-compute-request-id': 'req-b1bdfe73-4551-478d-b910-5795144de6c7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:14.493 186 INFO tempest.lib.common.rest_client [req-17ebca49-0ef4-42af-9b67-ae66dcdddec7 ] Request (VolumesManageV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=65d62c584bfc4f619a6ef3670b76ff71&name=default 0.305s 2020-12-14 02:22:14.496 186 DEBUG tempest.lib.common.rest_client [req-17ebca49-0ef4-42af-9b67-ae66dcdddec7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-17ebca49-0ef4-42af-9b67-ae66dcdddec7', 'date': 'Mon, 14 Dec 2020 02:22:14 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=65d62c584bfc4f619a6ef3670b76ff71&name=default'} Body: b'{"security_groups": [{"id": "3f55073d-029d-4db7-96aa-81221a7272a4", "name": "default", "stateful": true, "tenant_id": "65d62c584bfc4f619a6ef3670b76ff71", "description": "Default security group", "security_group_rules": [{"id": "7a66e221-b128-4834-b918-604ab07a0372", "tenant_id": "65d62c584bfc4f619a6ef3670b76ff71", "security_group_id": "3f55073d-029d-4db7-96aa-81221a7272a4", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:22:14Z", "updated_at": "2020-12-14T02:22:14Z", "revision_number": 0, "project_id": "65d62c584bfc4f619a6ef3670b76ff71"}, {"id": "c6a07bf8-13cf-4c68-90d9-748b230d7328", "tenant_id": "65d62c584bfc4f619a6ef3670b76ff71", "security_group_id": "3f55073d-029d-4db7-96aa-81221a7272a4", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:22:14Z", "updated_at": "2020-12-14T02:22:14Z", "revision_number": 0, "project_id": "65d62c584bfc4f619a6ef3670b76ff71"}, {"id": "dbbc3d15-ec2d-4c4a-aaa4-26aa801a1128", "tenant_id": "65d62c584bfc4f619a6ef3670b76ff71", "security_group_id": "3f55073d-029d-4db7-96aa-81221a7272a4", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "3f55073d-029d-4db7-96aa-81221a7272a4", "description": null, "tags": [], "created_at": "2020-12-14T02:22:14Z", "updated_at": "2020-12-14T02:22:14Z", "revision_number": 0, "project_id": "65d62c584bfc4f619a6ef3670b76ff71"}, {"id": "e2697217-82a2-46f0-96c5-b36bfa937a79", "tenant_id": "65d62c584bfc4f619a6ef3670b76ff71", "security_group_id": "3f55073d-029d-4db7-96aa-81221a7272a4", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "3f55073d-029d-4db7-96aa-81221a7272a4", "description": null, "tags": [], "created_at": "2020-12-14T02:22:14Z", "updated_at": "2020-12-14T02:22:14Z", "revision_number": 0, "project_id": "65d62c584bfc4f619a6ef3670b76ff71"}], "tags": [], "created_at": "2020-12-14T02:22:14Z", "updated_at": "2020-12-14T02:22:14Z", "revision_number": 1, "project_id": "65d62c584bfc4f619a6ef3670b76ff71"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:14.595 197 INFO tempest.lib.common.rest_client [req-269f65f4-0340-4fb7-8b31-5244d1e44b8f ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.239s 2020-12-14 02:22:14.597 197 DEBUG tempest.lib.common.rest_client [req-269f65f4-0340-4fb7-8b31-5244d1e44b8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1734', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-269f65f4-0340-4fb7-8b31-5244d1e44b8f', 'x-compute-request-id': 'req-269f65f4-0340-4fb7-8b31-5244d1e44b8f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:14Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "suspending", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:14.689 186 INFO tempest.lib.common.rest_client [req-d23debce-b572-46ca-ac23-84e80e695632 ] Request (VolumesManageV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/3f55073d-029d-4db7-96aa-81221a7272a4 0.186s 2020-12-14 02:22:14.691 186 DEBUG tempest.lib.common.rest_client [req-d23debce-b572-46ca-ac23-84e80e695632 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-d23debce-b572-46ca-ac23-84e80e695632', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:22:14 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/3f55073d-029d-4db7-96aa-81221a7272a4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:14.841 186 INFO tempest.lib.common.rest_client [req-b51cb5d2-2b89-4266-9afb-732573b642b3 ] Request (VolumesManageV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71 0.143s 2020-12-14 02:22:14.843 186 DEBUG tempest.lib.common.rest_client [req-b51cb5d2-2b89-4266-9afb-732573b642b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b51cb5d2-2b89-4266-9afb-732573b642b3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/65d62c584bfc4f619a6ef3670b76ff71'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:15.427 189 INFO tempest.lib.common.rest_client [req-8c3b3472-14b8-4101-b487-8cadc71e4c93 ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.231s 2020-12-14 02:22:15.430 189 DEBUG tempest.lib.common.rest_client [req-8c3b3472-14b8-4101-b487-8cadc71e4c93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1740', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8c3b3472-14b8-4101-b487-8cadc71e4c93', 'x-compute-request-id': 'req-8c3b3472-14b8-4101-b487-8cadc71e4c93', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:08Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:15.910 197 INFO tempest.lib.common.rest_client [req-51903459-75f2-4acb-a268-e45f60e7f6fb ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.219s 2020-12-14 02:22:15.912 197 DEBUG tempest.lib.common.rest_client [req-51903459-75f2-4acb-a268-e45f60e7f6fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1734', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-51903459-75f2-4acb-a268-e45f60e7f6fb', 'x-compute-request-id': 'req-51903459-75f2-4acb-a268-e45f60e7f6fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:14Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "suspending", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:16.767 189 INFO tempest.lib.common.rest_client [req-3055c9f6-fbb3-462b-ae8c-c7f15d89723f ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.228s 2020-12-14 02:22:16.770 189 DEBUG tempest.lib.common.rest_client [req-3055c9f6-fbb3-462b-ae8c-c7f15d89723f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1722', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3055c9f6-fbb3-462b-ae8c-c7f15d89723f', 'x-compute-request-id': 'req-3055c9f6-fbb3-462b-ae8c-c7f15d89723f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHELVED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:16Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_offloading", "OS-EXT-STS:vm_state": "shelved", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:16.868 189 INFO tempest.common.waiters [-] State transition "ACTIVE/shelving_image_uploading" ==> "SHELVED/shelving_offloading" after 9 second wait 2020-12-14 02:22:17.230 197 INFO tempest.lib.common.rest_client [req-5f49048f-06fd-469f-8267-b9ced480c7be ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.228s 2020-12-14 02:22:17.234 197 DEBUG tempest.lib.common.rest_client [req-5f49048f-06fd-469f-8267-b9ced480c7be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1717', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5f49048f-06fd-469f-8267-b9ced480c7be', 'x-compute-request-id': 'req-5f49048f-06fd-469f-8267-b9ced480c7be', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "SUSPENDED", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:16Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:17.317 197 INFO tempest.common.waiters [-] State transition "ACTIVE/suspending" ==> "SUSPENDED/None" after 3 second wait 2020-12-14 02:22:17.319 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:17.423 197 INFO tempest.lib.common.rest_client [req-32e5924d-a6c7-4162-8886-91f3f5965fbb ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.100s 2020-12-14 02:22:17.425 197 DEBUG tempest.lib.common.rest_client [req-32e5924d-a6c7-4162-8886-91f3f5965fbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32e5924d-a6c7-4162-8886-91f3f5965fbb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:17.519 197 INFO tempest.lib.common.rest_client [req-7f79e860-0ccd-42d5-8930-dd3ac798e3ca ] Request (MiscPolicyActionsRbacTest:test_resume_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-14 02:22:17.521 197 DEBUG tempest.lib.common.rest_client [req-7f79e860-0ccd-42d5-8930-dd3ac798e3ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f79e860-0ccd-42d5-8930-dd3ac798e3ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["JRpctnhNTgy6e1LjJEi7zA"], "expires_at": "2020-12-14T03:22:17.000000Z", "issued_at": "2020-12-14T02:22:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:17.850 197 INFO tempest.lib.common.rest_client [req-f7c615c0-5eec-4683-9931-8c0ed02891e9 ] Request (MiscPolicyActionsRbacTest:test_resume_server): 202 POST http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action 0.323s 2020-12-14 02:22:17.852 197 DEBUG tempest.lib.common.rest_client [req-f7c615c0-5eec-4683-9931-8c0ed02891e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"resume": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f7c615c0-5eec-4683-9931-8c0ed02891e9', 'x-compute-request-id': 'req-f7c615c0-5eec-4683-9931-8c0ed02891e9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:17.855 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:17.929 197 INFO tempest.lib.common.rest_client [req-ee41799b-3e6b-49a8-b512-e1d405232d35 ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.067s 2020-12-14 02:22:17.932 197 DEBUG tempest.lib.common.rest_client [req-ee41799b-3e6b-49a8-b512-e1d405232d35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee41799b-3e6b-49a8-b512-e1d405232d35', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:17.988 197 INFO tempest.lib.common.rest_client [req-2e54b55e-7ffa-4eed-b181-af08c24cdb36 ] Request (MiscPolicyActionsRbacTest:test_resume_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:22:18.026 197 DEBUG tempest.lib.common.rest_client [req-2e54b55e-7ffa-4eed-b181-af08c24cdb36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e54b55e-7ffa-4eed-b181-af08c24cdb36', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["78knbaktSGW2RAoL2W3JaA"], "expires_at": "2020-12-14T03:22:17.000000Z", "issued_at": "2020-12-14T02:22:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:18.132 189 INFO tempest.lib.common.rest_client [req-cd210429-9f39-46ef-986f-58d08c4bcf24 ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.256s 2020-12-14 02:22:18.135 189 DEBUG tempest.lib.common.rest_client [req-cd210429-9f39-46ef-986f-58d08c4bcf24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cd210429-9f39-46ef-986f-58d08c4bcf24', 'x-compute-request-id': 'req-cd210429-9f39-46ef-986f-58d08c4bcf24', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:18Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:18.238 189 INFO tempest.common.waiters [-] State transition "SHELVED/shelving_offloading" ==> "SHELVED_OFFLOADED/None" after 11 second wait 2020-12-14 02:22:18.241 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:18.317 189 INFO tempest.lib.common.rest_client [req-f3cb3ea0-fed7-4968-9138-bd2af81b5939 ] Request (ServerActionsRbacTest:test_shelve_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.068s 2020-12-14 02:22:18.320 189 DEBUG tempest.lib.common.rest_client [req-f3cb3ea0-fed7-4968-9138-bd2af81b5939 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3cb3ea0-fed7-4968-9138-bd2af81b5939', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:18.370 197 INFO tempest.lib.common.rest_client [req-daa6a54f-52ff-4964-8161-b1e7a5c1453f ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.331s 2020-12-14 02:22:18.374 197 DEBUG tempest.lib.common.rest_client [req-daa6a54f-52ff-4964-8161-b1e7a5c1453f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-daa6a54f-52ff-4964-8161-b1e7a5c1453f', 'x-compute-request-id': 'req-daa6a54f-52ff-4964-8161-b1e7a5c1453f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "SUSPENDED", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:18Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resuming", "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:18.418 189 INFO tempest.lib.common.rest_client [req-010a56cb-c605-4ac3-b58d-8d8b10146bd3 ] Request (ServerActionsRbacTest:test_shelve_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:22:18.422 189 DEBUG tempest.lib.common.rest_client [req-010a56cb-c605-4ac3-b58d-8d8b10146bd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-010a56cb-c605-4ac3-b58d-8d8b10146bd3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["XGYfSqGlTa204tDdW4cLIg"], "expires_at": "2020-12-14T03:22:18.000000Z", "issued_at": "2020-12-14T02:22:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:19.734 197 INFO tempest.lib.common.rest_client [req-3252a9eb-d539-483f-a0f7-b3ac4de38053 ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.243s 2020-12-14 02:22:19.738 197 DEBUG tempest.lib.common.rest_client [req-3252a9eb-d539-483f-a0f7-b3ac4de38053 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3252a9eb-d539-483f-a0f7-b3ac4de38053', 'x-compute-request-id': 'req-3252a9eb-d539-483f-a0f7-b3ac4de38053', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "SUSPENDED", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:18Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resuming", "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:21.095 197 INFO tempest.lib.common.rest_client [req-129b5f0f-c8d5-49b1-af95-860c95d82d2d ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.245s 2020-12-14 02:22:21.098 197 DEBUG tempest.lib.common.rest_client [req-129b5f0f-c8d5-49b1-af95-860c95d82d2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-129b5f0f-c8d5-49b1-af95-860c95d82d2d', 'x-compute-request-id': 'req-129b5f0f-c8d5-49b1-af95-860c95d82d2d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "SUSPENDED", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:18Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resuming", "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:22.765 189 INFO tempest.lib.common.rest_client [req-d0521e67-d5ac-4cd0-82a5-d137a48b12a4 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 4.333s 2020-12-14 02:22:22.768 189 DEBUG tempest.lib.common.rest_client [req-d0521e67-d5ac-4cd0-82a5-d137a48b12a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1647', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d0521e67-d5ac-4cd0-82a5-d137a48b12a4', 'x-compute-request-id': 'req-d0521e67-d5ac-4cd0-82a5-d137a48b12a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:18Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:22.771 197 INFO tempest.lib.common.rest_client [req-44c61b72-f000-41dc-befe-a31f4ffe4e33 ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.563s 2020-12-14 02:22:22.775 197 DEBUG tempest.lib.common.rest_client [req-44c61b72-f000-41dc-befe-a31f4ffe4e33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-44c61b72-f000-41dc-befe-a31f4ffe4e33', 'x-compute-request-id': 'req-44c61b72-f000-41dc-befe-a31f4ffe4e33', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "SUSPENDED", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:18Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resuming", "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:23.287 189 INFO tempest.lib.common.rest_client [req-92ca3ae9-f611-4c61-9ef0-1d4732c98217 ] Request (ServerActionsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1/action 0.409s 2020-12-14 02:22:23.291 189 DEBUG tempest.lib.common.rest_client [req-92ca3ae9-f611-4c61-9ef0-1d4732c98217 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unshelve": null} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-92ca3ae9-f611-4c61-9ef0-1d4732c98217', 'x-compute-request-id': 'req-92ca3ae9-f611-4c61-9ef0-1d4732c98217', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:23.563 189 INFO tempest.lib.common.rest_client [req-fd63d7a2-aa21-4c6f-af3a-1cba30b4236c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.213s 2020-12-14 02:22:23.566 189 DEBUG tempest.lib.common.rest_client [req-fd63d7a2-aa21-4c6f-af3a-1cba30b4236c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1655', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fd63d7a2-aa21-4c6f-af3a-1cba30b4236c', 'x-compute-request-id': 'req-fd63d7a2-aa21-4c6f-af3a-1cba30b4236c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:23Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "unshelving", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:24.136 197 INFO tempest.lib.common.rest_client [req-be5d72d8-906e-4b44-be30-1811b66da586 ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.250s 2020-12-14 02:22:24.140 197 DEBUG tempest.lib.common.rest_client [req-be5d72d8-906e-4b44-be30-1811b66da586 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-be5d72d8-906e-4b44-be30-1811b66da586', 'x-compute-request-id': 'req-be5d72d8-906e-4b44-be30-1811b66da586', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "SUSPENDED", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:18Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resuming", "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:24.958 189 INFO tempest.lib.common.rest_client [req-409553b8-8dfa-43c7-8c9c-c38be2fbe7c0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.282s 2020-12-14 02:22:24.962 189 DEBUG tempest.lib.common.rest_client [req-409553b8-8dfa-43c7-8c9c-c38be2fbe7c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1657', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-409553b8-8dfa-43c7-8c9c-c38be2fbe7c0', 'x-compute-request-id': 'req-409553b8-8dfa-43c7-8c9c-c38be2fbe7c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:24Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:25.063 189 INFO tempest.common.waiters [-] State transition "SHELVED_OFFLOADED/unshelving" ==> "SHELVED_OFFLOADED/spawning" after 2 second wait 2020-12-14 02:22:25.449 197 INFO tempest.lib.common.rest_client [req-2186b014-8bc0-4e32-8c90-a6c97db698ec ] Request (MiscPolicyActionsRbacTest:test_resume_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.205s 2020-12-14 02:22:25.453 197 DEBUG tempest.lib.common.rest_client [req-2186b014-8bc0-4e32-8c90-a6c97db698ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2186b014-8bc0-4e32-8c90-a6c97db698ec', 'x-compute-request-id': 'req-2186b014-8bc0-4e32-8c90-a6c97db698ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:25Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:25.557 197 INFO tempest.common.waiters [-] State transition "SUSPENDED/resuming" ==> "ACTIVE/None" after 7 second wait 2020-12-14 02:22:25.942 197 INFO tempest.lib.common.rest_client [req-af330369-805d-451f-8248-52c95b670007 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.331s 2020-12-14 02:22:25.946 197 DEBUG tempest.lib.common.rest_client [req-af330369-805d-451f-8248-52c95b670007 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-af330369-805d-451f-8248-52c95b670007', 'x-compute-request-id': 'req-af330369-805d-451f-8248-52c95b670007', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:25Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:26.048 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:26.052 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.056 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.059 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.062 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.066 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.069 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.074 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.077 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.080 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.083 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.085 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.088 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.091 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.094 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.097 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.100 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.103 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.105 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.108 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.111 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.113 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.116 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.119 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.122 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.125 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.128 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.130 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.133 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.136 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.138 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.141 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.144 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.147 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.149 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.152 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.155 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.157 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.160 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.163 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.167 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.169 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.172 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.175 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.178 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.180 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.182 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.184 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.186 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.188 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.191 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.192 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.195 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.197 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.199 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.201 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.204 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.208 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.210 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.212 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.215 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.217 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.219 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.222 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.224 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.226 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.228 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.230 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.232 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.234 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.236 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.238 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:26.245 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-instance-actions:events, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:26.247 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:26.316 197 INFO tempest.lib.common.rest_client [req-cf21070b-f9ad-49f8-82e7-eb4655e23cf5 ] Request (MiscPolicyActionsRbacTest:test_show_instance_action): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.064s 2020-12-14 02:22:26.319 197 DEBUG tempest.lib.common.rest_client [req-cf21070b-f9ad-49f8-82e7-eb4655e23cf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf21070b-f9ad-49f8-82e7-eb4655e23cf5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:26.326 189 INFO tempest.lib.common.rest_client [req-c57d1bfe-8bf2-4a7c-b4b5-13bd460d9b48 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.252s 2020-12-14 02:22:26.330 189 DEBUG tempest.lib.common.rest_client [req-c57d1bfe-8bf2-4a7c-b4b5-13bd460d9b48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c57d1bfe-8bf2-4a7c-b4b5-13bd460d9b48', 'x-compute-request-id': 'req-c57d1bfe-8bf2-4a7c-b4b5-13bd460d9b48', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "2e43b604-0e21-41cb-bdc1-fc1303cc9bbd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/2e43b604-0e21-41cb-bdc1-fc1303cc9bbd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:25Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:26.386 197 INFO tempest.lib.common.rest_client [req-80f900db-cc1f-497f-bce8-89caba0408b6 ] Request (MiscPolicyActionsRbacTest:test_show_instance_action): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.059s 2020-12-14 02:22:26.388 197 DEBUG tempest.lib.common.rest_client [req-80f900db-cc1f-497f-bce8-89caba0408b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-80f900db-cc1f-497f-bce8-89caba0408b6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["a2mGdiUfS02m4RHWhIPwpA"], "expires_at": "2020-12-14T03:22:26.000000Z", "issued_at": "2020-12-14T02:22:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:26.550 197 INFO tempest.lib.common.rest_client [req-9028f0c4-c18c-4c8d-8126-5ba1d93afe6d ] Request (MiscPolicyActionsRbacTest:test_show_instance_action): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/os-instance-actions/req-ce8e7489-01ee-4297-8824-c4285c13cf64 0.156s 2020-12-14 02:22:26.553 197 DEBUG tempest.lib.common.rest_client [req-9028f0c4-c18c-4c8d-8126-5ba1d93afe6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '503', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9028f0c4-c18c-4c8d-8126-5ba1d93afe6d', 'x-compute-request-id': 'req-9028f0c4-c18c-4c8d-8126-5ba1d93afe6d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/os-instance-actions/req-ce8e7489-01ee-4297-8824-c4285c13cf64'} Body: b'{"instanceAction": {"action": "create", "instance_uuid": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "request_id": "req-ce8e7489-01ee-4297-8824-c4285c13cf64", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "project_id": "a836f1fb2f90434abc04b768f968fb5b", "start_time": "2020-12-14T02:22:04.000000", "message": null, "events": [{"event": "compute__do_build_and_run_instance", "start_time": "2020-12-14T02:22:05.000000", "finish_time": "2020-12-14T02:22:11.000000", "result": "Success", "traceback": null}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:26.591 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:26.654 197 INFO tempest.lib.common.rest_client [req-419b2354-5ac8-4c7f-9d30-9fb4812885aa ] Request (MiscPolicyActionsRbacTest:test_show_instance_action): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.056s 2020-12-14 02:22:26.658 197 DEBUG tempest.lib.common.rest_client [req-419b2354-5ac8-4c7f-9d30-9fb4812885aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-419b2354-5ac8-4c7f-9d30-9fb4812885aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:26.718 197 INFO tempest.lib.common.rest_client [req-7a6b567e-50e3-4765-a957-590f2b95db94 ] Request (MiscPolicyActionsRbacTest:test_show_instance_action): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:22:26.722 197 DEBUG tempest.lib.common.rest_client [req-7a6b567e-50e3-4765-a957-590f2b95db94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a6b567e-50e3-4765-a957-590f2b95db94', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["g3khlN4FQwu12i7Kf-nk0g"], "expires_at": "2020-12-14T03:22:26.000000Z", "issued_at": "2020-12-14T02:22:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:27.066 197 INFO tempest.lib.common.rest_client [req-88df32d5-4236-442d-a49d-bccd8f7b46ed ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.308s 2020-12-14 02:22:27.070 197 DEBUG tempest.lib.common.rest_client [req-88df32d5-4236-442d-a49d-bccd8f7b46ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-88df32d5-4236-442d-a49d-bccd8f7b46ed', 'x-compute-request-id': 'req-88df32d5-4236-442d-a49d-bccd8f7b46ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:25Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:27.174 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:27.179 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.182 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.185 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.188 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.192 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.195 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.200 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.203 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.205 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.208 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.211 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.213 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.216 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.219 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.222 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.225 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.228 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.230 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.233 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.236 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.239 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.241 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.244 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.246 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.249 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.252 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.254 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.257 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.260 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.262 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.265 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.268 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.271 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.273 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.276 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.279 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.281 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.284 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.287 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.290 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.293 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.295 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.298 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.301 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.304 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.306 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.309 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.312 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.314 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.316 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.318 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.320 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.322 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.323 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.326 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.328 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.332 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.334 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.336 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.338 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.340 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.342 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.344 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.346 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.348 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.350 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.351 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.353 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.355 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.357 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.359 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:27.366 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-diagnostics, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:27.367 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:27.442 197 INFO tempest.lib.common.rest_client [req-13f38f6d-43bc-48ae-85cf-fdce3af4439e ] Request (MiscPolicyActionsRbacTest:test_show_server_diagnostics): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.069s 2020-12-14 02:22:27.446 197 DEBUG tempest.lib.common.rest_client [req-13f38f6d-43bc-48ae-85cf-fdce3af4439e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13f38f6d-43bc-48ae-85cf-fdce3af4439e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:27.496 197 INFO tempest.lib.common.rest_client [req-627f365d-7992-4d46-a027-96f1c75c421e ] Request (MiscPolicyActionsRbacTest:test_show_server_diagnostics): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:22:27.499 197 DEBUG tempest.lib.common.rest_client [req-627f365d-7992-4d46-a027-96f1c75c421e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-627f365d-7992-4d46-a027-96f1c75c421e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["5F1LasJmSFWSOBoRCJ78-Q"], "expires_at": "2020-12-14T03:22:27.000000Z", "issued_at": "2020-12-14T02:22:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:27.682 197 INFO tempest.lib.common.rest_client [req-31fc33bb-2c8b-494b-9539-53f1b2a7a574 ] Request (MiscPolicyActionsRbacTest:test_show_server_diagnostics): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/diagnostics 0.175s 2020-12-14 02:22:27.686 197 DEBUG tempest.lib.common.rest_client [req-31fc33bb-2c8b-494b-9539-53f1b2a7a574 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '475', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-31fc33bb-2c8b-494b-9539-53f1b2a7a574', 'x-compute-request-id': 'req-31fc33bb-2c8b-494b-9539-53f1b2a7a574', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/diagnostics'} Body: b'{"cpu0_time": 50000000, "sda_read_req": 45, "sda_read": 747008, "sda_write_req": 0, "sda_write": 0, "sda_errors": -1, "tap34309665-ae_rx": 746, "tap34309665-ae_rx_packets": 7, "tap34309665-ae_rx_errors": 0, "tap34309665-ae_rx_drop": 0, "tap34309665-ae_tx": 1348, "tap34309665-ae_tx_packets": 14, "tap34309665-ae_tx_errors": 0, "tap34309665-ae_tx_drop": 0, "memory": 524288, "memory-actual": 524288, "memory-swap_in": 0, "memory-last_update": 1607912544, "memory-rss": 143704}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:27.695 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:27.702 189 INFO tempest.lib.common.rest_client [req-7743830f-3bcd-4156-b991-5bed85b28a40 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.267s 2020-12-14 02:22:27.706 189 DEBUG tempest.lib.common.rest_client [req-7743830f-3bcd-4156-b991-5bed85b28a40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7743830f-3bcd-4156-b991-5bed85b28a40', 'x-compute-request-id': 'req-7743830f-3bcd-4156-b991-5bed85b28a40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "2e43b604-0e21-41cb-bdc1-fc1303cc9bbd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/2e43b604-0e21-41cb-bdc1-fc1303cc9bbd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:25Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:27.761 197 INFO tempest.lib.common.rest_client [req-cb2304b9-0c39-446f-b125-53b3133554cf ] Request (MiscPolicyActionsRbacTest:test_show_server_diagnostics): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.059s 2020-12-14 02:22:27.764 197 DEBUG tempest.lib.common.rest_client [req-cb2304b9-0c39-446f-b125-53b3133554cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb2304b9-0c39-446f-b125-53b3133554cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:27.809 197 INFO tempest.lib.common.rest_client [req-10a381b9-236a-4c48-a44d-5784fb38165f ] Request (MiscPolicyActionsRbacTest:test_show_server_diagnostics): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:22:27.813 197 DEBUG tempest.lib.common.rest_client [req-10a381b9-236a-4c48-a44d-5784fb38165f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10a381b9-236a-4c48-a44d-5784fb38165f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["pIdkEkbtTw-69CJaILvEAg"], "expires_at": "2020-12-14T03:22:27.000000Z", "issued_at": "2020-12-14T02:22:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:28.156 197 INFO tempest.lib.common.rest_client [req-3a8cdf47-ff0c-40ff-b6a4-d34359684214 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.288s 2020-12-14 02:22:28.159 197 DEBUG tempest.lib.common.rest_client [req-3a8cdf47-ff0c-40ff-b6a4-d34359684214 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3a8cdf47-ff0c-40ff-b6a4-d34359684214', 'x-compute-request-id': 'req-3a8cdf47-ff0c-40ff-b6a4-d34359684214', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:25Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:28.266 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:28.270 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.273 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.277 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.280 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.284 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.287 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.292 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.295 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.298 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.300 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.303 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.306 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.309 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.312 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.315 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.318 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.321 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.324 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.326 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.329 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.332 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.335 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.337 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.340 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.343 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.345 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.348 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.350 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.352 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.354 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.356 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.358 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.360 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.362 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.364 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.366 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.368 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.370 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.372 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.374 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.376 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.378 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.380 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.383 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.386 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.388 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.390 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.392 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.394 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.396 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.398 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.400 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.402 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.404 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.406 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.408 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.413 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.415 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.417 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.419 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.421 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.423 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.425 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.427 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.429 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.431 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.433 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.435 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.437 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.439 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.441 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:28.449 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-simple-tenant-usage:show, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:28.451 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:28.513 197 INFO tempest.lib.common.rest_client [req-c956282e-b73a-4f4c-8077-27c98199576b ] Request (MiscPolicyActionsRbacTest:test_show_simple_tenant_usage): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.058s 2020-12-14 02:22:28.515 197 DEBUG tempest.lib.common.rest_client [req-c956282e-b73a-4f4c-8077-27c98199576b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c956282e-b73a-4f4c-8077-27c98199576b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:28.564 197 INFO tempest.lib.common.rest_client [req-a58aa090-f270-48f5-abd8-1136f24db4ca ] Request (MiscPolicyActionsRbacTest:test_show_simple_tenant_usage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:22:28.568 197 DEBUG tempest.lib.common.rest_client [req-a58aa090-f270-48f5-abd8-1136f24db4ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a58aa090-f270-48f5-abd8-1136f24db4ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["LbPeKVL0Q1iH3kCTmJvfQg"], "expires_at": "2020-12-14T03:22:28.000000Z", "issued_at": "2020-12-14T02:22:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:28.685 197 INFO tempest.lib.common.rest_client [req-8f551d47-0dcb-4467-a155-6612043ac791 ] Request (MiscPolicyActionsRbacTest:test_show_simple_tenant_usage): 200 GET http://172.30.13.94/compute/v2.1/os-simple-tenant-usage/a836f1fb2f90434abc04b768f968fb5b 0.109s 2020-12-14 02:22:28.688 197 DEBUG tempest.lib.common.rest_client [req-8f551d47-0dcb-4467-a155-6612043ac791 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '758', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8f551d47-0dcb-4467-a155-6612043ac791', 'x-compute-request-id': 'req-8f551d47-0dcb-4467-a155-6612043ac791', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-simple-tenant-usage/a836f1fb2f90434abc04b768f968fb5b'} Body: b'{"tenant_usage": {"tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "server_usages": [{"hours": 3.0555555555555555e-09, "flavor": "patrole_reader-flavor_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "instance_id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "memory_mb": 512, "local_gb": 1, "vcpus": 1, "started_at": "2020-12-14T02:22:11.000000", "ended_at": null, "state": "active", "uptime": 17}], "total_local_gb_usage": 3.0555555555555555e-09, "total_vcpus_usage": 3.0555555555555555e-09, "total_memory_mb_usage": 1.5644444444444444e-06, "total_hours": 3.0555555555555555e-09, "start": "2020-12-14T02:22:28.648908", "stop": "2020-12-14T02:22:28.648919"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:28.732 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:28.798 197 INFO tempest.lib.common.rest_client [req-6898222f-0b68-419e-8210-28b30ad45a03 ] Request (MiscPolicyActionsRbacTest:test_show_simple_tenant_usage): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.060s 2020-12-14 02:22:28.801 197 DEBUG tempest.lib.common.rest_client [req-6898222f-0b68-419e-8210-28b30ad45a03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6898222f-0b68-419e-8210-28b30ad45a03', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:28.852 197 INFO tempest.lib.common.rest_client [req-ad02f2d9-5891-48ef-9ae4-536a0a5d4ec7 ] Request (MiscPolicyActionsRbacTest:test_show_simple_tenant_usage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:22:28.856 197 DEBUG tempest.lib.common.rest_client [req-ad02f2d9-5891-48ef-9ae4-536a0a5d4ec7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad02f2d9-5891-48ef-9ae4-536a0a5d4ec7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["t30zrIPRThSg3xQ-2emqtg"], "expires_at": "2020-12-14T03:22:28.000000Z", "issued_at": "2020-12-14T02:22:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:29.038 189 INFO tempest.lib.common.rest_client [req-696f0ca6-a8e6-4658-af94-031646874793 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.229s 2020-12-14 02:22:29.040 189 DEBUG tempest.lib.common.rest_client [req-696f0ca6-a8e6-4658-af94-031646874793 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-696f0ca6-a8e6-4658-af94-031646874793', 'x-compute-request-id': 'req-696f0ca6-a8e6-4658-af94-031646874793', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "2e43b604-0e21-41cb-bdc1-fc1303cc9bbd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/2e43b604-0e21-41cb-bdc1-fc1303cc9bbd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:25Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:29.167 197 INFO tempest.lib.common.rest_client [req-2d752ca8-6b2f-4617-84bf-8b1fe7195b12 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.275s 2020-12-14 02:22:29.170 197 DEBUG tempest.lib.common.rest_client [req-2d752ca8-6b2f-4617-84bf-8b1fe7195b12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2d752ca8-6b2f-4617-84bf-8b1fe7195b12', 'x-compute-request-id': 'req-2d752ca8-6b2f-4617-84bf-8b1fe7195b12', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:25Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:29.273 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:29.277 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.281 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.284 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.287 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.291 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.295 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.299 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.302 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.305 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.307 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.310 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.313 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.316 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.319 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.322 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.325 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.328 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.330 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.333 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.336 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.338 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.341 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.344 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.346 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.349 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.352 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.354 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.357 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.359 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.362 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.365 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.367 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.370 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.373 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.375 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.378 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.381 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.383 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.386 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.389 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.392 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.395 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.397 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.401 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.404 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.406 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.409 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.411 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.414 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.417 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.419 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.422 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.425 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.427 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.431 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.434 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.439 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.442 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.444 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.448 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.450 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.453 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.456 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.458 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.461 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.463 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.466 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.468 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.470 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.472 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.474 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:29.483 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-suspend-server:suspend, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:29.484 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:29.546 197 INFO tempest.lib.common.rest_client [req-0f01980e-f9de-44de-a790-94380cbf61af ] Request (MiscPolicyActionsRbacTest:test_suspend_server): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.057s 2020-12-14 02:22:29.548 197 DEBUG tempest.lib.common.rest_client [req-0f01980e-f9de-44de-a790-94380cbf61af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f01980e-f9de-44de-a790-94380cbf61af', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:29.593 197 INFO tempest.lib.common.rest_client [req-bb6f7a64-11fe-4b65-afa5-135f756835fa ] Request (MiscPolicyActionsRbacTest:test_suspend_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:22:29.596 197 DEBUG tempest.lib.common.rest_client [req-bb6f7a64-11fe-4b65-afa5-135f756835fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb6f7a64-11fe-4b65-afa5-135f756835fa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["MbKXAYlwSDC_c7wvPW5EwQ"], "expires_at": "2020-12-14T03:22:29.000000Z", "issued_at": "2020-12-14T02:22:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:29.861 197 INFO tempest.lib.common.rest_client [req-3c2ad37d-4c54-4b26-9eb4-277b5fec3453 ] Request (MiscPolicyActionsRbacTest:test_suspend_server): 202 POST http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action 0.258s 2020-12-14 02:22:29.865 197 DEBUG tempest.lib.common.rest_client [req-3c2ad37d-4c54-4b26-9eb4-277b5fec3453 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"suspend": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3c2ad37d-4c54-4b26-9eb4-277b5fec3453', 'x-compute-request-id': 'req-3c2ad37d-4c54-4b26-9eb4-277b5fec3453', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:29.866 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:29.931 197 INFO tempest.lib.common.rest_client [req-d90e3adc-0a3b-4ae8-abe5-0683f735e80e ] Request (MiscPolicyActionsRbacTest:test_suspend_server): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.059s 2020-12-14 02:22:29.934 197 DEBUG tempest.lib.common.rest_client [req-d90e3adc-0a3b-4ae8-abe5-0683f735e80e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d90e3adc-0a3b-4ae8-abe5-0683f735e80e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:29.988 197 INFO tempest.lib.common.rest_client [req-0978bc3b-f350-43aa-8cf2-be2f029a8470 ] Request (MiscPolicyActionsRbacTest:test_suspend_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:22:29.992 197 DEBUG tempest.lib.common.rest_client [req-0978bc3b-f350-43aa-8cf2-be2f029a8470 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0978bc3b-f350-43aa-8cf2-be2f029a8470', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["MRlclXSjQYSXsOg1G-3d_A"], "expires_at": "2020-12-14T03:22:29.000000Z", "issued_at": "2020-12-14T02:22:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:30.303 197 INFO tempest.lib.common.rest_client [req-44bc260b-ab3e-45c7-8340-83c842a81568 ] Request (MiscPolicyActionsRbacTest:test_suspend_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.303s 2020-12-14 02:22:30.306 197 DEBUG tempest.lib.common.rest_client [req-44bc260b-ab3e-45c7-8340-83c842a81568 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1734', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-44bc260b-ab3e-45c7-8340-83c842a81568', 'x-compute-request-id': 'req-44bc260b-ab3e-45c7-8340-83c842a81568', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:30Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "suspending", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:30.385 189 INFO tempest.lib.common.rest_client [req-3c2d6972-a8a9-4722-9d24-dac3b517a7c8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.238s 2020-12-14 02:22:30.389 189 DEBUG tempest.lib.common.rest_client [req-3c2d6972-a8a9-4722-9d24-dac3b517a7c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3c2d6972-a8a9-4722-9d24-dac3b517a7c8', 'x-compute-request-id': 'req-3c2d6972-a8a9-4722-9d24-dac3b517a7c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "2e43b604-0e21-41cb-bdc1-fc1303cc9bbd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/2e43b604-0e21-41cb-bdc1-fc1303cc9bbd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:25Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:31.718 197 INFO tempest.lib.common.rest_client [req-0b3b5380-899e-4747-a18e-8a97dbb7b9a4 ] Request (MiscPolicyActionsRbacTest:test_suspend_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.299s 2020-12-14 02:22:31.722 197 DEBUG tempest.lib.common.rest_client [req-0b3b5380-899e-4747-a18e-8a97dbb7b9a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1717', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0b3b5380-899e-4747-a18e-8a97dbb7b9a4', 'x-compute-request-id': 'req-0b3b5380-899e-4747-a18e-8a97dbb7b9a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "SUSPENDED", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:31Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:31.768 189 INFO tempest.lib.common.rest_client [req-862bf086-fefd-4de0-9fa2-09c61302adf5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.273s 2020-12-14 02:22:31.771 189 DEBUG tempest.lib.common.rest_client [req-862bf086-fefd-4de0-9fa2-09c61302adf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-862bf086-fefd-4de0-9fa2-09c61302adf5', 'x-compute-request-id': 'req-862bf086-fefd-4de0-9fa2-09c61302adf5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "2e43b604-0e21-41cb-bdc1-fc1303cc9bbd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/2e43b604-0e21-41cb-bdc1-fc1303cc9bbd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:25Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:31.827 197 INFO tempest.common.waiters [-] State transition "ACTIVE/suspending" ==> "SUSPENDED/None" after 1 second wait 2020-12-14 02:22:32.008 197 INFO tempest.lib.common.rest_client [req-d1e5b35d-c37a-4ce4-bbee-37d70f5680c9 ] Request (MiscPolicyActionsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action 0.172s 2020-12-14 02:22:32.011 197 DEBUG tempest.lib.common.rest_client [req-d1e5b35d-c37a-4ce4-bbee-37d70f5680c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"resume": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d1e5b35d-c37a-4ce4-bbee-37d70f5680c9', 'x-compute-request-id': 'req-d1e5b35d-c37a-4ce4-bbee-37d70f5680c9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:32.280 197 INFO tempest.lib.common.rest_client [req-74e34fe7-e2fc-4821-b9a9-570aa1c81187 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.233s 2020-12-14 02:22:32.284 197 DEBUG tempest.lib.common.rest_client [req-74e34fe7-e2fc-4821-b9a9-570aa1c81187 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-74e34fe7-e2fc-4821-b9a9-570aa1c81187', 'x-compute-request-id': 'req-74e34fe7-e2fc-4821-b9a9-570aa1c81187', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "SUSPENDED", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:32Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resuming", "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:33.127 189 INFO tempest.lib.common.rest_client [req-e546fb16-a3fb-4b9c-9563-4a16d2441d2d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.249s 2020-12-14 02:22:33.131 189 DEBUG tempest.lib.common.rest_client [req-e546fb16-a3fb-4b9c-9563-4a16d2441d2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e546fb16-a3fb-4b9c-9563-4a16d2441d2d', 'x-compute-request-id': 'req-e546fb16-a3fb-4b9c-9563-4a16d2441d2d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "2e43b604-0e21-41cb-bdc1-fc1303cc9bbd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/2e43b604-0e21-41cb-bdc1-fc1303cc9bbd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:25Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:33.620 197 INFO tempest.lib.common.rest_client [req-681a8c7c-3ea9-4235-9853-59c7210e41a2 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.223s 2020-12-14 02:22:33.623 197 DEBUG tempest.lib.common.rest_client [req-681a8c7c-3ea9-4235-9853-59c7210e41a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-681a8c7c-3ea9-4235-9853-59c7210e41a2', 'x-compute-request-id': 'req-681a8c7c-3ea9-4235-9853-59c7210e41a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "SUSPENDED", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:32Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resuming", "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:34.475 189 INFO tempest.lib.common.rest_client [req-53ee6638-9dfe-4519-9b0c-cc6c1f71f3ab ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.233s 2020-12-14 02:22:34.479 189 DEBUG tempest.lib.common.rest_client [req-53ee6638-9dfe-4519-9b0c-cc6c1f71f3ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-53ee6638-9dfe-4519-9b0c-cc6c1f71f3ab', 'x-compute-request-id': 'req-53ee6638-9dfe-4519-9b0c-cc6c1f71f3ab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "2e43b604-0e21-41cb-bdc1-fc1303cc9bbd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/2e43b604-0e21-41cb-bdc1-fc1303cc9bbd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:25Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:34.954 197 INFO tempest.lib.common.rest_client [req-1a9ac8f0-294a-4382-8b82-c3b5cb445a7b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.219s 2020-12-14 02:22:34.958 197 DEBUG tempest.lib.common.rest_client [req-1a9ac8f0-294a-4382-8b82-c3b5cb445a7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1723', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1a9ac8f0-294a-4382-8b82-c3b5cb445a7b', 'x-compute-request-id': 'req-1a9ac8f0-294a-4382-8b82-c3b5cb445a7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "SUSPENDED", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:32Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "resuming", "OS-EXT-STS:vm_state": "suspended", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:35.805 189 INFO tempest.lib.common.rest_client [req-5639c8a5-9e4e-4089-8b88-ebcb65ebcab5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.217s 2020-12-14 02:22:35.808 189 DEBUG tempest.lib.common.rest_client [req-5639c8a5-9e4e-4089-8b88-ebcb65ebcab5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5639c8a5-9e4e-4089-8b88-ebcb65ebcab5', 'x-compute-request-id': 'req-5639c8a5-9e4e-4089-8b88-ebcb65ebcab5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "2e43b604-0e21-41cb-bdc1-fc1303cc9bbd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/2e43b604-0e21-41cb-bdc1-fc1303cc9bbd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:25Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:36.323 197 INFO tempest.lib.common.rest_client [req-2053835a-9622-4b2f-acc1-09f1bf91c23e ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.216s 2020-12-14 02:22:36.327 197 DEBUG tempest.lib.common.rest_client [req-2053835a-9622-4b2f-acc1-09f1bf91c23e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2053835a-9622-4b2f-acc1-09f1bf91c23e', 'x-compute-request-id': 'req-2053835a-9622-4b2f-acc1-09f1bf91c23e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:35Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:36.429 197 INFO tempest.common.waiters [-] State transition "SUSPENDED/resuming" ==> "ACTIVE/None" after 4 second wait 2020-12-14 02:22:36.432 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:36.436 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.439 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.442 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.445 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.449 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.453 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.458 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.460 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.463 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.466 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.468 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.471 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.474 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.477 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.480 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.483 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.486 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.488 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.490 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.492 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.494 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.496 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.498 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.500 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.502 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.504 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.506 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.508 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.510 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.512 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.515 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.516 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.519 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.521 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.523 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.525 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.527 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.529 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.531 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.534 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.536 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.538 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.540 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.543 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.545 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.547 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.549 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.551 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.552 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.555 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.557 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.559 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.561 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.563 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.566 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.568 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.572 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.574 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.576 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.579 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.581 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.583 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.585 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.588 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.590 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.592 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.594 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.596 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.598 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.600 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.602 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:36.611 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-lock-server:unlock, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:36.793 197 INFO tempest.lib.common.rest_client [req-83636a8a-eae1-46cb-9b93-e4e4a4e233be ] Request (MiscPolicyActionsRbacTest:test_unlock_server): 202 POST http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action 0.175s 2020-12-14 02:22:36.795 197 DEBUG tempest.lib.common.rest_client [req-83636a8a-eae1-46cb-9b93-e4e4a4e233be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"lock": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-83636a8a-eae1-46cb-9b93-e4e4a4e233be', 'x-compute-request-id': 'req-83636a8a-eae1-46cb-9b93-e4e4a4e233be', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:36.797 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:36.865 197 INFO tempest.lib.common.rest_client [req-92f497da-f609-45d8-acab-74912a85b9f4 ] Request (MiscPolicyActionsRbacTest:test_unlock_server): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.063s 2020-12-14 02:22:36.868 197 DEBUG tempest.lib.common.rest_client [req-92f497da-f609-45d8-acab-74912a85b9f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92f497da-f609-45d8-acab-74912a85b9f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:36.918 197 INFO tempest.lib.common.rest_client [req-27406388-5152-4496-a546-1644fa3c5403 ] Request (MiscPolicyActionsRbacTest:test_unlock_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:22:36.920 197 DEBUG tempest.lib.common.rest_client [req-27406388-5152-4496-a546-1644fa3c5403 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27406388-5152-4496-a546-1644fa3c5403', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["VPF3714KSwO_agRWDF3cpg"], "expires_at": "2020-12-14T03:22:36.000000Z", "issued_at": "2020-12-14T02:22:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:37.176 197 INFO tempest.lib.common.rest_client [req-1ddc2a29-4ed2-44fa-9566-fefb83d3966f ] Request (MiscPolicyActionsRbacTest:test_unlock_server): 202 POST http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action 0.249s 2020-12-14 02:22:37.179 197 DEBUG tempest.lib.common.rest_client [req-1ddc2a29-4ed2-44fa-9566-fefb83d3966f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unlock": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1ddc2a29-4ed2-44fa-9566-fefb83d3966f', 'x-compute-request-id': 'req-1ddc2a29-4ed2-44fa-9566-fefb83d3966f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:37.181 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:37.181 189 INFO tempest.lib.common.rest_client [req-c9e8a57c-2cc9-4d2a-9f11-cad13528bda3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.265s 2020-12-14 02:22:37.185 189 DEBUG tempest.lib.common.rest_client [req-c9e8a57c-2cc9-4d2a-9f11-cad13528bda3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c9e8a57c-2cc9-4d2a-9f11-cad13528bda3', 'x-compute-request-id': 'req-c9e8a57c-2cc9-4d2a-9f11-cad13528bda3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "2e43b604-0e21-41cb-bdc1-fc1303cc9bbd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/2e43b604-0e21-41cb-bdc1-fc1303cc9bbd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:25Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:21:59.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:37.253 197 INFO tempest.lib.common.rest_client [req-a113dfc0-f3a7-4fe3-9d55-b9da40c51ab4 ] Request (MiscPolicyActionsRbacTest:test_unlock_server): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.068s 2020-12-14 02:22:37.256 197 DEBUG tempest.lib.common.rest_client [req-a113dfc0-f3a7-4fe3-9d55-b9da40c51ab4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a113dfc0-f3a7-4fe3-9d55-b9da40c51ab4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:37.305 197 INFO tempest.lib.common.rest_client [req-0211c530-0f75-4931-affc-938f3a5e5b1d ] Request (MiscPolicyActionsRbacTest:test_unlock_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:22:37.308 197 DEBUG tempest.lib.common.rest_client [req-0211c530-0f75-4931-affc-938f3a5e5b1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0211c530-0f75-4931-affc-938f3a5e5b1d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["QEY8XB3iR4m18yXFckV8lA"], "expires_at": "2020-12-14T03:22:37.000000Z", "issued_at": "2020-12-14T02:22:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:37.569 197 INFO tempest.lib.common.rest_client [req-7c575848-d93a-40e2-8a74-c00cb9293f33 ] Request (MiscPolicyActionsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action 0.253s 2020-12-14 02:22:37.571 197 DEBUG tempest.lib.common.rest_client [req-7c575848-d93a-40e2-8a74-c00cb9293f33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unlock": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7c575848-d93a-40e2-8a74-c00cb9293f33', 'x-compute-request-id': 'req-7c575848-d93a-40e2-8a74-c00cb9293f33', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:37.811 197 INFO tempest.lib.common.rest_client [req-e2a5b50f-c5b9-4750-a807-d037e415815b ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.200s 2020-12-14 02:22:37.814 197 DEBUG tempest.lib.common.rest_client [req-e2a5b50f-c5b9-4750-a807-d037e415815b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e2a5b50f-c5b9-4750-a807-d037e415815b', 'x-compute-request-id': 'req-e2a5b50f-c5b9-4750-a807-d037e415815b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:38Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:37.918 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:37.923 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.927 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.930 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.933 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.937 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.941 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.946 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.949 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.952 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.954 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.957 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.960 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.963 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.965 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.969 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.972 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.975 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.978 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.981 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.983 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.986 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.989 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.992 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.994 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:37.997 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.000 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.003 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.005 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.008 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.011 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.014 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.017 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.019 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.022 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.025 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.028 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.030 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.033 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.036 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.040 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.043 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.046 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.048 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.052 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.055 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.057 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.060 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.063 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.066 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.068 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.071 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.074 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.077 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.079 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.083 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.085 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.090 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.092 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.094 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.097 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.099 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.101 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.103 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.106 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.108 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.110 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.112 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.115 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.117 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.119 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.121 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.131 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-lock-server:unlock, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:38.133 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:38.137 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.141 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.145 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.149 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.152 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.156 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.160 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.162 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.164 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.167 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.169 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.171 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.173 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.176 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.178 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.181 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.183 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.185 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.187 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.189 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.191 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.193 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.195 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.197 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.199 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.201 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.203 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.205 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.207 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.209 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.211 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.214 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.216 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.218 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.220 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.222 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.224 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.226 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.229 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.232 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.234 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.236 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.238 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.241 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.243 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.245 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.247 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.250 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.252 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.254 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.256 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.258 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.260 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.263 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.266 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.267 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.272 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.274 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.276 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.279 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.281 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.283 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.285 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.288 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.290 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.292 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.295 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.297 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.299 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.301 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.303 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.310 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-lock-server:unlock:unlock_override, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:38.509 189 INFO tempest.lib.common.rest_client [req-a179b726-4dd8-4f67-915f-257bed1daab3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.218s 2020-12-14 02:22:38.513 189 DEBUG tempest.lib.common.rest_client [req-a179b726-4dd8-4f67-915f-257bed1daab3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a179b726-4dd8-4f67-915f-257bed1daab3', 'x-compute-request-id': 'req-a179b726-4dd8-4f67-915f-257bed1daab3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:38Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:38.611 189 INFO tempest.common.waiters [-] State transition "SHELVED_OFFLOADED/spawning" ==> "ACTIVE/None" after 15 second wait 2020-12-14 02:22:38.613 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:38.618 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.621 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.624 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.627 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.631 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.633 197 INFO tempest.lib.common.rest_client [req-13487abb-63b3-4125-8ed2-0721ae389d3b ] Request (MiscPolicyActionsRbacTest:test_unlock_server_override): 202 POST http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action 0.317s 2020-12-14 02:22:38.635 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.637 197 DEBUG tempest.lib.common.rest_client [req-13487abb-63b3-4125-8ed2-0721ae389d3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"lock": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-13487abb-63b3-4125-8ed2-0721ae389d3b', 'x-compute-request-id': 'req-13487abb-63b3-4125-8ed2-0721ae389d3b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:38.639 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:38.639 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.642 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.645 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.647 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.650 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.653 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.655 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.658 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.661 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.664 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.667 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.669 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.672 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.675 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.678 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.680 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.683 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.685 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.688 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.691 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.693 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.696 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.697 197 INFO tempest.lib.common.rest_client [req-cda2f5e4-6b9e-4424-89d2-d9532bd753a7 ] Request (MiscPolicyActionsRbacTest:test_unlock_server_override): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.052s 2020-12-14 02:22:38.699 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.700 197 DEBUG tempest.lib.common.rest_client [req-cda2f5e4-6b9e-4424-89d2-d9532bd753a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cda2f5e4-6b9e-4424-89d2-d9532bd753a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:38.701 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.704 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.706 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.709 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.712 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.714 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.717 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.720 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.722 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.725 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.728 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.731 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.734 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.736 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.739 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.742 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.745 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.746 197 INFO tempest.lib.common.rest_client [req-d7a8b3c2-2ab5-4ad0-9086-dccae8e93e99 ] Request (MiscPolicyActionsRbacTest:test_unlock_server_override): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:22:38.747 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.749 197 DEBUG tempest.lib.common.rest_client [req-d7a8b3c2-2ab5-4ad0-9086-dccae8e93e99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d7a8b3c2-2ab5-4ad0-9086-dccae8e93e99', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["01LZjhl7RfqtFhJbRZhqaQ"], "expires_at": "2020-12-14T03:22:38.000000Z", "issued_at": "2020-12-14T02:22:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:38.750 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.752 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.755 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.758 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.760 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.763 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.765 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.769 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.772 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.777 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.780 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.782 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.786 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.788 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.791 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.793 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.795 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.797 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.799 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.801 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.803 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.805 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.807 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.809 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:38.818 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:show, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:38.820 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:38.894 189 INFO tempest.lib.common.rest_client [req-5e0d386f-962f-4706-8931-e5cb393d3ade ] Request (ServerActionsRbacTest:test_show_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.069s 2020-12-14 02:22:38.897 189 DEBUG tempest.lib.common.rest_client [req-5e0d386f-962f-4706-8931-e5cb393d3ade ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e0d386f-962f-4706-8931-e5cb393d3ade', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:38.945 189 INFO tempest.lib.common.rest_client [req-018c01fa-0984-49a2-b747-bfd7cde74685 ] Request (ServerActionsRbacTest:test_show_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:22:38.947 189 DEBUG tempest.lib.common.rest_client [req-018c01fa-0984-49a2-b747-bfd7cde74685 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-018c01fa-0984-49a2-b747-bfd7cde74685', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["lqWjHU0LQzOaP3-w5_henw"], "expires_at": "2020-12-14T03:22:38.000000Z", "issued_at": "2020-12-14T02:22:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:39.131 197 INFO tempest.lib.common.rest_client [req-02323873-3e1e-42dc-970b-332d11ca6e34 ] Request (MiscPolicyActionsRbacTest:test_unlock_server_override): 202 POST http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action 0.377s 2020-12-14 02:22:39.135 197 DEBUG tempest.lib.common.rest_client [req-02323873-3e1e-42dc-970b-332d11ca6e34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unlock": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-02323873-3e1e-42dc-970b-332d11ca6e34', 'x-compute-request-id': 'req-02323873-3e1e-42dc-970b-332d11ca6e34', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:39.138 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:39.198 197 INFO tempest.lib.common.rest_client [req-808d7468-0216-4268-95f7-b555769dc642 ] Request (MiscPolicyActionsRbacTest:test_unlock_server_override): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.054s 2020-12-14 02:22:39.200 197 DEBUG tempest.lib.common.rest_client [req-808d7468-0216-4268-95f7-b555769dc642 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-808d7468-0216-4268-95f7-b555769dc642', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:39.230 189 INFO tempest.lib.common.rest_client [req-246333dd-2d95-41c8-a5a4-5c050058f0c7 ] Request (ServerActionsRbacTest:test_show_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.276s 2020-12-14 02:22:39.233 189 DEBUG tempest.lib.common.rest_client [req-246333dd-2d95-41c8-a5a4-5c050058f0c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-246333dd-2d95-41c8-a5a4-5c050058f0c7', 'x-compute-request-id': 'req-246333dd-2d95-41c8-a5a4-5c050058f0c7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:38Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:39.253 197 INFO tempest.lib.common.rest_client [req-76f535ef-b10c-4702-a467-ee34b87c54b0 ] Request (MiscPolicyActionsRbacTest:test_unlock_server_override): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:22:39.257 197 DEBUG tempest.lib.common.rest_client [req-76f535ef-b10c-4702-a467-ee34b87c54b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76f535ef-b10c-4702-a467-ee34b87c54b0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["chM7hfR4QD2i8VFKpFbhgw"], "expires_at": "2020-12-14T03:22:39.000000Z", "issued_at": "2020-12-14T02:22:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:39.314 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:39.381 189 INFO tempest.lib.common.rest_client [req-33911cb5-c46e-42cd-af42-82c32fbc3396 ] Request (ServerActionsRbacTest:test_show_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.061s 2020-12-14 02:22:39.383 189 DEBUG tempest.lib.common.rest_client [req-33911cb5-c46e-42cd-af42-82c32fbc3396 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33911cb5-c46e-42cd-af42-82c32fbc3396', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:39.438 189 INFO tempest.lib.common.rest_client [req-dc0cf010-fe4a-47f9-95e3-945146f5a6cc ] Request (ServerActionsRbacTest:test_show_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:22:39.442 189 DEBUG tempest.lib.common.rest_client [req-dc0cf010-fe4a-47f9-95e3-945146f5a6cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc0cf010-fe4a-47f9-95e3-945146f5a6cc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["C55MvE-nTZWkmE2JNKT75g"], "expires_at": "2020-12-14T03:22:39.000000Z", "issued_at": "2020-12-14T02:22:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:39.519 197 INFO tempest.lib.common.rest_client [req-0e6eef90-a3e1-4a6f-b97b-a7628bcd3085 ] Request (MiscPolicyActionsRbacTest:_run_cleanups): 202 POST http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action 0.253s 2020-12-14 02:22:39.522 197 DEBUG tempest.lib.common.rest_client [req-0e6eef90-a3e1-4a6f-b97b-a7628bcd3085 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unlock": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0e6eef90-a3e1-4a6f-b97b-a7628bcd3085', 'x-compute-request-id': 'req-0e6eef90-a3e1-4a6f-b97b-a7628bcd3085', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:39.891 189 INFO tempest.lib.common.rest_client [req-ac7660aa-bc44-45d2-839e-30712349f71e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.393s 2020-12-14 02:22:39.894 197 INFO tempest.lib.common.rest_client [req-48921ca8-bfa3-49c4-9329-9b6c342a7779 ] Request (MiscPolicyActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.278s 2020-12-14 02:22:39.895 189 DEBUG tempest.lib.common.rest_client [req-ac7660aa-bc44-45d2-839e-30712349f71e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ac7660aa-bc44-45d2-839e-30712349f71e', 'x-compute-request-id': 'req-ac7660aa-bc44-45d2-839e-30712349f71e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:38Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:39.897 197 DEBUG tempest.lib.common.rest_client [req-48921ca8-bfa3-49c4-9329-9b6c342a7779 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-48921ca8-bfa3-49c4-9329-9b6c342a7779', 'x-compute-request-id': 'req-48921ca8-bfa3-49c4-9329-9b6c342a7779', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:39Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:39.983 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:39.987 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:39.989 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:39.992 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:39.994 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:39.997 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.000 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.004 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.006 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.006 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:40.008 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.010 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.010 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.012 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.013 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.014 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.016 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.017 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.019 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.020 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.021 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.023 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.024 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.025 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.027 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.027 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.029 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.031 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.032 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.033 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.035 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.035 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.038 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.038 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.040 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.040 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.042 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.043 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.044 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.046 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.046 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.048 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.049 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.050 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.052 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.052 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.054 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.055 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.056 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.058 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.058 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.060 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.061 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.062 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.063 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.064 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.066 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.067 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.069 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.069 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.071 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.072 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.074 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.074 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.076 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.077 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.078 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.080 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.080 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.082 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.083 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.084 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.087 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.086 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.088 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.090 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.090 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.092 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.093 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.094 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.096 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.096 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.098 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.098 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.100 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.101 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.102 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.104 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.105 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.107 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.107 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.109 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.111 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.112 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.113 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.115 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.115 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.118 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.118 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.120 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.120 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.123 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.125 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.125 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.127 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.128 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.129 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.131 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.131 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.133 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.134 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.135 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.137 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.136 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.139 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.140 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.141 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.143 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.145 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.148 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.149 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:start, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:40.151 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.154 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.156 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.159 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.162 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.164 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.167 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.171 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.173 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.179 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.182 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.184 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.188 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.190 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.193 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.196 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.199 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.201 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.204 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.207 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.210 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.212 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.215 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.218 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:40.229 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-rescue, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:40.314 189 INFO tempest.lib.common.rest_client [req-ecb49b8c-309f-42fe-8b1f-648de665fe6e ] Request (ServerActionsRbacTest:test_start_server): 202 POST http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1/action 0.162s 2020-12-14 02:22:40.316 189 DEBUG tempest.lib.common.rest_client [req-ecb49b8c-309f-42fe-8b1f-648de665fe6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-stop": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ecb49b8c-309f-42fe-8b1f-648de665fe6e', 'x-compute-request-id': 'req-ecb49b8c-309f-42fe-8b1f-648de665fe6e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:40.442 197 INFO tempest.lib.common.rest_client [req-e386b539-3b4b-4246-8468-0495a82d6867 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 POST http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action 0.207s 2020-12-14 02:22:40.445 197 DEBUG tempest.lib.common.rest_client [req-e386b539-3b4b-4246-8468-0495a82d6867 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"rescue": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '29', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e386b539-3b4b-4246-8468-0495a82d6867', 'x-compute-request-id': 'req-e386b539-3b4b-4246-8468-0495a82d6867', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action'} Body: b'{"adminPass": "FcwbBk3H5BeL"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:40.531 189 INFO tempest.lib.common.rest_client [req-d1f9cbc8-3ddd-445f-8d85-7803f37a6ddf ] Request (ServerActionsRbacTest:test_start_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.209s 2020-12-14 02:22:40.535 189 DEBUG tempest.lib.common.rest_client [req-d1f9cbc8-3ddd-445f-8d85-7803f37a6ddf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1728', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d1f9cbc8-3ddd-445f-8d85-7803f37a6ddf', 'x-compute-request-id': 'req-d1f9cbc8-3ddd-445f-8d85-7803f37a6ddf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:40Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "powering-off", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:40.678 197 INFO tempest.lib.common.rest_client [req-b1fc83b5-e345-4833-982e-f7548ea07351 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.216s 2020-12-14 02:22:40.682 197 DEBUG tempest.lib.common.rest_client [req-b1fc83b5-e345-4833-982e-f7548ea07351 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b1fc83b5-e345-4833-982e-f7548ea07351', 'x-compute-request-id': 'req-b1fc83b5-e345-4833-982e-f7548ea07351', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:40Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "rescuing", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:41.862 189 INFO tempest.lib.common.rest_client [req-990b875c-7072-4835-927a-82036e830ac7 ] Request (ServerActionsRbacTest:test_start_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.248s 2020-12-14 02:22:41.865 189 DEBUG tempest.lib.common.rest_client [req-990b875c-7072-4835-927a-82036e830ac7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-990b875c-7072-4835-927a-82036e830ac7', 'x-compute-request-id': 'req-990b875c-7072-4835-927a-82036e830ac7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:41Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:41.965 189 INFO tempest.common.waiters [-] State transition "ACTIVE/powering-off" ==> "SHUTOFF/None" after 1 second wait 2020-12-14 02:22:41.967 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:42.042 189 INFO tempest.lib.common.rest_client [req-0ffbad5d-aa05-43fa-9ed2-e07e0c689b78 ] Request (ServerActionsRbacTest:test_start_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.068s 2020-12-14 02:22:42.045 189 DEBUG tempest.lib.common.rest_client [req-0ffbad5d-aa05-43fa-9ed2-e07e0c689b78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ffbad5d-aa05-43fa-9ed2-e07e0c689b78', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:42.096 197 INFO tempest.lib.common.rest_client [req-f9aab40b-e11c-4c28-a618-9cd05f00734d ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.304s 2020-12-14 02:22:42.099 197 DEBUG tempest.lib.common.rest_client [req-f9aab40b-e11c-4c28-a618-9cd05f00734d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f9aab40b-e11c-4c28-a618-9cd05f00734d', 'x-compute-request-id': 'req-f9aab40b-e11c-4c28-a618-9cd05f00734d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:40Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "rescuing", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:42.102 189 INFO tempest.lib.common.rest_client [req-0f4f81bf-0826-4328-856f-0080d3b14c15 ] Request (ServerActionsRbacTest:test_start_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:22:42.105 189 DEBUG tempest.lib.common.rest_client [req-0f4f81bf-0826-4328-856f-0080d3b14c15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f4f81bf-0826-4328-856f-0080d3b14c15', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["7rrQFvSgRAS5lg_5tVgJng"], "expires_at": "2020-12-14T03:22:42.000000Z", "issued_at": "2020-12-14T02:22:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:42.362 189 INFO tempest.lib.common.rest_client [req-668dd421-968f-437a-a393-449f7c155377 ] Request (ServerActionsRbacTest:test_start_server): 202 POST http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1/action 0.250s 2020-12-14 02:22:42.364 189 DEBUG tempest.lib.common.rest_client [req-668dd421-968f-437a-a393-449f7c155377 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-start": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-668dd421-968f-437a-a393-449f7c155377', 'x-compute-request-id': 'req-668dd421-968f-437a-a393-449f7c155377', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:42.366 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:42.437 189 INFO tempest.lib.common.rest_client [req-c7a478ed-9e14-4989-a594-3cb879c030fa ] Request (ServerActionsRbacTest:test_start_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.066s 2020-12-14 02:22:42.439 189 DEBUG tempest.lib.common.rest_client [req-c7a478ed-9e14-4989-a594-3cb879c030fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7a478ed-9e14-4989-a594-3cb879c030fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:42.494 189 INFO tempest.lib.common.rest_client [req-61d7a6f5-32fc-4d5e-897d-a36e19901808 ] Request (ServerActionsRbacTest:test_start_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:22:42.497 189 DEBUG tempest.lib.common.rest_client [req-61d7a6f5-32fc-4d5e-897d-a36e19901808 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61d7a6f5-32fc-4d5e-897d-a36e19901808', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["n7EfcQRdRVC2vkTHYNN-2Q"], "expires_at": "2020-12-14T03:22:42.000000Z", "issued_at": "2020-12-14T02:22:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:42.878 189 INFO tempest.lib.common.rest_client [req-ed1aa493-c52a-4fb0-826c-c1093ca224a9 ] Request (ServerActionsRbacTest:test_start_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.372s 2020-12-14 02:22:42.882 189 DEBUG tempest.lib.common.rest_client [req-ed1aa493-c52a-4fb0-826c-c1093ca224a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1714', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ed1aa493-c52a-4fb0-826c-c1093ca224a9', 'x-compute-request-id': 'req-ed1aa493-c52a-4fb0-826c-c1093ca224a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:42Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "powering-on", "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:43.458 197 INFO tempest.lib.common.rest_client [req-17244beb-45af-4671-9be3-97ff2c4a2033 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.248s 2020-12-14 02:22:43.461 197 DEBUG tempest.lib.common.rest_client [req-17244beb-45af-4671-9be3-97ff2c4a2033 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-17244beb-45af-4671-9be3-97ff2c4a2033', 'x-compute-request-id': 'req-17244beb-45af-4671-9be3-97ff2c4a2033', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:40Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "rescuing", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:44.215 189 INFO tempest.lib.common.rest_client [req-946be905-83f0-402b-ba8a-e03d27e84d69 ] Request (ServerActionsRbacTest:test_start_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.223s 2020-12-14 02:22:44.218 189 DEBUG tempest.lib.common.rest_client [req-946be905-83f0-402b-ba8a-e03d27e84d69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1714', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-946be905-83f0-402b-ba8a-e03d27e84d69', 'x-compute-request-id': 'req-946be905-83f0-402b-ba8a-e03d27e84d69', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:42Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "powering-on", "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:44.811 197 INFO tempest.lib.common.rest_client [req-514b8b29-4973-400c-8f8a-18d2e5a12922 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.236s 2020-12-14 02:22:44.814 197 DEBUG tempest.lib.common.rest_client [req-514b8b29-4973-400c-8f8a-18d2e5a12922 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-514b8b29-4973-400c-8f8a-18d2e5a12922', 'x-compute-request-id': 'req-514b8b29-4973-400c-8f8a-18d2e5a12922', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:40Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:11.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "rescuing", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:45.544 189 INFO tempest.lib.common.rest_client [req-d161b31a-09cb-4437-b1de-f97777993be5 ] Request (ServerActionsRbacTest:test_start_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.215s 2020-12-14 02:22:45.547 189 DEBUG tempest.lib.common.rest_client [req-d161b31a-09cb-4437-b1de-f97777993be5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d161b31a-09cb-4437-b1de-f97777993be5', 'x-compute-request-id': 'req-d161b31a-09cb-4437-b1de-f97777993be5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:45Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:45.653 189 INFO tempest.common.waiters [-] State transition "SHUTOFF/powering-on" ==> "ACTIVE/None" after 3 second wait 2020-12-14 02:22:45.959 189 INFO tempest.lib.common.rest_client [req-3c032f13-ba91-416e-8adc-897d04ff65b5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.265s 2020-12-14 02:22:45.963 189 DEBUG tempest.lib.common.rest_client [req-3c032f13-ba91-416e-8adc-897d04ff65b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3c032f13-ba91-416e-8adc-897d04ff65b5', 'x-compute-request-id': 'req-3c032f13-ba91-416e-8adc-897d04ff65b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:45Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:46.067 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:22:46.072 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.075 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.079 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.082 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.086 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.089 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.094 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.097 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.100 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.102 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.105 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.108 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.111 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.114 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.117 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.120 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.124 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.128 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.131 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.134 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.136 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.139 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.140 197 INFO tempest.lib.common.rest_client [req-85671d47-e501-4591-812d-8fbcebb4fb08 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.215s 2020-12-14 02:22:46.142 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.142 197 DEBUG tempest.lib.common.rest_client [req-85671d47-e501-4591-812d-8fbcebb4fb08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-85671d47-e501-4591-812d-8fbcebb4fb08', 'x-compute-request-id': 'req-85671d47-e501-4591-812d-8fbcebb4fb08', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:45Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:44.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:46.144 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.147 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.150 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.152 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.155 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.158 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.161 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.163 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.166 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.170 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.175 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.179 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.184 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.187 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.190 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.192 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.195 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.197 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.199 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.201 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.204 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.206 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.208 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.210 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.212 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.214 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.216 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.218 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.221 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.223 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.225 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.228 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.230 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.234 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.236 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.238 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.241 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.243 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.245 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.247 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.249 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.251 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.253 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.255 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.258 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.260 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.262 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.264 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:22:46.266 197 INFO tempest.common.waiters [-] State transition "ACTIVE/rescuing" ==> "RESCUE/None" after 6 second wait 2020-12-14 02:22:46.269 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:46.272 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:stop, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:22:46.274 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:46.342 197 INFO tempest.lib.common.rest_client [req-358581c2-3243-4e7d-9b8a-6c33ee6fb648 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.067s 2020-12-14 02:22:46.344 189 INFO tempest.lib.common.rest_client [req-ffbcb73b-21ee-4f6e-8ea3-0d9be4d4c43f ] Request (ServerActionsRbacTest:test_stop_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.065s 2020-12-14 02:22:46.347 189 DEBUG tempest.lib.common.rest_client [req-ffbcb73b-21ee-4f6e-8ea3-0d9be4d4c43f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ffbcb73b-21ee-4f6e-8ea3-0d9be4d4c43f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:46.346 197 DEBUG tempest.lib.common.rest_client [req-358581c2-3243-4e7d-9b8a-6c33ee6fb648 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-358581c2-3243-4e7d-9b8a-6c33ee6fb648', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:46.399 197 INFO tempest.lib.common.rest_client [req-6e994cb8-6c49-44fd-b7d0-4b35bf7a4d31 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:22:46.400 189 INFO tempest.lib.common.rest_client [req-0c1fde91-b6b8-4bfe-b25a-cd4335a3e32d ] Request (ServerActionsRbacTest:test_stop_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:22:46.402 197 DEBUG tempest.lib.common.rest_client [req-6e994cb8-6c49-44fd-b7d0-4b35bf7a4d31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e994cb8-6c49-44fd-b7d0-4b35bf7a4d31', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["QmNq5u5gSGO8oxaRJNTGeg"], "expires_at": "2020-12-14T03:22:46.000000Z", "issued_at": "2020-12-14T02:22:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:46.403 189 DEBUG tempest.lib.common.rest_client [req-0c1fde91-b6b8-4bfe-b25a-cd4335a3e32d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c1fde91-b6b8-4bfe-b25a-cd4335a3e32d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["xMMiY81lRrmUkniZm24CjQ"], "expires_at": "2020-12-14T03:22:46.000000Z", "issued_at": "2020-12-14T02:22:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:46.635 197 INFO tempest.lib.common.rest_client [req-90f4d057-b6b7-40b8-a6a5-904485f69c0a ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 202 POST http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action 0.226s 2020-12-14 02:22:46.637 197 DEBUG tempest.lib.common.rest_client [req-90f4d057-b6b7-40b8-a6a5-904485f69c0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unrescue": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-90f4d057-b6b7-40b8-a6a5-904485f69c0a', 'x-compute-request-id': 'req-90f4d057-b6b7-40b8-a6a5-904485f69c0a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:46.640 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:46.675 189 INFO tempest.lib.common.rest_client [req-403d3e0b-7a23-418b-b6fb-f9ac822c28a1 ] Request (ServerActionsRbacTest:test_stop_server): 202 POST http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1/action 0.264s 2020-12-14 02:22:46.677 189 DEBUG tempest.lib.common.rest_client [req-403d3e0b-7a23-418b-b6fb-f9ac822c28a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-stop": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-403d3e0b-7a23-418b-b6fb-f9ac822c28a1', 'x-compute-request-id': 'req-403d3e0b-7a23-418b-b6fb-f9ac822c28a1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:46.710 197 INFO tempest.lib.common.rest_client [req-777fb31a-9956-42f0-9966-f05fe3af29d4 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles 0.064s 2020-12-14 02:22:46.713 197 DEBUG tempest.lib.common.rest_client [req-777fb31a-9956-42f0-9966-f05fe3af29d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-777fb31a-9956-42f0-9966-f05fe3af29d4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b/users/22a3021b60e04e5e8566c3079b0174a5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:46.764 197 INFO tempest.lib.common.rest_client [req-287c124f-0ba7-4af7-afad-a5b6476807dd ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:22:46.768 197 DEBUG tempest.lib.common.rest_client [req-287c124f-0ba7-4af7-afad-a5b6476807dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-287c124f-0ba7-4af7-afad-a5b6476807dd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "22a3021b60e04e5e8566c3079b0174a5", "name": "tempest-MiscPolicyActionsRbacTest-354750584", "password_expires_at": null}, "audit_ids": ["D1aKgqFuQj2PBlrPkEFIOQ"], "expires_at": "2020-12-14T03:22:46.000000Z", "issued_at": "2020-12-14T02:22:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a836f1fb2f90434abc04b768f968fb5b", "name": "tempest-MiscPolicyActionsRbacTest-354750584"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a836f1fb2f90434abc04b768f968fb5b", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:46.890 189 INFO tempest.lib.common.rest_client [req-7ebaeb1a-e176-498e-8e8c-3fec03f985fd ] Request (ServerActionsRbacTest:test_stop_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.206s 2020-12-14 02:22:46.894 189 DEBUG tempest.lib.common.rest_client [req-7ebaeb1a-e176-498e-8e8c-3fec03f985fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1728', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7ebaeb1a-e176-498e-8e8c-3fec03f985fd', 'x-compute-request-id': 'req-7ebaeb1a-e176-498e-8e8c-3fec03f985fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "powering-off", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:47.092 197 INFO tempest.lib.common.rest_client [req-251675ac-f761-4784-97fc-fe31780e2496 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.316s 2020-12-14 02:22:47.095 197 DEBUG tempest.lib.common.rest_client [req-251675ac-f761-4784-97fc-fe31780e2496 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1720', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-251675ac-f761-4784-97fc-fe31780e2496', 'x-compute-request-id': 'req-251675ac-f761-4784-97fc-fe31780e2496', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:44.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "unrescuing", "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:48.226 189 INFO tempest.lib.common.rest_client [req-29c55911-42f5-496e-b798-e65a83ffb36b ] Request (ServerActionsRbacTest:test_stop_server): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.229s 2020-12-14 02:22:48.229 189 DEBUG tempest.lib.common.rest_client [req-29c55911-42f5-496e-b798-e65a83ffb36b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-29c55911-42f5-496e-b798-e65a83ffb36b', 'x-compute-request-id': 'req-29c55911-42f5-496e-b798-e65a83ffb36b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:48.333 189 INFO tempest.common.waiters [-] State transition "ACTIVE/powering-off" ==> "SHUTOFF/None" after 2 second wait 2020-12-14 02:22:48.336 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:22:48.430 189 INFO tempest.lib.common.rest_client [req-c05c5a6c-ea74-4df0-a890-50927f258d55 ] Request (ServerActionsRbacTest:test_stop_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.086s 2020-12-14 02:22:48.433 189 DEBUG tempest.lib.common.rest_client [req-c05c5a6c-ea74-4df0-a890-50927f258d55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c05c5a6c-ea74-4df0-a890-50927f258d55', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:48.442 197 INFO tempest.lib.common.rest_client [req-95c72ba7-fc11-4fd9-9c5a-4a1ff0595187 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.226s 2020-12-14 02:22:48.445 197 DEBUG tempest.lib.common.rest_client [req-95c72ba7-fc11-4fd9-9c5a-4a1ff0595187 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1720', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-95c72ba7-fc11-4fd9-9c5a-4a1ff0595187', 'x-compute-request-id': 'req-95c72ba7-fc11-4fd9-9c5a-4a1ff0595187', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "RESCUE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:44.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "unrescuing", "OS-EXT-STS:vm_state": "rescued", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:48.490 189 INFO tempest.lib.common.rest_client [req-e0b216f9-6faf-4c2e-8ea9-5d7892d8c026 ] Request (ServerActionsRbacTest:test_stop_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:22:48.495 189 DEBUG tempest.lib.common.rest_client [req-e0b216f9-6faf-4c2e-8ea9-5d7892d8c026 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0b216f9-6faf-4c2e-8ea9-5d7892d8c026', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["n_7iAjdcS9qNqxglqTKTBw"], "expires_at": "2020-12-14T03:22:48.000000Z", "issued_at": "2020-12-14T02:22:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:48.854 189 INFO tempest.lib.common.rest_client [req-3d000002-e966-46bb-be5c-78a784896e07 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.319s 2020-12-14 02:22:48.857 189 DEBUG tempest.lib.common.rest_client [req-3d000002-e966-46bb-be5c-78a784896e07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3d000002-e966-46bb-be5c-78a784896e07', 'x-compute-request-id': 'req-3d000002-e966-46bb-be5c-78a784896e07', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:49.776 197 INFO tempest.lib.common.rest_client [req-d9848b93-f013-4bea-93e1-f27e13b791b7 ] Request (MiscPolicyActionsRbacTest:test_unrescue_server): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.215s 2020-12-14 02:22:49.780 197 DEBUG tempest.lib.common.rest_client [req-d9848b93-f013-4bea-93e1-f27e13b791b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1726', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d9848b93-f013-4bea-93e1-f27e13b791b7', 'x-compute-request-id': 'req-d9848b93-f013-4bea-93e1-f27e13b791b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:50Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:44.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:49.895 197 INFO tempest.common.waiters [-] State transition "RESCUE/unrescuing" ==> "ACTIVE/None" after 2 second wait 2020-12-14 02:22:50.163 197 INFO tempest.lib.common.rest_client [req-e5c8f7be-08d7-47ef-93a5-1650813952c6 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.170s 2020-12-14 02:22:50.166 197 DEBUG tempest.lib.common.rest_client [req-e5c8f7be-08d7-47ef-93a5-1650813952c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e5c8f7be-08d7-47ef-93a5-1650813952c6', 'x-compute-request-id': 'req-e5c8f7be-08d7-47ef-93a5-1650813952c6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:50.186 189 INFO tempest.lib.common.rest_client [req-26648e32-a493-4cfe-9d2d-e052ac57c047 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.215s 2020-12-14 02:22:50.188 189 DEBUG tempest.lib.common.rest_client [req-26648e32-a493-4cfe-9d2d-e052ac57c047 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-26648e32-a493-4cfe-9d2d-e052ac57c047', 'x-compute-request-id': 'req-26648e32-a493-4cfe-9d2d-e052ac57c047', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:50.418 197 INFO tempest.lib.common.rest_client [req-cd04a120-68d8-45ac-ad9c-0aa26d8ffa80 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.245s 2020-12-14 02:22:50.421 197 DEBUG tempest.lib.common.rest_client [req-cd04a120-68d8-45ac-ad9c-0aa26d8ffa80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cd04a120-68d8-45ac-ad9c-0aa26d8ffa80', 'x-compute-request-id': 'req-cd04a120-68d8-45ac-ad9c-0aa26d8ffa80', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:50Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:44.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:51.596 189 INFO tempest.lib.common.rest_client [req-1172b7f1-b02f-4287-a033-4937101cc952 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.321s 2020-12-14 02:22:51.599 189 DEBUG tempest.lib.common.rest_client [req-1172b7f1-b02f-4287-a033-4937101cc952 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1172b7f1-b02f-4287-a033-4937101cc952', 'x-compute-request-id': 'req-1172b7f1-b02f-4287-a033-4937101cc952', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:51.723 197 INFO tempest.lib.common.rest_client [req-59ce47a7-2153-4c2d-9a61-28fadd210e0c ] Request (MiscPolicyActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.197s 2020-12-14 02:22:51.726 197 DEBUG tempest.lib.common.rest_client [req-59ce47a7-2153-4c2d-9a61-28fadd210e0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-59ce47a7-2153-4c2d-9a61-28fadd210e0c', 'x-compute-request-id': 'req-59ce47a7-2153-4c2d-9a61-28fadd210e0c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "ACTIVE", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:50Z", "addresses": {"tempest-MiscPolicyActionsRbacTest-2031429312-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:f7:3b:88"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:44.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:52.983 197 INFO tempest.lib.common.rest_client [req-026a58e0-d4f5-4639-9daa-3e779b76f40d ] Request (MiscPolicyActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.149s 2020-12-14 02:22:52.986 197 DEBUG tempest.lib.common.rest_client [req-026a58e0-d4f5-4639-9daa-3e779b76f40d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1522', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-026a58e0-d4f5-4639-9daa-3e779b76f40d', 'x-compute-request-id': 'req-026a58e0-d4f5-4639-9daa-3e779b76f40d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"server": {"id": "b391dcbd-c403-4e0b-97aa-9a4b82f901c5", "name": "tempest-MiscPolicyActionsRbacTest-server-1792138034", "status": "DELETED", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "user_id": "22a3021b60e04e5e8566c3079b0174a5", "metadata": {}, "hostId": "637f4dd4dcae33b7308f7fcbf6b9dfc732f8f86da484f51c74c60e59", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:22:05Z", "updated": "2020-12-14T02:22:52Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:44.000000", "OS-SRV-USG:terminated_at": "2020-12-14T02:22:52.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbde", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:53.047 189 INFO tempest.lib.common.rest_client [req-1aba1162-85a9-4047-aaf3-192fc9fa28b1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.343s 2020-12-14 02:22:53.050 189 DEBUG tempest.lib.common.rest_client [req-1aba1162-85a9-4047-aaf3-192fc9fa28b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1aba1162-85a9-4047-aaf3-192fc9fa28b1', 'x-compute-request-id': 'req-1aba1162-85a9-4047-aaf3-192fc9fa28b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:53.088 197 INFO tempest.common.waiters [-] State transition "ACTIVE/deleting" ==> "DELETED/None" after 3 second wait 2020-12-14 02:22:54.183 197 INFO tempest.lib.common.rest_client [req-09adc4be-fef5-4486-bb4e-15f7195b3175 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5 0.086s 2020-12-14 02:22:54.186 197 DEBUG tempest.lib.common.rest_client [req-09adc4be-fef5-4486-bb4e-15f7195b3175 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-09adc4be-fef5-4486-bb4e-15f7195b3175', 'x-compute-request-id': 'req-09adc4be-fef5-4486-bb4e-15f7195b3175', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/b391dcbd-c403-4e0b-97aa-9a4b82f901c5'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance b391dcbd-c403-4e0b-97aa-9a4b82f901c5 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:54.269 197 INFO tempest.lib.common.rest_client [req-a0878fa9-0b73-4725-8dd5-6d933f139b06 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.076s 2020-12-14 02:22:54.272 197 DEBUG tempest.lib.common.rest_client [req-a0878fa9-0b73-4725-8dd5-6d933f139b06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-a0878fa9-0b73-4725-8dd5-6d933f139b06', 'x-compute-request-id': 'req-a0878fa9-0b73-4725-8dd5-6d933f139b06', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 6f32b799-3a71-4df3-a397-802b4088c9c6 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:54.353 197 INFO tempest.lib.common.rest_client [req-e9b695e8-4fb1-40c4-ba70-bee14ddcfcf2 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6 0.074s 2020-12-14 02:22:54.357 197 DEBUG tempest.lib.common.rest_client [req-e9b695e8-4fb1-40c4-ba70-bee14ddcfcf2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-e9b695e8-4fb1-40c4-ba70-bee14ddcfcf2', 'x-compute-request-id': 'req-e9b695e8-4fb1-40c4-ba70-bee14ddcfcf2', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/6f32b799-3a71-4df3-a397-802b4088c9c6'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 6f32b799-3a71-4df3-a397-802b4088c9c6 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:54.375 189 INFO tempest.lib.common.rest_client [req-5d22a1f5-d0ea-475d-96fb-f035dd0eefff ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.218s 2020-12-14 02:22:54.379 189 DEBUG tempest.lib.common.rest_client [req-5d22a1f5-d0ea-475d-96fb-f035dd0eefff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5d22a1f5-d0ea-475d-96fb-f035dd0eefff', 'x-compute-request-id': 'req-5d22a1f5-d0ea-475d-96fb-f035dd0eefff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:54.441 197 INFO tempest.lib.common.rest_client [req-3e153148-c205-4c42-b8e9-d1f73e3f34b0 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.077s 2020-12-14 02:22:54.444 197 DEBUG tempest.lib.common.rest_client [req-3e153148-c205-4c42-b8e9-d1f73e3f34b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-3e153148-c205-4c42-b8e9-d1f73e3f34b0', 'x-compute-request-id': 'req-3e153148-c205-4c42-b8e9-d1f73e3f34b0', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 1dfd0497-187a-402a-923e-b825fcf8b081 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:54.528 197 INFO tempest.lib.common.rest_client [req-68a399d0-e96d-42d6-9e7d-541ff623218a ] Request (MiscPolicyActionsRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081 0.077s 2020-12-14 02:22:54.531 197 DEBUG tempest.lib.common.rest_client [req-68a399d0-e96d-42d6-9e7d-541ff623218a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-68a399d0-e96d-42d6-9e7d-541ff623218a', 'x-compute-request-id': 'req-68a399d0-e96d-42d6-9e7d-541ff623218a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/1dfd0497-187a-402a-923e-b825fcf8b081'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 1dfd0497-187a-402a-923e-b825fcf8b081 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:54.534 197 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '25a7ce63-636c-4fcd-bf14-ab20366f9481', 'name': 'tempest-MiscPolicyActionsRbacTest-2031429312-network', 'tenant_id': 'a836f1fb2f90434abc04b768f968fb5b', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'a836f1fb2f90434abc04b768f968fb5b', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 65, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:15:55Z', 'updated_at': '2020-12-14T02:15:55Z', 'revision_number': 1}, subnet: {'id': 'f7cd92f9-1f7e-458a-9182-fbfbe2b2082b', 'name': 'tempest-MiscPolicyActionsRbacTest-2031429312-subnet', 'tenant_id': 'a836f1fb2f90434abc04b768f968fb5b', 'network_id': '25a7ce63-636c-4fcd-bf14-ab20366f9481', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:15:56Z', 'updated_at': '2020-12-14T02:15:56Z', 'revision_number': 0, 'project_id': 'a836f1fb2f90434abc04b768f968fb5b'}, router: {'id': '91571816-e8eb-4403-9b91-8f8d1fcef93b', 'name': 'tempest-MiscPolicyActionsRbacTest-2031429312-router', 'tenant_id': 'a836f1fb2f90434abc04b768f968fb5b', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.72'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::11a'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:15:57Z', 'updated_at': '2020-12-14T02:15:58Z', 'revision_number': 3, 'project_id': 'a836f1fb2f90434abc04b768f968fb5b'} _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:22:55.779 189 INFO tempest.lib.common.rest_client [req-c1ecd105-663f-4630-91dc-2b6f20aedce5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.290s 2020-12-14 02:22:55.782 189 DEBUG tempest.lib.common.rest_client [req-c1ecd105-663f-4630-91dc-2b6f20aedce5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c1ecd105-663f-4630-91dc-2b6f20aedce5', 'x-compute-request-id': 'req-c1ecd105-663f-4630-91dc-2b6f20aedce5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:56.626 197 INFO tempest.lib.common.rest_client [req-cff3eafa-78aa-471e-b2f0-2160becd3d6b ] Request (MiscPolicyActionsRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/91571816-e8eb-4403-9b91-8f8d1fcef93b/remove_router_interface 2.084s 2020-12-14 02:22:56.630 197 DEBUG tempest.lib.common.rest_client [req-cff3eafa-78aa-471e-b2f0-2160becd3d6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "f7cd92f9-1f7e-458a-9182-fbfbe2b2082b"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-cff3eafa-78aa-471e-b2f0-2160becd3d6b', 'date': 'Mon, 14 Dec 2020 02:22:56 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/91571816-e8eb-4403-9b91-8f8d1fcef93b/remove_router_interface'} Body: b'{"id": "91571816-e8eb-4403-9b91-8f8d1fcef93b", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "port_id": "5a6bab9e-ead0-4e74-8e9b-fbc3cc0eb284", "network_id": "25a7ce63-636c-4fcd-bf14-ab20366f9481", "subnet_id": "f7cd92f9-1f7e-458a-9182-fbfbe2b2082b", "subnet_ids": ["f7cd92f9-1f7e-458a-9182-fbfbe2b2082b"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:57.280 189 INFO tempest.lib.common.rest_client [req-4983eaf2-ba1a-41bf-beb4-7b674b8130b4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.388s 2020-12-14 02:22:57.285 189 DEBUG tempest.lib.common.rest_client [req-4983eaf2-ba1a-41bf-beb4-7b674b8130b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4983eaf2-ba1a-41bf-beb4-7b674b8130b4', 'x-compute-request-id': 'req-4983eaf2-ba1a-41bf-beb4-7b674b8130b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:57.804 197 INFO tempest.lib.common.rest_client [req-f0f59b25-04db-42d1-97f5-1b36570990f2 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/91571816-e8eb-4403-9b91-8f8d1fcef93b 1.168s 2020-12-14 02:22:57.807 197 DEBUG tempest.lib.common.rest_client [req-f0f59b25-04db-42d1-97f5-1b36570990f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f0f59b25-04db-42d1-97f5-1b36570990f2', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:22:57 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/91571816-e8eb-4403-9b91-8f8d1fcef93b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:58.247 197 INFO tempest.lib.common.rest_client [req-4ca0a91f-1516-4eef-ba7a-ef9857d7dd58 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/f7cd92f9-1f7e-458a-9182-fbfbe2b2082b 0.432s 2020-12-14 02:22:58.250 197 DEBUG tempest.lib.common.rest_client [req-4ca0a91f-1516-4eef-ba7a-ef9857d7dd58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-4ca0a91f-1516-4eef-ba7a-ef9857d7dd58', 'date': 'Mon, 14 Dec 2020 02:22:58 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/f7cd92f9-1f7e-458a-9182-fbfbe2b2082b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:58.638 189 INFO tempest.lib.common.rest_client [req-0a527c00-f5dc-438c-8f39-a1bce381dda2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.245s 2020-12-14 02:22:58.642 189 DEBUG tempest.lib.common.rest_client [req-0a527c00-f5dc-438c-8f39-a1bce381dda2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0a527c00-f5dc-438c-8f39-a1bce381dda2', 'x-compute-request-id': 'req-0a527c00-f5dc-438c-8f39-a1bce381dda2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:58.855 197 INFO tempest.lib.common.rest_client [req-4751976d-85fd-4fe6-bcf6-cd0f0750b351 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/25a7ce63-636c-4fcd-bf14-ab20366f9481 0.598s 2020-12-14 02:22:58.858 197 DEBUG tempest.lib.common.rest_client [req-4751976d-85fd-4fe6-bcf6-cd0f0750b351 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-4751976d-85fd-4fe6-bcf6-cd0f0750b351', 'date': 'Mon, 14 Dec 2020 02:22:58 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/25a7ce63-636c-4fcd-bf14-ab20366f9481'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:22:58.860 197 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '84bc7718-06c3-4f50-bdeb-4d3ec777c9b0', 'name': 'tempest-MiscPolicyActionsRbacTest-1381669334-network', 'tenant_id': '13e063fab0044afeafaff2049f9b1404', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '13e063fab0044afeafaff2049f9b1404', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 68, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:16:06Z', 'updated_at': '2020-12-14T02:16:06Z', 'revision_number': 1}, subnet: {'id': 'cd9c7c45-cb13-4156-afae-7bf82ff6ac9c', 'name': 'tempest-MiscPolicyActionsRbacTest-1381669334-subnet', 'tenant_id': '13e063fab0044afeafaff2049f9b1404', 'network_id': '84bc7718-06c3-4f50-bdeb-4d3ec777c9b0', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:16:06Z', 'updated_at': '2020-12-14T02:16:06Z', 'revision_number': 0, 'project_id': '13e063fab0044afeafaff2049f9b1404'}, router: {'id': '3c679a5a-15a2-4715-9812-f5f53c6676ad', 'name': 'tempest-MiscPolicyActionsRbacTest-1381669334-router', 'tenant_id': '13e063fab0044afeafaff2049f9b1404', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.197'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::157'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:16:07Z', 'updated_at': '2020-12-14T02:16:08Z', 'revision_number': 3, 'project_id': '13e063fab0044afeafaff2049f9b1404'} _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:23:00.043 189 INFO tempest.lib.common.rest_client [req-d45cff10-7c94-4b61-b8e4-4b38e03d931b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.289s 2020-12-14 02:23:00.047 189 DEBUG tempest.lib.common.rest_client [req-d45cff10-7c94-4b61-b8e4-4b38e03d931b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:22:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d45cff10-7c94-4b61-b8e4-4b38e03d931b', 'x-compute-request-id': 'req-d45cff10-7c94-4b61-b8e4-4b38e03d931b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:00.978 197 INFO tempest.lib.common.rest_client [req-1ee74217-4c10-41a8-926f-6d1ff1da361b ] Request (MiscPolicyActionsRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/3c679a5a-15a2-4715-9812-f5f53c6676ad/remove_router_interface 2.111s 2020-12-14 02:23:00.981 197 DEBUG tempest.lib.common.rest_client [req-1ee74217-4c10-41a8-926f-6d1ff1da361b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "cd9c7c45-cb13-4156-afae-7bf82ff6ac9c"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-1ee74217-4c10-41a8-926f-6d1ff1da361b', 'date': 'Mon, 14 Dec 2020 02:23:00 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/3c679a5a-15a2-4715-9812-f5f53c6676ad/remove_router_interface'} Body: b'{"id": "3c679a5a-15a2-4715-9812-f5f53c6676ad", "tenant_id": "13e063fab0044afeafaff2049f9b1404", "port_id": "44815307-3e66-4473-8b9d-a55aacfbc458", "network_id": "84bc7718-06c3-4f50-bdeb-4d3ec777c9b0", "subnet_id": "cd9c7c45-cb13-4156-afae-7bf82ff6ac9c", "subnet_ids": ["cd9c7c45-cb13-4156-afae-7bf82ff6ac9c"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:01.412 189 INFO tempest.lib.common.rest_client [req-8fa6aec4-45d4-45ce-9d55-308c406b8c40 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.251s 2020-12-14 02:23:01.415 189 DEBUG tempest.lib.common.rest_client [req-8fa6aec4-45d4-45ce-9d55-308c406b8c40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8fa6aec4-45d4-45ce-9d55-308c406b8c40', 'x-compute-request-id': 'req-8fa6aec4-45d4-45ce-9d55-308c406b8c40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:02.762 189 INFO tempest.lib.common.rest_client [req-744c89c9-db86-4eb2-b3ae-831fa1cecccb ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.238s 2020-12-14 02:23:02.766 189 DEBUG tempest.lib.common.rest_client [req-744c89c9-db86-4eb2-b3ae-831fa1cecccb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-744c89c9-db86-4eb2-b3ae-831fa1cecccb', 'x-compute-request-id': 'req-744c89c9-db86-4eb2-b3ae-831fa1cecccb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:04.133 189 INFO tempest.lib.common.rest_client [req-58c2d584-175e-4579-8500-1052664cd34d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.262s 2020-12-14 02:23:04.136 189 DEBUG tempest.lib.common.rest_client [req-58c2d584-175e-4579-8500-1052664cd34d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-58c2d584-175e-4579-8500-1052664cd34d', 'x-compute-request-id': 'req-58c2d584-175e-4579-8500-1052664cd34d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:05.464 189 INFO tempest.lib.common.rest_client [req-aad53532-6a19-4a60-aa7e-7805d15f1399 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.218s 2020-12-14 02:23:05.467 189 DEBUG tempest.lib.common.rest_client [req-aad53532-6a19-4a60-aa7e-7805d15f1399 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aad53532-6a19-4a60-aa7e-7805d15f1399', 'x-compute-request-id': 'req-aad53532-6a19-4a60-aa7e-7805d15f1399', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:06.330 197 INFO tempest.lib.common.rest_client [req-4a8f1df6-ee35-424f-ab79-2da37761383c ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/3c679a5a-15a2-4715-9812-f5f53c6676ad 5.342s 2020-12-14 02:23:06.332 197 DEBUG tempest.lib.common.rest_client [req-4a8f1df6-ee35-424f-ab79-2da37761383c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-4a8f1df6-ee35-424f-ab79-2da37761383c', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:06 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/3c679a5a-15a2-4715-9812-f5f53c6676ad'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:06.821 197 INFO tempest.lib.common.rest_client [req-9a75d567-22d6-4acc-aed0-dee381679783 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/cd9c7c45-cb13-4156-afae-7bf82ff6ac9c 0.483s 2020-12-14 02:23:06.822 189 INFO tempest.lib.common.rest_client [req-a977cd14-3b6d-4bc0-ab56-bb907c681b3f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.244s 2020-12-14 02:23:06.825 197 DEBUG tempest.lib.common.rest_client [req-9a75d567-22d6-4acc-aed0-dee381679783 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-9a75d567-22d6-4acc-aed0-dee381679783', 'date': 'Mon, 14 Dec 2020 02:23:06 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/cd9c7c45-cb13-4156-afae-7bf82ff6ac9c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:06.826 189 DEBUG tempest.lib.common.rest_client [req-a977cd14-3b6d-4bc0-ab56-bb907c681b3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a977cd14-3b6d-4bc0-ab56-bb907c681b3f', 'x-compute-request-id': 'req-a977cd14-3b6d-4bc0-ab56-bb907c681b3f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:07.366 197 INFO tempest.lib.common.rest_client [req-f46eaa35-2c27-4b2d-940f-c68665f7d71c ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/84bc7718-06c3-4f50-bdeb-4d3ec777c9b0 0.536s 2020-12-14 02:23:07.368 197 DEBUG tempest.lib.common.rest_client [req-f46eaa35-2c27-4b2d-940f-c68665f7d71c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-f46eaa35-2c27-4b2d-940f-c68665f7d71c', 'date': 'Mon, 14 Dec 2020 02:23:07 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/84bc7718-06c3-4f50-bdeb-4d3ec777c9b0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:07.529 197 INFO tempest.lib.common.rest_client [req-b5e8cb4c-a637-41a5-892e-b8ffb6ef39e7 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/22a3021b60e04e5e8566c3079b0174a5 0.154s 2020-12-14 02:23:07.532 197 DEBUG tempest.lib.common.rest_client [req-b5e8cb4c-a637-41a5-892e-b8ffb6ef39e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b5e8cb4c-a637-41a5-892e-b8ffb6ef39e7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/22a3021b60e04e5e8566c3079b0174a5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:07.595 197 INFO tempest.lib.common.rest_client [req-df6553dc-ad10-493f-9e50-0faee7da9cea ] Request (MiscPolicyActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a836f1fb2f90434abc04b768f968fb5b&name=default 0.055s 2020-12-14 02:23:07.598 197 DEBUG tempest.lib.common.rest_client [req-df6553dc-ad10-493f-9e50-0faee7da9cea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-df6553dc-ad10-493f-9e50-0faee7da9cea', 'date': 'Mon, 14 Dec 2020 02:23:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a836f1fb2f90434abc04b768f968fb5b&name=default'} Body: b'{"security_groups": [{"id": "435333aa-df3d-4bff-9eac-fe1b81cd7668", "name": "default", "stateful": true, "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "description": "Default security group", "security_group_rules": [{"id": "038bc88e-3849-4783-8d34-1b9609e40eb3", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "security_group_id": "435333aa-df3d-4bff-9eac-fe1b81cd7668", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:15:55Z", "updated_at": "2020-12-14T02:15:55Z", "revision_number": 0, "project_id": "a836f1fb2f90434abc04b768f968fb5b"}, {"id": "06e26481-130e-4f44-8ce7-c369547c6daf", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "security_group_id": "435333aa-df3d-4bff-9eac-fe1b81cd7668", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "435333aa-df3d-4bff-9eac-fe1b81cd7668", "description": null, "tags": [], "created_at": "2020-12-14T02:15:55Z", "updated_at": "2020-12-14T02:15:55Z", "revision_number": 0, "project_id": "a836f1fb2f90434abc04b768f968fb5b"}, {"id": "a6b339f8-b5be-476e-b864-8410a614e347", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "security_group_id": "435333aa-df3d-4bff-9eac-fe1b81cd7668", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "435333aa-df3d-4bff-9eac-fe1b81cd7668", "description": null, "tags": [], "created_at": "2020-12-14T02:15:55Z", "updated_at": "2020-12-14T02:15:55Z", "revision_number": 0, "project_id": "a836f1fb2f90434abc04b768f968fb5b"}, {"id": "e299f570-e566-4d8b-b691-fa71afd6ee5e", "tenant_id": "a836f1fb2f90434abc04b768f968fb5b", "security_group_id": "435333aa-df3d-4bff-9eac-fe1b81cd7668", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:15:55Z", "updated_at": "2020-12-14T02:15:55Z", "revision_number": 0, "project_id": "a836f1fb2f90434abc04b768f968fb5b"}], "tags": [], "created_at": "2020-12-14T02:15:55Z", "updated_at": "2020-12-14T02:15:55Z", "revision_number": 1, "project_id": "a836f1fb2f90434abc04b768f968fb5b"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:07.797 197 INFO tempest.lib.common.rest_client [req-2c0906f5-14f0-4b67-831e-56062cf57dba ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/435333aa-df3d-4bff-9eac-fe1b81cd7668 0.191s 2020-12-14 02:23:07.799 197 DEBUG tempest.lib.common.rest_client [req-2c0906f5-14f0-4b67-831e-56062cf57dba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2c0906f5-14f0-4b67-831e-56062cf57dba', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:07 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/435333aa-df3d-4bff-9eac-fe1b81cd7668'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:07.997 197 INFO tempest.lib.common.rest_client [req-b499618a-f98f-4d90-84e4-cb239ddfb8cc ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b 0.191s 2020-12-14 02:23:07.999 197 DEBUG tempest.lib.common.rest_client [req-b499618a-f98f-4d90-84e4-cb239ddfb8cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b499618a-f98f-4d90-84e4-cb239ddfb8cc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a836f1fb2f90434abc04b768f968fb5b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:08.136 189 INFO tempest.lib.common.rest_client [req-16893ee5-5a22-45a1-9892-0b86c24a00c8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.206s 2020-12-14 02:23:08.139 189 DEBUG tempest.lib.common.rest_client [req-16893ee5-5a22-45a1-9892-0b86c24a00c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-16893ee5-5a22-45a1-9892-0b86c24a00c8', 'x-compute-request-id': 'req-16893ee5-5a22-45a1-9892-0b86c24a00c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:08.189 197 INFO tempest.lib.common.rest_client [req-50c1c73d-c1b4-4883-82a9-80414c6a1e51 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/7792aa6a9e6448e784708264bc9c7c58 0.184s 2020-12-14 02:23:08.192 197 DEBUG tempest.lib.common.rest_client [req-50c1c73d-c1b4-4883-82a9-80414c6a1e51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-50c1c73d-c1b4-4883-82a9-80414c6a1e51', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/7792aa6a9e6448e784708264bc9c7c58'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:08.261 197 INFO tempest.lib.common.rest_client [req-d40a391c-93fc-41d3-b1ef-5d5d2a87168c ] Request (MiscPolicyActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=13e063fab0044afeafaff2049f9b1404&name=default 0.062s 2020-12-14 02:23:08.264 197 DEBUG tempest.lib.common.rest_client [req-d40a391c-93fc-41d3-b1ef-5d5d2a87168c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-d40a391c-93fc-41d3-b1ef-5d5d2a87168c', 'date': 'Mon, 14 Dec 2020 02:23:08 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=13e063fab0044afeafaff2049f9b1404&name=default'} Body: b'{"security_groups": [{"id": "3c8f49bf-5ed2-4fd3-993a-a31bcb8b9c37", "name": "default", "stateful": true, "tenant_id": "13e063fab0044afeafaff2049f9b1404", "description": "Default security group", "security_group_rules": [{"id": "0aebe5bc-ac41-4d64-b78a-0853c8f54a4b", "tenant_id": "13e063fab0044afeafaff2049f9b1404", "security_group_id": "3c8f49bf-5ed2-4fd3-993a-a31bcb8b9c37", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "3c8f49bf-5ed2-4fd3-993a-a31bcb8b9c37", "description": null, "tags": [], "created_at": "2020-12-14T02:16:06Z", "updated_at": "2020-12-14T02:16:06Z", "revision_number": 0, "project_id": "13e063fab0044afeafaff2049f9b1404"}, {"id": "6e104602-6e5a-420a-b559-26401acfa146", "tenant_id": "13e063fab0044afeafaff2049f9b1404", "security_group_id": "3c8f49bf-5ed2-4fd3-993a-a31bcb8b9c37", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "3c8f49bf-5ed2-4fd3-993a-a31bcb8b9c37", "description": null, "tags": [], "created_at": "2020-12-14T02:16:06Z", "updated_at": "2020-12-14T02:16:06Z", "revision_number": 0, "project_id": "13e063fab0044afeafaff2049f9b1404"}, {"id": "7bb4b7ac-583e-4b83-95c1-ef0b4fb2d1fb", "tenant_id": "13e063fab0044afeafaff2049f9b1404", "security_group_id": "3c8f49bf-5ed2-4fd3-993a-a31bcb8b9c37", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:16:06Z", "updated_at": "2020-12-14T02:16:06Z", "revision_number": 0, "project_id": "13e063fab0044afeafaff2049f9b1404"}, {"id": "ae86de1b-9eb3-4608-acbb-9047d75becf5", "tenant_id": "13e063fab0044afeafaff2049f9b1404", "security_group_id": "3c8f49bf-5ed2-4fd3-993a-a31bcb8b9c37", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:16:06Z", "updated_at": "2020-12-14T02:16:06Z", "revision_number": 0, "project_id": "13e063fab0044afeafaff2049f9b1404"}], "tags": [], "created_at": "2020-12-14T02:16:06Z", "updated_at": "2020-12-14T02:16:06Z", "revision_number": 1, "project_id": "13e063fab0044afeafaff2049f9b1404"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:08.441 197 INFO tempest.lib.common.rest_client [req-1f11fa14-6a9d-4767-93ab-b452bebf88bc ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/3c8f49bf-5ed2-4fd3-993a-a31bcb8b9c37 0.171s 2020-12-14 02:23:08.444 197 DEBUG tempest.lib.common.rest_client [req-1f11fa14-6a9d-4767-93ab-b452bebf88bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-1f11fa14-6a9d-4767-93ab-b452bebf88bc', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/3c8f49bf-5ed2-4fd3-993a-a31bcb8b9c37'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:08.758 197 INFO tempest.lib.common.rest_client [req-f6bf75b9-602b-4859-a3bb-75d461ae3c26 ] Request (MiscPolicyActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/13e063fab0044afeafaff2049f9b1404 0.309s 2020-12-14 02:23:08.760 197 DEBUG tempest.lib.common.rest_client [req-f6bf75b9-602b-4859-a3bb-75d461ae3c26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6bf75b9-602b-4859-a3bb-75d461ae3c26', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/13e063fab0044afeafaff2049f9b1404'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:08.886 197 INFO tempest.lib.common.rest_client [req-df5c9f8a-a556-412c-8842-7d95e393d135 ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:23:08.890 197 DEBUG tempest.lib.common.rest_client [req-df5c9f8a-a556-412c-8842-7d95e393d135 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df5c9f8a-a556-412c-8842-7d95e393d135', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["dwwhNYViSgefXNQX9PDXXg"], "expires_at": "2020-12-14T03:23:08.000000Z", "issued_at": "2020-12-14T02:23:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:08.996 197 INFO tempest.lib.common.rest_client [req-a24d8f1c-7bf8-4e1a-bffa-4b8d8267e06f ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:23:08.998 197 DEBUG tempest.lib.common.rest_client [req-a24d8f1c-7bf8-4e1a-bffa-4b8d8267e06f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a24d8f1c-7bf8-4e1a-bffa-4b8d8267e06f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["VqVWvXGHRsKqMGoN55RZYQ"], "expires_at": "2020-12-14T03:23:08.000000Z", "issued_at": "2020-12-14T02:23:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:09.072 197 INFO tempest.lib.common.rest_client [req-b4a054d4-e9d2-4703-947d-7ef37c62246d ] Request (ImagesMemberRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.066s 2020-12-14 02:23:09.075 197 DEBUG tempest.lib.common.rest_client [req-b4a054d4-e9d2-4703-947d-7ef37c62246d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4a054d4-e9d2-4703-947d-7ef37c62246d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:09.191 197 INFO tempest.lib.common.rest_client [req-863a749d-a8b4-474b-aa39-daa2c059ee84 ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.109s 2020-12-14 02:23:09.195 197 DEBUG tempest.lib.common.rest_client [req-863a749d-a8b4-474b-aa39-daa2c059ee84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImagesMemberRbacTest-671289478-desc", "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-671289478"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-863a749d-a8b4-474b-aa39-daa2c059ee84', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "f0cc19da99ee433abb952bd0cf5fe71d", "name": "tempest-ImagesMemberRbacTest-671289478", "domain_id": "default", "description": "tempest-ImagesMemberRbacTest-671289478-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:09.331 197 INFO tempest.lib.common.rest_client [req-78f2bf30-1ac0-44b1-a34b-b11ea93fe391 ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.127s 2020-12-14 02:23:09.335 197 DEBUG tempest.lib.common.rest_client [req-78f2bf30-1ac0-44b1-a34b-b11ea93fe391 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImagesMemberRbacTest-671289478", "password": "Z9%=U5Y9ELSFcsR", "project_id": "f0cc19da99ee433abb952bd0cf5fe71d", "email": "tempest-ImagesMemberRbacTest-1604995265@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '395', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78f2bf30-1ac0-44b1-a34b-b11ea93fe391', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "f0cc19da99ee433abb952bd0cf5fe71d", "email": "tempest-ImagesMemberRbacTest-1604995265@example.com", "id": "5b975168bff5441d9c4992ff3767852b", "name": "tempest-ImagesMemberRbacTest-671289478", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/5b975168bff5441d9c4992ff3767852b"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:09.407 197 INFO tempest.lib.common.rest_client [req-edbcfca6-2a25-4ee9-827b-947969304aba ] Request (ImagesMemberRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:23:09.410 197 DEBUG tempest.lib.common.rest_client [req-edbcfca6-2a25-4ee9-827b-947969304aba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-edbcfca6-2a25-4ee9-827b-947969304aba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:09.453 189 INFO tempest.lib.common.rest_client [req-4b078521-cd5f-4363-bace-ce39fd284bb8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.209s 2020-12-14 02:23:09.456 189 DEBUG tempest.lib.common.rest_client [req-4b078521-cd5f-4363-bace-ce39fd284bb8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4b078521-cd5f-4363-bace-ce39fd284bb8', 'x-compute-request-id': 'req-4b078521-cd5f-4363-bace-ce39fd284bb8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:09.484 197 INFO tempest.lib.common.rest_client [req-4fba0b4b-f700-4941-9264-0066033a02c1 ] Request (ImagesMemberRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:23:09.487 197 DEBUG tempest.lib.common.rest_client [req-4fba0b4b-f700-4941-9264-0066033a02c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4fba0b4b-f700-4941-9264-0066033a02c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:09.586 197 INFO tempest.lib.common.rest_client [req-51ab00c3-44ef-4c22-9ee5-1ed809510eb2 ] Request (ImagesMemberRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles/72a4576c553448cd941b052c1ca0cf2d 0.088s 2020-12-14 02:23:09.589 197 DEBUG tempest.lib.common.rest_client [req-51ab00c3-44ef-4c22-9ee5-1ed809510eb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51ab00c3-44ef-4c22-9ee5-1ed809510eb2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:09.592 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesMemberRbacTest-671289478', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'f0cc19da99ee433abb952bd0cf5fe71d', 'project_name': 'tempest-ImagesMemberRbacTest-671289478', 'tenant_id': 'f0cc19da99ee433abb952bd0cf5fe71d', 'tenant_name': 'tempest-ImagesMemberRbacTest-671289478', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5b975168bff5441d9c4992ff3767852b'}, Network: None, Subnet: None, Router: None 2020-12-14 02:23:09.595 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesMemberRbacTest-671289478', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'f0cc19da99ee433abb952bd0cf5fe71d', 'project_name': 'tempest-ImagesMemberRbacTest-671289478', 'tenant_id': 'f0cc19da99ee433abb952bd0cf5fe71d', 'tenant_name': 'tempest-ImagesMemberRbacTest-671289478', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5b975168bff5441d9c4992ff3767852b'}, Network: None, Subnet: None, Router: None 2020-12-14 02:23:09.769 197 INFO tempest.lib.common.rest_client [req-4acd5b8e-d2cb-4fa7-9940-396c6717bc09 ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.121s 2020-12-14 02:23:09.772 197 DEBUG tempest.lib.common.rest_client [req-4acd5b8e-d2cb-4fa7-9940-396c6717bc09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4acd5b8e-d2cb-4fa7-9940-396c6717bc09', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5b975168bff5441d9c4992ff3767852b", "name": "tempest-ImagesMemberRbacTest-671289478", "password_expires_at": null}, "audit_ids": ["Rjd_Z0W_TAmgLXgpMooiZA"], "expires_at": "2020-12-14T03:23:09.000000Z", "issued_at": "2020-12-14T02:23:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cc19da99ee433abb952bd0cf5fe71d", "name": "tempest-ImagesMemberRbacTest-671289478"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:09.896 197 INFO tempest.lib.common.rest_client [req-f98e248e-ffec-41d7-ad1a-14260a3e88f3 ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.116s 2020-12-14 02:23:09.898 197 DEBUG tempest.lib.common.rest_client [req-f98e248e-ffec-41d7-ad1a-14260a3e88f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImagesMemberRbacTest-599494834-desc", "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-599494834"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f98e248e-ffec-41d7-ad1a-14260a3e88f3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "3eba558c88b8488d81dcf4e16d639bd9", "name": "tempest-ImagesMemberRbacTest-599494834", "domain_id": "default", "description": "tempest-ImagesMemberRbacTest-599494834-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/3eba558c88b8488d81dcf4e16d639bd9"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:10.029 197 INFO tempest.lib.common.rest_client [req-5ca096c0-20f3-46ae-a233-2323641a1efb ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.123s 2020-12-14 02:23:10.032 197 DEBUG tempest.lib.common.rest_client [req-5ca096c0-20f3-46ae-a233-2323641a1efb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImagesMemberRbacTest-599494834", "password": "B8*OhK^894r6^iE", "project_id": "3eba558c88b8488d81dcf4e16d639bd9", "email": "tempest-ImagesMemberRbacTest-1214071260@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '395', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ca096c0-20f3-46ae-a233-2323641a1efb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "3eba558c88b8488d81dcf4e16d639bd9", "email": "tempest-ImagesMemberRbacTest-1214071260@example.com", "id": "5e7b95b68120445b83555f983677e1a5", "name": "tempest-ImagesMemberRbacTest-599494834", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/5e7b95b68120445b83555f983677e1a5"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:10.109 197 INFO tempest.lib.common.rest_client [req-c9ba89ec-bdae-491e-a72b-1116eb6a5663 ] Request (ImagesMemberRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-12-14 02:23:10.112 197 DEBUG tempest.lib.common.rest_client [req-c9ba89ec-bdae-491e-a72b-1116eb6a5663 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9ba89ec-bdae-491e-a72b-1116eb6a5663', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:10.178 197 INFO tempest.lib.common.rest_client [req-32cbc4d1-8c14-489d-9ad7-3f15d49d2302 ] Request (ImagesMemberRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:23:10.180 197 DEBUG tempest.lib.common.rest_client [req-32cbc4d1-8c14-489d-9ad7-3f15d49d2302 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32cbc4d1-8c14-489d-9ad7-3f15d49d2302', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:10.276 197 INFO tempest.lib.common.rest_client [req-06766712-4dc7-493e-b3df-866ac2ceb573 ] Request (ImagesMemberRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3eba558c88b8488d81dcf4e16d639bd9/users/5e7b95b68120445b83555f983677e1a5/roles/72a4576c553448cd941b052c1ca0cf2d 0.088s 2020-12-14 02:23:10.279 197 DEBUG tempest.lib.common.rest_client [req-06766712-4dc7-493e-b3df-866ac2ceb573 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06766712-4dc7-493e-b3df-866ac2ceb573', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3eba558c88b8488d81dcf4e16d639bd9/users/5e7b95b68120445b83555f983677e1a5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:10.282 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesMemberRbacTest-599494834', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3eba558c88b8488d81dcf4e16d639bd9', 'project_name': 'tempest-ImagesMemberRbacTest-599494834', 'tenant_id': '3eba558c88b8488d81dcf4e16d639bd9', 'tenant_name': 'tempest-ImagesMemberRbacTest-599494834', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5e7b95b68120445b83555f983677e1a5'}, Network: None, Subnet: None, Router: None 2020-12-14 02:23:10.284 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesMemberRbacTest-599494834', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3eba558c88b8488d81dcf4e16d639bd9', 'project_name': 'tempest-ImagesMemberRbacTest-599494834', 'tenant_id': '3eba558c88b8488d81dcf4e16d639bd9', 'tenant_name': 'tempest-ImagesMemberRbacTest-599494834', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5e7b95b68120445b83555f983677e1a5'}, Network: None, Subnet: None, Router: None 2020-12-14 02:23:10.455 197 INFO tempest.lib.common.rest_client [req-db12c38f-0ed1-4550-943c-9bfe1cfed077 ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-12-14 02:23:10.458 197 DEBUG tempest.lib.common.rest_client [req-db12c38f-0ed1-4550-943c-9bfe1cfed077 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db12c38f-0ed1-4550-943c-9bfe1cfed077', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5e7b95b68120445b83555f983677e1a5", "name": "tempest-ImagesMemberRbacTest-599494834", "password_expires_at": null}, "audit_ids": ["P2V5PIO_SFq748OdfZ_NOA"], "expires_at": "2020-12-14T03:23:10.000000Z", "issued_at": "2020-12-14T02:23:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3eba558c88b8488d81dcf4e16d639bd9", "name": "tempest-ImagesMemberRbacTest-599494834"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3eba558c88b8488d81dcf4e16d639bd9", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3eba558c88b8488d81dcf4e16d639bd9", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3eba558c88b8488d81dcf4e16d639bd9", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3eba558c88b8488d81dcf4e16d639bd9", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3eba558c88b8488d81dcf4e16d639bd9", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3eba558c88b8488d81dcf4e16d639bd9", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:10.554 197 INFO tempest.lib.common.rest_client [req-ef3e75bc-1588-439b-962e-7647a4e7d16a ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-14 02:23:10.557 197 DEBUG tempest.lib.common.rest_client [req-ef3e75bc-1588-439b-962e-7647a4e7d16a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef3e75bc-1588-439b-962e-7647a4e7d16a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["YWZDVoV5S4-H1A9dRNdISA"], "expires_at": "2020-12-14T03:23:10.000000Z", "issued_at": "2020-12-14T02:23:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:10.679 197 INFO tempest.lib.common.rest_client [req-a9fadc33-dd7f-49a6-b1f6-54daa0bda3ed ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:23:10.682 197 DEBUG tempest.lib.common.rest_client [req-a9fadc33-dd7f-49a6-b1f6-54daa0bda3ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9fadc33-dd7f-49a6-b1f6-54daa0bda3ed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["sP8yR5CJRXe-omZQ3Zy70g"], "expires_at": "2020-12-14T03:23:10.000000Z", "issued_at": "2020-12-14T02:23:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:10.744 197 INFO tempest.lib.common.rest_client [req-1638f078-c26e-4fcb-a287-77edcc3b4a0b ] Request (ImagesMemberRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.056s 2020-12-14 02:23:10.747 197 DEBUG tempest.lib.common.rest_client [req-1638f078-c26e-4fcb-a287-77edcc3b4a0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1638f078-c26e-4fcb-a287-77edcc3b4a0b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:10.798 189 INFO tempest.lib.common.rest_client [req-db38ef40-bb98-4de2-8bc2-0129d58b44c5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.233s 2020-12-14 02:23:10.802 189 DEBUG tempest.lib.common.rest_client [req-db38ef40-bb98-4de2-8bc2-0129d58b44c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-db38ef40-bb98-4de2-8bc2-0129d58b44c5', 'x-compute-request-id': 'req-db38ef40-bb98-4de2-8bc2-0129d58b44c5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:10.812 197 INFO tempest.lib.common.rest_client [req-c9213a17-f3ac-42fe-a8ed-533e38918731 ] Request (ImagesMemberRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:23:10.815 197 DEBUG tempest.lib.common.rest_client [req-c9213a17-f3ac-42fe-a8ed-533e38918731 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9213a17-f3ac-42fe-a8ed-533e38918731', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:10.818 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:23:10.821 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:10.882 197 INFO tempest.lib.common.rest_client [req-1308beac-429d-4c8f-a284-db7bf9c973fe ] Request (ImagesMemberRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles 0.055s 2020-12-14 02:23:10.885 197 DEBUG tempest.lib.common.rest_client [req-1308beac-429d-4c8f-a284-db7bf9c973fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1308beac-429d-4c8f-a284-db7bf9c973fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:10.955 197 INFO tempest.lib.common.rest_client [req-ff004757-1f78-450e-a751-dd02db2961f8 ] Request (ImagesMemberRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles/72a4576c553448cd941b052c1ca0cf2d 0.064s 2020-12-14 02:23:10.958 197 DEBUG tempest.lib.common.rest_client [req-ff004757-1f78-450e-a751-dd02db2961f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff004757-1f78-450e-a751-dd02db2961f8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:11.068 197 INFO tempest.lib.common.rest_client [req-2022c907-e37f-4e08-9d13-17d016c4f66f ] Request (ImagesMemberRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles/a629c95d64b3416fb80ae90af4f69c05 0.103s 2020-12-14 02:23:11.070 197 DEBUG tempest.lib.common.rest_client [req-2022c907-e37f-4e08-9d13-17d016c4f66f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2022c907-e37f-4e08-9d13-17d016c4f66f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:12.142 189 INFO tempest.lib.common.rest_client [req-6d0224cb-c009-4042-bd0a-b1ce7be32719 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.232s 2020-12-14 02:23:12.145 189 DEBUG tempest.lib.common.rest_client [req-6d0224cb-c009-4042-bd0a-b1ce7be32719 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6d0224cb-c009-4042-bd0a-b1ce7be32719', 'x-compute-request-id': 'req-6d0224cb-c009-4042-bd0a-b1ce7be32719', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:12.182 197 INFO tempest.lib.common.rest_client [req-31d13977-c063-4854-888c-2b2aefe9d766 ] Request (ImagesMemberRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-14 02:23:12.185 197 DEBUG tempest.lib.common.rest_client [req-31d13977-c063-4854-888c-2b2aefe9d766 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31d13977-c063-4854-888c-2b2aefe9d766', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5b975168bff5441d9c4992ff3767852b", "name": "tempest-ImagesMemberRbacTest-671289478", "password_expires_at": null}, "audit_ids": ["b-VOCXJXSNi6Y16BtRoijg"], "expires_at": "2020-12-14T03:23:12.000000Z", "issued_at": "2020-12-14T02:23:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cc19da99ee433abb952bd0cf5fe71d", "name": "tempest-ImagesMemberRbacTest-671289478"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:12.193 197 WARNING tempest.lib.common.rest_client [-] Deprecated: "tenant_id" property is deprecated for removal, use "project_id" instead 2020-12-14 02:23:12.202 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:12.209 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:23:12.218 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_member, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:12.423 197 INFO tempest.lib.common.rest_client [req-f3bb41b2-346d-4b2d-a447-95d7b22284a1 ] Request (ImagesMemberRbacTest:test_add_image_member): 201 POST http://172.30.13.94/image/v2/images 0.198s 2020-12-14 02:23:12.427 197 DEBUG tempest.lib.common.rest_client [req-f3bb41b2-346d-4b2d-a447-95d7b22284a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesMemberRbacTest-image-1300952737"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '649', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/cdf6f30b-b6e7-4c54-9102-29f51d3d8939', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-f3bb41b2-346d-4b2d-a447-95d7b22284a1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesMemberRbacTest-image-1300952737", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "f0cc19da99ee433abb952bd0cf5fe71d", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "cdf6f30b-b6e7-4c54-9102-29f51d3d8939", "created_at": "2020-12-14T02:23:12Z", "updated_at": "2020-12-14T02:23:12Z", "tags": [], "self": "/v2/images/cdf6f30b-b6e7-4c54-9102-29f51d3d8939", "file": "/v2/images/cdf6f30b-b6e7-4c54-9102-29f51d3d8939/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:12.431 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:12.555 197 INFO tempest.lib.common.rest_client [req-da7b85a2-e5ed-45b2-8699-65ea34ea3bd3 ] Request (ImagesMemberRbacTest:test_add_image_member): 200 GET http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles 0.118s 2020-12-14 02:23:12.559 197 DEBUG tempest.lib.common.rest_client [req-da7b85a2-e5ed-45b2-8699-65ea34ea3bd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da7b85a2-e5ed-45b2-8699-65ea34ea3bd3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:12.617 197 INFO tempest.lib.common.rest_client [req-75e6b5f0-d461-4580-a7cb-c719303fcde1 ] Request (ImagesMemberRbacTest:test_add_image_member): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:23:12.621 197 DEBUG tempest.lib.common.rest_client [req-75e6b5f0-d461-4580-a7cb-c719303fcde1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-75e6b5f0-d461-4580-a7cb-c719303fcde1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5b975168bff5441d9c4992ff3767852b", "name": "tempest-ImagesMemberRbacTest-671289478", "password_expires_at": null}, "audit_ids": ["QMAG-yVoTbqeEVp3qqtS6g"], "expires_at": "2020-12-14T03:23:12.000000Z", "issued_at": "2020-12-14T02:23:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cc19da99ee433abb952bd0cf5fe71d", "name": "tempest-ImagesMemberRbacTest-671289478"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:12.768 197 INFO tempest.lib.common.rest_client [req-283d92a1-443c-4902-9eab-108b8f56753c ] Request (ImagesMemberRbacTest:test_add_image_member): 200 POST http://172.30.13.94/image/v2/images/cdf6f30b-b6e7-4c54-9102-29f51d3d8939/members 0.135s 2020-12-14 02:23:12.771 197 DEBUG tempest.lib.common.rest_client [req-283d92a1-443c-4902-9eab-108b8f56753c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"member": "3eba558c88b8488d81dcf4e16d639bd9"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '230', 'content-type': 'application/json', 'x-openstack-request-id': 'req-283d92a1-443c-4902-9eab-108b8f56753c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/cdf6f30b-b6e7-4c54-9102-29f51d3d8939/members'} Body: b'{"member_id": "3eba558c88b8488d81dcf4e16d639bd9", "image_id": "cdf6f30b-b6e7-4c54-9102-29f51d3d8939", "status": "pending", "created_at": "2020-12-14T02:23:12Z", "updated_at": "2020-12-14T02:23:12Z", "schema": "/v2/schemas/member"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:12.774 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:12.850 197 INFO tempest.lib.common.rest_client [req-66e86b61-3211-4a70-9f8f-f29843c4b644 ] Request (ImagesMemberRbacTest:test_add_image_member): 200 GET http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles 0.070s 2020-12-14 02:23:12.853 197 DEBUG tempest.lib.common.rest_client [req-66e86b61-3211-4a70-9f8f-f29843c4b644 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66e86b61-3211-4a70-9f8f-f29843c4b644', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:12.909 197 INFO tempest.lib.common.rest_client [req-d20fc20e-4ea4-4dca-8a83-7b869b1b7f5d ] Request (ImagesMemberRbacTest:test_add_image_member): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:23:12.912 197 DEBUG tempest.lib.common.rest_client [req-d20fc20e-4ea4-4dca-8a83-7b869b1b7f5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d20fc20e-4ea4-4dca-8a83-7b869b1b7f5d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5b975168bff5441d9c4992ff3767852b", "name": "tempest-ImagesMemberRbacTest-671289478", "password_expires_at": null}, "audit_ids": ["IfqUL-WgSHOiYX_omZcJ2w"], "expires_at": "2020-12-14T03:23:12.000000Z", "issued_at": "2020-12-14T02:23:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cc19da99ee433abb952bd0cf5fe71d", "name": "tempest-ImagesMemberRbacTest-671289478"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:12.927 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:12.932 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:23:12.941 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_member, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:13.071 197 INFO tempest.lib.common.rest_client [req-11ba9da1-115e-4d57-972e-77d47111899b ] Request (ImagesMemberRbacTest:test_delete_image_member): 201 POST http://172.30.13.94/image/v2/images 0.124s 2020-12-14 02:23:13.074 197 DEBUG tempest.lib.common.rest_client [req-11ba9da1-115e-4d57-972e-77d47111899b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesMemberRbacTest-image-262820652"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '648', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/5c7cdb33-fcca-4acb-932f-2d41be02bfc2', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-11ba9da1-115e-4d57-972e-77d47111899b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesMemberRbacTest-image-262820652", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "f0cc19da99ee433abb952bd0cf5fe71d", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "5c7cdb33-fcca-4acb-932f-2d41be02bfc2", "created_at": "2020-12-14T02:23:13Z", "updated_at": "2020-12-14T02:23:13Z", "tags": [], "self": "/v2/images/5c7cdb33-fcca-4acb-932f-2d41be02bfc2", "file": "/v2/images/5c7cdb33-fcca-4acb-932f-2d41be02bfc2/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:13.140 197 INFO tempest.lib.common.rest_client [req-13a8edfb-1052-4129-aafe-4faf2461b651 ] Request (ImagesMemberRbacTest:test_delete_image_member): 200 POST http://172.30.13.94/image/v2/images/5c7cdb33-fcca-4acb-932f-2d41be02bfc2/members 0.058s 2020-12-14 02:23:13.142 197 DEBUG tempest.lib.common.rest_client [req-13a8edfb-1052-4129-aafe-4faf2461b651 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"member": "3eba558c88b8488d81dcf4e16d639bd9"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '230', 'content-type': 'application/json', 'x-openstack-request-id': 'req-13a8edfb-1052-4129-aafe-4faf2461b651', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/5c7cdb33-fcca-4acb-932f-2d41be02bfc2/members'} Body: b'{"member_id": "3eba558c88b8488d81dcf4e16d639bd9", "image_id": "5c7cdb33-fcca-4acb-932f-2d41be02bfc2", "status": "pending", "created_at": "2020-12-14T02:23:13Z", "updated_at": "2020-12-14T02:23:13Z", "schema": "/v2/schemas/member"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:13.145 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:13.220 197 INFO tempest.lib.common.rest_client [req-24a54d34-073f-43ed-a433-259027effae3 ] Request (ImagesMemberRbacTest:test_delete_image_member): 200 GET http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles 0.068s 2020-12-14 02:23:13.223 197 DEBUG tempest.lib.common.rest_client [req-24a54d34-073f-43ed-a433-259027effae3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24a54d34-073f-43ed-a433-259027effae3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:13.278 197 INFO tempest.lib.common.rest_client [req-9b7c2e42-7315-4a5f-acd3-e9bfc356f6c0 ] Request (ImagesMemberRbacTest:test_delete_image_member): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:23:13.282 197 DEBUG tempest.lib.common.rest_client [req-9b7c2e42-7315-4a5f-acd3-e9bfc356f6c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b7c2e42-7315-4a5f-acd3-e9bfc356f6c0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5b975168bff5441d9c4992ff3767852b", "name": "tempest-ImagesMemberRbacTest-671289478", "password_expires_at": null}, "audit_ids": ["ODCzDd27SrmA1B5Kbq1oAw"], "expires_at": "2020-12-14T03:23:13.000000Z", "issued_at": "2020-12-14T02:23:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cc19da99ee433abb952bd0cf5fe71d", "name": "tempest-ImagesMemberRbacTest-671289478"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:13.413 197 INFO tempest.lib.common.rest_client [req-79bbd9e5-9b4e-4f1f-9a90-2530be821102 ] Request (ImagesMemberRbacTest:test_delete_image_member): 204 DELETE http://172.30.13.94/image/v2/images/5c7cdb33-fcca-4acb-932f-2d41be02bfc2/members/3eba558c88b8488d81dcf4e16d639bd9 0.123s 2020-12-14 02:23:13.417 197 DEBUG tempest.lib.common.rest_client [req-79bbd9e5-9b4e-4f1f-9a90-2530be821102 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-openstack-request-id': 'req-79bbd9e5-9b4e-4f1f-9a90-2530be821102', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/5c7cdb33-fcca-4acb-932f-2d41be02bfc2/members/3eba558c88b8488d81dcf4e16d639bd9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:13.421 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:13.494 189 INFO tempest.lib.common.rest_client [req-e48d5c9a-5437-4af9-bd2f-05ca735165a2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.241s 2020-12-14 02:23:13.498 189 DEBUG tempest.lib.common.rest_client [req-e48d5c9a-5437-4af9-bd2f-05ca735165a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e48d5c9a-5437-4af9-bd2f-05ca735165a2', 'x-compute-request-id': 'req-e48d5c9a-5437-4af9-bd2f-05ca735165a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:13.498 197 INFO tempest.lib.common.rest_client [req-ef642964-1271-4d0b-a901-cffeba4cd83b ] Request (ImagesMemberRbacTest:test_delete_image_member): 200 GET http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles 0.069s 2020-12-14 02:23:13.501 197 DEBUG tempest.lib.common.rest_client [req-ef642964-1271-4d0b-a901-cffeba4cd83b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef642964-1271-4d0b-a901-cffeba4cd83b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:13.549 197 INFO tempest.lib.common.rest_client [req-c9f1a92e-231d-40b2-8052-1b41cb07312c ] Request (ImagesMemberRbacTest:test_delete_image_member): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:23:13.553 197 DEBUG tempest.lib.common.rest_client [req-c9f1a92e-231d-40b2-8052-1b41cb07312c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9f1a92e-231d-40b2-8052-1b41cb07312c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5b975168bff5441d9c4992ff3767852b", "name": "tempest-ImagesMemberRbacTest-671289478", "password_expires_at": null}, "audit_ids": ["MuWJyCJTSlCGZQig4KDl2A"], "expires_at": "2020-12-14T03:23:13.000000Z", "issued_at": "2020-12-14T02:23:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cc19da99ee433abb952bd0cf5fe71d", "name": "tempest-ImagesMemberRbacTest-671289478"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:13.568 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:13.572 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:23:13.581 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_members, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:13.713 197 INFO tempest.lib.common.rest_client [req-1154df0a-62a4-4351-8c4e-abf27968ff53 ] Request (ImagesMemberRbacTest:test_list_image_members): 201 POST http://172.30.13.94/image/v2/images 0.126s 2020-12-14 02:23:13.717 197 DEBUG tempest.lib.common.rest_client [req-1154df0a-62a4-4351-8c4e-abf27968ff53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesMemberRbacTest-image-783107836"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '648', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/53b26a84-473e-4a18-a549-6f737a929de4', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-1154df0a-62a4-4351-8c4e-abf27968ff53', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesMemberRbacTest-image-783107836", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "f0cc19da99ee433abb952bd0cf5fe71d", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "53b26a84-473e-4a18-a549-6f737a929de4", "created_at": "2020-12-14T02:23:14Z", "updated_at": "2020-12-14T02:23:14Z", "tags": [], "self": "/v2/images/53b26a84-473e-4a18-a549-6f737a929de4", "file": "/v2/images/53b26a84-473e-4a18-a549-6f737a929de4/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:13.789 197 INFO tempest.lib.common.rest_client [req-be360453-aafc-40fa-be59-496b999492b7 ] Request (ImagesMemberRbacTest:test_list_image_members): 200 POST http://172.30.13.94/image/v2/images/53b26a84-473e-4a18-a549-6f737a929de4/members 0.065s 2020-12-14 02:23:13.793 197 DEBUG tempest.lib.common.rest_client [req-be360453-aafc-40fa-be59-496b999492b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"member": "3eba558c88b8488d81dcf4e16d639bd9"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '230', 'content-type': 'application/json', 'x-openstack-request-id': 'req-be360453-aafc-40fa-be59-496b999492b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/53b26a84-473e-4a18-a549-6f737a929de4/members'} Body: b'{"member_id": "3eba558c88b8488d81dcf4e16d639bd9", "image_id": "53b26a84-473e-4a18-a549-6f737a929de4", "status": "pending", "created_at": "2020-12-14T02:23:13Z", "updated_at": "2020-12-14T02:23:13Z", "schema": "/v2/schemas/member"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:13.797 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:13.925 197 INFO tempest.lib.common.rest_client [req-5afddda0-959d-4b37-9866-f7ba454bff42 ] Request (ImagesMemberRbacTest:test_list_image_members): 200 GET http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles 0.121s 2020-12-14 02:23:13.930 197 DEBUG tempest.lib.common.rest_client [req-5afddda0-959d-4b37-9866-f7ba454bff42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5afddda0-959d-4b37-9866-f7ba454bff42', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:13.985 197 INFO tempest.lib.common.rest_client [req-cb11ea63-f2c9-4d63-95f7-e6727bbd5364 ] Request (ImagesMemberRbacTest:test_list_image_members): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:23:13.989 197 DEBUG tempest.lib.common.rest_client [req-cb11ea63-f2c9-4d63-95f7-e6727bbd5364 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb11ea63-f2c9-4d63-95f7-e6727bbd5364', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5b975168bff5441d9c4992ff3767852b", "name": "tempest-ImagesMemberRbacTest-671289478", "password_expires_at": null}, "audit_ids": ["IWpxKT48QKKsll2p1pxsXQ"], "expires_at": "2020-12-14T03:23:13.000000Z", "issued_at": "2020-12-14T02:23:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cc19da99ee433abb952bd0cf5fe71d", "name": "tempest-ImagesMemberRbacTest-671289478"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:14.087 197 INFO tempest.lib.common.rest_client [req-c2517513-d5d3-42a7-b1dc-ef09054b4c0f ] Request (ImagesMemberRbacTest:test_list_image_members): 200 GET http://172.30.13.94/image/v2/images/53b26a84-473e-4a18-a549-6f737a929de4/members 0.090s 2020-12-14 02:23:14.090 197 DEBUG tempest.lib.common.rest_client [req-c2517513-d5d3-42a7-b1dc-ef09054b4c0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '278', 'content-type': 'application/json', 'x-openstack-request-id': 'req-c2517513-d5d3-42a7-b1dc-ef09054b4c0f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/53b26a84-473e-4a18-a549-6f737a929de4/members'} Body: b'{"members": [{"member_id": "3eba558c88b8488d81dcf4e16d639bd9", "image_id": "53b26a84-473e-4a18-a549-6f737a929de4", "status": "pending", "created_at": "2020-12-14T02:23:14Z", "updated_at": "2020-12-14T02:23:14Z", "schema": "/v2/schemas/member"}], "schema": "/v2/schemas/members"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:14.094 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:14.164 197 INFO tempest.lib.common.rest_client [req-c8d0a603-b289-48ff-a337-72851a45fc82 ] Request (ImagesMemberRbacTest:test_list_image_members): 200 GET http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles 0.064s 2020-12-14 02:23:14.167 197 DEBUG tempest.lib.common.rest_client [req-c8d0a603-b289-48ff-a337-72851a45fc82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8d0a603-b289-48ff-a337-72851a45fc82', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:14.216 197 INFO tempest.lib.common.rest_client [req-3ff54d26-8245-486a-be83-156efb2cd345 ] Request (ImagesMemberRbacTest:test_list_image_members): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:23:14.219 197 DEBUG tempest.lib.common.rest_client [req-3ff54d26-8245-486a-be83-156efb2cd345 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ff54d26-8245-486a-be83-156efb2cd345', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5b975168bff5441d9c4992ff3767852b", "name": "tempest-ImagesMemberRbacTest-671289478", "password_expires_at": null}, "audit_ids": ["fcorcwZDQY-DSj12ciHhxw"], "expires_at": "2020-12-14T03:23:14.000000Z", "issued_at": "2020-12-14T02:23:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cc19da99ee433abb952bd0cf5fe71d", "name": "tempest-ImagesMemberRbacTest-671289478"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:14.235 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:14.240 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:23:14.249 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_member, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:14.370 197 INFO tempest.lib.common.rest_client [req-5091b8ff-e6d2-4738-a81a-356c45edfb87 ] Request (ImagesMemberRbacTest:test_show_image_member): 201 POST http://172.30.13.94/image/v2/images 0.114s 2020-12-14 02:23:14.374 197 DEBUG tempest.lib.common.rest_client [req-5091b8ff-e6d2-4738-a81a-356c45edfb87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesMemberRbacTest-image-1363427682"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '649', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/b1b8a2f9-3651-4522-a2c1-af7f31994033', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-5091b8ff-e6d2-4738-a81a-356c45edfb87', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesMemberRbacTest-image-1363427682", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "f0cc19da99ee433abb952bd0cf5fe71d", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "b1b8a2f9-3651-4522-a2c1-af7f31994033", "created_at": "2020-12-14T02:23:14Z", "updated_at": "2020-12-14T02:23:14Z", "tags": [], "self": "/v2/images/b1b8a2f9-3651-4522-a2c1-af7f31994033", "file": "/v2/images/b1b8a2f9-3651-4522-a2c1-af7f31994033/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:14.440 197 INFO tempest.lib.common.rest_client [req-b9ba4ba6-6db3-4853-a213-27530ab90a1f ] Request (ImagesMemberRbacTest:test_show_image_member): 200 POST http://172.30.13.94/image/v2/images/b1b8a2f9-3651-4522-a2c1-af7f31994033/members 0.059s 2020-12-14 02:23:14.443 197 DEBUG tempest.lib.common.rest_client [req-b9ba4ba6-6db3-4853-a213-27530ab90a1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"member": "3eba558c88b8488d81dcf4e16d639bd9"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '230', 'content-type': 'application/json', 'x-openstack-request-id': 'req-b9ba4ba6-6db3-4853-a213-27530ab90a1f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/b1b8a2f9-3651-4522-a2c1-af7f31994033/members'} Body: b'{"member_id": "3eba558c88b8488d81dcf4e16d639bd9", "image_id": "b1b8a2f9-3651-4522-a2c1-af7f31994033", "status": "pending", "created_at": "2020-12-14T02:23:14Z", "updated_at": "2020-12-14T02:23:14Z", "schema": "/v2/schemas/member"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:14.446 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:14.516 197 INFO tempest.lib.common.rest_client [req-bfe71b8c-9b2e-470c-a1ec-c7847337af1b ] Request (ImagesMemberRbacTest:test_show_image_member): 200 GET http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles 0.062s 2020-12-14 02:23:14.520 197 DEBUG tempest.lib.common.rest_client [req-bfe71b8c-9b2e-470c-a1ec-c7847337af1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bfe71b8c-9b2e-470c-a1ec-c7847337af1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:14.576 197 INFO tempest.lib.common.rest_client [req-0036962d-9c45-433d-91af-6a60af53bb0c ] Request (ImagesMemberRbacTest:test_show_image_member): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:23:14.578 197 DEBUG tempest.lib.common.rest_client [req-0036962d-9c45-433d-91af-6a60af53bb0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0036962d-9c45-433d-91af-6a60af53bb0c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5b975168bff5441d9c4992ff3767852b", "name": "tempest-ImagesMemberRbacTest-671289478", "password_expires_at": null}, "audit_ids": ["hhJDuybKQX2kk9wf9uDDiA"], "expires_at": "2020-12-14T03:23:14.000000Z", "issued_at": "2020-12-14T02:23:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cc19da99ee433abb952bd0cf5fe71d", "name": "tempest-ImagesMemberRbacTest-671289478"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:14.680 197 INFO tempest.lib.common.rest_client [req-476336b5-b7b5-4545-a993-1e7f0a8834e6 ] Request (ImagesMemberRbacTest:test_show_image_member): 200 GET http://172.30.13.94/image/v2/images/b1b8a2f9-3651-4522-a2c1-af7f31994033/members/3eba558c88b8488d81dcf4e16d639bd9 0.093s 2020-12-14 02:23:14.683 197 DEBUG tempest.lib.common.rest_client [req-476336b5-b7b5-4545-a993-1e7f0a8834e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '230', 'content-type': 'application/json', 'x-openstack-request-id': 'req-476336b5-b7b5-4545-a993-1e7f0a8834e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/b1b8a2f9-3651-4522-a2c1-af7f31994033/members/3eba558c88b8488d81dcf4e16d639bd9'} Body: b'{"member_id": "3eba558c88b8488d81dcf4e16d639bd9", "image_id": "b1b8a2f9-3651-4522-a2c1-af7f31994033", "status": "pending", "created_at": "2020-12-14T02:23:14Z", "updated_at": "2020-12-14T02:23:14Z", "schema": "/v2/schemas/member"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:14.686 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:14.753 197 INFO tempest.lib.common.rest_client [req-fa7c9a85-69fd-4bd3-b101-a6007e2422f7 ] Request (ImagesMemberRbacTest:test_show_image_member): 200 GET http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles 0.061s 2020-12-14 02:23:14.756 197 DEBUG tempest.lib.common.rest_client [req-fa7c9a85-69fd-4bd3-b101-a6007e2422f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa7c9a85-69fd-4bd3-b101-a6007e2422f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:14.811 197 INFO tempest.lib.common.rest_client [req-da435fd7-d511-4f32-94d8-7234225b979a ] Request (ImagesMemberRbacTest:test_show_image_member): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:23:14.815 197 DEBUG tempest.lib.common.rest_client [req-da435fd7-d511-4f32-94d8-7234225b979a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da435fd7-d511-4f32-94d8-7234225b979a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5b975168bff5441d9c4992ff3767852b", "name": "tempest-ImagesMemberRbacTest-671289478", "password_expires_at": null}, "audit_ids": ["dqXudAClS3C01Q5yzMZqgQ"], "expires_at": "2020-12-14T03:23:14.000000Z", "issued_at": "2020-12-14T02:23:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cc19da99ee433abb952bd0cf5fe71d", "name": "tempest-ImagesMemberRbacTest-671289478"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:14.830 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:14.834 197 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:23:14.843 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_member, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:14.893 189 INFO tempest.lib.common.rest_client [req-67fa967a-24c8-4c69-bffe-dee383ede4a6 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.289s 2020-12-14 02:23:14.896 189 DEBUG tempest.lib.common.rest_client [req-67fa967a-24c8-4c69-bffe-dee383ede4a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-67fa967a-24c8-4c69-bffe-dee383ede4a6', 'x-compute-request-id': 'req-67fa967a-24c8-4c69-bffe-dee383ede4a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:14.952 197 INFO tempest.lib.common.rest_client [req-1ddab714-d777-43a6-96fb-1ae3a00d35c3 ] Request (ImagesMemberRbacTest:test_update_image_member): 201 POST http://172.30.13.94/image/v2/images 0.103s 2020-12-14 02:23:14.955 197 DEBUG tempest.lib.common.rest_client [req-1ddab714-d777-43a6-96fb-1ae3a00d35c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"visibility": "shared", "name": "tempest-ImagesMemberRbacTest-image-247678063"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '648', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/55ec7b28-c158-4551-9925-c06c5338703a', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-1ddab714-d777-43a6-96fb-1ae3a00d35c3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesMemberRbacTest-image-247678063", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "f0cc19da99ee433abb952bd0cf5fe71d", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "55ec7b28-c158-4551-9925-c06c5338703a", "created_at": "2020-12-14T02:23:15Z", "updated_at": "2020-12-14T02:23:15Z", "tags": [], "self": "/v2/images/55ec7b28-c158-4551-9925-c06c5338703a", "file": "/v2/images/55ec7b28-c158-4551-9925-c06c5338703a/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:15.020 197 INFO tempest.lib.common.rest_client [req-427cc8e7-c1bc-4a46-bd60-80e99b81a293 ] Request (ImagesMemberRbacTest:test_update_image_member): 200 POST http://172.30.13.94/image/v2/images/55ec7b28-c158-4551-9925-c06c5338703a/members 0.057s 2020-12-14 02:23:15.024 197 DEBUG tempest.lib.common.rest_client [req-427cc8e7-c1bc-4a46-bd60-80e99b81a293 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"member": "f0cc19da99ee433abb952bd0cf5fe71d"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '230', 'content-type': 'application/json', 'x-openstack-request-id': 'req-427cc8e7-c1bc-4a46-bd60-80e99b81a293', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/55ec7b28-c158-4551-9925-c06c5338703a/members'} Body: b'{"member_id": "f0cc19da99ee433abb952bd0cf5fe71d", "image_id": "55ec7b28-c158-4551-9925-c06c5338703a", "status": "pending", "created_at": "2020-12-14T02:23:14Z", "updated_at": "2020-12-14T02:23:14Z", "schema": "/v2/schemas/member"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:15.072 197 INFO tempest.lib.common.rest_client [req-0fced48c-cfaa-4faa-b121-6ce69ab4b4e0 ] Request (ImagesMemberRbacTest:test_update_image_member): 200 PUT http://172.30.13.94/image/v2/images/55ec7b28-c158-4551-9925-c06c5338703a/members/f0cc19da99ee433abb952bd0cf5fe71d 0.041s 2020-12-14 02:23:15.075 197 DEBUG tempest.lib.common.rest_client [req-0fced48c-cfaa-4faa-b121-6ce69ab4b4e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"status": "accepted"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '231', 'content-type': 'application/json', 'x-openstack-request-id': 'req-0fced48c-cfaa-4faa-b121-6ce69ab4b4e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/55ec7b28-c158-4551-9925-c06c5338703a/members/f0cc19da99ee433abb952bd0cf5fe71d'} Body: b'{"member_id": "f0cc19da99ee433abb952bd0cf5fe71d", "image_id": "55ec7b28-c158-4551-9925-c06c5338703a", "status": "accepted", "created_at": "2020-12-14T02:23:15Z", "updated_at": "2020-12-14T02:23:15Z", "schema": "/v2/schemas/member"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:15.078 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:15.141 197 INFO tempest.lib.common.rest_client [req-b9dae719-ab07-4990-8dd0-65a29a38c333 ] Request (ImagesMemberRbacTest:test_update_image_member): 200 GET http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles 0.057s 2020-12-14 02:23:15.145 197 DEBUG tempest.lib.common.rest_client [req-b9dae719-ab07-4990-8dd0-65a29a38c333 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9dae719-ab07-4990-8dd0-65a29a38c333', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:15.197 197 INFO tempest.lib.common.rest_client [req-8dc03ff9-a0a8-4692-aa41-bef3c90ef650 ] Request (ImagesMemberRbacTest:test_update_image_member): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:23:15.200 197 DEBUG tempest.lib.common.rest_client [req-8dc03ff9-a0a8-4692-aa41-bef3c90ef650 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8dc03ff9-a0a8-4692-aa41-bef3c90ef650', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5b975168bff5441d9c4992ff3767852b", "name": "tempest-ImagesMemberRbacTest-671289478", "password_expires_at": null}, "audit_ids": ["2yAVNE_mTzis3mQx8Olcew"], "expires_at": "2020-12-14T03:23:15.000000Z", "issued_at": "2020-12-14T02:23:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cc19da99ee433abb952bd0cf5fe71d", "name": "tempest-ImagesMemberRbacTest-671289478"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:15.309 197 INFO tempest.lib.common.rest_client [req-f9124f02-8598-446b-919b-3a3e9d2c7c5a ] Request (ImagesMemberRbacTest:test_update_image_member): 200 PUT http://172.30.13.94/image/v2/images/55ec7b28-c158-4551-9925-c06c5338703a/members/f0cc19da99ee433abb952bd0cf5fe71d 0.101s 2020-12-14 02:23:15.312 197 DEBUG tempest.lib.common.rest_client [req-f9124f02-8598-446b-919b-3a3e9d2c7c5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"status": "pending"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '230', 'content-type': 'application/json', 'x-openstack-request-id': 'req-f9124f02-8598-446b-919b-3a3e9d2c7c5a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/55ec7b28-c158-4551-9925-c06c5338703a/members/f0cc19da99ee433abb952bd0cf5fe71d'} Body: b'{"member_id": "f0cc19da99ee433abb952bd0cf5fe71d", "image_id": "55ec7b28-c158-4551-9925-c06c5338703a", "status": "pending", "created_at": "2020-12-14T02:23:15Z", "updated_at": "2020-12-14T02:23:15Z", "schema": "/v2/schemas/member"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:15.315 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:15.388 197 INFO tempest.lib.common.rest_client [req-b52c6371-7bec-492c-ae10-829121b552e0 ] Request (ImagesMemberRbacTest:test_update_image_member): 200 GET http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles 0.067s 2020-12-14 02:23:15.392 197 DEBUG tempest.lib.common.rest_client [req-b52c6371-7bec-492c-ae10-829121b552e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b52c6371-7bec-492c-ae10-829121b552e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d/users/5b975168bff5441d9c4992ff3767852b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:15.442 197 INFO tempest.lib.common.rest_client [req-0ba1d8d5-b31b-46be-9275-95090dc09f98 ] Request (ImagesMemberRbacTest:test_update_image_member): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:23:15.445 197 DEBUG tempest.lib.common.rest_client [req-0ba1d8d5-b31b-46be-9275-95090dc09f98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ba1d8d5-b31b-46be-9275-95090dc09f98', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5b975168bff5441d9c4992ff3767852b", "name": "tempest-ImagesMemberRbacTest-671289478", "password_expires_at": null}, "audit_ids": ["PsxENuL7TPag7lw8n1M9Dg"], "expires_at": "2020-12-14T03:23:15.000000Z", "issued_at": "2020-12-14T02:23:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f0cc19da99ee433abb952bd0cf5fe71d", "name": "tempest-ImagesMemberRbacTest-671289478"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f0cc19da99ee433abb952bd0cf5fe71d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:15.647 197 INFO tempest.lib.common.rest_client [req-294822a8-d6f9-4853-9e42-9304d4132c5e ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/55ec7b28-c158-4551-9925-c06c5338703a 0.185s 2020-12-14 02:23:15.650 197 DEBUG tempest.lib.common.rest_client [req-294822a8-d6f9-4853-9e42-9304d4132c5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-294822a8-d6f9-4853-9e42-9304d4132c5e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/55ec7b28-c158-4551-9925-c06c5338703a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:15.684 197 INFO tempest.lib.common.rest_client [req-4f3b02b3-21f8-47f3-b23a-50ce9be084c1 ] Request (ImagesMemberRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/55ec7b28-c158-4551-9925-c06c5338703a 0.029s 2020-12-14 02:23:15.686 197 DEBUG tempest.lib.common.rest_client [req-4f3b02b3-21f8-47f3-b23a-50ce9be084c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-4f3b02b3-21f8-47f3-b23a-50ce9be084c1', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/55ec7b28-c158-4551-9925-c06c5338703a'} Body: b'{"message": "No image found with ID 55ec7b28-c158-4551-9925-c06c5338703a

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:15.812 197 INFO tempest.lib.common.rest_client [req-e143fde3-ca82-481b-b8ae-e374d087f1e9 ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/b1b8a2f9-3651-4522-a2c1-af7f31994033 0.119s 2020-12-14 02:23:15.815 197 DEBUG tempest.lib.common.rest_client [req-e143fde3-ca82-481b-b8ae-e374d087f1e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-e143fde3-ca82-481b-b8ae-e374d087f1e9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/b1b8a2f9-3651-4522-a2c1-af7f31994033'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:15.851 197 INFO tempest.lib.common.rest_client [req-7a6ceaaf-269c-464b-9804-8038b2a81487 ] Request (ImagesMemberRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/b1b8a2f9-3651-4522-a2c1-af7f31994033 0.030s 2020-12-14 02:23:15.853 197 DEBUG tempest.lib.common.rest_client [req-7a6ceaaf-269c-464b-9804-8038b2a81487 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-7a6ceaaf-269c-464b-9804-8038b2a81487', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/b1b8a2f9-3651-4522-a2c1-af7f31994033'} Body: b'{"message": "No image found with ID b1b8a2f9-3651-4522-a2c1-af7f31994033

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:15.930 197 INFO tempest.lib.common.rest_client [req-80322012-f789-4f0e-90ba-99271d78e57d ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/53b26a84-473e-4a18-a549-6f737a929de4 0.071s 2020-12-14 02:23:15.932 197 DEBUG tempest.lib.common.rest_client [req-80322012-f789-4f0e-90ba-99271d78e57d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-80322012-f789-4f0e-90ba-99271d78e57d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/53b26a84-473e-4a18-a549-6f737a929de4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:15.967 197 INFO tempest.lib.common.rest_client [req-691e06a5-a46c-44c0-9070-122ffd88e813 ] Request (ImagesMemberRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/53b26a84-473e-4a18-a549-6f737a929de4 0.029s 2020-12-14 02:23:15.970 197 DEBUG tempest.lib.common.rest_client [req-691e06a5-a46c-44c0-9070-122ffd88e813 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-691e06a5-a46c-44c0-9070-122ffd88e813', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/53b26a84-473e-4a18-a549-6f737a929de4'} Body: b'{"message": "No image found with ID 53b26a84-473e-4a18-a549-6f737a929de4

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:16.050 197 INFO tempest.lib.common.rest_client [req-494ce943-8e13-4faf-b978-495342072fd1 ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/5c7cdb33-fcca-4acb-932f-2d41be02bfc2 0.073s 2020-12-14 02:23:16.052 197 DEBUG tempest.lib.common.rest_client [req-494ce943-8e13-4faf-b978-495342072fd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-494ce943-8e13-4faf-b978-495342072fd1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/5c7cdb33-fcca-4acb-932f-2d41be02bfc2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:16.091 197 INFO tempest.lib.common.rest_client [req-5f1d6481-20de-47b1-be3e-f23f4323ce27 ] Request (ImagesMemberRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/5c7cdb33-fcca-4acb-932f-2d41be02bfc2 0.032s 2020-12-14 02:23:16.093 197 DEBUG tempest.lib.common.rest_client [req-5f1d6481-20de-47b1-be3e-f23f4323ce27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-5f1d6481-20de-47b1-be3e-f23f4323ce27', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/5c7cdb33-fcca-4acb-932f-2d41be02bfc2'} Body: b'{"message": "No image found with ID 5c7cdb33-fcca-4acb-932f-2d41be02bfc2

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:16.179 197 INFO tempest.lib.common.rest_client [req-5dc8c69e-2f19-4649-a68e-219f518ef762 ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/cdf6f30b-b6e7-4c54-9102-29f51d3d8939 0.080s 2020-12-14 02:23:16.181 197 DEBUG tempest.lib.common.rest_client [req-5dc8c69e-2f19-4649-a68e-219f518ef762 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-5dc8c69e-2f19-4649-a68e-219f518ef762', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/cdf6f30b-b6e7-4c54-9102-29f51d3d8939'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:16.215 197 INFO tempest.lib.common.rest_client [req-b5fde691-6cdc-4b36-b30e-086743fba6e9 ] Request (ImagesMemberRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/cdf6f30b-b6e7-4c54-9102-29f51d3d8939 0.029s 2020-12-14 02:23:16.218 197 DEBUG tempest.lib.common.rest_client [req-b5fde691-6cdc-4b36-b30e-086743fba6e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-b5fde691-6cdc-4b36-b30e-086743fba6e9', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/cdf6f30b-b6e7-4c54-9102-29f51d3d8939'} Body: b'{"message": "No image found with ID cdf6f30b-b6e7-4c54-9102-29f51d3d8939

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:16.218 189 INFO tempest.lib.common.rest_client [req-2eb9b1a8-a609-4890-8869-725d582150ef ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.216s 2020-12-14 02:23:16.222 189 DEBUG tempest.lib.common.rest_client [req-2eb9b1a8-a609-4890-8869-725d582150ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2eb9b1a8-a609-4890-8869-725d582150ef', 'x-compute-request-id': 'req-2eb9b1a8-a609-4890-8869-725d582150ef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:16.397 197 INFO tempest.lib.common.rest_client [req-c2e99380-792c-4aa3-8164-48cf56517ddf ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/5b975168bff5441d9c4992ff3767852b 0.171s 2020-12-14 02:23:16.400 197 DEBUG tempest.lib.common.rest_client [req-c2e99380-792c-4aa3-8164-48cf56517ddf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2e99380-792c-4aa3-8164-48cf56517ddf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/5b975168bff5441d9c4992ff3767852b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:16.503 197 INFO tempest.lib.common.rest_client [req-24ac2db1-d124-45d6-a225-0fa7f891776a ] Request (ImagesMemberRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:23:16.505 197 DEBUG tempest.lib.common.rest_client [req-24ac2db1-d124-45d6-a225-0fa7f891776a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24ac2db1-d124-45d6-a225-0fa7f891776a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["_ZhXwD1jTReAgsws8FCHKQ"], "expires_at": "2020-12-14T03:23:16.000000Z", "issued_at": "2020-12-14T02:23:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:16.817 197 INFO tempest.lib.common.rest_client [req-ddd23e45-67b2-426b-bb7c-6892fac5e532 ] Request (ImagesMemberRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=f0cc19da99ee433abb952bd0cf5fe71d&name=default 0.304s 2020-12-14 02:23:16.820 197 DEBUG tempest.lib.common.rest_client [req-ddd23e45-67b2-426b-bb7c-6892fac5e532 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-ddd23e45-67b2-426b-bb7c-6892fac5e532', 'date': 'Mon, 14 Dec 2020 02:23:16 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=f0cc19da99ee433abb952bd0cf5fe71d&name=default'} Body: b'{"security_groups": [{"id": "bebf2fb0-8520-424f-9596-96121b7ffc20", "name": "default", "stateful": true, "tenant_id": "f0cc19da99ee433abb952bd0cf5fe71d", "description": "Default security group", "security_group_rules": [{"id": "1013d418-fbef-4db5-ab6c-9a3cf8bb1c26", "tenant_id": "f0cc19da99ee433abb952bd0cf5fe71d", "security_group_id": "bebf2fb0-8520-424f-9596-96121b7ffc20", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "bebf2fb0-8520-424f-9596-96121b7ffc20", "description": null, "tags": [], "created_at": "2020-12-14T02:23:16Z", "updated_at": "2020-12-14T02:23:16Z", "revision_number": 0, "project_id": "f0cc19da99ee433abb952bd0cf5fe71d"}, {"id": "4c634c4c-6eeb-4e59-8cbf-23a46fd5a734", "tenant_id": "f0cc19da99ee433abb952bd0cf5fe71d", "security_group_id": "bebf2fb0-8520-424f-9596-96121b7ffc20", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:23:16Z", "updated_at": "2020-12-14T02:23:16Z", "revision_number": 0, "project_id": "f0cc19da99ee433abb952bd0cf5fe71d"}, {"id": "5a1261bf-5b64-4874-93e8-1e9d005026e5", "tenant_id": "f0cc19da99ee433abb952bd0cf5fe71d", "security_group_id": "bebf2fb0-8520-424f-9596-96121b7ffc20", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:23:16Z", "updated_at": "2020-12-14T02:23:16Z", "revision_number": 0, "project_id": "f0cc19da99ee433abb952bd0cf5fe71d"}, {"id": "b3cd0369-e519-4ee8-8311-9d7cf093b4ee", "tenant_id": "f0cc19da99ee433abb952bd0cf5fe71d", "security_group_id": "bebf2fb0-8520-424f-9596-96121b7ffc20", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "bebf2fb0-8520-424f-9596-96121b7ffc20", "description": null, "tags": [], "created_at": "2020-12-14T02:23:16Z", "updated_at": "2020-12-14T02:23:16Z", "revision_number": 0, "project_id": "f0cc19da99ee433abb952bd0cf5fe71d"}], "tags": [], "created_at": "2020-12-14T02:23:16Z", "updated_at": "2020-12-14T02:23:16Z", "revision_number": 1, "project_id": "f0cc19da99ee433abb952bd0cf5fe71d"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:16.958 197 INFO tempest.lib.common.rest_client [req-90b2602a-3e40-4629-bda9-776597e76157 ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/bebf2fb0-8520-424f-9596-96121b7ffc20 0.131s 2020-12-14 02:23:16.962 197 DEBUG tempest.lib.common.rest_client [req-90b2602a-3e40-4629-bda9-776597e76157 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-90b2602a-3e40-4629-bda9-776597e76157', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:16 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/bebf2fb0-8520-424f-9596-96121b7ffc20'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:17.125 197 INFO tempest.lib.common.rest_client [req-761f5c48-a460-419d-a2e2-382b3e57404d ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d 0.155s 2020-12-14 02:23:17.128 197 DEBUG tempest.lib.common.rest_client [req-761f5c48-a460-419d-a2e2-382b3e57404d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-761f5c48-a460-419d-a2e2-382b3e57404d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f0cc19da99ee433abb952bd0cf5fe71d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:17.335 197 INFO tempest.lib.common.rest_client [req-168b6d7b-ec90-4084-8ee4-55a96dd51083 ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/5e7b95b68120445b83555f983677e1a5 0.201s 2020-12-14 02:23:17.338 197 DEBUG tempest.lib.common.rest_client [req-168b6d7b-ec90-4084-8ee4-55a96dd51083 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-168b6d7b-ec90-4084-8ee4-55a96dd51083', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/5e7b95b68120445b83555f983677e1a5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:17.502 197 INFO tempest.lib.common.rest_client [req-2ae6e8f7-e411-4fb4-a38c-abd0ba8fcac0 ] Request (ImagesMemberRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3eba558c88b8488d81dcf4e16d639bd9&name=default 0.157s 2020-12-14 02:23:17.505 197 DEBUG tempest.lib.common.rest_client [req-2ae6e8f7-e411-4fb4-a38c-abd0ba8fcac0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-2ae6e8f7-e411-4fb4-a38c-abd0ba8fcac0', 'date': 'Mon, 14 Dec 2020 02:23:17 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3eba558c88b8488d81dcf4e16d639bd9&name=default'} Body: b'{"security_groups": [{"id": "23b27a2c-ba0d-4b28-ad06-bbfa24b06fde", "name": "default", "stateful": true, "tenant_id": "3eba558c88b8488d81dcf4e16d639bd9", "description": "Default security group", "security_group_rules": [{"id": "096927b5-171b-49bf-9b79-024e37dd3c1d", "tenant_id": "3eba558c88b8488d81dcf4e16d639bd9", "security_group_id": "23b27a2c-ba0d-4b28-ad06-bbfa24b06fde", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "23b27a2c-ba0d-4b28-ad06-bbfa24b06fde", "description": null, "tags": [], "created_at": "2020-12-14T02:23:17Z", "updated_at": "2020-12-14T02:23:17Z", "revision_number": 0, "project_id": "3eba558c88b8488d81dcf4e16d639bd9"}, {"id": "414dde1e-dcbb-4b0b-9191-e55edbff172e", "tenant_id": "3eba558c88b8488d81dcf4e16d639bd9", "security_group_id": "23b27a2c-ba0d-4b28-ad06-bbfa24b06fde", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:23:17Z", "updated_at": "2020-12-14T02:23:17Z", "revision_number": 0, "project_id": "3eba558c88b8488d81dcf4e16d639bd9"}, {"id": "600ce37a-cfd1-468a-ad97-250c7116126c", "tenant_id": "3eba558c88b8488d81dcf4e16d639bd9", "security_group_id": "23b27a2c-ba0d-4b28-ad06-bbfa24b06fde", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "23b27a2c-ba0d-4b28-ad06-bbfa24b06fde", "description": null, "tags": [], "created_at": "2020-12-14T02:23:17Z", "updated_at": "2020-12-14T02:23:17Z", "revision_number": 0, "project_id": "3eba558c88b8488d81dcf4e16d639bd9"}, {"id": "e7ea0ff8-bfd8-4606-b7b9-fa0e1ceb9e94", "tenant_id": "3eba558c88b8488d81dcf4e16d639bd9", "security_group_id": "23b27a2c-ba0d-4b28-ad06-bbfa24b06fde", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:23:17Z", "updated_at": "2020-12-14T02:23:17Z", "revision_number": 0, "project_id": "3eba558c88b8488d81dcf4e16d639bd9"}], "tags": [], "created_at": "2020-12-14T02:23:17Z", "updated_at": "2020-12-14T02:23:17Z", "revision_number": 1, "project_id": "3eba558c88b8488d81dcf4e16d639bd9"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:17.550 189 INFO tempest.lib.common.rest_client [req-05189d8b-dfe6-401b-ac90-0797b529bfbe ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.223s 2020-12-14 02:23:17.552 189 DEBUG tempest.lib.common.rest_client [req-05189d8b-dfe6-401b-ac90-0797b529bfbe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-05189d8b-dfe6-401b-ac90-0797b529bfbe', 'x-compute-request-id': 'req-05189d8b-dfe6-401b-ac90-0797b529bfbe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:17.643 197 INFO tempest.lib.common.rest_client [req-7c9a3e83-e2b7-4da2-9d38-55c89ac9527e ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/23b27a2c-ba0d-4b28-ad06-bbfa24b06fde 0.131s 2020-12-14 02:23:17.645 197 DEBUG tempest.lib.common.rest_client [req-7c9a3e83-e2b7-4da2-9d38-55c89ac9527e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-7c9a3e83-e2b7-4da2-9d38-55c89ac9527e', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:17 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/23b27a2c-ba0d-4b28-ad06-bbfa24b06fde'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:17.830 197 INFO tempest.lib.common.rest_client [req-daf0c56c-285d-48d3-8a71-2edfcd3c7def ] Request (ImagesMemberRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3eba558c88b8488d81dcf4e16d639bd9 0.178s 2020-12-14 02:23:17.833 197 DEBUG tempest.lib.common.rest_client [req-daf0c56c-285d-48d3-8a71-2edfcd3c7def ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-daf0c56c-285d-48d3-8a71-2edfcd3c7def', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3eba558c88b8488d81dcf4e16d639bd9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:17.959 197 INFO tempest.lib.common.rest_client [req-a9959910-41ed-499f-881c-2e376362c281 ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:23:17.962 197 DEBUG tempest.lib.common.rest_client [req-a9959910-41ed-499f-881c-2e376362c281 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9959910-41ed-499f-881c-2e376362c281', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["spnul66bThSn7nxJaNLImA"], "expires_at": "2020-12-14T03:23:17.000000Z", "issued_at": "2020-12-14T02:23:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:18.062 197 INFO tempest.lib.common.rest_client [req-d3faee62-117b-48aa-aa3d-5f7444efa3cd ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:23:18.065 197 DEBUG tempest.lib.common.rest_client [req-d3faee62-117b-48aa-aa3d-5f7444efa3cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3faee62-117b-48aa-aa3d-5f7444efa3cd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["4QWnSFRxQFK5gjq6P-ixkg"], "expires_at": "2020-12-14T03:23:18.000000Z", "issued_at": "2020-12-14T02:23:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:18.139 197 INFO tempest.lib.common.rest_client [req-987b287b-f564-4287-9ea5-fc8445346227 ] Request (AddressScopeExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.066s 2020-12-14 02:23:18.142 197 DEBUG tempest.lib.common.rest_client [req-987b287b-f564-4287-9ea5-fc8445346227 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-987b287b-f564-4287-9ea5-fc8445346227', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:18.227 197 INFO tempest.lib.common.rest_client [req-f327751d-2085-4f5c-85ef-a570b71ef276 ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.077s 2020-12-14 02:23:18.230 197 DEBUG tempest.lib.common.rest_client [req-f327751d-2085-4f5c-85ef-a570b71ef276 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-AddressScopeExtRbacTest-397428244-desc", "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-397428244"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f327751d-2085-4f5c-85ef-a570b71ef276', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244", "domain_id": "default", "description": "tempest-AddressScopeExtRbacTest-397428244-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:18.355 197 INFO tempest.lib.common.rest_client [req-21375222-6c07-4713-a61b-7b1a855207c1 ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.116s 2020-12-14 02:23:18.358 197 DEBUG tempest.lib.common.rest_client [req-21375222-6c07-4713-a61b-7b1a855207c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-AddressScopeExtRbacTest-397428244", "password": "R7#j^ijcx411Xah", "project_id": "9959e20a4cf54314ab7621c21e1d5b85", "email": "tempest-AddressScopeExtRbacTest-1802572013@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '401', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21375222-6c07-4713-a61b-7b1a855207c1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "9959e20a4cf54314ab7621c21e1d5b85", "email": "tempest-AddressScopeExtRbacTest-1802572013@example.com", "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/0b61cd2fb2094e57b4113dd8c06d404f"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:18.425 197 INFO tempest.lib.common.rest_client [req-a0098a71-67c5-4ecd-be3f-2e7b4fcef567 ] Request (AddressScopeExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:23:18.428 197 DEBUG tempest.lib.common.rest_client [req-a0098a71-67c5-4ecd-be3f-2e7b4fcef567 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0098a71-67c5-4ecd-be3f-2e7b4fcef567', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:18.492 197 INFO tempest.lib.common.rest_client [req-a131d5f5-c0a7-4e19-9869-4f388169274a ] Request (AddressScopeExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:23:18.493 197 DEBUG tempest.lib.common.rest_client [req-a131d5f5-c0a7-4e19-9869-4f388169274a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a131d5f5-c0a7-4e19-9869-4f388169274a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:18.575 197 INFO tempest.lib.common.rest_client [req-859da372-39fd-46a0-b0d8-345557b11c0a ] Request (AddressScopeExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles/72a4576c553448cd941b052c1ca0cf2d 0.076s 2020-12-14 02:23:18.577 197 DEBUG tempest.lib.common.rest_client [req-859da372-39fd-46a0-b0d8-345557b11c0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-859da372-39fd-46a0-b0d8-345557b11c0a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:18.580 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AddressScopeExtRbacTest-397428244', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '9959e20a4cf54314ab7621c21e1d5b85', 'project_name': 'tempest-AddressScopeExtRbacTest-397428244', 'tenant_id': '9959e20a4cf54314ab7621c21e1d5b85', 'tenant_name': 'tempest-AddressScopeExtRbacTest-397428244', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '0b61cd2fb2094e57b4113dd8c06d404f'}, Network: None, Subnet: None, Router: None 2020-12-14 02:23:18.582 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AddressScopeExtRbacTest-397428244', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '9959e20a4cf54314ab7621c21e1d5b85', 'project_name': 'tempest-AddressScopeExtRbacTest-397428244', 'tenant_id': '9959e20a4cf54314ab7621c21e1d5b85', 'tenant_name': 'tempest-AddressScopeExtRbacTest-397428244', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '0b61cd2fb2094e57b4113dd8c06d404f'}, Network: None, Subnet: None, Router: None 2020-12-14 02:23:18.788 197 INFO tempest.lib.common.rest_client [req-4bda821a-6cf5-4729-a75c-98aa5f1ffff7 ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.132s 2020-12-14 02:23:18.791 197 DEBUG tempest.lib.common.rest_client [req-4bda821a-6cf5-4729-a75c-98aa5f1ffff7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4bda821a-6cf5-4729-a75c-98aa5f1ffff7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["QA9SyF3uT3GRqPyeU3Bd8Q"], "expires_at": "2020-12-14T03:23:18.000000Z", "issued_at": "2020-12-14T02:23:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:18.795 197 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-12-14 02:23:18.886 189 INFO tempest.lib.common.rest_client [req-3eefee4f-f7cb-419b-85b4-40d7836956b3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.230s 2020-12-14 02:23:18.888 189 DEBUG tempest.lib.common.rest_client [req-3eefee4f-f7cb-419b-85b4-40d7836956b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3eefee4f-f7cb-419b-85b4-40d7836956b3', 'x-compute-request-id': 'req-3eefee4f-f7cb-419b-85b4-40d7836956b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:18.947 197 INFO tempest.lib.common.rest_client [req-0cc9f56b-da8d-42a7-8306-87b6562cdcb3 ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-12-14 02:23:18.949 197 DEBUG tempest.lib.common.rest_client [req-0cc9f56b-da8d-42a7-8306-87b6562cdcb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0cc9f56b-da8d-42a7-8306-87b6562cdcb3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["jLv-znNVS36NTFVZzK36yQ"], "expires_at": "2020-12-14T03:23:18.000000Z", "issued_at": "2020-12-14T02:23:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:19.068 197 INFO tempest.lib.common.rest_client [req-bb014182-524c-4a4f-8be0-4d7ed908abe5 ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:23:19.071 197 DEBUG tempest.lib.common.rest_client [req-bb014182-524c-4a4f-8be0-4d7ed908abe5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb014182-524c-4a4f-8be0-4d7ed908abe5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["KId0wT6sTjm3BtU6edc8sw"], "expires_at": "2020-12-14T03:23:19.000000Z", "issued_at": "2020-12-14T02:23:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:19.150 197 INFO tempest.lib.common.rest_client [req-457d622b-6db4-491c-9e5e-acad40417050 ] Request (AddressScopeExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.073s 2020-12-14 02:23:19.153 197 DEBUG tempest.lib.common.rest_client [req-457d622b-6db4-491c-9e5e-acad40417050 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-457d622b-6db4-491c-9e5e-acad40417050', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:19.229 197 INFO tempest.lib.common.rest_client [req-2b24d39f-1abb-4d14-b16f-af5ee3445907 ] Request (AddressScopeExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.068s 2020-12-14 02:23:19.232 197 DEBUG tempest.lib.common.rest_client [req-2b24d39f-1abb-4d14-b16f-af5ee3445907 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b24d39f-1abb-4d14-b16f-af5ee3445907', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:19.236 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:23:19.239 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:19.324 197 INFO tempest.lib.common.rest_client [req-45ea98cf-35c6-4a72-b1f9-301a1c386313 ] Request (AddressScopeExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles 0.080s 2020-12-14 02:23:19.327 197 DEBUG tempest.lib.common.rest_client [req-45ea98cf-35c6-4a72-b1f9-301a1c386313 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45ea98cf-35c6-4a72-b1f9-301a1c386313', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:19.410 197 INFO tempest.lib.common.rest_client [req-98e3cca2-1e36-465e-ab41-e5a4dc32e4c9 ] Request (AddressScopeExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles/72a4576c553448cd941b052c1ca0cf2d 0.077s 2020-12-14 02:23:19.412 197 DEBUG tempest.lib.common.rest_client [req-98e3cca2-1e36-465e-ab41-e5a4dc32e4c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98e3cca2-1e36-465e-ab41-e5a4dc32e4c9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:19.542 197 INFO tempest.lib.common.rest_client [req-5c748d86-619d-4a59-ad9e-ccf6f805e404 ] Request (AddressScopeExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles/a629c95d64b3416fb80ae90af4f69c05 0.122s 2020-12-14 02:23:19.544 197 DEBUG tempest.lib.common.rest_client [req-5c748d86-619d-4a59-ad9e-ccf6f805e404 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c748d86-619d-4a59-ad9e-ccf6f805e404', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:20.287 189 INFO tempest.lib.common.rest_client [req-4b2e01e5-75f2-4e89-bb94-d49b6ea2aad2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.290s 2020-12-14 02:23:20.291 189 DEBUG tempest.lib.common.rest_client [req-4b2e01e5-75f2-4e89-bb94-d49b6ea2aad2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4b2e01e5-75f2-4e89-bb94-d49b6ea2aad2', 'x-compute-request-id': 'req-4b2e01e5-75f2-4e89-bb94-d49b6ea2aad2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:20.650 197 INFO tempest.lib.common.rest_client [req-9dafcb5f-7ff7-4aa1-9f87-69788dbab853 ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:23:20.652 197 DEBUG tempest.lib.common.rest_client [req-9dafcb5f-7ff7-4aa1-9f87-69788dbab853 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9dafcb5f-7ff7-4aa1-9f87-69788dbab853', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["mjW5wYIVTuaZHggiscyK9Q"], "expires_at": "2020-12-14T03:23:20.000000Z", "issued_at": "2020-12-14T02:23:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:20.711 197 INFO tempest.lib.common.rest_client [req-59d30c2f-529e-4992-83b2-fe6048ab72f5 ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.055s 2020-12-14 02:23:20.714 197 DEBUG tempest.lib.common.rest_client [req-59d30c2f-529e-4992-83b2-fe6048ab72f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59d30c2f-529e-4992-83b2-fe6048ab72f5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["WavwhgCXTJigkIUnBpT9Mw"], "expires_at": "2020-12-14T03:23:20.000000Z", "issued_at": "2020-12-14T02:23:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:21.390 197 INFO tempest.lib.common.rest_client [req-4ad7e8a7-68a7-4099-ab1a-32ba7b87e2d1 ] Request (AddressScopeExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.664s 2020-12-14 02:23:21.393 197 DEBUG tempest.lib.common.rest_client [req-4ad7e8a7-68a7-4099-ab1a-32ba7b87e2d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-AddressScopeExtRbacTest-test-network-1959604285"}} Response - Headers: {'content-type': 'application/json', 'content-length': '744', 'x-openstack-request-id': 'req-4ad7e8a7-68a7-4099-ab1a-32ba7b87e2d1', 'date': 'Mon, 14 Dec 2020 02:23:21 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"e8310647-108f-4751-b49b-eef865c9a7df","name":"tempest-AddressScopeExtRbacTest-test-network-1959604285","tenant_id":"9959e20a4cf54314ab7621c21e1d5b85","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"9959e20a4cf54314ab7621c21e1d5b85","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":61,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:23:21Z","updated_at":"2020-12-14T02:23:21Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:21.401 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:21.593 189 INFO tempest.lib.common.rest_client [req-98a83d54-4de1-4968-a6fe-6e661a52c0fd ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.197s 2020-12-14 02:23:21.597 189 DEBUG tempest.lib.common.rest_client [req-98a83d54-4de1-4968-a6fe-6e661a52c0fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-98a83d54-4de1-4968-a6fe-6e661a52c0fd', 'x-compute-request-id': 'req-98a83d54-4de1-4968-a6fe-6e661a52c0fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:21.625 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_address_scope, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:21.629 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:21.753 197 INFO tempest.lib.common.rest_client [req-ef9c1e18-6ba4-42ad-8fa0-dbddf73ad0ce ] Request (AddressScopeExtRbacTest:test_create_address_scope): 200 GET http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles 0.118s 2020-12-14 02:23:21.757 197 DEBUG tempest.lib.common.rest_client [req-ef9c1e18-6ba4-42ad-8fa0-dbddf73ad0ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef9c1e18-6ba4-42ad-8fa0-dbddf73ad0ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:21.807 197 INFO tempest.lib.common.rest_client [req-a9e01e67-9a3d-4012-a0a7-161165a8cccc ] Request (AddressScopeExtRbacTest:test_create_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:23:21.812 197 DEBUG tempest.lib.common.rest_client [req-a9e01e67-9a3d-4012-a0a7-161165a8cccc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9e01e67-9a3d-4012-a0a7-161165a8cccc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["tmPYv_ApSay61mpiD4OZSw"], "expires_at": "2020-12-14T03:23:21.000000Z", "issued_at": "2020-12-14T02:23:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:21.875 197 INFO tempest.lib.common.rest_client [req-73e2c64b-af59-40f6-a0c8-a0532d295e25 ] Request (AddressScopeExtRbacTest:test_create_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:23:21.878 197 DEBUG tempest.lib.common.rest_client [req-73e2c64b-af59-40f6-a0c8-a0532d295e25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73e2c64b-af59-40f6-a0c8-a0532d295e25', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["odx1D2g8TF20SumEXKB8Gg"], "expires_at": "2020-12-14T03:23:21.000000Z", "issued_at": "2020-12-14T02:23:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:22.008 197 INFO tempest.lib.common.rest_client [req-eaa0354b-6ca8-4f03-9283-7e6b812adc10 ] Request (AddressScopeExtRbacTest:test_create_address_scope): 201 POST http://172.30.13.94:9696/v2.0/address-scopes 0.118s 2020-12-14 02:23:22.011 197 DEBUG tempest.lib.common.rest_client [req-eaa0354b-6ca8-4f03-9283-7e6b812adc10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"address_scope": {"name": "tempest-AddressScopeExtRbacTest-363886885", "ip_version": 6}} Response - Headers: {'content-type': 'application/json', 'content-length': '251', 'x-openstack-request-id': 'req-eaa0354b-6ca8-4f03-9283-7e6b812adc10', 'date': 'Mon, 14 Dec 2020 02:23:21 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes'} Body: b'{"address_scope": {"id": "f12cb56c-9d83-4980-9541-6f4b3beb7750", "project_id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-363886885", "shared": false, "ip_version": 6, "tenant_id": "9959e20a4cf54314ab7621c21e1d5b85"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:22.015 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:22.085 197 INFO tempest.lib.common.rest_client [req-63105e67-0a26-4d9e-b143-ae5973835645 ] Request (AddressScopeExtRbacTest:test_create_address_scope): 200 GET http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles 0.064s 2020-12-14 02:23:22.089 197 DEBUG tempest.lib.common.rest_client [req-63105e67-0a26-4d9e-b143-ae5973835645 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63105e67-0a26-4d9e-b143-ae5973835645', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:22.148 197 INFO tempest.lib.common.rest_client [req-abc9f246-6dc7-4277-ac8c-7084f7a68261 ] Request (AddressScopeExtRbacTest:test_create_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:23:22.150 197 DEBUG tempest.lib.common.rest_client [req-abc9f246-6dc7-4277-ac8c-7084f7a68261 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-abc9f246-6dc7-4277-ac8c-7084f7a68261', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["V4USZ-nXSXWxU4SwcisSrw"], "expires_at": "2020-12-14T03:23:22.000000Z", "issued_at": "2020-12-14T02:23:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:22.208 197 INFO tempest.lib.common.rest_client [req-00f764f8-95b5-4ede-acb8-c0db4a1e8210 ] Request (AddressScopeExtRbacTest:test_create_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:23:22.212 197 DEBUG tempest.lib.common.rest_client [req-00f764f8-95b5-4ede-acb8-c0db4a1e8210 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-00f764f8-95b5-4ede-acb8-c0db4a1e8210', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["D_SiLHLgTbqMxvesQk47OA"], "expires_at": "2020-12-14T03:23:22.000000Z", "issued_at": "2020-12-14T02:23:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:22.345 197 INFO tempest.lib.common.rest_client [req-d75825c0-fe12-497f-81f3-77cfdddc3f0f ] Request (AddressScopeExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/address-scopes/f12cb56c-9d83-4980-9541-6f4b3beb7750 0.124s 2020-12-14 02:23:22.348 197 DEBUG tempest.lib.common.rest_client [req-d75825c0-fe12-497f-81f3-77cfdddc3f0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-d75825c0-fe12-497f-81f3-77cfdddc3f0f', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:22 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/f12cb56c-9d83-4980-9541-6f4b3beb7750'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:22.364 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:22.388 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_address_scope, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:22.390 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:22.415 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_address_scope:shared, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:22.417 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:22.477 197 INFO tempest.lib.common.rest_client [req-95d88108-f513-4ca9-987a-cd19eabcdfcc ] Request (AddressScopeExtRbacTest:test_create_address_scope_shared): 200 GET http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles 0.055s 2020-12-14 02:23:22.479 197 DEBUG tempest.lib.common.rest_client [req-95d88108-f513-4ca9-987a-cd19eabcdfcc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95d88108-f513-4ca9-987a-cd19eabcdfcc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:22.538 197 INFO tempest.lib.common.rest_client [req-0e901fbb-8ed9-44dc-892a-bfda5f66bbb2 ] Request (AddressScopeExtRbacTest:test_create_address_scope_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:23:22.542 197 DEBUG tempest.lib.common.rest_client [req-0e901fbb-8ed9-44dc-892a-bfda5f66bbb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e901fbb-8ed9-44dc-892a-bfda5f66bbb2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["7n7pPxvEQIS4w7dIjB1fcA"], "expires_at": "2020-12-14T03:23:22.000000Z", "issued_at": "2020-12-14T02:23:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:22.596 197 INFO tempest.lib.common.rest_client [req-98d541b6-d435-415e-925d-4dda7530b87c ] Request (AddressScopeExtRbacTest:test_create_address_scope_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:23:22.600 197 DEBUG tempest.lib.common.rest_client [req-98d541b6-d435-415e-925d-4dda7530b87c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98d541b6-d435-415e-925d-4dda7530b87c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["7BomMiGFTUWW_vSPbF6Nmg"], "expires_at": "2020-12-14T03:23:22.000000Z", "issued_at": "2020-12-14T02:23:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:22.726 197 INFO tempest.lib.common.rest_client [req-7a5e5792-c970-4f53-a92e-7bcff0fe132f ] Request (AddressScopeExtRbacTest:test_create_address_scope_shared): 201 POST http://172.30.13.94:9696/v2.0/address-scopes 0.117s 2020-12-14 02:23:22.730 197 DEBUG tempest.lib.common.rest_client [req-7a5e5792-c970-4f53-a92e-7bcff0fe132f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"address_scope": {"name": "tempest-AddressScopeExtRbacTest-1975875958", "ip_version": 6, "shared": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '251', 'x-openstack-request-id': 'req-7a5e5792-c970-4f53-a92e-7bcff0fe132f', 'date': 'Mon, 14 Dec 2020 02:23:22 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes'} Body: b'{"address_scope": {"id": "53331122-580d-4e51-a12c-0afa5822ebee", "project_id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-1975875958", "shared": true, "ip_version": 6, "tenant_id": "9959e20a4cf54314ab7621c21e1d5b85"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:22.733 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:22.812 197 INFO tempest.lib.common.rest_client [req-0d7eedbe-b1f4-47c2-a3d5-dee1e810383c ] Request (AddressScopeExtRbacTest:test_create_address_scope_shared): 200 GET http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles 0.073s 2020-12-14 02:23:22.816 197 DEBUG tempest.lib.common.rest_client [req-0d7eedbe-b1f4-47c2-a3d5-dee1e810383c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d7eedbe-b1f4-47c2-a3d5-dee1e810383c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:22.890 197 INFO tempest.lib.common.rest_client [req-3eecdf5f-090e-4d72-8fae-21d7c52df792 ] Request (AddressScopeExtRbacTest:test_create_address_scope_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.066s 2020-12-14 02:23:22.893 197 DEBUG tempest.lib.common.rest_client [req-3eecdf5f-090e-4d72-8fae-21d7c52df792 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3eecdf5f-090e-4d72-8fae-21d7c52df792', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["_090W-tnSYeQPoOM2KGWAg"], "expires_at": "2020-12-14T03:23:22.000000Z", "issued_at": "2020-12-14T02:23:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:22.942 189 INFO tempest.lib.common.rest_client [req-f349bfb9-c933-4d5e-8fdd-882c04692c0b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.238s 2020-12-14 02:23:22.944 197 INFO tempest.lib.common.rest_client [req-fc971476-5c93-4b76-88c8-7aa8a0271350 ] Request (AddressScopeExtRbacTest:test_create_address_scope_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:23:22.946 189 DEBUG tempest.lib.common.rest_client [req-f349bfb9-c933-4d5e-8fdd-882c04692c0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f349bfb9-c933-4d5e-8fdd-882c04692c0b', 'x-compute-request-id': 'req-f349bfb9-c933-4d5e-8fdd-882c04692c0b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:22.948 197 DEBUG tempest.lib.common.rest_client [req-fc971476-5c93-4b76-88c8-7aa8a0271350 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc971476-5c93-4b76-88c8-7aa8a0271350', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["1rXESTNzSz2LM1enFr_3EQ"], "expires_at": "2020-12-14T03:23:22.000000Z", "issued_at": "2020-12-14T02:23:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:23.114 197 INFO tempest.lib.common.rest_client [req-30ac5019-ecb0-43c8-8a90-a884f55eb347 ] Request (AddressScopeExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/address-scopes/53331122-580d-4e51-a12c-0afa5822ebee 0.154s 2020-12-14 02:23:23.116 197 DEBUG tempest.lib.common.rest_client [req-30ac5019-ecb0-43c8-8a90-a884f55eb347 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-30ac5019-ecb0-43c8-8a90-a884f55eb347', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:23 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/53331122-580d-4e51-a12c-0afa5822ebee'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:23.133 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:23.163 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_address_scope, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:23.165 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:23.189 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_address_scope, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:23.242 197 INFO tempest.lib.common.rest_client [req-d298142d-43e0-4166-a182-0080c955cb75 ] Request (AddressScopeExtRbacTest:test_delete_address_scope): 201 POST http://172.30.13.94:9696/v2.0/address-scopes 0.047s 2020-12-14 02:23:23.244 197 DEBUG tempest.lib.common.rest_client [req-d298142d-43e0-4166-a182-0080c955cb75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"address_scope": {"name": "tempest-AddressScopeExtRbacTest-1801211053", "ip_version": 6}} Response - Headers: {'content-type': 'application/json', 'content-length': '252', 'x-openstack-request-id': 'req-d298142d-43e0-4166-a182-0080c955cb75', 'date': 'Mon, 14 Dec 2020 02:23:23 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes'} Body: b'{"address_scope": {"id": "adbdb9a8-a2cb-4345-b3e8-7c6051b0b659", "project_id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-1801211053", "shared": false, "ip_version": 6, "tenant_id": "9959e20a4cf54314ab7621c21e1d5b85"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:23.247 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:23.322 197 INFO tempest.lib.common.rest_client [req-c01e97fb-124c-43c7-8414-0e9551e88daf ] Request (AddressScopeExtRbacTest:test_delete_address_scope): 200 GET http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles 0.069s 2020-12-14 02:23:23.324 197 DEBUG tempest.lib.common.rest_client [req-c01e97fb-124c-43c7-8414-0e9551e88daf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c01e97fb-124c-43c7-8414-0e9551e88daf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:23.381 197 INFO tempest.lib.common.rest_client [req-1c66cf14-0fb0-4e09-bdc5-fd3dadcce0d8 ] Request (AddressScopeExtRbacTest:test_delete_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:23:23.384 197 DEBUG tempest.lib.common.rest_client [req-1c66cf14-0fb0-4e09-bdc5-fd3dadcce0d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c66cf14-0fb0-4e09-bdc5-fd3dadcce0d8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["AEh33KrRQeCWvwi14NRddA"], "expires_at": "2020-12-14T03:23:23.000000Z", "issued_at": "2020-12-14T02:23:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:23.442 197 INFO tempest.lib.common.rest_client [req-e78375a0-5da7-42af-af65-ebbea338cf3b ] Request (AddressScopeExtRbacTest:test_delete_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:23:23.446 197 DEBUG tempest.lib.common.rest_client [req-e78375a0-5da7-42af-af65-ebbea338cf3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e78375a0-5da7-42af-af65-ebbea338cf3b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["i6VcNw0hTku3R9jg227uxw"], "expires_at": "2020-12-14T03:23:23.000000Z", "issued_at": "2020-12-14T02:23:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:23.600 197 INFO tempest.lib.common.rest_client [req-d6fa8287-17fd-49fc-abcb-200723390522 ] Request (AddressScopeExtRbacTest:test_delete_address_scope): 204 DELETE http://172.30.13.94:9696/v2.0/address-scopes/adbdb9a8-a2cb-4345-b3e8-7c6051b0b659 0.147s 2020-12-14 02:23:23.604 197 DEBUG tempest.lib.common.rest_client [req-d6fa8287-17fd-49fc-abcb-200723390522 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-d6fa8287-17fd-49fc-abcb-200723390522', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:23 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/adbdb9a8-a2cb-4345-b3e8-7c6051b0b659'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:23.607 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:23.682 197 INFO tempest.lib.common.rest_client [req-3a492aae-fcac-4a6a-a2f3-9c3d862f5f28 ] Request (AddressScopeExtRbacTest:test_delete_address_scope): 200 GET http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles 0.069s 2020-12-14 02:23:23.686 197 DEBUG tempest.lib.common.rest_client [req-3a492aae-fcac-4a6a-a2f3-9c3d862f5f28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a492aae-fcac-4a6a-a2f3-9c3d862f5f28', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:23.736 197 INFO tempest.lib.common.rest_client [req-15ed1762-15c8-4a38-95f8-b0fc27bc2548 ] Request (AddressScopeExtRbacTest:test_delete_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:23:23.740 197 DEBUG tempest.lib.common.rest_client [req-15ed1762-15c8-4a38-95f8-b0fc27bc2548 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-15ed1762-15c8-4a38-95f8-b0fc27bc2548', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["9v2Qo5ODT0CNiQr5JNqhtg"], "expires_at": "2020-12-14T03:23:23.000000Z", "issued_at": "2020-12-14T02:23:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:23.794 197 INFO tempest.lib.common.rest_client [req-f49f6062-8adc-4f30-93f1-d1e0261ed9c6 ] Request (AddressScopeExtRbacTest:test_delete_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:23:23.798 197 DEBUG tempest.lib.common.rest_client [req-f49f6062-8adc-4f30-93f1-d1e0261ed9c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f49f6062-8adc-4f30-93f1-d1e0261ed9c6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["TnJvsr6JTW-uCZNHnWEGXA"], "expires_at": "2020-12-14T03:23:23.000000Z", "issued_at": "2020-12-14T02:23:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:23.899 197 INFO tempest.lib.common.rest_client [req-57a46f15-8ddc-4d21-926b-fa1ed4338433 ] Request (AddressScopeExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/address-scopes/adbdb9a8-a2cb-4345-b3e8-7c6051b0b659 0.090s 2020-12-14 02:23:23.903 197 DEBUG tempest.lib.common.rest_client [req-57a46f15-8ddc-4d21-926b-fa1ed4338433 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '149', 'x-openstack-request-id': 'req-57a46f15-8ddc-4d21-926b-fa1ed4338433', 'date': 'Mon, 14 Dec 2020 02:23:23 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/adbdb9a8-a2cb-4345-b3e8-7c6051b0b659'} Body: b'{"NeutronError": {"type": "AddressScopeNotFound", "message": "Address scope adbdb9a8-a2cb-4345-b3e8-7c6051b0b659 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:23.917 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:23.942 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_address_scope, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:24.007 197 INFO tempest.lib.common.rest_client [req-e6cfb2be-c486-4e32-bfa9-d8bdb70f45c0 ] Request (AddressScopeExtRbacTest:test_get_address_scope): 201 POST http://172.30.13.94:9696/v2.0/address-scopes 0.058s 2020-12-14 02:23:24.011 197 DEBUG tempest.lib.common.rest_client [req-e6cfb2be-c486-4e32-bfa9-d8bdb70f45c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"address_scope": {"name": "tempest-AddressScopeExtRbacTest-1537104912", "ip_version": 6}} Response - Headers: {'content-type': 'application/json', 'content-length': '252', 'x-openstack-request-id': 'req-e6cfb2be-c486-4e32-bfa9-d8bdb70f45c0', 'date': 'Mon, 14 Dec 2020 02:23:23 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes'} Body: b'{"address_scope": {"id": "09a8208f-b82f-4ad4-abcf-beb5355840a7", "project_id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-1537104912", "shared": false, "ip_version": 6, "tenant_id": "9959e20a4cf54314ab7621c21e1d5b85"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:24.015 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:24.094 197 INFO tempest.lib.common.rest_client [req-ada42415-6c07-40d0-8f22-adabe11079f4 ] Request (AddressScopeExtRbacTest:test_get_address_scope): 200 GET http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles 0.073s 2020-12-14 02:23:24.098 197 DEBUG tempest.lib.common.rest_client [req-ada42415-6c07-40d0-8f22-adabe11079f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ada42415-6c07-40d0-8f22-adabe11079f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:24.158 197 INFO tempest.lib.common.rest_client [req-7e214c18-a132-4fb6-a6b6-ff676d29cb2c ] Request (AddressScopeExtRbacTest:test_get_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:23:24.162 197 DEBUG tempest.lib.common.rest_client [req-7e214c18-a132-4fb6-a6b6-ff676d29cb2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e214c18-a132-4fb6-a6b6-ff676d29cb2c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["13Tl5HPsT3OyJ9oWy_HQsw"], "expires_at": "2020-12-14T03:23:24.000000Z", "issued_at": "2020-12-14T02:23:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:24.214 197 INFO tempest.lib.common.rest_client [req-ed9cbedf-1785-491f-9b06-4d98cbc39542 ] Request (AddressScopeExtRbacTest:test_get_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:23:24.218 197 DEBUG tempest.lib.common.rest_client [req-ed9cbedf-1785-491f-9b06-4d98cbc39542 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed9cbedf-1785-491f-9b06-4d98cbc39542', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["drBiSO_aRzGAZ_KBpHQZAg"], "expires_at": "2020-12-14T03:23:24.000000Z", "issued_at": "2020-12-14T02:23:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:24.335 197 INFO tempest.lib.common.rest_client [req-96df5953-ad00-4254-948b-ea09740f670d ] Request (AddressScopeExtRbacTest:test_get_address_scope): 200 GET http://172.30.13.94:9696/v2.0/address-scopes/09a8208f-b82f-4ad4-abcf-beb5355840a7 0.109s 2020-12-14 02:23:24.338 197 DEBUG tempest.lib.common.rest_client [req-96df5953-ad00-4254-948b-ea09740f670d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '252', 'x-openstack-request-id': 'req-96df5953-ad00-4254-948b-ea09740f670d', 'date': 'Mon, 14 Dec 2020 02:23:24 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/09a8208f-b82f-4ad4-abcf-beb5355840a7'} Body: b'{"address_scope": {"id": "09a8208f-b82f-4ad4-abcf-beb5355840a7", "project_id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-1537104912", "shared": false, "ip_version": 6, "tenant_id": "9959e20a4cf54314ab7621c21e1d5b85"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:24.341 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:24.416 197 INFO tempest.lib.common.rest_client [req-bd93a7b5-27a2-4eab-92ff-862eff271e9d ] Request (AddressScopeExtRbacTest:test_get_address_scope): 200 GET http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles 0.068s 2020-12-14 02:23:24.420 197 DEBUG tempest.lib.common.rest_client [req-bd93a7b5-27a2-4eab-92ff-862eff271e9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd93a7b5-27a2-4eab-92ff-862eff271e9d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:24.477 197 INFO tempest.lib.common.rest_client [req-d17bb2de-7fa2-4db0-a833-43cf6fc4fde2 ] Request (AddressScopeExtRbacTest:test_get_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:23:24.481 197 DEBUG tempest.lib.common.rest_client [req-d17bb2de-7fa2-4db0-a833-43cf6fc4fde2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d17bb2de-7fa2-4db0-a833-43cf6fc4fde2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["S2wtAsj2SHizrCrfH5tSIg"], "expires_at": "2020-12-14T03:23:24.000000Z", "issued_at": "2020-12-14T02:23:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:24.538 197 INFO tempest.lib.common.rest_client [req-eef656c9-b7c3-49b2-ab9e-e26e15834c1d ] Request (AddressScopeExtRbacTest:test_get_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:23:24.542 197 DEBUG tempest.lib.common.rest_client [req-eef656c9-b7c3-49b2-ab9e-e26e15834c1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eef656c9-b7c3-49b2-ab9e-e26e15834c1d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["08xj2e5fR1e5ZOEz7voZ7A"], "expires_at": "2020-12-14T03:23:24.000000Z", "issued_at": "2020-12-14T02:23:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:24.718 197 INFO tempest.lib.common.rest_client [req-9e7c30d1-ec75-424c-b313-a5894041d526 ] Request (AddressScopeExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/address-scopes/09a8208f-b82f-4ad4-abcf-beb5355840a7 0.166s 2020-12-14 02:23:24.720 197 DEBUG tempest.lib.common.rest_client [req-9e7c30d1-ec75-424c-b313-a5894041d526 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-9e7c30d1-ec75-424c-b313-a5894041d526', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:24 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/09a8208f-b82f-4ad4-abcf-beb5355840a7'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:24.731 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:24.751 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_address_scope, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:24.802 197 INFO tempest.lib.common.rest_client [req-2c54381d-2697-4352-be18-cdd12ec145e5 ] Request (AddressScopeExtRbacTest:test_list_address_scopes): 201 POST http://172.30.13.94:9696/v2.0/address-scopes 0.046s 2020-12-14 02:23:24.804 197 DEBUG tempest.lib.common.rest_client [req-2c54381d-2697-4352-be18-cdd12ec145e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"address_scope": {"name": "tempest-AddressScopeExtRbacTest-653236752", "ip_version": 6}} Response - Headers: {'content-type': 'application/json', 'content-length': '251', 'x-openstack-request-id': 'req-2c54381d-2697-4352-be18-cdd12ec145e5', 'date': 'Mon, 14 Dec 2020 02:23:24 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes'} Body: b'{"address_scope": {"id": "428ffbb3-fe0d-493f-ae79-96365816875c", "project_id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-653236752", "shared": false, "ip_version": 6, "tenant_id": "9959e20a4cf54314ab7621c21e1d5b85"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:24.806 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:24.876 197 INFO tempest.lib.common.rest_client [req-61f7e06f-dda7-4935-a424-9fdd5490c8b2 ] Request (AddressScopeExtRbacTest:test_list_address_scopes): 200 GET http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles 0.065s 2020-12-14 02:23:24.879 197 DEBUG tempest.lib.common.rest_client [req-61f7e06f-dda7-4935-a424-9fdd5490c8b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-61f7e06f-dda7-4935-a424-9fdd5490c8b2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:24.925 189 INFO tempest.lib.common.rest_client [req-58a56d07-7592-47cb-8e60-b8339845fb9b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.870s 2020-12-14 02:23:24.929 189 DEBUG tempest.lib.common.rest_client [req-58a56d07-7592-47cb-8e60-b8339845fb9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-58a56d07-7592-47cb-8e60-b8339845fb9b', 'x-compute-request-id': 'req-58a56d07-7592-47cb-8e60-b8339845fb9b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:24.934 197 INFO tempest.lib.common.rest_client [req-8b4d6dc1-0713-4c89-8a9f-7d069f49f4f5 ] Request (AddressScopeExtRbacTest:test_list_address_scopes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:23:24.936 197 DEBUG tempest.lib.common.rest_client [req-8b4d6dc1-0713-4c89-8a9f-7d069f49f4f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b4d6dc1-0713-4c89-8a9f-7d069f49f4f5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["hacjiZyNSGigpD5R3vsscw"], "expires_at": "2020-12-14T03:23:24.000000Z", "issued_at": "2020-12-14T02:23:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:24.995 197 INFO tempest.lib.common.rest_client [req-745717cd-dd67-492a-b143-a5b103466e50 ] Request (AddressScopeExtRbacTest:test_list_address_scopes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.055s 2020-12-14 02:23:24.997 197 DEBUG tempest.lib.common.rest_client [req-745717cd-dd67-492a-b143-a5b103466e50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-745717cd-dd67-492a-b143-a5b103466e50', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["CQ0LJe1oSEOLUeHTjQ7OEA"], "expires_at": "2020-12-14T03:23:24.000000Z", "issued_at": "2020-12-14T02:23:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:25.102 197 INFO tempest.lib.common.rest_client [req-dccb7ef1-d2f8-461a-9aa6-8072b1f095b6 ] Request (AddressScopeExtRbacTest:test_list_address_scopes): 200 GET http://172.30.13.94:9696/v2.0/address-scopes?id=428ffbb3-fe0d-493f-ae79-96365816875c 0.099s 2020-12-14 02:23:25.104 197 DEBUG tempest.lib.common.rest_client [req-dccb7ef1-d2f8-461a-9aa6-8072b1f095b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '254', 'x-openstack-request-id': 'req-dccb7ef1-d2f8-461a-9aa6-8072b1f095b6', 'date': 'Mon, 14 Dec 2020 02:23:25 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes?id=428ffbb3-fe0d-493f-ae79-96365816875c'} Body: b'{"address_scopes": [{"id": "428ffbb3-fe0d-493f-ae79-96365816875c", "project_id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-653236752", "shared": false, "ip_version": 6, "tenant_id": "9959e20a4cf54314ab7621c21e1d5b85"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:25.108 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:25.176 197 INFO tempest.lib.common.rest_client [req-73af6ac7-7bf8-4e21-a50a-08bd71d9b0f2 ] Request (AddressScopeExtRbacTest:test_list_address_scopes): 200 GET http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles 0.063s 2020-12-14 02:23:25.178 197 DEBUG tempest.lib.common.rest_client [req-73af6ac7-7bf8-4e21-a50a-08bd71d9b0f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73af6ac7-7bf8-4e21-a50a-08bd71d9b0f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:25.227 197 INFO tempest.lib.common.rest_client [req-b7ada2a0-a007-4e00-ad0c-69cce377cc22 ] Request (AddressScopeExtRbacTest:test_list_address_scopes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:23:25.229 197 DEBUG tempest.lib.common.rest_client [req-b7ada2a0-a007-4e00-ad0c-69cce377cc22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7ada2a0-a007-4e00-ad0c-69cce377cc22', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["4bhkp-znQmedUcP8K8QSeg"], "expires_at": "2020-12-14T03:23:25.000000Z", "issued_at": "2020-12-14T02:23:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:25.283 197 INFO tempest.lib.common.rest_client [req-84445754-454b-4938-9f61-6d1da7f95d4e ] Request (AddressScopeExtRbacTest:test_list_address_scopes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:23:25.287 197 DEBUG tempest.lib.common.rest_client [req-84445754-454b-4938-9f61-6d1da7f95d4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84445754-454b-4938-9f61-6d1da7f95d4e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["zh7RTmLcTXuI27ICDhAkNQ"], "expires_at": "2020-12-14T03:23:25.000000Z", "issued_at": "2020-12-14T02:23:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:25.415 197 INFO tempest.lib.common.rest_client [req-6c98230c-fdcb-46b4-ac77-009f61a1178f ] Request (AddressScopeExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/address-scopes/428ffbb3-fe0d-493f-ae79-96365816875c 0.119s 2020-12-14 02:23:25.419 197 DEBUG tempest.lib.common.rest_client [req-6c98230c-fdcb-46b4-ac77-009f61a1178f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6c98230c-fdcb-46b4-ac77-009f61a1178f', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:25 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/428ffbb3-fe0d-493f-ae79-96365816875c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:25.430 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:25.448 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_address_scope, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:25.450 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:25.468 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_address_scope, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:25.511 197 INFO tempest.lib.common.rest_client [req-e16437d5-b9c0-4813-b608-d2ea1116c075 ] Request (AddressScopeExtRbacTest:test_update_address_scope): 201 POST http://172.30.13.94:9696/v2.0/address-scopes 0.038s 2020-12-14 02:23:25.514 197 DEBUG tempest.lib.common.rest_client [req-e16437d5-b9c0-4813-b608-d2ea1116c075 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"address_scope": {"name": "tempest-AddressScopeExtRbacTest-1274490133", "ip_version": 6}} Response - Headers: {'content-type': 'application/json', 'content-length': '252', 'x-openstack-request-id': 'req-e16437d5-b9c0-4813-b608-d2ea1116c075', 'date': 'Mon, 14 Dec 2020 02:23:25 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes'} Body: b'{"address_scope": {"id": "628b2abb-0b1f-4dc4-826f-7c10833625c6", "project_id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-1274490133", "shared": false, "ip_version": 6, "tenant_id": "9959e20a4cf54314ab7621c21e1d5b85"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:25.519 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:25.575 197 INFO tempest.lib.common.rest_client [req-92180e27-269c-4ea8-ab73-156de2ff8672 ] Request (AddressScopeExtRbacTest:test_update_address_scope): 200 GET http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles 0.048s 2020-12-14 02:23:25.577 197 DEBUG tempest.lib.common.rest_client [req-92180e27-269c-4ea8-ab73-156de2ff8672 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92180e27-269c-4ea8-ab73-156de2ff8672', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:25.624 197 INFO tempest.lib.common.rest_client [req-759dbdc8-31d1-4e3b-94b4-b872155e40ae ] Request (AddressScopeExtRbacTest:test_update_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:23:25.628 197 DEBUG tempest.lib.common.rest_client [req-759dbdc8-31d1-4e3b-94b4-b872155e40ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-759dbdc8-31d1-4e3b-94b4-b872155e40ae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["v7Iv6bC4RciAWbI9zrHIow"], "expires_at": "2020-12-14T03:23:25.000000Z", "issued_at": "2020-12-14T02:23:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:25.675 197 INFO tempest.lib.common.rest_client [req-47ee2fad-121d-412b-ada8-f26dd17aa444 ] Request (AddressScopeExtRbacTest:test_update_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:23:25.678 197 DEBUG tempest.lib.common.rest_client [req-47ee2fad-121d-412b-ada8-f26dd17aa444 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47ee2fad-121d-412b-ada8-f26dd17aa444', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["hmT3tLJlQh-55Y0LsPMqhA"], "expires_at": "2020-12-14T03:23:25.000000Z", "issued_at": "2020-12-14T02:23:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:25.834 197 INFO tempest.lib.common.rest_client [req-c0c40509-a381-496c-90ef-ce6e7585d105 ] Request (AddressScopeExtRbacTest:test_update_address_scope): 200 PUT http://172.30.13.94:9696/v2.0/address-scopes/628b2abb-0b1f-4dc4-826f-7c10833625c6 0.150s 2020-12-14 02:23:25.838 197 DEBUG tempest.lib.common.rest_client [req-c0c40509-a381-496c-90ef-ce6e7585d105 ] Request - Headers: {'X-Auth-Token': ''} Body: {"address_scope": {"name": "tempest-AddressScopeExtRbacTest-1179159695"}} Response - Headers: {'content-type': 'application/json', 'content-length': '252', 'x-openstack-request-id': 'req-c0c40509-a381-496c-90ef-ce6e7585d105', 'date': 'Mon, 14 Dec 2020 02:23:25 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/628b2abb-0b1f-4dc4-826f-7c10833625c6'} Body: b'{"address_scope": {"id": "628b2abb-0b1f-4dc4-826f-7c10833625c6", "project_id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-1179159695", "shared": false, "ip_version": 6, "tenant_id": "9959e20a4cf54314ab7621c21e1d5b85"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:25.842 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:25.916 197 INFO tempest.lib.common.rest_client [req-c2bb52ad-4254-4ea6-a719-8c521cfbabd7 ] Request (AddressScopeExtRbacTest:test_update_address_scope): 200 GET http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles 0.068s 2020-12-14 02:23:25.918 197 DEBUG tempest.lib.common.rest_client [req-c2bb52ad-4254-4ea6-a719-8c521cfbabd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2bb52ad-4254-4ea6-a719-8c521cfbabd7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:25.972 197 INFO tempest.lib.common.rest_client [req-751267aa-3999-4e89-9c21-1f47515e4089 ] Request (AddressScopeExtRbacTest:test_update_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:23:25.976 197 DEBUG tempest.lib.common.rest_client [req-751267aa-3999-4e89-9c21-1f47515e4089 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-751267aa-3999-4e89-9c21-1f47515e4089', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["4WigKFR1TDqHhxNdzn9ueQ"], "expires_at": "2020-12-14T03:23:25.000000Z", "issued_at": "2020-12-14T02:23:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:26.027 197 INFO tempest.lib.common.rest_client [req-af7c7666-0d24-4549-ab97-0672af913d94 ] Request (AddressScopeExtRbacTest:test_update_address_scope): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:23:26.031 197 DEBUG tempest.lib.common.rest_client [req-af7c7666-0d24-4549-ab97-0672af913d94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af7c7666-0d24-4549-ab97-0672af913d94', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["GaKf7TV0SQefKqi1zA96EQ"], "expires_at": "2020-12-14T03:23:26.000000Z", "issued_at": "2020-12-14T02:23:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:26.166 197 INFO tempest.lib.common.rest_client [req-8e25a067-2f5d-47eb-9751-76b53f02832d ] Request (AddressScopeExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/address-scopes/628b2abb-0b1f-4dc4-826f-7c10833625c6 0.126s 2020-12-14 02:23:26.168 197 DEBUG tempest.lib.common.rest_client [req-8e25a067-2f5d-47eb-9751-76b53f02832d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8e25a067-2f5d-47eb-9751-76b53f02832d', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:26 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/628b2abb-0b1f-4dc4-826f-7c10833625c6'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:26.182 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:26.208 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_address_scope, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:26.211 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:26.236 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_address_scope, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:26.238 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:26.261 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_address_scope:shared, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:26.326 197 INFO tempest.lib.common.rest_client [req-b40bc9b1-c381-440e-9f19-268cafac92eb ] Request (AddressScopeExtRbacTest:test_update_address_scope_shared): 201 POST http://172.30.13.94:9696/v2.0/address-scopes 0.058s 2020-12-14 02:23:26.330 197 DEBUG tempest.lib.common.rest_client [req-b40bc9b1-c381-440e-9f19-268cafac92eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"address_scope": {"name": "tempest-AddressScopeExtRbacTest-2079293589", "ip_version": 6, "shared": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '251', 'x-openstack-request-id': 'req-b40bc9b1-c381-440e-9f19-268cafac92eb', 'date': 'Mon, 14 Dec 2020 02:23:26 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes'} Body: b'{"address_scope": {"id": "4aead373-ef0e-437b-8882-ad7309bd5a78", "project_id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-2079293589", "shared": true, "ip_version": 6, "tenant_id": "9959e20a4cf54314ab7621c21e1d5b85"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:26.335 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:26.395 189 INFO tempest.lib.common.rest_client [req-e3fa1c8f-3909-4acd-a7a4-a2c36bff2237 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.347s 2020-12-14 02:23:26.398 189 DEBUG tempest.lib.common.rest_client [req-e3fa1c8f-3909-4acd-a7a4-a2c36bff2237 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e3fa1c8f-3909-4acd-a7a4-a2c36bff2237', 'x-compute-request-id': 'req-e3fa1c8f-3909-4acd-a7a4-a2c36bff2237', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:26.409 197 INFO tempest.lib.common.rest_client [req-f2d9b0ed-d4f0-4644-9a6c-f81dd86900f5 ] Request (AddressScopeExtRbacTest:test_update_address_scope_shared): 200 GET http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles 0.067s 2020-12-14 02:23:26.412 197 DEBUG tempest.lib.common.rest_client [req-f2d9b0ed-d4f0-4644-9a6c-f81dd86900f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2d9b0ed-d4f0-4644-9a6c-f81dd86900f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:26.462 197 INFO tempest.lib.common.rest_client [req-14711599-2001-4cf7-b6d8-d7a228f2eaa5 ] Request (AddressScopeExtRbacTest:test_update_address_scope_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:23:26.466 197 DEBUG tempest.lib.common.rest_client [req-14711599-2001-4cf7-b6d8-d7a228f2eaa5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14711599-2001-4cf7-b6d8-d7a228f2eaa5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["gehoJaT-SROCWkRvk68bcg"], "expires_at": "2020-12-14T03:23:26.000000Z", "issued_at": "2020-12-14T02:23:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:26.518 197 INFO tempest.lib.common.rest_client [req-1755d857-91cf-4f5c-a36d-e1a417cbfd41 ] Request (AddressScopeExtRbacTest:test_update_address_scope_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:23:26.522 197 DEBUG tempest.lib.common.rest_client [req-1755d857-91cf-4f5c-a36d-e1a417cbfd41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1755d857-91cf-4f5c-a36d-e1a417cbfd41', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["l_k4fGPmQbGs2fv47Towfw"], "expires_at": "2020-12-14T03:23:26.000000Z", "issued_at": "2020-12-14T02:23:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:26.644 197 INFO tempest.lib.common.rest_client [req-03ec5ffc-e201-4bb0-85f6-4bdbb4cd0a43 ] Request (AddressScopeExtRbacTest:test_update_address_scope_shared): 200 PUT http://172.30.13.94:9696/v2.0/address-scopes/4aead373-ef0e-437b-8882-ad7309bd5a78 0.112s 2020-12-14 02:23:26.647 197 DEBUG tempest.lib.common.rest_client [req-03ec5ffc-e201-4bb0-85f6-4bdbb4cd0a43 ] Request - Headers: {'X-Auth-Token': ''} Body: {"address_scope": {"shared": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '251', 'x-openstack-request-id': 'req-03ec5ffc-e201-4bb0-85f6-4bdbb4cd0a43', 'date': 'Mon, 14 Dec 2020 02:23:26 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/4aead373-ef0e-437b-8882-ad7309bd5a78'} Body: b'{"address_scope": {"id": "4aead373-ef0e-437b-8882-ad7309bd5a78", "project_id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-2079293589", "shared": true, "ip_version": 6, "tenant_id": "9959e20a4cf54314ab7621c21e1d5b85"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:26.650 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:26.721 197 INFO tempest.lib.common.rest_client [req-16462628-2b7f-4780-b7c8-ac4af47ff779 ] Request (AddressScopeExtRbacTest:test_update_address_scope_shared): 200 GET http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles 0.064s 2020-12-14 02:23:26.725 197 DEBUG tempest.lib.common.rest_client [req-16462628-2b7f-4780-b7c8-ac4af47ff779 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16462628-2b7f-4780-b7c8-ac4af47ff779', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85/users/0b61cd2fb2094e57b4113dd8c06d404f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:26.780 197 INFO tempest.lib.common.rest_client [req-e1171f6d-4386-4ac4-bac1-473dd66b2c84 ] Request (AddressScopeExtRbacTest:test_update_address_scope_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:23:26.784 197 DEBUG tempest.lib.common.rest_client [req-e1171f6d-4386-4ac4-bac1-473dd66b2c84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1171f6d-4386-4ac4-bac1-473dd66b2c84', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["sdua0XHXQxitQvEL0UovtA"], "expires_at": "2020-12-14T03:23:26.000000Z", "issued_at": "2020-12-14T02:23:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:26.837 197 INFO tempest.lib.common.rest_client [req-43fde6bb-2d3d-4e23-a169-f17996047593 ] Request (AddressScopeExtRbacTest:test_update_address_scope_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:23:26.840 197 DEBUG tempest.lib.common.rest_client [req-43fde6bb-2d3d-4e23-a169-f17996047593 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43fde6bb-2d3d-4e23-a169-f17996047593', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "0b61cd2fb2094e57b4113dd8c06d404f", "name": "tempest-AddressScopeExtRbacTest-397428244", "password_expires_at": null}, "audit_ids": ["OQLHkJUCS4OGwyt8N49yEg"], "expires_at": "2020-12-14T03:23:26.000000Z", "issued_at": "2020-12-14T02:23:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9959e20a4cf54314ab7621c21e1d5b85", "name": "tempest-AddressScopeExtRbacTest-397428244"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9959e20a4cf54314ab7621c21e1d5b85", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:26.986 197 INFO tempest.lib.common.rest_client [req-58351bd8-2a69-48a5-9655-a41df304f6b3 ] Request (AddressScopeExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/address-scopes/4aead373-ef0e-437b-8882-ad7309bd5a78 0.135s 2020-12-14 02:23:26.989 197 DEBUG tempest.lib.common.rest_client [req-58351bd8-2a69-48a5-9655-a41df304f6b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-58351bd8-2a69-48a5-9655-a41df304f6b3', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:26 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/address-scopes/4aead373-ef0e-437b-8882-ad7309bd5a78'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:27.693 197 INFO tempest.lib.common.rest_client [req-cbe0193c-abc5-489b-8556-be294e6c6453 ] Request (AddressScopeExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/e8310647-108f-4751-b49b-eef865c9a7df 0.690s 2020-12-14 02:23:27.695 197 DEBUG tempest.lib.common.rest_client [req-cbe0193c-abc5-489b-8556-be294e6c6453 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-cbe0193c-abc5-489b-8556-be294e6c6453', 'date': 'Mon, 14 Dec 2020 02:23:27 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/e8310647-108f-4751-b49b-eef865c9a7df'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:27.751 189 INFO tempest.lib.common.rest_client [req-b9004192-d296-4af2-956e-5bae495ab4aa ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.244s 2020-12-14 02:23:27.755 189 DEBUG tempest.lib.common.rest_client [req-b9004192-d296-4af2-956e-5bae495ab4aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b9004192-d296-4af2-956e-5bae495ab4aa', 'x-compute-request-id': 'req-b9004192-d296-4af2-956e-5bae495ab4aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:27.854 197 INFO tempest.lib.common.rest_client [req-3f132b64-5adc-46a0-bb85-10a0cf09b32a ] Request (AddressScopeExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/0b61cd2fb2094e57b4113dd8c06d404f 0.151s 2020-12-14 02:23:27.856 197 DEBUG tempest.lib.common.rest_client [req-3f132b64-5adc-46a0-bb85-10a0cf09b32a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f132b64-5adc-46a0-bb85-10a0cf09b32a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/0b61cd2fb2094e57b4113dd8c06d404f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:27.960 197 INFO tempest.lib.common.rest_client [req-87cfe00e-7470-4bbf-9344-106d04bc63a9 ] Request (AddressScopeExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:23:27.964 197 DEBUG tempest.lib.common.rest_client [req-87cfe00e-7470-4bbf-9344-106d04bc63a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87cfe00e-7470-4bbf-9344-106d04bc63a9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["2iFRAn1HSgi7lBo7egXIrw"], "expires_at": "2020-12-14T03:23:27.000000Z", "issued_at": "2020-12-14T02:23:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:28.161 197 INFO tempest.lib.common.rest_client [req-cac45ee3-37ea-4bbe-bb26-ada51d1b7c54 ] Request (AddressScopeExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=9959e20a4cf54314ab7621c21e1d5b85&name=default 0.191s 2020-12-14 02:23:28.163 197 DEBUG tempest.lib.common.rest_client [req-cac45ee3-37ea-4bbe-bb26-ada51d1b7c54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-cac45ee3-37ea-4bbe-bb26-ada51d1b7c54', 'date': 'Mon, 14 Dec 2020 02:23:28 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=9959e20a4cf54314ab7621c21e1d5b85&name=default'} Body: b'{"security_groups": [{"id": "2888fb89-2b07-4e22-8b58-1688164b4800", "name": "default", "stateful": true, "tenant_id": "9959e20a4cf54314ab7621c21e1d5b85", "description": "Default security group", "security_group_rules": [{"id": "0b0b07d2-f260-4f4c-90a2-075d5e03b449", "tenant_id": "9959e20a4cf54314ab7621c21e1d5b85", "security_group_id": "2888fb89-2b07-4e22-8b58-1688164b4800", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:23:21Z", "updated_at": "2020-12-14T02:23:21Z", "revision_number": 0, "project_id": "9959e20a4cf54314ab7621c21e1d5b85"}, {"id": "413a5aa6-4a37-4d8e-9ed3-9b2e8cb44580", "tenant_id": "9959e20a4cf54314ab7621c21e1d5b85", "security_group_id": "2888fb89-2b07-4e22-8b58-1688164b4800", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2888fb89-2b07-4e22-8b58-1688164b4800", "description": null, "tags": [], "created_at": "2020-12-14T02:23:21Z", "updated_at": "2020-12-14T02:23:21Z", "revision_number": 0, "project_id": "9959e20a4cf54314ab7621c21e1d5b85"}, {"id": "78622dcc-093e-4b9b-a2d5-f1471f3ab7e2", "tenant_id": "9959e20a4cf54314ab7621c21e1d5b85", "security_group_id": "2888fb89-2b07-4e22-8b58-1688164b4800", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2888fb89-2b07-4e22-8b58-1688164b4800", "description": null, "tags": [], "created_at": "2020-12-14T02:23:21Z", "updated_at": "2020-12-14T02:23:21Z", "revision_number": 0, "project_id": "9959e20a4cf54314ab7621c21e1d5b85"}, {"id": "9b2868ea-52e4-4d05-84cc-55ebc4f6235a", "tenant_id": "9959e20a4cf54314ab7621c21e1d5b85", "security_group_id": "2888fb89-2b07-4e22-8b58-1688164b4800", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:23:21Z", "updated_at": "2020-12-14T02:23:21Z", "revision_number": 0, "project_id": "9959e20a4cf54314ab7621c21e1d5b85"}], "tags": [], "created_at": "2020-12-14T02:23:21Z", "updated_at": "2020-12-14T02:23:21Z", "revision_number": 1, "project_id": "9959e20a4cf54314ab7621c21e1d5b85"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:28.323 197 INFO tempest.lib.common.rest_client [req-c6c48083-00f9-4fed-a050-586ca3d564b0 ] Request (AddressScopeExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/2888fb89-2b07-4e22-8b58-1688164b4800 0.153s 2020-12-14 02:23:28.325 197 DEBUG tempest.lib.common.rest_client [req-c6c48083-00f9-4fed-a050-586ca3d564b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c6c48083-00f9-4fed-a050-586ca3d564b0', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:28 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/2888fb89-2b07-4e22-8b58-1688164b4800'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:28.474 197 INFO tempest.lib.common.rest_client [req-8fd267cf-c47f-4e15-9eb0-86657d8b7d0a ] Request (AddressScopeExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85 0.142s 2020-12-14 02:23:28.477 197 DEBUG tempest.lib.common.rest_client [req-8fd267cf-c47f-4e15-9eb0-86657d8b7d0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8fd267cf-c47f-4e15-9eb0-86657d8b7d0a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9959e20a4cf54314ab7621c21e1d5b85'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:28.599 197 INFO tempest.lib.common.rest_client [req-d9a3c360-4975-4eb1-908b-152a6a23dfdc ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:23:28.601 197 DEBUG tempest.lib.common.rest_client [req-d9a3c360-4975-4eb1-908b-152a6a23dfdc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9a3c360-4975-4eb1-908b-152a6a23dfdc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["r8mrMR7vS4GAEtlsi69QMw"], "expires_at": "2020-12-14T03:23:28.000000Z", "issued_at": "2020-12-14T02:23:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:28.708 197 INFO tempest.lib.common.rest_client [req-0b380a42-8d82-4d99-af11-10589ae0a8b5 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:23:28.711 197 DEBUG tempest.lib.common.rest_client [req-0b380a42-8d82-4d99-af11-10589ae0a8b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b380a42-8d82-4d99-af11-10589ae0a8b5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["J9iaPeG9SauWhHd7cFWM4Q"], "expires_at": "2020-12-14T03:23:28.000000Z", "issued_at": "2020-12-14T02:23:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:28.792 197 INFO tempest.lib.common.rest_client [req-9e555e20-4254-41c7-aab4-9cf2d913a664 ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.073s 2020-12-14 02:23:28.795 197 DEBUG tempest.lib.common.rest_client [req-9e555e20-4254-41c7-aab4-9cf2d913a664 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e555e20-4254-41c7-aab4-9cf2d913a664', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:28.873 197 INFO tempest.lib.common.rest_client [req-312c6ca1-c789-4810-aba6-2f722d374429 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.071s 2020-12-14 02:23:28.876 197 DEBUG tempest.lib.common.rest_client [req-312c6ca1-c789-4810-aba6-2f722d374429 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-AgentsRbacTest-734127712-desc", "domain_id": "default", "name": "tempest-AgentsRbacTest-734127712"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '364', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-312c6ca1-c789-4810-aba6-2f722d374429', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "cdc100b41bd94962bb249ac2ef118448", "name": "tempest-AgentsRbacTest-734127712", "domain_id": "default", "description": "tempest-AgentsRbacTest-734127712-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:29.004 197 INFO tempest.lib.common.rest_client [req-d2192c7f-8af9-43c4-9885-a1e00dfe52f9 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.117s 2020-12-14 02:23:29.007 197 DEBUG tempest.lib.common.rest_client [req-d2192c7f-8af9-43c4-9885-a1e00dfe52f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-AgentsRbacTest-734127712", "password": "V9#=fIEhMCGK056", "project_id": "cdc100b41bd94962bb249ac2ef118448", "email": "tempest-AgentsRbacTest-1594762455@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '383', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2192c7f-8af9-43c4-9885-a1e00dfe52f9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "cdc100b41bd94962bb249ac2ef118448", "email": "tempest-AgentsRbacTest-1594762455@example.com", "id": "c0aa4995a3f143d9bb1bd2b823624253", "name": "tempest-AgentsRbacTest-734127712", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/c0aa4995a3f143d9bb1bd2b823624253"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:29.075 197 INFO tempest.lib.common.rest_client [req-ec05fb1e-4841-48eb-a5a6-efb1118f2238 ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:23:29.077 197 DEBUG tempest.lib.common.rest_client [req-ec05fb1e-4841-48eb-a5a6-efb1118f2238 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec05fb1e-4841-48eb-a5a6-efb1118f2238', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:29.081 189 INFO tempest.lib.common.rest_client [req-85261eb6-84dd-4291-8146-4de00ede8d39 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.217s 2020-12-14 02:23:29.083 189 DEBUG tempest.lib.common.rest_client [req-85261eb6-84dd-4291-8146-4de00ede8d39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-85261eb6-84dd-4291-8146-4de00ede8d39', 'x-compute-request-id': 'req-85261eb6-84dd-4291-8146-4de00ede8d39', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:29.156 197 INFO tempest.lib.common.rest_client [req-1a8e709b-28b4-4826-bea6-99c8f5c926de ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.070s 2020-12-14 02:23:29.158 197 DEBUG tempest.lib.common.rest_client [req-1a8e709b-28b4-4826-bea6-99c8f5c926de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a8e709b-28b4-4826-bea6-99c8f5c926de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:29.242 197 INFO tempest.lib.common.rest_client [req-0f103a31-6eb8-4907-9a12-8e6681b7b534 ] Request (AgentsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles/72a4576c553448cd941b052c1ca0cf2d 0.077s 2020-12-14 02:23:29.244 197 DEBUG tempest.lib.common.rest_client [req-0f103a31-6eb8-4907-9a12-8e6681b7b534 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f103a31-6eb8-4907-9a12-8e6681b7b534', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:29.247 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AgentsRbacTest-734127712', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'cdc100b41bd94962bb249ac2ef118448', 'project_name': 'tempest-AgentsRbacTest-734127712', 'tenant_id': 'cdc100b41bd94962bb249ac2ef118448', 'tenant_name': 'tempest-AgentsRbacTest-734127712', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c0aa4995a3f143d9bb1bd2b823624253'}, Network: None, Subnet: None, Router: None 2020-12-14 02:23:29.249 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AgentsRbacTest-734127712', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'cdc100b41bd94962bb249ac2ef118448', 'project_name': 'tempest-AgentsRbacTest-734127712', 'tenant_id': 'cdc100b41bd94962bb249ac2ef118448', 'tenant_name': 'tempest-AgentsRbacTest-734127712', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c0aa4995a3f143d9bb1bd2b823624253'}, Network: None, Subnet: None, Router: None 2020-12-14 02:23:29.423 197 INFO tempest.lib.common.rest_client [req-fc860695-0d08-40ea-80ac-70a5b85b4d9a ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.112s 2020-12-14 02:23:29.426 197 DEBUG tempest.lib.common.rest_client [req-fc860695-0d08-40ea-80ac-70a5b85b4d9a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6557', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc860695-0d08-40ea-80ac-70a5b85b4d9a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c0aa4995a3f143d9bb1bd2b823624253", "name": "tempest-AgentsRbacTest-734127712", "password_expires_at": null}, "audit_ids": ["s5cPqFmzQUmtU6sSq1kK6w"], "expires_at": "2020-12-14T03:23:29.000000Z", "issued_at": "2020-12-14T02:23:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cdc100b41bd94962bb249ac2ef118448", "name": "tempest-AgentsRbacTest-734127712"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/imag _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:29.528 197 INFO tempest.lib.common.rest_client [req-0c356af8-cea3-406b-aa66-3d225a02a40d ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:23:29.532 197 DEBUG tempest.lib.common.rest_client [req-0c356af8-cea3-406b-aa66-3d225a02a40d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c356af8-cea3-406b-aa66-3d225a02a40d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ubVmeeb-RTmkUiX8so0qGA"], "expires_at": "2020-12-14T03:23:29.000000Z", "issued_at": "2020-12-14T02:23:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:29.640 197 INFO tempest.lib.common.rest_client [req-6b760c97-9954-4365-852e-eaaf615a66c4 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:23:29.643 197 DEBUG tempest.lib.common.rest_client [req-6b760c97-9954-4365-852e-eaaf615a66c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b760c97-9954-4365-852e-eaaf615a66c4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["b0Mx1m0-RbSGwN3iDpCseQ"], "expires_at": "2020-12-14T03:23:29.000000Z", "issued_at": "2020-12-14T02:23:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:29.709 197 INFO tempest.lib.common.rest_client [req-c62bccb9-1eda-4ee2-8847-f23016e0e39f ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.057s 2020-12-14 02:23:29.712 197 DEBUG tempest.lib.common.rest_client [req-c62bccb9-1eda-4ee2-8847-f23016e0e39f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c62bccb9-1eda-4ee2-8847-f23016e0e39f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:29.774 197 INFO tempest.lib.common.rest_client [req-aa1d2878-3ef1-4a77-aa2a-030409d4d89d ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:23:29.777 197 DEBUG tempest.lib.common.rest_client [req-aa1d2878-3ef1-4a77-aa2a-030409d4d89d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa1d2878-3ef1-4a77-aa2a-030409d4d89d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:29.782 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:23:29.784 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:29.853 197 INFO tempest.lib.common.rest_client [req-fbf6e09e-0938-4f6e-85b0-9670e1b4b4a3 ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles 0.065s 2020-12-14 02:23:29.855 197 DEBUG tempest.lib.common.rest_client [req-fbf6e09e-0938-4f6e-85b0-9670e1b4b4a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fbf6e09e-0938-4f6e-85b0-9670e1b4b4a3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:29.931 197 INFO tempest.lib.common.rest_client [req-cfa06e24-cce4-42c2-be0d-143a91691d9d ] Request (AgentsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-12-14 02:23:29.933 197 DEBUG tempest.lib.common.rest_client [req-cfa06e24-cce4-42c2-be0d-143a91691d9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfa06e24-cce4-42c2-be0d-143a91691d9d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:30.048 197 INFO tempest.lib.common.rest_client [req-2005ccc0-f02e-42b5-b306-1f093b98a3bf ] Request (AgentsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-12-14 02:23:30.051 197 DEBUG tempest.lib.common.rest_client [req-2005ccc0-f02e-42b5-b306-1f093b98a3bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2005ccc0-f02e-42b5-b306-1f093b98a3bf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:30.401 189 INFO tempest.lib.common.rest_client [req-1562b2d1-240e-4d20-b769-22a434006189 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.233s 2020-12-14 02:23:30.405 189 DEBUG tempest.lib.common.rest_client [req-1562b2d1-240e-4d20-b769-22a434006189 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1562b2d1-240e-4d20-b769-22a434006189', 'x-compute-request-id': 'req-1562b2d1-240e-4d20-b769-22a434006189', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:31.142 197 INFO tempest.lib.common.rest_client [req-b6c30eed-fdf2-4de6-ae82-b642fe41b222 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-12-14 02:23:31.145 197 DEBUG tempest.lib.common.rest_client [req-b6c30eed-fdf2-4de6-ae82-b642fe41b222 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6c30eed-fdf2-4de6-ae82-b642fe41b222', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c0aa4995a3f143d9bb1bd2b823624253", "name": "tempest-AgentsRbacTest-734127712", "password_expires_at": null}, "audit_ids": ["iniRImHURN-pp_mt_vFcEQ"], "expires_at": "2020-12-14T03:23:31.000000Z", "issued_at": "2020-12-14T02:23:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cdc100b41bd94962bb249ac2ef118448", "name": "tempest-AgentsRbacTest-734127712"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:31.333 197 INFO tempest.lib.common.rest_client [req-81f56ff1-a230-41a8-a791-57e21eda44fa ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94:9696/v2.0/agents 0.179s 2020-12-14 02:23:31.335 197 DEBUG tempest.lib.common.rest_client [req-81f56ff1-a230-41a8-a791-57e21eda44fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '4327', 'x-openstack-request-id': 'req-81f56ff1-a230-41a8-a791-57e21eda44fa', 'date': 'Mon, 14 Dec 2020 02:23:31 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents'} Body: b'{"agents": [{"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-12-14 02:23:08", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 9, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 0, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 11, "log_agent_heartbeats": false, "routers": 9}}, {"id": "538ccf2a-fb61-47ed-a10a-785f64cdbb63", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual8", "admin_state_up": true, "created_at": "2020-10-07 13:02:58", "started_at": "2020-10-07 13:03:28", "heartbeat_timestamp": "2020-12-14 02:23:02", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {}, "datapath_type": "system", "devices": 0, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["vxlan"], "tunneling_ip": "172.30.13.93", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "9d48116b-94de-4990-baef-e3b6765751fc", "agent_type": "Open vSwitch agent", "binary": "neutron-openvswitch-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:05", "started_at": "2020-10-07 12:07:35", "heartbeat_timestamp": "2020-12-14 02:23:17", "description": null, "resources_synced": null, "availability_zone": null, "alive": true, "configurations": {"arp_responder_enabled": false, "baremetal_smartnic": false, "bridge_mappings": {"public": "br-ex"}, "datapath_type": "system", "devices": 26, "enable_distributed_routing": false, "extensions": ["qos", "log"], "in_distributed_mode": false, "integration_bridge": "br-int", "l2_population": false, "log_agent_heartbeats": false, "ovs_capabilities": {"datapath_types": ["netdev", "system"], "iface_types": ["erspan", "geneve", "gre", "internal", "ip6erspan", "ip6gre", "lisp", "patch", "stt", "system", "tap", "vxlan"]}, "ovs_hybrid_plug": false, "resource_provider_bandwidths": {}, "resource_provider_hypervisors": {"br-ex": "lf-virtual9"}, "resource_provider_inventory_defaults": {"allocation_ratio": 1.0, "min_unit": 1, "step_size": 1, "reserved": 0}, "tunnel_types": ["gre", "vxlan"], "tunneling_ip": "172.30.13.94", "vhostuser_socket_dir": "/var/run/openvswitch"}}, {"id": "bc496462-aac8-4795-a8f9-6f5600fa0870", "agent_type": "DHCP agent", "binary": "neutron-dhcp-agent", "topic": "dhcp_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:02", "started_at": "2020-10-07 12:07:02", "heartbeat_timestamp": "2020-12-14 02:23:27", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"dhcp_driver": "neutron.agent.linux.dhcp.Dnsmasq", "dhcp_lease_duration": 86400, "log_agent_heartbeats": false, "networks": 9, "ports": 20, "subnets": 10}}, {"id": "faf7e63c-a878-4cb5-b625-f96907b00d51", "agent_type": "Metadata agent", "binary": "neutron-metadata-agent", "topic": "N/A", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:06", "started_at": "2020-10-07 12:07:06", "heartbeat_timestamp": "2020-12-14 02:23:26", "description": null, "resources_synced": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:31.343 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:31.367 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_agent, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:31.370 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:31.490 197 INFO tempest.lib.common.rest_client [req-fe8380af-39ec-4f8a-beaf-4ff0fde2ea1f ] Request (AgentsRbacTest:test_list_agents): 200 GET http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles 0.115s 2020-12-14 02:23:31.492 197 DEBUG tempest.lib.common.rest_client [req-fe8380af-39ec-4f8a-beaf-4ff0fde2ea1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe8380af-39ec-4f8a-beaf-4ff0fde2ea1f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:31.540 197 INFO tempest.lib.common.rest_client [req-a30e3b48-50c9-4c6c-8f20-03dc18c04a7d ] Request (AgentsRbacTest:test_list_agents): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:23:31.542 197 DEBUG tempest.lib.common.rest_client [req-a30e3b48-50c9-4c6c-8f20-03dc18c04a7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a30e3b48-50c9-4c6c-8f20-03dc18c04a7d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c0aa4995a3f143d9bb1bd2b823624253", "name": "tempest-AgentsRbacTest-734127712", "password_expires_at": null}, "audit_ids": ["w3m5aFGfSKaBA5NHh5mnCA"], "expires_at": "2020-12-14T03:23:31.000000Z", "issued_at": "2020-12-14T02:23:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cdc100b41bd94962bb249ac2ef118448", "name": "tempest-AgentsRbacTest-734127712"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:31.688 197 INFO tempest.lib.common.rest_client [req-5bb5f156-6042-48bf-a38b-d861d24a4763 ] Request (AgentsRbacTest:test_list_agents): 200 GET http://172.30.13.94:9696/v2.0/agents?id=0efbff63-9926-4774-9bea-b5e130b9492e 0.139s 2020-12-14 02:23:31.692 197 DEBUG tempest.lib.common.rest_client [req-5bb5f156-6042-48bf-a38b-d861d24a4763 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '676', 'x-openstack-request-id': 'req-5bb5f156-6042-48bf-a38b-d861d24a4763', 'date': 'Mon, 14 Dec 2020 02:23:31 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents?id=0efbff63-9926-4774-9bea-b5e130b9492e'} Body: b'{"agents": [{"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-12-14 02:23:08", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 9, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 0, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 11, "log_agent_heartbeats": false, "routers": 9}}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:31.695 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:31.723 189 INFO tempest.lib.common.rest_client [req-305fa004-239d-4ae9-a364-7979b1da5d90 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.210s 2020-12-14 02:23:31.726 189 DEBUG tempest.lib.common.rest_client [req-305fa004-239d-4ae9-a364-7979b1da5d90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-305fa004-239d-4ae9-a364-7979b1da5d90', 'x-compute-request-id': 'req-305fa004-239d-4ae9-a364-7979b1da5d90', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:31.768 197 INFO tempest.lib.common.rest_client [req-33549364-92b7-440e-951c-17ad5f57b902 ] Request (AgentsRbacTest:test_list_agents): 200 GET http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles 0.067s 2020-12-14 02:23:31.772 197 DEBUG tempest.lib.common.rest_client [req-33549364-92b7-440e-951c-17ad5f57b902 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33549364-92b7-440e-951c-17ad5f57b902', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:31.821 197 INFO tempest.lib.common.rest_client [req-25551f61-ae68-4db2-b318-736fa9299d71 ] Request (AgentsRbacTest:test_list_agents): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:23:31.824 197 DEBUG tempest.lib.common.rest_client [req-25551f61-ae68-4db2-b318-736fa9299d71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25551f61-ae68-4db2-b318-736fa9299d71', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c0aa4995a3f143d9bb1bd2b823624253", "name": "tempest-AgentsRbacTest-734127712", "password_expires_at": null}, "audit_ids": ["aF40_3ILSBOntiLatWamhw"], "expires_at": "2020-12-14T03:23:31.000000Z", "issued_at": "2020-12-14T02:23:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cdc100b41bd94962bb249ac2ef118448", "name": "tempest-AgentsRbacTest-734127712"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:31.837 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:31.860 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_agent, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:31.862 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:31.931 197 INFO tempest.lib.common.rest_client [req-666711a1-315a-4d73-a5bf-752467b8c217 ] Request (AgentsRbacTest:test_show_agent): 200 GET http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles 0.064s 2020-12-14 02:23:31.934 197 DEBUG tempest.lib.common.rest_client [req-666711a1-315a-4d73-a5bf-752467b8c217 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-666711a1-315a-4d73-a5bf-752467b8c217', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:31.983 197 INFO tempest.lib.common.rest_client [req-7d117252-5336-47e4-83ce-755dbca71bb8 ] Request (AgentsRbacTest:test_show_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:23:31.986 197 DEBUG tempest.lib.common.rest_client [req-7d117252-5336-47e4-83ce-755dbca71bb8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d117252-5336-47e4-83ce-755dbca71bb8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c0aa4995a3f143d9bb1bd2b823624253", "name": "tempest-AgentsRbacTest-734127712", "password_expires_at": null}, "audit_ids": ["FCDzvPG1TcmT8cA3Z2IFDw"], "expires_at": "2020-12-14T03:23:31.000000Z", "issued_at": "2020-12-14T02:23:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cdc100b41bd94962bb249ac2ef118448", "name": "tempest-AgentsRbacTest-734127712"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:32.087 197 INFO tempest.lib.common.rest_client [req-a4a6c2a5-a77c-4540-b5ac-ec813c496b17 ] Request (AgentsRbacTest:test_show_agent): 200 GET http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e 0.092s 2020-12-14 02:23:32.089 197 DEBUG tempest.lib.common.rest_client [req-a4a6c2a5-a77c-4540-b5ac-ec813c496b17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '673', 'x-openstack-request-id': 'req-a4a6c2a5-a77c-4540-b5ac-ec813c496b17', 'date': 'Mon, 14 Dec 2020 02:23:32 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e'} Body: b'{"agent": {"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-12-14 02:23:08", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 9, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 0, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 11, "log_agent_heartbeats": false, "routers": 9}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:32.092 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:32.175 197 INFO tempest.lib.common.rest_client [req-99d3b6c4-c0e6-4ce0-9c5b-6687c4e740d7 ] Request (AgentsRbacTest:test_show_agent): 200 GET http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles 0.076s 2020-12-14 02:23:32.178 197 DEBUG tempest.lib.common.rest_client [req-99d3b6c4-c0e6-4ce0-9c5b-6687c4e740d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-99d3b6c4-c0e6-4ce0-9c5b-6687c4e740d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:32.229 197 INFO tempest.lib.common.rest_client [req-ff89f8d1-e104-409f-a35f-9f348901363d ] Request (AgentsRbacTest:test_show_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:23:32.233 197 DEBUG tempest.lib.common.rest_client [req-ff89f8d1-e104-409f-a35f-9f348901363d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff89f8d1-e104-409f-a35f-9f348901363d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c0aa4995a3f143d9bb1bd2b823624253", "name": "tempest-AgentsRbacTest-734127712", "password_expires_at": null}, "audit_ids": ["7Q6y_00pS5qvY1YcVRRsgg"], "expires_at": "2020-12-14T03:23:32.000000Z", "issued_at": "2020-12-14T02:23:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cdc100b41bd94962bb249ac2ef118448", "name": "tempest-AgentsRbacTest-734127712"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:32.247 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:32.270 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_agent, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:32.272 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:32.294 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_agent, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:32.297 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:32.368 197 INFO tempest.lib.common.rest_client [req-995ccec5-9e12-40be-97ab-f6260ae9d160 ] Request (AgentsRbacTest:test_update_agent): 200 GET http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles 0.065s 2020-12-14 02:23:32.371 197 DEBUG tempest.lib.common.rest_client [req-995ccec5-9e12-40be-97ab-f6260ae9d160 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-995ccec5-9e12-40be-97ab-f6260ae9d160', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:32.420 197 INFO tempest.lib.common.rest_client [req-6a864218-1f1e-494e-aa51-bdc8b8ea8c13 ] Request (AgentsRbacTest:test_update_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:23:32.423 197 DEBUG tempest.lib.common.rest_client [req-6a864218-1f1e-494e-aa51-bdc8b8ea8c13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a864218-1f1e-494e-aa51-bdc8b8ea8c13', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c0aa4995a3f143d9bb1bd2b823624253", "name": "tempest-AgentsRbacTest-734127712", "password_expires_at": null}, "audit_ids": ["MtFyG4g0QKyaSPEroWtI-Q"], "expires_at": "2020-12-14T03:23:32.000000Z", "issued_at": "2020-12-14T02:23:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cdc100b41bd94962bb249ac2ef118448", "name": "tempest-AgentsRbacTest-734127712"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:32.538 197 INFO tempest.lib.common.rest_client [req-de3e17b0-a4c8-446b-a552-64dce591df30 ] Request (AgentsRbacTest:test_update_agent): 200 PUT http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e 0.108s 2020-12-14 02:23:32.542 197 DEBUG tempest.lib.common.rest_client [req-de3e17b0-a4c8-446b-a552-64dce591df30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"agent": {"admin_state_up": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '673', 'x-openstack-request-id': 'req-de3e17b0-a4c8-446b-a552-64dce591df30', 'date': 'Mon, 14 Dec 2020 02:23:32 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/agents/0efbff63-9926-4774-9bea-b5e130b9492e'} Body: b'{"agent": {"id": "0efbff63-9926-4774-9bea-b5e130b9492e", "agent_type": "L3 agent", "binary": "neutron-l3-agent", "topic": "l3_agent", "host": "lf-virtual9", "admin_state_up": true, "created_at": "2020-10-07 12:07:04", "started_at": "2020-10-07 12:07:05", "heartbeat_timestamp": "2020-12-14 02:23:08", "description": null, "resources_synced": null, "availability_zone": "nova", "alive": true, "configurations": {"agent_mode": "legacy", "ex_gw_ports": 9, "extensions": ["fip_qos", "gateway_ip_qos", "port_forwarding"], "floating_ips": 0, "handle_internal_only_routers": true, "interface_driver": "openvswitch", "interfaces": 11, "log_agent_heartbeats": false, "routers": 9}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:32.546 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:32.612 197 INFO tempest.lib.common.rest_client [req-2ffe77e0-8e85-426e-b780-99f1a9b7c28d ] Request (AgentsRbacTest:test_update_agent): 200 GET http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles 0.061s 2020-12-14 02:23:32.615 197 DEBUG tempest.lib.common.rest_client [req-2ffe77e0-8e85-426e-b780-99f1a9b7c28d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ffe77e0-8e85-426e-b780-99f1a9b7c28d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448/users/c0aa4995a3f143d9bb1bd2b823624253/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:32.673 197 INFO tempest.lib.common.rest_client [req-7f1db487-094f-44ba-a33e-a69ad12b3518 ] Request (AgentsRbacTest:test_update_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:23:32.677 197 DEBUG tempest.lib.common.rest_client [req-7f1db487-094f-44ba-a33e-a69ad12b3518 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f1db487-094f-44ba-a33e-a69ad12b3518', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c0aa4995a3f143d9bb1bd2b823624253", "name": "tempest-AgentsRbacTest-734127712", "password_expires_at": null}, "audit_ids": ["0kQOo76gTrqmdSYbcQz_bw"], "expires_at": "2020-12-14T03:23:32.000000Z", "issued_at": "2020-12-14T02:23:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cdc100b41bd94962bb249ac2ef118448", "name": "tempest-AgentsRbacTest-734127712"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cdc100b41bd94962bb249ac2ef118448", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:32.848 197 INFO tempest.lib.common.rest_client [req-66a1df0d-7f38-430f-8e2f-335763b9c40f ] Request (AgentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/c0aa4995a3f143d9bb1bd2b823624253 0.153s 2020-12-14 02:23:32.852 197 DEBUG tempest.lib.common.rest_client [req-66a1df0d-7f38-430f-8e2f-335763b9c40f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66a1df0d-7f38-430f-8e2f-335763b9c40f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/c0aa4995a3f143d9bb1bd2b823624253'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:32.962 197 INFO tempest.lib.common.rest_client [req-60ba8d4a-ce36-4cb5-947c-260a9b61c9f4 ] Request (AgentsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-14 02:23:32.965 197 DEBUG tempest.lib.common.rest_client [req-60ba8d4a-ce36-4cb5-947c-260a9b61c9f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60ba8d4a-ce36-4cb5-947c-260a9b61c9f4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["cjtxPZGjTauneZfxWQUN2w"], "expires_at": "2020-12-14T03:23:32.000000Z", "issued_at": "2020-12-14T02:23:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:33.085 189 INFO tempest.lib.common.rest_client [req-3566b5ca-2ed6-40d9-abb2-e52e34209852 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.253s 2020-12-14 02:23:33.089 189 DEBUG tempest.lib.common.rest_client [req-3566b5ca-2ed6-40d9-abb2-e52e34209852 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3566b5ca-2ed6-40d9-abb2-e52e34209852', 'x-compute-request-id': 'req-3566b5ca-2ed6-40d9-abb2-e52e34209852', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:33.281 197 INFO tempest.lib.common.rest_client [req-85ce907c-28da-411b-b5f7-f6e1d224b058 ] Request (AgentsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=cdc100b41bd94962bb249ac2ef118448&name=default 0.309s 2020-12-14 02:23:33.284 197 DEBUG tempest.lib.common.rest_client [req-85ce907c-28da-411b-b5f7-f6e1d224b058 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-85ce907c-28da-411b-b5f7-f6e1d224b058', 'date': 'Mon, 14 Dec 2020 02:23:33 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=cdc100b41bd94962bb249ac2ef118448&name=default'} Body: b'{"security_groups": [{"id": "86d38eb6-7434-42db-af5a-e1db1f57ce66", "name": "default", "stateful": true, "tenant_id": "cdc100b41bd94962bb249ac2ef118448", "description": "Default security group", "security_group_rules": [{"id": "0578c8fe-e0ea-48c8-850f-70eb0af10488", "tenant_id": "cdc100b41bd94962bb249ac2ef118448", "security_group_id": "86d38eb6-7434-42db-af5a-e1db1f57ce66", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:23:33Z", "updated_at": "2020-12-14T02:23:33Z", "revision_number": 0, "project_id": "cdc100b41bd94962bb249ac2ef118448"}, {"id": "64657258-1e2a-4146-becd-cf4a63a65d04", "tenant_id": "cdc100b41bd94962bb249ac2ef118448", "security_group_id": "86d38eb6-7434-42db-af5a-e1db1f57ce66", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "86d38eb6-7434-42db-af5a-e1db1f57ce66", "description": null, "tags": [], "created_at": "2020-12-14T02:23:33Z", "updated_at": "2020-12-14T02:23:33Z", "revision_number": 0, "project_id": "cdc100b41bd94962bb249ac2ef118448"}, {"id": "69466554-af64-4b8f-8f81-074a1b8ac94e", "tenant_id": "cdc100b41bd94962bb249ac2ef118448", "security_group_id": "86d38eb6-7434-42db-af5a-e1db1f57ce66", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "86d38eb6-7434-42db-af5a-e1db1f57ce66", "description": null, "tags": [], "created_at": "2020-12-14T02:23:33Z", "updated_at": "2020-12-14T02:23:33Z", "revision_number": 0, "project_id": "cdc100b41bd94962bb249ac2ef118448"}, {"id": "8e2836d9-d7e2-4151-9ab7-48e395072c14", "tenant_id": "cdc100b41bd94962bb249ac2ef118448", "security_group_id": "86d38eb6-7434-42db-af5a-e1db1f57ce66", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:23:33Z", "updated_at": "2020-12-14T02:23:33Z", "revision_number": 0, "project_id": "cdc100b41bd94962bb249ac2ef118448"}], "tags": [], "created_at": "2020-12-14T02:23:33Z", "updated_at": "2020-12-14T02:23:33Z", "revision_number": 1, "project_id": "cdc100b41bd94962bb249ac2ef118448"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:33.445 197 INFO tempest.lib.common.rest_client [req-53d40157-98a2-4ec7-865c-a8f52a82ed27 ] Request (AgentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/86d38eb6-7434-42db-af5a-e1db1f57ce66 0.154s 2020-12-14 02:23:33.448 197 DEBUG tempest.lib.common.rest_client [req-53d40157-98a2-4ec7-865c-a8f52a82ed27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-53d40157-98a2-4ec7-865c-a8f52a82ed27', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:33 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/86d38eb6-7434-42db-af5a-e1db1f57ce66'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:33.601 197 INFO tempest.lib.common.rest_client [req-cbb80a84-b65e-4228-86f6-4f05c5474d61 ] Request (AgentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448 0.146s 2020-12-14 02:23:33.604 197 DEBUG tempest.lib.common.rest_client [req-cbb80a84-b65e-4228-86f6-4f05c5474d61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cbb80a84-b65e-4228-86f6-4f05c5474d61', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cdc100b41bd94962bb249ac2ef118448'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:33.717 197 INFO tempest.lib.common.rest_client [req-690fd4f3-e13f-4019-9781-76994bbb85d7 ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:23:33.719 197 DEBUG tempest.lib.common.rest_client [req-690fd4f3-e13f-4019-9781-76994bbb85d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-690fd4f3-e13f-4019-9781-76994bbb85d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["fzXzRPhzST6OsMN42oqbWg"], "expires_at": "2020-12-14T03:23:33.000000Z", "issued_at": "2020-12-14T02:23:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:33.829 197 INFO tempest.lib.common.rest_client [req-d00ad4cb-f9eb-4a3e-8f75-06d450266f28 ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:23:33.832 197 DEBUG tempest.lib.common.rest_client [req-d00ad4cb-f9eb-4a3e-8f75-06d450266f28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d00ad4cb-f9eb-4a3e-8f75-06d450266f28', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["1bqC9e8JRc6xFdmEmElXMw"], "expires_at": "2020-12-14T03:23:33.000000Z", "issued_at": "2020-12-14T02:23:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:33.908 197 INFO tempest.lib.common.rest_client [req-ddc499d5-98ba-4ee8-b89e-b91751a3709b ] Request (FloatingIpsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.068s 2020-12-14 02:23:33.911 197 DEBUG tempest.lib.common.rest_client [req-ddc499d5-98ba-4ee8-b89e-b91751a3709b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ddc499d5-98ba-4ee8-b89e-b91751a3709b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:33.996 197 INFO tempest.lib.common.rest_client [req-b40076b8-5e87-4492-af99-295a9867f4d6 ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.077s 2020-12-14 02:23:33.998 197 DEBUG tempest.lib.common.rest_client [req-b40076b8-5e87-4492-af99-295a9867f4d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FloatingIpsRbacTest-1453640888-desc", "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1453640888"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b40076b8-5e87-4492-af99-295a9867f4d6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "21a6cc9ef0394c5a91e10bf6e1c53301", "name": "tempest-FloatingIpsRbacTest-1453640888", "domain_id": "default", "description": "tempest-FloatingIpsRbacTest-1453640888-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:34.134 197 INFO tempest.lib.common.rest_client [req-ce6ba247-b809-4d5d-9cb0-5d8d3acc0409 ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.126s 2020-12-14 02:23:34.137 197 DEBUG tempest.lib.common.rest_client [req-ce6ba247-b809-4d5d-9cb0-5d8d3acc0409 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FloatingIpsRbacTest-1453640888", "password": "T0%pJZ%744r0Fm6", "project_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "email": "tempest-FloatingIpsRbacTest-988224290@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '393', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce6ba247-b809-4d5d-9cb0-5d8d3acc0409', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "email": "tempest-FloatingIpsRbacTest-988224290@example.com", "id": "49522ebd9cd347f0a21b5319e57c3ae6", "name": "tempest-FloatingIpsRbacTest-1453640888", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/49522ebd9cd347f0a21b5319e57c3ae6"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:34.211 197 INFO tempest.lib.common.rest_client [req-2c29b424-69e7-446e-afe5-753b8467299b ] Request (FloatingIpsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:23:34.214 197 DEBUG tempest.lib.common.rest_client [req-2c29b424-69e7-446e-afe5-753b8467299b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2c29b424-69e7-446e-afe5-753b8467299b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:34.300 197 INFO tempest.lib.common.rest_client [req-96a8f4f9-c6b0-4e2d-9102-54df2cd8b29b ] Request (FloatingIpsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.077s 2020-12-14 02:23:34.303 197 DEBUG tempest.lib.common.rest_client [req-96a8f4f9-c6b0-4e2d-9102-54df2cd8b29b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96a8f4f9-c6b0-4e2d-9102-54df2cd8b29b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:34.396 197 INFO tempest.lib.common.rest_client [req-eb605769-6a82-47e5-b5f1-f4a951282eb5 ] Request (FloatingIpsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles/72a4576c553448cd941b052c1ca0cf2d 0.086s 2020-12-14 02:23:34.398 197 DEBUG tempest.lib.common.rest_client [req-eb605769-6a82-47e5-b5f1-f4a951282eb5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb605769-6a82-47e5-b5f1-f4a951282eb5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:34.401 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FloatingIpsRbacTest-1453640888', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '21a6cc9ef0394c5a91e10bf6e1c53301', 'project_name': 'tempest-FloatingIpsRbacTest-1453640888', 'tenant_id': '21a6cc9ef0394c5a91e10bf6e1c53301', 'tenant_name': 'tempest-FloatingIpsRbacTest-1453640888', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '49522ebd9cd347f0a21b5319e57c3ae6'}, Network: None, Subnet: None, Router: None 2020-12-14 02:23:34.403 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FloatingIpsRbacTest-1453640888', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '21a6cc9ef0394c5a91e10bf6e1c53301', 'project_name': 'tempest-FloatingIpsRbacTest-1453640888', 'tenant_id': '21a6cc9ef0394c5a91e10bf6e1c53301', 'tenant_name': 'tempest-FloatingIpsRbacTest-1453640888', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '49522ebd9cd347f0a21b5319e57c3ae6'}, Network: None, Subnet: None, Router: None 2020-12-14 02:23:34.440 189 INFO tempest.lib.common.rest_client [req-1fad839e-8c5a-4d2c-98c3-ec2b77c2a03f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.244s 2020-12-14 02:23:34.443 189 DEBUG tempest.lib.common.rest_client [req-1fad839e-8c5a-4d2c-98c3-ec2b77c2a03f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1fad839e-8c5a-4d2c-98c3-ec2b77c2a03f', 'x-compute-request-id': 'req-1fad839e-8c5a-4d2c-98c3-ec2b77c2a03f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:34.639 197 INFO tempest.lib.common.rest_client [req-aaa27b86-801d-4017-afab-4b3b674f0435 ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.171s 2020-12-14 02:23:34.642 197 DEBUG tempest.lib.common.rest_client [req-aaa27b86-801d-4017-afab-4b3b674f0435 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aaa27b86-801d-4017-afab-4b3b674f0435', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "49522ebd9cd347f0a21b5319e57c3ae6", "name": "tempest-FloatingIpsRbacTest-1453640888", "password_expires_at": null}, "audit_ids": ["ajMEE1qjQE6MkRlRq3lIbA"], "expires_at": "2020-12-14T03:23:34.000000Z", "issued_at": "2020-12-14T02:23:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21a6cc9ef0394c5a91e10bf6e1c53301", "name": "tempest-FloatingIpsRbacTest-1453640888"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:34.749 197 INFO tempest.lib.common.rest_client [req-21e10b26-f87a-4d10-8d70-d37806cac1ea ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:23:34.752 197 DEBUG tempest.lib.common.rest_client [req-21e10b26-f87a-4d10-8d70-d37806cac1ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21e10b26-f87a-4d10-8d70-d37806cac1ea', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["JhgxwJKHT6yhJ8xCnSM9hg"], "expires_at": "2020-12-14T03:23:34.000000Z", "issued_at": "2020-12-14T02:23:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:34.871 197 INFO tempest.lib.common.rest_client [req-a058b6a4-b9e1-46d6-ae50-534b53d52196 ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:23:34.873 197 DEBUG tempest.lib.common.rest_client [req-a058b6a4-b9e1-46d6-ae50-534b53d52196 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a058b6a4-b9e1-46d6-ae50-534b53d52196', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["XEUCSwurTTi1LVa2oqN1Bg"], "expires_at": "2020-12-14T03:23:34.000000Z", "issued_at": "2020-12-14T02:23:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:34.953 197 INFO tempest.lib.common.rest_client [req-d223e495-e808-4a02-a42e-844910383f13 ] Request (FloatingIpsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.072s 2020-12-14 02:23:34.956 197 DEBUG tempest.lib.common.rest_client [req-d223e495-e808-4a02-a42e-844910383f13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d223e495-e808-4a02-a42e-844910383f13', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:35.029 197 INFO tempest.lib.common.rest_client [req-881d4c8d-c7e8-4346-926e-8e2934b441fc ] Request (FloatingIpsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-12-14 02:23:35.033 197 DEBUG tempest.lib.common.rest_client [req-881d4c8d-c7e8-4346-926e-8e2934b441fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-881d4c8d-c7e8-4346-926e-8e2934b441fc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:35.036 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:23:35.038 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:35.109 197 INFO tempest.lib.common.rest_client [req-87438c99-d818-417b-9f27-375fd4ee63cf ] Request (FloatingIpsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles 0.065s 2020-12-14 02:23:35.112 197 DEBUG tempest.lib.common.rest_client [req-87438c99-d818-417b-9f27-375fd4ee63cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87438c99-d818-417b-9f27-375fd4ee63cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:35.210 197 INFO tempest.lib.common.rest_client [req-4ffacf93-195a-40ef-8809-f21b5c4b6992 ] Request (FloatingIpsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles/72a4576c553448cd941b052c1ca0cf2d 0.090s 2020-12-14 02:23:35.213 197 DEBUG tempest.lib.common.rest_client [req-4ffacf93-195a-40ef-8809-f21b5c4b6992 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ffacf93-195a-40ef-8809-f21b5c4b6992', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:35.356 197 INFO tempest.lib.common.rest_client [req-e7d0e421-c1ef-44d0-aaa0-e0a5a956aeee ] Request (FloatingIpsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles/a629c95d64b3416fb80ae90af4f69c05 0.136s 2020-12-14 02:23:35.359 197 DEBUG tempest.lib.common.rest_client [req-e7d0e421-c1ef-44d0-aaa0-e0a5a956aeee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7d0e421-c1ef-44d0-aaa0-e0a5a956aeee', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:35.814 189 INFO tempest.lib.common.rest_client [req-fefb8eb5-c64e-4d66-b7c7-d9621703f156 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.267s 2020-12-14 02:23:35.817 189 DEBUG tempest.lib.common.rest_client [req-fefb8eb5-c64e-4d66-b7c7-d9621703f156 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fefb8eb5-c64e-4d66-b7c7-d9621703f156', 'x-compute-request-id': 'req-fefb8eb5-c64e-4d66-b7c7-d9621703f156', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:36.456 197 INFO tempest.lib.common.rest_client [req-156aae1f-c031-4eb5-8fa4-e22f7255a271 ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:23:36.458 197 DEBUG tempest.lib.common.rest_client [req-156aae1f-c031-4eb5-8fa4-e22f7255a271 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-156aae1f-c031-4eb5-8fa4-e22f7255a271', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "49522ebd9cd347f0a21b5319e57c3ae6", "name": "tempest-FloatingIpsRbacTest-1453640888", "password_expires_at": null}, "audit_ids": ["tvV8-VoZQSGiivRTsOAdKg"], "expires_at": "2020-12-14T03:23:36.000000Z", "issued_at": "2020-12-14T02:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21a6cc9ef0394c5a91e10bf6e1c53301", "name": "tempest-FloatingIpsRbacTest-1453640888"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:37.165 189 INFO tempest.lib.common.rest_client [req-4019484a-9d8d-4d35-8fed-ba3c071114a1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.239s 2020-12-14 02:23:37.167 189 DEBUG tempest.lib.common.rest_client [req-4019484a-9d8d-4d35-8fed-ba3c071114a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4019484a-9d8d-4d35-8fed-ba3c071114a1', 'x-compute-request-id': 'req-4019484a-9d8d-4d35-8fed-ba3c071114a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:37.411 197 INFO tempest.lib.common.rest_client [req-6d2edf82-4189-47cf-b1d9-c3d836a2176b ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.941s 2020-12-14 02:23:37.414 197 DEBUG tempest.lib.common.rest_client [req-6d2edf82-4189-47cf-b1d9-c3d836a2176b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-FloatingIpsRbacTest-test-network-279280786", "router:external": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '738', 'x-openstack-request-id': 'req-6d2edf82-4189-47cf-b1d9-c3d836a2176b', 'date': 'Mon, 14 Dec 2020 02:23:37 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e","name":"tempest-FloatingIpsRbacTest-test-network-279280786","tenant_id":"21a6cc9ef0394c5a91e10bf6e1c53301","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"21a6cc9ef0394c5a91e10bf6e1c53301","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":true,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":61,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:23:37Z","updated_at":"2020-12-14T02:23:37Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:38.447 197 INFO tempest.lib.common.rest_client [req-ae12f48b-132e-4dc9-999d-6d9bb6860124 ] Request (FloatingIpsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 1.025s 2020-12-14 02:23:38.449 197 DEBUG tempest.lib.common.rest_client [req-ae12f48b-132e-4dc9-999d-6d9bb6860124 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e", "cidr": "192.168.120.0/24", "ip_version": 4, "gateway_ip": "192.168.120.1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '662', 'x-openstack-request-id': 'req-ae12f48b-132e-4dc9-999d-6d9bb6860124', 'date': 'Mon, 14 Dec 2020 02:23:38 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"565f8eb2-a28b-4e94-b5b1-4ce852304663","name":"","tenant_id":"21a6cc9ef0394c5a91e10bf6e1c53301","network_id":"75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/24","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:23:37Z","updated_at":"2020-12-14T02:23:37Z","revision_number":0,"project_id":"21a6cc9ef0394c5a91e10bf6e1c53301"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:38.456 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:38.481 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_floatingip, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:38.484 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:38.515 189 INFO tempest.lib.common.rest_client [req-f27e318f-4417-4aaf-aa6d-473dc7bb6ef2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.244s 2020-12-14 02:23:38.518 189 DEBUG tempest.lib.common.rest_client [req-f27e318f-4417-4aaf-aa6d-473dc7bb6ef2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f27e318f-4417-4aaf-aa6d-473dc7bb6ef2', 'x-compute-request-id': 'req-f27e318f-4417-4aaf-aa6d-473dc7bb6ef2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:38.613 197 INFO tempest.lib.common.rest_client [req-31b41533-e2dd-4119-b4b5-b7664958dbcd ] Request (FloatingIpsRbacTest:test_create_floating_ip): 200 GET http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles 0.122s 2020-12-14 02:23:38.616 197 DEBUG tempest.lib.common.rest_client [req-31b41533-e2dd-4119-b4b5-b7664958dbcd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31b41533-e2dd-4119-b4b5-b7664958dbcd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:38.668 197 INFO tempest.lib.common.rest_client [req-2fa64b4b-2430-45c5-8eaa-f5f204160e7b ] Request (FloatingIpsRbacTest:test_create_floating_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:23:38.671 197 DEBUG tempest.lib.common.rest_client [req-2fa64b4b-2430-45c5-8eaa-f5f204160e7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2fa64b4b-2430-45c5-8eaa-f5f204160e7b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "49522ebd9cd347f0a21b5319e57c3ae6", "name": "tempest-FloatingIpsRbacTest-1453640888", "password_expires_at": null}, "audit_ids": ["pCN_y42ER9yP-5wJxNE_ZA"], "expires_at": "2020-12-14T03:23:38.000000Z", "issued_at": "2020-12-14T02:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21a6cc9ef0394c5a91e10bf6e1c53301", "name": "tempest-FloatingIpsRbacTest-1453640888"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:39.903 189 INFO tempest.lib.common.rest_client [req-33288386-3c4c-4486-b531-23749207d9a7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.278s 2020-12-14 02:23:39.906 189 DEBUG tempest.lib.common.rest_client [req-33288386-3c4c-4486-b531-23749207d9a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-33288386-3c4c-4486-b531-23749207d9a7', 'x-compute-request-id': 'req-33288386-3c4c-4486-b531-23749207d9a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:40.083 197 INFO tempest.lib.common.rest_client [req-721b35ab-cee2-405f-95de-95b99c70eac6 ] Request (FloatingIpsRbacTest:test_create_floating_ip): 201 POST http://172.30.13.94:9696/v2.0/floatingips 1.406s 2020-12-14 02:23:40.085 197 DEBUG tempest.lib.common.rest_client [req-721b35ab-cee2-405f-95de-95b99c70eac6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"floatingip": {"floating_network_id": "75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e"}} Response - Headers: {'content-type': 'application/json', 'content-length': '578', 'x-openstack-request-id': 'req-721b35ab-cee2-405f-95de-95b99c70eac6', 'date': 'Mon, 14 Dec 2020 02:23:40 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips'} Body: b'{"floatingip": {"id": "53ed1178-0687-431e-a8f5-85153af59884", "tenant_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "floating_ip_address": "192.168.120.166", "floating_network_id": "75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "project_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-12-14T02:23:39Z", "updated_at": "2020-12-14T02:23:39Z", "revision_number": 0}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:40.088 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:40.150 197 INFO tempest.lib.common.rest_client [req-1aad9b96-937e-4927-80cf-6770592671b9 ] Request (FloatingIpsRbacTest:test_create_floating_ip): 200 GET http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles 0.057s 2020-12-14 02:23:40.153 197 DEBUG tempest.lib.common.rest_client [req-1aad9b96-937e-4927-80cf-6770592671b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1aad9b96-937e-4927-80cf-6770592671b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:40.198 197 INFO tempest.lib.common.rest_client [req-fd870dea-1888-45a6-ad48-47c87a8572fe ] Request (FloatingIpsRbacTest:test_create_floating_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:23:40.201 197 DEBUG tempest.lib.common.rest_client [req-fd870dea-1888-45a6-ad48-47c87a8572fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd870dea-1888-45a6-ad48-47c87a8572fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "49522ebd9cd347f0a21b5319e57c3ae6", "name": "tempest-FloatingIpsRbacTest-1453640888", "password_expires_at": null}, "audit_ids": ["Wd9C63eyQNyBX7nPLQuIDw"], "expires_at": "2020-12-14T03:23:40.000000Z", "issued_at": "2020-12-14T02:23:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21a6cc9ef0394c5a91e10bf6e1c53301", "name": "tempest-FloatingIpsRbacTest-1453640888"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:40.890 197 INFO tempest.lib.common.rest_client [req-a983393e-199f-4874-bc04-71c57bfa13ff ] Request (FloatingIpsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/floatingips/53ed1178-0687-431e-a8f5-85153af59884 0.680s 2020-12-14 02:23:40.892 197 DEBUG tempest.lib.common.rest_client [req-a983393e-199f-4874-bc04-71c57bfa13ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-a983393e-199f-4874-bc04-71c57bfa13ff', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:40 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/53ed1178-0687-431e-a8f5-85153af59884'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:40.903 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:40.926 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_floatingip, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:40.928 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:40.950 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_floatingip:floating_ip_address, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:40.953 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:41.020 197 INFO tempest.lib.common.rest_client [req-0ef1ee26-7db6-483e-ab2a-1f60ed90b87f ] Request (FloatingIpsRbacTest:test_create_floating_ip_floatingip_address): 200 GET http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles 0.061s 2020-12-14 02:23:41.024 197 DEBUG tempest.lib.common.rest_client [req-0ef1ee26-7db6-483e-ab2a-1f60ed90b87f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ef1ee26-7db6-483e-ab2a-1f60ed90b87f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:41.080 197 INFO tempest.lib.common.rest_client [req-e6c91101-ce90-45ff-b04c-fa8c5f429075 ] Request (FloatingIpsRbacTest:test_create_floating_ip_floatingip_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:23:41.085 197 DEBUG tempest.lib.common.rest_client [req-e6c91101-ce90-45ff-b04c-fa8c5f429075 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6c91101-ce90-45ff-b04c-fa8c5f429075', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "49522ebd9cd347f0a21b5319e57c3ae6", "name": "tempest-FloatingIpsRbacTest-1453640888", "password_expires_at": null}, "audit_ids": ["KivzjEkyQoqQo7AxYOzAQA"], "expires_at": "2020-12-14T03:23:41.000000Z", "issued_at": "2020-12-14T02:23:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21a6cc9ef0394c5a91e10bf6e1c53301", "name": "tempest-FloatingIpsRbacTest-1453640888"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:41.236 189 INFO tempest.lib.common.rest_client [req-8c2e907f-500a-48cd-9789-fb3c54096e62 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.226s 2020-12-14 02:23:41.239 189 DEBUG tempest.lib.common.rest_client [req-8c2e907f-500a-48cd-9789-fb3c54096e62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8c2e907f-500a-48cd-9789-fb3c54096e62', 'x-compute-request-id': 'req-8c2e907f-500a-48cd-9789-fb3c54096e62', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:42.552 189 INFO tempest.lib.common.rest_client [req-0609e4cd-e050-465d-b782-8365e51c20ae ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.209s 2020-12-14 02:23:42.555 189 DEBUG tempest.lib.common.rest_client [req-0609e4cd-e050-465d-b782-8365e51c20ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0609e4cd-e050-465d-b782-8365e51c20ae', 'x-compute-request-id': 'req-0609e4cd-e050-465d-b782-8365e51c20ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:42.609 197 INFO tempest.lib.common.rest_client [req-46e91d18-04f3-4b5e-9563-90dbedf00a07 ] Request (FloatingIpsRbacTest:test_create_floating_ip_floatingip_address): 201 POST http://172.30.13.94:9696/v2.0/floatingips 1.517s 2020-12-14 02:23:42.612 197 DEBUG tempest.lib.common.rest_client [req-46e91d18-04f3-4b5e-9563-90dbedf00a07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"floatingip": {"floating_network_id": "75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e", "floating_ip_address": "192.168.120.10"}} Response - Headers: {'content-type': 'application/json', 'content-length': '577', 'x-openstack-request-id': 'req-46e91d18-04f3-4b5e-9563-90dbedf00a07', 'date': 'Mon, 14 Dec 2020 02:23:42 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips'} Body: b'{"floatingip": {"id": "b4e0a9c5-72e7-4caf-ba27-bbd9b7c45e6c", "tenant_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "floating_ip_address": "192.168.120.10", "floating_network_id": "75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "project_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-12-14T02:23:42Z", "updated_at": "2020-12-14T02:23:42Z", "revision_number": 0}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:42.616 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:42.685 197 INFO tempest.lib.common.rest_client [req-33ab83ec-4f37-406d-bf8b-0b37dc17db40 ] Request (FloatingIpsRbacTest:test_create_floating_ip_floatingip_address): 200 GET http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles 0.062s 2020-12-14 02:23:42.689 197 DEBUG tempest.lib.common.rest_client [req-33ab83ec-4f37-406d-bf8b-0b37dc17db40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33ab83ec-4f37-406d-bf8b-0b37dc17db40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:42.739 197 INFO tempest.lib.common.rest_client [req-4432bb16-917c-4b64-ad11-4ba76cd617b9 ] Request (FloatingIpsRbacTest:test_create_floating_ip_floatingip_address): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:23:42.742 197 DEBUG tempest.lib.common.rest_client [req-4432bb16-917c-4b64-ad11-4ba76cd617b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4432bb16-917c-4b64-ad11-4ba76cd617b9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "49522ebd9cd347f0a21b5319e57c3ae6", "name": "tempest-FloatingIpsRbacTest-1453640888", "password_expires_at": null}, "audit_ids": ["_-lqbMwPR4ah1BaQ-yzvBg"], "expires_at": "2020-12-14T03:23:42.000000Z", "issued_at": "2020-12-14T02:23:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21a6cc9ef0394c5a91e10bf6e1c53301", "name": "tempest-FloatingIpsRbacTest-1453640888"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:43.458 197 INFO tempest.lib.common.rest_client [req-0bf182db-6ec2-4362-a616-8806f45d4567 ] Request (FloatingIpsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/floatingips/b4e0a9c5-72e7-4caf-ba27-bbd9b7c45e6c 0.706s 2020-12-14 02:23:43.462 197 DEBUG tempest.lib.common.rest_client [req-0bf182db-6ec2-4362-a616-8806f45d4567 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-0bf182db-6ec2-4362-a616-8806f45d4567', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/b4e0a9c5-72e7-4caf-ba27-bbd9b7c45e6c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:43.473 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:43.497 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_floatingip, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:43.500 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:43.526 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_floatingip, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:43.951 189 INFO tempest.lib.common.rest_client [req-670e8af3-cf80-40f5-9722-5434e48ab924 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.280s 2020-12-14 02:23:43.955 189 DEBUG tempest.lib.common.rest_client [req-670e8af3-cf80-40f5-9722-5434e48ab924 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-670e8af3-cf80-40f5-9722-5434e48ab924', 'x-compute-request-id': 'req-670e8af3-cf80-40f5-9722-5434e48ab924', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:45.300 189 INFO tempest.lib.common.rest_client [req-afe33357-538f-4808-b459-9df8788e5bd7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.240s 2020-12-14 02:23:45.303 189 DEBUG tempest.lib.common.rest_client [req-afe33357-538f-4808-b459-9df8788e5bd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-afe33357-538f-4808-b459-9df8788e5bd7', 'x-compute-request-id': 'req-afe33357-538f-4808-b459-9df8788e5bd7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:45.548 197 INFO tempest.lib.common.rest_client [req-4c92d6fc-c64d-4bcc-9502-b87fcc27f70d ] Request (FloatingIpsRbacTest:test_delete_floating_ip): 201 POST http://172.30.13.94:9696/v2.0/floatingips 2.016s 2020-12-14 02:23:45.552 197 DEBUG tempest.lib.common.rest_client [req-4c92d6fc-c64d-4bcc-9502-b87fcc27f70d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"floatingip": {"floating_network_id": "75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e"}} Response - Headers: {'content-type': 'application/json', 'content-length': '577', 'x-openstack-request-id': 'req-4c92d6fc-c64d-4bcc-9502-b87fcc27f70d', 'date': 'Mon, 14 Dec 2020 02:23:45 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips'} Body: b'{"floatingip": {"id": "c231c1b8-3e04-4d90-abac-6dd78411e5d5", "tenant_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "floating_ip_address": "192.168.120.70", "floating_network_id": "75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "project_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-12-14T02:23:44Z", "updated_at": "2020-12-14T02:23:44Z", "revision_number": 0}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:45.555 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:45.636 197 INFO tempest.lib.common.rest_client [req-46fc5434-b591-4ff2-a0c5-bcaad45f749b ] Request (FloatingIpsRbacTest:test_delete_floating_ip): 200 GET http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles 0.074s 2020-12-14 02:23:45.640 197 DEBUG tempest.lib.common.rest_client [req-46fc5434-b591-4ff2-a0c5-bcaad45f749b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46fc5434-b591-4ff2-a0c5-bcaad45f749b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:45.696 197 INFO tempest.lib.common.rest_client [req-b0098a37-bdf8-4c1b-a6f3-6daaab8383d6 ] Request (FloatingIpsRbacTest:test_delete_floating_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:23:45.701 197 DEBUG tempest.lib.common.rest_client [req-b0098a37-bdf8-4c1b-a6f3-6daaab8383d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b0098a37-bdf8-4c1b-a6f3-6daaab8383d6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "49522ebd9cd347f0a21b5319e57c3ae6", "name": "tempest-FloatingIpsRbacTest-1453640888", "password_expires_at": null}, "audit_ids": ["mnJE6C0dToiW1HL-RX6qiw"], "expires_at": "2020-12-14T03:23:45.000000Z", "issued_at": "2020-12-14T02:23:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21a6cc9ef0394c5a91e10bf6e1c53301", "name": "tempest-FloatingIpsRbacTest-1453640888"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:46.483 197 INFO tempest.lib.common.rest_client [req-4c2b9b00-7417-4a40-864e-643ee0055b84 ] Request (FloatingIpsRbacTest:test_delete_floating_ip): 204 DELETE http://172.30.13.94:9696/v2.0/floatingips/c231c1b8-3e04-4d90-abac-6dd78411e5d5 0.774s 2020-12-14 02:23:46.486 197 DEBUG tempest.lib.common.rest_client [req-4c2b9b00-7417-4a40-864e-643ee0055b84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-4c2b9b00-7417-4a40-864e-643ee0055b84', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:46 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/c231c1b8-3e04-4d90-abac-6dd78411e5d5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:46.489 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:46.561 197 INFO tempest.lib.common.rest_client [req-12917726-4ebe-4301-8563-ff435d06606c ] Request (FloatingIpsRbacTest:test_delete_floating_ip): 200 GET http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles 0.067s 2020-12-14 02:23:46.564 197 DEBUG tempest.lib.common.rest_client [req-12917726-4ebe-4301-8563-ff435d06606c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-12917726-4ebe-4301-8563-ff435d06606c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:46.618 197 INFO tempest.lib.common.rest_client [req-52adbf44-c54d-43f4-a8cc-864c774025ce ] Request (FloatingIpsRbacTest:test_delete_floating_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:23:46.622 197 DEBUG tempest.lib.common.rest_client [req-52adbf44-c54d-43f4-a8cc-864c774025ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52adbf44-c54d-43f4-a8cc-864c774025ce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "49522ebd9cd347f0a21b5319e57c3ae6", "name": "tempest-FloatingIpsRbacTest-1453640888", "password_expires_at": null}, "audit_ids": ["d2kyVZnCRhupjExDZ7KLsA"], "expires_at": "2020-12-14T03:23:46.000000Z", "issued_at": "2020-12-14T02:23:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21a6cc9ef0394c5a91e10bf6e1c53301", "name": "tempest-FloatingIpsRbacTest-1453640888"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:46.647 189 INFO tempest.lib.common.rest_client [req-cd59ac5e-0a80-4e77-ac45-5fb74023603b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.239s 2020-12-14 02:23:46.651 189 DEBUG tempest.lib.common.rest_client [req-cd59ac5e-0a80-4e77-ac45-5fb74023603b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cd59ac5e-0a80-4e77-ac45-5fb74023603b', 'x-compute-request-id': 'req-cd59ac5e-0a80-4e77-ac45-5fb74023603b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:46.774 197 INFO tempest.lib.common.rest_client [req-cee4534d-a15d-45da-a6d1-ee7a3a25e219 ] Request (FloatingIpsRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/floatingips/c231c1b8-3e04-4d90-abac-6dd78411e5d5 0.142s 2020-12-14 02:23:46.778 197 DEBUG tempest.lib.common.rest_client [req-cee4534d-a15d-45da-a6d1-ee7a3a25e219 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '144', 'x-openstack-request-id': 'req-cee4534d-a15d-45da-a6d1-ee7a3a25e219', 'date': 'Mon, 14 Dec 2020 02:23:46 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/c231c1b8-3e04-4d90-abac-6dd78411e5d5'} Body: b'{"NeutronError": {"type": "FloatingIPNotFound", "message": "Floating IP c231c1b8-3e04-4d90-abac-6dd78411e5d5 could not be found", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:46.790 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:46.816 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_floatingip, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:47.987 189 INFO tempest.lib.common.rest_client [req-ebd17b43-1d08-461e-b74d-180a615f171d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.231s 2020-12-14 02:23:47.990 189 DEBUG tempest.lib.common.rest_client [req-ebd17b43-1d08-461e-b74d-180a615f171d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ebd17b43-1d08-461e-b74d-180a615f171d', 'x-compute-request-id': 'req-ebd17b43-1d08-461e-b74d-180a615f171d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:48.032 197 INFO tempest.lib.common.rest_client [req-40cdbedb-d991-41ce-b63b-8c3cab951ec1 ] Request (FloatingIpsRbacTest:test_list_floating_ips): 201 POST http://172.30.13.94:9696/v2.0/floatingips 1.209s 2020-12-14 02:23:48.036 197 DEBUG tempest.lib.common.rest_client [req-40cdbedb-d991-41ce-b63b-8c3cab951ec1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"floatingip": {"floating_network_id": "75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e"}} Response - Headers: {'content-type': 'application/json', 'content-length': '578', 'x-openstack-request-id': 'req-40cdbedb-d991-41ce-b63b-8c3cab951ec1', 'date': 'Mon, 14 Dec 2020 02:23:48 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips'} Body: b'{"floatingip": {"id": "7348deee-5d4e-4852-a367-3d32072fbd88", "tenant_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "floating_ip_address": "192.168.120.121", "floating_network_id": "75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "project_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-12-14T02:23:47Z", "updated_at": "2020-12-14T02:23:47Z", "revision_number": 0}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:48.039 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:48.158 197 INFO tempest.lib.common.rest_client [req-5d388987-046a-4c74-9363-1c8495a6c280 ] Request (FloatingIpsRbacTest:test_list_floating_ips): 200 GET http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles 0.113s 2020-12-14 02:23:48.161 197 DEBUG tempest.lib.common.rest_client [req-5d388987-046a-4c74-9363-1c8495a6c280 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d388987-046a-4c74-9363-1c8495a6c280', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:48.273 197 INFO tempest.lib.common.rest_client [req-688ff7b6-42eb-4594-a522-434282812c2f ] Request (FloatingIpsRbacTest:test_list_floating_ips): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:23:48.276 197 DEBUG tempest.lib.common.rest_client [req-688ff7b6-42eb-4594-a522-434282812c2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-688ff7b6-42eb-4594-a522-434282812c2f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "49522ebd9cd347f0a21b5319e57c3ae6", "name": "tempest-FloatingIpsRbacTest-1453640888", "password_expires_at": null}, "audit_ids": ["slfclwAYRwKqpVX3L1BS9A"], "expires_at": "2020-12-14T03:23:48.000000Z", "issued_at": "2020-12-14T02:23:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21a6cc9ef0394c5a91e10bf6e1c53301", "name": "tempest-FloatingIpsRbacTest-1453640888"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:48.476 197 INFO tempest.lib.common.rest_client [req-854fdf26-1e14-4d5c-b422-15df73c23a20 ] Request (FloatingIpsRbacTest:test_list_floating_ips): 200 GET http://172.30.13.94:9696/v2.0/floatingips?id=7348deee-5d4e-4852-a367-3d32072fbd88 0.192s 2020-12-14 02:23:48.481 197 DEBUG tempest.lib.common.rest_client [req-854fdf26-1e14-4d5c-b422-15df73c23a20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '581', 'x-openstack-request-id': 'req-854fdf26-1e14-4d5c-b422-15df73c23a20', 'date': 'Mon, 14 Dec 2020 02:23:48 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips?id=7348deee-5d4e-4852-a367-3d32072fbd88'} Body: b'{"floatingips": [{"id": "7348deee-5d4e-4852-a367-3d32072fbd88", "tenant_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "floating_ip_address": "192.168.120.121", "floating_network_id": "75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-12-14T02:23:47Z", "updated_at": "2020-12-14T02:23:47Z", "revision_number": 0, "project_id": "21a6cc9ef0394c5a91e10bf6e1c53301"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:48.484 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:48.608 197 INFO tempest.lib.common.rest_client [req-834f4545-1f8c-4c28-a1e7-654ef87295ec ] Request (FloatingIpsRbacTest:test_list_floating_ips): 200 GET http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles 0.116s 2020-12-14 02:23:48.611 197 DEBUG tempest.lib.common.rest_client [req-834f4545-1f8c-4c28-a1e7-654ef87295ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-834f4545-1f8c-4c28-a1e7-654ef87295ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:48.724 197 INFO tempest.lib.common.rest_client [req-c7211818-9fce-481a-9a1d-86f05b15b3cb ] Request (FloatingIpsRbacTest:test_list_floating_ips): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:23:48.727 197 DEBUG tempest.lib.common.rest_client [req-c7211818-9fce-481a-9a1d-86f05b15b3cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7211818-9fce-481a-9a1d-86f05b15b3cb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "49522ebd9cd347f0a21b5319e57c3ae6", "name": "tempest-FloatingIpsRbacTest-1453640888", "password_expires_at": null}, "audit_ids": ["l5VoNlbtQ7OSDr_7CzTG7w"], "expires_at": "2020-12-14T03:23:48.000000Z", "issued_at": "2020-12-14T02:23:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21a6cc9ef0394c5a91e10bf6e1c53301", "name": "tempest-FloatingIpsRbacTest-1453640888"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:49.350 189 INFO tempest.lib.common.rest_client [req-03275680-165a-41f1-ae06-01f628e652a9 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.257s 2020-12-14 02:23:49.353 189 DEBUG tempest.lib.common.rest_client [req-03275680-165a-41f1-ae06-01f628e652a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-03275680-165a-41f1-ae06-01f628e652a9', 'x-compute-request-id': 'req-03275680-165a-41f1-ae06-01f628e652a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:49.502 197 INFO tempest.lib.common.rest_client [req-36dfa9dc-a4d1-4af4-aa87-3f34b34ec22c ] Request (FloatingIpsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/floatingips/7348deee-5d4e-4852-a367-3d32072fbd88 0.765s 2020-12-14 02:23:49.506 197 DEBUG tempest.lib.common.rest_client [req-36dfa9dc-a4d1-4af4-aa87-3f34b34ec22c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-36dfa9dc-a4d1-4af4-aa87-3f34b34ec22c', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:49 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/7348deee-5d4e-4852-a367-3d32072fbd88'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:49.519 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:49.543 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_floatingip, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:50.753 189 INFO tempest.lib.common.rest_client [req-0673713e-7b5a-483f-93dd-0465d5d127e2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.279s 2020-12-14 02:23:50.757 189 DEBUG tempest.lib.common.rest_client [req-0673713e-7b5a-483f-93dd-0465d5d127e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0673713e-7b5a-483f-93dd-0465d5d127e2', 'x-compute-request-id': 'req-0673713e-7b5a-483f-93dd-0465d5d127e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:50.910 197 INFO tempest.lib.common.rest_client [req-8bc52733-7a38-4698-8f20-36ef85a841de ] Request (FloatingIpsRbacTest:test_show_floating_ip): 201 POST http://172.30.13.94:9696/v2.0/floatingips 1.361s 2020-12-14 02:23:50.914 197 DEBUG tempest.lib.common.rest_client [req-8bc52733-7a38-4698-8f20-36ef85a841de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"floatingip": {"floating_network_id": "75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e"}} Response - Headers: {'content-type': 'application/json', 'content-length': '577', 'x-openstack-request-id': 'req-8bc52733-7a38-4698-8f20-36ef85a841de', 'date': 'Mon, 14 Dec 2020 02:23:50 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips'} Body: b'{"floatingip": {"id": "1fbbb040-259b-45eb-bb95-0d5424dedebb", "tenant_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "floating_ip_address": "192.168.120.67", "floating_network_id": "75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "project_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-12-14T02:23:50Z", "updated_at": "2020-12-14T02:23:50Z", "revision_number": 0}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:50.917 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:51.080 197 INFO tempest.lib.common.rest_client [req-8ce302e9-92e7-4a76-8dba-d8ca4719967a ] Request (FloatingIpsRbacTest:test_show_floating_ip): 200 GET http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles 0.157s 2020-12-14 02:23:51.084 197 DEBUG tempest.lib.common.rest_client [req-8ce302e9-92e7-4a76-8dba-d8ca4719967a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ce302e9-92e7-4a76-8dba-d8ca4719967a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:51.188 197 INFO tempest.lib.common.rest_client [req-cb3ca9b7-1464-4dbe-9916-b8ba663a44c7 ] Request (FloatingIpsRbacTest:test_show_floating_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:23:51.191 197 DEBUG tempest.lib.common.rest_client [req-cb3ca9b7-1464-4dbe-9916-b8ba663a44c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb3ca9b7-1464-4dbe-9916-b8ba663a44c7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "49522ebd9cd347f0a21b5319e57c3ae6", "name": "tempest-FloatingIpsRbacTest-1453640888", "password_expires_at": null}, "audit_ids": ["lM_SFPHQTSaSzOHw_Ko2qw"], "expires_at": "2020-12-14T03:23:51.000000Z", "issued_at": "2020-12-14T02:23:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21a6cc9ef0394c5a91e10bf6e1c53301", "name": "tempest-FloatingIpsRbacTest-1453640888"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:51.362 197 INFO tempest.lib.common.rest_client [req-4c8f9b6c-7709-47aa-a20c-0513a5d9f64c ] Request (FloatingIpsRbacTest:test_show_floating_ip): 200 GET http://172.30.13.94:9696/v2.0/floatingips/1fbbb040-259b-45eb-bb95-0d5424dedebb 0.165s 2020-12-14 02:23:51.365 197 DEBUG tempest.lib.common.rest_client [req-4c8f9b6c-7709-47aa-a20c-0513a5d9f64c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '577', 'x-openstack-request-id': 'req-4c8f9b6c-7709-47aa-a20c-0513a5d9f64c', 'date': 'Mon, 14 Dec 2020 02:23:51 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/1fbbb040-259b-45eb-bb95-0d5424dedebb'} Body: b'{"floatingip": {"id": "1fbbb040-259b-45eb-bb95-0d5424dedebb", "tenant_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "floating_ip_address": "192.168.120.67", "floating_network_id": "75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-12-14T02:23:50Z", "updated_at": "2020-12-14T02:23:50Z", "revision_number": 0, "project_id": "21a6cc9ef0394c5a91e10bf6e1c53301"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:51.368 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:51.435 197 INFO tempest.lib.common.rest_client [req-ed160663-3d90-449c-a71b-f236b405dd9a ] Request (FloatingIpsRbacTest:test_show_floating_ip): 200 GET http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles 0.062s 2020-12-14 02:23:51.438 197 DEBUG tempest.lib.common.rest_client [req-ed160663-3d90-449c-a71b-f236b405dd9a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed160663-3d90-449c-a71b-f236b405dd9a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:51.489 197 INFO tempest.lib.common.rest_client [req-a2911b94-1e79-4379-ad01-8108d18fcb14 ] Request (FloatingIpsRbacTest:test_show_floating_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:23:51.492 197 DEBUG tempest.lib.common.rest_client [req-a2911b94-1e79-4379-ad01-8108d18fcb14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2911b94-1e79-4379-ad01-8108d18fcb14', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "49522ebd9cd347f0a21b5319e57c3ae6", "name": "tempest-FloatingIpsRbacTest-1453640888", "password_expires_at": null}, "audit_ids": ["q5O5DldAT1-JPli_cU_XaA"], "expires_at": "2020-12-14T03:23:51.000000Z", "issued_at": "2020-12-14T02:23:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21a6cc9ef0394c5a91e10bf6e1c53301", "name": "tempest-FloatingIpsRbacTest-1453640888"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:52.117 189 INFO tempest.lib.common.rest_client [req-775d58e4-a689-46ff-912e-9a1686dbfa63 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.255s 2020-12-14 02:23:52.121 189 DEBUG tempest.lib.common.rest_client [req-775d58e4-a689-46ff-912e-9a1686dbfa63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-775d58e4-a689-46ff-912e-9a1686dbfa63', 'x-compute-request-id': 'req-775d58e4-a689-46ff-912e-9a1686dbfa63', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:52.345 197 INFO tempest.lib.common.rest_client [req-444f2dff-4205-48ff-9a8e-f66c646702a4 ] Request (FloatingIpsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/floatingips/1fbbb040-259b-45eb-bb95-0d5424dedebb 0.843s 2020-12-14 02:23:52.349 197 DEBUG tempest.lib.common.rest_client [req-444f2dff-4205-48ff-9a8e-f66c646702a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-444f2dff-4205-48ff-9a8e-f66c646702a4', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:52 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/1fbbb040-259b-45eb-bb95-0d5424dedebb'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:52.361 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:52.389 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_floatingip, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:52.394 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:23:52.419 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_floatingip, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:23:53.490 189 INFO tempest.lib.common.rest_client [req-c9b2db69-bf06-4cd4-9d5a-a4ddaefdd460 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.263s 2020-12-14 02:23:53.493 189 DEBUG tempest.lib.common.rest_client [req-c9b2db69-bf06-4cd4-9d5a-a4ddaefdd460 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c9b2db69-bf06-4cd4-9d5a-a4ddaefdd460', 'x-compute-request-id': 'req-c9b2db69-bf06-4cd4-9d5a-a4ddaefdd460', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:53.706 197 INFO tempest.lib.common.rest_client [req-2d7b0fd8-34cc-4446-b7e7-26f0891886ce ] Request (FloatingIpsRbacTest:test_update_floating_ip): 201 POST http://172.30.13.94:9696/v2.0/floatingips 1.280s 2020-12-14 02:23:53.709 197 DEBUG tempest.lib.common.rest_client [req-2d7b0fd8-34cc-4446-b7e7-26f0891886ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"floatingip": {"floating_network_id": "75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e"}} Response - Headers: {'content-type': 'application/json', 'content-length': '577', 'x-openstack-request-id': 'req-2d7b0fd8-34cc-4446-b7e7-26f0891886ce', 'date': 'Mon, 14 Dec 2020 02:23:53 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips'} Body: b'{"floatingip": {"id": "c9c2d4ff-5b54-48b2-b240-ff7cb88a63ec", "tenant_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "floating_ip_address": "192.168.120.81", "floating_network_id": "75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "project_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-12-14T02:23:53Z", "updated_at": "2020-12-14T02:23:53Z", "revision_number": 0}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:53.712 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:53.777 197 INFO tempest.lib.common.rest_client [req-74b5185a-0d7c-479b-a516-45c1a658d8ad ] Request (FloatingIpsRbacTest:test_update_floating_ip): 200 GET http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles 0.058s 2020-12-14 02:23:53.780 197 DEBUG tempest.lib.common.rest_client [req-74b5185a-0d7c-479b-a516-45c1a658d8ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74b5185a-0d7c-479b-a516-45c1a658d8ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:53.832 197 INFO tempest.lib.common.rest_client [req-d0ee3aa4-893b-4f94-8549-23f9049699a7 ] Request (FloatingIpsRbacTest:test_update_floating_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:23:53.836 197 DEBUG tempest.lib.common.rest_client [req-d0ee3aa4-893b-4f94-8549-23f9049699a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0ee3aa4-893b-4f94-8549-23f9049699a7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "49522ebd9cd347f0a21b5319e57c3ae6", "name": "tempest-FloatingIpsRbacTest-1453640888", "password_expires_at": null}, "audit_ids": ["0hZIg_fTTcaAPmbvERtK9Q"], "expires_at": "2020-12-14T03:23:53.000000Z", "issued_at": "2020-12-14T02:23:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21a6cc9ef0394c5a91e10bf6e1c53301", "name": "tempest-FloatingIpsRbacTest-1453640888"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:54.088 197 INFO tempest.lib.common.rest_client [req-1b9f7049-3993-4b2b-8652-a4b8e79bc4a7 ] Request (FloatingIpsRbacTest:test_update_floating_ip): 200 PUT http://172.30.13.94:9696/v2.0/floatingips/c9c2d4ff-5b54-48b2-b240-ff7cb88a63ec 0.244s 2020-12-14 02:23:54.092 197 DEBUG tempest.lib.common.rest_client [req-1b9f7049-3993-4b2b-8652-a4b8e79bc4a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"floatingip": {"port_id": null}} Response - Headers: {'content-type': 'application/json', 'content-length': '577', 'x-openstack-request-id': 'req-1b9f7049-3993-4b2b-8652-a4b8e79bc4a7', 'date': 'Mon, 14 Dec 2020 02:23:54 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/c9c2d4ff-5b54-48b2-b240-ff7cb88a63ec'} Body: b'{"floatingip": {"id": "c9c2d4ff-5b54-48b2-b240-ff7cb88a63ec", "tenant_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "floating_ip_address": "192.168.120.81", "floating_network_id": "75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e", "router_id": null, "port_id": null, "fixed_ip_address": null, "status": "DOWN", "description": "", "qos_policy_id": null, "port_details": null, "dns_domain": "", "dns_name": "", "port_forwardings": [], "tags": [], "created_at": "2020-12-14T02:23:53Z", "updated_at": "2020-12-14T02:23:54Z", "revision_number": 1, "project_id": "21a6cc9ef0394c5a91e10bf6e1c53301"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:54.095 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:23:54.170 197 INFO tempest.lib.common.rest_client [req-8c3cbed6-420f-49bb-a38a-733ceeefb137 ] Request (FloatingIpsRbacTest:test_update_floating_ip): 200 GET http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles 0.069s 2020-12-14 02:23:54.173 197 DEBUG tempest.lib.common.rest_client [req-8c3cbed6-420f-49bb-a38a-733ceeefb137 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c3cbed6-420f-49bb-a38a-733ceeefb137', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301/users/49522ebd9cd347f0a21b5319e57c3ae6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:54.232 197 INFO tempest.lib.common.rest_client [req-49b8072d-2c18-4240-8f11-3f1482d62ff0 ] Request (FloatingIpsRbacTest:test_update_floating_ip): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:23:54.235 197 DEBUG tempest.lib.common.rest_client [req-49b8072d-2c18-4240-8f11-3f1482d62ff0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-49b8072d-2c18-4240-8f11-3f1482d62ff0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "49522ebd9cd347f0a21b5319e57c3ae6", "name": "tempest-FloatingIpsRbacTest-1453640888", "password_expires_at": null}, "audit_ids": ["Bmbbufo8SL2Z-XnKo9xi0w"], "expires_at": "2020-12-14T03:23:54.000000Z", "issued_at": "2020-12-14T02:23:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21a6cc9ef0394c5a91e10bf6e1c53301", "name": "tempest-FloatingIpsRbacTest-1453640888"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21a6cc9ef0394c5a91e10bf6e1c53301", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:54.838 189 INFO tempest.lib.common.rest_client [req-748c34c6-10ab-44e6-aa88-54b9736a4a8b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.236s 2020-12-14 02:23:54.842 189 DEBUG tempest.lib.common.rest_client [req-748c34c6-10ab-44e6-aa88-54b9736a4a8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-748c34c6-10ab-44e6-aa88-54b9736a4a8b', 'x-compute-request-id': 'req-748c34c6-10ab-44e6-aa88-54b9736a4a8b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:54.952 197 INFO tempest.lib.common.rest_client [req-8eeda9e2-4cda-473c-b137-ae3bf0fcf60e ] Request (FloatingIpsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/floatingips/c9c2d4ff-5b54-48b2-b240-ff7cb88a63ec 0.706s 2020-12-14 02:23:54.955 197 DEBUG tempest.lib.common.rest_client [req-8eeda9e2-4cda-473c-b137-ae3bf0fcf60e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8eeda9e2-4cda-473c-b137-ae3bf0fcf60e', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:54 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/c9c2d4ff-5b54-48b2-b240-ff7cb88a63ec'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:55.507 197 INFO tempest.lib.common.rest_client [req-5ee18079-88fd-4342-86ae-0def766d13ef ] Request (FloatingIpsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/565f8eb2-a28b-4e94-b5b1-4ce852304663 0.530s 2020-12-14 02:23:55.510 197 DEBUG tempest.lib.common.rest_client [req-5ee18079-88fd-4342-86ae-0def766d13ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-5ee18079-88fd-4342-86ae-0def766d13ef', 'date': 'Mon, 14 Dec 2020 02:23:55 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/565f8eb2-a28b-4e94-b5b1-4ce852304663'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:55.863 197 INFO tempest.lib.common.rest_client [req-2a13091a-4254-4567-b520-540e2f34bc6d ] Request (FloatingIpsRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/networks/75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e 0.348s 2020-12-14 02:23:55.865 197 DEBUG tempest.lib.common.rest_client [req-2a13091a-4254-4567-b520-540e2f34bc6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"router:external": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '726', 'x-openstack-request-id': 'req-2a13091a-4254-4567-b520-540e2f34bc6d', 'date': 'Mon, 14 Dec 2020 02:23:55 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e'} Body: b'{"network":{"id":"75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e","name":"tempest-FloatingIpsRbacTest-test-network-279280786","tenant_id":"21a6cc9ef0394c5a91e10bf6e1c53301","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"availability_zone_hints":[],"availability_zones":["nova"],"ipv4_address_scope":null,"ipv6_address_scope":null,"router:external":false,"description":"","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:23:37Z","updated_at":"2020-12-14T02:23:55Z","revision_number":4,"project_id":"21a6cc9ef0394c5a91e10bf6e1c53301","provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":61}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:56.172 189 INFO tempest.lib.common.rest_client [req-75cdc406-d800-4a20-bf2c-7d364540c185 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.223s 2020-12-14 02:23:56.177 189 DEBUG tempest.lib.common.rest_client [req-75cdc406-d800-4a20-bf2c-7d364540c185 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-75cdc406-d800-4a20-bf2c-7d364540c185', 'x-compute-request-id': 'req-75cdc406-d800-4a20-bf2c-7d364540c185', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:57.493 189 INFO tempest.lib.common.rest_client [req-68c9445e-eacf-4f42-a61d-99b15cce3c45 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.210s 2020-12-14 02:23:57.497 189 DEBUG tempest.lib.common.rest_client [req-68c9445e-eacf-4f42-a61d-99b15cce3c45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-68c9445e-eacf-4f42-a61d-99b15cce3c45', 'x-compute-request-id': 'req-68c9445e-eacf-4f42-a61d-99b15cce3c45', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:58.031 197 INFO tempest.lib.common.rest_client [req-b8f1f2fc-f541-493b-a9a5-340e7d91929f ] Request (FloatingIpsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e 2.159s 2020-12-14 02:23:58.035 197 DEBUG tempest.lib.common.rest_client [req-b8f1f2fc-f541-493b-a9a5-340e7d91929f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-b8f1f2fc-f541-493b-a9a5-340e7d91929f', 'date': 'Mon, 14 Dec 2020 02:23:58 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/75ce4d8e-68c6-4aa1-862d-575e8cfdfd9e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:58.187 197 INFO tempest.lib.common.rest_client [req-e298567a-e226-4317-b420-ae95d2d0dc66 ] Request (FloatingIpsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/49522ebd9cd347f0a21b5319e57c3ae6 0.146s 2020-12-14 02:23:58.189 197 DEBUG tempest.lib.common.rest_client [req-e298567a-e226-4317-b420-ae95d2d0dc66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e298567a-e226-4317-b420-ae95d2d0dc66', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/49522ebd9cd347f0a21b5319e57c3ae6'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:58.296 197 INFO tempest.lib.common.rest_client [req-81ec7a08-9ce8-414f-b031-1293f95ff8f3 ] Request (FloatingIpsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:23:58.299 197 DEBUG tempest.lib.common.rest_client [req-81ec7a08-9ce8-414f-b031-1293f95ff8f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81ec7a08-9ce8-414f-b031-1293f95ff8f3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["4FQysfoZSW61Ak8eY6ljNw"], "expires_at": "2020-12-14T03:23:58.000000Z", "issued_at": "2020-12-14T02:23:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:58.485 197 INFO tempest.lib.common.rest_client [req-495abd4f-9d9b-4720-a4d7-cf2e2453e3d9 ] Request (FloatingIpsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=21a6cc9ef0394c5a91e10bf6e1c53301&name=default 0.179s 2020-12-14 02:23:58.489 197 DEBUG tempest.lib.common.rest_client [req-495abd4f-9d9b-4720-a4d7-cf2e2453e3d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-495abd4f-9d9b-4720-a4d7-cf2e2453e3d9', 'date': 'Mon, 14 Dec 2020 02:23:58 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=21a6cc9ef0394c5a91e10bf6e1c53301&name=default'} Body: b'{"security_groups": [{"id": "5be2da82-86fb-4252-addb-e5751177ee00", "name": "default", "stateful": true, "tenant_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "description": "Default security group", "security_group_rules": [{"id": "0c480605-cdbd-4904-930d-6e32a277cf4b", "tenant_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "security_group_id": "5be2da82-86fb-4252-addb-e5751177ee00", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5be2da82-86fb-4252-addb-e5751177ee00", "description": null, "tags": [], "created_at": "2020-12-14T02:23:36Z", "updated_at": "2020-12-14T02:23:36Z", "revision_number": 0, "project_id": "21a6cc9ef0394c5a91e10bf6e1c53301"}, {"id": "3b2e913d-aedc-433e-a8aa-b1a37e64cf3d", "tenant_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "security_group_id": "5be2da82-86fb-4252-addb-e5751177ee00", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:23:36Z", "updated_at": "2020-12-14T02:23:36Z", "revision_number": 0, "project_id": "21a6cc9ef0394c5a91e10bf6e1c53301"}, {"id": "614411ce-57f5-4e1f-b642-6628bc2a549f", "tenant_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "security_group_id": "5be2da82-86fb-4252-addb-e5751177ee00", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5be2da82-86fb-4252-addb-e5751177ee00", "description": null, "tags": [], "created_at": "2020-12-14T02:23:36Z", "updated_at": "2020-12-14T02:23:36Z", "revision_number": 0, "project_id": "21a6cc9ef0394c5a91e10bf6e1c53301"}, {"id": "ccf4f41c-f2aa-46e4-9ee7-4f21b5def61a", "tenant_id": "21a6cc9ef0394c5a91e10bf6e1c53301", "security_group_id": "5be2da82-86fb-4252-addb-e5751177ee00", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:23:36Z", "updated_at": "2020-12-14T02:23:36Z", "revision_number": 0, "project_id": "21a6cc9ef0394c5a91e10bf6e1c53301"}], "tags": [], "created_at": "2020-12-14T02:23:36Z", "updated_at": "2020-12-14T02:23:36Z", "revision_number": 1, "project_id": "21a6cc9ef0394c5a91e10bf6e1c53301"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:58.635 197 INFO tempest.lib.common.rest_client [req-dec1f0d2-6cdb-4e6d-9c54-986560e12a79 ] Request (FloatingIpsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/5be2da82-86fb-4252-addb-e5751177ee00 0.140s 2020-12-14 02:23:58.637 197 DEBUG tempest.lib.common.rest_client [req-dec1f0d2-6cdb-4e6d-9c54-986560e12a79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-dec1f0d2-6cdb-4e6d-9c54-986560e12a79', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:23:58 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5be2da82-86fb-4252-addb-e5751177ee00'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:58.785 197 INFO tempest.lib.common.rest_client [req-f3c12c25-83b5-42d2-b6e7-2c7c0506ebc4 ] Request (FloatingIpsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301 0.141s 2020-12-14 02:23:58.789 197 DEBUG tempest.lib.common.rest_client [req-f3c12c25-83b5-42d2-b6e7-2c7c0506ebc4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3c12c25-83b5-42d2-b6e7-2c7c0506ebc4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21a6cc9ef0394c5a91e10bf6e1c53301'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:58.885 189 INFO tempest.lib.common.rest_client [req-dc2b474f-6f45-496a-89ff-729d58b31db3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.281s 2020-12-14 02:23:58.888 189 DEBUG tempest.lib.common.rest_client [req-dc2b474f-6f45-496a-89ff-729d58b31db3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dc2b474f-6f45-496a-89ff-729d58b31db3', 'x-compute-request-id': 'req-dc2b474f-6f45-496a-89ff-729d58b31db3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:58.903 197 INFO tempest.lib.common.rest_client [req-2eecb766-963e-4f8f-ac18-866d66abe191 ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:23:58.906 197 DEBUG tempest.lib.common.rest_client [req-2eecb766-963e-4f8f-ac18-866d66abe191 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2eecb766-963e-4f8f-ac18-866d66abe191', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["YYxTdrw3QyWIXiqMNwpa6w"], "expires_at": "2020-12-14T03:23:58.000000Z", "issued_at": "2020-12-14T02:23:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:59.010 197 INFO tempest.lib.common.rest_client [req-d8481ee1-2f97-4ef3-8e18-00413ed04c4e ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:23:59.013 197 DEBUG tempest.lib.common.rest_client [req-d8481ee1-2f97-4ef3-8e18-00413ed04c4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8481ee1-2f97-4ef3-8e18-00413ed04c4e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["pywI9yH0RaioFKMSoXhFbQ"], "expires_at": "2020-12-14T03:23:58.000000Z", "issued_at": "2020-12-14T02:23:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:59.091 197 INFO tempest.lib.common.rest_client [req-e0a9e0f0-b27b-440f-a180-97566903db40 ] Request (RbacPoliciesExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.070s 2020-12-14 02:23:59.094 197 DEBUG tempest.lib.common.rest_client [req-e0a9e0f0-b27b-440f-a180-97566903db40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0a9e0f0-b27b-440f-a180-97566903db40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:59.180 197 INFO tempest.lib.common.rest_client [req-8630c665-a470-4ed5-92bc-5c6c6a75b4a9 ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.078s 2020-12-14 02:23:59.183 197 DEBUG tempest.lib.common.rest_client [req-8630c665-a470-4ed5-92bc-5c6c6a75b4a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-RbacPoliciesExtRbacTest-1592666050-desc", "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8630c665-a470-4ed5-92bc-5c6c6a75b4a9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "domain_id": "default", "description": "tempest-RbacPoliciesExtRbacTest-1592666050-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:59.307 197 INFO tempest.lib.common.rest_client [req-e069a07b-efc7-4dd7-ab1d-6ce5e41491df ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.115s 2020-12-14 02:23:59.310 197 DEBUG tempest.lib.common.rest_client [req-e069a07b-efc7-4dd7-ab1d-6ce5e41491df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password": "C9%_v9N@NLXj*dX", "project_id": "90fb476cfeb7496ebcda7d84297b91af", "email": "tempest-RbacPoliciesExtRbacTest-2129428454@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '402', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e069a07b-efc7-4dd7-ab1d-6ce5e41491df', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "90fb476cfeb7496ebcda7d84297b91af", "email": "tempest-RbacPoliciesExtRbacTest-2129428454@example.com", "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/84cd8326f72141e1b56aef56a68f8523"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:59.375 197 INFO tempest.lib.common.rest_client [req-89c74a50-1bb5-4e55-9daa-01dcff191355 ] Request (RbacPoliciesExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-12-14 02:23:59.378 197 DEBUG tempest.lib.common.rest_client [req-89c74a50-1bb5-4e55-9daa-01dcff191355 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89c74a50-1bb5-4e55-9daa-01dcff191355', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:59.450 197 INFO tempest.lib.common.rest_client [req-fe68df39-6216-472c-9d9c-572af56897af ] Request (RbacPoliciesExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:23:59.453 197 DEBUG tempest.lib.common.rest_client [req-fe68df39-6216-472c-9d9c-572af56897af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe68df39-6216-472c-9d9c-572af56897af', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:59.542 197 INFO tempest.lib.common.rest_client [req-f62b09fc-144b-4806-9e07-3d41ff56f884 ] Request (RbacPoliciesExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles/72a4576c553448cd941b052c1ca0cf2d 0.080s 2020-12-14 02:23:59.546 197 DEBUG tempest.lib.common.rest_client [req-f62b09fc-144b-4806-9e07-3d41ff56f884 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f62b09fc-144b-4806-9e07-3d41ff56f884', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:59.548 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-RbacPoliciesExtRbacTest-1592666050', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '90fb476cfeb7496ebcda7d84297b91af', 'project_name': 'tempest-RbacPoliciesExtRbacTest-1592666050', 'tenant_id': '90fb476cfeb7496ebcda7d84297b91af', 'tenant_name': 'tempest-RbacPoliciesExtRbacTest-1592666050', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '84cd8326f72141e1b56aef56a68f8523'}, Network: None, Subnet: None, Router: None 2020-12-14 02:23:59.551 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-RbacPoliciesExtRbacTest-1592666050', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '90fb476cfeb7496ebcda7d84297b91af', 'project_name': 'tempest-RbacPoliciesExtRbacTest-1592666050', 'tenant_id': '90fb476cfeb7496ebcda7d84297b91af', 'tenant_name': 'tempest-RbacPoliciesExtRbacTest-1592666050', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '84cd8326f72141e1b56aef56a68f8523'}, Network: None, Subnet: None, Router: None 2020-12-14 02:23:59.744 197 INFO tempest.lib.common.rest_client [req-8ab08b4c-372a-4b30-8fa5-349f00746879 ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.130s 2020-12-14 02:23:59.747 197 DEBUG tempest.lib.common.rest_client [req-8ab08b4c-372a-4b30-8fa5-349f00746879 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ab08b4c-372a-4b30-8fa5-349f00746879', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["pFk6_56tTay6bbfY0J6Ocg"], "expires_at": "2020-12-14T03:23:59.000000Z", "issued_at": "2020-12-14T02:23:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:23:59.751 197 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-12-14 02:23:59.885 197 INFO tempest.lib.common.rest_client [req-6c4eaa3b-29fa-43d1-af71-a3fb368502fc ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:23:59.889 197 DEBUG tempest.lib.common.rest_client [req-6c4eaa3b-29fa-43d1-af71-a3fb368502fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c4eaa3b-29fa-43d1-af71-a3fb368502fc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["EnvtS-9qS_GhWHPiOymfFg"], "expires_at": "2020-12-14T03:23:59.000000Z", "issued_at": "2020-12-14T02:23:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:00.018 197 INFO tempest.lib.common.rest_client [req-90568e4c-8dc0-4c14-95aa-31bc43a4ca54 ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:24:00.022 197 DEBUG tempest.lib.common.rest_client [req-90568e4c-8dc0-4c14-95aa-31bc43a4ca54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90568e4c-8dc0-4c14-95aa-31bc43a4ca54', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["keiQExy1SImMuVOlHxDsrA"], "expires_at": "2020-12-14T03:23:59.000000Z", "issued_at": "2020-12-14T02:23:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:00.099 197 INFO tempest.lib.common.rest_client [req-7e79c0af-6120-4730-bd50-38a729f33079 ] Request (RbacPoliciesExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.071s 2020-12-14 02:24:00.102 197 DEBUG tempest.lib.common.rest_client [req-7e79c0af-6120-4730-bd50-38a729f33079 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e79c0af-6120-4730-bd50-38a729f33079', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:00.169 197 INFO tempest.lib.common.rest_client [req-c533934c-0956-454b-aeb8-fd816835773c ] Request (RbacPoliciesExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:24:00.173 197 DEBUG tempest.lib.common.rest_client [req-c533934c-0956-454b-aeb8-fd816835773c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c533934c-0956-454b-aeb8-fd816835773c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:00.176 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:24:00.178 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:00.245 197 INFO tempest.lib.common.rest_client [req-85a55d29-a4eb-4c33-8120-626694e1a419 ] Request (RbacPoliciesExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles 0.061s 2020-12-14 02:24:00.247 197 DEBUG tempest.lib.common.rest_client [req-85a55d29-a4eb-4c33-8120-626694e1a419 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85a55d29-a4eb-4c33-8120-626694e1a419', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:00.259 189 INFO tempest.lib.common.rest_client [req-ce95f577-5a74-49e0-8f57-c8824977335c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.266s 2020-12-14 02:24:00.263 189 DEBUG tempest.lib.common.rest_client [req-ce95f577-5a74-49e0-8f57-c8824977335c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ce95f577-5a74-49e0-8f57-c8824977335c', 'x-compute-request-id': 'req-ce95f577-5a74-49e0-8f57-c8824977335c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:00.329 197 INFO tempest.lib.common.rest_client [req-c8817884-a942-42dd-bb67-4654f74b1771 ] Request (RbacPoliciesExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles/72a4576c553448cd941b052c1ca0cf2d 0.075s 2020-12-14 02:24:00.331 197 DEBUG tempest.lib.common.rest_client [req-c8817884-a942-42dd-bb67-4654f74b1771 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8817884-a942-42dd-bb67-4654f74b1771', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:00.453 197 INFO tempest.lib.common.rest_client [req-812888b5-e291-4d8a-9f19-8473d27cfd04 ] Request (RbacPoliciesExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles/a629c95d64b3416fb80ae90af4f69c05 0.116s 2020-12-14 02:24:00.456 197 DEBUG tempest.lib.common.rest_client [req-812888b5-e291-4d8a-9f19-8473d27cfd04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-812888b5-e291-4d8a-9f19-8473d27cfd04', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:01.569 197 INFO tempest.lib.common.rest_client [req-48643b0e-5dd0-4896-adec-b6ffacac295f ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:24:01.571 197 DEBUG tempest.lib.common.rest_client [req-48643b0e-5dd0-4896-adec-b6ffacac295f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-48643b0e-5dd0-4896-adec-b6ffacac295f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["HMpmJs8eRaywpEkWZJIFrg"], "expires_at": "2020-12-14T03:24:01.000000Z", "issued_at": "2020-12-14T02:24:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:01.595 189 INFO tempest.lib.common.rest_client [req-2486f7e3-5cce-4539-82bd-8d38412171da ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.224s 2020-12-14 02:24:01.599 189 DEBUG tempest.lib.common.rest_client [req-2486f7e3-5cce-4539-82bd-8d38412171da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2486f7e3-5cce-4539-82bd-8d38412171da', 'x-compute-request-id': 'req-2486f7e3-5cce-4539-82bd-8d38412171da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:01.626 197 INFO tempest.lib.common.rest_client [req-0284d1b2-9bab-449b-a685-40cc8c60ef52 ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:24:01.629 197 DEBUG tempest.lib.common.rest_client [req-0284d1b2-9bab-449b-a685-40cc8c60ef52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0284d1b2-9bab-449b-a685-40cc8c60ef52', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["RfIi-VUZSmaQXnDUUNPxEQ"], "expires_at": "2020-12-14T03:24:01.000000Z", "issued_at": "2020-12-14T02:24:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:02.292 197 INFO tempest.lib.common.rest_client [req-ba82e5ed-8619-4d15-81c8-1a74f970fb7a ] Request (RbacPoliciesExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.651s 2020-12-14 02:24:02.296 197 DEBUG tempest.lib.common.rest_client [req-ba82e5ed-8619-4d15-81c8-1a74f970fb7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-RbacPoliciesExtRbacTest-test-network-482930609"}} Response - Headers: {'content-type': 'application/json', 'content-length': '743', 'x-openstack-request-id': 'req-ba82e5ed-8619-4d15-81c8-1a74f970fb7a', 'date': 'Mon, 14 Dec 2020 02:24:02 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"e076e8dd-d067-474b-9bae-24ca1f05e81c","name":"tempest-RbacPoliciesExtRbacTest-test-network-482930609","tenant_id":"90fb476cfeb7496ebcda7d84297b91af","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"90fb476cfeb7496ebcda7d84297b91af","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":43,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:24:02Z","updated_at":"2020-12-14T02:24:02Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:02.304 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:02.327 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_rbac_policy, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:02.330 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:02.355 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_rbac_policy:target_tenant, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:02.357 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:02.477 197 INFO tempest.lib.common.rest_client [req-d005b188-d3e6-485d-82fe-af1e130e5e4a ] Request (RbacPoliciesExtRbacTest:test_create_rbac_policy): 200 GET http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles 0.114s 2020-12-14 02:24:02.480 197 DEBUG tempest.lib.common.rest_client [req-d005b188-d3e6-485d-82fe-af1e130e5e4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d005b188-d3e6-485d-82fe-af1e130e5e4a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:02.532 197 INFO tempest.lib.common.rest_client [req-d759c736-536a-486f-941f-073c3d2f4f18 ] Request (RbacPoliciesExtRbacTest:test_create_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:24:02.535 197 DEBUG tempest.lib.common.rest_client [req-d759c736-536a-486f-941f-073c3d2f4f18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d759c736-536a-486f-941f-073c3d2f4f18', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["kwkDSG-dQxa98PVKsdIXrQ"], "expires_at": "2020-12-14T03:24:02.000000Z", "issued_at": "2020-12-14T02:24:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:02.585 197 INFO tempest.lib.common.rest_client [req-f755c60c-5588-4fa5-9e0f-3c6d32b3de51 ] Request (RbacPoliciesExtRbacTest:test_create_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:24:02.588 197 DEBUG tempest.lib.common.rest_client [req-f755c60c-5588-4fa5-9e0f-3c6d32b3de51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f755c60c-5588-4fa5-9e0f-3c6d32b3de51', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["5Yz7ZVVtT2irn96NzyMk_A"], "expires_at": "2020-12-14T03:24:02.000000Z", "issued_at": "2020-12-14T02:24:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:02.943 189 INFO tempest.lib.common.rest_client [req-c5620d02-41f4-4d9d-ac28-cc2c8a5c768d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.235s 2020-12-14 02:24:02.946 189 DEBUG tempest.lib.common.rest_client [req-c5620d02-41f4-4d9d-ac28-cc2c8a5c768d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c5620d02-41f4-4d9d-ac28-cc2c8a5c768d', 'x-compute-request-id': 'req-c5620d02-41f4-4d9d-ac28-cc2c8a5c768d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:03.173 197 INFO tempest.lib.common.rest_client [req-c531278e-c816-47be-a5b3-72132f94364c ] Request (RbacPoliciesExtRbacTest:test_create_rbac_policy): 201 POST http://172.30.13.94:9696/v2.0/rbac-policies 0.576s 2020-12-14 02:24:03.177 197 DEBUG tempest.lib.common.rest_client [req-c531278e-c816-47be-a5b3-72132f94364c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"rbac_policy": {"target_tenant": "90fb476cfeb7496ebcda7d84297b91af", "object_type": "network", "object_id": "e076e8dd-d067-474b-9bae-24ca1f05e81c", "action": "access_as_shared"}} Response - Headers: {'content-type': 'application/json', 'content-length': '324', 'x-openstack-request-id': 'req-c531278e-c816-47be-a5b3-72132f94364c', 'date': 'Mon, 14 Dec 2020 02:24:03 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies'} Body: b'{"rbac_policy": {"id": "34a556b2-0b6c-4377-9456-fb4c71d23199", "project_id": "90fb476cfeb7496ebcda7d84297b91af", "target_tenant": "90fb476cfeb7496ebcda7d84297b91af", "action": "access_as_shared", "object_id": "e076e8dd-d067-474b-9bae-24ca1f05e81c", "object_type": "network", "tenant_id": "90fb476cfeb7496ebcda7d84297b91af"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:03.180 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:03.257 197 INFO tempest.lib.common.rest_client [req-5728c783-067d-47cc-a47f-282c02b08dae ] Request (RbacPoliciesExtRbacTest:test_create_rbac_policy): 200 GET http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles 0.071s 2020-12-14 02:24:03.260 197 DEBUG tempest.lib.common.rest_client [req-5728c783-067d-47cc-a47f-282c02b08dae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5728c783-067d-47cc-a47f-282c02b08dae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:03.317 197 INFO tempest.lib.common.rest_client [req-449d302c-bc47-43df-ac5f-6cbdb3b735fb ] Request (RbacPoliciesExtRbacTest:test_create_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:24:03.320 197 DEBUG tempest.lib.common.rest_client [req-449d302c-bc47-43df-ac5f-6cbdb3b735fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-449d302c-bc47-43df-ac5f-6cbdb3b735fb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["XS_EntoKRM-oOhfAY0zT_A"], "expires_at": "2020-12-14T03:24:03.000000Z", "issued_at": "2020-12-14T02:24:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:03.375 197 INFO tempest.lib.common.rest_client [req-491e2e52-3b9f-4d55-9821-f87c2954e38a ] Request (RbacPoliciesExtRbacTest:test_create_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:24:03.378 197 DEBUG tempest.lib.common.rest_client [req-491e2e52-3b9f-4d55-9821-f87c2954e38a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-491e2e52-3b9f-4d55-9821-f87c2954e38a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["mr4N2NwzSoObiM1zPpLhJA"], "expires_at": "2020-12-14T03:24:03.000000Z", "issued_at": "2020-12-14T02:24:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:03.918 197 INFO tempest.lib.common.rest_client [req-c0fb96b8-a372-4ea3-8e22-e43d5be153ff ] Request (RbacPoliciesExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/rbac-policies/34a556b2-0b6c-4377-9456-fb4c71d23199 0.530s 2020-12-14 02:24:03.920 197 DEBUG tempest.lib.common.rest_client [req-c0fb96b8-a372-4ea3-8e22-e43d5be153ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c0fb96b8-a372-4ea3-8e22-e43d5be153ff', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:24:03 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies/34a556b2-0b6c-4377-9456-fb4c71d23199'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:03.934 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:03.958 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_rbac_policy, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:03.960 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:03.985 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_rbac_policy, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:04.347 189 INFO tempest.lib.common.rest_client [req-6e59f695-af3e-483f-867e-12d1144582ba ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.294s 2020-12-14 02:24:04.351 189 DEBUG tempest.lib.common.rest_client [req-6e59f695-af3e-483f-867e-12d1144582ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6e59f695-af3e-483f-867e-12d1144582ba', 'x-compute-request-id': 'req-6e59f695-af3e-483f-867e-12d1144582ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:04.416 197 INFO tempest.lib.common.rest_client [req-245f00cc-5400-4f63-8a0b-6c209c0e2d40 ] Request (RbacPoliciesExtRbacTest:test_delete_rbac_policy): 201 POST http://172.30.13.94:9696/v2.0/rbac-policies 0.425s 2020-12-14 02:24:04.419 197 DEBUG tempest.lib.common.rest_client [req-245f00cc-5400-4f63-8a0b-6c209c0e2d40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"rbac_policy": {"target_tenant": "90fb476cfeb7496ebcda7d84297b91af", "object_type": "network", "object_id": "e076e8dd-d067-474b-9bae-24ca1f05e81c", "action": "access_as_shared"}} Response - Headers: {'content-type': 'application/json', 'content-length': '324', 'x-openstack-request-id': 'req-245f00cc-5400-4f63-8a0b-6c209c0e2d40', 'date': 'Mon, 14 Dec 2020 02:24:04 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies'} Body: b'{"rbac_policy": {"id": "125a781f-aab3-4fee-b7e7-cb6952354da0", "project_id": "90fb476cfeb7496ebcda7d84297b91af", "target_tenant": "90fb476cfeb7496ebcda7d84297b91af", "action": "access_as_shared", "object_id": "e076e8dd-d067-474b-9bae-24ca1f05e81c", "object_type": "network", "tenant_id": "90fb476cfeb7496ebcda7d84297b91af"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:04.422 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:04.489 197 INFO tempest.lib.common.rest_client [req-002270b2-6637-42d0-8186-19ea492441bb ] Request (RbacPoliciesExtRbacTest:test_delete_rbac_policy): 200 GET http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles 0.060s 2020-12-14 02:24:04.493 197 DEBUG tempest.lib.common.rest_client [req-002270b2-6637-42d0-8186-19ea492441bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-002270b2-6637-42d0-8186-19ea492441bb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:04.544 197 INFO tempest.lib.common.rest_client [req-8dd7b6bf-269b-4a96-a96d-f87e8d481f1b ] Request (RbacPoliciesExtRbacTest:test_delete_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:24:04.547 197 DEBUG tempest.lib.common.rest_client [req-8dd7b6bf-269b-4a96-a96d-f87e8d481f1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8dd7b6bf-269b-4a96-a96d-f87e8d481f1b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["ZfF5YApxSIu4FkY3nq6Ppg"], "expires_at": "2020-12-14T03:24:04.000000Z", "issued_at": "2020-12-14T02:24:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:04.599 197 INFO tempest.lib.common.rest_client [req-480e4b5b-1e0b-43c1-b3e9-9eb1451d425d ] Request (RbacPoliciesExtRbacTest:test_delete_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:24:04.602 197 DEBUG tempest.lib.common.rest_client [req-480e4b5b-1e0b-43c1-b3e9-9eb1451d425d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-480e4b5b-1e0b-43c1-b3e9-9eb1451d425d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["_v06_jsOTi-kWHkS-P2w_A"], "expires_at": "2020-12-14T03:24:04.000000Z", "issued_at": "2020-12-14T02:24:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:05.102 197 INFO tempest.lib.common.rest_client [req-5ae16127-0342-4757-86e1-51839fe1c68d ] Request (RbacPoliciesExtRbacTest:test_delete_rbac_policy): 204 DELETE http://172.30.13.94:9696/v2.0/rbac-policies/125a781f-aab3-4fee-b7e7-cb6952354da0 0.491s 2020-12-14 02:24:05.105 197 DEBUG tempest.lib.common.rest_client [req-5ae16127-0342-4757-86e1-51839fe1c68d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5ae16127-0342-4757-86e1-51839fe1c68d', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:24:05 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies/125a781f-aab3-4fee-b7e7-cb6952354da0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:05.108 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:05.191 197 INFO tempest.lib.common.rest_client [req-e1d4ee31-3b78-4564-8139-1b32ec2bd73b ] Request (RbacPoliciesExtRbacTest:test_delete_rbac_policy): 200 GET http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles 0.077s 2020-12-14 02:24:05.194 197 DEBUG tempest.lib.common.rest_client [req-e1d4ee31-3b78-4564-8139-1b32ec2bd73b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e1d4ee31-3b78-4564-8139-1b32ec2bd73b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:05.249 197 INFO tempest.lib.common.rest_client [req-d26c9547-d746-48b3-8a7c-2704e87ebf81 ] Request (RbacPoliciesExtRbacTest:test_delete_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:24:05.252 197 DEBUG tempest.lib.common.rest_client [req-d26c9547-d746-48b3-8a7c-2704e87ebf81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d26c9547-d746-48b3-8a7c-2704e87ebf81', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["osuygYZNRhOJWSE24t7mlg"], "expires_at": "2020-12-14T03:24:05.000000Z", "issued_at": "2020-12-14T02:24:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:05.314 197 INFO tempest.lib.common.rest_client [req-1a1ca052-7484-4f3b-9668-55a40d5cef8f ] Request (RbacPoliciesExtRbacTest:test_delete_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.055s 2020-12-14 02:24:05.317 197 DEBUG tempest.lib.common.rest_client [req-1a1ca052-7484-4f3b-9668-55a40d5cef8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a1ca052-7484-4f3b-9668-55a40d5cef8f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["KphcFfVGR7uyt7tiE9Ortw"], "expires_at": "2020-12-14T03:24:05.000000Z", "issued_at": "2020-12-14T02:24:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:05.453 197 INFO tempest.lib.common.rest_client [req-f4c5bd8c-8fbb-4efc-9599-29f6367ce533 ] Request (RbacPoliciesExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/rbac-policies/125a781f-aab3-4fee-b7e7-cb6952354da0 0.126s 2020-12-14 02:24:05.457 197 DEBUG tempest.lib.common.rest_client [req-f4c5bd8c-8fbb-4efc-9599-29f6367ce533 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '159', 'x-openstack-request-id': 'req-f4c5bd8c-8fbb-4efc-9599-29f6367ce533', 'date': 'Mon, 14 Dec 2020 02:24:05 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies/125a781f-aab3-4fee-b7e7-cb6952354da0'} Body: b'{"NeutronError": {"type": "RbacPolicyNotFound", "message": "RBAC policy of type unknown with ID 125a781f-aab3-4fee-b7e7-cb6952354da0 not found", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:05.471 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:05.496 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_rbac_policy, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:05.677 189 INFO tempest.lib.common.rest_client [req-4a139b3a-62f9-4a36-b30e-211591a39050 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.217s 2020-12-14 02:24:05.680 189 DEBUG tempest.lib.common.rest_client [req-4a139b3a-62f9-4a36-b30e-211591a39050 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4a139b3a-62f9-4a36-b30e-211591a39050', 'x-compute-request-id': 'req-4a139b3a-62f9-4a36-b30e-211591a39050', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:05.945 197 INFO tempest.lib.common.rest_client [req-3fd067f7-9218-4ca1-89a4-8462e1ed122e ] Request (RbacPoliciesExtRbacTest:test_list_rbac_policies): 201 POST http://172.30.13.94:9696/v2.0/rbac-policies 0.443s 2020-12-14 02:24:05.947 197 DEBUG tempest.lib.common.rest_client [req-3fd067f7-9218-4ca1-89a4-8462e1ed122e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"rbac_policy": {"target_tenant": "90fb476cfeb7496ebcda7d84297b91af", "object_type": "network", "object_id": "e076e8dd-d067-474b-9bae-24ca1f05e81c", "action": "access_as_shared"}} Response - Headers: {'content-type': 'application/json', 'content-length': '324', 'x-openstack-request-id': 'req-3fd067f7-9218-4ca1-89a4-8462e1ed122e', 'date': 'Mon, 14 Dec 2020 02:24:05 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies'} Body: b'{"rbac_policy": {"id": "bac36b7c-a368-45dd-8c1f-3258e4e208d8", "project_id": "90fb476cfeb7496ebcda7d84297b91af", "target_tenant": "90fb476cfeb7496ebcda7d84297b91af", "action": "access_as_shared", "object_id": "e076e8dd-d067-474b-9bae-24ca1f05e81c", "object_type": "network", "tenant_id": "90fb476cfeb7496ebcda7d84297b91af"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:05.951 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:06.030 197 INFO tempest.lib.common.rest_client [req-e515c15b-8198-4046-a938-52525b62d271 ] Request (RbacPoliciesExtRbacTest:test_list_rbac_policies): 200 GET http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles 0.073s 2020-12-14 02:24:06.034 197 DEBUG tempest.lib.common.rest_client [req-e515c15b-8198-4046-a938-52525b62d271 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e515c15b-8198-4046-a938-52525b62d271', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:06.091 197 INFO tempest.lib.common.rest_client [req-4f93e047-5c5b-4584-84b2-396d6cfe4271 ] Request (RbacPoliciesExtRbacTest:test_list_rbac_policies): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:24:06.095 197 DEBUG tempest.lib.common.rest_client [req-4f93e047-5c5b-4584-84b2-396d6cfe4271 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f93e047-5c5b-4584-84b2-396d6cfe4271', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["c_XHQTbyTW-mRZ8HsYh8VQ"], "expires_at": "2020-12-14T03:24:06.000000Z", "issued_at": "2020-12-14T02:24:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:06.151 197 INFO tempest.lib.common.rest_client [req-480147ad-e313-45d3-95ee-32a2e87d3e66 ] Request (RbacPoliciesExtRbacTest:test_list_rbac_policies): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:24:06.155 197 DEBUG tempest.lib.common.rest_client [req-480147ad-e313-45d3-95ee-32a2e87d3e66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-480147ad-e313-45d3-95ee-32a2e87d3e66', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["DGm7sFUXSxevrbbfpKR2-Q"], "expires_at": "2020-12-14T03:24:06.000000Z", "issued_at": "2020-12-14T02:24:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:06.275 197 INFO tempest.lib.common.rest_client [req-75d10a43-51d6-49b6-97ea-2212e5af481a ] Request (RbacPoliciesExtRbacTest:test_list_rbac_policies): 200 GET http://172.30.13.94:9696/v2.0/rbac-policies?id=bac36b7c-a368-45dd-8c1f-3258e4e208d8 0.112s 2020-12-14 02:24:06.278 197 DEBUG tempest.lib.common.rest_client [req-75d10a43-51d6-49b6-97ea-2212e5af481a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '328', 'x-openstack-request-id': 'req-75d10a43-51d6-49b6-97ea-2212e5af481a', 'date': 'Mon, 14 Dec 2020 02:24:06 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies?id=bac36b7c-a368-45dd-8c1f-3258e4e208d8'} Body: b'{"rbac_policies": [{"id": "bac36b7c-a368-45dd-8c1f-3258e4e208d8", "project_id": "90fb476cfeb7496ebcda7d84297b91af", "target_tenant": "90fb476cfeb7496ebcda7d84297b91af", "action": "access_as_shared", "object_id": "e076e8dd-d067-474b-9bae-24ca1f05e81c", "object_type": "network", "tenant_id": "90fb476cfeb7496ebcda7d84297b91af"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:06.282 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:06.359 197 INFO tempest.lib.common.rest_client [req-fc04426e-4cb3-4631-bbbf-7c17a97d37db ] Request (RbacPoliciesExtRbacTest:test_list_rbac_policies): 200 GET http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles 0.071s 2020-12-14 02:24:06.362 197 DEBUG tempest.lib.common.rest_client [req-fc04426e-4cb3-4631-bbbf-7c17a97d37db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc04426e-4cb3-4631-bbbf-7c17a97d37db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:06.421 197 INFO tempest.lib.common.rest_client [req-df43474c-1799-4544-9383-9a93a2054d25 ] Request (RbacPoliciesExtRbacTest:test_list_rbac_policies): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:24:06.426 197 DEBUG tempest.lib.common.rest_client [req-df43474c-1799-4544-9383-9a93a2054d25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df43474c-1799-4544-9383-9a93a2054d25', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["E-vtylnZQiCOOW6ucCM_xA"], "expires_at": "2020-12-14T03:24:06.000000Z", "issued_at": "2020-12-14T02:24:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:06.483 197 INFO tempest.lib.common.rest_client [req-dfc96ade-cd00-4269-8d2a-d92234bc2710 ] Request (RbacPoliciesExtRbacTest:test_list_rbac_policies): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:24:06.488 197 DEBUG tempest.lib.common.rest_client [req-dfc96ade-cd00-4269-8d2a-d92234bc2710 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dfc96ade-cd00-4269-8d2a-d92234bc2710', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["kQfYycJJSLqYWE2lWqQVDA"], "expires_at": "2020-12-14T03:24:06.000000Z", "issued_at": "2020-12-14T02:24:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:11.626 189 INFO tempest.lib.common.rest_client [req-400ab0c4-939e-40ba-93cf-7196d046a26b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 4.836s 2020-12-14 02:24:11.630 189 DEBUG tempest.lib.common.rest_client [req-400ab0c4-939e-40ba-93cf-7196d046a26b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-400ab0c4-939e-40ba-93cf-7196d046a26b', 'x-compute-request-id': 'req-400ab0c4-939e-40ba-93cf-7196d046a26b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:11.803 197 INFO tempest.lib.common.rest_client [req-995f6421-7f39-4906-948d-710075f7986d ] Request (RbacPoliciesExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/rbac-policies/bac36b7c-a368-45dd-8c1f-3258e4e208d8 5.302s 2020-12-14 02:24:11.805 197 DEBUG tempest.lib.common.rest_client [req-995f6421-7f39-4906-948d-710075f7986d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-995f6421-7f39-4906-948d-710075f7986d', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:24:11 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies/bac36b7c-a368-45dd-8c1f-3258e4e208d8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:11.819 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:11.844 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_rbac_policy, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:12.389 197 INFO tempest.lib.common.rest_client [req-c95e2fba-5fa6-4dd9-a2ac-759e6719c0a7 ] Request (RbacPoliciesExtRbacTest:test_show_rbac_policy): 201 POST http://172.30.13.94:9696/v2.0/rbac-policies 0.539s 2020-12-14 02:24:12.393 197 DEBUG tempest.lib.common.rest_client [req-c95e2fba-5fa6-4dd9-a2ac-759e6719c0a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"rbac_policy": {"target_tenant": "90fb476cfeb7496ebcda7d84297b91af", "object_type": "network", "object_id": "e076e8dd-d067-474b-9bae-24ca1f05e81c", "action": "access_as_shared"}} Response - Headers: {'content-type': 'application/json', 'content-length': '324', 'x-openstack-request-id': 'req-c95e2fba-5fa6-4dd9-a2ac-759e6719c0a7', 'date': 'Mon, 14 Dec 2020 02:24:12 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies'} Body: b'{"rbac_policy": {"id": "d5b61644-b058-43e4-bb50-82471dd00ad9", "project_id": "90fb476cfeb7496ebcda7d84297b91af", "target_tenant": "90fb476cfeb7496ebcda7d84297b91af", "action": "access_as_shared", "object_id": "e076e8dd-d067-474b-9bae-24ca1f05e81c", "object_type": "network", "tenant_id": "90fb476cfeb7496ebcda7d84297b91af"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:12.396 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:12.467 197 INFO tempest.lib.common.rest_client [req-3ccd7cf9-565c-4fd4-a369-89f733758bd6 ] Request (RbacPoliciesExtRbacTest:test_show_rbac_policy): 200 GET http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles 0.065s 2020-12-14 02:24:12.470 197 DEBUG tempest.lib.common.rest_client [req-3ccd7cf9-565c-4fd4-a369-89f733758bd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ccd7cf9-565c-4fd4-a369-89f733758bd6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:12.526 197 INFO tempest.lib.common.rest_client [req-dfb66fcb-9449-4433-8b15-ab1f1675bc18 ] Request (RbacPoliciesExtRbacTest:test_show_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:24:12.528 197 DEBUG tempest.lib.common.rest_client [req-dfb66fcb-9449-4433-8b15-ab1f1675bc18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dfb66fcb-9449-4433-8b15-ab1f1675bc18', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["HIQxQIMLTfuA5HJXqVPBWQ"], "expires_at": "2020-12-14T03:24:12.000000Z", "issued_at": "2020-12-14T02:24:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:12.587 197 INFO tempest.lib.common.rest_client [req-5910eb2f-13de-4843-b8d0-5af88795acc9 ] Request (RbacPoliciesExtRbacTest:test_show_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:24:12.590 197 DEBUG tempest.lib.common.rest_client [req-5910eb2f-13de-4843-b8d0-5af88795acc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5910eb2f-13de-4843-b8d0-5af88795acc9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["Cotthq46S1y3HoO9c8uSug"], "expires_at": "2020-12-14T03:24:12.000000Z", "issued_at": "2020-12-14T02:24:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:12.705 197 INFO tempest.lib.common.rest_client [req-32f2ea5b-08b5-4100-8355-b895784f7e9d ] Request (RbacPoliciesExtRbacTest:test_show_rbac_policy): 200 GET http://172.30.13.94:9696/v2.0/rbac-policies/d5b61644-b058-43e4-bb50-82471dd00ad9 0.107s 2020-12-14 02:24:12.710 197 DEBUG tempest.lib.common.rest_client [req-32f2ea5b-08b5-4100-8355-b895784f7e9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '324', 'x-openstack-request-id': 'req-32f2ea5b-08b5-4100-8355-b895784f7e9d', 'date': 'Mon, 14 Dec 2020 02:24:12 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies/d5b61644-b058-43e4-bb50-82471dd00ad9'} Body: b'{"rbac_policy": {"id": "d5b61644-b058-43e4-bb50-82471dd00ad9", "project_id": "90fb476cfeb7496ebcda7d84297b91af", "target_tenant": "90fb476cfeb7496ebcda7d84297b91af", "action": "access_as_shared", "object_id": "e076e8dd-d067-474b-9bae-24ca1f05e81c", "object_type": "network", "tenant_id": "90fb476cfeb7496ebcda7d84297b91af"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:12.715 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:12.793 197 INFO tempest.lib.common.rest_client [req-ac33cf65-ad03-40f1-b003-68aa8781c39f ] Request (RbacPoliciesExtRbacTest:test_show_rbac_policy): 200 GET http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles 0.071s 2020-12-14 02:24:12.796 197 DEBUG tempest.lib.common.rest_client [req-ac33cf65-ad03-40f1-b003-68aa8781c39f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac33cf65-ad03-40f1-b003-68aa8781c39f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:12.852 197 INFO tempest.lib.common.rest_client [req-263707e4-dda8-4556-96a1-69e1839dcc9e ] Request (RbacPoliciesExtRbacTest:test_show_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:24:12.854 197 DEBUG tempest.lib.common.rest_client [req-263707e4-dda8-4556-96a1-69e1839dcc9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-263707e4-dda8-4556-96a1-69e1839dcc9e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["YsOxjbVAS8KTvA-OcxRC1Q"], "expires_at": "2020-12-14T03:24:12.000000Z", "issued_at": "2020-12-14T02:24:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:12.909 197 INFO tempest.lib.common.rest_client [req-d2178734-70b4-476e-b140-0cec7e3cb1e4 ] Request (RbacPoliciesExtRbacTest:test_show_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:24:12.912 197 DEBUG tempest.lib.common.rest_client [req-d2178734-70b4-476e-b140-0cec7e3cb1e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2178734-70b4-476e-b140-0cec7e3cb1e4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["AtiRwXgWScOPKFq0fbIPtg"], "expires_at": "2020-12-14T03:24:12.000000Z", "issued_at": "2020-12-14T02:24:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:12.971 189 INFO tempest.lib.common.rest_client [req-0707c697-9a8d-49f7-b52d-4769d078416f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.234s 2020-12-14 02:24:12.975 189 DEBUG tempest.lib.common.rest_client [req-0707c697-9a8d-49f7-b52d-4769d078416f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0707c697-9a8d-49f7-b52d-4769d078416f', 'x-compute-request-id': 'req-0707c697-9a8d-49f7-b52d-4769d078416f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:13.326 197 INFO tempest.lib.common.rest_client [req-2b7655c3-bbe6-4ebe-9aec-116367d0b9af ] Request (RbacPoliciesExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/rbac-policies/d5b61644-b058-43e4-bb50-82471dd00ad9 0.406s 2020-12-14 02:24:13.329 197 DEBUG tempest.lib.common.rest_client [req-2b7655c3-bbe6-4ebe-9aec-116367d0b9af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2b7655c3-bbe6-4ebe-9aec-116367d0b9af', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:24:13 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies/d5b61644-b058-43e4-bb50-82471dd00ad9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:13.342 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:13.367 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_rbac_policy, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:13.370 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:13.396 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_rbac_policy, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:13.399 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:13.429 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_rbac_policy:target_tenant, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:13.874 197 INFO tempest.lib.common.rest_client [req-a390141f-24d3-4ff2-b6cc-4bc04cf78c64 ] Request (RbacPoliciesExtRbacTest:test_update_rbac_policy): 201 POST http://172.30.13.94:9696/v2.0/rbac-policies 0.439s 2020-12-14 02:24:13.878 197 DEBUG tempest.lib.common.rest_client [req-a390141f-24d3-4ff2-b6cc-4bc04cf78c64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"rbac_policy": {"target_tenant": "90fb476cfeb7496ebcda7d84297b91af", "object_type": "network", "object_id": "e076e8dd-d067-474b-9bae-24ca1f05e81c", "action": "access_as_shared"}} Response - Headers: {'content-type': 'application/json', 'content-length': '324', 'x-openstack-request-id': 'req-a390141f-24d3-4ff2-b6cc-4bc04cf78c64', 'date': 'Mon, 14 Dec 2020 02:24:13 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies'} Body: b'{"rbac_policy": {"id": "1d30bee8-a638-4c67-a685-8a88b65c1104", "project_id": "90fb476cfeb7496ebcda7d84297b91af", "target_tenant": "90fb476cfeb7496ebcda7d84297b91af", "action": "access_as_shared", "object_id": "e076e8dd-d067-474b-9bae-24ca1f05e81c", "object_type": "network", "tenant_id": "90fb476cfeb7496ebcda7d84297b91af"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:13.881 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:13.956 197 INFO tempest.lib.common.rest_client [req-0667dd71-4330-4112-821f-d3c14d981685 ] Request (RbacPoliciesExtRbacTest:test_update_rbac_policy): 200 GET http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles 0.068s 2020-12-14 02:24:13.960 197 DEBUG tempest.lib.common.rest_client [req-0667dd71-4330-4112-821f-d3c14d981685 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0667dd71-4330-4112-821f-d3c14d981685', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:14.025 197 INFO tempest.lib.common.rest_client [req-51f2a6d0-8922-4b19-a870-6e8d4487aad0 ] Request (RbacPoliciesExtRbacTest:test_update_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.058s 2020-12-14 02:24:14.027 197 DEBUG tempest.lib.common.rest_client [req-51f2a6d0-8922-4b19-a870-6e8d4487aad0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51f2a6d0-8922-4b19-a870-6e8d4487aad0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["7j9HAGNJT2WOEGA1_pmhcA"], "expires_at": "2020-12-14T03:24:14.000000Z", "issued_at": "2020-12-14T02:24:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:14.083 197 INFO tempest.lib.common.rest_client [req-3abd4e43-6754-4eec-9e90-2c4ac1911e5a ] Request (RbacPoliciesExtRbacTest:test_update_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:24:14.085 197 DEBUG tempest.lib.common.rest_client [req-3abd4e43-6754-4eec-9e90-2c4ac1911e5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3abd4e43-6754-4eec-9e90-2c4ac1911e5a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["7pwzPVZQRmOO-3Pa5kpwMQ"], "expires_at": "2020-12-14T03:24:14.000000Z", "issued_at": "2020-12-14T02:24:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:14.302 189 INFO tempest.lib.common.rest_client [req-6188864d-dd4d-4d66-8707-9216499f3b53 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.220s 2020-12-14 02:24:14.306 189 DEBUG tempest.lib.common.rest_client [req-6188864d-dd4d-4d66-8707-9216499f3b53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6188864d-dd4d-4d66-8707-9216499f3b53', 'x-compute-request-id': 'req-6188864d-dd4d-4d66-8707-9216499f3b53', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:14.509 197 INFO tempest.lib.common.rest_client [req-4bd7e3f8-3987-4599-ba31-c929b3ad01a9 ] Request (RbacPoliciesExtRbacTest:test_update_rbac_policy): 200 PUT http://172.30.13.94:9696/v2.0/rbac-policies/1d30bee8-a638-4c67-a685-8a88b65c1104 0.416s 2020-12-14 02:24:14.513 197 DEBUG tempest.lib.common.rest_client [req-4bd7e3f8-3987-4599-ba31-c929b3ad01a9 ] Request - Headers: {'X-Auth-Token': ''} Body: {"rbac_policy": {"target_tenant": "90fb476cfeb7496ebcda7d84297b91af"}} Response - Headers: {'content-type': 'application/json', 'content-length': '324', 'x-openstack-request-id': 'req-4bd7e3f8-3987-4599-ba31-c929b3ad01a9', 'date': 'Mon, 14 Dec 2020 02:24:14 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies/1d30bee8-a638-4c67-a685-8a88b65c1104'} Body: b'{"rbac_policy": {"id": "1d30bee8-a638-4c67-a685-8a88b65c1104", "project_id": "90fb476cfeb7496ebcda7d84297b91af", "target_tenant": "90fb476cfeb7496ebcda7d84297b91af", "action": "access_as_shared", "object_id": "e076e8dd-d067-474b-9bae-24ca1f05e81c", "object_type": "network", "tenant_id": "90fb476cfeb7496ebcda7d84297b91af"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:14.516 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:14.596 197 INFO tempest.lib.common.rest_client [req-0a8dcf13-f28f-43b8-b67b-39c0c08b5337 ] Request (RbacPoliciesExtRbacTest:test_update_rbac_policy): 200 GET http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles 0.072s 2020-12-14 02:24:14.599 197 DEBUG tempest.lib.common.rest_client [req-0a8dcf13-f28f-43b8-b67b-39c0c08b5337 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0a8dcf13-f28f-43b8-b67b-39c0c08b5337', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af/users/84cd8326f72141e1b56aef56a68f8523/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:14.674 197 INFO tempest.lib.common.rest_client [req-d2015ee5-cf46-4ebe-9962-2c7eca69fe70 ] Request (RbacPoliciesExtRbacTest:test_update_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.067s 2020-12-14 02:24:14.678 197 DEBUG tempest.lib.common.rest_client [req-d2015ee5-cf46-4ebe-9962-2c7eca69fe70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2015ee5-cf46-4ebe-9962-2c7eca69fe70', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["od3bky8bQZSQa0vyrwDEeQ"], "expires_at": "2020-12-14T03:24:14.000000Z", "issued_at": "2020-12-14T02:24:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:14.731 197 INFO tempest.lib.common.rest_client [req-7bbd789e-9153-45e1-b99f-4f697829c8b3 ] Request (RbacPoliciesExtRbacTest:test_update_rbac_policy): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:24:14.735 197 DEBUG tempest.lib.common.rest_client [req-7bbd789e-9153-45e1-b99f-4f697829c8b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7bbd789e-9153-45e1-b99f-4f697829c8b3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "84cd8326f72141e1b56aef56a68f8523", "name": "tempest-RbacPoliciesExtRbacTest-1592666050", "password_expires_at": null}, "audit_ids": ["2A16rsanSbu6xTYmoTHvbA"], "expires_at": "2020-12-14T03:24:14.000000Z", "issued_at": "2020-12-14T02:24:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "90fb476cfeb7496ebcda7d84297b91af", "name": "tempest-RbacPoliciesExtRbacTest-1592666050"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_90fb476cfeb7496ebcda7d84297b91af", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:15.247 197 INFO tempest.lib.common.rest_client [req-75d03d6c-fbc8-4ab2-8c3a-d55e1e552a09 ] Request (RbacPoliciesExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/rbac-policies/1d30bee8-a638-4c67-a685-8a88b65c1104 0.494s 2020-12-14 02:24:15.250 197 DEBUG tempest.lib.common.rest_client [req-75d03d6c-fbc8-4ab2-8c3a-d55e1e552a09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-75d03d6c-fbc8-4ab2-8c3a-d55e1e552a09', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:24:15 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/rbac-policies/1d30bee8-a638-4c67-a685-8a88b65c1104'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:15.629 189 INFO tempest.lib.common.rest_client [req-85a8958b-4d28-4050-8c8e-d5184a9c1550 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.219s 2020-12-14 02:24:15.632 189 DEBUG tempest.lib.common.rest_client [req-85a8958b-4d28-4050-8c8e-d5184a9c1550 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-85a8958b-4d28-4050-8c8e-d5184a9c1550', 'x-compute-request-id': 'req-85a8958b-4d28-4050-8c8e-d5184a9c1550', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:15.989 197 INFO tempest.lib.common.rest_client [req-a689475b-e07e-45b2-be20-491ae97daa0d ] Request (RbacPoliciesExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/e076e8dd-d067-474b-9bae-24ca1f05e81c 0.724s 2020-12-14 02:24:15.992 197 DEBUG tempest.lib.common.rest_client [req-a689475b-e07e-45b2-be20-491ae97daa0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-a689475b-e07e-45b2-be20-491ae97daa0d', 'date': 'Mon, 14 Dec 2020 02:24:15 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/e076e8dd-d067-474b-9bae-24ca1f05e81c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:16.273 197 INFO tempest.lib.common.rest_client [req-db4163ae-e37a-499d-a7d8-7a3b2ceba9b6 ] Request (RbacPoliciesExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/84cd8326f72141e1b56aef56a68f8523 0.274s 2020-12-14 02:24:16.277 197 DEBUG tempest.lib.common.rest_client [req-db4163ae-e37a-499d-a7d8-7a3b2ceba9b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db4163ae-e37a-499d-a7d8-7a3b2ceba9b6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/84cd8326f72141e1b56aef56a68f8523'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:16.391 197 INFO tempest.lib.common.rest_client [req-76199546-f9ba-4c81-a8c5-8c66fea29540 ] Request (RbacPoliciesExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:24:16.394 197 DEBUG tempest.lib.common.rest_client [req-76199546-f9ba-4c81-a8c5-8c66fea29540 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76199546-f9ba-4c81-a8c5-8c66fea29540', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["n0SgPumtSECSa2Fkq5EE2g"], "expires_at": "2020-12-14T03:24:16.000000Z", "issued_at": "2020-12-14T02:24:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:16.802 197 INFO tempest.lib.common.rest_client [req-1a6fcfae-b16c-4f22-855e-bf052f283682 ] Request (RbacPoliciesExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=90fb476cfeb7496ebcda7d84297b91af&name=default 0.401s 2020-12-14 02:24:16.806 197 DEBUG tempest.lib.common.rest_client [req-1a6fcfae-b16c-4f22-855e-bf052f283682 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-1a6fcfae-b16c-4f22-855e-bf052f283682', 'date': 'Mon, 14 Dec 2020 02:24:16 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=90fb476cfeb7496ebcda7d84297b91af&name=default'} Body: b'{"security_groups": [{"id": "5cf9aa19-a9e2-4157-8caf-b268f7d5f1fc", "name": "default", "stateful": true, "tenant_id": "90fb476cfeb7496ebcda7d84297b91af", "description": "Default security group", "security_group_rules": [{"id": "1ab28bf7-c582-40ba-896d-5560c1e3ac42", "tenant_id": "90fb476cfeb7496ebcda7d84297b91af", "security_group_id": "5cf9aa19-a9e2-4157-8caf-b268f7d5f1fc", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5cf9aa19-a9e2-4157-8caf-b268f7d5f1fc", "description": null, "tags": [], "created_at": "2020-12-14T02:24:02Z", "updated_at": "2020-12-14T02:24:02Z", "revision_number": 0, "project_id": "90fb476cfeb7496ebcda7d84297b91af"}, {"id": "53733229-3636-4a60-a365-c6192e4376be", "tenant_id": "90fb476cfeb7496ebcda7d84297b91af", "security_group_id": "5cf9aa19-a9e2-4157-8caf-b268f7d5f1fc", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:24:02Z", "updated_at": "2020-12-14T02:24:02Z", "revision_number": 0, "project_id": "90fb476cfeb7496ebcda7d84297b91af"}, {"id": "54e1cea1-c0ed-4740-a846-76ea62e83d79", "tenant_id": "90fb476cfeb7496ebcda7d84297b91af", "security_group_id": "5cf9aa19-a9e2-4157-8caf-b268f7d5f1fc", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:24:02Z", "updated_at": "2020-12-14T02:24:02Z", "revision_number": 0, "project_id": "90fb476cfeb7496ebcda7d84297b91af"}, {"id": "f09d58a3-4bb9-4824-9313-45fb61150c13", "tenant_id": "90fb476cfeb7496ebcda7d84297b91af", "security_group_id": "5cf9aa19-a9e2-4157-8caf-b268f7d5f1fc", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5cf9aa19-a9e2-4157-8caf-b268f7d5f1fc", "description": null, "tags": [], "created_at": "2020-12-14T02:24:02Z", "updated_at": "2020-12-14T02:24:02Z", "revision_number": 0, "project_id": "90fb476cfeb7496ebcda7d84297b91af"}], "tags": [], "created_at": "2020-12-14T02:24:02Z", "updated_at": "2020-12-14T02:24:02Z", "revision_number": 1, "project_id": "90fb476cfeb7496ebcda7d84297b91af"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:16.984 189 INFO tempest.lib.common.rest_client [req-eca22cab-a262-4e76-8944-758f5248dea3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.240s 2020-12-14 02:24:16.987 189 DEBUG tempest.lib.common.rest_client [req-eca22cab-a262-4e76-8944-758f5248dea3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eca22cab-a262-4e76-8944-758f5248dea3', 'x-compute-request-id': 'req-eca22cab-a262-4e76-8944-758f5248dea3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:17.032 197 INFO tempest.lib.common.rest_client [req-f2410631-82be-4668-9ea0-e9c0d1aa1953 ] Request (RbacPoliciesExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/5cf9aa19-a9e2-4157-8caf-b268f7d5f1fc 0.219s 2020-12-14 02:24:17.034 197 DEBUG tempest.lib.common.rest_client [req-f2410631-82be-4668-9ea0-e9c0d1aa1953 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f2410631-82be-4668-9ea0-e9c0d1aa1953', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:24:17 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5cf9aa19-a9e2-4157-8caf-b268f7d5f1fc'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:17.204 197 INFO tempest.lib.common.rest_client [req-85c51837-c3f8-43bc-bcbb-98a7b87c71f8 ] Request (RbacPoliciesExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af 0.162s 2020-12-14 02:24:17.206 197 DEBUG tempest.lib.common.rest_client [req-85c51837-c3f8-43bc-bcbb-98a7b87c71f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85c51837-c3f8-43bc-bcbb-98a7b87c71f8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/90fb476cfeb7496ebcda7d84297b91af'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:17.339 197 INFO tempest.lib.common.rest_client [req-45c0843c-0ffa-4740-b673-64ca7d55c457 ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.113s 2020-12-14 02:24:17.343 197 DEBUG tempest.lib.common.rest_client [req-45c0843c-0ffa-4740-b673-64ca7d55c457 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45c0843c-0ffa-4740-b673-64ca7d55c457', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["UoN4_f0eRgGbwsbXoAP0SQ"], "expires_at": "2020-12-14T03:24:17.000000Z", "issued_at": "2020-12-14T02:24:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:17.452 197 INFO tempest.lib.common.rest_client [req-d3a66485-70b0-425a-9a58-e6a144471b59 ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:24:17.455 197 DEBUG tempest.lib.common.rest_client [req-d3a66485-70b0-425a-9a58-e6a144471b59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3a66485-70b0-425a-9a58-e6a144471b59', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["A0jcXhu_SbW8O_EnfF8viQ"], "expires_at": "2020-12-14T03:24:17.000000Z", "issued_at": "2020-12-14T02:24:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:17.536 197 INFO tempest.lib.common.rest_client [req-9b100f31-5999-47e9-9fe8-6cbe2fe118d6 ] Request (RouterRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.073s 2020-12-14 02:24:17.539 197 DEBUG tempest.lib.common.rest_client [req-9b100f31-5999-47e9-9fe8-6cbe2fe118d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b100f31-5999-47e9-9fe8-6cbe2fe118d6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:17.627 197 INFO tempest.lib.common.rest_client [req-b33a0277-2a6d-40e8-8a2c-5f0170e3b919 ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.080s 2020-12-14 02:24:17.630 197 DEBUG tempest.lib.common.rest_client [req-b33a0277-2a6d-40e8-8a2c-5f0170e3b919 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-RouterRbacTest-467668131-desc", "domain_id": "default", "name": "tempest-RouterRbacTest-467668131"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '364', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b33a0277-2a6d-40e8-8a2c-5f0170e3b919', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131", "domain_id": "default", "description": "tempest-RouterRbacTest-467668131-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:17.776 197 INFO tempest.lib.common.rest_client [req-872e4293-6319-4d1e-a844-c59d77b2f1b2 ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.137s 2020-12-14 02:24:17.778 197 DEBUG tempest.lib.common.rest_client [req-872e4293-6319-4d1e-a844-c59d77b2f1b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-RouterRbacTest-467668131", "password": "I3_kr3MwJZsAeeR", "project_id": "ac4c492395da44859cb68eea226ed5a1", "email": "tempest-RouterRbacTest-724079313@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-872e4293-6319-4d1e-a844-c59d77b2f1b2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "ac4c492395da44859cb68eea226ed5a1", "email": "tempest-RouterRbacTest-724079313@example.com", "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/fe2f0cae66134f229c0d67cd4fbb1b0e"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:17.850 197 INFO tempest.lib.common.rest_client [req-7b37d9b5-151f-4bf8-8631-52767d32cffe ] Request (RouterRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.064s 2020-12-14 02:24:17.853 197 DEBUG tempest.lib.common.rest_client [req-7b37d9b5-151f-4bf8-8631-52767d32cffe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7b37d9b5-151f-4bf8-8631-52767d32cffe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:17.927 197 INFO tempest.lib.common.rest_client [req-6e3d1463-0d2a-4d3b-bbb2-f0977416346a ] Request (RouterRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.064s 2020-12-14 02:24:17.929 197 DEBUG tempest.lib.common.rest_client [req-6e3d1463-0d2a-4d3b-bbb2-f0977416346a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e3d1463-0d2a-4d3b-bbb2-f0977416346a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:18.020 197 INFO tempest.lib.common.rest_client [req-31833762-3cad-4973-bae7-38f26b744fc0 ] Request (RouterRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles/72a4576c553448cd941b052c1ca0cf2d 0.082s 2020-12-14 02:24:18.022 197 DEBUG tempest.lib.common.rest_client [req-31833762-3cad-4973-bae7-38f26b744fc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31833762-3cad-4973-bae7-38f26b744fc0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:18.026 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-RouterRbacTest-467668131', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ac4c492395da44859cb68eea226ed5a1', 'project_name': 'tempest-RouterRbacTest-467668131', 'tenant_id': 'ac4c492395da44859cb68eea226ed5a1', 'tenant_name': 'tempest-RouterRbacTest-467668131', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'fe2f0cae66134f229c0d67cd4fbb1b0e'}, Network: None, Subnet: None, Router: None 2020-12-14 02:24:18.031 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-RouterRbacTest-467668131', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ac4c492395da44859cb68eea226ed5a1', 'project_name': 'tempest-RouterRbacTest-467668131', 'tenant_id': 'ac4c492395da44859cb68eea226ed5a1', 'tenant_name': 'tempest-RouterRbacTest-467668131', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'fe2f0cae66134f229c0d67cd4fbb1b0e'}, Network: None, Subnet: None, Router: None 2020-12-14 02:24:18.222 197 INFO tempest.lib.common.rest_client [req-17f9f80e-8f17-4f4f-9a48-b7299ddde74c ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.123s 2020-12-14 02:24:18.225 197 DEBUG tempest.lib.common.rest_client [req-17f9f80e-8f17-4f4f-9a48-b7299ddde74c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6557', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17f9f80e-8f17-4f4f-9a48-b7299ddde74c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["5wWedO_ESUmnKEOHrLK-3A"], "expires_at": "2020-12-14T03:24:18.000000Z", "issued_at": "2020-12-14T02:24:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/imag _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:18.320 189 INFO tempest.lib.common.rest_client [req-4115b949-616b-4db2-a3c4-f4357a7f5fec ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.225s 2020-12-14 02:24:18.323 189 DEBUG tempest.lib.common.rest_client [req-4115b949-616b-4db2-a3c4-f4357a7f5fec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4115b949-616b-4db2-a3c4-f4357a7f5fec', 'x-compute-request-id': 'req-4115b949-616b-4db2-a3c4-f4357a7f5fec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:18.342 197 INFO tempest.lib.common.rest_client [req-903aa0b4-c974-4b24-b7d6-111a62f0b743 ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:24:18.345 197 DEBUG tempest.lib.common.rest_client [req-903aa0b4-c974-4b24-b7d6-111a62f0b743 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-903aa0b4-c974-4b24-b7d6-111a62f0b743', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["z4tHZeJbRn2vsCLCz82LgQ"], "expires_at": "2020-12-14T03:24:18.000000Z", "issued_at": "2020-12-14T02:24:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:18.475 197 INFO tempest.lib.common.rest_client [req-69d63d46-c8d3-4fd2-9efe-d5cdbf3b59cf ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-12-14 02:24:18.478 197 DEBUG tempest.lib.common.rest_client [req-69d63d46-c8d3-4fd2-9efe-d5cdbf3b59cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69d63d46-c8d3-4fd2-9efe-d5cdbf3b59cf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["83VpS82ZQMSd7iMUVsIazQ"], "expires_at": "2020-12-14T03:24:18.000000Z", "issued_at": "2020-12-14T02:24:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:18.551 197 INFO tempest.lib.common.rest_client [req-38fd4d04-f12f-4109-b610-8264d9761f15 ] Request (RouterRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.067s 2020-12-14 02:24:18.553 197 DEBUG tempest.lib.common.rest_client [req-38fd4d04-f12f-4109-b610-8264d9761f15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-38fd4d04-f12f-4109-b610-8264d9761f15', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:18.624 197 INFO tempest.lib.common.rest_client [req-c2462bc6-a085-4160-b862-9b455fc2e5dd ] Request (RouterRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.064s 2020-12-14 02:24:18.626 197 DEBUG tempest.lib.common.rest_client [req-c2462bc6-a085-4160-b862-9b455fc2e5dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2462bc6-a085-4160-b862-9b455fc2e5dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:18.629 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:24:18.631 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:18.701 197 INFO tempest.lib.common.rest_client [req-3a644e50-5f53-4bdb-b09b-48b21542f9f3 ] Request (RouterRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.063s 2020-12-14 02:24:18.703 197 DEBUG tempest.lib.common.rest_client [req-3a644e50-5f53-4bdb-b09b-48b21542f9f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a644e50-5f53-4bdb-b09b-48b21542f9f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:18.784 197 INFO tempest.lib.common.rest_client [req-79165977-4a1f-4238-9b7d-a8905b97fc8d ] Request (RouterRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles/72a4576c553448cd941b052c1ca0cf2d 0.075s 2020-12-14 02:24:18.787 197 DEBUG tempest.lib.common.rest_client [req-79165977-4a1f-4238-9b7d-a8905b97fc8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79165977-4a1f-4238-9b7d-a8905b97fc8d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:18.900 197 INFO tempest.lib.common.rest_client [req-5ed6970b-7075-4ded-876b-4c85d7d677a4 ] Request (RouterRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-12-14 02:24:18.903 197 DEBUG tempest.lib.common.rest_client [req-5ed6970b-7075-4ded-876b-4c85d7d677a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ed6970b-7075-4ded-876b-4c85d7d677a4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:19.653 189 INFO tempest.lib.common.rest_client [req-2980a419-488a-413e-a928-66035263c561 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.221s 2020-12-14 02:24:19.655 189 DEBUG tempest.lib.common.rest_client [req-2980a419-488a-413e-a928-66035263c561 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2980a419-488a-413e-a928-66035263c561', 'x-compute-request-id': 'req-2980a419-488a-413e-a928-66035263c561', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:20.023 197 INFO tempest.lib.common.rest_client [req-8216cccf-95e5-4e48-a35f-d7ebd6cbcee5 ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.112s 2020-12-14 02:24:20.026 197 DEBUG tempest.lib.common.rest_client [req-8216cccf-95e5-4e48-a35f-d7ebd6cbcee5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8216cccf-95e5-4e48-a35f-d7ebd6cbcee5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["edksOrp4T4uz7bQcewS_lA"], "expires_at": "2020-12-14T03:24:19.000000Z", "issued_at": "2020-12-14T02:24:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:20.620 197 INFO tempest.lib.common.rest_client [req-48fdfcf7-fe42-48ef-9507-7a3d44b03282 ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.583s 2020-12-14 02:24:20.623 197 DEBUG tempest.lib.common.rest_client [req-48fdfcf7-fe42-48ef-9507-7a3d44b03282 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-RouterRbacTest-test-network-634669468", "router:external": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '733', 'x-openstack-request-id': 'req-48fdfcf7-fe42-48ef-9507-7a3d44b03282', 'date': 'Mon, 14 Dec 2020 02:24:20 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"44f8e2c3-3949-47fe-acf1-76b06d8296b9","name":"tempest-RouterRbacTest-test-network-634669468","tenant_id":"ac4c492395da44859cb68eea226ed5a1","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"ac4c492395da44859cb68eea226ed5a1","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":true,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":61,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:24:20Z","updated_at":"2020-12-14T02:24:20Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:21.016 189 INFO tempest.lib.common.rest_client [req-fdc98b52-fb5a-45cc-bf06-f4655ab94082 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.253s 2020-12-14 02:24:21.019 189 DEBUG tempest.lib.common.rest_client [req-fdc98b52-fb5a-45cc-bf06-f4655ab94082 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fdc98b52-fb5a-45cc-bf06-f4655ab94082', 'x-compute-request-id': 'req-fdc98b52-fb5a-45cc-bf06-f4655ab94082', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:21.273 197 INFO tempest.lib.common.rest_client [req-83f85f80-06e9-4210-8fa0-8ee437bcb0aa ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.642s 2020-12-14 02:24:21.275 197 DEBUG tempest.lib.common.rest_client [req-83f85f80-06e9-4210-8fa0-8ee437bcb0aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "44f8e2c3-3949-47fe-acf1-76b06d8296b9", "cidr": "192.168.120.0/28", "ip_version": 4, "gateway_ip": "192.168.120.1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '661', 'x-openstack-request-id': 'req-83f85f80-06e9-4210-8fa0-8ee437bcb0aa', 'date': 'Mon, 14 Dec 2020 02:24:21 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"baf8c094-0247-4dd9-8d1b-3a91617da6b5","name":"","tenant_id":"ac4c492395da44859cb68eea226ed5a1","network_id":"44f8e2c3-3949-47fe-acf1-76b06d8296b9","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:24:20Z","updated_at":"2020-12-14T02:24:20Z","revision_number":0,"project_id":"ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:21.501 197 INFO tempest.lib.common.rest_client [req-cec5568d-a8e2-4da5-a23e-88a1a2605ce2 ] Request (RouterRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 0.218s 2020-12-14 02:24:21.504 197 DEBUG tempest.lib.common.rest_client [req-cec5568d-a8e2-4da5-a23e-88a1a2605ce2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-RouterRbacTest-router-1228043555", "external_gateway_info": {}, "admin_state_up": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '539', 'x-openstack-request-id': 'req-cec5568d-a8e2-4da5-a23e-88a1a2605ce2', 'date': 'Mon, 14 Dec 2020 02:24:21 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "8ad96c55-7b62-4106-ab4d-4aa043bc0c65", "name": "tempest-RouterRbacTest-router-1228043555", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:21Z", "updated_at": "2020-12-14T02:24:21Z", "revision_number": 1, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:21.511 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:21.535 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:21.538 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:21.564 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_router_interface, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:21.919 197 INFO tempest.lib.common.rest_client [req-a5d760e9-d829-45ec-8b7d-cb87d3df76ca ] Request (RouterRbacTest:test_add_router_interface): 201 POST http://172.30.13.94:9696/v2.0/networks 0.348s 2020-12-14 02:24:21.921 197 DEBUG tempest.lib.common.rest_client [req-a5d760e9-d829-45ec-8b7d-cb87d3df76ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-RouterRbacTest-test-network-121076544"}} Response - Headers: {'content-type': 'application/json', 'content-length': '734', 'x-openstack-request-id': 'req-a5d760e9-d829-45ec-8b7d-cb87d3df76ca', 'date': 'Mon, 14 Dec 2020 02:24:21 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"bbfb5a6a-cfd8-4aac-91e7-2886f97908b8","name":"tempest-RouterRbacTest-test-network-121076544","tenant_id":"ac4c492395da44859cb68eea226ed5a1","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"ac4c492395da44859cb68eea226ed5a1","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":65,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:24:21Z","updated_at":"2020-12-14T02:24:21Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:22.355 189 INFO tempest.lib.common.rest_client [req-14d7931c-9c9e-49e1-9fd3-c08657aa8fe3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.230s 2020-12-14 02:24:22.358 189 DEBUG tempest.lib.common.rest_client [req-14d7931c-9c9e-49e1-9fd3-c08657aa8fe3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-14d7931c-9c9e-49e1-9fd3-c08657aa8fe3', 'x-compute-request-id': 'req-14d7931c-9c9e-49e1-9fd3-c08657aa8fe3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:22.653 197 INFO tempest.lib.common.rest_client [req-8b11fa33-b466-46ea-87a2-770d27d6856c ] Request (RouterRbacTest:test_add_router_interface): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.723s 2020-12-14 02:24:22.658 197 DEBUG tempest.lib.common.rest_client [req-8b11fa33-b466-46ea-87a2-770d27d6856c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "bbfb5a6a-cfd8-4aac-91e7-2886f97908b8", "cidr": "192.168.120.0/28", "ip_version": 4, "gateway_ip": "192.168.120.1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '661', 'x-openstack-request-id': 'req-8b11fa33-b466-46ea-87a2-770d27d6856c', 'date': 'Mon, 14 Dec 2020 02:24:22 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"3bc6f1dc-4db7-42db-a622-7ca8dc918921","name":"","tenant_id":"ac4c492395da44859cb68eea226ed5a1","network_id":"bbfb5a6a-cfd8-4aac-91e7-2886f97908b8","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:24:22Z","updated_at":"2020-12-14T02:24:22Z","revision_number":0,"project_id":"ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:22.879 197 INFO tempest.lib.common.rest_client [req-ca5f2696-2cfa-4165-8981-6b10b9b7da8a ] Request (RouterRbacTest:test_add_router_interface): 201 POST http://172.30.13.94:9696/v2.0/routers 0.211s 2020-12-14 02:24:22.883 197 DEBUG tempest.lib.common.rest_client [req-ca5f2696-2cfa-4165-8981-6b10b9b7da8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-RouterRbacTest-router-847180024", "external_gateway_info": {}, "admin_state_up": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '538', 'x-openstack-request-id': 'req-ca5f2696-2cfa-4165-8981-6b10b9b7da8a', 'date': 'Mon, 14 Dec 2020 02:24:22 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "5064736a-9d86-4c1e-a761-5736c97d099b", "name": "tempest-RouterRbacTest-router-847180024", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:22Z", "updated_at": "2020-12-14T02:24:22Z", "revision_number": 1, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:22.888 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:23.059 197 INFO tempest.lib.common.rest_client [req-696a4a53-3fd5-484a-b578-7a52dee36b9a ] Request (RouterRbacTest:test_add_router_interface): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.166s 2020-12-14 02:24:23.062 197 DEBUG tempest.lib.common.rest_client [req-696a4a53-3fd5-484a-b578-7a52dee36b9a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-696a4a53-3fd5-484a-b578-7a52dee36b9a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:23.167 197 INFO tempest.lib.common.rest_client [req-b0865c7e-8daa-4b76-ba68-adfe89743fe5 ] Request (RouterRbacTest:test_add_router_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:24:23.171 197 DEBUG tempest.lib.common.rest_client [req-b0865c7e-8daa-4b76-ba68-adfe89743fe5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b0865c7e-8daa-4b76-ba68-adfe89743fe5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["ZOM1A3s0QmCasVMQ7nGxDA"], "expires_at": "2020-12-14T03:24:23.000000Z", "issued_at": "2020-12-14T02:24:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:23.699 189 INFO tempest.lib.common.rest_client [req-f9ef30be-78b1-4bb7-bba5-83a684ea1935 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.235s 2020-12-14 02:24:23.702 189 DEBUG tempest.lib.common.rest_client [req-f9ef30be-78b1-4bb7-bba5-83a684ea1935 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f9ef30be-78b1-4bb7-bba5-83a684ea1935', 'x-compute-request-id': 'req-f9ef30be-78b1-4bb7-bba5-83a684ea1935', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:25.039 197 INFO tempest.lib.common.rest_client [req-6d88be59-9b40-4adc-a359-152cee585d8b ] Request (RouterRbacTest:test_add_router_interface): 200 PUT http://172.30.13.94:9696/v2.0/routers/5064736a-9d86-4c1e-a761-5736c97d099b/add_router_interface 1.861s 2020-12-14 02:24:25.043 197 DEBUG tempest.lib.common.rest_client [req-6d88be59-9b40-4adc-a359-152cee585d8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "3bc6f1dc-4db7-42db-a622-7ca8dc918921"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-6d88be59-9b40-4adc-a359-152cee585d8b', 'date': 'Mon, 14 Dec 2020 02:24:25 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/5064736a-9d86-4c1e-a761-5736c97d099b/add_router_interface'} Body: b'{"id": "5064736a-9d86-4c1e-a761-5736c97d099b", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "port_id": "6d24dda1-48c8-495c-bb6a-e3d181ddb714", "network_id": "bbfb5a6a-cfd8-4aac-91e7-2886f97908b8", "subnet_id": "3bc6f1dc-4db7-42db-a622-7ca8dc918921", "subnet_ids": ["3bc6f1dc-4db7-42db-a622-7ca8dc918921"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:25.047 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:25.054 189 INFO tempest.lib.common.rest_client [req-c98f0a81-d8be-4b2a-9a61-677ae3250c0e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.241s 2020-12-14 02:24:25.058 189 DEBUG tempest.lib.common.rest_client [req-c98f0a81-d8be-4b2a-9a61-677ae3250c0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c98f0a81-d8be-4b2a-9a61-677ae3250c0e', 'x-compute-request-id': 'req-c98f0a81-d8be-4b2a-9a61-677ae3250c0e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:25.188 197 INFO tempest.lib.common.rest_client [req-816f7b53-9e9b-47fa-a9b5-eefc8685c63c ] Request (RouterRbacTest:test_add_router_interface): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.136s 2020-12-14 02:24:25.190 197 DEBUG tempest.lib.common.rest_client [req-816f7b53-9e9b-47fa-a9b5-eefc8685c63c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-816f7b53-9e9b-47fa-a9b5-eefc8685c63c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:25.244 197 INFO tempest.lib.common.rest_client [req-6c264684-b056-452b-a3c5-ee0eadd29f61 ] Request (RouterRbacTest:test_add_router_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:24:25.247 197 DEBUG tempest.lib.common.rest_client [req-6c264684-b056-452b-a3c5-ee0eadd29f61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c264684-b056-452b-a3c5-ee0eadd29f61', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["5fv-Nuf5TbOo44cY8ppuuA"], "expires_at": "2020-12-14T03:24:25.000000Z", "issued_at": "2020-12-14T02:24:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:26.509 189 INFO tempest.lib.common.rest_client [req-6b38dcbb-6d3c-4b30-8254-b52b6f7a3a3b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.340s 2020-12-14 02:24:26.512 189 DEBUG tempest.lib.common.rest_client [req-6b38dcbb-6d3c-4b30-8254-b52b6f7a3a3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6b38dcbb-6d3c-4b30-8254-b52b6f7a3a3b', 'x-compute-request-id': 'req-6b38dcbb-6d3c-4b30-8254-b52b6f7a3a3b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:27.120 197 INFO tempest.lib.common.rest_client [req-b3fb5577-5691-46c1-adba-e3eb5333b873 ] Request (RouterRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/routers/5064736a-9d86-4c1e-a761-5736c97d099b/remove_router_interface 1.864s 2020-12-14 02:24:27.124 197 DEBUG tempest.lib.common.rest_client [req-b3fb5577-5691-46c1-adba-e3eb5333b873 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "3bc6f1dc-4db7-42db-a622-7ca8dc918921"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-b3fb5577-5691-46c1-adba-e3eb5333b873', 'date': 'Mon, 14 Dec 2020 02:24:27 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/5064736a-9d86-4c1e-a761-5736c97d099b/remove_router_interface'} Body: b'{"id": "5064736a-9d86-4c1e-a761-5736c97d099b", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "port_id": "6d24dda1-48c8-495c-bb6a-e3d181ddb714", "network_id": "bbfb5a6a-cfd8-4aac-91e7-2886f97908b8", "subnet_id": "3bc6f1dc-4db7-42db-a622-7ca8dc918921", "subnet_ids": ["3bc6f1dc-4db7-42db-a622-7ca8dc918921"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:27.139 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:27.172 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:27.175 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:27.201 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router:distributed, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:27.205 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:27.279 197 INFO tempest.lib.common.rest_client [req-f923ed79-bee5-4d97-b43f-1f2e356c09e7 ] Request (RouterRbacTest:test_create_distributed_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.066s 2020-12-14 02:24:27.281 197 DEBUG tempest.lib.common.rest_client [req-f923ed79-bee5-4d97-b43f-1f2e356c09e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f923ed79-bee5-4d97-b43f-1f2e356c09e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:27.336 197 INFO tempest.lib.common.rest_client [req-4b45424f-4f5e-453d-92fe-88f56ccbf42e ] Request (RouterRbacTest:test_create_distributed_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:24:27.340 197 DEBUG tempest.lib.common.rest_client [req-4b45424f-4f5e-453d-92fe-88f56ccbf42e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b45424f-4f5e-453d-92fe-88f56ccbf42e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["Wpp3xa4WT0CI_80bCVvYOQ"], "expires_at": "2020-12-14T03:24:27.000000Z", "issued_at": "2020-12-14T02:24:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:27.675 197 INFO tempest.lib.common.rest_client [req-415cec8d-4b6a-458c-8fac-63e6e6ca10f3 ] Request (RouterRbacTest:test_create_distributed_router): 201 POST http://172.30.13.94:9696/v2.0/routers 0.327s 2020-12-14 02:24:27.680 197 DEBUG tempest.lib.common.rest_client [req-415cec8d-4b6a-458c-8fac-63e6e6ca10f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"distributed": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '497', 'x-openstack-request-id': 'req-415cec8d-4b6a-458c-8fac-63e6e6ca10f3', 'date': 'Mon, 14 Dec 2020 02:24:27 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "46ca30cb-3a60-493f-9142-a78c984d2e15", "name": "", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": true, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:27Z", "updated_at": "2020-12-14T02:24:27Z", "revision_number": 1, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:27.683 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:27.760 197 INFO tempest.lib.common.rest_client [req-a48ab1ab-6286-4353-958d-2685e48a807d ] Request (RouterRbacTest:test_create_distributed_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.071s 2020-12-14 02:24:27.765 197 DEBUG tempest.lib.common.rest_client [req-a48ab1ab-6286-4353-958d-2685e48a807d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a48ab1ab-6286-4353-958d-2685e48a807d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:27.822 197 INFO tempest.lib.common.rest_client [req-cc5c9150-09b3-4752-b8be-d274fac161e2 ] Request (RouterRbacTest:test_create_distributed_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:24:27.825 197 DEBUG tempest.lib.common.rest_client [req-cc5c9150-09b3-4752-b8be-d274fac161e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cc5c9150-09b3-4752-b8be-d274fac161e2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["rViXl7reT5Os6whzeeaFAg"], "expires_at": "2020-12-14T03:24:27.000000Z", "issued_at": "2020-12-14T02:24:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:28.061 189 INFO tempest.lib.common.rest_client [req-849f827a-9052-487d-afb9-f43165fb406e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.441s 2020-12-14 02:24:28.063 189 DEBUG tempest.lib.common.rest_client [req-849f827a-9052-487d-afb9-f43165fb406e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-849f827a-9052-487d-afb9-f43165fb406e', 'x-compute-request-id': 'req-849f827a-9052-487d-afb9-f43165fb406e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:28.366 197 INFO tempest.lib.common.rest_client [req-894ed7d3-ec17-43b1-8bec-e9d634b4537c ] Request (RouterRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/routers/46ca30cb-3a60-493f-9142-a78c984d2e15 0.529s 2020-12-14 02:24:28.370 197 DEBUG tempest.lib.common.rest_client [req-894ed7d3-ec17-43b1-8bec-e9d634b4537c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-894ed7d3-ec17-43b1-8bec-e9d634b4537c', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:24:28 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/46ca30cb-3a60-493f-9142-a78c984d2e15'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:28.383 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:28.407 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:28.409 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:28.433 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router:ha, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:28.435 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:28.509 197 INFO tempest.lib.common.rest_client [req-f3ced1a0-88cf-470d-8ac8-eb7aedc8058e ] Request (RouterRbacTest:test_create_high_availability_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.067s 2020-12-14 02:24:28.511 197 DEBUG tempest.lib.common.rest_client [req-f3ced1a0-88cf-470d-8ac8-eb7aedc8058e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3ced1a0-88cf-470d-8ac8-eb7aedc8058e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:28.572 197 INFO tempest.lib.common.rest_client [req-9cd23281-75d2-4526-af4d-4e64cd7c25cd ] Request (RouterRbacTest:test_create_high_availability_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:24:28.575 197 DEBUG tempest.lib.common.rest_client [req-9cd23281-75d2-4526-af4d-4e64cd7c25cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9cd23281-75d2-4526-af4d-4e64cd7c25cd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["2LW4OgjZQeORa4JwtDsjrw"], "expires_at": "2020-12-14T03:24:28.000000Z", "issued_at": "2020-12-14T02:24:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:29.397 189 INFO tempest.lib.common.rest_client [req-1b707cd7-9f63-418c-8a8d-a1f3db332e94 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.222s 2020-12-14 02:24:29.400 189 DEBUG tempest.lib.common.rest_client [req-1b707cd7-9f63-418c-8a8d-a1f3db332e94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1b707cd7-9f63-418c-8a8d-a1f3db332e94', 'x-compute-request-id': 'req-1b707cd7-9f63-418c-8a8d-a1f3db332e94', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:30.763 189 INFO tempest.lib.common.rest_client [req-91673aa1-a635-4581-a5a2-1bebadc58fa0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.255s 2020-12-14 02:24:30.765 189 DEBUG tempest.lib.common.rest_client [req-91673aa1-a635-4581-a5a2-1bebadc58fa0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-91673aa1-a635-4581-a5a2-1bebadc58fa0', 'x-compute-request-id': 'req-91673aa1-a635-4581-a5a2-1bebadc58fa0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:32.078 189 INFO tempest.lib.common.rest_client [req-7d124b28-d7ea-4a9e-99d0-5af388bf0937 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.229s 2020-12-14 02:24:32.082 189 DEBUG tempest.lib.common.rest_client [req-7d124b28-d7ea-4a9e-99d0-5af388bf0937 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7d124b28-d7ea-4a9e-99d0-5af388bf0937', 'x-compute-request-id': 'req-7d124b28-d7ea-4a9e-99d0-5af388bf0937', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:33.438 189 INFO tempest.lib.common.rest_client [req-c32df3b9-1c42-4475-8764-e4b63257b539 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.239s 2020-12-14 02:24:33.441 189 DEBUG tempest.lib.common.rest_client [req-c32df3b9-1c42-4475-8764-e4b63257b539 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c32df3b9-1c42-4475-8764-e4b63257b539', 'x-compute-request-id': 'req-c32df3b9-1c42-4475-8764-e4b63257b539', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:34.792 189 INFO tempest.lib.common.rest_client [req-fb5863dd-4c88-423d-970c-cae8628c6e1c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.242s 2020-12-14 02:24:34.796 189 DEBUG tempest.lib.common.rest_client [req-fb5863dd-4c88-423d-970c-cae8628c6e1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fb5863dd-4c88-423d-970c-cae8628c6e1c', 'x-compute-request-id': 'req-fb5863dd-4c88-423d-970c-cae8628c6e1c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:35.058 197 INFO tempest.lib.common.rest_client [req-cfe58f4c-1c41-4a8c-b4f4-4145ba61fcdb ] Request (RouterRbacTest:test_create_high_availability_router): 201 POST http://172.30.13.94:9696/v2.0/routers 6.476s 2020-12-14 02:24:35.061 197 DEBUG tempest.lib.common.rest_client [req-cfe58f4c-1c41-4a8c-b4f4-4145ba61fcdb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"ha": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '497', 'x-openstack-request-id': 'req-cfe58f4c-1c41-4a8c-b4f4-4145ba61fcdb', 'date': 'Mon, 14 Dec 2020 02:24:35 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "52e91d04-ee2b-41d4-8c8e-037c56dc2ae3", "name": "", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": true, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:29Z", "updated_at": "2020-12-14T02:24:29Z", "revision_number": 2, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:35.064 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:35.144 197 INFO tempest.lib.common.rest_client [req-7c52d919-e5b7-415b-8fc4-75aad6a00d0b ] Request (RouterRbacTest:test_create_high_availability_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.074s 2020-12-14 02:24:35.147 197 DEBUG tempest.lib.common.rest_client [req-7c52d919-e5b7-415b-8fc4-75aad6a00d0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7c52d919-e5b7-415b-8fc4-75aad6a00d0b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:35.204 197 INFO tempest.lib.common.rest_client [req-739e7ee4-755d-48f4-9295-04d8fc2a4b74 ] Request (RouterRbacTest:test_create_high_availability_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:24:35.209 197 DEBUG tempest.lib.common.rest_client [req-739e7ee4-755d-48f4-9295-04d8fc2a4b74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-739e7ee4-755d-48f4-9295-04d8fc2a4b74', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["CICHQpgIQdqQ8n5qzUzWrw"], "expires_at": "2020-12-14T03:24:35.000000Z", "issued_at": "2020-12-14T02:24:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:36.135 189 INFO tempest.lib.common.rest_client [req-b5631d2c-4e71-46a7-be83-0f9d68574316 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.229s 2020-12-14 02:24:36.139 189 DEBUG tempest.lib.common.rest_client [req-b5631d2c-4e71-46a7-be83-0f9d68574316 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b5631d2c-4e71-46a7-be83-0f9d68574316', 'x-compute-request-id': 'req-b5631d2c-4e71-46a7-be83-0f9d68574316', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:37.265 197 INFO tempest.lib.common.rest_client [req-ef60871a-1742-408d-8237-ad9f380e834c ] Request (RouterRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/routers/52e91d04-ee2b-41d4-8c8e-037c56dc2ae3 2.043s 2020-12-14 02:24:37.268 197 DEBUG tempest.lib.common.rest_client [req-ef60871a-1742-408d-8237-ad9f380e834c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-ef60871a-1742-408d-8237-ad9f380e834c', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:24:37 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/52e91d04-ee2b-41d4-8c8e-037c56dc2ae3'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:37.280 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:37.303 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:37.305 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:37.384 197 INFO tempest.lib.common.rest_client [req-639949ec-85b9-4da1-8374-af9a38099810 ] Request (RouterRbacTest:test_create_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.071s 2020-12-14 02:24:37.388 197 DEBUG tempest.lib.common.rest_client [req-639949ec-85b9-4da1-8374-af9a38099810 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-639949ec-85b9-4da1-8374-af9a38099810', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:37.454 197 INFO tempest.lib.common.rest_client [req-14e7c7e0-4552-4701-b3c3-1315332bf281 ] Request (RouterRbacTest:test_create_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.058s 2020-12-14 02:24:37.458 197 DEBUG tempest.lib.common.rest_client [req-14e7c7e0-4552-4701-b3c3-1315332bf281 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14e7c7e0-4552-4701-b3c3-1315332bf281', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["KASt_XxAQ6e4FtpfpEPjlA"], "expires_at": "2020-12-14T03:24:37.000000Z", "issued_at": "2020-12-14T02:24:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:37.481 189 INFO tempest.lib.common.rest_client [req-296ac173-aaba-4cdb-9f10-d135553818f2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.230s 2020-12-14 02:24:37.484 189 DEBUG tempest.lib.common.rest_client [req-296ac173-aaba-4cdb-9f10-d135553818f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-296ac173-aaba-4cdb-9f10-d135553818f2', 'x-compute-request-id': 'req-296ac173-aaba-4cdb-9f10-d135553818f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:37.832 197 INFO tempest.lib.common.rest_client [req-414be013-4a5a-442f-9bd8-37f8ad68819f ] Request (RouterRbacTest:test_create_router): 201 POST http://172.30.13.94:9696/v2.0/routers 0.368s 2020-12-14 02:24:37.837 197 DEBUG tempest.lib.common.rest_client [req-414be013-4a5a-442f-9bd8-37f8ad68819f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {}} Response - Headers: {'content-type': 'application/json', 'content-length': '498', 'x-openstack-request-id': 'req-414be013-4a5a-442f-9bd8-37f8ad68819f', 'date': 'Mon, 14 Dec 2020 02:24:37 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "05fe35cb-50af-4e5e-a8a4-1c2ccf13a6c2", "name": "", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:37Z", "updated_at": "2020-12-14T02:24:37Z", "revision_number": 1, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:37.842 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:37.920 197 INFO tempest.lib.common.rest_client [req-c8b7d55c-aae0-4baf-9119-9e97c0792f45 ] Request (RouterRbacTest:test_create_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.071s 2020-12-14 02:24:37.923 197 DEBUG tempest.lib.common.rest_client [req-c8b7d55c-aae0-4baf-9119-9e97c0792f45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8b7d55c-aae0-4baf-9119-9e97c0792f45', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:37.979 197 INFO tempest.lib.common.rest_client [req-5fce8ea4-50b5-43f2-8cb9-df63fd0e1d29 ] Request (RouterRbacTest:test_create_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:24:37.983 197 DEBUG tempest.lib.common.rest_client [req-5fce8ea4-50b5-43f2-8cb9-df63fd0e1d29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5fce8ea4-50b5-43f2-8cb9-df63fd0e1d29', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["3RJXTB21StaM1-3AKuVncA"], "expires_at": "2020-12-14T03:24:37.000000Z", "issued_at": "2020-12-14T02:24:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:38.527 197 INFO tempest.lib.common.rest_client [req-f2fa7539-6935-479a-89dd-615b13975f26 ] Request (RouterRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/routers/05fe35cb-50af-4e5e-a8a4-1c2ccf13a6c2 0.535s 2020-12-14 02:24:38.531 197 DEBUG tempest.lib.common.rest_client [req-f2fa7539-6935-479a-89dd-615b13975f26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f2fa7539-6935-479a-89dd-615b13975f26', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:24:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/05fe35cb-50af-4e5e-a8a4-1c2ccf13a6c2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:38.543 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:38.569 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:38.572 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:38.596 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router:external_gateway_info:enable_snat, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:38.599 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:38.680 197 INFO tempest.lib.common.rest_client [req-0d29aa49-26f4-485f-b87f-5b0b39392c6d ] Request (RouterRbacTest:test_create_router_enable_snat): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.075s 2020-12-14 02:24:38.684 197 DEBUG tempest.lib.common.rest_client [req-0d29aa49-26f4-485f-b87f-5b0b39392c6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d29aa49-26f4-485f-b87f-5b0b39392c6d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:38.738 197 INFO tempest.lib.common.rest_client [req-b8a11d05-855d-42b6-b91f-5ac448624b1e ] Request (RouterRbacTest:test_create_router_enable_snat): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:24:38.742 197 DEBUG tempest.lib.common.rest_client [req-b8a11d05-855d-42b6-b91f-5ac448624b1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8a11d05-855d-42b6-b91f-5ac448624b1e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["a9kOPIQMQde5x3VFQ2ka1g"], "expires_at": "2020-12-14T03:24:38.000000Z", "issued_at": "2020-12-14T02:24:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:38.878 189 INFO tempest.lib.common.rest_client [req-53aa6c25-4403-4e47-94bf-27c43cbb4ca2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.282s 2020-12-14 02:24:38.881 189 DEBUG tempest.lib.common.rest_client [req-53aa6c25-4403-4e47-94bf-27c43cbb4ca2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-53aa6c25-4403-4e47-94bf-27c43cbb4ca2', 'x-compute-request-id': 'req-53aa6c25-4403-4e47-94bf-27c43cbb4ca2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:40.218 189 INFO tempest.lib.common.rest_client [req-e997af55-6895-41a5-821d-7f318c30f8b8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.229s 2020-12-14 02:24:40.222 189 DEBUG tempest.lib.common.rest_client [req-e997af55-6895-41a5-821d-7f318c30f8b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e997af55-6895-41a5-821d-7f318c30f8b8', 'x-compute-request-id': 'req-e997af55-6895-41a5-821d-7f318c30f8b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:40.282 197 INFO tempest.lib.common.rest_client [req-3371c1dc-6893-409a-82cf-82a72c22e054 ] Request (RouterRbacTest:test_create_router_enable_snat): 201 POST http://172.30.13.94:9696/v2.0/routers 1.531s 2020-12-14 02:24:40.286 197 DEBUG tempest.lib.common.rest_client [req-3371c1dc-6893-409a-82cf-82a72c22e054 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-RouterRbacTest-snat-router-2037975483", "external_gateway_info": {"network_id": "44f8e2c3-3949-47fe-acf1-76b06d8296b9", "enable_snat": true}}} Response - Headers: {'content-type': 'application/json', 'content-length': '724', 'x-openstack-request-id': 'req-3371c1dc-6893-409a-82cf-82a72c22e054', 'date': 'Mon, 14 Dec 2020 02:24:40 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "0c98a755-9f3f-43a0-8209-cdb29e6fe746", "name": "tempest-RouterRbacTest-snat-router-2037975483", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "44f8e2c3-3949-47fe-acf1-76b06d8296b9", "external_fixed_ips": [{"subnet_id": "baf8c094-0247-4dd9-8d1b-3a91617da6b5", "ip_address": "192.168.120.7"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:39Z", "updated_at": "2020-12-14T02:24:39Z", "revision_number": 3, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:40.289 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:40.359 197 INFO tempest.lib.common.rest_client [req-e4ea5e69-9d99-4cfb-9e72-e41ca3d384a1 ] Request (RouterRbacTest:test_create_router_enable_snat): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.065s 2020-12-14 02:24:40.362 197 DEBUG tempest.lib.common.rest_client [req-e4ea5e69-9d99-4cfb-9e72-e41ca3d384a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4ea5e69-9d99-4cfb-9e72-e41ca3d384a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:40.414 197 INFO tempest.lib.common.rest_client [req-7ae83ab1-e692-4fb7-9581-ecd754111f48 ] Request (RouterRbacTest:test_create_router_enable_snat): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:24:40.418 197 DEBUG tempest.lib.common.rest_client [req-7ae83ab1-e692-4fb7-9581-ecd754111f48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7ae83ab1-e692-4fb7-9581-ecd754111f48', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["6ftzg06nSGKlKnYNa9Nccw"], "expires_at": "2020-12-14T03:24:40.000000Z", "issued_at": "2020-12-14T02:24:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:41.560 189 INFO tempest.lib.common.rest_client [req-c50cac19-66ac-48dc-8795-e0b948bfae31 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.231s 2020-12-14 02:24:41.564 189 DEBUG tempest.lib.common.rest_client [req-c50cac19-66ac-48dc-8795-e0b948bfae31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c50cac19-66ac-48dc-8795-e0b948bfae31', 'x-compute-request-id': 'req-c50cac19-66ac-48dc-8795-e0b948bfae31', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:42.526 197 INFO tempest.lib.common.rest_client [req-b06f5392-3806-47ff-bde9-e8548db3e53c ] Request (RouterRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/routers/0c98a755-9f3f-43a0-8209-cdb29e6fe746 2.096s 2020-12-14 02:24:42.531 197 DEBUG tempest.lib.common.rest_client [req-b06f5392-3806-47ff-bde9-e8548db3e53c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-b06f5392-3806-47ff-bde9-e8548db3e53c', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:24:42 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/0c98a755-9f3f-43a0-8209-cdb29e6fe746'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:42.547 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:42.572 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:42.575 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:42.600 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_router:external_gateway_info:external_fixed_ips, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:42.697 197 INFO tempest.lib.common.rest_client [req-a73e3d9b-027f-4b01-a28b-6d76d8d8f7cd ] Request (RouterRbacTest:test_create_router_external_fixed_ips): 200 GET http://172.30.13.94:9696/v2.0/ports?network_id=44f8e2c3-3949-47fe-acf1-76b06d8296b9 0.090s 2020-12-14 02:24:42.701 197 DEBUG tempest.lib.common.rest_client [req-a73e3d9b-027f-4b01-a28b-6d76d8d8f7cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1229', 'x-openstack-request-id': 'req-a73e3d9b-027f-4b01-a28b-6d76d8d8f7cd', 'date': 'Mon, 14 Dec 2020 02:24:42 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?network_id=44f8e2c3-3949-47fe-acf1-76b06d8296b9'} Body: b'{"ports":[{"id":"5706a21c-4d84-4dc7-9726-7c412874cf8c","name":"","network_id":"44f8e2c3-3949-47fe-acf1-76b06d8296b9","tenant_id":"ac4c492395da44859cb68eea226ed5a1","mac_address":"fa:16:3e:c7:d0:90","admin_state_up":true,"status":"ACTIVE","device_id":"dhcpcf0aa1ad-fc1e-58c4-863b-aba14f17f098-44f8e2c3-3949-47fe-acf1-76b06d8296b9","device_owner":"network:dhcp","fixed_ips":[{"subnet_id":"baf8c094-0247-4dd9-8d1b-3a91617da6b5","ip_address":"192.168.120.2"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":[],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"lf-virtual9","binding:vif_type":"ovs","binding:vif_details":{"connectivity":"l2","port_filter":true,"ovs_hybrid_plug":false,"datapath_type":"system","bridge_name":"br-int"},"port_security_enabled":false,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.2","hostname":"host-192-168-120-2","fqdn":"host-192-168-120-2.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:24:21Z","updated_at":"2020-12-14T02:24:28Z","revision_number":3,"project_id":"ac4c492395da44859cb68eea226ed5a1"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:42.814 197 INFO tempest.lib.common.rest_client [req-a5d3caef-01c0-4a5b-b08f-118e09bc0355 ] Request (RouterRbacTest:test_create_router_external_fixed_ips): 200 GET http://172.30.13.94:9696/v2.0/subnets/baf8c094-0247-4dd9-8d1b-3a91617da6b5 0.105s 2020-12-14 02:24:42.818 197 DEBUG tempest.lib.common.rest_client [req-a5d3caef-01c0-4a5b-b08f-118e09bc0355 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '661', 'x-openstack-request-id': 'req-a5d3caef-01c0-4a5b-b08f-118e09bc0355', 'date': 'Mon, 14 Dec 2020 02:24:42 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/baf8c094-0247-4dd9-8d1b-3a91617da6b5'} Body: b'{"subnet":{"id":"baf8c094-0247-4dd9-8d1b-3a91617da6b5","name":"","tenant_id":"ac4c492395da44859cb68eea226ed5a1","network_id":"44f8e2c3-3949-47fe-acf1-76b06d8296b9","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:24:20Z","updated_at":"2020-12-14T02:24:20Z","revision_number":0,"project_id":"ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:42.849 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:42.883 189 INFO tempest.lib.common.rest_client [req-e0842308-151d-49e5-a261-759514251f6c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.206s 2020-12-14 02:24:42.885 189 DEBUG tempest.lib.common.rest_client [req-e0842308-151d-49e5-a261-759514251f6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e0842308-151d-49e5-a261-759514251f6c', 'x-compute-request-id': 'req-e0842308-151d-49e5-a261-759514251f6c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:42.914 197 INFO tempest.lib.common.rest_client [req-a39c84a5-2258-4ca5-b9b8-b26467ca9cdc ] Request (RouterRbacTest:test_create_router_external_fixed_ips): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.059s 2020-12-14 02:24:42.917 197 DEBUG tempest.lib.common.rest_client [req-a39c84a5-2258-4ca5-b9b8-b26467ca9cdc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a39c84a5-2258-4ca5-b9b8-b26467ca9cdc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:42.971 197 INFO tempest.lib.common.rest_client [req-ac7b0e7a-b19b-4c0f-b33c-95a9fc7a2f63 ] Request (RouterRbacTest:test_create_router_external_fixed_ips): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:24:42.974 197 DEBUG tempest.lib.common.rest_client [req-ac7b0e7a-b19b-4c0f-b33c-95a9fc7a2f63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac7b0e7a-b19b-4c0f-b33c-95a9fc7a2f63', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["MnWIQN_LSQOnDCnRNwvenA"], "expires_at": "2020-12-14T03:24:42.000000Z", "issued_at": "2020-12-14T02:24:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:44.231 189 INFO tempest.lib.common.rest_client [req-edbd1f01-dc97-4a31-89bc-b43d84211361 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.238s 2020-12-14 02:24:44.234 189 DEBUG tempest.lib.common.rest_client [req-edbd1f01-dc97-4a31-89bc-b43d84211361 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-edbd1f01-dc97-4a31-89bc-b43d84211361', 'x-compute-request-id': 'req-edbd1f01-dc97-4a31-89bc-b43d84211361', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:44.652 197 INFO tempest.lib.common.rest_client [req-94ab6572-94bf-4829-95f6-b21ebc0b2cdb ] Request (RouterRbacTest:test_create_router_external_fixed_ips): 201 POST http://172.30.13.94:9696/v2.0/routers 1.670s 2020-12-14 02:24:44.657 197 DEBUG tempest.lib.common.rest_client [req-94ab6572-94bf-4829-95f6-b21ebc0b2cdb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-RouterRbacTest-snat-router-2014768057", "external_gateway_info": {"network_id": "44f8e2c3-3949-47fe-acf1-76b06d8296b9", "enable_snat": false, "external_fixed_ips": [{"subnet_id": "baf8c094-0247-4dd9-8d1b-3a91617da6b5", "ip_address": "192.168.120.14"}]}}} Response - Headers: {'content-type': 'application/json', 'content-length': '726', 'x-openstack-request-id': 'req-94ab6572-94bf-4829-95f6-b21ebc0b2cdb', 'date': 'Mon, 14 Dec 2020 02:24:44 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "2e52ef83-eefb-46f8-b3b4-350fff1a99ea", "name": "tempest-RouterRbacTest-snat-router-2014768057", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "44f8e2c3-3949-47fe-acf1-76b06d8296b9", "external_fixed_ips": [{"subnet_id": "baf8c094-0247-4dd9-8d1b-3a91617da6b5", "ip_address": "192.168.120.14"}], "enable_snat": false}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:43Z", "updated_at": "2020-12-14T02:24:44Z", "revision_number": 3, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:44.660 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:44.740 197 INFO tempest.lib.common.rest_client [req-7f4969af-0b12-439a-81d2-965eaaa17376 ] Request (RouterRbacTest:test_create_router_external_fixed_ips): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.074s 2020-12-14 02:24:44.744 197 DEBUG tempest.lib.common.rest_client [req-7f4969af-0b12-439a-81d2-965eaaa17376 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f4969af-0b12-439a-81d2-965eaaa17376', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:44.797 197 INFO tempest.lib.common.rest_client [req-0c46199e-bb87-4bd0-b84f-f4abda6144eb ] Request (RouterRbacTest:test_create_router_external_fixed_ips): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:24:44.801 197 DEBUG tempest.lib.common.rest_client [req-0c46199e-bb87-4bd0-b84f-f4abda6144eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c46199e-bb87-4bd0-b84f-f4abda6144eb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["U6T2SZgPSISvt2YrpRfMyQ"], "expires_at": "2020-12-14T03:24:44.000000Z", "issued_at": "2020-12-14T02:24:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:45.545 189 INFO tempest.lib.common.rest_client [req-4e575f1c-ec27-4d42-814f-2bf5686285cb ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.205s 2020-12-14 02:24:45.548 189 DEBUG tempest.lib.common.rest_client [req-4e575f1c-ec27-4d42-814f-2bf5686285cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4e575f1c-ec27-4d42-814f-2bf5686285cb', 'x-compute-request-id': 'req-4e575f1c-ec27-4d42-814f-2bf5686285cb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:46.700 197 INFO tempest.lib.common.rest_client [req-db56847f-2679-4be6-9e4a-2dc6f4b7f786 ] Request (RouterRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/routers/2e52ef83-eefb-46f8-b3b4-350fff1a99ea 1.888s 2020-12-14 02:24:46.704 197 DEBUG tempest.lib.common.rest_client [req-db56847f-2679-4be6-9e4a-2dc6f4b7f786 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-db56847f-2679-4be6-9e4a-2dc6f4b7f786', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:24:46 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/2e52ef83-eefb-46f8-b3b4-350fff1a99ea'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:46.716 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:46.740 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:46.742 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:46.766 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:46.886 189 INFO tempest.lib.common.rest_client [req-0d506464-4ab2-4000-9f91-59d60e01b6e2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.232s 2020-12-14 02:24:46.889 189 DEBUG tempest.lib.common.rest_client [req-0d506464-4ab2-4000-9f91-59d60e01b6e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0d506464-4ab2-4000-9f91-59d60e01b6e2', 'x-compute-request-id': 'req-0d506464-4ab2-4000-9f91-59d60e01b6e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:47.005 197 INFO tempest.lib.common.rest_client [req-cbba37ab-e16e-48a3-a2fc-a9bb6fdd4d88 ] Request (RouterRbacTest:test_delete_router): 201 POST http://172.30.13.94:9696/v2.0/routers 0.234s 2020-12-14 02:24:47.008 197 DEBUG tempest.lib.common.rest_client [req-cbba37ab-e16e-48a3-a2fc-a9bb6fdd4d88 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-RouterRbacTest-router-1256283404", "external_gateway_info": {}, "admin_state_up": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '539', 'x-openstack-request-id': 'req-cbba37ab-e16e-48a3-a2fc-a9bb6fdd4d88', 'date': 'Mon, 14 Dec 2020 02:24:46 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "49ef3c27-7ca0-45f3-b6ce-9f30c0361932", "name": "tempest-RouterRbacTest-router-1256283404", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:46Z", "updated_at": "2020-12-14T02:24:46Z", "revision_number": 1, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:47.011 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:47.082 197 INFO tempest.lib.common.rest_client [req-8ee35ba1-4d5f-450e-aab8-c41055137b67 ] Request (RouterRbacTest:test_delete_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.061s 2020-12-14 02:24:47.085 197 DEBUG tempest.lib.common.rest_client [req-8ee35ba1-4d5f-450e-aab8-c41055137b67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ee35ba1-4d5f-450e-aab8-c41055137b67', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:47.139 197 INFO tempest.lib.common.rest_client [req-e6401561-bf10-49df-bd6c-2861b05098d9 ] Request (RouterRbacTest:test_delete_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:24:47.142 197 DEBUG tempest.lib.common.rest_client [req-e6401561-bf10-49df-bd6c-2861b05098d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6401561-bf10-49df-bd6c-2861b05098d9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["rb5nic87QuKiHpjRU3vTgw"], "expires_at": "2020-12-14T03:24:47.000000Z", "issued_at": "2020-12-14T02:24:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:48.244 189 INFO tempest.lib.common.rest_client [req-8731a0ae-dc75-43df-a33c-170619eac32d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.248s 2020-12-14 02:24:48.247 189 DEBUG tempest.lib.common.rest_client [req-8731a0ae-dc75-43df-a33c-170619eac32d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8731a0ae-dc75-43df-a33c-170619eac32d', 'x-compute-request-id': 'req-8731a0ae-dc75-43df-a33c-170619eac32d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:49.597 189 INFO tempest.lib.common.rest_client [req-8b6e44f7-4ab4-4b7e-b4b4-f69b2f379e3e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.243s 2020-12-14 02:24:49.600 189 DEBUG tempest.lib.common.rest_client [req-8b6e44f7-4ab4-4b7e-b4b4-f69b2f379e3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8b6e44f7-4ab4-4b7e-b4b4-f69b2f379e3e', 'x-compute-request-id': 'req-8b6e44f7-4ab4-4b7e-b4b4-f69b2f379e3e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:50.967 189 INFO tempest.lib.common.rest_client [req-41a73b67-e360-4e33-8abf-2f2aaccb694e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.258s 2020-12-14 02:24:50.970 189 DEBUG tempest.lib.common.rest_client [req-41a73b67-e360-4e33-8abf-2f2aaccb694e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-41a73b67-e360-4e33-8abf-2f2aaccb694e', 'x-compute-request-id': 'req-41a73b67-e360-4e33-8abf-2f2aaccb694e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:51.592 197 INFO tempest.lib.common.rest_client [req-49fc30cb-0e54-4f4f-87b4-7c586dc058f0 ] Request (RouterRbacTest:test_delete_router): 204 DELETE http://172.30.13.94:9696/v2.0/routers/49ef3c27-7ca0-45f3-b6ce-9f30c0361932 4.442s 2020-12-14 02:24:51.595 197 DEBUG tempest.lib.common.rest_client [req-49fc30cb-0e54-4f4f-87b4-7c586dc058f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-49fc30cb-0e54-4f4f-87b4-7c586dc058f0', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:24:51 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/49ef3c27-7ca0-45f3-b6ce-9f30c0361932'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:51.598 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:51.687 197 INFO tempest.lib.common.rest_client [req-ea339054-40a7-481f-8bee-4c4591cf2890 ] Request (RouterRbacTest:test_delete_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.082s 2020-12-14 02:24:51.691 197 DEBUG tempest.lib.common.rest_client [req-ea339054-40a7-481f-8bee-4c4591cf2890 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea339054-40a7-481f-8bee-4c4591cf2890', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:51.745 197 INFO tempest.lib.common.rest_client [req-980292bd-c0e3-43c2-9b02-b8da54411f6c ] Request (RouterRbacTest:test_delete_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:24:51.749 197 DEBUG tempest.lib.common.rest_client [req-980292bd-c0e3-43c2-9b02-b8da54411f6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-980292bd-c0e3-43c2-9b02-b8da54411f6c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["VHaUvACdT5Oh6e47ZNOyJA"], "expires_at": "2020-12-14T03:24:51.000000Z", "issued_at": "2020-12-14T02:24:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:51.762 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:51.787 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:51.789 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:51.854 197 INFO tempest.lib.common.rest_client [req-9cf61ce9-ed0d-46ba-afed-63311508c9f8 ] Request (RouterRbacTest:test_list_routers): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.057s 2020-12-14 02:24:51.857 197 DEBUG tempest.lib.common.rest_client [req-9cf61ce9-ed0d-46ba-afed-63311508c9f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9cf61ce9-ed0d-46ba-afed-63311508c9f8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:51.916 197 INFO tempest.lib.common.rest_client [req-32840a5c-85c4-4f8e-9b8b-8dfd04551d4a ] Request (RouterRbacTest:test_list_routers): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:24:51.919 197 DEBUG tempest.lib.common.rest_client [req-32840a5c-85c4-4f8e-9b8b-8dfd04551d4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32840a5c-85c4-4f8e-9b8b-8dfd04551d4a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["W7Ltelj1Tdu_tEy_0chmlQ"], "expires_at": "2020-12-14T03:24:51.000000Z", "issued_at": "2020-12-14T02:24:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:52.104 197 INFO tempest.lib.common.rest_client [req-83135015-7151-4d39-82c6-42b4a781ae4b ] Request (RouterRbacTest:test_list_routers): 200 GET http://172.30.13.94:9696/v2.0/routers?id=8ad96c55-7b62-4106-ab4d-4aa043bc0c65 0.177s 2020-12-14 02:24:52.107 197 DEBUG tempest.lib.common.rest_client [req-83135015-7151-4d39-82c6-42b4a781ae4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '542', 'x-openstack-request-id': 'req-83135015-7151-4d39-82c6-42b4a781ae4b', 'date': 'Mon, 14 Dec 2020 02:24:52 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers?id=8ad96c55-7b62-4106-ab4d-4aa043bc0c65'} Body: b'{"routers": [{"id": "8ad96c55-7b62-4106-ab4d-4aa043bc0c65", "name": "tempest-RouterRbacTest-router-1228043555", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:21Z", "updated_at": "2020-12-14T02:24:21Z", "revision_number": 1, "project_id": "ac4c492395da44859cb68eea226ed5a1"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:52.111 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:52.185 197 INFO tempest.lib.common.rest_client [req-a4430a40-3772-4d57-a70c-3f4d597abc35 ] Request (RouterRbacTest:test_list_routers): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.068s 2020-12-14 02:24:52.188 197 DEBUG tempest.lib.common.rest_client [req-a4430a40-3772-4d57-a70c-3f4d597abc35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a4430a40-3772-4d57-a70c-3f4d597abc35', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:52.247 197 INFO tempest.lib.common.rest_client [req-88a2452a-81d1-4e05-8add-771b60c2be6e ] Request (RouterRbacTest:test_list_routers): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:24:52.251 197 DEBUG tempest.lib.common.rest_client [req-88a2452a-81d1-4e05-8add-771b60c2be6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88a2452a-81d1-4e05-8add-771b60c2be6e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["ZDSf6PFVTIyQP8c54vD_Tg"], "expires_at": "2020-12-14T03:24:52.000000Z", "issued_at": "2020-12-14T02:24:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:52.265 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:52.290 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:52.292 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:52.318 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: remove_router_interface, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:52.362 189 INFO tempest.lib.common.rest_client [req-9568268c-31b6-4711-bbed-2ce057f429b8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.283s 2020-12-14 02:24:52.366 189 DEBUG tempest.lib.common.rest_client [req-9568268c-31b6-4711-bbed-2ce057f429b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9568268c-31b6-4711-bbed-2ce057f429b8', 'x-compute-request-id': 'req-9568268c-31b6-4711-bbed-2ce057f429b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:52.768 197 INFO tempest.lib.common.rest_client [req-2c783256-ca4e-4928-b399-d863ca382a61 ] Request (RouterRbacTest:test_remove_router_interface): 201 POST http://172.30.13.94:9696/v2.0/networks 0.439s 2020-12-14 02:24:52.771 197 DEBUG tempest.lib.common.rest_client [req-2c783256-ca4e-4928-b399-d863ca382a61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-RouterRbacTest-test-network-121477975"}} Response - Headers: {'content-type': 'application/json', 'content-length': '734', 'x-openstack-request-id': 'req-2c783256-ca4e-4928-b399-d863ca382a61', 'date': 'Mon, 14 Dec 2020 02:24:52 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"1c86962a-daba-420b-9ac7-dd4b82c6e86e","name":"tempest-RouterRbacTest-test-network-121477975","tenant_id":"ac4c492395da44859cb68eea226ed5a1","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"ac4c492395da44859cb68eea226ed5a1","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":69,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:24:52Z","updated_at":"2020-12-14T02:24:52Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:53.538 197 INFO tempest.lib.common.rest_client [req-e5b579c8-6ec9-46aa-a658-5ff9aa5bee50 ] Request (RouterRbacTest:test_remove_router_interface): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.759s 2020-12-14 02:24:53.541 197 DEBUG tempest.lib.common.rest_client [req-e5b579c8-6ec9-46aa-a658-5ff9aa5bee50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "1c86962a-daba-420b-9ac7-dd4b82c6e86e", "cidr": "192.168.120.0/28", "ip_version": 4, "gateway_ip": "192.168.120.1"}} Response - Headers: {'content-type': 'application/json', 'content-length': '661', 'x-openstack-request-id': 'req-e5b579c8-6ec9-46aa-a658-5ff9aa5bee50', 'date': 'Mon, 14 Dec 2020 02:24:53 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"1401546c-2808-45ae-97e7-e01f8c687817","name":"","tenant_id":"ac4c492395da44859cb68eea226ed5a1","network_id":"1c86962a-daba-420b-9ac7-dd4b82c6e86e","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:24:53Z","updated_at":"2020-12-14T02:24:53Z","revision_number":0,"project_id":"ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:53.763 189 INFO tempest.lib.common.rest_client [req-fc0e3f41-4930-43a5-9b73-2bc6caf0cd5d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.287s 2020-12-14 02:24:53.767 189 DEBUG tempest.lib.common.rest_client [req-fc0e3f41-4930-43a5-9b73-2bc6caf0cd5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fc0e3f41-4930-43a5-9b73-2bc6caf0cd5d', 'x-compute-request-id': 'req-fc0e3f41-4930-43a5-9b73-2bc6caf0cd5d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:53.807 197 INFO tempest.lib.common.rest_client [req-a8688c38-3573-4522-9770-bfe54d72d463 ] Request (RouterRbacTest:test_remove_router_interface): 201 POST http://172.30.13.94:9696/v2.0/routers 0.259s 2020-12-14 02:24:53.812 197 DEBUG tempest.lib.common.rest_client [req-a8688c38-3573-4522-9770-bfe54d72d463 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-RouterRbacTest-router-745467885", "external_gateway_info": {}, "admin_state_up": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '538', 'x-openstack-request-id': 'req-a8688c38-3573-4522-9770-bfe54d72d463', 'date': 'Mon, 14 Dec 2020 02:24:53 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "58bc3b05-afb1-49eb-89ac-64dd54b4fe8c", "name": "tempest-RouterRbacTest-router-745467885", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:53Z", "updated_at": "2020-12-14T02:24:53Z", "revision_number": 1, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:55.123 189 INFO tempest.lib.common.rest_client [req-468e6fe5-8738-4ab9-8b53-8b523989fa9c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.234s 2020-12-14 02:24:55.128 189 DEBUG tempest.lib.common.rest_client [req-468e6fe5-8738-4ab9-8b53-8b523989fa9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-468e6fe5-8738-4ab9-8b53-8b523989fa9c', 'x-compute-request-id': 'req-468e6fe5-8738-4ab9-8b53-8b523989fa9c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:55.758 197 INFO tempest.lib.common.rest_client [req-973ed971-ade9-4f88-9a99-c0597f37438e ] Request (RouterRbacTest:test_remove_router_interface): 200 PUT http://172.30.13.94:9696/v2.0/routers/58bc3b05-afb1-49eb-89ac-64dd54b4fe8c/add_router_interface 1.939s 2020-12-14 02:24:55.760 197 DEBUG tempest.lib.common.rest_client [req-973ed971-ade9-4f88-9a99-c0597f37438e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "1401546c-2808-45ae-97e7-e01f8c687817"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-973ed971-ade9-4f88-9a99-c0597f37438e', 'date': 'Mon, 14 Dec 2020 02:24:55 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/58bc3b05-afb1-49eb-89ac-64dd54b4fe8c/add_router_interface'} Body: b'{"id": "58bc3b05-afb1-49eb-89ac-64dd54b4fe8c", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "port_id": "c89ef2c4-4c41-4778-bd9d-7a50469e6163", "network_id": "1c86962a-daba-420b-9ac7-dd4b82c6e86e", "subnet_id": "1401546c-2808-45ae-97e7-e01f8c687817", "subnet_ids": ["1401546c-2808-45ae-97e7-e01f8c687817"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:55.763 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:55.834 197 INFO tempest.lib.common.rest_client [req-b18fac74-25ee-4f32-ba75-85e1689d25d6 ] Request (RouterRbacTest:test_remove_router_interface): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.064s 2020-12-14 02:24:55.837 197 DEBUG tempest.lib.common.rest_client [req-b18fac74-25ee-4f32-ba75-85e1689d25d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b18fac74-25ee-4f32-ba75-85e1689d25d6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:55.892 197 INFO tempest.lib.common.rest_client [req-f6be414a-e46c-4832-995e-2e72672c2d9f ] Request (RouterRbacTest:test_remove_router_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:24:55.896 197 DEBUG tempest.lib.common.rest_client [req-f6be414a-e46c-4832-995e-2e72672c2d9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6be414a-e46c-4832-995e-2e72672c2d9f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["gA1cElo6Rsaa3zi1c68jJw"], "expires_at": "2020-12-14T03:24:55.000000Z", "issued_at": "2020-12-14T02:24:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:56.466 189 INFO tempest.lib.common.rest_client [req-78987c23-0a6b-49e5-9b29-6910715c24dd ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.229s 2020-12-14 02:24:56.469 189 DEBUG tempest.lib.common.rest_client [req-78987c23-0a6b-49e5-9b29-6910715c24dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-78987c23-0a6b-49e5-9b29-6910715c24dd', 'x-compute-request-id': 'req-78987c23-0a6b-49e5-9b29-6910715c24dd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:57.708 197 INFO tempest.lib.common.rest_client [req-ca94468c-86ff-4671-b622-cc4c7a7cc57e ] Request (RouterRbacTest:test_remove_router_interface): 200 PUT http://172.30.13.94:9696/v2.0/routers/58bc3b05-afb1-49eb-89ac-64dd54b4fe8c/remove_router_interface 1.804s 2020-12-14 02:24:57.714 197 DEBUG tempest.lib.common.rest_client [req-ca94468c-86ff-4671-b622-cc4c7a7cc57e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "1401546c-2808-45ae-97e7-e01f8c687817"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-ca94468c-86ff-4671-b622-cc4c7a7cc57e', 'date': 'Mon, 14 Dec 2020 02:24:57 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/58bc3b05-afb1-49eb-89ac-64dd54b4fe8c/remove_router_interface'} Body: b'{"id": "58bc3b05-afb1-49eb-89ac-64dd54b4fe8c", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "port_id": "c89ef2c4-4c41-4778-bd9d-7a50469e6163", "network_id": "1c86962a-daba-420b-9ac7-dd4b82c6e86e", "subnet_id": "1401546c-2808-45ae-97e7-e01f8c687817", "subnet_ids": ["1401546c-2808-45ae-97e7-e01f8c687817"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:57.719 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:57.790 189 INFO tempest.lib.common.rest_client [req-a9d5cc77-a594-4f67-be18-adda92d85705 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.212s 2020-12-14 02:24:57.793 189 DEBUG tempest.lib.common.rest_client [req-a9d5cc77-a594-4f67-be18-adda92d85705 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a9d5cc77-a594-4f67-be18-adda92d85705', 'x-compute-request-id': 'req-a9d5cc77-a594-4f67-be18-adda92d85705', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:57.793 197 INFO tempest.lib.common.rest_client [req-3c1c1ff4-5c64-43e6-bded-d01a4ed9c49f ] Request (RouterRbacTest:test_remove_router_interface): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.065s 2020-12-14 02:24:57.797 197 DEBUG tempest.lib.common.rest_client [req-3c1c1ff4-5c64-43e6-bded-d01a4ed9c49f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c1c1ff4-5c64-43e6-bded-d01a4ed9c49f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:57.847 197 INFO tempest.lib.common.rest_client [req-512c2118-8b98-47c5-96a6-f03c5b40d56b ] Request (RouterRbacTest:test_remove_router_interface): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:24:57.850 197 DEBUG tempest.lib.common.rest_client [req-512c2118-8b98-47c5-96a6-f03c5b40d56b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-512c2118-8b98-47c5-96a6-f03c5b40d56b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["9FDhvq9zS9i7ecj2juS2-Q"], "expires_at": "2020-12-14T03:24:57.000000Z", "issued_at": "2020-12-14T02:24:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:58.466 197 INFO tempest.lib.common.rest_client [req-43e3b310-1898-4aef-b5db-f792456bbbe9 ] Request (RouterRbacTest:_run_cleanups): 404 PUT http://172.30.13.94:9696/v2.0/routers/58bc3b05-afb1-49eb-89ac-64dd54b4fe8c/remove_router_interface 0.608s 2020-12-14 02:24:58.470 197 DEBUG tempest.lib.common.rest_client [req-43e3b310-1898-4aef-b5db-f792456bbbe9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "1401546c-2808-45ae-97e7-e01f8c687817"} Response - Headers: {'content-type': 'application/json', 'content-length': '198', 'x-openstack-request-id': 'req-43e3b310-1898-4aef-b5db-f792456bbbe9', 'date': 'Mon, 14 Dec 2020 02:24:58 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/58bc3b05-afb1-49eb-89ac-64dd54b4fe8c/remove_router_interface'} Body: b'{"NeutronError": {"type": "RouterInterfaceNotFoundForSubnet", "message": "Router 58bc3b05-afb1-49eb-89ac-64dd54b4fe8c has no interface on subnet 1401546c-2808-45ae-97e7-e01f8c687817", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:58.484 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:58.510 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:58.513 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:24:58.537 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router:distributed, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:24:58.754 197 INFO tempest.lib.common.rest_client [req-3127c460-4bd0-4cda-ba4e-5f7b20a56b63 ] Request (RouterRbacTest:test_show_distributed_router): 201 POST http://172.30.13.94:9696/v2.0/routers 0.210s 2020-12-14 02:24:58.758 197 DEBUG tempest.lib.common.rest_client [req-3127c460-4bd0-4cda-ba4e-5f7b20a56b63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"distributed": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '497', 'x-openstack-request-id': 'req-3127c460-4bd0-4cda-ba4e-5f7b20a56b63', 'date': 'Mon, 14 Dec 2020 02:24:58 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "46d54681-02ea-4a5e-baef-870d3ba19fde", "name": "", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": true, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:58Z", "updated_at": "2020-12-14T02:24:58Z", "revision_number": 1, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:58.763 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:58.831 197 INFO tempest.lib.common.rest_client [req-7d547e50-e814-4a10-b735-4257e6dc375e ] Request (RouterRbacTest:test_show_distributed_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.062s 2020-12-14 02:24:58.833 197 DEBUG tempest.lib.common.rest_client [req-7d547e50-e814-4a10-b735-4257e6dc375e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d547e50-e814-4a10-b735-4257e6dc375e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:58.883 197 INFO tempest.lib.common.rest_client [req-2dd95a39-cc9a-4728-908c-21fcce5bff6d ] Request (RouterRbacTest:test_show_distributed_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:24:58.886 197 DEBUG tempest.lib.common.rest_client [req-2dd95a39-cc9a-4728-908c-21fcce5bff6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2dd95a39-cc9a-4728-908c-21fcce5bff6d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["X7AXmkfiQOKdDj7BxZyZ4A"], "expires_at": "2020-12-14T03:24:58.000000Z", "issued_at": "2020-12-14T02:24:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:59.078 197 INFO tempest.lib.common.rest_client [req-44aa04e9-955f-4ae5-8be0-489d1b890495 ] Request (RouterRbacTest:test_show_distributed_router): 200 GET http://172.30.13.94:9696/v2.0/routers/46d54681-02ea-4a5e-baef-870d3ba19fde?fields=distributed 0.184s 2020-12-14 02:24:59.082 197 DEBUG tempest.lib.common.rest_client [req-44aa04e9-955f-4ae5-8be0-489d1b890495 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '33', 'x-openstack-request-id': 'req-44aa04e9-955f-4ae5-8be0-489d1b890495', 'date': 'Mon, 14 Dec 2020 02:24:59 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/46d54681-02ea-4a5e-baef-870d3ba19fde?fields=distributed'} Body: b'{"router": {"distributed": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:59.086 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:24:59.158 197 INFO tempest.lib.common.rest_client [req-69bfaea7-8230-4cba-97f2-cbdcb3f629cc ] Request (RouterRbacTest:test_show_distributed_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.066s 2020-12-14 02:24:59.162 197 DEBUG tempest.lib.common.rest_client [req-69bfaea7-8230-4cba-97f2-cbdcb3f629cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69bfaea7-8230-4cba-97f2-cbdcb3f629cc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:59.170 189 INFO tempest.lib.common.rest_client [req-5d5a78c2-a0c6-4801-b2f8-cafdab3baefa ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.268s 2020-12-14 02:24:59.173 189 DEBUG tempest.lib.common.rest_client [req-5d5a78c2-a0c6-4801-b2f8-cafdab3baefa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5d5a78c2-a0c6-4801-b2f8-cafdab3baefa', 'x-compute-request-id': 'req-5d5a78c2-a0c6-4801-b2f8-cafdab3baefa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:24:59.213 197 INFO tempest.lib.common.rest_client [req-892fc2c3-4abe-4e5f-908a-959597394b42 ] Request (RouterRbacTest:test_show_distributed_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:24:59.216 197 DEBUG tempest.lib.common.rest_client [req-892fc2c3-4abe-4e5f-908a-959597394b42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:24:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-892fc2c3-4abe-4e5f-908a-959597394b42', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["qJ4jAnX2SYKrcQv1wo71rw"], "expires_at": "2020-12-14T03:24:59.000000Z", "issued_at": "2020-12-14T02:24:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:00.667 189 INFO tempest.lib.common.rest_client [req-82154f60-48ba-4f77-8baf-d1eb37d202a7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.383s 2020-12-14 02:25:00.670 189 DEBUG tempest.lib.common.rest_client [req-82154f60-48ba-4f77-8baf-d1eb37d202a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-82154f60-48ba-4f77-8baf-d1eb37d202a7', 'x-compute-request-id': 'req-82154f60-48ba-4f77-8baf-d1eb37d202a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:02.017 189 INFO tempest.lib.common.rest_client [req-da9fc759-b2b4-4498-b0fa-294df9eb24ca ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.240s 2020-12-14 02:25:02.019 189 DEBUG tempest.lib.common.rest_client [req-da9fc759-b2b4-4498-b0fa-294df9eb24ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-da9fc759-b2b4-4498-b0fa-294df9eb24ca', 'x-compute-request-id': 'req-da9fc759-b2b4-4498-b0fa-294df9eb24ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:03.353 189 INFO tempest.lib.common.rest_client [req-c41afa85-84a9-47f6-81f7-38622d441a88 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.226s 2020-12-14 02:25:03.357 189 DEBUG tempest.lib.common.rest_client [req-c41afa85-84a9-47f6-81f7-38622d441a88 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c41afa85-84a9-47f6-81f7-38622d441a88', 'x-compute-request-id': 'req-c41afa85-84a9-47f6-81f7-38622d441a88', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:03.792 197 INFO tempest.lib.common.rest_client [req-bfa5d92b-7e2a-45e6-8160-660ff250f457 ] Request (RouterRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/routers/46d54681-02ea-4a5e-baef-870d3ba19fde 4.566s 2020-12-14 02:25:03.797 197 DEBUG tempest.lib.common.rest_client [req-bfa5d92b-7e2a-45e6-8160-660ff250f457 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-bfa5d92b-7e2a-45e6-8160-660ff250f457', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:25:03 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/46d54681-02ea-4a5e-baef-870d3ba19fde'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:03.808 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:03.831 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:03.834 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:03.856 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router:ha, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:04.732 189 INFO tempest.lib.common.rest_client [req-0d1bf9ae-e15b-4ff7-88a5-b793a1763f15 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.264s 2020-12-14 02:25:04.735 189 DEBUG tempest.lib.common.rest_client [req-0d1bf9ae-e15b-4ff7-88a5-b793a1763f15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0d1bf9ae-e15b-4ff7-88a5-b793a1763f15', 'x-compute-request-id': 'req-0d1bf9ae-e15b-4ff7-88a5-b793a1763f15', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:05.867 197 INFO tempest.lib.common.rest_client [req-710a347e-e152-4c5d-b31b-7ff1a99d2f23 ] Request (RouterRbacTest:test_show_high_availability_router): 201 POST http://172.30.13.94:9696/v2.0/routers 2.005s 2020-12-14 02:25:05.871 197 DEBUG tempest.lib.common.rest_client [req-710a347e-e152-4c5d-b31b-7ff1a99d2f23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"ha": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '497', 'x-openstack-request-id': 'req-710a347e-e152-4c5d-b31b-7ff1a99d2f23', 'date': 'Mon, 14 Dec 2020 02:25:05 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "47027384-0f3d-4dc3-8411-5b0e42a83355", "name": "", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": true, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:25:04Z", "updated_at": "2020-12-14T02:25:04Z", "revision_number": 2, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:05.874 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:05.952 197 INFO tempest.lib.common.rest_client [req-9210d311-52e7-4103-bcfe-b963b21aa09c ] Request (RouterRbacTest:test_show_high_availability_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.072s 2020-12-14 02:25:05.956 197 DEBUG tempest.lib.common.rest_client [req-9210d311-52e7-4103-bcfe-b963b21aa09c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9210d311-52e7-4103-bcfe-b963b21aa09c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:06.006 197 INFO tempest.lib.common.rest_client [req-911ce5f5-2037-48b8-b6a2-4fd844c088e5 ] Request (RouterRbacTest:test_show_high_availability_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:25:06.008 197 DEBUG tempest.lib.common.rest_client [req-911ce5f5-2037-48b8-b6a2-4fd844c088e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-911ce5f5-2037-48b8-b6a2-4fd844c088e5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["G982zkELRzOTWDNFHGOeFg"], "expires_at": "2020-12-14T03:25:05.000000Z", "issued_at": "2020-12-14T02:25:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:06.083 189 INFO tempest.lib.common.rest_client [req-a5295208-9c38-4416-a372-f633568a6941 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.249s 2020-12-14 02:25:06.087 189 DEBUG tempest.lib.common.rest_client [req-a5295208-9c38-4416-a372-f633568a6941 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a5295208-9c38-4416-a372-f633568a6941', 'x-compute-request-id': 'req-a5295208-9c38-4416-a372-f633568a6941', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:06.267 197 INFO tempest.lib.common.rest_client [req-b8d24b6f-ca46-413f-9c25-979f03e1bddf ] Request (RouterRbacTest:test_show_high_availability_router): 200 GET http://172.30.13.94:9696/v2.0/routers/47027384-0f3d-4dc3-8411-5b0e42a83355?fields=ha 0.253s 2020-12-14 02:25:06.269 197 DEBUG tempest.lib.common.rest_client [req-b8d24b6f-ca46-413f-9c25-979f03e1bddf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '24', 'x-openstack-request-id': 'req-b8d24b6f-ca46-413f-9c25-979f03e1bddf', 'date': 'Mon, 14 Dec 2020 02:25:06 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/47027384-0f3d-4dc3-8411-5b0e42a83355?fields=ha'} Body: b'{"router": {"ha": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:06.272 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:06.351 197 INFO tempest.lib.common.rest_client [req-59c8ef9b-e343-49a7-8fa4-b1521b25370e ] Request (RouterRbacTest:test_show_high_availability_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.073s 2020-12-14 02:25:06.354 197 DEBUG tempest.lib.common.rest_client [req-59c8ef9b-e343-49a7-8fa4-b1521b25370e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59c8ef9b-e343-49a7-8fa4-b1521b25370e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:06.410 197 INFO tempest.lib.common.rest_client [req-e2095b7b-6a28-4c68-ad31-1861b1b0c1be ] Request (RouterRbacTest:test_show_high_availability_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:25:06.413 197 DEBUG tempest.lib.common.rest_client [req-e2095b7b-6a28-4c68-ad31-1861b1b0c1be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2095b7b-6a28-4c68-ad31-1861b1b0c1be', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["NFYQDqVsSxWsT-O0II-3Vw"], "expires_at": "2020-12-14T03:25:06.000000Z", "issued_at": "2020-12-14T02:25:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:07.570 189 INFO tempest.lib.common.rest_client [req-9093694b-ba2e-49dc-ab17-e847e58e5f05 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.362s 2020-12-14 02:25:07.574 189 DEBUG tempest.lib.common.rest_client [req-9093694b-ba2e-49dc-ab17-e847e58e5f05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9093694b-ba2e-49dc-ab17-e847e58e5f05', 'x-compute-request-id': 'req-9093694b-ba2e-49dc-ab17-e847e58e5f05', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:08.450 197 INFO tempest.lib.common.rest_client [req-b82e24d4-5850-467c-b27d-acdeb56622ef ] Request (RouterRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/routers/47027384-0f3d-4dc3-8411-5b0e42a83355 2.026s 2020-12-14 02:25:08.454 197 DEBUG tempest.lib.common.rest_client [req-b82e24d4-5850-467c-b27d-acdeb56622ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-b82e24d4-5850-467c-b27d-acdeb56622ef', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:25:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/47027384-0f3d-4dc3-8411-5b0e42a83355'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:08.469 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:08.498 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:08.501 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:08.571 197 INFO tempest.lib.common.rest_client [req-4cd9fc0c-d00c-438f-8b35-c256678624fb ] Request (RouterRbacTest:test_show_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.063s 2020-12-14 02:25:08.574 197 DEBUG tempest.lib.common.rest_client [req-4cd9fc0c-d00c-438f-8b35-c256678624fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4cd9fc0c-d00c-438f-8b35-c256678624fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:08.628 197 INFO tempest.lib.common.rest_client [req-45eb8076-9269-4b48-80a6-76338b21a081 ] Request (RouterRbacTest:test_show_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:25:08.632 197 DEBUG tempest.lib.common.rest_client [req-45eb8076-9269-4b48-80a6-76338b21a081 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45eb8076-9269-4b48-80a6-76338b21a081', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["SfLLC_FaSk23neYpm5SkMg"], "expires_at": "2020-12-14T03:25:08.000000Z", "issued_at": "2020-12-14T02:25:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:08.834 197 INFO tempest.lib.common.rest_client [req-744f72ca-dc14-442d-841b-96e8282904ca ] Request (RouterRbacTest:test_show_router): 200 GET http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65?fields=id 0.193s 2020-12-14 02:25:08.839 197 DEBUG tempest.lib.common.rest_client [req-744f72ca-dc14-442d-841b-96e8282904ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '58', 'x-openstack-request-id': 'req-744f72ca-dc14-442d-841b-96e8282904ca', 'date': 'Mon, 14 Dec 2020 02:25:08 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65?fields=id'} Body: b'{"router": {"id": "8ad96c55-7b62-4106-ab4d-4aa043bc0c65"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:08.843 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:08.917 197 INFO tempest.lib.common.rest_client [req-831fef27-a38f-4d6a-8990-15b6b7a51c20 ] Request (RouterRbacTest:test_show_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.066s 2020-12-14 02:25:08.920 197 DEBUG tempest.lib.common.rest_client [req-831fef27-a38f-4d6a-8990-15b6b7a51c20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-831fef27-a38f-4d6a-8990-15b6b7a51c20', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:08.971 189 INFO tempest.lib.common.rest_client [req-bff4b831-66d3-4cf5-8df1-0ad62f9bff24 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.291s 2020-12-14 02:25:08.973 189 DEBUG tempest.lib.common.rest_client [req-bff4b831-66d3-4cf5-8df1-0ad62f9bff24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bff4b831-66d3-4cf5-8df1-0ad62f9bff24', 'x-compute-request-id': 'req-bff4b831-66d3-4cf5-8df1-0ad62f9bff24', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:08.982 197 INFO tempest.lib.common.rest_client [req-07c6556c-61b4-48cf-a88b-4bd029ab2241 ] Request (RouterRbacTest:test_show_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.055s 2020-12-14 02:25:08.986 197 DEBUG tempest.lib.common.rest_client [req-07c6556c-61b4-48cf-a88b-4bd029ab2241 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07c6556c-61b4-48cf-a88b-4bd029ab2241', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["kgSlGoH9TzKdT-RkjF2SVw"], "expires_at": "2020-12-14T03:25:08.000000Z", "issued_at": "2020-12-14T02:25:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:09.003 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:09.035 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:09.038 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:09.065 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:09.068 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:09.094 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:distributed, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:09.097 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:09.173 197 INFO tempest.lib.common.rest_client [req-0b886129-8153-425e-a2b5-ca6be59c6b07 ] Request (RouterRbacTest:test_update_distributed_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.067s 2020-12-14 02:25:09.177 197 DEBUG tempest.lib.common.rest_client [req-0b886129-8153-425e-a2b5-ca6be59c6b07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b886129-8153-425e-a2b5-ca6be59c6b07', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:09.226 197 INFO tempest.lib.common.rest_client [req-d67eec6a-b96c-43c5-b94d-a9c38d9107d5 ] Request (RouterRbacTest:test_update_distributed_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:25:09.230 197 DEBUG tempest.lib.common.rest_client [req-d67eec6a-b96c-43c5-b94d-a9c38d9107d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d67eec6a-b96c-43c5-b94d-a9c38d9107d5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["WYGdtinxTLeHQy22DADzjA"], "expires_at": "2020-12-14T03:25:09.000000Z", "issued_at": "2020-12-14T02:25:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:10.014 197 INFO tempest.lib.common.rest_client [req-a60551cd-ce3f-4e56-8ee1-d404ca435d80 ] Request (RouterRbacTest:test_update_distributed_router): 200 PUT http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65 0.776s 2020-12-14 02:25:10.019 197 DEBUG tempest.lib.common.rest_client [req-a60551cd-ce3f-4e56-8ee1-d404ca435d80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"distributed": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '538', 'x-openstack-request-id': 'req-a60551cd-ce3f-4e56-8ee1-d404ca435d80', 'date': 'Mon, 14 Dec 2020 02:25:10 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65'} Body: b'{"router": {"id": "8ad96c55-7b62-4106-ab4d-4aa043bc0c65", "name": "tempest-RouterRbacTest-router-1228043555", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": true, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:21Z", "updated_at": "2020-12-14T02:25:09Z", "revision_number": 2, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:10.023 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:10.098 197 INFO tempest.lib.common.rest_client [req-33f27283-8c98-41cb-85ab-2e3f4e1cd5f2 ] Request (RouterRbacTest:test_update_distributed_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.069s 2020-12-14 02:25:10.102 197 DEBUG tempest.lib.common.rest_client [req-33f27283-8c98-41cb-85ab-2e3f4e1cd5f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33f27283-8c98-41cb-85ab-2e3f4e1cd5f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:10.155 197 INFO tempest.lib.common.rest_client [req-8798aac1-e1a9-48f7-9127-76f43846d33b ] Request (RouterRbacTest:test_update_distributed_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:25:10.158 197 DEBUG tempest.lib.common.rest_client [req-8798aac1-e1a9-48f7-9127-76f43846d33b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8798aac1-e1a9-48f7-9127-76f43846d33b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["uKfzVuJXS_6kZoXHF6HpNA"], "expires_at": "2020-12-14T03:25:10.000000Z", "issued_at": "2020-12-14T02:25:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:10.368 189 INFO tempest.lib.common.rest_client [req-bf86f30e-7935-4efd-a3d1-6c8e81777f14 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.287s 2020-12-14 02:25:10.371 189 DEBUG tempest.lib.common.rest_client [req-bf86f30e-7935-4efd-a3d1-6c8e81777f14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bf86f30e-7935-4efd-a3d1-6c8e81777f14', 'x-compute-request-id': 'req-bf86f30e-7935-4efd-a3d1-6c8e81777f14', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:11.662 189 INFO tempest.lib.common.rest_client [req-d4646e43-c834-4a1b-b52f-79593458bad3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.187s 2020-12-14 02:25:11.666 189 DEBUG tempest.lib.common.rest_client [req-d4646e43-c834-4a1b-b52f-79593458bad3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d4646e43-c834-4a1b-b52f-79593458bad3', 'x-compute-request-id': 'req-d4646e43-c834-4a1b-b52f-79593458bad3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:13.369 189 INFO tempest.lib.common.rest_client [req-e14a47fd-f5f0-43f8-8347-a7dfd3f02f0d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.600s 2020-12-14 02:25:13.373 189 DEBUG tempest.lib.common.rest_client [req-e14a47fd-f5f0-43f8-8347-a7dfd3f02f0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e14a47fd-f5f0-43f8-8347-a7dfd3f02f0d', 'x-compute-request-id': 'req-e14a47fd-f5f0-43f8-8347-a7dfd3f02f0d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:15.300 189 INFO tempest.lib.common.rest_client [req-aa0d36a3-2617-4f2a-95ec-2a99dce6848e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.819s 2020-12-14 02:25:15.304 189 DEBUG tempest.lib.common.rest_client [req-aa0d36a3-2617-4f2a-95ec-2a99dce6848e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aa0d36a3-2617-4f2a-95ec-2a99dce6848e', 'x-compute-request-id': 'req-aa0d36a3-2617-4f2a-95ec-2a99dce6848e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:15.373 197 INFO tempest.lib.common.rest_client [req-f1c8a611-cc4c-4fdf-a79f-71b1b6b64a81 ] Request (RouterRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65 5.204s 2020-12-14 02:25:15.376 197 DEBUG tempest.lib.common.rest_client [req-f1c8a611-cc4c-4fdf-a79f-71b1b6b64a81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"distributed": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '539', 'x-openstack-request-id': 'req-f1c8a611-cc4c-4fdf-a79f-71b1b6b64a81', 'date': 'Mon, 14 Dec 2020 02:25:15 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65'} Body: b'{"router": {"id": "8ad96c55-7b62-4106-ab4d-4aa043bc0c65", "name": "tempest-RouterRbacTest-router-1228043555", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:21Z", "updated_at": "2020-12-14T02:25:10Z", "revision_number": 3, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:15.388 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:15.412 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:15.415 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:15.438 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:15.441 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:15.464 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:ha, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:15.466 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:15.542 197 INFO tempest.lib.common.rest_client [req-4ea88838-1300-4435-9848-d7f99008e44a ] Request (RouterRbacTest:test_update_high_availability_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.070s 2020-12-14 02:25:15.546 197 DEBUG tempest.lib.common.rest_client [req-4ea88838-1300-4435-9848-d7f99008e44a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ea88838-1300-4435-9848-d7f99008e44a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:15.610 197 INFO tempest.lib.common.rest_client [req-9c6ecef0-3ac3-49f1-8c6d-18e02c7379ac ] Request (RouterRbacTest:test_update_high_availability_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.057s 2020-12-14 02:25:15.612 197 DEBUG tempest.lib.common.rest_client [req-9c6ecef0-3ac3-49f1-8c6d-18e02c7379ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c6ecef0-3ac3-49f1-8c6d-18e02c7379ac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["OuOaRzIuQ1qix6o_COr-bA"], "expires_at": "2020-12-14T03:25:15.000000Z", "issued_at": "2020-12-14T02:25:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:18.212 197 INFO tempest.lib.common.rest_client [req-2b37f9e2-5ab6-4427-926d-3018558872b1 ] Request (RouterRbacTest:test_update_high_availability_router): 200 PUT http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65 2.592s 2020-12-14 02:25:18.215 197 DEBUG tempest.lib.common.rest_client [req-2b37f9e2-5ab6-4427-926d-3018558872b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"ha": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '544', 'x-openstack-request-id': 'req-2b37f9e2-5ab6-4427-926d-3018558872b1', 'date': 'Mon, 14 Dec 2020 02:25:18 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65'} Body: b'{"router": {"id": "8ad96c55-7b62-4106-ab4d-4aa043bc0c65", "name": "tempest-RouterRbacTest-router-1228043555", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": true, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:21Z", "updated_at": "2020-12-14T02:25:15Z", "revision_number": 4, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:18.218 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:18.318 197 INFO tempest.lib.common.rest_client [req-cfc03697-a7a3-4ae8-93bf-7409fcf8e5df ] Request (RouterRbacTest:test_update_high_availability_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.093s 2020-12-14 02:25:18.320 197 DEBUG tempest.lib.common.rest_client [req-cfc03697-a7a3-4ae8-93bf-7409fcf8e5df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfc03697-a7a3-4ae8-93bf-7409fcf8e5df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:18.371 197 INFO tempest.lib.common.rest_client [req-de4b3879-adab-4645-8a5c-0ef48593fe8a ] Request (RouterRbacTest:test_update_high_availability_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:25:18.375 197 DEBUG tempest.lib.common.rest_client [req-de4b3879-adab-4645-8a5c-0ef48593fe8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de4b3879-adab-4645-8a5c-0ef48593fe8a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["GEk0awiRRuyOvcDk8cQ3ww"], "expires_at": "2020-12-14T03:25:18.000000Z", "issued_at": "2020-12-14T02:25:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:20.612 189 INFO tempest.lib.common.rest_client [req-5e9c0be7-1027-4aed-8f4a-5f1689636893 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 4.201s 2020-12-14 02:25:20.615 189 DEBUG tempest.lib.common.rest_client [req-5e9c0be7-1027-4aed-8f4a-5f1689636893 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5e9c0be7-1027-4aed-8f4a-5f1689636893', 'x-compute-request-id': 'req-5e9c0be7-1027-4aed-8f4a-5f1689636893', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:20.739 197 INFO tempest.lib.common.rest_client [req-e31d07dd-51bf-4df0-a78b-5d3b5456370f ] Request (RouterRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65 2.354s 2020-12-14 02:25:20.742 197 DEBUG tempest.lib.common.rest_client [req-e31d07dd-51bf-4df0-a78b-5d3b5456370f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"ha": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '545', 'x-openstack-request-id': 'req-e31d07dd-51bf-4df0-a78b-5d3b5456370f', 'date': 'Mon, 14 Dec 2020 02:25:20 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65'} Body: b'{"router": {"id": "8ad96c55-7b62-4106-ab4d-4aa043bc0c65", "name": "tempest-RouterRbacTest-router-1228043555", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:21Z", "updated_at": "2020-12-14T02:25:18Z", "revision_number": 7, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:20.753 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:20.776 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:20.778 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:20.801 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:20.803 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:20.867 197 INFO tempest.lib.common.rest_client [req-b595b19c-0ee7-4f93-9217-5b028ecc1518 ] Request (RouterRbacTest:test_update_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.059s 2020-12-14 02:25:20.870 197 DEBUG tempest.lib.common.rest_client [req-b595b19c-0ee7-4f93-9217-5b028ecc1518 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b595b19c-0ee7-4f93-9217-5b028ecc1518', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:20.920 197 INFO tempest.lib.common.rest_client [req-f2dd7fe2-2d31-4964-976a-3d9b57669569 ] Request (RouterRbacTest:test_update_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:25:20.924 197 DEBUG tempest.lib.common.rest_client [req-f2dd7fe2-2d31-4964-976a-3d9b57669569 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2dd7fe2-2d31-4964-976a-3d9b57669569', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["bdz0qIBxRoakUuVIBPRKdg"], "expires_at": "2020-12-14T03:25:20.000000Z", "issued_at": "2020-12-14T02:25:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:21.494 197 INFO tempest.lib.common.rest_client [req-a99809fc-9e94-4b24-8b68-71ac6f60e4e8 ] Request (RouterRbacTest:test_update_router): 200 PUT http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65 0.562s 2020-12-14 02:25:21.498 197 DEBUG tempest.lib.common.rest_client [req-a99809fc-9e94-4b24-8b68-71ac6f60e4e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-RouterRbacTest-new-router-name-2016359059"}} Response - Headers: {'content-type': 'application/json', 'content-length': '554', 'x-openstack-request-id': 'req-a99809fc-9e94-4b24-8b68-71ac6f60e4e8', 'date': 'Mon, 14 Dec 2020 02:25:21 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65'} Body: b'{"router": {"id": "8ad96c55-7b62-4106-ab4d-4aa043bc0c65", "name": "tempest-RouterRbacTest-new-router-name-2016359059", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:21Z", "updated_at": "2020-12-14T02:25:21Z", "revision_number": 9, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:21.502 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:21.576 197 INFO tempest.lib.common.rest_client [req-d2a8a428-a1b2-4991-8ede-73f27026585d ] Request (RouterRbacTest:test_update_router): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.067s 2020-12-14 02:25:21.580 197 DEBUG tempest.lib.common.rest_client [req-d2a8a428-a1b2-4991-8ede-73f27026585d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2a8a428-a1b2-4991-8ede-73f27026585d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:21.636 197 INFO tempest.lib.common.rest_client [req-a9f3ce04-b926-4545-bf92-8e0e8d179dc6 ] Request (RouterRbacTest:test_update_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:25:21.640 197 DEBUG tempest.lib.common.rest_client [req-a9f3ce04-b926-4545-bf92-8e0e8d179dc6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9f3ce04-b926-4545-bf92-8e0e8d179dc6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["K7xhdnhHTxquWAto0Q3lAQ"], "expires_at": "2020-12-14T03:25:21.000000Z", "issued_at": "2020-12-14T02:25:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:21.653 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:21.677 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:21.680 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:21.709 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:21.712 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:21.736 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:external_gateway_info, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:21.738 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:21.762 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:external_gateway_info:enable_snat, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:21.764 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:21.842 197 INFO tempest.lib.common.rest_client [req-9ca7dec4-ac51-4f5a-bb79-da8e48095124 ] Request (RouterRbacTest:test_update_router_enable_snat): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.072s 2020-12-14 02:25:21.845 197 DEBUG tempest.lib.common.rest_client [req-9ca7dec4-ac51-4f5a-bb79-da8e48095124 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ca7dec4-ac51-4f5a-bb79-da8e48095124', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:21.911 189 INFO tempest.lib.common.rest_client [req-866a27fc-b239-4854-bac5-96761cfe49ff ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.190s 2020-12-14 02:25:21.915 189 DEBUG tempest.lib.common.rest_client [req-866a27fc-b239-4854-bac5-96761cfe49ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-866a27fc-b239-4854-bac5-96761cfe49ff', 'x-compute-request-id': 'req-866a27fc-b239-4854-bac5-96761cfe49ff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:21.916 197 INFO tempest.lib.common.rest_client [req-4069e273-35ca-4e9b-be18-481f715f5801 ] Request (RouterRbacTest:test_update_router_enable_snat): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.062s 2020-12-14 02:25:21.918 197 DEBUG tempest.lib.common.rest_client [req-4069e273-35ca-4e9b-be18-481f715f5801 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4069e273-35ca-4e9b-be18-481f715f5801', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["i31SB4asSyukwpHv-S7LfQ"], "expires_at": "2020-12-14T03:25:21.000000Z", "issued_at": "2020-12-14T02:25:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:23.260 189 INFO tempest.lib.common.rest_client [req-61417ef8-a27d-4381-91e7-04f6be3a8f91 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.238s 2020-12-14 02:25:23.263 189 DEBUG tempest.lib.common.rest_client [req-61417ef8-a27d-4381-91e7-04f6be3a8f91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-61417ef8-a27d-4381-91e7-04f6be3a8f91', 'x-compute-request-id': 'req-61417ef8-a27d-4381-91e7-04f6be3a8f91', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:23.458 197 INFO tempest.lib.common.rest_client [req-e24c5af5-bcd9-4f60-a6f0-82e27403d524 ] Request (RouterRbacTest:test_update_router_enable_snat): 200 PUT http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65 1.531s 2020-12-14 02:25:23.461 197 DEBUG tempest.lib.common.rest_client [req-e24c5af5-bcd9-4f60-a6f0-82e27403d524 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"external_gateway_info": {"network_id": "44f8e2c3-3949-47fe-acf1-76b06d8296b9", "enable_snat": true}}} Response - Headers: {'content-type': 'application/json', 'content-length': '736', 'x-openstack-request-id': 'req-e24c5af5-bcd9-4f60-a6f0-82e27403d524', 'date': 'Mon, 14 Dec 2020 02:25:23 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65'} Body: b'{"router": {"id": "8ad96c55-7b62-4106-ab4d-4aa043bc0c65", "name": "tempest-RouterRbacTest-new-router-name-2016359059", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": {"network_id": "44f8e2c3-3949-47fe-acf1-76b06d8296b9", "external_fixed_ips": [{"subnet_id": "baf8c094-0247-4dd9-8d1b-3a91617da6b5", "ip_address": "192.168.120.4"}], "enable_snat": true}, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:21Z", "updated_at": "2020-12-14T02:25:22Z", "revision_number": 11, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:23.464 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:23.537 197 INFO tempest.lib.common.rest_client [req-29b288c9-ea4d-43e3-a729-5650bca194ee ] Request (RouterRbacTest:test_update_router_enable_snat): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.066s 2020-12-14 02:25:23.541 197 DEBUG tempest.lib.common.rest_client [req-29b288c9-ea4d-43e3-a729-5650bca194ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29b288c9-ea4d-43e3-a729-5650bca194ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:23.591 197 INFO tempest.lib.common.rest_client [req-0580b025-6605-4c29-9b68-43f8f26ef162 ] Request (RouterRbacTest:test_update_router_enable_snat): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:25:23.595 197 DEBUG tempest.lib.common.rest_client [req-0580b025-6605-4c29-9b68-43f8f26ef162 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0580b025-6605-4c29-9b68-43f8f26ef162', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["S-dTypHgTlKvNOECIrSfWw"], "expires_at": "2020-12-14T03:25:23.000000Z", "issued_at": "2020-12-14T02:25:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:24.577 189 INFO tempest.lib.common.rest_client [req-74545bdf-6a28-4501-aebf-a359876a946d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.206s 2020-12-14 02:25:24.581 189 DEBUG tempest.lib.common.rest_client [req-74545bdf-6a28-4501-aebf-a359876a946d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-74545bdf-6a28-4501-aebf-a359876a946d', 'x-compute-request-id': 'req-74545bdf-6a28-4501-aebf-a359876a946d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:26.078 189 INFO tempest.lib.common.rest_client [req-d42a2b98-6f63-4c39-b179-89a0cd1a54c0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.391s 2020-12-14 02:25:26.082 189 DEBUG tempest.lib.common.rest_client [req-d42a2b98-6f63-4c39-b179-89a0cd1a54c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d42a2b98-6f63-4c39-b179-89a0cd1a54c0', 'x-compute-request-id': 'req-d42a2b98-6f63-4c39-b179-89a0cd1a54c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:26.098 197 INFO tempest.lib.common.rest_client [req-c57f0144-421e-46b2-b7b0-2b9e32bc3c0e ] Request (RouterRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65 2.492s 2020-12-14 02:25:26.103 197 DEBUG tempest.lib.common.rest_client [req-c57f0144-421e-46b2-b7b0-2b9e32bc3c0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"external_gateway_info": null}} Response - Headers: {'content-type': 'application/json', 'content-length': '555', 'x-openstack-request-id': 'req-c57f0144-421e-46b2-b7b0-2b9e32bc3c0e', 'date': 'Mon, 14 Dec 2020 02:25:26 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65'} Body: b'{"router": {"id": "8ad96c55-7b62-4106-ab4d-4aa043bc0c65", "name": "tempest-RouterRbacTest-new-router-name-2016359059", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:21Z", "updated_at": "2020-12-14T02:25:24Z", "revision_number": 14, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:26.115 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:26.140 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:26.142 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:26.159 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:26.161 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:26.179 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:external_gateway_info, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:26.181 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:26.199 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:external_gateway_info:external_fixed_ips, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:26.279 197 INFO tempest.lib.common.rest_client [req-c24bf082-428b-422f-9b27-e51b51edaaa3 ] Request (RouterRbacTest:test_update_router_external_fixed_ips): 200 GET http://172.30.13.94:9696/v2.0/ports?network_id=44f8e2c3-3949-47fe-acf1-76b06d8296b9 0.075s 2020-12-14 02:25:26.283 197 DEBUG tempest.lib.common.rest_client [req-c24bf082-428b-422f-9b27-e51b51edaaa3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1229', 'x-openstack-request-id': 'req-c24bf082-428b-422f-9b27-e51b51edaaa3', 'date': 'Mon, 14 Dec 2020 02:25:26 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?network_id=44f8e2c3-3949-47fe-acf1-76b06d8296b9'} Body: b'{"ports":[{"id":"5706a21c-4d84-4dc7-9726-7c412874cf8c","name":"","network_id":"44f8e2c3-3949-47fe-acf1-76b06d8296b9","tenant_id":"ac4c492395da44859cb68eea226ed5a1","mac_address":"fa:16:3e:c7:d0:90","admin_state_up":true,"status":"ACTIVE","device_id":"dhcpcf0aa1ad-fc1e-58c4-863b-aba14f17f098-44f8e2c3-3949-47fe-acf1-76b06d8296b9","device_owner":"network:dhcp","fixed_ips":[{"subnet_id":"baf8c094-0247-4dd9-8d1b-3a91617da6b5","ip_address":"192.168.120.2"}],"allowed_address_pairs":[],"extra_dhcp_opts":[],"security_groups":[],"description":"","binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"lf-virtual9","binding:vif_type":"ovs","binding:vif_details":{"connectivity":"l2","port_filter":true,"ovs_hybrid_plug":false,"datapath_type":"system","bridge_name":"br-int"},"port_security_enabled":false,"qos_policy_id":null,"qos_network_policy_id":null,"dns_name":"","dns_assignment":[{"ip_address":"192.168.120.2","hostname":"host-192-168-120-2","fqdn":"host-192-168-120-2.openstackgate.local."}],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:24:21Z","updated_at":"2020-12-14T02:24:28Z","revision_number":3,"project_id":"ac4c492395da44859cb68eea226ed5a1"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:26.378 197 INFO tempest.lib.common.rest_client [req-19855f22-6573-4e6d-8588-db4300c408d1 ] Request (RouterRbacTest:test_update_router_external_fixed_ips): 200 GET http://172.30.13.94:9696/v2.0/subnets/baf8c094-0247-4dd9-8d1b-3a91617da6b5 0.088s 2020-12-14 02:25:26.382 197 DEBUG tempest.lib.common.rest_client [req-19855f22-6573-4e6d-8588-db4300c408d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '661', 'x-openstack-request-id': 'req-19855f22-6573-4e6d-8588-db4300c408d1', 'date': 'Mon, 14 Dec 2020 02:25:26 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/baf8c094-0247-4dd9-8d1b-3a91617da6b5'} Body: b'{"subnet":{"id":"baf8c094-0247-4dd9-8d1b-3a91617da6b5","name":"","tenant_id":"ac4c492395da44859cb68eea226ed5a1","network_id":"44f8e2c3-3949-47fe-acf1-76b06d8296b9","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:24:20Z","updated_at":"2020-12-14T02:24:20Z","revision_number":0,"project_id":"ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:26.400 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:26.466 197 INFO tempest.lib.common.rest_client [req-2b1e1407-6c4b-44f6-b040-1916c3e6cd59 ] Request (RouterRbacTest:test_update_router_external_fixed_ips): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.060s 2020-12-14 02:25:26.468 197 DEBUG tempest.lib.common.rest_client [req-2b1e1407-6c4b-44f6-b040-1916c3e6cd59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b1e1407-6c4b-44f6-b040-1916c3e6cd59', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:26.524 197 INFO tempest.lib.common.rest_client [req-a3a29102-5530-44ff-af0b-8403bf13b8ff ] Request (RouterRbacTest:test_update_router_external_fixed_ips): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:25:26.528 197 DEBUG tempest.lib.common.rest_client [req-a3a29102-5530-44ff-af0b-8403bf13b8ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3a29102-5530-44ff-af0b-8403bf13b8ff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["jp-vw_fcQaGscqGoc1EePA"], "expires_at": "2020-12-14T03:25:26.000000Z", "issued_at": "2020-12-14T02:25:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:27.499 189 INFO tempest.lib.common.rest_client [req-c3a68844-e17e-4e2a-a1c6-eeaff6438ad3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.304s 2020-12-14 02:25:27.502 189 DEBUG tempest.lib.common.rest_client [req-c3a68844-e17e-4e2a-a1c6-eeaff6438ad3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c3a68844-e17e-4e2a-a1c6-eeaff6438ad3', 'x-compute-request-id': 'req-c3a68844-e17e-4e2a-a1c6-eeaff6438ad3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:28.186 197 INFO tempest.lib.common.rest_client [req-5ffc807c-b317-4b27-9b7c-9cb08f3851fc ] Request (RouterRbacTest:test_update_router_external_fixed_ips): 200 PUT http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65 1.646s 2020-12-14 02:25:28.190 197 DEBUG tempest.lib.common.rest_client [req-5ffc807c-b317-4b27-9b7c-9cb08f3851fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"external_gateway_info": {"network_id": "44f8e2c3-3949-47fe-acf1-76b06d8296b9", "external_fixed_ips": [{"subnet_id": "baf8c094-0247-4dd9-8d1b-3a91617da6b5", "ip_address": "192.168.120.14"}]}}} Response - Headers: {'content-type': 'application/json', 'content-length': '737', 'x-openstack-request-id': 'req-5ffc807c-b317-4b27-9b7c-9cb08f3851fc', 'date': 'Mon, 14 Dec 2020 02:25:28 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65'} Body: b'{"router": {"id": "8ad96c55-7b62-4106-ab4d-4aa043bc0c65", "name": "tempest-RouterRbacTest-new-router-name-2016359059", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": {"network_id": "44f8e2c3-3949-47fe-acf1-76b06d8296b9", "external_fixed_ips": [{"subnet_id": "baf8c094-0247-4dd9-8d1b-3a91617da6b5", "ip_address": "192.168.120.14"}], "enable_snat": true}, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:21Z", "updated_at": "2020-12-14T02:25:27Z", "revision_number": 16, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:28.192 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:28.253 197 INFO tempest.lib.common.rest_client [req-1613a26f-6f1c-4e47-8835-d044576f4914 ] Request (RouterRbacTest:test_update_router_external_fixed_ips): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.052s 2020-12-14 02:25:28.255 197 DEBUG tempest.lib.common.rest_client [req-1613a26f-6f1c-4e47-8835-d044576f4914 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1613a26f-6f1c-4e47-8835-d044576f4914', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:28.300 197 INFO tempest.lib.common.rest_client [req-6d1ca4fc-81a7-4791-abf1-6fb38925dfd1 ] Request (RouterRbacTest:test_update_router_external_fixed_ips): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:25:28.303 197 DEBUG tempest.lib.common.rest_client [req-6d1ca4fc-81a7-4791-abf1-6fb38925dfd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d1ca4fc-81a7-4791-abf1-6fb38925dfd1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["qS8m1Nb7S7WpR1h5WM1qRg"], "expires_at": "2020-12-14T03:25:28.000000Z", "issued_at": "2020-12-14T02:25:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:28.843 189 INFO tempest.lib.common.rest_client [req-4d1dcc42-27cd-4270-8da5-2359e18a67d7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.237s 2020-12-14 02:25:28.846 189 DEBUG tempest.lib.common.rest_client [req-4d1dcc42-27cd-4270-8da5-2359e18a67d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4d1dcc42-27cd-4270-8da5-2359e18a67d7', 'x-compute-request-id': 'req-4d1dcc42-27cd-4270-8da5-2359e18a67d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:29.763 197 INFO tempest.lib.common.rest_client [req-6249dc12-a579-4624-9200-c0ea8c8fcf06 ] Request (RouterRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65 1.449s 2020-12-14 02:25:29.767 197 DEBUG tempest.lib.common.rest_client [req-6249dc12-a579-4624-9200-c0ea8c8fcf06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"external_gateway_info": null}} Response - Headers: {'content-type': 'application/json', 'content-length': '555', 'x-openstack-request-id': 'req-6249dc12-a579-4624-9200-c0ea8c8fcf06', 'date': 'Mon, 14 Dec 2020 02:25:29 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65'} Body: b'{"router": {"id": "8ad96c55-7b62-4106-ab4d-4aa043bc0c65", "name": "tempest-RouterRbacTest-new-router-name-2016359059", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:21Z", "updated_at": "2020-12-14T02:25:29Z", "revision_number": 19, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:29.781 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:29.805 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:29.807 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:29.831 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:29.833 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:29.857 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:external_gateway_info, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:29.859 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:29.933 197 INFO tempest.lib.common.rest_client [req-666d9546-41e8-4f49-b16a-5c114fba0f0f ] Request (RouterRbacTest:test_update_router_external_gateway_info): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.068s 2020-12-14 02:25:29.935 197 DEBUG tempest.lib.common.rest_client [req-666d9546-41e8-4f49-b16a-5c114fba0f0f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-666d9546-41e8-4f49-b16a-5c114fba0f0f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:29.990 197 INFO tempest.lib.common.rest_client [req-e9ec1433-1fd4-4b40-91d0-dbca1a1f1e06 ] Request (RouterRbacTest:test_update_router_external_gateway_info): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:25:29.992 197 DEBUG tempest.lib.common.rest_client [req-e9ec1433-1fd4-4b40-91d0-dbca1a1f1e06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9ec1433-1fd4-4b40-91d0-dbca1a1f1e06', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["enO_Mj7kTLaGkj3t3gbDWQ"], "expires_at": "2020-12-14T03:25:29.000000Z", "issued_at": "2020-12-14T02:25:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:30.240 189 INFO tempest.lib.common.rest_client [req-56cd4ed0-c550-4a88-9998-7b29a53d357c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.286s 2020-12-14 02:25:30.243 189 DEBUG tempest.lib.common.rest_client [req-56cd4ed0-c550-4a88-9998-7b29a53d357c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-56cd4ed0-c550-4a88-9998-7b29a53d357c', 'x-compute-request-id': 'req-56cd4ed0-c550-4a88-9998-7b29a53d357c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:30.699 197 INFO tempest.lib.common.rest_client [req-bbc7fbf1-08f1-4ad6-89ee-196e0a4b2139 ] Request (RouterRbacTest:test_update_router_external_gateway_info): 200 PUT http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65 0.698s 2020-12-14 02:25:30.703 197 DEBUG tempest.lib.common.rest_client [req-bbc7fbf1-08f1-4ad6-89ee-196e0a4b2139 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"external_gateway_info": {}}} Response - Headers: {'content-type': 'application/json', 'content-length': '555', 'x-openstack-request-id': 'req-bbc7fbf1-08f1-4ad6-89ee-196e0a4b2139', 'date': 'Mon, 14 Dec 2020 02:25:30 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65'} Body: b'{"router": {"id": "8ad96c55-7b62-4106-ab4d-4aa043bc0c65", "name": "tempest-RouterRbacTest-new-router-name-2016359059", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:21Z", "updated_at": "2020-12-14T02:25:30Z", "revision_number": 20, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:30.707 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:30.776 197 INFO tempest.lib.common.rest_client [req-8483ba0d-ad95-4733-8bb2-b32b91f764c1 ] Request (RouterRbacTest:test_update_router_external_gateway_info): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.063s 2020-12-14 02:25:30.779 197 DEBUG tempest.lib.common.rest_client [req-8483ba0d-ad95-4733-8bb2-b32b91f764c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8483ba0d-ad95-4733-8bb2-b32b91f764c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:30.832 197 INFO tempest.lib.common.rest_client [req-2568a93a-04bd-4e7b-87d7-778fcc55dd35 ] Request (RouterRbacTest:test_update_router_external_gateway_info): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:25:30.836 197 DEBUG tempest.lib.common.rest_client [req-2568a93a-04bd-4e7b-87d7-778fcc55dd35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2568a93a-04bd-4e7b-87d7-778fcc55dd35', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["SOEtojt4ReyMfpQ9DsV2rA"], "expires_at": "2020-12-14T03:25:30.000000Z", "issued_at": "2020-12-14T02:25:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:30.850 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:30.875 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:30.877 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:30.903 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:30.905 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:30.930 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:external_gateway_info, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:30.932 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:30.956 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_router:external_gateway_info:network_id, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:30.959 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:31.036 197 INFO tempest.lib.common.rest_client [req-a04aacff-7e94-419d-824e-a815710e2ca7 ] Request (RouterRbacTest:test_update_router_external_gateway_info_network_id): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.071s 2020-12-14 02:25:31.039 197 DEBUG tempest.lib.common.rest_client [req-a04aacff-7e94-419d-824e-a815710e2ca7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a04aacff-7e94-419d-824e-a815710e2ca7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:31.091 197 INFO tempest.lib.common.rest_client [req-d63ec3d7-060c-4f22-aea0-dd7ecb230f55 ] Request (RouterRbacTest:test_update_router_external_gateway_info_network_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:25:31.094 197 DEBUG tempest.lib.common.rest_client [req-d63ec3d7-060c-4f22-aea0-dd7ecb230f55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d63ec3d7-060c-4f22-aea0-dd7ecb230f55', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["UbNpTCdtRIe0QFbcCLNe3A"], "expires_at": "2020-12-14T03:25:31.000000Z", "issued_at": "2020-12-14T02:25:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:31.556 189 INFO tempest.lib.common.rest_client [req-a4970a0f-646d-4eb3-b630-82ff223b235f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.206s 2020-12-14 02:25:31.561 189 DEBUG tempest.lib.common.rest_client [req-a4970a0f-646d-4eb3-b630-82ff223b235f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a4970a0f-646d-4eb3-b630-82ff223b235f', 'x-compute-request-id': 'req-a4970a0f-646d-4eb3-b630-82ff223b235f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:32.520 197 INFO tempest.lib.common.rest_client [req-aedcd3e3-b8dc-43c6-93b3-7ecd9cac1d7d ] Request (RouterRbacTest:test_update_router_external_gateway_info_network_id): 200 PUT http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65 1.420s 2020-12-14 02:25:32.522 197 DEBUG tempest.lib.common.rest_client [req-aedcd3e3-b8dc-43c6-93b3-7ecd9cac1d7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"external_gateway_info": {"network_id": "44f8e2c3-3949-47fe-acf1-76b06d8296b9"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '736', 'x-openstack-request-id': 'req-aedcd3e3-b8dc-43c6-93b3-7ecd9cac1d7d', 'date': 'Mon, 14 Dec 2020 02:25:32 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65'} Body: b'{"router": {"id": "8ad96c55-7b62-4106-ab4d-4aa043bc0c65", "name": "tempest-RouterRbacTest-new-router-name-2016359059", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": {"network_id": "44f8e2c3-3949-47fe-acf1-76b06d8296b9", "external_fixed_ips": [{"subnet_id": "baf8c094-0247-4dd9-8d1b-3a91617da6b5", "ip_address": "192.168.120.3"}], "enable_snat": true}, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:21Z", "updated_at": "2020-12-14T02:25:32Z", "revision_number": 22, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:32.524 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:32.594 197 INFO tempest.lib.common.rest_client [req-f290d711-3235-4c4b-badd-b89e7a2f9607 ] Request (RouterRbacTest:test_update_router_external_gateway_info_network_id): 200 GET http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles 0.063s 2020-12-14 02:25:32.597 197 DEBUG tempest.lib.common.rest_client [req-f290d711-3235-4c4b-badd-b89e7a2f9607 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f290d711-3235-4c4b-badd-b89e7a2f9607', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1/users/fe2f0cae66134f229c0d67cd4fbb1b0e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:32.647 197 INFO tempest.lib.common.rest_client [req-f6fa09ae-382a-41e2-82b9-b051fdc661d6 ] Request (RouterRbacTest:test_update_router_external_gateway_info_network_id): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:25:32.649 197 DEBUG tempest.lib.common.rest_client [req-f6fa09ae-382a-41e2-82b9-b051fdc661d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6fa09ae-382a-41e2-82b9-b051fdc661d6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fe2f0cae66134f229c0d67cd4fbb1b0e", "name": "tempest-RouterRbacTest-467668131", "password_expires_at": null}, "audit_ids": ["KyMt6P_nTQO57IkeVfpFzA"], "expires_at": "2020-12-14T03:25:32.000000Z", "issued_at": "2020-12-14T02:25:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac4c492395da44859cb68eea226ed5a1", "name": "tempest-RouterRbacTest-467668131"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac4c492395da44859cb68eea226ed5a1", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:32.884 189 INFO tempest.lib.common.rest_client [req-4099aad1-657b-4331-a894-aa44c8198ae2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.217s 2020-12-14 02:25:32.888 189 DEBUG tempest.lib.common.rest_client [req-4099aad1-657b-4331-a894-aa44c8198ae2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4099aad1-657b-4331-a894-aa44c8198ae2', 'x-compute-request-id': 'req-4099aad1-657b-4331-a894-aa44c8198ae2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:34.011 197 INFO tempest.lib.common.rest_client [req-c0bdbfac-7fee-4ede-a841-b8243da1b0c9 ] Request (RouterRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65 1.354s 2020-12-14 02:25:34.014 197 DEBUG tempest.lib.common.rest_client [req-c0bdbfac-7fee-4ede-a841-b8243da1b0c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"external_gateway_info": null}} Response - Headers: {'content-type': 'application/json', 'content-length': '555', 'x-openstack-request-id': 'req-c0bdbfac-7fee-4ede-a841-b8243da1b0c9', 'date': 'Mon, 14 Dec 2020 02:25:34 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65'} Body: b'{"router": {"id": "8ad96c55-7b62-4106-ab4d-4aa043bc0c65", "name": "tempest-RouterRbacTest-new-router-name-2016359059", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "admin_state_up": false, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": ["nova"], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:24:21Z", "updated_at": "2020-12-14T02:25:33Z", "revision_number": 25, "project_id": "ac4c492395da44859cb68eea226ed5a1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:34.102 197 INFO tempest.lib.common.rest_client [req-2000446d-111d-4aea-b020-4613fb7333c5 ] Request (RouterRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/ports?device_id=58bc3b05-afb1-49eb-89ac-64dd54b4fe8c 0.070s 2020-12-14 02:25:34.104 197 DEBUG tempest.lib.common.rest_client [req-2000446d-111d-4aea-b020-4613fb7333c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '12', 'x-openstack-request-id': 'req-2000446d-111d-4aea-b020-4613fb7333c5', 'date': 'Mon, 14 Dec 2020 02:25:34 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?device_id=58bc3b05-afb1-49eb-89ac-64dd54b4fe8c'} Body: b'{"ports":[]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:34.226 189 INFO tempest.lib.common.rest_client [req-3afacc6e-bf0b-4322-bfa2-e084eedca133 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.227s 2020-12-14 02:25:34.229 189 DEBUG tempest.lib.common.rest_client [req-3afacc6e-bf0b-4322-bfa2-e084eedca133 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3afacc6e-bf0b-4322-bfa2-e084eedca133', 'x-compute-request-id': 'req-3afacc6e-bf0b-4322-bfa2-e084eedca133', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:34.492 197 INFO tempest.lib.common.rest_client [req-26f4518b-10ec-45fe-a140-69df9a63df51 ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/58bc3b05-afb1-49eb-89ac-64dd54b4fe8c 0.382s 2020-12-14 02:25:34.496 197 DEBUG tempest.lib.common.rest_client [req-26f4518b-10ec-45fe-a140-69df9a63df51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-26f4518b-10ec-45fe-a140-69df9a63df51', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:25:34 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/58bc3b05-afb1-49eb-89ac-64dd54b4fe8c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:35.039 197 INFO tempest.lib.common.rest_client [req-0f71453a-76de-4d50-aceb-5d165f2cb9ff ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/1401546c-2808-45ae-97e7-e01f8c687817 0.538s 2020-12-14 02:25:35.042 197 DEBUG tempest.lib.common.rest_client [req-0f71453a-76de-4d50-aceb-5d165f2cb9ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-0f71453a-76de-4d50-aceb-5d165f2cb9ff', 'date': 'Mon, 14 Dec 2020 02:25:35 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/1401546c-2808-45ae-97e7-e01f8c687817'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:35.561 189 INFO tempest.lib.common.rest_client [req-254c08c1-fe2b-47c9-a445-e2d988309ba4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.226s 2020-12-14 02:25:35.565 189 DEBUG tempest.lib.common.rest_client [req-254c08c1-fe2b-47c9-a445-e2d988309ba4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-254c08c1-fe2b-47c9-a445-e2d988309ba4', 'x-compute-request-id': 'req-254c08c1-fe2b-47c9-a445-e2d988309ba4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:36.142 197 INFO tempest.lib.common.rest_client [req-a56710f7-9c05-4ea0-8d80-483a50670ffd ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/1c86962a-daba-420b-9ac7-dd4b82c6e86e 1.093s 2020-12-14 02:25:36.145 197 DEBUG tempest.lib.common.rest_client [req-a56710f7-9c05-4ea0-8d80-483a50670ffd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-a56710f7-9c05-4ea0-8d80-483a50670ffd', 'date': 'Mon, 14 Dec 2020 02:25:36 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/1c86962a-daba-420b-9ac7-dd4b82c6e86e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:36.217 197 INFO tempest.lib.common.rest_client [req-15208186-b03c-4ae9-94f2-bf6b0483a631 ] Request (RouterRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/ports?device_id=49ef3c27-7ca0-45f3-b6ce-9f30c0361932 0.065s 2020-12-14 02:25:36.219 197 DEBUG tempest.lib.common.rest_client [req-15208186-b03c-4ae9-94f2-bf6b0483a631 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '12', 'x-openstack-request-id': 'req-15208186-b03c-4ae9-94f2-bf6b0483a631', 'date': 'Mon, 14 Dec 2020 02:25:36 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?device_id=49ef3c27-7ca0-45f3-b6ce-9f30c0361932'} Body: b'{"ports":[]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:36.306 197 INFO tempest.lib.common.rest_client [req-96f54b4b-e202-4648-a6c8-b955fdefd581 ] Request (RouterRbacTest:tearDownClass): 404 DELETE http://172.30.13.94:9696/v2.0/routers/49ef3c27-7ca0-45f3-b6ce-9f30c0361932 0.080s 2020-12-14 02:25:36.309 197 DEBUG tempest.lib.common.rest_client [req-96f54b4b-e202-4648-a6c8-b955fdefd581 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '135', 'x-openstack-request-id': 'req-96f54b4b-e202-4648-a6c8-b955fdefd581', 'date': 'Mon, 14 Dec 2020 02:25:36 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/49ef3c27-7ca0-45f3-b6ce-9f30c0361932'} Body: b'{"NeutronError": {"type": "RouterNotFound", "message": "Router 49ef3c27-7ca0-45f3-b6ce-9f30c0361932 could not be found", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:36.406 197 INFO tempest.lib.common.rest_client [req-4d2ce76f-6efb-4a31-8cb0-4bfb019bc3ad ] Request (RouterRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/ports?device_id=5064736a-9d86-4c1e-a761-5736c97d099b 0.090s 2020-12-14 02:25:36.408 197 DEBUG tempest.lib.common.rest_client [req-4d2ce76f-6efb-4a31-8cb0-4bfb019bc3ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '12', 'x-openstack-request-id': 'req-4d2ce76f-6efb-4a31-8cb0-4bfb019bc3ad', 'date': 'Mon, 14 Dec 2020 02:25:36 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?device_id=5064736a-9d86-4c1e-a761-5736c97d099b'} Body: b'{"ports":[]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:36.803 197 INFO tempest.lib.common.rest_client [req-db53b2f3-49bf-4ae3-aaa3-046daa976c81 ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/5064736a-9d86-4c1e-a761-5736c97d099b 0.389s 2020-12-14 02:25:36.806 197 DEBUG tempest.lib.common.rest_client [req-db53b2f3-49bf-4ae3-aaa3-046daa976c81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-db53b2f3-49bf-4ae3-aaa3-046daa976c81', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:25:36 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/5064736a-9d86-4c1e-a761-5736c97d099b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:36.865 189 INFO tempest.lib.common.rest_client [req-61eede0d-9801-43c0-81fc-baacd900d002 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.219s 2020-12-14 02:25:36.869 189 DEBUG tempest.lib.common.rest_client [req-61eede0d-9801-43c0-81fc-baacd900d002 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-61eede0d-9801-43c0-81fc-baacd900d002', 'x-compute-request-id': 'req-61eede0d-9801-43c0-81fc-baacd900d002', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:37.303 197 INFO tempest.lib.common.rest_client [req-786571d6-edfc-4dee-a009-2ef0b783e5d0 ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/3bc6f1dc-4db7-42db-a622-7ca8dc918921 0.489s 2020-12-14 02:25:37.306 197 DEBUG tempest.lib.common.rest_client [req-786571d6-edfc-4dee-a009-2ef0b783e5d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-786571d6-edfc-4dee-a009-2ef0b783e5d0', 'date': 'Mon, 14 Dec 2020 02:25:37 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/3bc6f1dc-4db7-42db-a622-7ca8dc918921'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:38.191 189 INFO tempest.lib.common.rest_client [req-2aa6922b-bc16-4de6-8ddc-f61e985f204d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.214s 2020-12-14 02:25:38.194 189 DEBUG tempest.lib.common.rest_client [req-2aa6922b-bc16-4de6-8ddc-f61e985f204d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2aa6922b-bc16-4de6-8ddc-f61e985f204d', 'x-compute-request-id': 'req-2aa6922b-bc16-4de6-8ddc-f61e985f204d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:38.262 197 INFO tempest.lib.common.rest_client [req-d7d06580-5b30-45e4-93db-bea895e6a4df ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/bbfb5a6a-cfd8-4aac-91e7-2886f97908b8 0.950s 2020-12-14 02:25:38.264 197 DEBUG tempest.lib.common.rest_client [req-d7d06580-5b30-45e4-93db-bea895e6a4df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-d7d06580-5b30-45e4-93db-bea895e6a4df', 'date': 'Mon, 14 Dec 2020 02:25:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/bbfb5a6a-cfd8-4aac-91e7-2886f97908b8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:38.314 197 INFO tempest.lib.common.rest_client [req-fce8a1f1-0cd2-42b2-b9ed-0555f9aa8706 ] Request (RouterRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/ports?device_id=8ad96c55-7b62-4106-ab4d-4aa043bc0c65 0.045s 2020-12-14 02:25:38.316 197 DEBUG tempest.lib.common.rest_client [req-fce8a1f1-0cd2-42b2-b9ed-0555f9aa8706 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '12', 'x-openstack-request-id': 'req-fce8a1f1-0cd2-42b2-b9ed-0555f9aa8706', 'date': 'Mon, 14 Dec 2020 02:25:38 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/ports?device_id=8ad96c55-7b62-4106-ab4d-4aa043bc0c65'} Body: b'{"ports":[]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:38.686 197 INFO tempest.lib.common.rest_client [req-108273a2-f420-4d86-86cd-93d3cce69449 ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65 0.364s 2020-12-14 02:25:38.690 197 DEBUG tempest.lib.common.rest_client [req-108273a2-f420-4d86-86cd-93d3cce69449 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-108273a2-f420-4d86-86cd-93d3cce69449', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:25:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/8ad96c55-7b62-4106-ab4d-4aa043bc0c65'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:39.189 197 INFO tempest.lib.common.rest_client [req-289903e6-e3b1-4f39-8423-091b60e91e7b ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/baf8c094-0247-4dd9-8d1b-3a91617da6b5 0.490s 2020-12-14 02:25:39.192 197 DEBUG tempest.lib.common.rest_client [req-289903e6-e3b1-4f39-8423-091b60e91e7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-289903e6-e3b1-4f39-8423-091b60e91e7b', 'date': 'Mon, 14 Dec 2020 02:25:39 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/baf8c094-0247-4dd9-8d1b-3a91617da6b5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:39.748 189 INFO tempest.lib.common.rest_client [req-e3a63d2f-0eac-4474-b949-82dbfc7b051d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.446s 2020-12-14 02:25:39.751 189 DEBUG tempest.lib.common.rest_client [req-e3a63d2f-0eac-4474-b949-82dbfc7b051d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e3a63d2f-0eac-4474-b949-82dbfc7b051d', 'x-compute-request-id': 'req-e3a63d2f-0eac-4474-b949-82dbfc7b051d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:40.212 197 INFO tempest.lib.common.rest_client [req-4b71021a-6253-414d-a221-2dc6bf02349b ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/44f8e2c3-3949-47fe-acf1-76b06d8296b9 1.014s 2020-12-14 02:25:40.214 197 DEBUG tempest.lib.common.rest_client [req-4b71021a-6253-414d-a221-2dc6bf02349b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-4b71021a-6253-414d-a221-2dc6bf02349b', 'date': 'Mon, 14 Dec 2020 02:25:40 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/44f8e2c3-3949-47fe-acf1-76b06d8296b9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:40.400 197 INFO tempest.lib.common.rest_client [req-c4c0d989-ccdc-416b-8b4a-deccbdb6e7ac ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/fe2f0cae66134f229c0d67cd4fbb1b0e 0.178s 2020-12-14 02:25:40.404 197 DEBUG tempest.lib.common.rest_client [req-c4c0d989-ccdc-416b-8b4a-deccbdb6e7ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c4c0d989-ccdc-416b-8b4a-deccbdb6e7ac', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/fe2f0cae66134f229c0d67cd4fbb1b0e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:40.522 197 INFO tempest.lib.common.rest_client [req-1588a2fe-e6c0-4761-ada2-ce712fa8829f ] Request (RouterRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:25:40.526 197 DEBUG tempest.lib.common.rest_client [req-1588a2fe-e6c0-4761-ada2-ce712fa8829f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1588a2fe-e6c0-4761-ada2-ce712fa8829f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["d3j1LFUuSpm80clthEs36g"], "expires_at": "2020-12-14T03:25:40.000000Z", "issued_at": "2020-12-14T02:25:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:40.730 197 INFO tempest.lib.common.rest_client [req-eca4265f-7ef5-448e-a0c0-2b3d6a213152 ] Request (RouterRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ac4c492395da44859cb68eea226ed5a1&name=default 0.196s 2020-12-14 02:25:40.733 197 DEBUG tempest.lib.common.rest_client [req-eca4265f-7ef5-448e-a0c0-2b3d6a213152 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-eca4265f-7ef5-448e-a0c0-2b3d6a213152', 'date': 'Mon, 14 Dec 2020 02:25:40 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ac4c492395da44859cb68eea226ed5a1&name=default'} Body: b'{"security_groups": [{"id": "d10ffba1-daee-414a-8df2-904b561a248f", "name": "default", "stateful": true, "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "description": "Default security group", "security_group_rules": [{"id": "16284b7a-7fa9-41fc-b67a-a91214e06d16", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "security_group_id": "d10ffba1-daee-414a-8df2-904b561a248f", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:24:20Z", "updated_at": "2020-12-14T02:24:20Z", "revision_number": 0, "project_id": "ac4c492395da44859cb68eea226ed5a1"}, {"id": "1b627264-646f-4dc6-bdf5-ee1d9e01ce7c", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "security_group_id": "d10ffba1-daee-414a-8df2-904b561a248f", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d10ffba1-daee-414a-8df2-904b561a248f", "description": null, "tags": [], "created_at": "2020-12-14T02:24:20Z", "updated_at": "2020-12-14T02:24:20Z", "revision_number": 0, "project_id": "ac4c492395da44859cb68eea226ed5a1"}, {"id": "a3d93810-4165-4fce-98ee-c0d1e2e3cf38", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "security_group_id": "d10ffba1-daee-414a-8df2-904b561a248f", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:24:20Z", "updated_at": "2020-12-14T02:24:20Z", "revision_number": 0, "project_id": "ac4c492395da44859cb68eea226ed5a1"}, {"id": "b721c511-4e65-44f7-bc9b-5a9c8a8724c1", "tenant_id": "ac4c492395da44859cb68eea226ed5a1", "security_group_id": "d10ffba1-daee-414a-8df2-904b561a248f", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d10ffba1-daee-414a-8df2-904b561a248f", "description": null, "tags": [], "created_at": "2020-12-14T02:24:20Z", "updated_at": "2020-12-14T02:24:20Z", "revision_number": 0, "project_id": "ac4c492395da44859cb68eea226ed5a1"}], "tags": [], "created_at": "2020-12-14T02:24:20Z", "updated_at": "2020-12-14T02:24:20Z", "revision_number": 1, "project_id": "ac4c492395da44859cb68eea226ed5a1"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:40.877 197 INFO tempest.lib.common.rest_client [req-d3302405-1472-4b20-b343-356e0d903632 ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/d10ffba1-daee-414a-8df2-904b561a248f 0.137s 2020-12-14 02:25:40.880 197 DEBUG tempest.lib.common.rest_client [req-d3302405-1472-4b20-b343-356e0d903632 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-d3302405-1472-4b20-b343-356e0d903632', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:25:40 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/d10ffba1-daee-414a-8df2-904b561a248f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:41.033 197 INFO tempest.lib.common.rest_client [req-bcbf73bd-ad8a-4ad8-bd11-59e9ce1bc334 ] Request (RouterRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1 0.144s 2020-12-14 02:25:41.036 197 DEBUG tempest.lib.common.rest_client [req-bcbf73bd-ad8a-4ad8-bd11-59e9ce1bc334 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bcbf73bd-ad8a-4ad8-bd11-59e9ce1bc334', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac4c492395da44859cb68eea226ed5a1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:41.060 189 INFO tempest.lib.common.rest_client [req-a001b96f-67e0-4f6c-b9ef-c56078d61396 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.202s 2020-12-14 02:25:41.065 189 DEBUG tempest.lib.common.rest_client [req-a001b96f-67e0-4f6c-b9ef-c56078d61396 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a001b96f-67e0-4f6c-b9ef-c56078d61396', 'x-compute-request-id': 'req-a001b96f-67e0-4f6c-b9ef-c56078d61396', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:41.198 197 INFO tempest.lib.common.rest_client [req-be902581-b616-4081-9b6b-7243a7920c8e ] Request (SubnetPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.136s 2020-12-14 02:25:41.201 197 DEBUG tempest.lib.common.rest_client [req-be902581-b616-4081-9b6b-7243a7920c8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be902581-b616-4081-9b6b-7243a7920c8e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["G_l17_PrR8OmrCroPj8KdQ"], "expires_at": "2020-12-14T03:25:41.000000Z", "issued_at": "2020-12-14T02:25:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:41.310 197 INFO tempest.lib.common.rest_client [req-95dd12e5-7ca6-405a-8fba-eb2317444fc2 ] Request (SubnetPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.057s 2020-12-14 02:25:41.313 197 DEBUG tempest.lib.common.rest_client [req-95dd12e5-7ca6-405a-8fba-eb2317444fc2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95dd12e5-7ca6-405a-8fba-eb2317444fc2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["f30nWMRgQPee9kNQIFseMw"], "expires_at": "2020-12-14T03:25:41.000000Z", "issued_at": "2020-12-14T02:25:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:41.395 197 INFO tempest.lib.common.rest_client [req-a00919d1-03cd-4927-ba94-b58232f9b5b1 ] Request (SubnetPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.074s 2020-12-14 02:25:41.399 197 DEBUG tempest.lib.common.rest_client [req-a00919d1-03cd-4927-ba94-b58232f9b5b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a00919d1-03cd-4927-ba94-b58232f9b5b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:41.493 197 INFO tempest.lib.common.rest_client [req-560deb21-c12f-4183-8e8d-3be93d46e8b1 ] Request (SubnetPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.087s 2020-12-14 02:25:41.495 197 DEBUG tempest.lib.common.rest_client [req-560deb21-c12f-4183-8e8d-3be93d46e8b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SubnetPoolsRbacTest-1240713327-desc", "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1240713327"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-560deb21-c12f-4183-8e8d-3be93d46e8b1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327", "domain_id": "default", "description": "tempest-SubnetPoolsRbacTest-1240713327-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:41.631 197 INFO tempest.lib.common.rest_client [req-6f0cb9f8-18c5-4c53-a585-16f99a8a2f11 ] Request (SubnetPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.127s 2020-12-14 02:25:41.634 197 DEBUG tempest.lib.common.rest_client [req-6f0cb9f8-18c5-4c53-a585-16f99a8a2f11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SubnetPoolsRbacTest-1240713327", "password": "M0~zKx+aWlR76Je", "project_id": "34bf9bdc593b4eb8a867a5e9c290341c", "email": "tempest-SubnetPoolsRbacTest-1826716158@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '394', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f0cb9f8-18c5-4c53-a585-16f99a8a2f11', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "34bf9bdc593b4eb8a867a5e9c290341c", "email": "tempest-SubnetPoolsRbacTest-1826716158@example.com", "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/791e25dc8005410a91ea6af4cd93dd63"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:41.723 197 INFO tempest.lib.common.rest_client [req-158eb837-0680-4e14-b9ec-595fd9223fd4 ] Request (SubnetPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.078s 2020-12-14 02:25:41.726 197 DEBUG tempest.lib.common.rest_client [req-158eb837-0680-4e14-b9ec-595fd9223fd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-158eb837-0680-4e14-b9ec-595fd9223fd4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:41.801 197 INFO tempest.lib.common.rest_client [req-09ca5cec-3c31-48ae-aacf-4d4b0337f476 ] Request (SubnetPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-12-14 02:25:41.804 197 DEBUG tempest.lib.common.rest_client [req-09ca5cec-3c31-48ae-aacf-4d4b0337f476 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-09ca5cec-3c31-48ae-aacf-4d4b0337f476', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:41.918 197 INFO tempest.lib.common.rest_client [req-7d5b72b0-a2a5-4da0-9d19-4dc2caec65c2 ] Request (SubnetPoolsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles/72a4576c553448cd941b052c1ca0cf2d 0.105s 2020-12-14 02:25:41.921 197 DEBUG tempest.lib.common.rest_client [req-7d5b72b0-a2a5-4da0-9d19-4dc2caec65c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d5b72b0-a2a5-4da0-9d19-4dc2caec65c2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:41.926 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SubnetPoolsRbacTest-1240713327', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '34bf9bdc593b4eb8a867a5e9c290341c', 'project_name': 'tempest-SubnetPoolsRbacTest-1240713327', 'tenant_id': '34bf9bdc593b4eb8a867a5e9c290341c', 'tenant_name': 'tempest-SubnetPoolsRbacTest-1240713327', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '791e25dc8005410a91ea6af4cd93dd63'}, Network: None, Subnet: None, Router: None 2020-12-14 02:25:41.930 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SubnetPoolsRbacTest-1240713327', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '34bf9bdc593b4eb8a867a5e9c290341c', 'project_name': 'tempest-SubnetPoolsRbacTest-1240713327', 'tenant_id': '34bf9bdc593b4eb8a867a5e9c290341c', 'tenant_name': 'tempest-SubnetPoolsRbacTest-1240713327', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '791e25dc8005410a91ea6af4cd93dd63'}, Network: None, Subnet: None, Router: None 2020-12-14 02:25:42.138 197 INFO tempest.lib.common.rest_client [req-bd299277-4341-4f22-9496-23234944c017 ] Request (SubnetPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.140s 2020-12-14 02:25:42.143 197 DEBUG tempest.lib.common.rest_client [req-bd299277-4341-4f22-9496-23234944c017 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd299277-4341-4f22-9496-23234944c017', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["6AqpRUkQQWGWc2NCvMGaXg"], "expires_at": "2020-12-14T03:25:42.000000Z", "issued_at": "2020-12-14T02:25:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:42.266 197 INFO tempest.lib.common.rest_client [req-34340347-923e-4044-8c88-b49081d55924 ] Request (SubnetPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:25:42.269 197 DEBUG tempest.lib.common.rest_client [req-34340347-923e-4044-8c88-b49081d55924 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34340347-923e-4044-8c88-b49081d55924', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["MM4nD5ZOTQ-I6exeucNljw"], "expires_at": "2020-12-14T03:25:42.000000Z", "issued_at": "2020-12-14T02:25:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:42.388 197 INFO tempest.lib.common.rest_client [req-5d9aa533-d736-4cf7-8ce1-f29a8aaaa5a2 ] Request (SubnetPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:25:42.391 197 DEBUG tempest.lib.common.rest_client [req-5d9aa533-d736-4cf7-8ce1-f29a8aaaa5a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d9aa533-d736-4cf7-8ce1-f29a8aaaa5a2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["dMhLWm7CT5SsshAIqLkw0A"], "expires_at": "2020-12-14T03:25:42.000000Z", "issued_at": "2020-12-14T02:25:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:42.411 189 INFO tempest.lib.common.rest_client [req-9fa687f7-de0c-4362-a26f-d06902a4af70 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.239s 2020-12-14 02:25:42.414 189 DEBUG tempest.lib.common.rest_client [req-9fa687f7-de0c-4362-a26f-d06902a4af70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9fa687f7-de0c-4362-a26f-d06902a4af70', 'x-compute-request-id': 'req-9fa687f7-de0c-4362-a26f-d06902a4af70', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:42.470 197 INFO tempest.lib.common.rest_client [req-07cc0bd2-19ba-48cc-a016-fc7689d3e63d ] Request (SubnetPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.072s 2020-12-14 02:25:42.474 197 DEBUG tempest.lib.common.rest_client [req-07cc0bd2-19ba-48cc-a016-fc7689d3e63d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07cc0bd2-19ba-48cc-a016-fc7689d3e63d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:42.540 197 INFO tempest.lib.common.rest_client [req-e9009d94-a97e-4712-8f90-3fdd0a5cdd60 ] Request (SubnetPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:25:42.544 197 DEBUG tempest.lib.common.rest_client [req-e9009d94-a97e-4712-8f90-3fdd0a5cdd60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9009d94-a97e-4712-8f90-3fdd0a5cdd60', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:42.548 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:25:42.550 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:42.619 197 INFO tempest.lib.common.rest_client [req-5093dfa1-6cd4-4b5e-a38f-2fb991755571 ] Request (SubnetPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.062s 2020-12-14 02:25:42.622 197 DEBUG tempest.lib.common.rest_client [req-5093dfa1-6cd4-4b5e-a38f-2fb991755571 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5093dfa1-6cd4-4b5e-a38f-2fb991755571', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:42.700 197 INFO tempest.lib.common.rest_client [req-8ca7dce3-a3e9-4911-bb70-f69cdeca9bef ] Request (SubnetPoolsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles/72a4576c553448cd941b052c1ca0cf2d 0.072s 2020-12-14 02:25:42.702 197 DEBUG tempest.lib.common.rest_client [req-8ca7dce3-a3e9-4911-bb70-f69cdeca9bef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ca7dce3-a3e9-4911-bb70-f69cdeca9bef', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:42.824 197 INFO tempest.lib.common.rest_client [req-8403ef03-0166-4c7e-b4b9-50431e0e3df7 ] Request (SubnetPoolsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles/a629c95d64b3416fb80ae90af4f69c05 0.116s 2020-12-14 02:25:42.826 197 DEBUG tempest.lib.common.rest_client [req-8403ef03-0166-4c7e-b4b9-50431e0e3df7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8403ef03-0166-4c7e-b4b9-50431e0e3df7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:43.739 189 INFO tempest.lib.common.rest_client [req-dfb78be0-3e84-4ecf-ad55-21d0d2b1a4f9 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.216s 2020-12-14 02:25:43.743 189 DEBUG tempest.lib.common.rest_client [req-dfb78be0-3e84-4ecf-ad55-21d0d2b1a4f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dfb78be0-3e84-4ecf-ad55-21d0d2b1a4f9', 'x-compute-request-id': 'req-dfb78be0-3e84-4ecf-ad55-21d0d2b1a4f9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:43.937 197 INFO tempest.lib.common.rest_client [req-bf115a74-67f7-43b4-a6ef-418bdc8a20d4 ] Request (SubnetPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:25:43.940 197 DEBUG tempest.lib.common.rest_client [req-bf115a74-67f7-43b4-a6ef-418bdc8a20d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf115a74-67f7-43b4-a6ef-418bdc8a20d4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["7h4A-zrRSMO2jZNxFETSow"], "expires_at": "2020-12-14T03:25:43.000000Z", "issued_at": "2020-12-14T02:25:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:43.957 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:43.983 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_subnetpool, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:43.985 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:44.129 197 INFO tempest.lib.common.rest_client [req-8c56aa6d-47e3-434c-84c1-549fc5ac4081 ] Request (SubnetPoolsRbacTest:test_create_subnetpool): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.136s 2020-12-14 02:25:44.133 197 DEBUG tempest.lib.common.rest_client [req-8c56aa6d-47e3-434c-84c1-549fc5ac4081 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c56aa6d-47e3-434c-84c1-549fc5ac4081', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:44.193 197 INFO tempest.lib.common.rest_client [req-232ff47a-72bd-4e1c-a036-6465c337e55b ] Request (SubnetPoolsRbacTest:test_create_subnetpool): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:25:44.196 197 DEBUG tempest.lib.common.rest_client [req-232ff47a-72bd-4e1c-a036-6465c337e55b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-232ff47a-72bd-4e1c-a036-6465c337e55b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["uQj3vM9cQjWT-NmkBJrNLg"], "expires_at": "2020-12-14T03:25:44.000000Z", "issued_at": "2020-12-14T02:25:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:44.637 197 INFO tempest.lib.common.rest_client [req-2f59307c-32b1-42b9-bd1b-0df2f8a024f7 ] Request (SubnetPoolsRbacTest:test_create_subnetpool): 201 POST http://172.30.13.94:9696/v2.0/subnetpools 0.433s 2020-12-14 02:25:44.639 197 DEBUG tempest.lib.common.rest_client [req-2f59307c-32b1-42b9-bd1b-0df2f8a024f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"name": "tempest-SubnetPoolsRbacTest-466696869", "min_prefixlen": 24, "max_prefixlen": 32, "prefixes": ["192.168.120.0/24"]}} Response - Headers: {'content-type': 'application/json', 'content-length': '550', 'x-openstack-request-id': 'req-2f59307c-32b1-42b9-bd1b-0df2f8a024f7', 'date': 'Mon, 14 Dec 2020 02:25:44 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools'} Body: b'{"subnetpool": {"id": "8f88569c-7759-4d23-9021-9d825b5e9696", "name": "tempest-SubnetPoolsRbacTest-466696869", "tenant_id": "34bf9bdc593b4eb8a867a5e9c290341c", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": false, "shared": false, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-12-14T02:25:44Z", "updated_at": "2020-12-14T02:25:44Z", "revision_number": 0, "project_id": "34bf9bdc593b4eb8a867a5e9c290341c"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:44.642 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:44.719 197 INFO tempest.lib.common.rest_client [req-56231acb-4b74-4d6f-887e-b3d781525c50 ] Request (SubnetPoolsRbacTest:test_create_subnetpool): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.071s 2020-12-14 02:25:44.722 197 DEBUG tempest.lib.common.rest_client [req-56231acb-4b74-4d6f-887e-b3d781525c50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56231acb-4b74-4d6f-887e-b3d781525c50', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:44.768 197 INFO tempest.lib.common.rest_client [req-3249ae81-304f-4733-8d44-b81e7395b7a7 ] Request (SubnetPoolsRbacTest:test_create_subnetpool): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:25:44.771 197 DEBUG tempest.lib.common.rest_client [req-3249ae81-304f-4733-8d44-b81e7395b7a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3249ae81-304f-4733-8d44-b81e7395b7a7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["u54Ix_BjT7adagJ2M9Sl5w"], "expires_at": "2020-12-14T03:25:44.000000Z", "issued_at": "2020-12-14T02:25:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:44.950 197 INFO tempest.lib.common.rest_client [req-6ce645d3-9bd9-4d87-b705-ed6a5aa6c870 ] Request (SubnetPoolsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/subnetpools/8f88569c-7759-4d23-9021-9d825b5e9696 0.170s 2020-12-14 02:25:44.952 197 DEBUG tempest.lib.common.rest_client [req-6ce645d3-9bd9-4d87-b705-ed6a5aa6c870 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6ce645d3-9bd9-4d87-b705-ed6a5aa6c870', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:25:44 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/8f88569c-7759-4d23-9021-9d825b5e9696'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:44.968 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:44.996 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_subnetpool, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:44.999 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:45.022 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_subnetpool:is_default, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:45.044 189 INFO tempest.lib.common.rest_client [req-1510581f-32b2-4e9d-8584-cfb1e0fc7701 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.194s 2020-12-14 02:25:45.047 189 DEBUG tempest.lib.common.rest_client [req-1510581f-32b2-4e9d-8584-cfb1e0fc7701 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1510581f-32b2-4e9d-8584-cfb1e0fc7701', 'x-compute-request-id': 'req-1510581f-32b2-4e9d-8584-cfb1e0fc7701', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:45.071 197 INFO tempest.lib.common.rest_client [req-3a1c7aea-0048-4f8a-a9e6-2db352139899 ] Request (SubnetPoolsRbacTest:test_create_subnetpool_default): 200 GET http://172.30.13.94:9696/v2.0/subnetpools?is_default=True 0.043s 2020-12-14 02:25:45.074 197 DEBUG tempest.lib.common.rest_client [req-3a1c7aea-0048-4f8a-a9e6-2db352139899 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1069', 'x-openstack-request-id': 'req-3a1c7aea-0048-4f8a-a9e6-2db352139899', 'date': 'Mon, 14 Dec 2020 02:25:45 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools?is_default=True'} Body: b'{"subnetpools": [{"id": "b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e", "name": "shared-default-subnetpool-v4", "tenant_id": "5990258dee3b412286ccca75bcab995c", "default_prefixlen": "26", "min_prefixlen": "8", "max_prefixlen": "32", "is_default": true, "shared": true, "prefixes": ["10.0.0.0/22"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-10-07T12:07:11Z", "updated_at": "2020-12-14T02:00:16Z", "revision_number": 870, "project_id": "5990258dee3b412286ccca75bcab995c"}, {"id": "f32bc1c4-caf2-4148-92ce-ea35dab4345c", "name": "shared-default-subnetpool-v6", "tenant_id": "5990258dee3b412286ccca75bcab995c", "default_prefixlen": "64", "min_prefixlen": "64", "max_prefixlen": "128", "is_default": true, "shared": true, "prefixes": ["fd45:7793:ed2b::/56"], "ip_version": 6, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-10-07T12:07:14Z", "updated_at": "2020-12-14T02:00:11Z", "revision_number": 580, "project_id": "5990258dee3b412286ccca75bcab995c"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:45.177 197 INFO tempest.lib.common.rest_client [req-895f641e-9548-469a-89e7-b19f9ef49a58 ] Request (SubnetPoolsRbacTest:test_create_subnetpool_default): 200 PUT http://172.30.13.94:9696/v2.0/subnetpools/b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e 0.096s 2020-12-14 02:25:45.180 197 DEBUG tempest.lib.common.rest_client [req-895f641e-9548-469a-89e7-b19f9ef49a58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '481', 'x-openstack-request-id': 'req-895f641e-9548-469a-89e7-b19f9ef49a58', 'date': 'Mon, 14 Dec 2020 02:25:45 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e'} Body: b'{"subnetpool": {"id": "b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e", "project_id": "5990258dee3b412286ccca75bcab995c", "name": "shared-default-subnetpool-v4", "ip_version": 4, "default_prefixlen": 26, "min_prefixlen": 8, "max_prefixlen": 32, "shared": true, "is_default": false, "revision_number": 871, "description": "", "created_at": "2020-10-07T12:07:11Z", "updated_at": "2020-12-14T02:25:45Z", "tenant_id": "5990258dee3b412286ccca75bcab995c", "prefixes": ["10.0.0.0/22"], "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:45.286 197 INFO tempest.lib.common.rest_client [req-69c89738-1051-49b8-adae-3f172fa1f35d ] Request (SubnetPoolsRbacTest:test_create_subnetpool_default): 200 PUT http://172.30.13.94:9696/v2.0/subnetpools/f32bc1c4-caf2-4148-92ce-ea35dab4345c 0.099s 2020-12-14 02:25:45.290 197 DEBUG tempest.lib.common.rest_client [req-69c89738-1051-49b8-adae-3f172fa1f35d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '491', 'x-openstack-request-id': 'req-69c89738-1051-49b8-adae-3f172fa1f35d', 'date': 'Mon, 14 Dec 2020 02:25:45 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/f32bc1c4-caf2-4148-92ce-ea35dab4345c'} Body: b'{"subnetpool": {"id": "f32bc1c4-caf2-4148-92ce-ea35dab4345c", "project_id": "5990258dee3b412286ccca75bcab995c", "name": "shared-default-subnetpool-v6", "ip_version": 6, "default_prefixlen": 64, "min_prefixlen": 64, "max_prefixlen": 128, "shared": true, "is_default": false, "revision_number": 581, "description": "", "created_at": "2020-10-07T12:07:14Z", "updated_at": "2020-12-14T02:25:45Z", "tenant_id": "5990258dee3b412286ccca75bcab995c", "prefixes": ["fd45:7793:ed2b::/56"], "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:45.295 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:45.377 197 INFO tempest.lib.common.rest_client [req-78742229-cc8a-4c4b-b945-a31f35262625 ] Request (SubnetPoolsRbacTest:test_create_subnetpool_default): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.074s 2020-12-14 02:25:45.381 197 DEBUG tempest.lib.common.rest_client [req-78742229-cc8a-4c4b-b945-a31f35262625 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78742229-cc8a-4c4b-b945-a31f35262625', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:45.436 197 INFO tempest.lib.common.rest_client [req-31a6b23f-06de-4669-a7c8-abb8daebaccd ] Request (SubnetPoolsRbacTest:test_create_subnetpool_default): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:25:45.439 197 DEBUG tempest.lib.common.rest_client [req-31a6b23f-06de-4669-a7c8-abb8daebaccd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31a6b23f-06de-4669-a7c8-abb8daebaccd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["v4w5fcI8TuGJewJyEx9OnA"], "expires_at": "2020-12-14T03:25:45.000000Z", "issued_at": "2020-12-14T02:25:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:45.825 197 INFO tempest.lib.common.rest_client [req-2a5e5f7d-bec8-4375-8167-a9c7f515f12b ] Request (SubnetPoolsRbacTest:test_create_subnetpool_default): 201 POST http://172.30.13.94:9696/v2.0/subnetpools 0.377s 2020-12-14 02:25:45.829 197 DEBUG tempest.lib.common.rest_client [req-2a5e5f7d-bec8-4375-8167-a9c7f515f12b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"name": "tempest-SubnetPoolsRbacTest-1616991629", "min_prefixlen": 24, "max_prefixlen": 32, "prefixes": ["192.168.120.0/24"], "is_default": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '550', 'x-openstack-request-id': 'req-2a5e5f7d-bec8-4375-8167-a9c7f515f12b', 'date': 'Mon, 14 Dec 2020 02:25:45 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools'} Body: b'{"subnetpool": {"id": "59d30e52-0ae5-4269-b941-877861eee018", "name": "tempest-SubnetPoolsRbacTest-1616991629", "tenant_id": "34bf9bdc593b4eb8a867a5e9c290341c", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": true, "shared": false, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-12-14T02:25:45Z", "updated_at": "2020-12-14T02:25:45Z", "revision_number": 0, "project_id": "34bf9bdc593b4eb8a867a5e9c290341c"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:45.832 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:45.907 197 INFO tempest.lib.common.rest_client [req-cd94bb4d-8dbc-4945-a043-9193e68063df ] Request (SubnetPoolsRbacTest:test_create_subnetpool_default): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.070s 2020-12-14 02:25:45.910 197 DEBUG tempest.lib.common.rest_client [req-cd94bb4d-8dbc-4945-a043-9193e68063df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd94bb4d-8dbc-4945-a043-9193e68063df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:45.967 197 INFO tempest.lib.common.rest_client [req-95d8df0e-6bb3-4867-983a-0ef8c3a30169 ] Request (SubnetPoolsRbacTest:test_create_subnetpool_default): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:25:45.970 197 DEBUG tempest.lib.common.rest_client [req-95d8df0e-6bb3-4867-983a-0ef8c3a30169 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95d8df0e-6bb3-4867-983a-0ef8c3a30169', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["RPT66iXiReqbTzQDD61Uxw"], "expires_at": "2020-12-14T03:25:45.000000Z", "issued_at": "2020-12-14T02:25:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:46.148 197 INFO tempest.lib.common.rest_client [req-0f748c7a-81f3-4d83-96a3-23661f4ef702 ] Request (SubnetPoolsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/subnetpools/59d30e52-0ae5-4269-b941-877861eee018 0.168s 2020-12-14 02:25:46.150 197 DEBUG tempest.lib.common.rest_client [req-0f748c7a-81f3-4d83-96a3-23661f4ef702 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-0f748c7a-81f3-4d83-96a3-23661f4ef702', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:25:46 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/59d30e52-0ae5-4269-b941-877861eee018'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:46.292 197 INFO tempest.lib.common.rest_client [req-78c16440-e1f7-4f1d-9a6d-b8acea4cdec3 ] Request (SubnetPoolsRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/subnetpools/f32bc1c4-caf2-4148-92ce-ea35dab4345c 0.134s 2020-12-14 02:25:46.295 197 DEBUG tempest.lib.common.rest_client [req-78c16440-e1f7-4f1d-9a6d-b8acea4cdec3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"is_default": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '490', 'x-openstack-request-id': 'req-78c16440-e1f7-4f1d-9a6d-b8acea4cdec3', 'date': 'Mon, 14 Dec 2020 02:25:46 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/f32bc1c4-caf2-4148-92ce-ea35dab4345c'} Body: b'{"subnetpool": {"id": "f32bc1c4-caf2-4148-92ce-ea35dab4345c", "project_id": "5990258dee3b412286ccca75bcab995c", "name": "shared-default-subnetpool-v6", "ip_version": 6, "default_prefixlen": 64, "min_prefixlen": 64, "max_prefixlen": 128, "shared": true, "is_default": true, "revision_number": 582, "description": "", "created_at": "2020-10-07T12:07:14Z", "updated_at": "2020-12-14T02:25:46Z", "tenant_id": "5990258dee3b412286ccca75bcab995c", "prefixes": ["fd45:7793:ed2b::/56"], "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:46.377 189 INFO tempest.lib.common.rest_client [req-119e9534-87c6-4a52-9962-6d8a77b165b4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.222s 2020-12-14 02:25:46.380 189 DEBUG tempest.lib.common.rest_client [req-119e9534-87c6-4a52-9962-6d8a77b165b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-119e9534-87c6-4a52-9962-6d8a77b165b4', 'x-compute-request-id': 'req-119e9534-87c6-4a52-9962-6d8a77b165b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:46.391 197 INFO tempest.lib.common.rest_client [req-7ccd6e96-5aaf-4e2b-8d28-f0f9ea0895e7 ] Request (SubnetPoolsRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/subnetpools/b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e 0.089s 2020-12-14 02:25:46.394 197 DEBUG tempest.lib.common.rest_client [req-7ccd6e96-5aaf-4e2b-8d28-f0f9ea0895e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"is_default": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '480', 'x-openstack-request-id': 'req-7ccd6e96-5aaf-4e2b-8d28-f0f9ea0895e7', 'date': 'Mon, 14 Dec 2020 02:25:46 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e'} Body: b'{"subnetpool": {"id": "b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e", "project_id": "5990258dee3b412286ccca75bcab995c", "name": "shared-default-subnetpool-v4", "ip_version": 4, "default_prefixlen": 26, "min_prefixlen": 8, "max_prefixlen": 32, "shared": true, "is_default": true, "revision_number": 872, "description": "", "created_at": "2020-10-07T12:07:11Z", "updated_at": "2020-12-14T02:25:46Z", "tenant_id": "5990258dee3b412286ccca75bcab995c", "prefixes": ["10.0.0.0/22"], "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:46.408 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:46.431 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_subnetpool, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:46.433 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:46.456 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_subnetpool:shared, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:46.458 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:46.537 197 INFO tempest.lib.common.rest_client [req-658ed904-d0bb-4c6c-b8e2-2f7a8ecaa80c ] Request (SubnetPoolsRbacTest:test_create_subnetpool_shared): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.073s 2020-12-14 02:25:46.540 197 DEBUG tempest.lib.common.rest_client [req-658ed904-d0bb-4c6c-b8e2-2f7a8ecaa80c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-658ed904-d0bb-4c6c-b8e2-2f7a8ecaa80c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:46.594 197 INFO tempest.lib.common.rest_client [req-ca9afc1c-875a-4761-b3f5-80fc890fb5a6 ] Request (SubnetPoolsRbacTest:test_create_subnetpool_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:25:46.597 197 DEBUG tempest.lib.common.rest_client [req-ca9afc1c-875a-4761-b3f5-80fc890fb5a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca9afc1c-875a-4761-b3f5-80fc890fb5a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["vSUgniBYTdWdUcuFR7rr_Q"], "expires_at": "2020-12-14T03:25:46.000000Z", "issued_at": "2020-12-14T02:25:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:46.926 197 INFO tempest.lib.common.rest_client [req-5da561c5-8c0a-4d7c-bf4b-95d318bac5b2 ] Request (SubnetPoolsRbacTest:test_create_subnetpool_shared): 201 POST http://172.30.13.94:9696/v2.0/subnetpools 0.319s 2020-12-14 02:25:46.929 197 DEBUG tempest.lib.common.rest_client [req-5da561c5-8c0a-4d7c-bf4b-95d318bac5b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"name": "tempest-SubnetPoolsRbacTest-1425478920", "min_prefixlen": 24, "max_prefixlen": 32, "prefixes": ["192.168.120.0/24"], "shared": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '550', 'x-openstack-request-id': 'req-5da561c5-8c0a-4d7c-bf4b-95d318bac5b2', 'date': 'Mon, 14 Dec 2020 02:25:46 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools'} Body: b'{"subnetpool": {"id": "817499a6-a2ff-462c-a783-6313fbef30e5", "name": "tempest-SubnetPoolsRbacTest-1425478920", "tenant_id": "34bf9bdc593b4eb8a867a5e9c290341c", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": false, "shared": true, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-12-14T02:25:46Z", "updated_at": "2020-12-14T02:25:46Z", "revision_number": 0, "project_id": "34bf9bdc593b4eb8a867a5e9c290341c"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:46.932 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:47.005 197 INFO tempest.lib.common.rest_client [req-29518e23-9c1d-424a-9acb-31beb1826bb0 ] Request (SubnetPoolsRbacTest:test_create_subnetpool_shared): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.065s 2020-12-14 02:25:47.008 197 DEBUG tempest.lib.common.rest_client [req-29518e23-9c1d-424a-9acb-31beb1826bb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29518e23-9c1d-424a-9acb-31beb1826bb0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:47.066 197 INFO tempest.lib.common.rest_client [req-259f9864-103c-4ed8-8594-ea58d29e8df3 ] Request (SubnetPoolsRbacTest:test_create_subnetpool_shared): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:25:47.069 197 DEBUG tempest.lib.common.rest_client [req-259f9864-103c-4ed8-8594-ea58d29e8df3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-259f9864-103c-4ed8-8594-ea58d29e8df3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["E1fxZO54SDqnR1aw594Vnw"], "expires_at": "2020-12-14T03:25:47.000000Z", "issued_at": "2020-12-14T02:25:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:47.263 197 INFO tempest.lib.common.rest_client [req-466e873f-4483-48ba-93a4-13066c608231 ] Request (SubnetPoolsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/subnetpools/817499a6-a2ff-462c-a783-6313fbef30e5 0.185s 2020-12-14 02:25:47.267 197 DEBUG tempest.lib.common.rest_client [req-466e873f-4483-48ba-93a4-13066c608231 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-466e873f-4483-48ba-93a4-13066c608231', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:25:47 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/817499a6-a2ff-462c-a783-6313fbef30e5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:47.279 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:47.304 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subnetpool, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:47.307 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:47.331 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_subnetpool, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:47.557 197 INFO tempest.lib.common.rest_client [req-b096b3ee-5ab9-46e0-b490-2d3ce7d124e0 ] Request (SubnetPoolsRbacTest:test_delete_subnetpool): 201 POST http://172.30.13.94:9696/v2.0/subnetpools 0.221s 2020-12-14 02:25:47.559 197 DEBUG tempest.lib.common.rest_client [req-b096b3ee-5ab9-46e0-b490-2d3ce7d124e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"name": "tempest-SubnetPoolsRbacTest-1114055340", "min_prefixlen": 24, "max_prefixlen": 32, "prefixes": ["192.168.120.0/24"]}} Response - Headers: {'content-type': 'application/json', 'content-length': '551', 'x-openstack-request-id': 'req-b096b3ee-5ab9-46e0-b490-2d3ce7d124e0', 'date': 'Mon, 14 Dec 2020 02:25:47 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools'} Body: b'{"subnetpool": {"id": "0526b15f-a02f-4165-ad1d-39e8d03d79e4", "name": "tempest-SubnetPoolsRbacTest-1114055340", "tenant_id": "34bf9bdc593b4eb8a867a5e9c290341c", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": false, "shared": false, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-12-14T02:25:47Z", "updated_at": "2020-12-14T02:25:47Z", "revision_number": 0, "project_id": "34bf9bdc593b4eb8a867a5e9c290341c"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:47.562 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:47.632 197 INFO tempest.lib.common.rest_client [req-13aac586-a269-4a79-9d55-c35f456643ad ] Request (SubnetPoolsRbacTest:test_delete_subnetpool): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.065s 2020-12-14 02:25:47.635 197 DEBUG tempest.lib.common.rest_client [req-13aac586-a269-4a79-9d55-c35f456643ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13aac586-a269-4a79-9d55-c35f456643ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:47.694 197 INFO tempest.lib.common.rest_client [req-979b352c-6674-48c4-a015-7244e138251a ] Request (SubnetPoolsRbacTest:test_delete_subnetpool): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:25:47.698 197 DEBUG tempest.lib.common.rest_client [req-979b352c-6674-48c4-a015-7244e138251a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-979b352c-6674-48c4-a015-7244e138251a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["WUPETWVJTACQMlUdReWRwA"], "expires_at": "2020-12-14T03:25:47.000000Z", "issued_at": "2020-12-14T02:25:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:47.718 189 INFO tempest.lib.common.rest_client [req-bbe4fb82-2337-4355-aea5-ff44b055f24b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.231s 2020-12-14 02:25:47.722 189 DEBUG tempest.lib.common.rest_client [req-bbe4fb82-2337-4355-aea5-ff44b055f24b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bbe4fb82-2337-4355-aea5-ff44b055f24b', 'x-compute-request-id': 'req-bbe4fb82-2337-4355-aea5-ff44b055f24b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:47.860 197 INFO tempest.lib.common.rest_client [req-640ad7c9-319b-4047-940b-0c17fa626304 ] Request (SubnetPoolsRbacTest:test_delete_subnetpool): 204 DELETE http://172.30.13.94:9696/v2.0/subnetpools/0526b15f-a02f-4165-ad1d-39e8d03d79e4 0.155s 2020-12-14 02:25:47.863 197 DEBUG tempest.lib.common.rest_client [req-640ad7c9-319b-4047-940b-0c17fa626304 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-640ad7c9-319b-4047-940b-0c17fa626304', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:25:47 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/0526b15f-a02f-4165-ad1d-39e8d03d79e4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:47.866 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:47.935 197 INFO tempest.lib.common.rest_client [req-f94efb39-41fd-41dd-98cd-e5793f705959 ] Request (SubnetPoolsRbacTest:test_delete_subnetpool): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.059s 2020-12-14 02:25:47.941 197 DEBUG tempest.lib.common.rest_client [req-f94efb39-41fd-41dd-98cd-e5793f705959 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f94efb39-41fd-41dd-98cd-e5793f705959', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:47.994 197 INFO tempest.lib.common.rest_client [req-b3dfb388-32df-4b59-b600-5f684184a8a5 ] Request (SubnetPoolsRbacTest:test_delete_subnetpool): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:25:47.997 197 DEBUG tempest.lib.common.rest_client [req-b3dfb388-32df-4b59-b600-5f684184a8a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3dfb388-32df-4b59-b600-5f684184a8a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["4BabQ952SrWuYR2xA5S6rA"], "expires_at": "2020-12-14T03:25:47.000000Z", "issued_at": "2020-12-14T02:25:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:48.099 197 INFO tempest.lib.common.rest_client [req-b6e60d26-045d-451b-81e5-c4659df37410 ] Request (SubnetPoolsRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/subnetpools/0526b15f-a02f-4165-ad1d-39e8d03d79e4 0.093s 2020-12-14 02:25:48.103 197 DEBUG tempest.lib.common.rest_client [req-b6e60d26-045d-451b-81e5-c4659df37410 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '145', 'x-openstack-request-id': 'req-b6e60d26-045d-451b-81e5-c4659df37410', 'date': 'Mon, 14 Dec 2020 02:25:48 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/0526b15f-a02f-4165-ad1d-39e8d03d79e4'} Body: b'{"NeutronError": {"type": "SubnetPoolNotFound", "message": "Subnet pool 0526b15f-a02f-4165-ad1d-39e8d03d79e4 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:48.117 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:48.144 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subnetpool, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:48.447 197 INFO tempest.lib.common.rest_client [req-73373ccf-deba-4937-8aea-c50e4875bc0a ] Request (SubnetPoolsRbacTest:test_list_subnetpools): 201 POST http://172.30.13.94:9696/v2.0/subnetpools 0.296s 2020-12-14 02:25:48.451 197 DEBUG tempest.lib.common.rest_client [req-73373ccf-deba-4937-8aea-c50e4875bc0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"name": "tempest-SubnetPoolsRbacTest-566867555", "min_prefixlen": 24, "max_prefixlen": 32, "prefixes": ["192.168.120.0/24"]}} Response - Headers: {'content-type': 'application/json', 'content-length': '550', 'x-openstack-request-id': 'req-73373ccf-deba-4937-8aea-c50e4875bc0a', 'date': 'Mon, 14 Dec 2020 02:25:48 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools'} Body: b'{"subnetpool": {"id": "969e037a-dd4c-43e2-8d04-72853f9ee208", "name": "tempest-SubnetPoolsRbacTest-566867555", "tenant_id": "34bf9bdc593b4eb8a867a5e9c290341c", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": false, "shared": false, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-12-14T02:25:48Z", "updated_at": "2020-12-14T02:25:48Z", "revision_number": 0, "project_id": "34bf9bdc593b4eb8a867a5e9c290341c"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:48.456 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:48.527 197 INFO tempest.lib.common.rest_client [req-8ccf5118-562b-49f2-92f2-68981b82a39e ] Request (SubnetPoolsRbacTest:test_list_subnetpools): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.062s 2020-12-14 02:25:48.530 197 DEBUG tempest.lib.common.rest_client [req-8ccf5118-562b-49f2-92f2-68981b82a39e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ccf5118-562b-49f2-92f2-68981b82a39e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:48.585 197 INFO tempest.lib.common.rest_client [req-8b397d91-a172-4d60-8537-7c479a0c16d2 ] Request (SubnetPoolsRbacTest:test_list_subnetpools): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:25:48.590 197 DEBUG tempest.lib.common.rest_client [req-8b397d91-a172-4d60-8537-7c479a0c16d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b397d91-a172-4d60-8537-7c479a0c16d2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["LKl9t-nuQrC4mui0J9Rc6g"], "expires_at": "2020-12-14T03:25:48.000000Z", "issued_at": "2020-12-14T02:25:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:48.734 197 INFO tempest.lib.common.rest_client [req-a3ab12aa-bdee-4508-97f8-8f7621df0892 ] Request (SubnetPoolsRbacTest:test_list_subnetpools): 200 GET http://172.30.13.94:9696/v2.0/subnetpools?id=969e037a-dd4c-43e2-8d04-72853f9ee208 0.135s 2020-12-14 02:25:48.737 197 DEBUG tempest.lib.common.rest_client [req-a3ab12aa-bdee-4508-97f8-8f7621df0892 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '553', 'x-openstack-request-id': 'req-a3ab12aa-bdee-4508-97f8-8f7621df0892', 'date': 'Mon, 14 Dec 2020 02:25:48 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools?id=969e037a-dd4c-43e2-8d04-72853f9ee208'} Body: b'{"subnetpools": [{"id": "969e037a-dd4c-43e2-8d04-72853f9ee208", "name": "tempest-SubnetPoolsRbacTest-566867555", "tenant_id": "34bf9bdc593b4eb8a867a5e9c290341c", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": false, "shared": false, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-12-14T02:25:48Z", "updated_at": "2020-12-14T02:25:48Z", "revision_number": 0, "project_id": "34bf9bdc593b4eb8a867a5e9c290341c"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:48.740 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:48.807 197 INFO tempest.lib.common.rest_client [req-a99c8b3e-9d28-4e20-a239-af06b3b1f775 ] Request (SubnetPoolsRbacTest:test_list_subnetpools): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.061s 2020-12-14 02:25:48.811 197 DEBUG tempest.lib.common.rest_client [req-a99c8b3e-9d28-4e20-a239-af06b3b1f775 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a99c8b3e-9d28-4e20-a239-af06b3b1f775', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:48.874 197 INFO tempest.lib.common.rest_client [req-b8085d2b-f864-41bc-8f34-4613b63047d2 ] Request (SubnetPoolsRbacTest:test_list_subnetpools): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:25:48.878 197 DEBUG tempest.lib.common.rest_client [req-b8085d2b-f864-41bc-8f34-4613b63047d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8085d2b-f864-41bc-8f34-4613b63047d2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["Rv85j1Y0T4CQkFkvAfZWgw"], "expires_at": "2020-12-14T03:25:48.000000Z", "issued_at": "2020-12-14T02:25:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:49.031 189 INFO tempest.lib.common.rest_client [req-6b822397-70a1-4b76-bd8c-480ae01cf180 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.227s 2020-12-14 02:25:49.034 189 DEBUG tempest.lib.common.rest_client [req-6b822397-70a1-4b76-bd8c-480ae01cf180 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6b822397-70a1-4b76-bd8c-480ae01cf180', 'x-compute-request-id': 'req-6b822397-70a1-4b76-bd8c-480ae01cf180', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:49.036 197 INFO tempest.lib.common.rest_client [req-af8469f7-b30c-4a0e-974d-067bc4688a5f ] Request (SubnetPoolsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/subnetpools/969e037a-dd4c-43e2-8d04-72853f9ee208 0.146s 2020-12-14 02:25:49.038 197 DEBUG tempest.lib.common.rest_client [req-af8469f7-b30c-4a0e-974d-067bc4688a5f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-af8469f7-b30c-4a0e-974d-067bc4688a5f', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:25:49 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/969e037a-dd4c-43e2-8d04-72853f9ee208'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:49.049 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:49.076 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subnetpool, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:49.325 197 INFO tempest.lib.common.rest_client [req-44154792-dac9-4f2b-bfbe-287cdbbf1459 ] Request (SubnetPoolsRbacTest:test_show_subnetpool): 201 POST http://172.30.13.94:9696/v2.0/subnetpools 0.242s 2020-12-14 02:25:49.328 197 DEBUG tempest.lib.common.rest_client [req-44154792-dac9-4f2b-bfbe-287cdbbf1459 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"name": "tempest-SubnetPoolsRbacTest-2013290321", "min_prefixlen": 24, "max_prefixlen": 32, "prefixes": ["192.168.120.0/24"]}} Response - Headers: {'content-type': 'application/json', 'content-length': '551', 'x-openstack-request-id': 'req-44154792-dac9-4f2b-bfbe-287cdbbf1459', 'date': 'Mon, 14 Dec 2020 02:25:49 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools'} Body: b'{"subnetpool": {"id": "52f236d2-ca21-478f-83b7-7ce60cc61581", "name": "tempest-SubnetPoolsRbacTest-2013290321", "tenant_id": "34bf9bdc593b4eb8a867a5e9c290341c", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": false, "shared": false, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-12-14T02:25:49Z", "updated_at": "2020-12-14T02:25:49Z", "revision_number": 0, "project_id": "34bf9bdc593b4eb8a867a5e9c290341c"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:49.331 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:49.404 197 INFO tempest.lib.common.rest_client [req-9cf8d77c-811f-446a-89db-433ddc265538 ] Request (SubnetPoolsRbacTest:test_show_subnetpool): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.068s 2020-12-14 02:25:49.407 197 DEBUG tempest.lib.common.rest_client [req-9cf8d77c-811f-446a-89db-433ddc265538 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9cf8d77c-811f-446a-89db-433ddc265538', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:49.460 197 INFO tempest.lib.common.rest_client [req-e6011e2b-57f7-4e77-b6ba-6f5d3456bce9 ] Request (SubnetPoolsRbacTest:test_show_subnetpool): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:25:49.462 197 DEBUG tempest.lib.common.rest_client [req-e6011e2b-57f7-4e77-b6ba-6f5d3456bce9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6011e2b-57f7-4e77-b6ba-6f5d3456bce9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["tpQ4bRzSTHCnp8XxXu8PqA"], "expires_at": "2020-12-14T03:25:49.000000Z", "issued_at": "2020-12-14T02:25:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:49.572 197 INFO tempest.lib.common.rest_client [req-5e15078f-44e1-448a-b6db-9d2803baa6cc ] Request (SubnetPoolsRbacTest:test_show_subnetpool): 200 GET http://172.30.13.94:9696/v2.0/subnetpools/52f236d2-ca21-478f-83b7-7ce60cc61581 0.103s 2020-12-14 02:25:49.574 197 DEBUG tempest.lib.common.rest_client [req-5e15078f-44e1-448a-b6db-9d2803baa6cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '551', 'x-openstack-request-id': 'req-5e15078f-44e1-448a-b6db-9d2803baa6cc', 'date': 'Mon, 14 Dec 2020 02:25:49 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/52f236d2-ca21-478f-83b7-7ce60cc61581'} Body: b'{"subnetpool": {"id": "52f236d2-ca21-478f-83b7-7ce60cc61581", "name": "tempest-SubnetPoolsRbacTest-2013290321", "tenant_id": "34bf9bdc593b4eb8a867a5e9c290341c", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": false, "shared": false, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-12-14T02:25:49Z", "updated_at": "2020-12-14T02:25:49Z", "revision_number": 0, "project_id": "34bf9bdc593b4eb8a867a5e9c290341c"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:49.577 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:49.651 197 INFO tempest.lib.common.rest_client [req-676cd2b0-9c06-42cd-8633-0cb15c3c300f ] Request (SubnetPoolsRbacTest:test_show_subnetpool): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.068s 2020-12-14 02:25:49.653 197 DEBUG tempest.lib.common.rest_client [req-676cd2b0-9c06-42cd-8633-0cb15c3c300f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-676cd2b0-9c06-42cd-8633-0cb15c3c300f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:49.702 197 INFO tempest.lib.common.rest_client [req-00dd4488-9028-4a8b-b096-7e5ef207f530 ] Request (SubnetPoolsRbacTest:test_show_subnetpool): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:25:49.705 197 DEBUG tempest.lib.common.rest_client [req-00dd4488-9028-4a8b-b096-7e5ef207f530 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-00dd4488-9028-4a8b-b096-7e5ef207f530', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["-g0ednJ_TLGvIF4Ws0O9eQ"], "expires_at": "2020-12-14T03:25:49.000000Z", "issued_at": "2020-12-14T02:25:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:49.848 197 INFO tempest.lib.common.rest_client [req-a7a70d90-7baf-417d-9dc0-5de3e8a80438 ] Request (SubnetPoolsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/subnetpools/52f236d2-ca21-478f-83b7-7ce60cc61581 0.135s 2020-12-14 02:25:49.851 197 DEBUG tempest.lib.common.rest_client [req-a7a70d90-7baf-417d-9dc0-5de3e8a80438 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-a7a70d90-7baf-417d-9dc0-5de3e8a80438', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:25:49 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/52f236d2-ca21-478f-83b7-7ce60cc61581'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:49.860 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:49.879 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subnetpool, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:49.881 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:49.899 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_subnetpool, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:50.064 197 INFO tempest.lib.common.rest_client [req-fb119612-45e6-4dfe-b4cd-fc41d2de066f ] Request (SubnetPoolsRbacTest:test_update_subnetpool): 201 POST http://172.30.13.94:9696/v2.0/subnetpools 0.161s 2020-12-14 02:25:50.066 197 DEBUG tempest.lib.common.rest_client [req-fb119612-45e6-4dfe-b4cd-fc41d2de066f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"name": "tempest-SubnetPoolsRbacTest-532423319", "min_prefixlen": 24, "max_prefixlen": 32, "prefixes": ["192.168.120.0/24"]}} Response - Headers: {'content-type': 'application/json', 'content-length': '550', 'x-openstack-request-id': 'req-fb119612-45e6-4dfe-b4cd-fc41d2de066f', 'date': 'Mon, 14 Dec 2020 02:25:50 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools'} Body: b'{"subnetpool": {"id": "af98a7bc-6bc3-4def-b40a-7e78a2f335a9", "name": "tempest-SubnetPoolsRbacTest-532423319", "tenant_id": "34bf9bdc593b4eb8a867a5e9c290341c", "default_prefixlen": "24", "min_prefixlen": "24", "max_prefixlen": "32", "is_default": false, "shared": false, "prefixes": ["192.168.120.0/24"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-12-14T02:25:50Z", "updated_at": "2020-12-14T02:25:50Z", "revision_number": 0, "project_id": "34bf9bdc593b4eb8a867a5e9c290341c"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:50.068 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:50.135 197 INFO tempest.lib.common.rest_client [req-439e1f64-4afe-4983-b7e7-85c4ecbadbd2 ] Request (SubnetPoolsRbacTest:test_update_subnetpool): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.063s 2020-12-14 02:25:50.136 197 DEBUG tempest.lib.common.rest_client [req-439e1f64-4afe-4983-b7e7-85c4ecbadbd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-439e1f64-4afe-4983-b7e7-85c4ecbadbd2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:50.196 197 INFO tempest.lib.common.rest_client [req-96775657-2ba6-48cf-834c-a407e4141b4c ] Request (SubnetPoolsRbacTest:test_update_subnetpool): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:25:50.199 197 DEBUG tempest.lib.common.rest_client [req-96775657-2ba6-48cf-834c-a407e4141b4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96775657-2ba6-48cf-834c-a407e4141b4c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["WWFu3W7BTZOBeHreK1zZzA"], "expires_at": "2020-12-14T03:25:50.000000Z", "issued_at": "2020-12-14T02:25:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:50.333 197 INFO tempest.lib.common.rest_client [req-655d4c0e-6c65-4890-ae9a-8a051e8c2051 ] Request (SubnetPoolsRbacTest:test_update_subnetpool): 200 PUT http://172.30.13.94:9696/v2.0/subnetpools/af98a7bc-6bc3-4def-b40a-7e78a2f335a9 0.126s 2020-12-14 02:25:50.337 197 DEBUG tempest.lib.common.rest_client [req-655d4c0e-6c65-4890-ae9a-8a051e8c2051 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"min_prefixlen": 24}} Response - Headers: {'content-type': 'application/json', 'content-length': '495', 'x-openstack-request-id': 'req-655d4c0e-6c65-4890-ae9a-8a051e8c2051', 'date': 'Mon, 14 Dec 2020 02:25:50 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/af98a7bc-6bc3-4def-b40a-7e78a2f335a9'} Body: b'{"subnetpool": {"id": "af98a7bc-6bc3-4def-b40a-7e78a2f335a9", "project_id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-532423319", "ip_version": 4, "default_prefixlen": 24, "min_prefixlen": 24, "max_prefixlen": 32, "shared": false, "is_default": false, "revision_number": 1, "description": "", "created_at": "2020-12-14T02:25:50Z", "updated_at": "2020-12-14T02:25:50Z", "tenant_id": "34bf9bdc593b4eb8a867a5e9c290341c", "prefixes": ["192.168.120.0/24"], "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:50.341 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:50.341 189 INFO tempest.lib.common.rest_client [req-59c13c2d-84fb-45e0-9e47-2b5f94474da3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.199s 2020-12-14 02:25:50.345 189 DEBUG tempest.lib.common.rest_client [req-59c13c2d-84fb-45e0-9e47-2b5f94474da3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-59c13c2d-84fb-45e0-9e47-2b5f94474da3', 'x-compute-request-id': 'req-59c13c2d-84fb-45e0-9e47-2b5f94474da3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:50.413 197 INFO tempest.lib.common.rest_client [req-dfafef0f-c7d2-4efa-9362-9f768e3bd8fe ] Request (SubnetPoolsRbacTest:test_update_subnetpool): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.065s 2020-12-14 02:25:50.417 197 DEBUG tempest.lib.common.rest_client [req-dfafef0f-c7d2-4efa-9362-9f768e3bd8fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dfafef0f-c7d2-4efa-9362-9f768e3bd8fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:50.471 197 INFO tempest.lib.common.rest_client [req-148e9bba-ad6d-48c8-bd90-959f1ff58585 ] Request (SubnetPoolsRbacTest:test_update_subnetpool): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:25:50.474 197 DEBUG tempest.lib.common.rest_client [req-148e9bba-ad6d-48c8-bd90-959f1ff58585 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-148e9bba-ad6d-48c8-bd90-959f1ff58585', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["7yiy9TJIT2irs6QmWYrrxA"], "expires_at": "2020-12-14T03:25:50.000000Z", "issued_at": "2020-12-14T02:25:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:50.638 197 INFO tempest.lib.common.rest_client [req-15babec2-6379-454d-a00c-7830773ac871 ] Request (SubnetPoolsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/subnetpools/af98a7bc-6bc3-4def-b40a-7e78a2f335a9 0.154s 2020-12-14 02:25:50.641 197 DEBUG tempest.lib.common.rest_client [req-15babec2-6379-454d-a00c-7830773ac871 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-15babec2-6379-454d-a00c-7830773ac871', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:25:50 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/af98a7bc-6bc3-4def-b40a-7e78a2f335a9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:50.654 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:50.677 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_subnetpool, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:50.680 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:50.703 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_subnetpool:is_default, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:50.753 197 INFO tempest.lib.common.rest_client [req-501a6acf-b397-4dea-81b3-174a469a2bd2 ] Request (SubnetPoolsRbacTest:test_update_subnetpool_is_default): 200 GET http://172.30.13.94:9696/v2.0/subnetpools 0.045s 2020-12-14 02:25:50.756 197 DEBUG tempest.lib.common.rest_client [req-501a6acf-b397-4dea-81b3-174a469a2bd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '1069', 'x-openstack-request-id': 'req-501a6acf-b397-4dea-81b3-174a469a2bd2', 'date': 'Mon, 14 Dec 2020 02:25:50 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools'} Body: b'{"subnetpools": [{"id": "b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e", "name": "shared-default-subnetpool-v4", "tenant_id": "5990258dee3b412286ccca75bcab995c", "default_prefixlen": "26", "min_prefixlen": "8", "max_prefixlen": "32", "is_default": true, "shared": true, "prefixes": ["10.0.0.0/22"], "ip_version": 4, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-10-07T12:07:11Z", "updated_at": "2020-12-14T02:25:46Z", "revision_number": 872, "project_id": "5990258dee3b412286ccca75bcab995c"}, {"id": "f32bc1c4-caf2-4148-92ce-ea35dab4345c", "name": "shared-default-subnetpool-v6", "tenant_id": "5990258dee3b412286ccca75bcab995c", "default_prefixlen": "64", "min_prefixlen": "64", "max_prefixlen": "128", "is_default": true, "shared": true, "prefixes": ["fd45:7793:ed2b::/56"], "ip_version": 6, "default_quota": null, "address_scope_id": null, "description": "", "tags": [], "created_at": "2020-10-07T12:07:14Z", "updated_at": "2020-12-14T02:25:46Z", "revision_number": 582, "project_id": "5990258dee3b412286ccca75bcab995c"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:50.759 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:50.833 197 INFO tempest.lib.common.rest_client [req-ffd031ba-dd42-4fa5-8fbd-08ed0ff0f444 ] Request (SubnetPoolsRbacTest:test_update_subnetpool_is_default): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.067s 2020-12-14 02:25:50.837 197 DEBUG tempest.lib.common.rest_client [req-ffd031ba-dd42-4fa5-8fbd-08ed0ff0f444 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ffd031ba-dd42-4fa5-8fbd-08ed0ff0f444', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:50.904 197 INFO tempest.lib.common.rest_client [req-4678f4b5-9a78-4f6b-9f31-22f61b538ee3 ] Request (SubnetPoolsRbacTest:test_update_subnetpool_is_default): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.061s 2020-12-14 02:25:50.908 197 DEBUG tempest.lib.common.rest_client [req-4678f4b5-9a78-4f6b-9f31-22f61b538ee3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4678f4b5-9a78-4f6b-9f31-22f61b538ee3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["LxoqTWQCQ8mxVpCcse6yfA"], "expires_at": "2020-12-14T03:25:50.000000Z", "issued_at": "2020-12-14T02:25:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:51.042 197 INFO tempest.lib.common.rest_client [req-8d7a903f-437f-49ac-a0d9-09172a71017d ] Request (SubnetPoolsRbacTest:test_update_subnetpool_is_default): 200 PUT http://172.30.13.94:9696/v2.0/subnetpools/b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e 0.129s 2020-12-14 02:25:51.044 197 DEBUG tempest.lib.common.rest_client [req-8d7a903f-437f-49ac-a0d9-09172a71017d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnetpool": {"description": "", "is_default": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '480', 'x-openstack-request-id': 'req-8d7a903f-437f-49ac-a0d9-09172a71017d', 'date': 'Mon, 14 Dec 2020 02:25:51 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/subnetpools/b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e'} Body: b'{"subnetpool": {"id": "b48d0a6f-e3a5-4e4a-9774-40dfdcf8b21e", "project_id": "5990258dee3b412286ccca75bcab995c", "name": "shared-default-subnetpool-v4", "ip_version": 4, "default_prefixlen": 26, "min_prefixlen": 8, "max_prefixlen": 32, "shared": true, "is_default": true, "revision_number": 873, "description": "", "created_at": "2020-10-07T12:07:11Z", "updated_at": "2020-12-14T02:25:51Z", "tenant_id": "5990258dee3b412286ccca75bcab995c", "prefixes": ["10.0.0.0/22"], "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:51.046 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:51.125 197 INFO tempest.lib.common.rest_client [req-8689ed64-386f-4762-b01c-0718b911771b ] Request (SubnetPoolsRbacTest:test_update_subnetpool_is_default): 200 GET http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles 0.072s 2020-12-14 02:25:51.127 197 DEBUG tempest.lib.common.rest_client [req-8689ed64-386f-4762-b01c-0718b911771b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8689ed64-386f-4762-b01c-0718b911771b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c/users/791e25dc8005410a91ea6af4cd93dd63/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:51.181 197 INFO tempest.lib.common.rest_client [req-f21646d5-0ed5-40cd-bb1d-734900bc68e5 ] Request (SubnetPoolsRbacTest:test_update_subnetpool_is_default): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:25:51.185 197 DEBUG tempest.lib.common.rest_client [req-f21646d5-0ed5-40cd-bb1d-734900bc68e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f21646d5-0ed5-40cd-bb1d-734900bc68e5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "791e25dc8005410a91ea6af4cd93dd63", "name": "tempest-SubnetPoolsRbacTest-1240713327", "password_expires_at": null}, "audit_ids": ["UWX6OzETSrm9ihnyr_LfpQ"], "expires_at": "2020-12-14T03:25:51.000000Z", "issued_at": "2020-12-14T02:25:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "34bf9bdc593b4eb8a867a5e9c290341c", "name": "tempest-SubnetPoolsRbacTest-1240713327"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_34bf9bdc593b4eb8a867a5e9c290341c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:51.398 197 INFO tempest.lib.common.rest_client [req-0ca52fd9-80fa-428a-98d0-80cf9ab1a8d8 ] Request (SubnetPoolsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/791e25dc8005410a91ea6af4cd93dd63 0.189s 2020-12-14 02:25:51.401 197 DEBUG tempest.lib.common.rest_client [req-0ca52fd9-80fa-428a-98d0-80cf9ab1a8d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ca52fd9-80fa-428a-98d0-80cf9ab1a8d8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/791e25dc8005410a91ea6af4cd93dd63'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:51.541 197 INFO tempest.lib.common.rest_client [req-828d8640-075a-45ed-a728-1fb5933f6fbb ] Request (SubnetPoolsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.132s 2020-12-14 02:25:51.544 197 DEBUG tempest.lib.common.rest_client [req-828d8640-075a-45ed-a728-1fb5933f6fbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-828d8640-075a-45ed-a728-1fb5933f6fbb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["BYKnuygCSHurRjt5sRIXmw"], "expires_at": "2020-12-14T03:25:51.000000Z", "issued_at": "2020-12-14T02:25:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:51.649 189 INFO tempest.lib.common.rest_client [req-f3b99ca4-35c4-4f2d-bc99-f5a86e283c95 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.198s 2020-12-14 02:25:51.653 189 DEBUG tempest.lib.common.rest_client [req-f3b99ca4-35c4-4f2d-bc99-f5a86e283c95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f3b99ca4-35c4-4f2d-bc99-f5a86e283c95', 'x-compute-request-id': 'req-f3b99ca4-35c4-4f2d-bc99-f5a86e283c95', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:51.833 197 INFO tempest.lib.common.rest_client [req-e821480a-3263-4633-9df0-0aa510161a02 ] Request (SubnetPoolsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=34bf9bdc593b4eb8a867a5e9c290341c&name=default 0.282s 2020-12-14 02:25:51.836 197 DEBUG tempest.lib.common.rest_client [req-e821480a-3263-4633-9df0-0aa510161a02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-e821480a-3263-4633-9df0-0aa510161a02', 'date': 'Mon, 14 Dec 2020 02:25:51 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=34bf9bdc593b4eb8a867a5e9c290341c&name=default'} Body: b'{"security_groups": [{"id": "28777e75-1eb8-4221-b48e-1f9c6f2fe9d0", "name": "default", "stateful": true, "tenant_id": "34bf9bdc593b4eb8a867a5e9c290341c", "description": "Default security group", "security_group_rules": [{"id": "07aa0d91-26f3-41bc-abfe-13bdb37e9a9c", "tenant_id": "34bf9bdc593b4eb8a867a5e9c290341c", "security_group_id": "28777e75-1eb8-4221-b48e-1f9c6f2fe9d0", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:25:51Z", "updated_at": "2020-12-14T02:25:51Z", "revision_number": 0, "project_id": "34bf9bdc593b4eb8a867a5e9c290341c"}, {"id": "1c7c9f86-944f-4173-9a09-5fb72a4a7ca7", "tenant_id": "34bf9bdc593b4eb8a867a5e9c290341c", "security_group_id": "28777e75-1eb8-4221-b48e-1f9c6f2fe9d0", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:25:51Z", "updated_at": "2020-12-14T02:25:51Z", "revision_number": 0, "project_id": "34bf9bdc593b4eb8a867a5e9c290341c"}, {"id": "5c5810cd-52db-4ee0-8304-8b61ac89a006", "tenant_id": "34bf9bdc593b4eb8a867a5e9c290341c", "security_group_id": "28777e75-1eb8-4221-b48e-1f9c6f2fe9d0", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "28777e75-1eb8-4221-b48e-1f9c6f2fe9d0", "description": null, "tags": [], "created_at": "2020-12-14T02:25:51Z", "updated_at": "2020-12-14T02:25:51Z", "revision_number": 0, "project_id": "34bf9bdc593b4eb8a867a5e9c290341c"}, {"id": "d482ecc4-abf8-46ff-8b8e-38cbe5ac0c3a", "tenant_id": "34bf9bdc593b4eb8a867a5e9c290341c", "security_group_id": "28777e75-1eb8-4221-b48e-1f9c6f2fe9d0", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "28777e75-1eb8-4221-b48e-1f9c6f2fe9d0", "description": null, "tags": [], "created_at": "2020-12-14T02:25:51Z", "updated_at": "2020-12-14T02:25:51Z", "revision_number": 0, "project_id": "34bf9bdc593b4eb8a867a5e9c290341c"}], "tags": [], "created_at": "2020-12-14T02:25:51Z", "updated_at": "2020-12-14T02:25:51Z", "revision_number": 1, "project_id": "34bf9bdc593b4eb8a867a5e9c290341c"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:51.990 197 INFO tempest.lib.common.rest_client [req-800bf0de-c75c-4ee9-a1fa-eff97bd76695 ] Request (SubnetPoolsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/28777e75-1eb8-4221-b48e-1f9c6f2fe9d0 0.146s 2020-12-14 02:25:51.992 197 DEBUG tempest.lib.common.rest_client [req-800bf0de-c75c-4ee9-a1fa-eff97bd76695 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-800bf0de-c75c-4ee9-a1fa-eff97bd76695', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:25:51 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/28777e75-1eb8-4221-b48e-1f9c6f2fe9d0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:52.182 197 INFO tempest.lib.common.rest_client [req-a0288ad2-685a-4cf0-93fe-cc1edce8e39c ] Request (SubnetPoolsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c 0.183s 2020-12-14 02:25:52.185 197 DEBUG tempest.lib.common.rest_client [req-a0288ad2-685a-4cf0-93fe-cc1edce8e39c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0288ad2-685a-4cf0-93fe-cc1edce8e39c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/34bf9bdc593b4eb8a867a5e9c290341c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:52.311 197 INFO tempest.lib.common.rest_client [req-572a0015-2412-459d-88db-539b2c1ee001 ] Request (GroupSnaphotsV319RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-12-14 02:25:52.313 197 DEBUG tempest.lib.common.rest_client [req-572a0015-2412-459d-88db-539b2c1ee001 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-572a0015-2412-459d-88db-539b2c1ee001', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["6ogzjSSrTuGGTnaqFTOzpA"], "expires_at": "2020-12-14T03:25:52.000000Z", "issued_at": "2020-12-14T02:25:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:52.403 197 INFO tempest.lib.common.rest_client [req-80d496a9-3940-480c-b9e9-aed60284bc2b ] Request (GroupSnaphotsV319RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:25:52.405 197 DEBUG tempest.lib.common.rest_client [req-80d496a9-3940-480c-b9e9-aed60284bc2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-80d496a9-3940-480c-b9e9-aed60284bc2b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["N0xd6sdGTVyecmtWEABqLQ"], "expires_at": "2020-12-14T03:25:52.000000Z", "issued_at": "2020-12-14T02:25:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:52.484 197 INFO tempest.lib.common.rest_client [req-87f8fd8f-d443-4c87-b59d-468b38bde447 ] Request (GroupSnaphotsV319RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.071s 2020-12-14 02:25:52.486 197 DEBUG tempest.lib.common.rest_client [req-87f8fd8f-d443-4c87-b59d-468b38bde447 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87f8fd8f-d443-4c87-b59d-468b38bde447', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:52.569 197 INFO tempest.lib.common.rest_client [req-1ee67456-b959-4722-99ab-32795b9304db ] Request (GroupSnaphotsV319RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.077s 2020-12-14 02:25:52.572 197 DEBUG tempest.lib.common.rest_client [req-1ee67456-b959-4722-99ab-32795b9304db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-GroupSnaphotsV319RbacTest-1364129939-desc", "domain_id": "default", "name": "tempest-GroupSnaphotsV319RbacTest-1364129939"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ee67456-b959-4722-99ab-32795b9304db', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "919eb437bae6438e91c1fc68a41db892", "name": "tempest-GroupSnaphotsV319RbacTest-1364129939", "domain_id": "default", "description": "tempest-GroupSnaphotsV319RbacTest-1364129939-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:52.696 197 INFO tempest.lib.common.rest_client [req-47f9a4fb-c6e7-4e30-9ebf-3d4a080db22c ] Request (GroupSnaphotsV319RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.116s 2020-12-14 02:25:52.699 197 DEBUG tempest.lib.common.rest_client [req-47f9a4fb-c6e7-4e30-9ebf-3d4a080db22c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-GroupSnaphotsV319RbacTest-1364129939", "password": "L9_+!*oU+zeti!3", "project_id": "919eb437bae6438e91c1fc68a41db892", "email": "tempest-GroupSnaphotsV319RbacTest-398552275@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '405', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47f9a4fb-c6e7-4e30-9ebf-3d4a080db22c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "919eb437bae6438e91c1fc68a41db892", "email": "tempest-GroupSnaphotsV319RbacTest-398552275@example.com", "id": "792f5bbfca33460c94c8476e85dd214c", "name": "tempest-GroupSnaphotsV319RbacTest-1364129939", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/792f5bbfca33460c94c8476e85dd214c"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:52.769 197 INFO tempest.lib.common.rest_client [req-f911287f-2064-4fcf-8b42-3cb0769e7a06 ] Request (GroupSnaphotsV319RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:25:52.772 197 DEBUG tempest.lib.common.rest_client [req-f911287f-2064-4fcf-8b42-3cb0769e7a06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f911287f-2064-4fcf-8b42-3cb0769e7a06', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:52.843 197 INFO tempest.lib.common.rest_client [req-a0eabb57-3a6c-4da7-9428-917a4c15fd0e ] Request (GroupSnaphotsV319RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:25:52.846 197 DEBUG tempest.lib.common.rest_client [req-a0eabb57-3a6c-4da7-9428-917a4c15fd0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0eabb57-3a6c-4da7-9428-917a4c15fd0e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:52.944 197 INFO tempest.lib.common.rest_client [req-e2f5babb-849a-4392-8e4c-4a0695915058 ] Request (GroupSnaphotsV319RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892/users/792f5bbfca33460c94c8476e85dd214c/roles/72a4576c553448cd941b052c1ca0cf2d 0.089s 2020-12-14 02:25:52.948 197 DEBUG tempest.lib.common.rest_client [req-e2f5babb-849a-4392-8e4c-4a0695915058 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2f5babb-849a-4392-8e4c-4a0695915058', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892/users/792f5bbfca33460c94c8476e85dd214c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:52.951 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupSnaphotsV319RbacTest-1364129939', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '919eb437bae6438e91c1fc68a41db892', 'project_name': 'tempest-GroupSnaphotsV319RbacTest-1364129939', 'tenant_id': '919eb437bae6438e91c1fc68a41db892', 'tenant_name': 'tempest-GroupSnaphotsV319RbacTest-1364129939', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '792f5bbfca33460c94c8476e85dd214c'}, Network: None, Subnet: None, Router: None 2020-12-14 02:25:52.952 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupSnaphotsV319RbacTest-1364129939', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '919eb437bae6438e91c1fc68a41db892', 'project_name': 'tempest-GroupSnaphotsV319RbacTest-1364129939', 'tenant_id': '919eb437bae6438e91c1fc68a41db892', 'tenant_name': 'tempest-GroupSnaphotsV319RbacTest-1364129939', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '792f5bbfca33460c94c8476e85dd214c'}, Network: None, Subnet: None, Router: None 2020-12-14 02:25:52.979 189 INFO tempest.lib.common.rest_client [req-d30c0523-71ab-4c70-b187-7186dd23cf46 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.218s 2020-12-14 02:25:52.982 189 DEBUG tempest.lib.common.rest_client [req-d30c0523-71ab-4c70-b187-7186dd23cf46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d30c0523-71ab-4c70-b187-7186dd23cf46', 'x-compute-request-id': 'req-d30c0523-71ab-4c70-b187-7186dd23cf46', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:53.135 197 INFO tempest.lib.common.rest_client [req-1a36fa06-bce7-4be0-979c-1937eac6f4c0 ] Request (GroupSnaphotsV319RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.124s 2020-12-14 02:25:53.138 197 DEBUG tempest.lib.common.rest_client [req-1a36fa06-bce7-4be0-979c-1937eac6f4c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a36fa06-bce7-4be0-979c-1937eac6f4c0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "792f5bbfca33460c94c8476e85dd214c", "name": "tempest-GroupSnaphotsV319RbacTest-1364129939", "password_expires_at": null}, "audit_ids": ["LCkHssNlS0eauN863pqHqA"], "expires_at": "2020-12-14T03:25:53.000000Z", "issued_at": "2020-12-14T02:25:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "919eb437bae6438e91c1fc68a41db892", "name": "tempest-GroupSnaphotsV319RbacTest-1364129939"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:53.255 197 INFO tempest.lib.common.rest_client [req-d9039b67-c2b8-4daf-945c-e2695535741a ] Request (GroupSnaphotsV319RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-12-14 02:25:53.258 197 DEBUG tempest.lib.common.rest_client [req-d9039b67-c2b8-4daf-945c-e2695535741a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9039b67-c2b8-4daf-945c-e2695535741a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["qfvmml2WRGi3k1UFa1_dzQ"], "expires_at": "2020-12-14T03:25:53.000000Z", "issued_at": "2020-12-14T02:25:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:53.375 197 INFO tempest.lib.common.rest_client [req-6080782c-b6d0-4778-8790-2e00c4a9182d ] Request (GroupSnaphotsV319RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:25:53.378 197 DEBUG tempest.lib.common.rest_client [req-6080782c-b6d0-4778-8790-2e00c4a9182d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6080782c-b6d0-4778-8790-2e00c4a9182d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["qhKgJDPFQFK7-T9iodVYbQ"], "expires_at": "2020-12-14T03:25:53.000000Z", "issued_at": "2020-12-14T02:25:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:53.449 197 INFO tempest.lib.common.rest_client [req-977a0453-334d-4f7b-a1aa-f09408515231 ] Request (GroupSnaphotsV319RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.063s 2020-12-14 02:25:53.453 197 DEBUG tempest.lib.common.rest_client [req-977a0453-334d-4f7b-a1aa-f09408515231 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-977a0453-334d-4f7b-a1aa-f09408515231', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:53.517 197 INFO tempest.lib.common.rest_client [req-94c409cc-ed3c-4687-a230-4ca3207110e8 ] Request (GroupSnaphotsV319RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:25:53.520 197 DEBUG tempest.lib.common.rest_client [req-94c409cc-ed3c-4687-a230-4ca3207110e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94c409cc-ed3c-4687-a230-4ca3207110e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:53.524 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:25:53.527 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:25:53.594 197 INFO tempest.lib.common.rest_client [req-239ce0ec-5bd5-4f21-97a4-11983eb6a41c ] Request (GroupSnaphotsV319RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892/users/792f5bbfca33460c94c8476e85dd214c/roles 0.060s 2020-12-14 02:25:53.597 197 DEBUG tempest.lib.common.rest_client [req-239ce0ec-5bd5-4f21-97a4-11983eb6a41c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-239ce0ec-5bd5-4f21-97a4-11983eb6a41c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892/users/792f5bbfca33460c94c8476e85dd214c/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892/users/792f5bbfca33460c94c8476e85dd214c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:53.672 197 INFO tempest.lib.common.rest_client [req-53886d45-21bc-4cd5-8639-9098e8fe29c3 ] Request (GroupSnaphotsV319RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892/users/792f5bbfca33460c94c8476e85dd214c/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-12-14 02:25:53.674 197 DEBUG tempest.lib.common.rest_client [req-53886d45-21bc-4cd5-8639-9098e8fe29c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53886d45-21bc-4cd5-8639-9098e8fe29c3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892/users/792f5bbfca33460c94c8476e85dd214c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:53.790 197 INFO tempest.lib.common.rest_client [req-6d621ac8-2741-455c-8eb1-427f2be61daa ] Request (GroupSnaphotsV319RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892/users/792f5bbfca33460c94c8476e85dd214c/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-12-14 02:25:53.793 197 DEBUG tempest.lib.common.rest_client [req-6d621ac8-2741-455c-8eb1-427f2be61daa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d621ac8-2741-455c-8eb1-427f2be61daa', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892/users/792f5bbfca33460c94c8476e85dd214c/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:54.312 189 INFO tempest.lib.common.rest_client [req-64e29961-d841-465f-a9b8-444fb6e2852e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.221s 2020-12-14 02:25:54.315 189 DEBUG tempest.lib.common.rest_client [req-64e29961-d841-465f-a9b8-444fb6e2852e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-64e29961-d841-465f-a9b8-444fb6e2852e', 'x-compute-request-id': 'req-64e29961-d841-465f-a9b8-444fb6e2852e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:54.908 197 INFO tempest.lib.common.rest_client [req-ae992b54-62be-4642-a312-4ae101e9d7ca ] Request (GroupSnaphotsV319RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:25:54.912 197 DEBUG tempest.lib.common.rest_client [req-ae992b54-62be-4642-a312-4ae101e9d7ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae992b54-62be-4642-a312-4ae101e9d7ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "792f5bbfca33460c94c8476e85dd214c", "name": "tempest-GroupSnaphotsV319RbacTest-1364129939", "password_expires_at": null}, "audit_ids": ["ZP0jttaESdeW_hHXIOuIdQ"], "expires_at": "2020-12-14T03:25:54.000000Z", "issued_at": "2020-12-14T02:25:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "919eb437bae6438e91c1fc68a41db892", "name": "tempest-GroupSnaphotsV319RbacTest-1364129939"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:55.139 197 INFO tempest.lib.common.rest_client [req-349a63a6-b345-4ac7-a300-9ed5e50aa9b2 ] Request (GroupSnaphotsV319RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/types 0.210s 2020-12-14 02:25:55.143 197 DEBUG tempest.lib.common.rest_client [req-349a63a6-b345-4ac7-a300-9ed5e50aa9b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupSnaphotsV319RbacTest-volume-type-894388806"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-349a63a6-b345-4ac7-a300-9ed5e50aa9b2', 'content-length': '230', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-349a63a6-b345-4ac7-a300-9ed5e50aa9b2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/types'} Body: b'{"volume_type": {"id": "f1d8e0ce-6bde-41e5-a9db-9f59ccbd7aa5", "name": "tempest-GroupSnaphotsV319RbacTest-volume-type-894388806", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:55.232 197 INFO tempest.lib.common.rest_client [req-6306f43e-ea96-4b2f-a32e-9197a7fc34c6 ] Request (GroupSnaphotsV319RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_types 0.058s 2020-12-14 02:25:55.236 197 DEBUG tempest.lib.common.rest_client [req-6306f43e-ea96-4b2f-a32e-9197a7fc34c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupSnaphotsV319RbacTest-group-type-889923558"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6306f43e-ea96-4b2f-a32e-9197a7fc34c6', 'content-length': '187', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6306f43e-ea96-4b2f-a32e-9197a7fc34c6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_types'} Body: b'{"group_type": {"id": "8c18ed3a-b67c-48f8-89c9-0d94f62c8aaa", "name": "tempest-GroupSnaphotsV319RbacTest-group-type-889923558", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:55.397 197 INFO tempest.lib.common.rest_client [req-981f82f6-63f3-473d-93b7-f813932bd709 ] Request (GroupSnaphotsV319RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/groups 0.135s 2020-12-14 02:25:55.400 197 DEBUG tempest.lib.common.rest_client [req-981f82f6-63f3-473d-93b7-f813932bd709 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: {"group": {"group_type": "8c18ed3a-b67c-48f8-89c9-0d94f62c8aaa", "volume_types": ["f1d8e0ce-6bde-41e5-a9db-9f59ccbd7aa5"], "name": "tempest-GroupSnaphotsV319RbacTest-Group-337440772"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-981f82f6-63f3-473d-93b7-f813932bd709', 'content-length': '118', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-981f82f6-63f3-473d-93b7-f813932bd709', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/groups'} Body: b'{"group": {"id": "88e1db01-5535-4303-a391-7bc772e77a45", "name": "tempest-GroupSnaphotsV319RbacTest-Group-337440772"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:55.475 197 INFO tempest.lib.common.rest_client [req-42db3dae-344d-44a1-a782-3cec267d8f58 ] Request (GroupSnaphotsV319RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/groups/88e1db01-5535-4303-a391-7bc772e77a45 0.049s 2020-12-14 02:25:55.478 197 DEBUG tempest.lib.common.rest_client [req-42db3dae-344d-44a1-a782-3cec267d8f58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-42db3dae-344d-44a1-a782-3cec267d8f58', 'content-length': '398', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-42db3dae-344d-44a1-a782-3cec267d8f58', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/groups/88e1db01-5535-4303-a391-7bc772e77a45'} Body: b'{"group": {"id": "88e1db01-5535-4303-a391-7bc772e77a45", "status": "creating", "availability_zone": "nova", "created_at": "2020-12-14T02:25:55.000000", "name": "tempest-GroupSnaphotsV319RbacTest-Group-337440772", "description": null, "group_type": "8c18ed3a-b67c-48f8-89c9-0d94f62c8aaa", "volume_types": ["f1d8e0ce-6bde-41e5-a9db-9f59ccbd7aa5"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:55.648 189 INFO tempest.lib.common.rest_client [req-bed07dd6-a169-46d8-928c-3841c98f7da4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.225s 2020-12-14 02:25:55.653 189 DEBUG tempest.lib.common.rest_client [req-bed07dd6-a169-46d8-928c-3841c98f7da4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bed07dd6-a169-46d8-928c-3841c98f7da4', 'x-compute-request-id': 'req-bed07dd6-a169-46d8-928c-3841c98f7da4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:56.588 197 INFO tempest.lib.common.rest_client [req-0e95c54b-8946-490c-9dfb-67b072f6aaf0 ] Request (GroupSnaphotsV319RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/groups/88e1db01-5535-4303-a391-7bc772e77a45 0.063s 2020-12-14 02:25:56.593 197 DEBUG tempest.lib.common.rest_client [req-0e95c54b-8946-490c-9dfb-67b072f6aaf0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0e95c54b-8946-490c-9dfb-67b072f6aaf0', 'content-length': '399', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0e95c54b-8946-490c-9dfb-67b072f6aaf0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/groups/88e1db01-5535-4303-a391-7bc772e77a45'} Body: b'{"group": {"id": "88e1db01-5535-4303-a391-7bc772e77a45", "status": "available", "availability_zone": "nova", "created_at": "2020-12-14T02:25:55.000000", "name": "tempest-GroupSnaphotsV319RbacTest-Group-337440772", "description": null, "group_type": "8c18ed3a-b67c-48f8-89c9-0d94f62c8aaa", "volume_types": ["f1d8e0ce-6bde-41e5-a9db-9f59ccbd7aa5"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:56.630 197 INFO tempest.common.waiters [-] group 88e1db01-5535-4303-a391-7bc772e77a45 reached available after waiting for 1.629959 seconds 2020-12-14 02:25:56.974 189 INFO tempest.lib.common.rest_client [req-66b60cd2-3323-4b53-81ac-e727f7fda527 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.216s 2020-12-14 02:25:56.978 189 DEBUG tempest.lib.common.rest_client [req-66b60cd2-3323-4b53-81ac-e727f7fda527 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-66b60cd2-3323-4b53-81ac-e727f7fda527', 'x-compute-request-id': 'req-66b60cd2-3323-4b53-81ac-e727f7fda527', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:57.015 197 INFO tempest.lib.common.rest_client [req-3758df71-a3df-4abd-a8dc-fd97ff0fe3c1 ] Request (GroupSnaphotsV319RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes 0.378s 2020-12-14 02:25:57.019 197 DEBUG tempest.lib.common.rest_client [req-3758df71-a3df-4abd-a8dc-fd97ff0fe3c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: {"volume": {"volume_type": "f1d8e0ce-6bde-41e5-a9db-9f59ccbd7aa5", "group_id": "88e1db01-5535-4303-a391-7bc772e77a45", "size": 1, "name": "tempest-GroupSnaphotsV319RbacTest-Volume-2062176698"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3758df71-a3df-4abd-a8dc-fd97ff0fe3c1', 'content-length': '949', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3758df71-a3df-4abd-a8dc-fd97ff0fe3c1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes'} Body: b'{"volume": {"id": "b4b46ffe-af9f-4496-a1be-69c775e9bac0", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:25:57.000000", "updated_at": null, "name": "tempest-GroupSnaphotsV319RbacTest-Volume-2062176698", "description": null, "volume_type": "tempest-GroupSnaphotsV319RbacTest-volume-type-894388806", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0"}], "user_id": "792f5bbfca33460c94c8476e85dd214c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "88e1db01-5535-4303-a391-7bc772e77a45"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:57.217 197 INFO tempest.lib.common.rest_client [req-5fc1e4b8-7868-4a54-8f50-8b7573ba5be1 ] Request (GroupSnaphotsV319RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0 0.106s 2020-12-14 02:25:57.221 197 DEBUG tempest.lib.common.rest_client [req-5fc1e4b8-7868-4a54-8f50-8b7573ba5be1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5fc1e4b8-7868-4a54-8f50-8b7573ba5be1', 'content-length': '1171', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5fc1e4b8-7868-4a54-8f50-8b7573ba5be1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0'} Body: b'{"volume": {"id": "b4b46ffe-af9f-4496-a1be-69c775e9bac0", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:25:57.000000", "updated_at": "2020-12-14T02:25:57.000000", "name": "tempest-GroupSnaphotsV319RbacTest-Volume-2062176698", "description": null, "volume_type": "tempest-GroupSnaphotsV319RbacTest-volume-type-894388806", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0"}], "user_id": "792f5bbfca33460c94c8476e85dd214c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "88e1db01-5535-4303-a391-7bc772e77a45", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "919eb437bae6438e91c1fc68a41db892"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:58.300 189 INFO tempest.lib.common.rest_client [req-7b0e62e3-4951-46e5-8360-8a20fec8a07f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.214s 2020-12-14 02:25:58.303 189 DEBUG tempest.lib.common.rest_client [req-7b0e62e3-4951-46e5-8360-8a20fec8a07f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7b0e62e3-4951-46e5-8360-8a20fec8a07f', 'x-compute-request-id': 'req-7b0e62e3-4951-46e5-8360-8a20fec8a07f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:58.439 197 INFO tempest.lib.common.rest_client [req-fd39830b-d6b4-4262-9292-76e220a0f7f3 ] Request (GroupSnaphotsV319RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0 0.112s 2020-12-14 02:25:58.442 197 DEBUG tempest.lib.common.rest_client [req-fd39830b-d6b4-4262-9292-76e220a0f7f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fd39830b-d6b4-4262-9292-76e220a0f7f3', 'content-length': '1172', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fd39830b-d6b4-4262-9292-76e220a0f7f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0'} Body: b'{"volume": {"id": "b4b46ffe-af9f-4496-a1be-69c775e9bac0", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:25:57.000000", "updated_at": "2020-12-14T02:25:57.000000", "name": "tempest-GroupSnaphotsV319RbacTest-Volume-2062176698", "description": null, "volume_type": "tempest-GroupSnaphotsV319RbacTest-volume-type-894388806", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0"}], "user_id": "792f5bbfca33460c94c8476e85dd214c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "88e1db01-5535-4303-a391-7bc772e77a45", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "919eb437bae6438e91c1fc68a41db892"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:58.538 197 INFO tempest.common.waiters [-] volume b4b46ffe-af9f-4496-a1be-69c775e9bac0 reached available after waiting for 1.538195 seconds 2020-12-14 02:25:58.541 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:25:58.717 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:reset_group_snapshot_status, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:25:59.045 197 INFO tempest.lib.common.rest_client [req-d5ae9992-4bb7-4374-aca9-9da50e163cc0 ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 202 POST http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_snapshots 0.323s 2020-12-14 02:25:59.047 197 DEBUG tempest.lib.common.rest_client [req-d5ae9992-4bb7-4374-aca9-9da50e163cc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: {"group_snapshot": {"group_id": "88e1db01-5535-4303-a391-7bc772e77a45", "name": "tempest-group_snapshot-1816744033"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d5ae9992-4bb7-4374-aca9-9da50e163cc0', 'content-length': '168', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d5ae9992-4bb7-4374-aca9-9da50e163cc0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_snapshots'} Body: b'{"group_snapshot": {"id": "6d991062-9b73-49c9-83f8-ceab01fd801c", "name": "tempest-group_snapshot-1816744033", "group_type_id": "8c18ed3a-b67c-48f8-89c9-0d94f62c8aaa"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:59.093 197 INFO tempest.lib.common.rest_client [req-2bceab9c-5b20-4428-a9bf-a01524762ea4 ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_snapshots/6d991062-9b73-49c9-83f8-ceab01fd801c 0.028s 2020-12-14 02:25:59.095 197 DEBUG tempest.lib.common.rest_client [req-2bceab9c-5b20-4428-a9bf-a01524762ea4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2bceab9c-5b20-4428-a9bf-a01524762ea4', 'content-length': '307', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2bceab9c-5b20-4428-a9bf-a01524762ea4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_snapshots/6d991062-9b73-49c9-83f8-ceab01fd801c'} Body: b'{"group_snapshot": {"id": "6d991062-9b73-49c9-83f8-ceab01fd801c", "group_id": "88e1db01-5535-4303-a391-7bc772e77a45", "group_type_id": "8c18ed3a-b67c-48f8-89c9-0d94f62c8aaa", "status": "creating", "created_at": "2020-12-14T02:25:59.000000", "name": "tempest-group_snapshot-1816744033", "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:25:59.635 189 INFO tempest.lib.common.rest_client [req-e0e9ab3f-3161-4e39-8557-a6bed6f5a588 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.226s 2020-12-14 02:25:59.638 189 DEBUG tempest.lib.common.rest_client [req-e0e9ab3f-3161-4e39-8557-a6bed6f5a588 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:25:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e0e9ab3f-3161-4e39-8557-a6bed6f5a588', 'x-compute-request-id': 'req-e0e9ab3f-3161-4e39-8557-a6bed6f5a588', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:00.163 197 INFO tempest.lib.common.rest_client [req-a3e04249-9889-4447-9c1c-19f362361a12 ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_snapshots/6d991062-9b73-49c9-83f8-ceab01fd801c 0.044s 2020-12-14 02:26:00.167 197 DEBUG tempest.lib.common.rest_client [req-a3e04249-9889-4447-9c1c-19f362361a12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a3e04249-9889-4447-9c1c-19f362361a12', 'content-length': '308', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a3e04249-9889-4447-9c1c-19f362361a12', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_snapshots/6d991062-9b73-49c9-83f8-ceab01fd801c'} Body: b'{"group_snapshot": {"id": "6d991062-9b73-49c9-83f8-ceab01fd801c", "group_id": "88e1db01-5535-4303-a391-7bc772e77a45", "group_type_id": "8c18ed3a-b67c-48f8-89c9-0d94f62c8aaa", "status": "available", "created_at": "2020-12-14T02:25:59.000000", "name": "tempest-group_snapshot-1816744033", "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:00.191 197 INFO tempest.common.waiters [-] group_snapshot 6d991062-9b73-49c9-83f8-ceab01fd801c reached available after waiting for 1.190893 seconds 2020-12-14 02:26:00.236 197 INFO tempest.lib.common.rest_client [req-48db8060-827c-4106-b83b-e1f12c5c5dd3 ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/snapshots/detail 0.041s 2020-12-14 02:26:00.240 197 DEBUG tempest.lib.common.rest_client [req-48db8060-827c-4106-b83b-e1f12c5c5dd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-48db8060-827c-4106-b83b-e1f12c5c5dd3', 'content-length': '454', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-48db8060-827c-4106-b83b-e1f12c5c5dd3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/snapshots/detail'} Body: b'{"snapshots": [{"id": "d8bb4f16-d0dd-4176-8ac0-9238ed8a8e92", "created_at": "2020-12-14T02:25:59.000000", "updated_at": "2020-12-14T02:26:00.000000", "name": "tempest-group_snapshot-1816744033", "description": null, "volume_id": "b4b46ffe-af9f-4496-a1be-69c775e9bac0", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "919eb437bae6438e91c1fc68a41db892", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:00.322 197 INFO tempest.lib.common.rest_client [req-ebbb24d5-41ff-43af-9633-c7fa91706e05 ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/snapshots/d8bb4f16-d0dd-4176-8ac0-9238ed8a8e92 0.038s 2020-12-14 02:26:00.324 197 DEBUG tempest.lib.common.rest_client [req-ebbb24d5-41ff-43af-9633-c7fa91706e05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ebbb24d5-41ff-43af-9633-c7fa91706e05', 'content-length': '451', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ebbb24d5-41ff-43af-9633-c7fa91706e05', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/snapshots/d8bb4f16-d0dd-4176-8ac0-9238ed8a8e92'} Body: b'{"snapshot": {"id": "d8bb4f16-d0dd-4176-8ac0-9238ed8a8e92", "created_at": "2020-12-14T02:25:59.000000", "updated_at": "2020-12-14T02:26:00.000000", "name": "tempest-group_snapshot-1816744033", "description": null, "volume_id": "b4b46ffe-af9f-4496-a1be-69c775e9bac0", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "919eb437bae6438e91c1fc68a41db892", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:00.355 197 INFO tempest.common.waiters [-] snapshot d8bb4f16-d0dd-4176-8ac0-9238ed8a8e92 reached available after waiting for 0.355676 seconds 2020-12-14 02:26:00.358 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:00.610 197 INFO tempest.lib.common.rest_client [req-f3da1fb5-4191-4d7a-be6c-1b03c09caa4c ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892/users/792f5bbfca33460c94c8476e85dd214c/roles 0.245s 2020-12-14 02:26:00.614 197 DEBUG tempest.lib.common.rest_client [req-f3da1fb5-4191-4d7a-be6c-1b03c09caa4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3da1fb5-4191-4d7a-be6c-1b03c09caa4c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892/users/792f5bbfca33460c94c8476e85dd214c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892/users/792f5bbfca33460c94c8476e85dd214c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:00.669 197 INFO tempest.lib.common.rest_client [req-d01d5b4b-815f-4c95-819b-ebf82671ffa9 ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:26:00.673 197 DEBUG tempest.lib.common.rest_client [req-d01d5b4b-815f-4c95-819b-ebf82671ffa9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d01d5b4b-815f-4c95-819b-ebf82671ffa9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "792f5bbfca33460c94c8476e85dd214c", "name": "tempest-GroupSnaphotsV319RbacTest-1364129939", "password_expires_at": null}, "audit_ids": ["NLkpDfHSTBCdGIw3pqXioA"], "expires_at": "2020-12-14T03:26:00.000000Z", "issued_at": "2020-12-14T02:26:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "919eb437bae6438e91c1fc68a41db892", "name": "tempest-GroupSnaphotsV319RbacTest-1364129939"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:00.795 197 INFO tempest.lib.common.rest_client [req-bf875747-b3d7-44b5-ba02-c23566c3cbd8 ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 202 POST http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_snapshots/6d991062-9b73-49c9-83f8-ceab01fd801c/action 0.114s 2020-12-14 02:26:00.798 197 DEBUG tempest.lib.common.rest_client [req-bf875747-b3d7-44b5-ba02-c23566c3cbd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: {"reset_status": {"status": "error"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bf875747-b3d7-44b5-ba02-c23566c3cbd8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_snapshots/6d991062-9b73-49c9-83f8-ceab01fd801c/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:00.800 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:00.879 197 INFO tempest.lib.common.rest_client [req-bee27599-16bb-4712-88d9-3542115e9410 ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892/users/792f5bbfca33460c94c8476e85dd214c/roles 0.072s 2020-12-14 02:26:00.884 197 DEBUG tempest.lib.common.rest_client [req-bee27599-16bb-4712-88d9-3542115e9410 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bee27599-16bb-4712-88d9-3542115e9410', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892/users/792f5bbfca33460c94c8476e85dd214c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892/users/792f5bbfca33460c94c8476e85dd214c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:00.933 197 INFO tempest.lib.common.rest_client [req-912bf1ff-f2b1-494f-a586-5fdfc500325b ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:26:00.937 197 DEBUG tempest.lib.common.rest_client [req-912bf1ff-f2b1-494f-a586-5fdfc500325b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-912bf1ff-f2b1-494f-a586-5fdfc500325b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "792f5bbfca33460c94c8476e85dd214c", "name": "tempest-GroupSnaphotsV319RbacTest-1364129939", "password_expires_at": null}, "audit_ids": ["oSE4sIYSSbqFtwm9Ewyhzw"], "expires_at": "2020-12-14T03:26:00.000000Z", "issued_at": "2020-12-14T02:26:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "919eb437bae6438e91c1fc68a41db892", "name": "tempest-GroupSnaphotsV319RbacTest-1364129939"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_919eb437bae6438e91c1fc68a41db892", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:00.980 189 INFO tempest.lib.common.rest_client [req-01571d1f-e51c-468a-bef9-0d0844a33a74 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.237s 2020-12-14 02:26:00.983 189 DEBUG tempest.lib.common.rest_client [req-01571d1f-e51c-468a-bef9-0d0844a33a74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-01571d1f-e51c-468a-bef9-0d0844a33a74', 'x-compute-request-id': 'req-01571d1f-e51c-468a-bef9-0d0844a33a74', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:01.048 197 INFO tempest.lib.common.rest_client [req-5f774aad-2f76-4982-9f7b-db8c7143a2ba ] Request (GroupSnaphotsV319RbacTest:test_reset_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_snapshots/6d991062-9b73-49c9-83f8-ceab01fd801c 0.102s 2020-12-14 02:26:01.051 197 DEBUG tempest.lib.common.rest_client [req-5f774aad-2f76-4982-9f7b-db8c7143a2ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5f774aad-2f76-4982-9f7b-db8c7143a2ba', 'content-length': '304', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5f774aad-2f76-4982-9f7b-db8c7143a2ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_snapshots/6d991062-9b73-49c9-83f8-ceab01fd801c'} Body: b'{"group_snapshot": {"id": "6d991062-9b73-49c9-83f8-ceab01fd801c", "group_id": "88e1db01-5535-4303-a391-7bc772e77a45", "group_type_id": "8c18ed3a-b67c-48f8-89c9-0d94f62c8aaa", "status": "error", "created_at": "2020-12-14T02:25:59.000000", "name": "tempest-group_snapshot-1816744033", "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:01.076 197 INFO tempest.common.waiters [-] group_snapshot 6d991062-9b73-49c9-83f8-ceab01fd801c reached error after waiting for 0.076343 seconds 2020-12-14 02:26:01.155 197 INFO tempest.lib.common.rest_client [req-b37d1029-aed4-4a5e-98df-d7333c421c4b ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_snapshots/6d991062-9b73-49c9-83f8-ceab01fd801c 0.071s 2020-12-14 02:26:01.159 197 DEBUG tempest.lib.common.rest_client [req-b37d1029-aed4-4a5e-98df-d7333c421c4b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b37d1029-aed4-4a5e-98df-d7333c421c4b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_snapshots/6d991062-9b73-49c9-83f8-ceab01fd801c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:01.249 197 INFO tempest.lib.common.rest_client [req-98604972-a982-41d6-b1e3-6a00b23f7248 ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/detail 0.083s 2020-12-14 02:26:01.252 197 DEBUG tempest.lib.common.rest_client [req-98604972-a982-41d6-b1e3-6a00b23f7248 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-98604972-a982-41d6-b1e3-6a00b23f7248', 'content-length': '1175', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-98604972-a982-41d6-b1e3-6a00b23f7248', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/detail'} Body: b'{"volumes": [{"id": "b4b46ffe-af9f-4496-a1be-69c775e9bac0", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:25:57.000000", "updated_at": "2020-12-14T02:25:57.000000", "name": "tempest-GroupSnaphotsV319RbacTest-Volume-2062176698", "description": null, "volume_type": "tempest-GroupSnaphotsV319RbacTest-volume-type-894388806", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0"}], "user_id": "792f5bbfca33460c94c8476e85dd214c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "88e1db01-5535-4303-a391-7bc772e77a45", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "919eb437bae6438e91c1fc68a41db892"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:01.398 197 INFO tempest.lib.common.rest_client [req-4f9049f6-0db6-4b60-a65c-779ec4a71905 ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/snapshots/detail 0.038s 2020-12-14 02:26:01.402 197 DEBUG tempest.lib.common.rest_client [req-4f9049f6-0db6-4b60-a65c-779ec4a71905 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4f9049f6-0db6-4b60-a65c-779ec4a71905', 'content-length': '453', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4f9049f6-0db6-4b60-a65c-779ec4a71905', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/snapshots/detail'} Body: b'{"snapshots": [{"id": "d8bb4f16-d0dd-4176-8ac0-9238ed8a8e92", "created_at": "2020-12-14T02:25:59.000000", "updated_at": "2020-12-14T02:26:01.000000", "name": "tempest-group_snapshot-1816744033", "description": null, "volume_id": "b4b46ffe-af9f-4496-a1be-69c775e9bac0", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "919eb437bae6438e91c1fc68a41db892", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:01.491 197 INFO tempest.lib.common.rest_client [req-e032f6ca-5d12-45f7-ab8c-ad0d80e4171c ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/snapshots/d8bb4f16-d0dd-4176-8ac0-9238ed8a8e92 0.045s 2020-12-14 02:26:01.495 197 DEBUG tempest.lib.common.rest_client [req-e032f6ca-5d12-45f7-ab8c-ad0d80e4171c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e032f6ca-5d12-45f7-ab8c-ad0d80e4171c', 'content-length': '450', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e032f6ca-5d12-45f7-ab8c-ad0d80e4171c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/snapshots/d8bb4f16-d0dd-4176-8ac0-9238ed8a8e92'} Body: b'{"snapshot": {"id": "d8bb4f16-d0dd-4176-8ac0-9238ed8a8e92", "created_at": "2020-12-14T02:25:59.000000", "updated_at": "2020-12-14T02:26:01.000000", "name": "tempest-group_snapshot-1816744033", "description": null, "volume_id": "b4b46ffe-af9f-4496-a1be-69c775e9bac0", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "919eb437bae6438e91c1fc68a41db892", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:02.339 189 INFO tempest.lib.common.rest_client [req-44f8d396-b4f8-4f6b-aac1-80edb0661b9c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.249s 2020-12-14 02:26:02.342 189 DEBUG tempest.lib.common.rest_client [req-44f8d396-b4f8-4f6b-aac1-80edb0661b9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-44f8d396-b4f8-4f6b-aac1-80edb0661b9c', 'x-compute-request-id': 'req-44f8d396-b4f8-4f6b-aac1-80edb0661b9c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:02.587 197 INFO tempest.lib.common.rest_client [req-ca590721-3f72-4aa9-a85c-12587ac8431e ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/snapshots/d8bb4f16-d0dd-4176-8ac0-9238ed8a8e92 0.052s 2020-12-14 02:26:02.591 197 DEBUG tempest.lib.common.rest_client [req-ca590721-3f72-4aa9-a85c-12587ac8431e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-ca590721-3f72-4aa9-a85c-12587ac8431e', 'x-openstack-request-id': 'req-ca590721-3f72-4aa9-a85c-12587ac8431e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/snapshots/d8bb4f16-d0dd-4176-8ac0-9238ed8a8e92'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot d8bb4f16-d0dd-4176-8ac0-9238ed8a8e92 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:02.631 197 INFO tempest.lib.common.rest_client [req-6e985dc7-cb54-43b4-b772-2ab7435ef75a ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_snapshots/6d991062-9b73-49c9-83f8-ceab01fd801c 0.032s 2020-12-14 02:26:02.634 197 DEBUG tempest.lib.common.rest_client [req-6e985dc7-cb54-43b4-b772-2ab7435ef75a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'content-length': '116', 'content-type': 'application/json', 'x-compute-request-id': 'req-6e985dc7-cb54-43b4-b772-2ab7435ef75a', 'x-openstack-request-id': 'req-6e985dc7-cb54-43b4-b772-2ab7435ef75a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_snapshots/6d991062-9b73-49c9-83f8-ceab01fd801c'} Body: b'{"itemNotFound": {"code": 404, "message": "GroupSnapshot 6d991062-9b73-49c9-83f8-ceab01fd801c could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:02.734 197 INFO tempest.lib.common.rest_client [req-4faa1c4b-2afd-4e87-ba1b-12e4b37d2ac8 ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/detail 0.091s 2020-12-14 02:26:02.737 197 DEBUG tempest.lib.common.rest_client [req-4faa1c4b-2afd-4e87-ba1b-12e4b37d2ac8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4faa1c4b-2afd-4e87-ba1b-12e4b37d2ac8', 'content-length': '1175', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4faa1c4b-2afd-4e87-ba1b-12e4b37d2ac8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/detail'} Body: b'{"volumes": [{"id": "b4b46ffe-af9f-4496-a1be-69c775e9bac0", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:25:57.000000", "updated_at": "2020-12-14T02:25:57.000000", "name": "tempest-GroupSnaphotsV319RbacTest-Volume-2062176698", "description": null, "volume_type": "tempest-GroupSnaphotsV319RbacTest-volume-type-894388806", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0"}], "user_id": "792f5bbfca33460c94c8476e85dd214c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "88e1db01-5535-4303-a391-7bc772e77a45", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "919eb437bae6438e91c1fc68a41db892"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:02.968 197 INFO tempest.lib.common.rest_client [req-dd2833aa-0aec-4e84-af11-f3ee1a4f960b ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/groups/88e1db01-5535-4303-a391-7bc772e77a45/action 0.123s 2020-12-14 02:26:02.972 197 DEBUG tempest.lib.common.rest_client [req-dd2833aa-0aec-4e84-af11-f3ee1a4f960b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-dd2833aa-0aec-4e84-af11-f3ee1a4f960b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/groups/88e1db01-5535-4303-a391-7bc772e77a45/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:03.080 197 INFO tempest.lib.common.rest_client [req-44e63014-eee7-4ef0-9639-aaeca028afba ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0 0.101s 2020-12-14 02:26:03.083 197 DEBUG tempest.lib.common.rest_client [req-44e63014-eee7-4ef0-9639-aaeca028afba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-44e63014-eee7-4ef0-9639-aaeca028afba', 'content-length': '1171', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-44e63014-eee7-4ef0-9639-aaeca028afba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0'} Body: b'{"volume": {"id": "b4b46ffe-af9f-4496-a1be-69c775e9bac0", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:25:57.000000", "updated_at": "2020-12-14T02:26:03.000000", "name": "tempest-GroupSnaphotsV319RbacTest-Volume-2062176698", "description": null, "volume_type": "tempest-GroupSnaphotsV319RbacTest-volume-type-894388806", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0"}], "user_id": "792f5bbfca33460c94c8476e85dd214c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "88e1db01-5535-4303-a391-7bc772e77a45", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "919eb437bae6438e91c1fc68a41db892"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:03.662 189 INFO tempest.lib.common.rest_client [req-d2b11ab0-eb49-474c-8e85-fa604e102388 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.215s 2020-12-14 02:26:03.666 189 DEBUG tempest.lib.common.rest_client [req-d2b11ab0-eb49-474c-8e85-fa604e102388 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d2b11ab0-eb49-474c-8e85-fa604e102388', 'x-compute-request-id': 'req-d2b11ab0-eb49-474c-8e85-fa604e102388', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:04.258 197 INFO tempest.lib.common.rest_client [req-9027d26a-4828-49f1-aec2-fb6b0211c957 ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0 0.067s 2020-12-14 02:26:04.261 197 DEBUG tempest.lib.common.rest_client [req-9027d26a-4828-49f1-aec2-fb6b0211c957 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-9027d26a-4828-49f1-aec2-fb6b0211c957', 'x-openstack-request-id': 'req-9027d26a-4828-49f1-aec2-fb6b0211c957', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume b4b46ffe-af9f-4496-a1be-69c775e9bac0 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:04.295 197 INFO tempest.lib.common.rest_client [req-f9d86adf-2dec-4eb8-a6ff-c71aa178d7ab ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/groups/88e1db01-5535-4303-a391-7bc772e77a45 0.026s 2020-12-14 02:26:04.298 197 DEBUG tempest.lib.common.rest_client [req-f9d86adf-2dec-4eb8-a6ff-c71aa178d7ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-f9d86adf-2dec-4eb8-a6ff-c71aa178d7ab', 'x-openstack-request-id': 'req-f9d86adf-2dec-4eb8-a6ff-c71aa178d7ab', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/groups/88e1db01-5535-4303-a391-7bc772e77a45'} Body: b'{"itemNotFound": {"code": 404, "message": "Group 88e1db01-5535-4303-a391-7bc772e77a45 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:04.385 197 INFO tempest.lib.common.rest_client [req-16c649bd-75a9-40ae-9451-8b81a62f3230 ] Request (GroupSnaphotsV319RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_types/8c18ed3a-b67c-48f8-89c9-0d94f62c8aaa 0.078s 2020-12-14 02:26:04.388 197 DEBUG tempest.lib.common.rest_client [req-16c649bd-75a9-40ae-9451-8b81a62f3230 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.19', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.19', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-16c649bd-75a9-40ae-9451-8b81a62f3230', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/group_types/8c18ed3a-b67c-48f8-89c9-0d94f62c8aaa'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:04.491 197 INFO tempest.lib.common.rest_client [req-0d2beb8e-50ea-4b03-872f-e53f43a83250 ] Request (GroupSnaphotsV319RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0 0.075s 2020-12-14 02:26:04.493 197 DEBUG tempest.lib.common.rest_client [req-0d2beb8e-50ea-4b03-872f-e53f43a83250 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-0d2beb8e-50ea-4b03-872f-e53f43a83250', 'x-openstack-request-id': 'req-0d2beb8e-50ea-4b03-872f-e53f43a83250', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/volumes/b4b46ffe-af9f-4496-a1be-69c775e9bac0'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume b4b46ffe-af9f-4496-a1be-69c775e9bac0 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:04.582 197 INFO tempest.lib.common.rest_client [req-78a4135f-31f7-47f7-b44e-7015c12b8be5 ] Request (GroupSnaphotsV319RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/types/f1d8e0ce-6bde-41e5-a9db-9f59ccbd7aa5 0.083s 2020-12-14 02:26:04.585 197 DEBUG tempest.lib.common.rest_client [req-78a4135f-31f7-47f7-b44e-7015c12b8be5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-78a4135f-31f7-47f7-b44e-7015c12b8be5', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/types/f1d8e0ce-6bde-41e5-a9db-9f59ccbd7aa5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:04.622 197 INFO tempest.lib.common.rest_client [req-90123f8c-a3df-4723-968b-f9ce045d892f ] Request (GroupSnaphotsV319RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/types/f1d8e0ce-6bde-41e5-a9db-9f59ccbd7aa5 0.031s 2020-12-14 02:26:04.624 197 DEBUG tempest.lib.common.rest_client [req-90123f8c-a3df-4723-968b-f9ce045d892f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-90123f8c-a3df-4723-968b-f9ce045d892f', 'x-openstack-request-id': 'req-90123f8c-a3df-4723-968b-f9ce045d892f', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/919eb437bae6438e91c1fc68a41db892/types/f1d8e0ce-6bde-41e5-a9db-9f59ccbd7aa5'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type f1d8e0ce-6bde-41e5-a9db-9f59ccbd7aa5 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:04.825 197 INFO tempest.lib.common.rest_client [req-6b4f1dd8-6e80-4e5f-809e-7868667aa64b ] Request (GroupSnaphotsV319RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/792f5bbfca33460c94c8476e85dd214c 0.194s 2020-12-14 02:26:04.828 197 DEBUG tempest.lib.common.rest_client [req-6b4f1dd8-6e80-4e5f-809e-7868667aa64b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b4f1dd8-6e80-4e5f-809e-7868667aa64b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/792f5bbfca33460c94c8476e85dd214c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:04.936 197 INFO tempest.lib.common.rest_client [req-495ebcc0-9d63-4214-afc7-3298947a8215 ] Request (GroupSnaphotsV319RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:26:04.939 197 DEBUG tempest.lib.common.rest_client [req-495ebcc0-9d63-4214-afc7-3298947a8215 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-495ebcc0-9d63-4214-afc7-3298947a8215', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["JicjJMLIRAqTUjI4Si6BMA"], "expires_at": "2020-12-14T03:26:04.000000Z", "issued_at": "2020-12-14T02:26:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:05.163 197 INFO tempest.lib.common.rest_client [req-efd2af61-9bd2-4661-9715-1f086162f2ae ] Request (GroupSnaphotsV319RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=919eb437bae6438e91c1fc68a41db892&name=default 0.216s 2020-12-14 02:26:05.167 197 DEBUG tempest.lib.common.rest_client [req-efd2af61-9bd2-4661-9715-1f086162f2ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-efd2af61-9bd2-4661-9715-1f086162f2ae', 'date': 'Mon, 14 Dec 2020 02:26:05 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=919eb437bae6438e91c1fc68a41db892&name=default'} Body: b'{"security_groups": [{"id": "de41bb29-2c22-4add-a03e-ba3d6836428e", "name": "default", "stateful": true, "tenant_id": "919eb437bae6438e91c1fc68a41db892", "description": "Default security group", "security_group_rules": [{"id": "27005db1-0247-4db9-b928-c45b148e2791", "tenant_id": "919eb437bae6438e91c1fc68a41db892", "security_group_id": "de41bb29-2c22-4add-a03e-ba3d6836428e", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "de41bb29-2c22-4add-a03e-ba3d6836428e", "description": null, "tags": [], "created_at": "2020-12-14T02:26:05Z", "updated_at": "2020-12-14T02:26:05Z", "revision_number": 0, "project_id": "919eb437bae6438e91c1fc68a41db892"}, {"id": "331d919a-07f0-4a67-9d04-d5ad73edf62b", "tenant_id": "919eb437bae6438e91c1fc68a41db892", "security_group_id": "de41bb29-2c22-4add-a03e-ba3d6836428e", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "de41bb29-2c22-4add-a03e-ba3d6836428e", "description": null, "tags": [], "created_at": "2020-12-14T02:26:05Z", "updated_at": "2020-12-14T02:26:05Z", "revision_number": 0, "project_id": "919eb437bae6438e91c1fc68a41db892"}, {"id": "502221a5-c8a7-4483-bd58-890488ae16fa", "tenant_id": "919eb437bae6438e91c1fc68a41db892", "security_group_id": "de41bb29-2c22-4add-a03e-ba3d6836428e", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:26:05Z", "updated_at": "2020-12-14T02:26:05Z", "revision_number": 0, "project_id": "919eb437bae6438e91c1fc68a41db892"}, {"id": "c2d22e07-dae2-419f-816a-0eb47494280d", "tenant_id": "919eb437bae6438e91c1fc68a41db892", "security_group_id": "de41bb29-2c22-4add-a03e-ba3d6836428e", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:26:05Z", "updated_at": "2020-12-14T02:26:05Z", "revision_number": 0, "project_id": "919eb437bae6438e91c1fc68a41db892"}], "tags": [], "created_at": "2020-12-14T02:26:05Z", "updated_at": "2020-12-14T02:26:05Z", "revision_number": 1, "project_id": "919eb437bae6438e91c1fc68a41db892"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:05.192 189 INFO tempest.lib.common.rest_client [req-526d5f36-6389-49ef-a3ec-c14f145048c9 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.419s 2020-12-14 02:26:05.196 189 DEBUG tempest.lib.common.rest_client [req-526d5f36-6389-49ef-a3ec-c14f145048c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-526d5f36-6389-49ef-a3ec-c14f145048c9', 'x-compute-request-id': 'req-526d5f36-6389-49ef-a3ec-c14f145048c9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:05.316 197 INFO tempest.lib.common.rest_client [req-3c5b44fa-2164-4b2a-9064-2987c5ca2589 ] Request (GroupSnaphotsV319RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/de41bb29-2c22-4add-a03e-ba3d6836428e 0.142s 2020-12-14 02:26:05.319 197 DEBUG tempest.lib.common.rest_client [req-3c5b44fa-2164-4b2a-9064-2987c5ca2589 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-3c5b44fa-2164-4b2a-9064-2987c5ca2589', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:26:05 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/de41bb29-2c22-4add-a03e-ba3d6836428e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:05.482 197 INFO tempest.lib.common.rest_client [req-6f0272c5-93f0-4708-887d-d0c767e978c5 ] Request (GroupSnaphotsV319RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892 0.156s 2020-12-14 02:26:05.485 197 DEBUG tempest.lib.common.rest_client [req-6f0272c5-93f0-4708-887d-d0c767e978c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f0272c5-93f0-4708-887d-d0c767e978c5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/919eb437bae6438e91c1fc68a41db892'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:05.608 197 INFO tempest.lib.common.rest_client [req-bbb8650c-ad1a-4671-8f88-041ef171845d ] Request (GroupTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:26:05.611 197 DEBUG tempest.lib.common.rest_client [req-bbb8650c-ad1a-4671-8f88-041ef171845d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bbb8650c-ad1a-4671-8f88-041ef171845d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["zb01W4CtQcaZp9Bhwpvwvw"], "expires_at": "2020-12-14T03:26:05.000000Z", "issued_at": "2020-12-14T02:26:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:05.815 197 INFO tempest.lib.common.rest_client [req-27a80dff-a98e-40fc-b2ad-b4e8b0a60f66 ] Request (GroupTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.138s 2020-12-14 02:26:05.818 197 DEBUG tempest.lib.common.rest_client [req-27a80dff-a98e-40fc-b2ad-b4e8b0a60f66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27a80dff-a98e-40fc-b2ad-b4e8b0a60f66', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["DqzTWbHlSR2_ogDQmIdHzw"], "expires_at": "2020-12-14T03:26:05.000000Z", "issued_at": "2020-12-14T02:26:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:05.897 197 INFO tempest.lib.common.rest_client [req-513a1665-b66d-4fe6-8fdb-e5ea02c6a969 ] Request (GroupTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.071s 2020-12-14 02:26:05.899 197 DEBUG tempest.lib.common.rest_client [req-513a1665-b66d-4fe6-8fdb-e5ea02c6a969 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-513a1665-b66d-4fe6-8fdb-e5ea02c6a969', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:05.976 197 INFO tempest.lib.common.rest_client [req-cfdeeaa5-058c-4c6b-bbdb-181ba865ba28 ] Request (GroupTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.069s 2020-12-14 02:26:05.979 197 DEBUG tempest.lib.common.rest_client [req-cfdeeaa5-058c-4c6b-bbdb-181ba865ba28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-GroupTypesV3RbacTest-357710802-desc", "domain_id": "default", "name": "tempest-GroupTypesV3RbacTest-357710802"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfdeeaa5-058c-4c6b-bbdb-181ba865ba28', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "name": "tempest-GroupTypesV3RbacTest-357710802", "domain_id": "default", "description": "tempest-GroupTypesV3RbacTest-357710802-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:06.113 197 INFO tempest.lib.common.rest_client [req-adcc98e0-6e05-4db6-bf34-3c6b3f5d2ec0 ] Request (GroupTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.122s 2020-12-14 02:26:06.116 197 DEBUG tempest.lib.common.rest_client [req-adcc98e0-6e05-4db6-bf34-3c6b3f5d2ec0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-GroupTypesV3RbacTest-357710802", "password": "Q0*U+65*dsSicng", "project_id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "email": "tempest-GroupTypesV3RbacTest-154233093@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '394', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-adcc98e0-6e05-4db6-bf34-3c6b3f5d2ec0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "email": "tempest-GroupTypesV3RbacTest-154233093@example.com", "id": "f8153e16f40f48269aff0b16cd45d0f7", "name": "tempest-GroupTypesV3RbacTest-357710802", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/f8153e16f40f48269aff0b16cd45d0f7"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:06.191 197 INFO tempest.lib.common.rest_client [req-fbeba448-ca59-4504-bbe6-a8d9a5cd2830 ] Request (GroupTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-12-14 02:26:06.193 197 DEBUG tempest.lib.common.rest_client [req-fbeba448-ca59-4504-bbe6-a8d9a5cd2830 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fbeba448-ca59-4504-bbe6-a8d9a5cd2830', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:06.263 197 INFO tempest.lib.common.rest_client [req-bc14575c-8b82-42e6-b4e5-aafab8ba3c57 ] Request (GroupTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:26:06.266 197 DEBUG tempest.lib.common.rest_client [req-bc14575c-8b82-42e6-b4e5-aafab8ba3c57 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc14575c-8b82-42e6-b4e5-aafab8ba3c57', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:06.362 197 INFO tempest.lib.common.rest_client [req-f194c379-cebb-4ae2-8240-77c13ec7ee3f ] Request (GroupTypesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles/72a4576c553448cd941b052c1ca0cf2d 0.086s 2020-12-14 02:26:06.365 197 DEBUG tempest.lib.common.rest_client [req-f194c379-cebb-4ae2-8240-77c13ec7ee3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f194c379-cebb-4ae2-8240-77c13ec7ee3f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:06.370 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupTypesV3RbacTest-357710802', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd5ccf8a6794f470fbe2a0896fe1de6d5', 'project_name': 'tempest-GroupTypesV3RbacTest-357710802', 'tenant_id': 'd5ccf8a6794f470fbe2a0896fe1de6d5', 'tenant_name': 'tempest-GroupTypesV3RbacTest-357710802', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f8153e16f40f48269aff0b16cd45d0f7'}, Network: None, Subnet: None, Router: None 2020-12-14 02:26:06.374 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupTypesV3RbacTest-357710802', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'd5ccf8a6794f470fbe2a0896fe1de6d5', 'project_name': 'tempest-GroupTypesV3RbacTest-357710802', 'tenant_id': 'd5ccf8a6794f470fbe2a0896fe1de6d5', 'tenant_name': 'tempest-GroupTypesV3RbacTest-357710802', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'f8153e16f40f48269aff0b16cd45d0f7'}, Network: None, Subnet: None, Router: None 2020-12-14 02:26:06.517 189 INFO tempest.lib.common.rest_client [req-32b3b44c-7f0d-42d8-bb5e-92f87c74e4fe ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.217s 2020-12-14 02:26:06.520 189 DEBUG tempest.lib.common.rest_client [req-32b3b44c-7f0d-42d8-bb5e-92f87c74e4fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-32b3b44c-7f0d-42d8-bb5e-92f87c74e4fe', 'x-compute-request-id': 'req-32b3b44c-7f0d-42d8-bb5e-92f87c74e4fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:06.567 197 INFO tempest.lib.common.rest_client [req-ad21d480-7bae-4d72-927c-974a717917f4 ] Request (GroupTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.129s 2020-12-14 02:26:06.571 197 DEBUG tempest.lib.common.rest_client [req-ad21d480-7bae-4d72-927c-974a717917f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad21d480-7bae-4d72-927c-974a717917f4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f8153e16f40f48269aff0b16cd45d0f7", "name": "tempest-GroupTypesV3RbacTest-357710802", "password_expires_at": null}, "audit_ids": ["iZz4gSX1S9690IlqZKDBhw"], "expires_at": "2020-12-14T03:26:06.000000Z", "issued_at": "2020-12-14T02:26:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "name": "tempest-GroupTypesV3RbacTest-357710802"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:06.689 197 INFO tempest.lib.common.rest_client [req-55beef3e-4a8c-413f-9075-999117113730 ] Request (GroupTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:26:06.693 197 DEBUG tempest.lib.common.rest_client [req-55beef3e-4a8c-413f-9075-999117113730 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55beef3e-4a8c-413f-9075-999117113730', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["rT-kIXgZSjCP4CvgqSJFtw"], "expires_at": "2020-12-14T03:26:06.000000Z", "issued_at": "2020-12-14T02:26:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:06.821 197 INFO tempest.lib.common.rest_client [req-92b1c3c5-3d73-4099-b955-01fc67bf4fa2 ] Request (GroupTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:26:06.825 197 DEBUG tempest.lib.common.rest_client [req-92b1c3c5-3d73-4099-b955-01fc67bf4fa2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92b1c3c5-3d73-4099-b955-01fc67bf4fa2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ayfNPx-aSw2Wu1gN5o6LMQ"], "expires_at": "2020-12-14T03:26:06.000000Z", "issued_at": "2020-12-14T02:26:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:06.900 197 INFO tempest.lib.common.rest_client [req-6366fac2-4c28-4c14-a2b6-0389d08a6ba3 ] Request (GroupTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.065s 2020-12-14 02:26:06.902 197 DEBUG tempest.lib.common.rest_client [req-6366fac2-4c28-4c14-a2b6-0389d08a6ba3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6366fac2-4c28-4c14-a2b6-0389d08a6ba3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:06.978 197 INFO tempest.lib.common.rest_client [req-48e364ec-1e7d-4251-a156-c04c3888b40a ] Request (GroupTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:26:06.980 197 DEBUG tempest.lib.common.rest_client [req-48e364ec-1e7d-4251-a156-c04c3888b40a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-48e364ec-1e7d-4251-a156-c04c3888b40a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:06.984 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:26:06.986 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:07.066 197 INFO tempest.lib.common.rest_client [req-e4f230be-b617-4608-b89b-7537067847f1 ] Request (GroupTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles 0.074s 2020-12-14 02:26:07.069 197 DEBUG tempest.lib.common.rest_client [req-e4f230be-b617-4608-b89b-7537067847f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4f230be-b617-4608-b89b-7537067847f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:07.163 197 INFO tempest.lib.common.rest_client [req-555f37f9-b632-4c51-98aa-443a42086744 ] Request (GroupTypesV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles/72a4576c553448cd941b052c1ca0cf2d 0.086s 2020-12-14 02:26:07.165 197 DEBUG tempest.lib.common.rest_client [req-555f37f9-b632-4c51-98aa-443a42086744 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-555f37f9-b632-4c51-98aa-443a42086744', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:07.298 197 INFO tempest.lib.common.rest_client [req-a5229f3d-a476-44a8-b4db-ed3f23445b60 ] Request (GroupTypesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles/a629c95d64b3416fb80ae90af4f69c05 0.127s 2020-12-14 02:26:07.301 197 DEBUG tempest.lib.common.rest_client [req-a5229f3d-a476-44a8-b4db-ed3f23445b60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5229f3d-a476-44a8-b4db-ed3f23445b60', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:07.853 189 INFO tempest.lib.common.rest_client [req-a7e34d8c-b100-4b9e-8392-2fb517438e41 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.227s 2020-12-14 02:26:07.856 189 DEBUG tempest.lib.common.rest_client [req-a7e34d8c-b100-4b9e-8392-2fb517438e41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a7e34d8c-b100-4b9e-8392-2fb517438e41', 'x-compute-request-id': 'req-a7e34d8c-b100-4b9e-8392-2fb517438e41', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:08.406 197 INFO tempest.lib.common.rest_client [req-3a545eba-90b3-479e-a857-e4e5133103ca ] Request (GroupTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:26:08.409 197 DEBUG tempest.lib.common.rest_client [req-3a545eba-90b3-479e-a857-e4e5133103ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a545eba-90b3-479e-a857-e4e5133103ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f8153e16f40f48269aff0b16cd45d0f7", "name": "tempest-GroupTypesV3RbacTest-357710802", "password_expires_at": null}, "audit_ids": ["3jtE1FtpRsK54yRSmp4ZhQ"], "expires_at": "2020-12-14T03:26:08.000000Z", "issued_at": "2020-12-14T02:26:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "name": "tempest-GroupTypesV3RbacTest-357710802"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:08.421 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:26:08.440 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:group_types_manage, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:26:08.442 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:08.559 197 INFO tempest.lib.common.rest_client [req-79c1ec7a-f75c-4ba6-a93b-d007d27736ab ] Request (GroupTypesV3RbacTest:test_create_group_type): 200 GET http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles 0.110s 2020-12-14 02:26:08.562 197 DEBUG tempest.lib.common.rest_client [req-79c1ec7a-f75c-4ba6-a93b-d007d27736ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79c1ec7a-f75c-4ba6-a93b-d007d27736ab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:08.613 197 INFO tempest.lib.common.rest_client [req-5463aa1e-4efa-4dcd-95c5-7e714a928c3d ] Request (GroupTypesV3RbacTest:test_create_group_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:26:08.617 197 DEBUG tempest.lib.common.rest_client [req-5463aa1e-4efa-4dcd-95c5-7e714a928c3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5463aa1e-4efa-4dcd-95c5-7e714a928c3d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f8153e16f40f48269aff0b16cd45d0f7", "name": "tempest-GroupTypesV3RbacTest-357710802", "password_expires_at": null}, "audit_ids": ["1utLVb6BQtaBosvox59E2Q"], "expires_at": "2020-12-14T03:26:08.000000Z", "issued_at": "2020-12-14T02:26:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "name": "tempest-GroupTypesV3RbacTest-357710802"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:08.811 197 INFO tempest.lib.common.rest_client [req-5fdc72b2-203f-4585-bacd-97b542178871 ] Request (GroupTypesV3RbacTest:test_create_group_type): 202 POST http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types 0.186s 2020-12-14 02:26:08.814 197 DEBUG tempest.lib.common.rest_client [req-5fdc72b2-203f-4585-bacd-97b542178871 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypesV3RbacTest-group-type-1224156518"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5fdc72b2-203f-4585-bacd-97b542178871', 'content-length': '183', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5fdc72b2-203f-4585-bacd-97b542178871', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types'} Body: b'{"group_type": {"id": "909f3582-bbfa-49f6-8764-758ec956ee56", "name": "tempest-GroupTypesV3RbacTest-group-type-1224156518", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:08.837 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:08.905 197 INFO tempest.lib.common.rest_client [req-ce3223fc-604a-406e-b0bc-daea4d930511 ] Request (GroupTypesV3RbacTest:test_create_group_type): 200 GET http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles 0.062s 2020-12-14 02:26:08.908 197 DEBUG tempest.lib.common.rest_client [req-ce3223fc-604a-406e-b0bc-daea4d930511 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce3223fc-604a-406e-b0bc-daea4d930511', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:08.960 197 INFO tempest.lib.common.rest_client [req-0fdeb730-595b-4881-9580-43900676da20 ] Request (GroupTypesV3RbacTest:test_create_group_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:26:08.964 197 DEBUG tempest.lib.common.rest_client [req-0fdeb730-595b-4881-9580-43900676da20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0fdeb730-595b-4881-9580-43900676da20', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f8153e16f40f48269aff0b16cd45d0f7", "name": "tempest-GroupTypesV3RbacTest-357710802", "password_expires_at": null}, "audit_ids": ["FwfTIHGYSLiEVTBEhOJmGg"], "expires_at": "2020-12-14T03:26:08.000000Z", "issued_at": "2020-12-14T02:26:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "name": "tempest-GroupTypesV3RbacTest-357710802"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:09.084 197 INFO tempest.lib.common.rest_client [req-be69b428-4c20-4237-809f-ebb4428db50b ] Request (GroupTypesV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types/909f3582-bbfa-49f6-8764-758ec956ee56 0.109s 2020-12-14 02:26:09.087 197 DEBUG tempest.lib.common.rest_client [req-be69b428-4c20-4237-809f-ebb4428db50b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-be69b428-4c20-4237-809f-ebb4428db50b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types/909f3582-bbfa-49f6-8764-758ec956ee56'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:09.099 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:26:09.117 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:access_group_types_specs, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:26:09.119 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:09.192 189 INFO tempest.lib.common.rest_client [req-0cba61f0-e769-4944-ac7c-c7a44d5fcf5d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.219s 2020-12-14 02:26:09.192 197 INFO tempest.lib.common.rest_client [req-f304c1d0-8f28-4e69-9f13-082640d963d8 ] Request (GroupTypesV3RbacTest:test_create_group_type_group_specs): 200 GET http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles 0.067s 2020-12-14 02:26:09.196 197 DEBUG tempest.lib.common.rest_client [req-f304c1d0-8f28-4e69-9f13-082640d963d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f304c1d0-8f28-4e69-9f13-082640d963d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:09.196 189 DEBUG tempest.lib.common.rest_client [req-0cba61f0-e769-4944-ac7c-c7a44d5fcf5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0cba61f0-e769-4944-ac7c-c7a44d5fcf5d', 'x-compute-request-id': 'req-0cba61f0-e769-4944-ac7c-c7a44d5fcf5d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:09.249 197 INFO tempest.lib.common.rest_client [req-325ea990-30ed-4fa6-82b4-9dcf27e6580a ] Request (GroupTypesV3RbacTest:test_create_group_type_group_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:26:09.252 197 DEBUG tempest.lib.common.rest_client [req-325ea990-30ed-4fa6-82b4-9dcf27e6580a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-325ea990-30ed-4fa6-82b4-9dcf27e6580a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f8153e16f40f48269aff0b16cd45d0f7", "name": "tempest-GroupTypesV3RbacTest-357710802", "password_expires_at": null}, "audit_ids": ["kPJmLlOGQCWmxpzsZ0fmFQ"], "expires_at": "2020-12-14T03:26:09.000000Z", "issued_at": "2020-12-14T02:26:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "name": "tempest-GroupTypesV3RbacTest-357710802"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:09.371 197 INFO tempest.lib.common.rest_client [req-0fdf34ff-8c4c-4006-b252-c2e26a43648f ] Request (GroupTypesV3RbacTest:test_create_group_type_group_specs): 202 POST http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types 0.111s 2020-12-14 02:26:09.374 197 DEBUG tempest.lib.common.rest_client [req-0fdf34ff-8c4c-4006-b252-c2e26a43648f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypesV3RbacTest-group-type-1539431290"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0fdf34ff-8c4c-4006-b252-c2e26a43648f', 'content-length': '183', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0fdf34ff-8c4c-4006-b252-c2e26a43648f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types'} Body: b'{"group_type": {"id": "a4c560ec-3177-4335-9b95-e4e713b9c312", "name": "tempest-GroupTypesV3RbacTest-group-type-1539431290", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:09.397 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:09.468 197 INFO tempest.lib.common.rest_client [req-2384885f-7195-46aa-b5e7-9e133c621f27 ] Request (GroupTypesV3RbacTest:test_create_group_type_group_specs): 200 GET http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles 0.064s 2020-12-14 02:26:09.471 197 DEBUG tempest.lib.common.rest_client [req-2384885f-7195-46aa-b5e7-9e133c621f27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2384885f-7195-46aa-b5e7-9e133c621f27', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:09.523 197 INFO tempest.lib.common.rest_client [req-7d3a73f0-3ec8-4276-ad7d-1f7df9689d8e ] Request (GroupTypesV3RbacTest:test_create_group_type_group_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:26:09.527 197 DEBUG tempest.lib.common.rest_client [req-7d3a73f0-3ec8-4276-ad7d-1f7df9689d8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d3a73f0-3ec8-4276-ad7d-1f7df9689d8e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f8153e16f40f48269aff0b16cd45d0f7", "name": "tempest-GroupTypesV3RbacTest-357710802", "password_expires_at": null}, "audit_ids": ["ulEwvH3FRlaCHMYKmzRrtA"], "expires_at": "2020-12-14T03:26:09.000000Z", "issued_at": "2020-12-14T02:26:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "name": "tempest-GroupTypesV3RbacTest-357710802"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:09.652 197 INFO tempest.lib.common.rest_client [req-0da688f3-eb31-439d-ad9d-7a349ea68853 ] Request (GroupTypesV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types/a4c560ec-3177-4335-9b95-e4e713b9c312 0.115s 2020-12-14 02:26:09.656 197 DEBUG tempest.lib.common.rest_client [req-0da688f3-eb31-439d-ad9d-7a349ea68853 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0da688f3-eb31-439d-ad9d-7a349ea68853', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types/a4c560ec-3177-4335-9b95-e4e713b9c312'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:09.668 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:26:09.687 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:group_types_manage, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:26:09.739 197 INFO tempest.lib.common.rest_client [req-e753c10e-1d86-4d58-b27c-ee3e21981700 ] Request (GroupTypesV3RbacTest:test_delete_group_type): 202 POST http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types 0.046s 2020-12-14 02:26:09.742 197 DEBUG tempest.lib.common.rest_client [req-e753c10e-1d86-4d58-b27c-ee3e21981700 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypesV3RbacTest-group-type-582307985"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e753c10e-1d86-4d58-b27c-ee3e21981700', 'content-length': '182', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e753c10e-1d86-4d58-b27c-ee3e21981700', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types'} Body: b'{"group_type": {"id": "beebaa5f-aac9-4a4a-9d73-b3c5811a3926", "name": "tempest-GroupTypesV3RbacTest-group-type-582307985", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:09.766 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:09.833 197 INFO tempest.lib.common.rest_client [req-63efa786-206c-482a-b0ae-1509ade87b4f ] Request (GroupTypesV3RbacTest:test_delete_group_type): 200 GET http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles 0.060s 2020-12-14 02:26:09.836 197 DEBUG tempest.lib.common.rest_client [req-63efa786-206c-482a-b0ae-1509ade87b4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63efa786-206c-482a-b0ae-1509ade87b4f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:09.886 197 INFO tempest.lib.common.rest_client [req-4bcd7843-78da-4db3-86a6-86bf3e5d88f0 ] Request (GroupTypesV3RbacTest:test_delete_group_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:26:09.889 197 DEBUG tempest.lib.common.rest_client [req-4bcd7843-78da-4db3-86a6-86bf3e5d88f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4bcd7843-78da-4db3-86a6-86bf3e5d88f0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f8153e16f40f48269aff0b16cd45d0f7", "name": "tempest-GroupTypesV3RbacTest-357710802", "password_expires_at": null}, "audit_ids": ["mJSv3fSoTI2VfGupjrIyUQ"], "expires_at": "2020-12-14T03:26:09.000000Z", "issued_at": "2020-12-14T02:26:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "name": "tempest-GroupTypesV3RbacTest-357710802"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:10.000 197 INFO tempest.lib.common.rest_client [req-924d46a5-afa6-49a3-9e24-5b87dfc0818a ] Request (GroupTypesV3RbacTest:test_delete_group_type): 202 DELETE http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types/beebaa5f-aac9-4a4a-9d73-b3c5811a3926 0.103s 2020-12-14 02:26:10.003 197 DEBUG tempest.lib.common.rest_client [req-924d46a5-afa6-49a3-9e24-5b87dfc0818a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-924d46a5-afa6-49a3-9e24-5b87dfc0818a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types/beebaa5f-aac9-4a4a-9d73-b3c5811a3926'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:10.007 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:10.071 197 INFO tempest.lib.common.rest_client [req-a4f17001-ed29-4fcf-bf97-075121b44d1b ] Request (GroupTypesV3RbacTest:test_delete_group_type): 200 GET http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles 0.058s 2020-12-14 02:26:10.074 197 DEBUG tempest.lib.common.rest_client [req-a4f17001-ed29-4fcf-bf97-075121b44d1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a4f17001-ed29-4fcf-bf97-075121b44d1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:10.126 197 INFO tempest.lib.common.rest_client [req-235228b7-7866-4f5c-bc0e-3d37556ded3d ] Request (GroupTypesV3RbacTest:test_delete_group_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:26:10.130 197 DEBUG tempest.lib.common.rest_client [req-235228b7-7866-4f5c-bc0e-3d37556ded3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-235228b7-7866-4f5c-bc0e-3d37556ded3d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f8153e16f40f48269aff0b16cd45d0f7", "name": "tempest-GroupTypesV3RbacTest-357710802", "password_expires_at": null}, "audit_ids": ["koXjooCiSlS9_3snt3u9YQ"], "expires_at": "2020-12-14T03:26:10.000000Z", "issued_at": "2020-12-14T02:26:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "name": "tempest-GroupTypesV3RbacTest-357710802"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:10.235 197 INFO tempest.lib.common.rest_client [req-51325f25-1fdb-4fc3-a84c-c1c822b0b93c ] Request (GroupTypesV3RbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types/beebaa5f-aac9-4a4a-9d73-b3c5811a3926 0.095s 2020-12-14 02:26:10.238 197 DEBUG tempest.lib.common.rest_client [req-51325f25-1fdb-4fc3-a84c-c1c822b0b93c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'content-length': '113', 'content-type': 'application/json', 'x-compute-request-id': 'req-51325f25-1fdb-4fc3-a84c-c1c822b0b93c', 'x-openstack-request-id': 'req-51325f25-1fdb-4fc3-a84c-c1c822b0b93c', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types/beebaa5f-aac9-4a4a-9d73-b3c5811a3926'} Body: b'{"itemNotFound": {"code": 404, "message": "Group type beebaa5f-aac9-4a4a-9d73-b3c5811a3926 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:10.250 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:26:10.269 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:access_group_types_specs, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:26:10.324 197 INFO tempest.lib.common.rest_client [req-393e513b-5810-4372-b0f6-dac33c2d19f7 ] Request (GroupTypesV3RbacTest:test_show_group_type): 202 POST http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types 0.050s 2020-12-14 02:26:10.327 197 DEBUG tempest.lib.common.rest_client [req-393e513b-5810-4372-b0f6-dac33c2d19f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypesV3RbacTest-group-type-1161266484"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-393e513b-5810-4372-b0f6-dac33c2d19f7', 'content-length': '183', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-393e513b-5810-4372-b0f6-dac33c2d19f7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types'} Body: b'{"group_type": {"id": "3c795d47-7423-4ec0-b26b-4ac11172b5c9", "name": "tempest-GroupTypesV3RbacTest-group-type-1161266484", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:10.351 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:10.419 197 INFO tempest.lib.common.rest_client [req-f3225da5-c0cf-4aa8-81dd-f864ec685109 ] Request (GroupTypesV3RbacTest:test_show_group_type): 200 GET http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles 0.062s 2020-12-14 02:26:10.422 197 DEBUG tempest.lib.common.rest_client [req-f3225da5-c0cf-4aa8-81dd-f864ec685109 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3225da5-c0cf-4aa8-81dd-f864ec685109', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:10.470 197 INFO tempest.lib.common.rest_client [req-92281f54-bea7-44d5-964e-d2e16127d5ab ] Request (GroupTypesV3RbacTest:test_show_group_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:26:10.474 197 DEBUG tempest.lib.common.rest_client [req-92281f54-bea7-44d5-964e-d2e16127d5ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-92281f54-bea7-44d5-964e-d2e16127d5ab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f8153e16f40f48269aff0b16cd45d0f7", "name": "tempest-GroupTypesV3RbacTest-357710802", "password_expires_at": null}, "audit_ids": ["2mRH2JnzRPObv4WUdBn1NA"], "expires_at": "2020-12-14T03:26:10.000000Z", "issued_at": "2020-12-14T02:26:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "name": "tempest-GroupTypesV3RbacTest-357710802"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:10.535 189 INFO tempest.lib.common.rest_client [req-1e19f0ae-20a8-4357-aa7e-5b76876e1672 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.230s 2020-12-14 02:26:10.537 189 DEBUG tempest.lib.common.rest_client [req-1e19f0ae-20a8-4357-aa7e-5b76876e1672 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1e19f0ae-20a8-4357-aa7e-5b76876e1672', 'x-compute-request-id': 'req-1e19f0ae-20a8-4357-aa7e-5b76876e1672', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:10.575 197 INFO tempest.lib.common.rest_client [req-d04db8b8-6428-46ed-afda-a8b8f7d6cb0d ] Request (GroupTypesV3RbacTest:test_show_group_type): 200 GET http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types/3c795d47-7423-4ec0-b26b-4ac11172b5c9 0.091s 2020-12-14 02:26:10.579 197 DEBUG tempest.lib.common.rest_client [req-d04db8b8-6428-46ed-afda-a8b8f7d6cb0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d04db8b8-6428-46ed-afda-a8b8f7d6cb0d', 'content-length': '183', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d04db8b8-6428-46ed-afda-a8b8f7d6cb0d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types/3c795d47-7423-4ec0-b26b-4ac11172b5c9'} Body: b'{"group_type": {"id": "3c795d47-7423-4ec0-b26b-4ac11172b5c9", "name": "tempest-GroupTypesV3RbacTest-group-type-1161266484", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:10.601 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:10.664 197 INFO tempest.lib.common.rest_client [req-d2a0e00c-6c92-471e-b209-99e740041ca0 ] Request (GroupTypesV3RbacTest:test_show_group_type): 200 GET http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles 0.057s 2020-12-14 02:26:10.667 197 DEBUG tempest.lib.common.rest_client [req-d2a0e00c-6c92-471e-b209-99e740041ca0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2a0e00c-6c92-471e-b209-99e740041ca0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:10.716 197 INFO tempest.lib.common.rest_client [req-515912be-4f1b-4bcc-9945-d6692b6e9b36 ] Request (GroupTypesV3RbacTest:test_show_group_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:26:10.720 197 DEBUG tempest.lib.common.rest_client [req-515912be-4f1b-4bcc-9945-d6692b6e9b36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-515912be-4f1b-4bcc-9945-d6692b6e9b36', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f8153e16f40f48269aff0b16cd45d0f7", "name": "tempest-GroupTypesV3RbacTest-357710802", "password_expires_at": null}, "audit_ids": ["e4ayx39AR9qfIgCrSM6FqQ"], "expires_at": "2020-12-14T03:26:10.000000Z", "issued_at": "2020-12-14T02:26:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "name": "tempest-GroupTypesV3RbacTest-357710802"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:10.831 197 INFO tempest.lib.common.rest_client [req-291b0c35-9c71-4094-a3cd-c5371bcd45eb ] Request (GroupTypesV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types/3c795d47-7423-4ec0-b26b-4ac11172b5c9 0.101s 2020-12-14 02:26:10.834 197 DEBUG tempest.lib.common.rest_client [req-291b0c35-9c71-4094-a3cd-c5371bcd45eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-291b0c35-9c71-4094-a3cd-c5371bcd45eb', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types/3c795d47-7423-4ec0-b26b-4ac11172b5c9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:10.847 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:26:10.866 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:group_types_manage, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:26:10.921 197 INFO tempest.lib.common.rest_client [req-0e26adb6-ecb2-42fb-983c-90d06c852eb2 ] Request (GroupTypesV3RbacTest:test_update_group_type): 202 POST http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types 0.049s 2020-12-14 02:26:10.924 197 DEBUG tempest.lib.common.rest_client [req-0e26adb6-ecb2-42fb-983c-90d06c852eb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypesV3RbacTest-group-type-1921836877"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0e26adb6-ecb2-42fb-983c-90d06c852eb2', 'content-length': '183', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0e26adb6-ecb2-42fb-983c-90d06c852eb2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types'} Body: b'{"group_type": {"id": "7a247758-7796-434e-964b-fb454c47b65a", "name": "tempest-GroupTypesV3RbacTest-group-type-1921836877", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:10.948 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:11.015 197 INFO tempest.lib.common.rest_client [req-26fd9584-f473-4930-a0ed-7979943f6d2f ] Request (GroupTypesV3RbacTest:test_update_group_type): 200 GET http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles 0.060s 2020-12-14 02:26:11.018 197 DEBUG tempest.lib.common.rest_client [req-26fd9584-f473-4930-a0ed-7979943f6d2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26fd9584-f473-4930-a0ed-7979943f6d2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:11.070 197 INFO tempest.lib.common.rest_client [req-a892fea1-9f22-4428-9d7c-2f41d3c84cd8 ] Request (GroupTypesV3RbacTest:test_update_group_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:26:11.074 197 DEBUG tempest.lib.common.rest_client [req-a892fea1-9f22-4428-9d7c-2f41d3c84cd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a892fea1-9f22-4428-9d7c-2f41d3c84cd8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f8153e16f40f48269aff0b16cd45d0f7", "name": "tempest-GroupTypesV3RbacTest-357710802", "password_expires_at": null}, "audit_ids": ["qfikVwkZSMmNnBUvW4k0NQ"], "expires_at": "2020-12-14T03:26:11.000000Z", "issued_at": "2020-12-14T02:26:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "name": "tempest-GroupTypesV3RbacTest-357710802"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:11.178 197 INFO tempest.lib.common.rest_client [req-b4013091-4946-4880-b08b-3c0c1ab58f91 ] Request (GroupTypesV3RbacTest:test_update_group_type): 200 PUT http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types/7a247758-7796-434e-964b-fb454c47b65a 0.095s 2020-12-14 02:26:11.182 197 DEBUG tempest.lib.common.rest_client [req-b4013091-4946-4880-b08b-3c0c1ab58f91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupTypesV3RbacTest-updated-group-type-717264163", "description": "updated-group-type-desc"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b4013091-4946-4880-b08b-3c0c1ab58f91', 'content-length': '211', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b4013091-4946-4880-b08b-3c0c1ab58f91', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types/7a247758-7796-434e-964b-fb454c47b65a'} Body: b'{"group_type": {"id": "7a247758-7796-434e-964b-fb454c47b65a", "name": "tempest-GroupTypesV3RbacTest-updated-group-type-717264163", "description": "updated-group-type-desc", "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:11.206 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:11.275 197 INFO tempest.lib.common.rest_client [req-a12b6bd8-4c3a-4c06-91c4-7c66a7a3c496 ] Request (GroupTypesV3RbacTest:test_update_group_type): 200 GET http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles 0.063s 2020-12-14 02:26:11.278 197 DEBUG tempest.lib.common.rest_client [req-a12b6bd8-4c3a-4c06-91c4-7c66a7a3c496 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a12b6bd8-4c3a-4c06-91c4-7c66a7a3c496', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5/users/f8153e16f40f48269aff0b16cd45d0f7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:11.331 197 INFO tempest.lib.common.rest_client [req-f2f8830c-f0d9-45e6-b7d3-a843983cf8a5 ] Request (GroupTypesV3RbacTest:test_update_group_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:26:11.334 197 DEBUG tempest.lib.common.rest_client [req-f2f8830c-f0d9-45e6-b7d3-a843983cf8a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2f8830c-f0d9-45e6-b7d3-a843983cf8a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "f8153e16f40f48269aff0b16cd45d0f7", "name": "tempest-GroupTypesV3RbacTest-357710802", "password_expires_at": null}, "audit_ids": ["_htjVdRhQdqGw8eN4Xi4bw"], "expires_at": "2020-12-14T03:26:11.000000Z", "issued_at": "2020-12-14T02:26:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "name": "tempest-GroupTypesV3RbacTest-357710802"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_d5ccf8a6794f470fbe2a0896fe1de6d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:11.447 197 INFO tempest.lib.common.rest_client [req-3fa99469-d13a-4bf2-9318-ed74ff1317a0 ] Request (GroupTypesV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types/7a247758-7796-434e-964b-fb454c47b65a 0.103s 2020-12-14 02:26:11.450 197 DEBUG tempest.lib.common.rest_client [req-3fa99469-d13a-4bf2-9318-ed74ff1317a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.11', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.11', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3fa99469-d13a-4bf2-9318-ed74ff1317a0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/d5ccf8a6794f470fbe2a0896fe1de6d5/group_types/7a247758-7796-434e-964b-fb454c47b65a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:11.606 197 INFO tempest.lib.common.rest_client [req-9646ad42-c509-4bb5-b72f-853bf217c807 ] Request (GroupTypesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/f8153e16f40f48269aff0b16cd45d0f7 0.141s 2020-12-14 02:26:11.609 197 DEBUG tempest.lib.common.rest_client [req-9646ad42-c509-4bb5-b72f-853bf217c807 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9646ad42-c509-4bb5-b72f-853bf217c807', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/f8153e16f40f48269aff0b16cd45d0f7'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:11.714 197 INFO tempest.lib.common.rest_client [req-56c08bb7-f9ac-4e7c-aa72-b440b88fbc20 ] Request (GroupTypesV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:26:11.717 197 DEBUG tempest.lib.common.rest_client [req-56c08bb7-f9ac-4e7c-aa72-b440b88fbc20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56c08bb7-f9ac-4e7c-aa72-b440b88fbc20', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["A6nfn70VSZK9x1zLPUew_w"], "expires_at": "2020-12-14T03:26:11.000000Z", "issued_at": "2020-12-14T02:26:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:11.882 189 INFO tempest.lib.common.rest_client [req-3b03f101-6a77-47ea-aad2-a35b35f7f4b9 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.237s 2020-12-14 02:26:11.886 189 DEBUG tempest.lib.common.rest_client [req-3b03f101-6a77-47ea-aad2-a35b35f7f4b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3b03f101-6a77-47ea-aad2-a35b35f7f4b9', 'x-compute-request-id': 'req-3b03f101-6a77-47ea-aad2-a35b35f7f4b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:12.077 197 INFO tempest.lib.common.rest_client [req-d959b091-fb28-4654-85d5-823a68546fda ] Request (GroupTypesV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d5ccf8a6794f470fbe2a0896fe1de6d5&name=default 0.352s 2020-12-14 02:26:12.081 197 DEBUG tempest.lib.common.rest_client [req-d959b091-fb28-4654-85d5-823a68546fda ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-d959b091-fb28-4654-85d5-823a68546fda', 'date': 'Mon, 14 Dec 2020 02:26:12 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=d5ccf8a6794f470fbe2a0896fe1de6d5&name=default'} Body: b'{"security_groups": [{"id": "ad034c91-5a7c-444e-b7dc-302a4c722425", "name": "default", "stateful": true, "tenant_id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "description": "Default security group", "security_group_rules": [{"id": "403de1ae-6ebf-4f95-8bba-50456ce5b128", "tenant_id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "security_group_id": "ad034c91-5a7c-444e-b7dc-302a4c722425", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:26:11Z", "updated_at": "2020-12-14T02:26:11Z", "revision_number": 0, "project_id": "d5ccf8a6794f470fbe2a0896fe1de6d5"}, {"id": "6521929e-285c-4797-a471-c40f1a9615eb", "tenant_id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "security_group_id": "ad034c91-5a7c-444e-b7dc-302a4c722425", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "ad034c91-5a7c-444e-b7dc-302a4c722425", "description": null, "tags": [], "created_at": "2020-12-14T02:26:11Z", "updated_at": "2020-12-14T02:26:11Z", "revision_number": 0, "project_id": "d5ccf8a6794f470fbe2a0896fe1de6d5"}, {"id": "edef44e2-3098-4ba4-bd3f-cafa8d2d80bb", "tenant_id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "security_group_id": "ad034c91-5a7c-444e-b7dc-302a4c722425", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "ad034c91-5a7c-444e-b7dc-302a4c722425", "description": null, "tags": [], "created_at": "2020-12-14T02:26:11Z", "updated_at": "2020-12-14T02:26:11Z", "revision_number": 0, "project_id": "d5ccf8a6794f470fbe2a0896fe1de6d5"}, {"id": "fe0513b7-fc4d-4898-8d9b-64e63fd52ed8", "tenant_id": "d5ccf8a6794f470fbe2a0896fe1de6d5", "security_group_id": "ad034c91-5a7c-444e-b7dc-302a4c722425", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:26:11Z", "updated_at": "2020-12-14T02:26:11Z", "revision_number": 0, "project_id": "d5ccf8a6794f470fbe2a0896fe1de6d5"}], "tags": [], "created_at": "2020-12-14T02:26:11Z", "updated_at": "2020-12-14T02:26:11Z", "revision_number": 1, "project_id": "d5ccf8a6794f470fbe2a0896fe1de6d5"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:12.282 197 INFO tempest.lib.common.rest_client [req-f018531d-a10a-4597-9325-ee0dea95763b ] Request (GroupTypesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/ad034c91-5a7c-444e-b7dc-302a4c722425 0.192s 2020-12-14 02:26:12.284 197 DEBUG tempest.lib.common.rest_client [req-f018531d-a10a-4597-9325-ee0dea95763b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f018531d-a10a-4597-9325-ee0dea95763b', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:26:12 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/ad034c91-5a7c-444e-b7dc-302a4c722425'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:12.435 197 INFO tempest.lib.common.rest_client [req-3d629c16-dc58-49c7-8409-3da5578c983e ] Request (GroupTypesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5 0.144s 2020-12-14 02:26:12.439 197 DEBUG tempest.lib.common.rest_client [req-3d629c16-dc58-49c7-8409-3da5578c983e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d629c16-dc58-49c7-8409-3da5578c983e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/d5ccf8a6794f470fbe2a0896fe1de6d5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:12.562 197 INFO tempest.lib.common.rest_client [req-a9055401-9fcc-4e54-b275-0fd4c8ee9b3a ] Request (GroupV320RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:26:12.565 197 DEBUG tempest.lib.common.rest_client [req-a9055401-9fcc-4e54-b275-0fd4c8ee9b3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9055401-9fcc-4e54-b275-0fd4c8ee9b3a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["W-QfielTRoWRVQZ92G1GwA"], "expires_at": "2020-12-14T03:26:12.000000Z", "issued_at": "2020-12-14T02:26:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:12.665 197 INFO tempest.lib.common.rest_client [req-e0f3f62b-7d1d-463f-872a-2c0167f1bc7b ] Request (GroupV320RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:26:12.669 197 DEBUG tempest.lib.common.rest_client [req-e0f3f62b-7d1d-463f-872a-2c0167f1bc7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0f3f62b-7d1d-463f-872a-2c0167f1bc7b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["sAhJANHzReStZFz5ZAoBkA"], "expires_at": "2020-12-14T03:26:12.000000Z", "issued_at": "2020-12-14T02:26:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:12.743 197 INFO tempest.lib.common.rest_client [req-af6962ae-7928-4912-909b-ca92b18f55ad ] Request (GroupV320RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.066s 2020-12-14 02:26:12.746 197 DEBUG tempest.lib.common.rest_client [req-af6962ae-7928-4912-909b-ca92b18f55ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af6962ae-7928-4912-909b-ca92b18f55ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:12.826 197 INFO tempest.lib.common.rest_client [req-07fdc7a4-1636-4d9b-bf45-0cc1baaf445e ] Request (GroupV320RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.072s 2020-12-14 02:26:12.829 197 DEBUG tempest.lib.common.rest_client [req-07fdc7a4-1636-4d9b-bf45-0cc1baaf445e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-GroupV320RbacTest-1731802586-desc", "domain_id": "default", "name": "tempest-GroupV320RbacTest-1731802586"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07fdc7a4-1636-4d9b-bf45-0cc1baaf445e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "3e443b9cfc11421bbc7a080d41b15e82", "name": "tempest-GroupV320RbacTest-1731802586", "domain_id": "default", "description": "tempest-GroupV320RbacTest-1731802586-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:12.972 197 INFO tempest.lib.common.rest_client [req-783b5b7f-20cc-4672-af6c-636e29899137 ] Request (GroupV320RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.134s 2020-12-14 02:26:12.975 197 DEBUG tempest.lib.common.rest_client [req-783b5b7f-20cc-4672-af6c-636e29899137 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-GroupV320RbacTest-1731802586", "password": "B4&ysTD3R#VSfZB", "project_id": "3e443b9cfc11421bbc7a080d41b15e82", "email": "tempest-GroupV320RbacTest-689728476@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '389', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-783b5b7f-20cc-4672-af6c-636e29899137', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "3e443b9cfc11421bbc7a080d41b15e82", "email": "tempest-GroupV320RbacTest-689728476@example.com", "id": "323d5a976a9a41309c762ea645c6b3b9", "name": "tempest-GroupV320RbacTest-1731802586", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/323d5a976a9a41309c762ea645c6b3b9"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:13.046 197 INFO tempest.lib.common.rest_client [req-661fdba5-396d-4156-a3d7-57b1c884902c ] Request (GroupV320RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:26:13.049 197 DEBUG tempest.lib.common.rest_client [req-661fdba5-396d-4156-a3d7-57b1c884902c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-661fdba5-396d-4156-a3d7-57b1c884902c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:13.138 197 INFO tempest.lib.common.rest_client [req-89a1f130-0e7f-4383-adbb-6ea8171306c5 ] Request (GroupV320RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.079s 2020-12-14 02:26:13.141 197 DEBUG tempest.lib.common.rest_client [req-89a1f130-0e7f-4383-adbb-6ea8171306c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89a1f130-0e7f-4383-adbb-6ea8171306c5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:13.231 197 INFO tempest.lib.common.rest_client [req-9353c056-6c40-4252-914f-a39eaf3e997d ] Request (GroupV320RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82/users/323d5a976a9a41309c762ea645c6b3b9/roles/72a4576c553448cd941b052c1ca0cf2d 0.083s 2020-12-14 02:26:13.233 197 DEBUG tempest.lib.common.rest_client [req-9353c056-6c40-4252-914f-a39eaf3e997d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9353c056-6c40-4252-914f-a39eaf3e997d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82/users/323d5a976a9a41309c762ea645c6b3b9/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:13.236 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupV320RbacTest-1731802586', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3e443b9cfc11421bbc7a080d41b15e82', 'project_name': 'tempest-GroupV320RbacTest-1731802586', 'tenant_id': '3e443b9cfc11421bbc7a080d41b15e82', 'tenant_name': 'tempest-GroupV320RbacTest-1731802586', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '323d5a976a9a41309c762ea645c6b3b9'}, Network: None, Subnet: None, Router: None 2020-12-14 02:26:13.238 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupV320RbacTest-1731802586', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3e443b9cfc11421bbc7a080d41b15e82', 'project_name': 'tempest-GroupV320RbacTest-1731802586', 'tenant_id': '3e443b9cfc11421bbc7a080d41b15e82', 'tenant_name': 'tempest-GroupV320RbacTest-1731802586', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '323d5a976a9a41309c762ea645c6b3b9'}, Network: None, Subnet: None, Router: None 2020-12-14 02:26:13.270 189 INFO tempest.lib.common.rest_client [req-eb0b6515-d63d-4ea7-b9f2-631d038d85bf ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.228s 2020-12-14 02:26:13.272 189 DEBUG tempest.lib.common.rest_client [req-eb0b6515-d63d-4ea7-b9f2-631d038d85bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eb0b6515-d63d-4ea7-b9f2-631d038d85bf', 'x-compute-request-id': 'req-eb0b6515-d63d-4ea7-b9f2-631d038d85bf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:13.442 197 INFO tempest.lib.common.rest_client [req-6db72e9e-3157-43ef-a201-80c0b515fdf5 ] Request (GroupV320RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.138s 2020-12-14 02:26:13.445 197 DEBUG tempest.lib.common.rest_client [req-6db72e9e-3157-43ef-a201-80c0b515fdf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6565', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6db72e9e-3157-43ef-a201-80c0b515fdf5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "323d5a976a9a41309c762ea645c6b3b9", "name": "tempest-GroupV320RbacTest-1731802586", "password_expires_at": null}, "audit_ids": ["V0GVionVRT-fp2hDUNRbbA"], "expires_at": "2020-12-14T03:26:13.000000Z", "issued_at": "2020-12-14T02:26:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e443b9cfc11421bbc7a080d41b15e82", "name": "tempest-GroupV320RbacTest-1731802586"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:13.539 197 INFO tempest.lib.common.rest_client [req-ce6f349a-0b5e-4889-a7cf-84d359542035 ] Request (GroupV320RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-12-14 02:26:13.541 197 DEBUG tempest.lib.common.rest_client [req-ce6f349a-0b5e-4889-a7cf-84d359542035 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce6f349a-0b5e-4889-a7cf-84d359542035', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["FHKTigpYR5isTWIGKXb6Gg"], "expires_at": "2020-12-14T03:26:13.000000Z", "issued_at": "2020-12-14T02:26:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:13.670 197 INFO tempest.lib.common.rest_client [req-2459dd41-e4ab-49b9-959b-2eb3c1eca01f ] Request (GroupV320RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.055s 2020-12-14 02:26:13.673 197 DEBUG tempest.lib.common.rest_client [req-2459dd41-e4ab-49b9-959b-2eb3c1eca01f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2459dd41-e4ab-49b9-959b-2eb3c1eca01f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["uTw53hqGTLG9mwCzFf_E7w"], "expires_at": "2020-12-14T03:26:13.000000Z", "issued_at": "2020-12-14T02:26:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:13.742 197 INFO tempest.lib.common.rest_client [req-cbb9ccfb-3791-4047-8afd-c600d2a0682d ] Request (GroupV320RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.063s 2020-12-14 02:26:13.744 197 DEBUG tempest.lib.common.rest_client [req-cbb9ccfb-3791-4047-8afd-c600d2a0682d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cbb9ccfb-3791-4047-8afd-c600d2a0682d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:13.813 197 INFO tempest.lib.common.rest_client [req-adbb3f42-aedd-48b0-897b-089bd5896164 ] Request (GroupV320RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:26:13.815 197 DEBUG tempest.lib.common.rest_client [req-adbb3f42-aedd-48b0-897b-089bd5896164 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-adbb3f42-aedd-48b0-897b-089bd5896164', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:13.818 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:26:13.820 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:13.894 197 INFO tempest.lib.common.rest_client [req-f5a93141-2bf7-43c2-87d2-58cde5a8590c ] Request (GroupV320RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82/users/323d5a976a9a41309c762ea645c6b3b9/roles 0.067s 2020-12-14 02:26:13.898 197 DEBUG tempest.lib.common.rest_client [req-f5a93141-2bf7-43c2-87d2-58cde5a8590c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f5a93141-2bf7-43c2-87d2-58cde5a8590c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82/users/323d5a976a9a41309c762ea645c6b3b9/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82/users/323d5a976a9a41309c762ea645c6b3b9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:13.968 197 INFO tempest.lib.common.rest_client [req-88653c01-e822-4798-aea8-918cadb9b40b ] Request (GroupV320RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82/users/323d5a976a9a41309c762ea645c6b3b9/roles/72a4576c553448cd941b052c1ca0cf2d 0.063s 2020-12-14 02:26:13.970 197 DEBUG tempest.lib.common.rest_client [req-88653c01-e822-4798-aea8-918cadb9b40b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88653c01-e822-4798-aea8-918cadb9b40b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82/users/323d5a976a9a41309c762ea645c6b3b9/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:14.088 197 INFO tempest.lib.common.rest_client [req-38d76c22-516c-46ba-ace8-ab0fe5522a72 ] Request (GroupV320RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82/users/323d5a976a9a41309c762ea645c6b3b9/roles/a629c95d64b3416fb80ae90af4f69c05 0.113s 2020-12-14 02:26:14.090 197 DEBUG tempest.lib.common.rest_client [req-38d76c22-516c-46ba-ace8-ab0fe5522a72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-38d76c22-516c-46ba-ace8-ab0fe5522a72', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82/users/323d5a976a9a41309c762ea645c6b3b9/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:14.613 189 INFO tempest.lib.common.rest_client [req-92dbb568-9940-4baa-b869-24f57891c15f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.236s 2020-12-14 02:26:14.617 189 DEBUG tempest.lib.common.rest_client [req-92dbb568-9940-4baa-b869-24f57891c15f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-92dbb568-9940-4baa-b869-24f57891c15f', 'x-compute-request-id': 'req-92dbb568-9940-4baa-b869-24f57891c15f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:15.211 197 INFO tempest.lib.common.rest_client [req-c732bb43-db20-4fa2-94cb-640b17635b53 ] Request (GroupV320RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.113s 2020-12-14 02:26:15.215 197 DEBUG tempest.lib.common.rest_client [req-c732bb43-db20-4fa2-94cb-640b17635b53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c732bb43-db20-4fa2-94cb-640b17635b53', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "323d5a976a9a41309c762ea645c6b3b9", "name": "tempest-GroupV320RbacTest-1731802586", "password_expires_at": null}, "audit_ids": ["1GmSN1D6TG-lF9aRgG1JAQ"], "expires_at": "2020-12-14T03:26:15.000000Z", "issued_at": "2020-12-14T02:26:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e443b9cfc11421bbc7a080d41b15e82", "name": "tempest-GroupV320RbacTest-1731802586"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:15.474 197 INFO tempest.lib.common.rest_client [req-103330a0-e059-438c-a3fb-6a2ddf2c4729 ] Request (GroupV320RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/types 0.243s 2020-12-14 02:26:15.478 197 DEBUG tempest.lib.common.rest_client [req-103330a0-e059-438c-a3fb-6a2ddf2c4729 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupV320RbacTest-volume-type-292693354"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-103330a0-e059-438c-a3fb-6a2ddf2c4729', 'content-length': '222', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-103330a0-e059-438c-a3fb-6a2ddf2c4729', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/types'} Body: b'{"volume_type": {"id": "ce2cb9f9-785c-4579-9d39-8cbebbb469f1", "name": "tempest-GroupV320RbacTest-volume-type-292693354", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:15.556 197 INFO tempest.lib.common.rest_client [req-1fbf0c32-0cbe-46ad-9bcf-25b2efe92a93 ] Request (GroupV320RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/group_types 0.049s 2020-12-14 02:26:15.559 197 DEBUG tempest.lib.common.rest_client [req-1fbf0c32-0cbe-46ad-9bcf-25b2efe92a93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupV320RbacTest-group-type-1233108507"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1fbf0c32-0cbe-46ad-9bcf-25b2efe92a93', 'content-length': '180', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1fbf0c32-0cbe-46ad-9bcf-25b2efe92a93', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/group_types'} Body: b'{"group_type": {"id": "9aed667b-17af-4ce4-9c0f-7e4fd6f49650", "name": "tempest-GroupV320RbacTest-group-type-1233108507", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:15.581 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:26:15.599 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:reset_status, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:26:15.741 197 INFO tempest.lib.common.rest_client [req-939cc183-fb2c-458c-8a04-c2e62ae8e558 ] Request (GroupV320RbacTest:test_reset_group_status): 202 POST http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/groups 0.136s 2020-12-14 02:26:15.744 197 DEBUG tempest.lib.common.rest_client [req-939cc183-fb2c-458c-8a04-c2e62ae8e558 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: {"group": {"name": "tempest-GroupV320RbacTest-Group-402029889", "group_type": "9aed667b-17af-4ce4-9c0f-7e4fd6f49650", "volume_types": ["ce2cb9f9-785c-4579-9d39-8cbebbb469f1"]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-939cc183-fb2c-458c-8a04-c2e62ae8e558', 'content-length': '110', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-939cc183-fb2c-458c-8a04-c2e62ae8e558', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/groups'} Body: b'{"group": {"id": "e19a615f-7271-4c06-b64d-3e6f5eba48c5", "name": "tempest-GroupV320RbacTest-Group-402029889"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:15.807 197 INFO tempest.lib.common.rest_client [req-3fec0d29-5fe5-4447-8738-f79141603303 ] Request (GroupV320RbacTest:test_reset_group_status): 200 GET http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/groups/e19a615f-7271-4c06-b64d-3e6f5eba48c5 0.043s 2020-12-14 02:26:15.810 197 DEBUG tempest.lib.common.rest_client [req-3fec0d29-5fe5-4447-8738-f79141603303 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3fec0d29-5fe5-4447-8738-f79141603303', 'content-length': '390', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3fec0d29-5fe5-4447-8738-f79141603303', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/groups/e19a615f-7271-4c06-b64d-3e6f5eba48c5'} Body: b'{"group": {"id": "e19a615f-7271-4c06-b64d-3e6f5eba48c5", "status": "creating", "availability_zone": "nova", "created_at": "2020-12-14T02:26:16.000000", "name": "tempest-GroupV320RbacTest-Group-402029889", "description": null, "group_type": "9aed667b-17af-4ce4-9c0f-7e4fd6f49650", "volume_types": ["ce2cb9f9-785c-4579-9d39-8cbebbb469f1"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:15.941 189 INFO tempest.lib.common.rest_client [req-1e4acd6e-f1a7-4b75-b597-2c8dfe622cf5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.218s 2020-12-14 02:26:15.945 189 DEBUG tempest.lib.common.rest_client [req-1e4acd6e-f1a7-4b75-b597-2c8dfe622cf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1e4acd6e-f1a7-4b75-b597-2c8dfe622cf5', 'x-compute-request-id': 'req-1e4acd6e-f1a7-4b75-b597-2c8dfe622cf5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:16.903 197 INFO tempest.lib.common.rest_client [req-3f11468b-55a7-4864-b919-b65f4c1ee5d4 ] Request (GroupV320RbacTest:test_reset_group_status): 200 GET http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/groups/e19a615f-7271-4c06-b64d-3e6f5eba48c5 0.051s 2020-12-14 02:26:16.906 197 DEBUG tempest.lib.common.rest_client [req-3f11468b-55a7-4864-b919-b65f4c1ee5d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3f11468b-55a7-4864-b919-b65f4c1ee5d4', 'content-length': '391', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3f11468b-55a7-4864-b919-b65f4c1ee5d4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/groups/e19a615f-7271-4c06-b64d-3e6f5eba48c5'} Body: b'{"group": {"id": "e19a615f-7271-4c06-b64d-3e6f5eba48c5", "status": "available", "availability_zone": "nova", "created_at": "2020-12-14T02:26:16.000000", "name": "tempest-GroupV320RbacTest-Group-402029889", "description": null, "group_type": "9aed667b-17af-4ce4-9c0f-7e4fd6f49650", "volume_types": ["ce2cb9f9-785c-4579-9d39-8cbebbb469f1"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:16.940 197 INFO tempest.common.waiters [-] group e19a615f-7271-4c06-b64d-3e6f5eba48c5 reached available after waiting for 1.939932 seconds 2020-12-14 02:26:16.942 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:17.040 197 INFO tempest.lib.common.rest_client [req-12378709-1889-4467-ad4c-90067d1e7d4d ] Request (GroupV320RbacTest:test_reset_group_status): 200 GET http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82/users/323d5a976a9a41309c762ea645c6b3b9/roles 0.092s 2020-12-14 02:26:17.044 197 DEBUG tempest.lib.common.rest_client [req-12378709-1889-4467-ad4c-90067d1e7d4d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-12378709-1889-4467-ad4c-90067d1e7d4d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82/users/323d5a976a9a41309c762ea645c6b3b9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82/users/323d5a976a9a41309c762ea645c6b3b9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:17.093 197 INFO tempest.lib.common.rest_client [req-6e68a14d-a51f-4405-b0f5-420599f5dcc5 ] Request (GroupV320RbacTest:test_reset_group_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:26:17.097 197 DEBUG tempest.lib.common.rest_client [req-6e68a14d-a51f-4405-b0f5-420599f5dcc5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e68a14d-a51f-4405-b0f5-420599f5dcc5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "323d5a976a9a41309c762ea645c6b3b9", "name": "tempest-GroupV320RbacTest-1731802586", "password_expires_at": null}, "audit_ids": ["vxpBOTJPSZafvINbEBFQfg"], "expires_at": "2020-12-14T03:26:17.000000Z", "issued_at": "2020-12-14T02:26:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e443b9cfc11421bbc7a080d41b15e82", "name": "tempest-GroupV320RbacTest-1731802586"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:17.282 197 INFO tempest.lib.common.rest_client [req-d325d44f-8bb9-43f0-9900-5936285ec02c ] Request (GroupV320RbacTest:test_reset_group_status): 202 POST http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/groups/e19a615f-7271-4c06-b64d-3e6f5eba48c5/action 0.175s 2020-12-14 02:26:17.286 197 DEBUG tempest.lib.common.rest_client [req-d325d44f-8bb9-43f0-9900-5936285ec02c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: {"reset_status": {"status": "available"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d325d44f-8bb9-43f0-9900-5936285ec02c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/groups/e19a615f-7271-4c06-b64d-3e6f5eba48c5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:17.288 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:17.332 189 INFO tempest.lib.common.rest_client [req-50786715-ea3d-4b6f-9afe-a166a47bbf77 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.284s 2020-12-14 02:26:17.335 189 DEBUG tempest.lib.common.rest_client [req-50786715-ea3d-4b6f-9afe-a166a47bbf77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-50786715-ea3d-4b6f-9afe-a166a47bbf77', 'x-compute-request-id': 'req-50786715-ea3d-4b6f-9afe-a166a47bbf77', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:17.363 197 INFO tempest.lib.common.rest_client [req-6e2fb53b-61ed-4267-9a93-d821aa4a50d8 ] Request (GroupV320RbacTest:test_reset_group_status): 200 GET http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82/users/323d5a976a9a41309c762ea645c6b3b9/roles 0.068s 2020-12-14 02:26:17.367 197 DEBUG tempest.lib.common.rest_client [req-6e2fb53b-61ed-4267-9a93-d821aa4a50d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e2fb53b-61ed-4267-9a93-d821aa4a50d8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82/users/323d5a976a9a41309c762ea645c6b3b9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82/users/323d5a976a9a41309c762ea645c6b3b9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:17.418 197 INFO tempest.lib.common.rest_client [req-1db30f7c-cd24-4fee-bfdc-70a39e166c2a ] Request (GroupV320RbacTest:test_reset_group_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:26:17.422 197 DEBUG tempest.lib.common.rest_client [req-1db30f7c-cd24-4fee-bfdc-70a39e166c2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1db30f7c-cd24-4fee-bfdc-70a39e166c2a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "323d5a976a9a41309c762ea645c6b3b9", "name": "tempest-GroupV320RbacTest-1731802586", "password_expires_at": null}, "audit_ids": ["o1RNLxvTRP2g2EXW9JSX-g"], "expires_at": "2020-12-14T03:26:17.000000Z", "issued_at": "2020-12-14T02:26:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e443b9cfc11421bbc7a080d41b15e82", "name": "tempest-GroupV320RbacTest-1731802586"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e443b9cfc11421bbc7a080d41b15e82", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:17.531 197 INFO tempest.lib.common.rest_client [req-ca92cec0-768a-4314-844a-602ba6d28d54 ] Request (GroupV320RbacTest:test_reset_group_status): 200 GET http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/groups/e19a615f-7271-4c06-b64d-3e6f5eba48c5 0.100s 2020-12-14 02:26:17.535 197 DEBUG tempest.lib.common.rest_client [req-ca92cec0-768a-4314-844a-602ba6d28d54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ca92cec0-768a-4314-844a-602ba6d28d54', 'content-length': '391', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ca92cec0-768a-4314-844a-602ba6d28d54', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/groups/e19a615f-7271-4c06-b64d-3e6f5eba48c5'} Body: b'{"group": {"id": "e19a615f-7271-4c06-b64d-3e6f5eba48c5", "status": "available", "availability_zone": "nova", "created_at": "2020-12-14T02:26:16.000000", "name": "tempest-GroupV320RbacTest-Group-402029889", "description": null, "group_type": "9aed667b-17af-4ce4-9c0f-7e4fd6f49650", "volume_types": ["ce2cb9f9-785c-4579-9d39-8cbebbb469f1"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:17.572 197 INFO tempest.common.waiters [-] group e19a615f-7271-4c06-b64d-3e6f5eba48c5 reached available after waiting for 0.572299 seconds 2020-12-14 02:26:17.654 197 INFO tempest.lib.common.rest_client [req-d92bd06f-a2ec-4cec-b8cc-e174baaec502 ] Request (GroupV320RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/groups/e19a615f-7271-4c06-b64d-3e6f5eba48c5/action 0.073s 2020-12-14 02:26:17.657 197 DEBUG tempest.lib.common.rest_client [req-d92bd06f-a2ec-4cec-b8cc-e174baaec502 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d92bd06f-a2ec-4cec-b8cc-e174baaec502', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/groups/e19a615f-7271-4c06-b64d-3e6f5eba48c5/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:17.715 197 INFO tempest.lib.common.rest_client [req-ab13025b-329e-457c-b18e-cef5719ef66e ] Request (GroupV320RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/groups/e19a615f-7271-4c06-b64d-3e6f5eba48c5 0.049s 2020-12-14 02:26:17.718 197 DEBUG tempest.lib.common.rest_client [req-ab13025b-329e-457c-b18e-cef5719ef66e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ab13025b-329e-457c-b18e-cef5719ef66e', 'content-length': '390', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ab13025b-329e-457c-b18e-cef5719ef66e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/groups/e19a615f-7271-4c06-b64d-3e6f5eba48c5'} Body: b'{"group": {"id": "e19a615f-7271-4c06-b64d-3e6f5eba48c5", "status": "deleting", "availability_zone": "nova", "created_at": "2020-12-14T02:26:16.000000", "name": "tempest-GroupV320RbacTest-Group-402029889", "description": null, "group_type": "9aed667b-17af-4ce4-9c0f-7e4fd6f49650", "volume_types": ["ce2cb9f9-785c-4579-9d39-8cbebbb469f1"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:18.666 189 INFO tempest.lib.common.rest_client [req-3e64c68a-b031-4a61-9512-3ed6ec21ecec ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.224s 2020-12-14 02:26:18.669 189 DEBUG tempest.lib.common.rest_client [req-3e64c68a-b031-4a61-9512-3ed6ec21ecec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3e64c68a-b031-4a61-9512-3ed6ec21ecec', 'x-compute-request-id': 'req-3e64c68a-b031-4a61-9512-3ed6ec21ecec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:18.794 197 INFO tempest.lib.common.rest_client [req-00071746-d8fd-44b2-b6a4-f343ff5af1e7 ] Request (GroupV320RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/groups/e19a615f-7271-4c06-b64d-3e6f5eba48c5 0.034s 2020-12-14 02:26:18.797 197 DEBUG tempest.lib.common.rest_client [req-00071746-d8fd-44b2-b6a4-f343ff5af1e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-00071746-d8fd-44b2-b6a4-f343ff5af1e7', 'x-openstack-request-id': 'req-00071746-d8fd-44b2-b6a4-f343ff5af1e7', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/groups/e19a615f-7271-4c06-b64d-3e6f5eba48c5'} Body: b'{"itemNotFound": {"code": 404, "message": "Group e19a615f-7271-4c06-b64d-3e6f5eba48c5 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:18.882 197 INFO tempest.lib.common.rest_client [req-0cd6a39b-6f7d-4200-b82e-05f9472158e7 ] Request (GroupV320RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/volumes/detail?all_tenants=True 0.076s 2020-12-14 02:26:18.886 197 DEBUG tempest.lib.common.rest_client [req-0cd6a39b-6f7d-4200-b82e-05f9472158e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0cd6a39b-6f7d-4200-b82e-05f9472158e7', 'content-length': '1365', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0cd6a39b-6f7d-4200-b82e-05f9472158e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/volumes/detail?all_tenants=True'} Body: b'{"volumes": [{"id": "7783fce6-d6ea-46b4-a63a-381988b121fd", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-11T20:01:12.000000", "updated_at": "2020-12-11T20:03:10.000000", "name": "s_rally_95f231c4_xV6eepIv", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/volumes/7783fce6-d6ea-46b4-a63a-381988b121fd"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3e443b9cfc11421bbc7a080d41b15e82/volumes/7783fce6-d6ea-46b4-a63a-381988b121fd"}], "user_id": "de792f245fc743ada005283bdec0af09", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "7783fce6-d6ea-46b4-a63a-381988b121fd", "attachment_id": "61120a25-3311-41de-98b1-e901f1470da3", "volume_id": "7783fce6-d6ea-46b4-a63a-381988b121fd", "server_id": "f0c6bbc5-f27e-4246-a35c-bb6ec8d89a03", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-12-11T20:01:16.000000"}], "migration_status": null, "group_id": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "13e02f91606843a4a42f6e60ca962591"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:19.048 197 INFO tempest.lib.common.rest_client [req-677be9e6-13f2-4041-a955-61b2bcfdb560 ] Request (GroupV320RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/group_types/9aed667b-17af-4ce4-9c0f-7e4fd6f49650 0.053s 2020-12-14 02:26:19.052 197 DEBUG tempest.lib.common.rest_client [req-677be9e6-13f2-4041-a955-61b2bcfdb560 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.20', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.20', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-677be9e6-13f2-4041-a955-61b2bcfdb560', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/group_types/9aed667b-17af-4ce4-9c0f-7e4fd6f49650'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:19.168 197 INFO tempest.lib.common.rest_client [req-0c7d4b0d-6cf5-41e5-9704-e6d2673e444a ] Request (GroupV320RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/types/ce2cb9f9-785c-4579-9d39-8cbebbb469f1 0.097s 2020-12-14 02:26:19.170 197 DEBUG tempest.lib.common.rest_client [req-0c7d4b0d-6cf5-41e5-9704-e6d2673e444a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0c7d4b0d-6cf5-41e5-9704-e6d2673e444a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/types/ce2cb9f9-785c-4579-9d39-8cbebbb469f1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:19.209 197 INFO tempest.lib.common.rest_client [req-526530b1-dd2f-4202-8531-6c5394d01c3c ] Request (GroupV320RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/types/ce2cb9f9-785c-4579-9d39-8cbebbb469f1 0.033s 2020-12-14 02:26:19.211 197 DEBUG tempest.lib.common.rest_client [req-526530b1-dd2f-4202-8531-6c5394d01c3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-526530b1-dd2f-4202-8531-6c5394d01c3c', 'x-openstack-request-id': 'req-526530b1-dd2f-4202-8531-6c5394d01c3c', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3e443b9cfc11421bbc7a080d41b15e82/types/ce2cb9f9-785c-4579-9d39-8cbebbb469f1'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type ce2cb9f9-785c-4579-9d39-8cbebbb469f1 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:19.366 197 INFO tempest.lib.common.rest_client [req-9e63cb31-089e-48e7-a838-a56fd2417159 ] Request (GroupV320RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/323d5a976a9a41309c762ea645c6b3b9 0.146s 2020-12-14 02:26:19.369 197 DEBUG tempest.lib.common.rest_client [req-9e63cb31-089e-48e7-a838-a56fd2417159 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e63cb31-089e-48e7-a838-a56fd2417159', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/323d5a976a9a41309c762ea645c6b3b9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:19.474 197 INFO tempest.lib.common.rest_client [req-c6eb7ae0-0eca-4799-a841-6cb912ae293d ] Request (GroupV320RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:26:19.478 197 DEBUG tempest.lib.common.rest_client [req-c6eb7ae0-0eca-4799-a841-6cb912ae293d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6eb7ae0-0eca-4799-a841-6cb912ae293d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["kA1CrjdoSOm7bySNx389nw"], "expires_at": "2020-12-14T03:26:19.000000Z", "issued_at": "2020-12-14T02:26:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:19.827 197 INFO tempest.lib.common.rest_client [req-5234704a-1331-4b4d-a2b9-954887049995 ] Request (GroupV320RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3e443b9cfc11421bbc7a080d41b15e82&name=default 0.342s 2020-12-14 02:26:19.831 197 DEBUG tempest.lib.common.rest_client [req-5234704a-1331-4b4d-a2b9-954887049995 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-5234704a-1331-4b4d-a2b9-954887049995', 'date': 'Mon, 14 Dec 2020 02:26:19 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3e443b9cfc11421bbc7a080d41b15e82&name=default'} Body: b'{"security_groups": [{"id": "2b7bae31-35c5-4d16-9e78-3b49bf88008a", "name": "default", "stateful": true, "tenant_id": "3e443b9cfc11421bbc7a080d41b15e82", "description": "Default security group", "security_group_rules": [{"id": "9a865e23-8200-4f26-a8d7-f0bb6ffd0a4f", "tenant_id": "3e443b9cfc11421bbc7a080d41b15e82", "security_group_id": "2b7bae31-35c5-4d16-9e78-3b49bf88008a", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:26:19Z", "updated_at": "2020-12-14T02:26:19Z", "revision_number": 0, "project_id": "3e443b9cfc11421bbc7a080d41b15e82"}, {"id": "9d5d5ca1-4f8b-40c6-89bc-2c63dda9f490", "tenant_id": "3e443b9cfc11421bbc7a080d41b15e82", "security_group_id": "2b7bae31-35c5-4d16-9e78-3b49bf88008a", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2b7bae31-35c5-4d16-9e78-3b49bf88008a", "description": null, "tags": [], "created_at": "2020-12-14T02:26:19Z", "updated_at": "2020-12-14T02:26:19Z", "revision_number": 0, "project_id": "3e443b9cfc11421bbc7a080d41b15e82"}, {"id": "c1d3eac4-d703-4407-a1df-069faa81194a", "tenant_id": "3e443b9cfc11421bbc7a080d41b15e82", "security_group_id": "2b7bae31-35c5-4d16-9e78-3b49bf88008a", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2b7bae31-35c5-4d16-9e78-3b49bf88008a", "description": null, "tags": [], "created_at": "2020-12-14T02:26:19Z", "updated_at": "2020-12-14T02:26:19Z", "revision_number": 0, "project_id": "3e443b9cfc11421bbc7a080d41b15e82"}, {"id": "d5c2f36a-bac4-4efe-ae9c-776a990e0bc0", "tenant_id": "3e443b9cfc11421bbc7a080d41b15e82", "security_group_id": "2b7bae31-35c5-4d16-9e78-3b49bf88008a", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:26:19Z", "updated_at": "2020-12-14T02:26:19Z", "revision_number": 0, "project_id": "3e443b9cfc11421bbc7a080d41b15e82"}], "tags": [], "created_at": "2020-12-14T02:26:19Z", "updated_at": "2020-12-14T02:26:19Z", "revision_number": 1, "project_id": "3e443b9cfc11421bbc7a080d41b15e82"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:19.988 189 INFO tempest.lib.common.rest_client [req-fdbdaebe-7611-4081-8765-6e8b76b19f85 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.213s 2020-12-14 02:26:19.991 189 DEBUG tempest.lib.common.rest_client [req-fdbdaebe-7611-4081-8765-6e8b76b19f85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fdbdaebe-7611-4081-8765-6e8b76b19f85', 'x-compute-request-id': 'req-fdbdaebe-7611-4081-8765-6e8b76b19f85', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:19.998 197 INFO tempest.lib.common.rest_client [req-46be8af1-59db-4146-8e9d-d4fb983d1d45 ] Request (GroupV320RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/2b7bae31-35c5-4d16-9e78-3b49bf88008a 0.160s 2020-12-14 02:26:20.002 197 DEBUG tempest.lib.common.rest_client [req-46be8af1-59db-4146-8e9d-d4fb983d1d45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-46be8af1-59db-4146-8e9d-d4fb983d1d45', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:26:19 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/2b7bae31-35c5-4d16-9e78-3b49bf88008a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:20.171 197 INFO tempest.lib.common.rest_client [req-05e0714c-3702-4b2d-9ab2-289010ac9bce ] Request (GroupV320RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82 0.161s 2020-12-14 02:26:20.174 197 DEBUG tempest.lib.common.rest_client [req-05e0714c-3702-4b2d-9ab2-289010ac9bce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05e0714c-3702-4b2d-9ab2-289010ac9bce', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e443b9cfc11421bbc7a080d41b15e82'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:20.305 197 INFO tempest.lib.common.rest_client [req-9702862a-c2ee-4e18-b209-6098486e7100 ] Request (QuotaClassesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-12-14 02:26:20.309 197 DEBUG tempest.lib.common.rest_client [req-9702862a-c2ee-4e18-b209-6098486e7100 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9702862a-c2ee-4e18-b209-6098486e7100', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["arB0PkzaQ6qficOb5rwxLg"], "expires_at": "2020-12-14T03:26:20.000000Z", "issued_at": "2020-12-14T02:26:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:20.419 197 INFO tempest.lib.common.rest_client [req-305f3086-7119-4a97-ae1d-250594544226 ] Request (QuotaClassesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.060s 2020-12-14 02:26:20.421 197 DEBUG tempest.lib.common.rest_client [req-305f3086-7119-4a97-ae1d-250594544226 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-305f3086-7119-4a97-ae1d-250594544226', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["3BWOJjPYR0yx9wzeDlluRQ"], "expires_at": "2020-12-14T03:26:20.000000Z", "issued_at": "2020-12-14T02:26:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:20.502 197 INFO tempest.lib.common.rest_client [req-b2519200-f4b7-4ad5-9566-11ebcffb65b0 ] Request (QuotaClassesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.073s 2020-12-14 02:26:20.504 197 DEBUG tempest.lib.common.rest_client [req-b2519200-f4b7-4ad5-9566-11ebcffb65b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2519200-f4b7-4ad5-9566-11ebcffb65b0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:20.589 197 INFO tempest.lib.common.rest_client [req-e59646df-b18b-4903-8408-96f3d64bfd27 ] Request (QuotaClassesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.078s 2020-12-14 02:26:20.592 197 DEBUG tempest.lib.common.rest_client [req-e59646df-b18b-4903-8408-96f3d64bfd27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaClassesV3RbacTest-1212865709-desc", "domain_id": "default", "name": "tempest-QuotaClassesV3RbacTest-1212865709"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e59646df-b18b-4903-8408-96f3d64bfd27', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "14ae3ffdfa2b48caaeee1206e72808ea", "name": "tempest-QuotaClassesV3RbacTest-1212865709", "domain_id": "default", "description": "tempest-QuotaClassesV3RbacTest-1212865709-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:20.731 197 INFO tempest.lib.common.rest_client [req-ca88d998-0881-47a5-976d-87f8b20679b6 ] Request (QuotaClassesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.132s 2020-12-14 02:26:20.733 197 DEBUG tempest.lib.common.rest_client [req-ca88d998-0881-47a5-976d-87f8b20679b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-QuotaClassesV3RbacTest-1212865709", "password": "U0~k^3ec8WU@tP#", "project_id": "14ae3ffdfa2b48caaeee1206e72808ea", "email": "tempest-QuotaClassesV3RbacTest-1529241691@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '400', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca88d998-0881-47a5-976d-87f8b20679b6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "14ae3ffdfa2b48caaeee1206e72808ea", "email": "tempest-QuotaClassesV3RbacTest-1529241691@example.com", "id": "132f97ee4151445ea930d773e142461a", "name": "tempest-QuotaClassesV3RbacTest-1212865709", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/132f97ee4151445ea930d773e142461a"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:20.807 197 INFO tempest.lib.common.rest_client [req-b3733b61-2df0-4b69-a899-ad9d45e05bc9 ] Request (QuotaClassesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:26:20.809 197 DEBUG tempest.lib.common.rest_client [req-b3733b61-2df0-4b69-a899-ad9d45e05bc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3733b61-2df0-4b69-a899-ad9d45e05bc9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:20.879 197 INFO tempest.lib.common.rest_client [req-97395afb-8e96-4f9a-9baf-c4d4c8924850 ] Request (QuotaClassesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:26:20.882 197 DEBUG tempest.lib.common.rest_client [req-97395afb-8e96-4f9a-9baf-c4d4c8924850 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97395afb-8e96-4f9a-9baf-c4d4c8924850', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:20.971 197 INFO tempest.lib.common.rest_client [req-fbc6e6c4-b1cd-44e2-b2b1-55979eea59ee ] Request (QuotaClassesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles/72a4576c553448cd941b052c1ca0cf2d 0.081s 2020-12-14 02:26:20.974 197 DEBUG tempest.lib.common.rest_client [req-fbc6e6c4-b1cd-44e2-b2b1-55979eea59ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fbc6e6c4-b1cd-44e2-b2b1-55979eea59ee', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:20.977 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaClassesV3RbacTest-1212865709', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '14ae3ffdfa2b48caaeee1206e72808ea', 'project_name': 'tempest-QuotaClassesV3RbacTest-1212865709', 'tenant_id': '14ae3ffdfa2b48caaeee1206e72808ea', 'tenant_name': 'tempest-QuotaClassesV3RbacTest-1212865709', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '132f97ee4151445ea930d773e142461a'}, Network: None, Subnet: None, Router: None 2020-12-14 02:26:20.979 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaClassesV3RbacTest-1212865709', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '14ae3ffdfa2b48caaeee1206e72808ea', 'project_name': 'tempest-QuotaClassesV3RbacTest-1212865709', 'tenant_id': '14ae3ffdfa2b48caaeee1206e72808ea', 'tenant_name': 'tempest-QuotaClassesV3RbacTest-1212865709', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '132f97ee4151445ea930d773e142461a'}, Network: None, Subnet: None, Router: None 2020-12-14 02:26:21.171 197 INFO tempest.lib.common.rest_client [req-517ed40e-72c9-4964-a67a-47ef811c51b7 ] Request (QuotaClassesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.131s 2020-12-14 02:26:21.174 197 DEBUG tempest.lib.common.rest_client [req-517ed40e-72c9-4964-a67a-47ef811c51b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-517ed40e-72c9-4964-a67a-47ef811c51b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "132f97ee4151445ea930d773e142461a", "name": "tempest-QuotaClassesV3RbacTest-1212865709", "password_expires_at": null}, "audit_ids": ["reB0a48BRYWWGw7-GkXnCA"], "expires_at": "2020-12-14T03:26:21.000000Z", "issued_at": "2020-12-14T02:26:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "14ae3ffdfa2b48caaeee1206e72808ea", "name": "tempest-QuotaClassesV3RbacTest-1212865709"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:21.289 197 INFO tempest.lib.common.rest_client [req-87dc024e-9ae4-4875-a68f-004e1ef23a27 ] Request (QuotaClassesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:26:21.292 197 DEBUG tempest.lib.common.rest_client [req-87dc024e-9ae4-4875-a68f-004e1ef23a27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87dc024e-9ae4-4875-a68f-004e1ef23a27', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["SG33ECVtQQ-mXOsEdwpJfg"], "expires_at": "2020-12-14T03:26:21.000000Z", "issued_at": "2020-12-14T02:26:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:21.332 189 INFO tempest.lib.common.rest_client [req-fd181ebf-4318-4b57-b837-f650fd9f05c2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.234s 2020-12-14 02:26:21.336 189 DEBUG tempest.lib.common.rest_client [req-fd181ebf-4318-4b57-b837-f650fd9f05c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fd181ebf-4318-4b57-b837-f650fd9f05c2', 'x-compute-request-id': 'req-fd181ebf-4318-4b57-b837-f650fd9f05c2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:21.421 197 INFO tempest.lib.common.rest_client [req-df5e02d2-c6d4-4bf2-b573-b16e1bd6b6b7 ] Request (QuotaClassesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-12-14 02:26:21.425 197 DEBUG tempest.lib.common.rest_client [req-df5e02d2-c6d4-4bf2-b573-b16e1bd6b6b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df5e02d2-c6d4-4bf2-b573-b16e1bd6b6b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["rBILtkFdQPG1pUYUn5bYKw"], "expires_at": "2020-12-14T03:26:21.000000Z", "issued_at": "2020-12-14T02:26:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:21.500 197 INFO tempest.lib.common.rest_client [req-60c6d1ca-bf4c-44aa-90ae-e2175fd01683 ] Request (QuotaClassesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.067s 2020-12-14 02:26:21.504 197 DEBUG tempest.lib.common.rest_client [req-60c6d1ca-bf4c-44aa-90ae-e2175fd01683 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60c6d1ca-bf4c-44aa-90ae-e2175fd01683', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:21.573 197 INFO tempest.lib.common.rest_client [req-2ac43e70-e755-4a3b-80ac-f550bb98cf68 ] Request (QuotaClassesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:26:21.576 197 DEBUG tempest.lib.common.rest_client [req-2ac43e70-e755-4a3b-80ac-f550bb98cf68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ac43e70-e755-4a3b-80ac-f550bb98cf68', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:21.581 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:26:21.585 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:21.654 197 INFO tempest.lib.common.rest_client [req-e0a38e91-1e20-4cd0-9e7c-e2d527293cb3 ] Request (QuotaClassesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles 0.063s 2020-12-14 02:26:21.657 197 DEBUG tempest.lib.common.rest_client [req-e0a38e91-1e20-4cd0-9e7c-e2d527293cb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0a38e91-1e20-4cd0-9e7c-e2d527293cb3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:21.735 197 INFO tempest.lib.common.rest_client [req-f8d2eadf-3dc6-4142-8462-10e3142ff012 ] Request (QuotaClassesV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles/72a4576c553448cd941b052c1ca0cf2d 0.070s 2020-12-14 02:26:21.738 197 DEBUG tempest.lib.common.rest_client [req-f8d2eadf-3dc6-4142-8462-10e3142ff012 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8d2eadf-3dc6-4142-8462-10e3142ff012', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:21.877 197 INFO tempest.lib.common.rest_client [req-ffdc1ae1-bd21-41d2-95af-98d02218c23e ] Request (QuotaClassesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles/a629c95d64b3416fb80ae90af4f69c05 0.132s 2020-12-14 02:26:21.880 197 DEBUG tempest.lib.common.rest_client [req-ffdc1ae1-bd21-41d2-95af-98d02218c23e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ffdc1ae1-bd21-41d2-95af-98d02218c23e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:22.674 189 INFO tempest.lib.common.rest_client [req-e1c56e7f-dca5-4fe9-880b-2e647971531a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.235s 2020-12-14 02:26:22.678 189 DEBUG tempest.lib.common.rest_client [req-e1c56e7f-dca5-4fe9-880b-2e647971531a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e1c56e7f-dca5-4fe9-880b-2e647971531a', 'x-compute-request-id': 'req-e1c56e7f-dca5-4fe9-880b-2e647971531a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:22.989 197 INFO tempest.lib.common.rest_client [req-0b212ffd-9ad2-4be3-82c8-2f844e20112d ] Request (QuotaClassesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:26:22.993 197 DEBUG tempest.lib.common.rest_client [req-0b212ffd-9ad2-4be3-82c8-2f844e20112d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b212ffd-9ad2-4be3-82c8-2f844e20112d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "132f97ee4151445ea930d773e142461a", "name": "tempest-QuotaClassesV3RbacTest-1212865709", "password_expires_at": null}, "audit_ids": ["hBwm-S3vRG2jQmL7ZrWAUA"], "expires_at": "2020-12-14T03:26:22.000000Z", "issued_at": "2020-12-14T02:26:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "14ae3ffdfa2b48caaeee1206e72808ea", "name": "tempest-QuotaClassesV3RbacTest-1212865709"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:23.009 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:26:23.027 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:quota_classes, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:26:23.030 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:23.165 197 INFO tempest.lib.common.rest_client [req-e3598e7c-73a1-422c-9b71-273f399f75b8 ] Request (QuotaClassesV3RbacTest:test_show_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles 0.129s 2020-12-14 02:26:23.169 197 DEBUG tempest.lib.common.rest_client [req-e3598e7c-73a1-422c-9b71-273f399f75b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3598e7c-73a1-422c-9b71-273f399f75b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:23.227 197 INFO tempest.lib.common.rest_client [req-3bd1c8d5-05d7-4b5f-ba6f-b3bc2c070ce1 ] Request (QuotaClassesV3RbacTest:test_show_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:26:23.230 197 DEBUG tempest.lib.common.rest_client [req-3bd1c8d5-05d7-4b5f-ba6f-b3bc2c070ce1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3bd1c8d5-05d7-4b5f-ba6f-b3bc2c070ce1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "132f97ee4151445ea930d773e142461a", "name": "tempest-QuotaClassesV3RbacTest-1212865709", "password_expires_at": null}, "audit_ids": ["63LJBuZBTue319LFc0tUEA"], "expires_at": "2020-12-14T03:26:23.000000Z", "issued_at": "2020-12-14T02:26:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "14ae3ffdfa2b48caaeee1206e72808ea", "name": "tempest-QuotaClassesV3RbacTest-1212865709"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:23.470 197 INFO tempest.lib.common.rest_client [req-795e13d6-a93d-4a48-be76-4663d8871358 ] Request (QuotaClassesV3RbacTest:test_show_quota_class_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-class-sets/tempest-QuotaClassesV3RbacTest-QuotaClass-1819105198 0.230s 2020-12-14 02:26:23.473 197 DEBUG tempest.lib.common.rest_client [req-795e13d6-a93d-4a48-be76-4663d8871358 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '348', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-795e13d6-a93d-4a48-be76-4663d8871358', 'x-compute-request-id': 'req-795e13d6-a93d-4a48-be76-4663d8871358', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-class-sets/tempest-QuotaClassesV3RbacTest-QuotaClass-1819105198'} Body: b'{"quota_class_set": {"id": "tempest-QuotaClassesV3RbacTest-QuotaClass-1819105198", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:23.505 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:23.586 197 INFO tempest.lib.common.rest_client [req-e2f13c7f-5784-4d0f-9c0b-486854166598 ] Request (QuotaClassesV3RbacTest:test_show_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles 0.074s 2020-12-14 02:26:23.588 197 DEBUG tempest.lib.common.rest_client [req-e2f13c7f-5784-4d0f-9c0b-486854166598 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2f13c7f-5784-4d0f-9c0b-486854166598', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:23.650 197 INFO tempest.lib.common.rest_client [req-6a72c41a-1249-46ca-869c-a04afeb246b5 ] Request (QuotaClassesV3RbacTest:test_show_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:26:23.654 197 DEBUG tempest.lib.common.rest_client [req-6a72c41a-1249-46ca-869c-a04afeb246b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a72c41a-1249-46ca-869c-a04afeb246b5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "132f97ee4151445ea930d773e142461a", "name": "tempest-QuotaClassesV3RbacTest-1212865709", "password_expires_at": null}, "audit_ids": ["soe53VlHR5y_CcOxbR2arw"], "expires_at": "2020-12-14T03:26:23.000000Z", "issued_at": "2020-12-14T02:26:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "14ae3ffdfa2b48caaeee1206e72808ea", "name": "tempest-QuotaClassesV3RbacTest-1212865709"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:23.674 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:26:23.693 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:quota_classes, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:26:23.803 197 INFO tempest.lib.common.rest_client [req-eaa14abd-c0d1-4adf-a203-c64e1bcc3016 ] Request (QuotaClassesV3RbacTest:test_update_quota_class_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-class-sets/tempest-QuotaClassesV3RbacTest-QuotaClass-1819105198 0.104s 2020-12-14 02:26:23.806 197 DEBUG tempest.lib.common.rest_client [req-eaa14abd-c0d1-4adf-a203-c64e1bcc3016 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '348', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eaa14abd-c0d1-4adf-a203-c64e1bcc3016', 'x-compute-request-id': 'req-eaa14abd-c0d1-4adf-a203-c64e1bcc3016', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-class-sets/tempest-QuotaClassesV3RbacTest-QuotaClass-1819105198'} Body: b'{"quota_class_set": {"id": "tempest-QuotaClassesV3RbacTest-QuotaClass-1819105198", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:23.836 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:23.907 197 INFO tempest.lib.common.rest_client [req-fce46f63-137a-42b0-be93-3469e71f7335 ] Request (QuotaClassesV3RbacTest:test_update_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles 0.065s 2020-12-14 02:26:23.910 197 DEBUG tempest.lib.common.rest_client [req-fce46f63-137a-42b0-be93-3469e71f7335 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fce46f63-137a-42b0-be93-3469e71f7335', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:23.967 197 INFO tempest.lib.common.rest_client [req-bff1a575-c08b-47f7-b399-d12ad330a3f4 ] Request (QuotaClassesV3RbacTest:test_update_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:26:23.971 197 DEBUG tempest.lib.common.rest_client [req-bff1a575-c08b-47f7-b399-d12ad330a3f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bff1a575-c08b-47f7-b399-d12ad330a3f4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "132f97ee4151445ea930d773e142461a", "name": "tempest-QuotaClassesV3RbacTest-1212865709", "password_expires_at": null}, "audit_ids": ["qgpYppoyTM6bKMttoUarNA"], "expires_at": "2020-12-14T03:26:23.000000Z", "issued_at": "2020-12-14T02:26:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "14ae3ffdfa2b48caaeee1206e72808ea", "name": "tempest-QuotaClassesV3RbacTest-1212865709"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:23.979 189 INFO tempest.lib.common.rest_client [req-dd0680b9-0f86-436d-a88f-031b40b5a10c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.197s 2020-12-14 02:26:23.982 189 DEBUG tempest.lib.common.rest_client [req-dd0680b9-0f86-436d-a88f-031b40b5a10c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dd0680b9-0f86-436d-a88f-031b40b5a10c', 'x-compute-request-id': 'req-dd0680b9-0f86-436d-a88f-031b40b5a10c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:24.291 197 INFO tempest.lib.common.rest_client [req-9ae4a393-7339-45f5-87eb-cf66f2fd9f61 ] Request (QuotaClassesV3RbacTest:test_update_quota_class_set): 200 PUT http://172.30.13.94/compute/v2.1/os-quota-class-sets/tempest-QuotaClassesV3RbacTest-QuotaClass-1819105198 0.313s 2020-12-14 02:26:24.293 197 DEBUG tempest.lib.common.rest_client [req-9ae4a393-7339-45f5-87eb-cf66f2fd9f61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_class_set": {"cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '286', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9ae4a393-7339-45f5-87eb-cf66f2fd9f61', 'x-compute-request-id': 'req-9ae4a393-7339-45f5-87eb-cf66f2fd9f61', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-class-sets/tempest-QuotaClassesV3RbacTest-QuotaClass-1819105198'} Body: b'{"quota_class_set": {"cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:24.321 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:24.394 197 INFO tempest.lib.common.rest_client [req-84915cc4-5685-4a30-a149-b12fbdcc9c87 ] Request (QuotaClassesV3RbacTest:test_update_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles 0.067s 2020-12-14 02:26:24.398 197 DEBUG tempest.lib.common.rest_client [req-84915cc4-5685-4a30-a149-b12fbdcc9c87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84915cc4-5685-4a30-a149-b12fbdcc9c87', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea/users/132f97ee4151445ea930d773e142461a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:24.456 197 INFO tempest.lib.common.rest_client [req-49ede1bf-0c3f-499b-b595-ef5bfc5a3529 ] Request (QuotaClassesV3RbacTest:test_update_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:26:24.461 197 DEBUG tempest.lib.common.rest_client [req-49ede1bf-0c3f-499b-b595-ef5bfc5a3529 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-49ede1bf-0c3f-499b-b595-ef5bfc5a3529', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "132f97ee4151445ea930d773e142461a", "name": "tempest-QuotaClassesV3RbacTest-1212865709", "password_expires_at": null}, "audit_ids": ["4E-o5huyRXClTHRaSXuCAQ"], "expires_at": "2020-12-14T03:26:24.000000Z", "issued_at": "2020-12-14T02:26:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "14ae3ffdfa2b48caaeee1206e72808ea", "name": "tempest-QuotaClassesV3RbacTest-1212865709"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_14ae3ffdfa2b48caaeee1206e72808ea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:24.640 197 INFO tempest.lib.common.rest_client [req-f4eb0419-43f3-4f39-a824-28f6c955fd44 ] Request (QuotaClassesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/132f97ee4151445ea930d773e142461a 0.163s 2020-12-14 02:26:24.644 197 DEBUG tempest.lib.common.rest_client [req-f4eb0419-43f3-4f39-a824-28f6c955fd44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4eb0419-43f3-4f39-a824-28f6c955fd44', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/132f97ee4151445ea930d773e142461a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:24.762 197 INFO tempest.lib.common.rest_client [req-0aced76e-2897-437d-8578-854df7f100e3 ] Request (QuotaClassesV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-12-14 02:26:24.766 197 DEBUG tempest.lib.common.rest_client [req-0aced76e-2897-437d-8578-854df7f100e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0aced76e-2897-437d-8578-854df7f100e3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["uM1ijr6UTiOk_Vm0lm6cVw"], "expires_at": "2020-12-14T03:26:24.000000Z", "issued_at": "2020-12-14T02:26:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:25.113 197 INFO tempest.lib.common.rest_client [req-26f29fe4-03f1-4ca6-8e24-82819115ed8b ] Request (QuotaClassesV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=14ae3ffdfa2b48caaeee1206e72808ea&name=default 0.341s 2020-12-14 02:26:25.117 197 DEBUG tempest.lib.common.rest_client [req-26f29fe4-03f1-4ca6-8e24-82819115ed8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-26f29fe4-03f1-4ca6-8e24-82819115ed8b', 'date': 'Mon, 14 Dec 2020 02:26:25 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=14ae3ffdfa2b48caaeee1206e72808ea&name=default'} Body: b'{"security_groups": [{"id": "473ec26d-9e60-4d4c-bde7-18078d5ea00c", "name": "default", "stateful": true, "tenant_id": "14ae3ffdfa2b48caaeee1206e72808ea", "description": "Default security group", "security_group_rules": [{"id": "0ebbac14-3772-4463-93fe-f486a6e12aa5", "tenant_id": "14ae3ffdfa2b48caaeee1206e72808ea", "security_group_id": "473ec26d-9e60-4d4c-bde7-18078d5ea00c", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:26:25Z", "updated_at": "2020-12-14T02:26:25Z", "revision_number": 0, "project_id": "14ae3ffdfa2b48caaeee1206e72808ea"}, {"id": "3d877ac8-b12b-44c3-962d-cf3489f7c326", "tenant_id": "14ae3ffdfa2b48caaeee1206e72808ea", "security_group_id": "473ec26d-9e60-4d4c-bde7-18078d5ea00c", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "473ec26d-9e60-4d4c-bde7-18078d5ea00c", "description": null, "tags": [], "created_at": "2020-12-14T02:26:25Z", "updated_at": "2020-12-14T02:26:25Z", "revision_number": 0, "project_id": "14ae3ffdfa2b48caaeee1206e72808ea"}, {"id": "54b11cff-f0a7-43aa-9b52-310077cfbb46", "tenant_id": "14ae3ffdfa2b48caaeee1206e72808ea", "security_group_id": "473ec26d-9e60-4d4c-bde7-18078d5ea00c", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "473ec26d-9e60-4d4c-bde7-18078d5ea00c", "description": null, "tags": [], "created_at": "2020-12-14T02:26:25Z", "updated_at": "2020-12-14T02:26:25Z", "revision_number": 0, "project_id": "14ae3ffdfa2b48caaeee1206e72808ea"}, {"id": "c13fa833-6662-48bd-ba3c-6a811fea3fcd", "tenant_id": "14ae3ffdfa2b48caaeee1206e72808ea", "security_group_id": "473ec26d-9e60-4d4c-bde7-18078d5ea00c", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:26:25Z", "updated_at": "2020-12-14T02:26:25Z", "revision_number": 0, "project_id": "14ae3ffdfa2b48caaeee1206e72808ea"}], "tags": [], "created_at": "2020-12-14T02:26:24Z", "updated_at": "2020-12-14T02:26:25Z", "revision_number": 1, "project_id": "14ae3ffdfa2b48caaeee1206e72808ea"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:25.307 197 INFO tempest.lib.common.rest_client [req-69aad0a0-1ec1-4eb0-89c1-37a09dd2cd06 ] Request (QuotaClassesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/473ec26d-9e60-4d4c-bde7-18078d5ea00c 0.179s 2020-12-14 02:26:25.311 197 DEBUG tempest.lib.common.rest_client [req-69aad0a0-1ec1-4eb0-89c1-37a09dd2cd06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-69aad0a0-1ec1-4eb0-89c1-37a09dd2cd06', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:26:25 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/473ec26d-9e60-4d4c-bde7-18078d5ea00c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:25.344 189 INFO tempest.lib.common.rest_client [req-50453aae-dedd-4ff0-9d2a-0c806c962ea6 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.256s 2020-12-14 02:26:25.347 189 DEBUG tempest.lib.common.rest_client [req-50453aae-dedd-4ff0-9d2a-0c806c962ea6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-50453aae-dedd-4ff0-9d2a-0c806c962ea6', 'x-compute-request-id': 'req-50453aae-dedd-4ff0-9d2a-0c806c962ea6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:25.466 197 INFO tempest.lib.common.rest_client [req-69123778-adb2-4f75-afc5-21b2887c8ad9 ] Request (QuotaClassesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea 0.147s 2020-12-14 02:26:25.469 197 DEBUG tempest.lib.common.rest_client [req-69123778-adb2-4f75-afc5-21b2887c8ad9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-69123778-adb2-4f75-afc5-21b2887c8ad9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/14ae3ffdfa2b48caaeee1206e72808ea'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:25.594 197 INFO tempest.lib.common.rest_client [req-b1f68f6f-218d-4f12-8708-756288587534 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:26:25.597 197 DEBUG tempest.lib.common.rest_client [req-b1f68f6f-218d-4f12-8708-756288587534 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1f68f6f-218d-4f12-8708-756288587534', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["kOMTZE3RScK2InkA5eRTHw"], "expires_at": "2020-12-14T03:26:25.000000Z", "issued_at": "2020-12-14T02:26:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:25.706 197 INFO tempest.lib.common.rest_client [req-08154099-c441-4367-bc90-d6891e069115 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-12-14 02:26:25.709 197 DEBUG tempest.lib.common.rest_client [req-08154099-c441-4367-bc90-d6891e069115 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-08154099-c441-4367-bc90-d6891e069115', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["DF8-7DeOTQCHBYwoj0om_Q"], "expires_at": "2020-12-14T03:26:25.000000Z", "issued_at": "2020-12-14T02:26:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:25.791 197 INFO tempest.lib.common.rest_client [req-7d72b155-eff5-4f6b-a379-03ea95d96170 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.074s 2020-12-14 02:26:25.794 197 DEBUG tempest.lib.common.rest_client [req-7d72b155-eff5-4f6b-a379-03ea95d96170 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d72b155-eff5-4f6b-a379-03ea95d96170', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:25.875 197 INFO tempest.lib.common.rest_client [req-df5d8d5d-20e8-4c13-b279-4243ce59ced9 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.072s 2020-12-14 02:26:25.878 197 DEBUG tempest.lib.common.rest_client [req-df5d8d5d-20e8-4c13-b279-4243ce59ced9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SnapshotsActionsV3RbacTest-1367479906-desc", "domain_id": "default", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df5d8d5d-20e8-4c13-b279-4243ce59ced9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "ac751800db9d41fe89f512b68b5b02d2", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906", "domain_id": "default", "description": "tempest-SnapshotsActionsV3RbacTest-1367479906-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:26.007 197 INFO tempest.lib.common.rest_client [req-c287abbf-60d0-4a7b-8b63-0d91dedef9e5 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.119s 2020-12-14 02:26:26.010 197 DEBUG tempest.lib.common.rest_client [req-c287abbf-60d0-4a7b-8b63-0d91dedef9e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SnapshotsActionsV3RbacTest-1367479906", "password": "F3~Bl6_22wKLZRn", "project_id": "ac751800db9d41fe89f512b68b5b02d2", "email": "tempest-SnapshotsActionsV3RbacTest-1800379011@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '408', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c287abbf-60d0-4a7b-8b63-0d91dedef9e5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "ac751800db9d41fe89f512b68b5b02d2", "email": "tempest-SnapshotsActionsV3RbacTest-1800379011@example.com", "id": "d4a7c0866b7a4d6eb7d7dca6ba513ad4", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:26.075 197 INFO tempest.lib.common.rest_client [req-4078a47f-f586-486b-bf58-df03ab5f91bc ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:26:26.078 197 DEBUG tempest.lib.common.rest_client [req-4078a47f-f586-486b-bf58-df03ab5f91bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4078a47f-f586-486b-bf58-df03ab5f91bc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:26.146 197 INFO tempest.lib.common.rest_client [req-ff9c35be-21f8-4391-aafb-da8fc651e27f ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:26:26.148 197 DEBUG tempest.lib.common.rest_client [req-ff9c35be-21f8-4391-aafb-da8fc651e27f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff9c35be-21f8-4391-aafb-da8fc651e27f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:26.234 197 INFO tempest.lib.common.rest_client [req-16db5456-59cd-4b55-a9e4-3e0aaf4841f8 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles/72a4576c553448cd941b052c1ca0cf2d 0.078s 2020-12-14 02:26:26.237 197 DEBUG tempest.lib.common.rest_client [req-16db5456-59cd-4b55-a9e4-3e0aaf4841f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16db5456-59cd-4b55-a9e4-3e0aaf4841f8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:26.240 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SnapshotsActionsV3RbacTest-1367479906', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ac751800db9d41fe89f512b68b5b02d2', 'project_name': 'tempest-SnapshotsActionsV3RbacTest-1367479906', 'tenant_id': 'ac751800db9d41fe89f512b68b5b02d2', 'tenant_name': 'tempest-SnapshotsActionsV3RbacTest-1367479906', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd4a7c0866b7a4d6eb7d7dca6ba513ad4'}, Network: None, Subnet: None, Router: None 2020-12-14 02:26:26.242 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SnapshotsActionsV3RbacTest-1367479906', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ac751800db9d41fe89f512b68b5b02d2', 'project_name': 'tempest-SnapshotsActionsV3RbacTest-1367479906', 'tenant_id': 'ac751800db9d41fe89f512b68b5b02d2', 'tenant_name': 'tempest-SnapshotsActionsV3RbacTest-1367479906', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd4a7c0866b7a4d6eb7d7dca6ba513ad4'}, Network: None, Subnet: None, Router: None 2020-12-14 02:26:26.520 197 INFO tempest.lib.common.rest_client [req-77f1f2a2-51f2-4011-bf8e-35c5d718d7b7 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.215s 2020-12-14 02:26:26.523 197 DEBUG tempest.lib.common.rest_client [req-77f1f2a2-51f2-4011-bf8e-35c5d718d7b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6583', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-77f1f2a2-51f2-4011-bf8e-35c5d718d7b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d4a7c0866b7a4d6eb7d7dca6ba513ad4", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906", "password_expires_at": null}, "audit_ids": ["S-Z0BTONQtqYCeZHhEJjpg"], "expires_at": "2020-12-14T03:26:26.000000Z", "issued_at": "2020-12-14T02:26:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac751800db9d41fe89f512b68b5b02d2", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:26.626 197 INFO tempest.lib.common.rest_client [req-57bb1c7e-62fc-4547-b96a-a145888886d6 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:26:26.628 197 DEBUG tempest.lib.common.rest_client [req-57bb1c7e-62fc-4547-b96a-a145888886d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57bb1c7e-62fc-4547-b96a-a145888886d6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["xJxwTYoORTi1PPsusf_WNg"], "expires_at": "2020-12-14T03:26:26.000000Z", "issued_at": "2020-12-14T02:26:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:26.739 189 INFO tempest.lib.common.rest_client [req-0829d208-24fe-4eee-98c2-c795df1fb442 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.284s 2020-12-14 02:26:26.742 189 DEBUG tempest.lib.common.rest_client [req-0829d208-24fe-4eee-98c2-c795df1fb442 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0829d208-24fe-4eee-98c2-c795df1fb442', 'x-compute-request-id': 'req-0829d208-24fe-4eee-98c2-c795df1fb442', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:26.771 197 INFO tempest.lib.common.rest_client [req-737a0324-ef9b-4e74-abcb-1ed46ae2d674 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.070s 2020-12-14 02:26:26.774 197 DEBUG tempest.lib.common.rest_client [req-737a0324-ef9b-4e74-abcb-1ed46ae2d674 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-737a0324-ef9b-4e74-abcb-1ed46ae2d674', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Sqru0re_TL6SDlsYPhIYPQ"], "expires_at": "2020-12-14T03:26:26.000000Z", "issued_at": "2020-12-14T02:26:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:26.837 197 INFO tempest.lib.common.rest_client [req-8eb24df7-af55-4304-b790-2acec16ed413 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.056s 2020-12-14 02:26:26.839 197 DEBUG tempest.lib.common.rest_client [req-8eb24df7-af55-4304-b790-2acec16ed413 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8eb24df7-af55-4304-b790-2acec16ed413', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:26.905 197 INFO tempest.lib.common.rest_client [req-acf75ae2-f427-45de-ab7b-44f3c9e8d909 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:26:26.907 197 DEBUG tempest.lib.common.rest_client [req-acf75ae2-f427-45de-ab7b-44f3c9e8d909 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-acf75ae2-f427-45de-ab7b-44f3c9e8d909', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:26.910 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:26:26.912 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:26.978 197 INFO tempest.lib.common.rest_client [req-fb1ff024-9123-48cd-b568-951b0037b24f ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles 0.059s 2020-12-14 02:26:26.980 197 DEBUG tempest.lib.common.rest_client [req-fb1ff024-9123-48cd-b568-951b0037b24f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fb1ff024-9123-48cd-b568-951b0037b24f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:27.057 197 INFO tempest.lib.common.rest_client [req-f662affe-72f3-49a7-ad5b-937301ff776d ] Request (SnapshotsActionsV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-12-14 02:26:27.060 197 DEBUG tempest.lib.common.rest_client [req-f662affe-72f3-49a7-ad5b-937301ff776d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f662affe-72f3-49a7-ad5b-937301ff776d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:27.184 197 INFO tempest.lib.common.rest_client [req-a355382d-d9cc-4f4d-b40e-dc37020cf6d8 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles/a629c95d64b3416fb80ae90af4f69c05 0.116s 2020-12-14 02:26:27.187 197 DEBUG tempest.lib.common.rest_client [req-a355382d-d9cc-4f4d-b40e-dc37020cf6d8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a355382d-d9cc-4f4d-b40e-dc37020cf6d8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:28.068 189 INFO tempest.lib.common.rest_client [req-a2936606-b77f-4625-b7c0-7d9003d444e1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.220s 2020-12-14 02:26:28.072 189 DEBUG tempest.lib.common.rest_client [req-a2936606-b77f-4625-b7c0-7d9003d444e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a2936606-b77f-4625-b7c0-7d9003d444e1', 'x-compute-request-id': 'req-a2936606-b77f-4625-b7c0-7d9003d444e1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:28.301 197 INFO tempest.lib.common.rest_client [req-c8f78efd-2ed5-4dd3-af18-c129368f041e ] Request (SnapshotsActionsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-14 02:26:28.305 197 DEBUG tempest.lib.common.rest_client [req-c8f78efd-2ed5-4dd3-af18-c129368f041e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8f78efd-2ed5-4dd3-af18-c129368f041e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d4a7c0866b7a4d6eb7d7dca6ba513ad4", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906", "password_expires_at": null}, "audit_ids": ["AIZ2bQ0aQrCaY53EzPOYGg"], "expires_at": "2020-12-14T03:26:28.000000Z", "issued_at": "2020-12-14T02:26:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac751800db9d41fe89f512b68b5b02d2", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:28.769 197 INFO tempest.lib.common.rest_client [req-fe923551-f5db-4e41-a384-dc6411a617e5 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/volumes 0.454s 2020-12-14 02:26:28.771 197 DEBUG tempest.lib.common.rest_client [req-fe923551-f5db-4e41-a384-dc6411a617e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-SnapshotsActionsV3RbacTest-Volume-1600003381"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fe923551-f5db-4e41-a384-dc6411a617e5', 'content-length': '847', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fe923551-f5db-4e41-a384-dc6411a617e5', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/volumes'} Body: b'{"volume": {"id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:26:29.000000", "updated_at": null, "name": "tempest-SnapshotsActionsV3RbacTest-Volume-1600003381", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34"}], "user_id": "d4a7c0866b7a4d6eb7d7dca6ba513ad4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:28.919 197 INFO tempest.lib.common.rest_client [req-9c4f040a-5f1d-42ab-bb9b-2839c9721b12 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34 0.082s 2020-12-14 02:26:28.921 197 DEBUG tempest.lib.common.rest_client [req-9c4f040a-5f1d-42ab-bb9b-2839c9721b12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9c4f040a-5f1d-42ab-bb9b-2839c9721b12', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9c4f040a-5f1d-42ab-bb9b-2839c9721b12', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34'} Body: b'{"volume": {"id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:26:29.000000", "updated_at": "2020-12-14T02:26:29.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Volume-1600003381", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34"}], "user_id": "d4a7c0866b7a4d6eb7d7dca6ba513ad4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ac751800db9d41fe89f512b68b5b02d2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:29.456 189 INFO tempest.lib.common.rest_client [req-9afb4258-8750-4ef5-a6e9-869764331d10 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.246s 2020-12-14 02:26:29.460 189 DEBUG tempest.lib.common.rest_client [req-9afb4258-8750-4ef5-a6e9-869764331d10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9afb4258-8750-4ef5-a6e9-869764331d10', 'x-compute-request-id': 'req-9afb4258-8750-4ef5-a6e9-869764331d10', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:30.072 197 INFO tempest.lib.common.rest_client [req-23b2aae2-3b85-4d16-8eeb-00a123f8e3cf ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34 0.077s 2020-12-14 02:26:30.074 197 DEBUG tempest.lib.common.rest_client [req-23b2aae2-3b85-4d16-8eeb-00a123f8e3cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-23b2aae2-3b85-4d16-8eeb-00a123f8e3cf', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-23b2aae2-3b85-4d16-8eeb-00a123f8e3cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34'} Body: b'{"volume": {"id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:26:29.000000", "updated_at": "2020-12-14T02:26:29.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Volume-1600003381", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34"}], "user_id": "d4a7c0866b7a4d6eb7d7dca6ba513ad4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ac751800db9d41fe89f512b68b5b02d2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:30.144 197 INFO tempest.common.waiters [-] volume 8729ac26-9f60-4ac5-b774-bb180f0c5c34 reached available after waiting for 2.144383 seconds 2020-12-14 02:26:30.340 197 INFO tempest.lib.common.rest_client [req-829d9d28-5867-4470-8ab0-80b5ca0da00b ] Request (SnapshotsActionsV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots 0.192s 2020-12-14 02:26:30.343 197 DEBUG tempest.lib.common.rest_client [req-829d9d28-5867-4470-8ab0-80b5ca0da00b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-681551103"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-829d9d28-5867-4470-8ab0-80b5ca0da00b', 'content-length': '312', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-829d9d28-5867-4470-8ab0-80b5ca0da00b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots'} Body: b'{"snapshot": {"id": "fdda5670-5db2-4a68-80df-83629a892cca", "created_at": "2020-12-14T02:26:30.272538", "updated_at": null, "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-681551103", "description": null, "volume_id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "creating", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:30.416 197 INFO tempest.lib.common.rest_client [req-4042bd6b-4327-4a63-b4db-8ad3b3e58d30 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca 0.047s 2020-12-14 02:26:30.418 197 DEBUG tempest.lib.common.rest_client [req-4042bd6b-4327-4a63-b4db-8ad3b3e58d30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4042bd6b-4327-4a63-b4db-8ad3b3e58d30', 'content-length': '444', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4042bd6b-4327-4a63-b4db-8ad3b3e58d30', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca'} Body: b'{"snapshot": {"id": "fdda5670-5db2-4a68-80df-83629a892cca", "created_at": "2020-12-14T02:26:30.000000", "updated_at": null, "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-681551103", "description": null, "volume_id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "ac751800db9d41fe89f512b68b5b02d2", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:31.022 189 INFO tempest.lib.common.rest_client [req-3bb2343a-9cde-452e-bb19-60d4a30e8ce9 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.472s 2020-12-14 02:26:31.026 189 DEBUG tempest.lib.common.rest_client [req-3bb2343a-9cde-452e-bb19-60d4a30e8ce9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3bb2343a-9cde-452e-bb19-60d4a30e8ce9', 'x-compute-request-id': 'req-3bb2343a-9cde-452e-bb19-60d4a30e8ce9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:31.516 197 INFO tempest.lib.common.rest_client [req-c7350357-07dc-443f-a382-7b229801a480 ] Request (SnapshotsActionsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca 0.054s 2020-12-14 02:26:31.518 197 DEBUG tempest.lib.common.rest_client [req-c7350357-07dc-443f-a382-7b229801a480 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c7350357-07dc-443f-a382-7b229801a480', 'content-length': '471', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c7350357-07dc-443f-a382-7b229801a480', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca'} Body: b'{"snapshot": {"id": "fdda5670-5db2-4a68-80df-83629a892cca", "created_at": "2020-12-14T02:26:30.000000", "updated_at": "2020-12-14T02:26:31.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-681551103", "description": null, "volume_id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "ac751800db9d41fe89f512b68b5b02d2", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:31.558 197 INFO tempest.common.waiters [-] snapshot fdda5670-5db2-4a68-80df-83629a892cca reached available after waiting for 1.558366 seconds 2020-12-14 02:26:31.567 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:26:31.587 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:snapshot_admin_actions:reset_status, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:26:31.589 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:31.770 197 INFO tempest.lib.common.rest_client [req-839e5dde-e869-4782-a358-7993d7739871 ] Request (SnapshotsActionsV3RbacTest:test_reset_snapshot_status): 200 GET http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles 0.174s 2020-12-14 02:26:31.774 197 DEBUG tempest.lib.common.rest_client [req-839e5dde-e869-4782-a358-7993d7739871 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-839e5dde-e869-4782-a358-7993d7739871', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:31.882 197 INFO tempest.lib.common.rest_client [req-b0f3bbf6-91b0-4332-9f79-d3b748565d64 ] Request (SnapshotsActionsV3RbacTest:test_reset_snapshot_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:26:31.885 197 DEBUG tempest.lib.common.rest_client [req-b0f3bbf6-91b0-4332-9f79-d3b748565d64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b0f3bbf6-91b0-4332-9f79-d3b748565d64', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d4a7c0866b7a4d6eb7d7dca6ba513ad4", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906", "password_expires_at": null}, "audit_ids": ["HGOTSRGnTiOcU-hNHezlfA"], "expires_at": "2020-12-14T03:26:31.000000Z", "issued_at": "2020-12-14T02:26:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac751800db9d41fe89f512b68b5b02d2", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:32.206 197 INFO tempest.lib.common.rest_client [req-a698daba-083f-4fcb-879c-439ec1e64418 ] Request (SnapshotsActionsV3RbacTest:test_reset_snapshot_status): 202 POST http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca/action 0.313s 2020-12-14 02:26:32.208 197 DEBUG tempest.lib.common.rest_client [req-a698daba-083f-4fcb-879c-439ec1e64418 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "error"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-a698daba-083f-4fcb-879c-439ec1e64418', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a698daba-083f-4fcb-879c-439ec1e64418', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:32.211 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:32.287 197 INFO tempest.lib.common.rest_client [req-0cb15d34-db30-4538-9510-25bc43c477ed ] Request (SnapshotsActionsV3RbacTest:test_reset_snapshot_status): 200 GET http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles 0.069s 2020-12-14 02:26:32.290 197 DEBUG tempest.lib.common.rest_client [req-0cb15d34-db30-4538-9510-25bc43c477ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0cb15d34-db30-4538-9510-25bc43c477ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:32.344 197 INFO tempest.lib.common.rest_client [req-c0e805d6-cfd5-4270-816f-cbae44325a7d ] Request (SnapshotsActionsV3RbacTest:test_reset_snapshot_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:26:32.347 197 DEBUG tempest.lib.common.rest_client [req-c0e805d6-cfd5-4270-816f-cbae44325a7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c0e805d6-cfd5-4270-816f-cbae44325a7d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d4a7c0866b7a4d6eb7d7dca6ba513ad4", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906", "password_expires_at": null}, "audit_ids": ["jsulrut8QgSNbM9HhvFAUA"], "expires_at": "2020-12-14T03:26:32.000000Z", "issued_at": "2020-12-14T02:26:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac751800db9d41fe89f512b68b5b02d2", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:32.383 189 INFO tempest.lib.common.rest_client [req-4668fdda-0c09-4d77-88c3-ee86bdc37676 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.248s 2020-12-14 02:26:32.386 189 DEBUG tempest.lib.common.rest_client [req-4668fdda-0c09-4d77-88c3-ee86bdc37676 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4668fdda-0c09-4d77-88c3-ee86bdc37676', 'x-compute-request-id': 'req-4668fdda-0c09-4d77-88c3-ee86bdc37676', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:32.461 197 INFO tempest.lib.common.rest_client [req-d34ebf5c-039a-4288-a3a6-790f0aa26808 ] Request (SnapshotsActionsV3RbacTest:test_reset_snapshot_status): 200 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca 0.107s 2020-12-14 02:26:32.464 197 DEBUG tempest.lib.common.rest_client [req-d34ebf5c-039a-4288-a3a6-790f0aa26808 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d34ebf5c-039a-4288-a3a6-790f0aa26808', 'content-length': '467', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d34ebf5c-039a-4288-a3a6-790f0aa26808', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca'} Body: b'{"snapshot": {"id": "fdda5670-5db2-4a68-80df-83629a892cca", "created_at": "2020-12-14T02:26:30.000000", "updated_at": "2020-12-14T02:26:32.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-681551103", "description": null, "volume_id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "error", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "ac751800db9d41fe89f512b68b5b02d2", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:32.497 197 INFO tempest.common.waiters [-] snapshot fdda5670-5db2-4a68-80df-83629a892cca reached error after waiting for 0.497515 seconds 2020-12-14 02:26:32.663 197 INFO tempest.lib.common.rest_client [req-6ff877ea-698f-4a1b-92bf-f647a6a6aa6c ] Request (SnapshotsActionsV3RbacTest:tearDown): 202 POST http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca/action 0.160s 2020-12-14 02:26:32.666 197 DEBUG tempest.lib.common.rest_client [req-6ff877ea-698f-4a1b-92bf-f647a6a6aa6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "available"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-6ff877ea-698f-4a1b-92bf-f647a6a6aa6c', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6ff877ea-698f-4a1b-92bf-f647a6a6aa6c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:32.718 197 INFO tempest.lib.common.rest_client [req-58159057-ea18-4332-b953-0e0e8cecdf6b ] Request (SnapshotsActionsV3RbacTest:tearDown): 200 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca 0.046s 2020-12-14 02:26:32.721 197 DEBUG tempest.lib.common.rest_client [req-58159057-ea18-4332-b953-0e0e8cecdf6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-58159057-ea18-4332-b953-0e0e8cecdf6b', 'content-length': '471', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-58159057-ea18-4332-b953-0e0e8cecdf6b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca'} Body: b'{"snapshot": {"id": "fdda5670-5db2-4a68-80df-83629a892cca", "created_at": "2020-12-14T02:26:30.000000", "updated_at": "2020-12-14T02:26:33.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-681551103", "description": null, "volume_id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "ac751800db9d41fe89f512b68b5b02d2", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:32.754 197 INFO tempest.common.waiters [-] snapshot fdda5670-5db2-4a68-80df-83629a892cca reached available after waiting for 0.754109 seconds 2020-12-14 02:26:32.767 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:26:32.789 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:snapshot_admin_actions:force_delete, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:26:33.005 197 INFO tempest.lib.common.rest_client [req-4165fd39-8f03-48d5-815c-e485eb6208de ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 202 POST http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots 0.208s 2020-12-14 02:26:33.009 197 DEBUG tempest.lib.common.rest_client [req-4165fd39-8f03-48d5-815c-e485eb6208de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1966164615"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4165fd39-8f03-48d5-815c-e485eb6208de', 'content-length': '313', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4165fd39-8f03-48d5-815c-e485eb6208de', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots'} Body: b'{"snapshot": {"id": "56efee2f-3e45-4efa-8988-15ca26bfe91d", "created_at": "2020-12-14T02:26:32.932345", "updated_at": null, "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1966164615", "description": null, "volume_id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "creating", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:33.085 197 INFO tempest.lib.common.rest_client [req-7b3283ef-3d55-4d12-88c6-bb554489333e ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 200 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/56efee2f-3e45-4efa-8988-15ca26bfe91d 0.044s 2020-12-14 02:26:33.088 197 DEBUG tempest.lib.common.rest_client [req-7b3283ef-3d55-4d12-88c6-bb554489333e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7b3283ef-3d55-4d12-88c6-bb554489333e', 'content-length': '445', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7b3283ef-3d55-4d12-88c6-bb554489333e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/56efee2f-3e45-4efa-8988-15ca26bfe91d'} Body: b'{"snapshot": {"id": "56efee2f-3e45-4efa-8988-15ca26bfe91d", "created_at": "2020-12-14T02:26:33.000000", "updated_at": null, "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1966164615", "description": null, "volume_id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "ac751800db9d41fe89f512b68b5b02d2", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:33.778 189 INFO tempest.lib.common.rest_client [req-e0bd843a-bfe4-4edf-9ed2-6665fa9847de ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.288s 2020-12-14 02:26:33.782 189 DEBUG tempest.lib.common.rest_client [req-e0bd843a-bfe4-4edf-9ed2-6665fa9847de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e0bd843a-bfe4-4edf-9ed2-6665fa9847de', 'x-compute-request-id': 'req-e0bd843a-bfe4-4edf-9ed2-6665fa9847de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:34.174 197 INFO tempest.lib.common.rest_client [req-2991ef97-1251-4848-a325-070fff5fe8c0 ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 200 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/56efee2f-3e45-4efa-8988-15ca26bfe91d 0.048s 2020-12-14 02:26:34.177 197 DEBUG tempest.lib.common.rest_client [req-2991ef97-1251-4848-a325-070fff5fe8c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2991ef97-1251-4848-a325-070fff5fe8c0', 'content-length': '472', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2991ef97-1251-4848-a325-070fff5fe8c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/56efee2f-3e45-4efa-8988-15ca26bfe91d'} Body: b'{"snapshot": {"id": "56efee2f-3e45-4efa-8988-15ca26bfe91d", "created_at": "2020-12-14T02:26:33.000000", "updated_at": "2020-12-14T02:26:34.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1966164615", "description": null, "volume_id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "ac751800db9d41fe89f512b68b5b02d2", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:34.208 197 INFO tempest.common.waiters [-] snapshot 56efee2f-3e45-4efa-8988-15ca26bfe91d reached available after waiting for 1.208076 seconds 2020-12-14 02:26:34.210 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:34.282 197 INFO tempest.lib.common.rest_client [req-d4ae7f98-f875-4884-9e3c-61e33ae233e7 ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 200 GET http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles 0.065s 2020-12-14 02:26:34.286 197 DEBUG tempest.lib.common.rest_client [req-d4ae7f98-f875-4884-9e3c-61e33ae233e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4ae7f98-f875-4884-9e3c-61e33ae233e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:34.336 197 INFO tempest.lib.common.rest_client [req-3c03aed8-3e3a-40ce-83f8-644d6f489293 ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:26:34.339 197 DEBUG tempest.lib.common.rest_client [req-3c03aed8-3e3a-40ce-83f8-644d6f489293 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c03aed8-3e3a-40ce-83f8-644d6f489293', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d4a7c0866b7a4d6eb7d7dca6ba513ad4", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906", "password_expires_at": null}, "audit_ids": ["pLCDIOn_S5GpXisrLHtI2Q"], "expires_at": "2020-12-14T03:26:34.000000Z", "issued_at": "2020-12-14T02:26:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac751800db9d41fe89f512b68b5b02d2", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:34.501 197 INFO tempest.lib.common.rest_client [req-fb2e03b1-53e0-4187-8bfd-830de641279c ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 202 POST http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/56efee2f-3e45-4efa-8988-15ca26bfe91d/action 0.154s 2020-12-14 02:26:34.505 197 DEBUG tempest.lib.common.rest_client [req-fb2e03b1-53e0-4187-8bfd-830de641279c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-force_delete": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-fb2e03b1-53e0-4187-8bfd-830de641279c', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fb2e03b1-53e0-4187-8bfd-830de641279c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/56efee2f-3e45-4efa-8988-15ca26bfe91d/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:34.508 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:34.581 197 INFO tempest.lib.common.rest_client [req-70a2f096-1ba4-4407-bd4e-9cb499bbc918 ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 200 GET http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles 0.067s 2020-12-14 02:26:34.585 197 DEBUG tempest.lib.common.rest_client [req-70a2f096-1ba4-4407-bd4e-9cb499bbc918 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70a2f096-1ba4-4407-bd4e-9cb499bbc918', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:34.654 197 INFO tempest.lib.common.rest_client [req-0dbb4125-6783-47d7-82b8-a5a829533307 ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.059s 2020-12-14 02:26:34.658 197 DEBUG tempest.lib.common.rest_client [req-0dbb4125-6783-47d7-82b8-a5a829533307 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0dbb4125-6783-47d7-82b8-a5a829533307', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d4a7c0866b7a4d6eb7d7dca6ba513ad4", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906", "password_expires_at": null}, "audit_ids": ["nD9yXgRWThKxpNQVDVOILw"], "expires_at": "2020-12-14T03:26:34.000000Z", "issued_at": "2020-12-14T02:26:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac751800db9d41fe89f512b68b5b02d2", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:34.867 197 INFO tempest.lib.common.rest_client [req-0e5e3724-1581-4d66-8a65-20b645a38703 ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 200 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/56efee2f-3e45-4efa-8988-15ca26bfe91d 0.202s 2020-12-14 02:26:34.870 197 DEBUG tempest.lib.common.rest_client [req-0e5e3724-1581-4d66-8a65-20b645a38703 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0e5e3724-1581-4d66-8a65-20b645a38703', 'content-length': '471', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0e5e3724-1581-4d66-8a65-20b645a38703', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/56efee2f-3e45-4efa-8988-15ca26bfe91d'} Body: b'{"snapshot": {"id": "56efee2f-3e45-4efa-8988-15ca26bfe91d", "created_at": "2020-12-14T02:26:33.000000", "updated_at": "2020-12-14T02:26:34.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-1966164615", "description": null, "volume_id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "ac751800db9d41fe89f512b68b5b02d2", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:35.203 189 INFO tempest.lib.common.rest_client [req-4070dd95-7d50-44a9-b5b9-bfa922c3ba41 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.314s 2020-12-14 02:26:35.206 189 DEBUG tempest.lib.common.rest_client [req-4070dd95-7d50-44a9-b5b9-bfa922c3ba41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4070dd95-7d50-44a9-b5b9-bfa922c3ba41', 'x-compute-request-id': 'req-4070dd95-7d50-44a9-b5b9-bfa922c3ba41', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:35.960 197 INFO tempest.lib.common.rest_client [req-84eebd4a-4e06-4960-8414-2e5bd33c8024 ] Request (SnapshotsActionsV3RbacTest:test_snapshot_force_delete): 404 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/56efee2f-3e45-4efa-8988-15ca26bfe91d 0.046s 2020-12-14 02:26:35.963 197 DEBUG tempest.lib.common.rest_client [req-84eebd4a-4e06-4960-8414-2e5bd33c8024 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-84eebd4a-4e06-4960-8414-2e5bd33c8024', 'x-openstack-request-id': 'req-84eebd4a-4e06-4960-8414-2e5bd33c8024', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/56efee2f-3e45-4efa-8988-15ca26bfe91d'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 56efee2f-3e45-4efa-8988-15ca26bfe91d could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:36.129 197 INFO tempest.lib.common.rest_client [req-d1cec72f-89d1-4549-b891-d8b178b20674 ] Request (SnapshotsActionsV3RbacTest:tearDown): 202 POST http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca/action 0.158s 2020-12-14 02:26:36.133 197 DEBUG tempest.lib.common.rest_client [req-d1cec72f-89d1-4549-b891-d8b178b20674 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "available"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-d1cec72f-89d1-4549-b891-d8b178b20674', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d1cec72f-89d1-4549-b891-d8b178b20674', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:36.180 197 INFO tempest.lib.common.rest_client [req-756d2aeb-5ec1-4747-a5aa-ca9f86794976 ] Request (SnapshotsActionsV3RbacTest:tearDown): 200 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca 0.040s 2020-12-14 02:26:36.184 197 DEBUG tempest.lib.common.rest_client [req-756d2aeb-5ec1-4747-a5aa-ca9f86794976 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-756d2aeb-5ec1-4747-a5aa-ca9f86794976', 'content-length': '471', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-756d2aeb-5ec1-4747-a5aa-ca9f86794976', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca'} Body: b'{"snapshot": {"id": "fdda5670-5db2-4a68-80df-83629a892cca", "created_at": "2020-12-14T02:26:30.000000", "updated_at": "2020-12-14T02:26:36.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-681551103", "description": null, "volume_id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "ac751800db9d41fe89f512b68b5b02d2", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:36.218 197 INFO tempest.common.waiters [-] snapshot fdda5670-5db2-4a68-80df-83629a892cca reached available after waiting for 0.218283 seconds 2020-12-14 02:26:36.231 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:26:36.247 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: snapshot_extension:snapshot_actions:update_snapshot_status, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:26:36.406 197 INFO tempest.lib.common.rest_client [req-b3c4983c-71cb-4e8c-a956-82cc9dcf3b7f ] Request (SnapshotsActionsV3RbacTest:test_update_snapshot_status): 202 POST http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca/action 0.153s 2020-12-14 02:26:36.410 197 DEBUG tempest.lib.common.rest_client [req-b3c4983c-71cb-4e8c-a956-82cc9dcf3b7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "creating"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-b3c4983c-71cb-4e8c-a956-82cc9dcf3b7f', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b3c4983c-71cb-4e8c-a956-82cc9dcf3b7f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:36.466 197 INFO tempest.lib.common.rest_client [req-89f68971-247d-4a5a-8be4-6ec8f7c2af7d ] Request (SnapshotsActionsV3RbacTest:test_update_snapshot_status): 200 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca 0.049s 2020-12-14 02:26:36.468 197 DEBUG tempest.lib.common.rest_client [req-89f68971-247d-4a5a-8be4-6ec8f7c2af7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-89f68971-247d-4a5a-8be4-6ec8f7c2af7d', 'content-length': '470', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-89f68971-247d-4a5a-8be4-6ec8f7c2af7d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca'} Body: b'{"snapshot": {"id": "fdda5670-5db2-4a68-80df-83629a892cca", "created_at": "2020-12-14T02:26:30.000000", "updated_at": "2020-12-14T02:26:36.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-681551103", "description": null, "volume_id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "ac751800db9d41fe89f512b68b5b02d2", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:36.504 197 INFO tempest.common.waiters [-] snapshot fdda5670-5db2-4a68-80df-83629a892cca reached creating after waiting for 0.504272 seconds 2020-12-14 02:26:36.508 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:36.533 189 INFO tempest.lib.common.rest_client [req-27f26205-a345-4ecb-bd39-efcbcc4ece48 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.222s 2020-12-14 02:26:36.537 189 DEBUG tempest.lib.common.rest_client [req-27f26205-a345-4ecb-bd39-efcbcc4ece48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-27f26205-a345-4ecb-bd39-efcbcc4ece48', 'x-compute-request-id': 'req-27f26205-a345-4ecb-bd39-efcbcc4ece48', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:36.575 197 INFO tempest.lib.common.rest_client [req-5351ae12-adb1-453d-a761-a6d015c6a6e4 ] Request (SnapshotsActionsV3RbacTest:test_update_snapshot_status): 200 GET http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles 0.060s 2020-12-14 02:26:36.579 197 DEBUG tempest.lib.common.rest_client [req-5351ae12-adb1-453d-a761-a6d015c6a6e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5351ae12-adb1-453d-a761-a6d015c6a6e4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:36.633 197 INFO tempest.lib.common.rest_client [req-f9d959e5-5ca4-41f9-9eb9-aee2f860eeb1 ] Request (SnapshotsActionsV3RbacTest:test_update_snapshot_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:26:36.636 197 DEBUG tempest.lib.common.rest_client [req-f9d959e5-5ca4-41f9-9eb9-aee2f860eeb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9d959e5-5ca4-41f9-9eb9-aee2f860eeb1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d4a7c0866b7a4d6eb7d7dca6ba513ad4", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906", "password_expires_at": null}, "audit_ids": ["bgvoOhCgTpW6ivc-MdpkuA"], "expires_at": "2020-12-14T03:26:36.000000Z", "issued_at": "2020-12-14T02:26:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac751800db9d41fe89f512b68b5b02d2", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:36.744 197 INFO tempest.lib.common.rest_client [req-dcdf2cf0-7903-4ddc-8f0f-15513e626051 ] Request (SnapshotsActionsV3RbacTest:test_update_snapshot_status): 202 POST http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca/action 0.099s 2020-12-14 02:26:36.748 197 DEBUG tempest.lib.common.rest_client [req-dcdf2cf0-7903-4ddc-8f0f-15513e626051 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-update_snapshot_status": {"status": "creating"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-dcdf2cf0-7903-4ddc-8f0f-15513e626051', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:36.751 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:36.808 197 INFO tempest.lib.common.rest_client [req-1d2f4fc4-8e84-41ee-8970-a4972429b86d ] Request (SnapshotsActionsV3RbacTest:test_update_snapshot_status): 200 GET http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles 0.051s 2020-12-14 02:26:36.812 197 DEBUG tempest.lib.common.rest_client [req-1d2f4fc4-8e84-41ee-8970-a4972429b86d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d2f4fc4-8e84-41ee-8970-a4972429b86d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:36.864 197 INFO tempest.lib.common.rest_client [req-26f1e057-dda7-427c-b540-2f59ece7979d ] Request (SnapshotsActionsV3RbacTest:test_update_snapshot_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:26:36.868 197 DEBUG tempest.lib.common.rest_client [req-26f1e057-dda7-427c-b540-2f59ece7979d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26f1e057-dda7-427c-b540-2f59ece7979d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d4a7c0866b7a4d6eb7d7dca6ba513ad4", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906", "password_expires_at": null}, "audit_ids": ["SvuXlJ4PRuCRU6z_RZhUoA"], "expires_at": "2020-12-14T03:26:36.000000Z", "issued_at": "2020-12-14T02:26:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ac751800db9d41fe89f512b68b5b02d2", "name": "tempest-SnapshotsActionsV3RbacTest-1367479906"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ac751800db9d41fe89f512b68b5b02d2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:36.987 197 INFO tempest.lib.common.rest_client [req-17efaffe-9d8b-4fcc-9c81-7a7ea8802e80 ] Request (SnapshotsActionsV3RbacTest:test_update_snapshot_status): 200 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca 0.110s 2020-12-14 02:26:36.990 197 DEBUG tempest.lib.common.rest_client [req-17efaffe-9d8b-4fcc-9c81-7a7ea8802e80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-17efaffe-9d8b-4fcc-9c81-7a7ea8802e80', 'content-length': '470', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-17efaffe-9d8b-4fcc-9c81-7a7ea8802e80', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca'} Body: b'{"snapshot": {"id": "fdda5670-5db2-4a68-80df-83629a892cca", "created_at": "2020-12-14T02:26:30.000000", "updated_at": "2020-12-14T02:26:37.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-681551103", "description": null, "volume_id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "ac751800db9d41fe89f512b68b5b02d2", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:37.025 197 INFO tempest.common.waiters [-] snapshot fdda5670-5db2-4a68-80df-83629a892cca reached creating after waiting for 0.024702 seconds 2020-12-14 02:26:37.285 197 INFO tempest.lib.common.rest_client [req-d09e17f7-809d-445b-b41a-ec94d71b6aaf ] Request (SnapshotsActionsV3RbacTest:tearDown): 202 POST http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca/action 0.253s 2020-12-14 02:26:37.289 197 DEBUG tempest.lib.common.rest_client [req-d09e17f7-809d-445b-b41a-ec94d71b6aaf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-reset_status": {"status": "available"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-d09e17f7-809d-445b-b41a-ec94d71b6aaf', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d09e17f7-809d-445b-b41a-ec94d71b6aaf', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:37.339 197 INFO tempest.lib.common.rest_client [req-7466a50f-ba4f-424a-9429-65c7ffb0eba1 ] Request (SnapshotsActionsV3RbacTest:tearDown): 200 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca 0.044s 2020-12-14 02:26:37.341 197 DEBUG tempest.lib.common.rest_client [req-7466a50f-ba4f-424a-9429-65c7ffb0eba1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7466a50f-ba4f-424a-9429-65c7ffb0eba1', 'content-length': '471', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7466a50f-ba4f-424a-9429-65c7ffb0eba1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca'} Body: b'{"snapshot": {"id": "fdda5670-5db2-4a68-80df-83629a892cca", "created_at": "2020-12-14T02:26:30.000000", "updated_at": "2020-12-14T02:26:37.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-681551103", "description": null, "volume_id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "ac751800db9d41fe89f512b68b5b02d2", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:37.374 197 INFO tempest.common.waiters [-] snapshot fdda5670-5db2-4a68-80df-83629a892cca reached available after waiting for 0.374561 seconds 2020-12-14 02:26:37.443 197 INFO tempest.lib.common.rest_client [req-640a0155-350a-4a06-af5b-5f5d0d2432ac ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/56efee2f-3e45-4efa-8988-15ca26bfe91d 0.054s 2020-12-14 02:26:37.446 197 DEBUG tempest.lib.common.rest_client [req-640a0155-350a-4a06-af5b-5f5d0d2432ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-640a0155-350a-4a06-af5b-5f5d0d2432ac', 'x-openstack-request-id': 'req-640a0155-350a-4a06-af5b-5f5d0d2432ac', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/56efee2f-3e45-4efa-8988-15ca26bfe91d'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 56efee2f-3e45-4efa-8988-15ca26bfe91d could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:37.543 197 INFO tempest.lib.common.rest_client [req-5dc44c97-a02c-49c5-bcba-1a73d76981d5 ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca 0.091s 2020-12-14 02:26:37.546 197 DEBUG tempest.lib.common.rest_client [req-5dc44c97-a02c-49c5-bcba-1a73d76981d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5dc44c97-a02c-49c5-bcba-1a73d76981d5', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:37.602 197 INFO tempest.lib.common.rest_client [req-a692b479-1834-4942-ba6b-1cf96acc8b2d ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca 0.051s 2020-12-14 02:26:37.605 197 DEBUG tempest.lib.common.rest_client [req-a692b479-1834-4942-ba6b-1cf96acc8b2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a692b479-1834-4942-ba6b-1cf96acc8b2d', 'content-length': '470', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a692b479-1834-4942-ba6b-1cf96acc8b2d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca'} Body: b'{"snapshot": {"id": "fdda5670-5db2-4a68-80df-83629a892cca", "created_at": "2020-12-14T02:26:30.000000", "updated_at": "2020-12-14T02:26:38.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Snapshot-681551103", "description": null, "volume_id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "ac751800db9d41fe89f512b68b5b02d2", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:37.878 189 INFO tempest.lib.common.rest_client [req-a3833f41-3118-4bc2-911a-7ed5d4d79ff0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.233s 2020-12-14 02:26:37.882 189 DEBUG tempest.lib.common.rest_client [req-a3833f41-3118-4bc2-911a-7ed5d4d79ff0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a3833f41-3118-4bc2-911a-7ed5d4d79ff0', 'x-compute-request-id': 'req-a3833f41-3118-4bc2-911a-7ed5d4d79ff0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:38.690 197 INFO tempest.lib.common.rest_client [req-707918da-d190-4b3b-a59d-8be4486b9987 ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca 0.047s 2020-12-14 02:26:38.693 197 DEBUG tempest.lib.common.rest_client [req-707918da-d190-4b3b-a59d-8be4486b9987 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-707918da-d190-4b3b-a59d-8be4486b9987', 'x-openstack-request-id': 'req-707918da-d190-4b3b-a59d-8be4486b9987', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/snapshots/fdda5670-5db2-4a68-80df-83629a892cca'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot fdda5670-5db2-4a68-80df-83629a892cca could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:38.784 197 INFO tempest.lib.common.rest_client [req-eb7bc31c-0b16-49b0-ab32-511349e16dad ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34 0.083s 2020-12-14 02:26:38.786 197 DEBUG tempest.lib.common.rest_client [req-eb7bc31c-0b16-49b0-ab32-511349e16dad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-eb7bc31c-0b16-49b0-ab32-511349e16dad', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:38.878 197 INFO tempest.lib.common.rest_client [req-fa414493-ba43-4f65-8775-57798ced7aa3 ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34 0.085s 2020-12-14 02:26:38.882 197 DEBUG tempest.lib.common.rest_client [req-fa414493-ba43-4f65-8775-57798ced7aa3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-fa414493-ba43-4f65-8775-57798ced7aa3', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fa414493-ba43-4f65-8775-57798ced7aa3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34'} Body: b'{"volume": {"id": "8729ac26-9f60-4ac5-b774-bb180f0c5c34", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:26:29.000000", "updated_at": "2020-12-14T02:26:39.000000", "name": "tempest-SnapshotsActionsV3RbacTest-Volume-1600003381", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34"}], "user_id": "d4a7c0866b7a4d6eb7d7dca6ba513ad4", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "ac751800db9d41fe89f512b68b5b02d2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:39.224 189 INFO tempest.lib.common.rest_client [req-fad78bfb-22b9-492b-a0fb-5188624363b4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.236s 2020-12-14 02:26:39.227 189 DEBUG tempest.lib.common.rest_client [req-fad78bfb-22b9-492b-a0fb-5188624363b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fad78bfb-22b9-492b-a0fb-5188624363b4', 'x-compute-request-id': 'req-fad78bfb-22b9-492b-a0fb-5188624363b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:40.057 197 INFO tempest.lib.common.rest_client [req-c6057959-81a3-4e6c-9202-d592da3d52ca ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34 0.063s 2020-12-14 02:26:40.060 197 DEBUG tempest.lib.common.rest_client [req-c6057959-81a3-4e6c-9202-d592da3d52ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-c6057959-81a3-4e6c-9202-d592da3d52ca', 'x-openstack-request-id': 'req-c6057959-81a3-4e6c-9202-d592da3d52ca', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/ac751800db9d41fe89f512b68b5b02d2/volumes/8729ac26-9f60-4ac5-b774-bb180f0c5c34'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 8729ac26-9f60-4ac5-b774-bb180f0c5c34 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:40.211 197 INFO tempest.lib.common.rest_client [req-e318c94c-bf30-484f-a8cf-a8e477108280 ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4 0.144s 2020-12-14 02:26:40.215 197 DEBUG tempest.lib.common.rest_client [req-e318c94c-bf30-484f-a8cf-a8e477108280 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e318c94c-bf30-484f-a8cf-a8e477108280', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/d4a7c0866b7a4d6eb7d7dca6ba513ad4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:40.317 197 INFO tempest.lib.common.rest_client [req-ad38454f-2730-4de3-86e5-15cf5bd1fa77 ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:26:40.320 197 DEBUG tempest.lib.common.rest_client [req-ad38454f-2730-4de3-86e5-15cf5bd1fa77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad38454f-2730-4de3-86e5-15cf5bd1fa77', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["_y0FmuWHRzOGDvScq1NXPg"], "expires_at": "2020-12-14T03:26:40.000000Z", "issued_at": "2020-12-14T02:26:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:40.555 189 INFO tempest.lib.common.rest_client [req-9ecca1cc-517a-4ac1-a56f-99b252f9b931 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.221s 2020-12-14 02:26:40.559 189 DEBUG tempest.lib.common.rest_client [req-9ecca1cc-517a-4ac1-a56f-99b252f9b931 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9ecca1cc-517a-4ac1-a56f-99b252f9b931', 'x-compute-request-id': 'req-9ecca1cc-517a-4ac1-a56f-99b252f9b931', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:40.674 197 INFO tempest.lib.common.rest_client [req-7b1965f7-a175-438e-a464-0214be5cca12 ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ac751800db9d41fe89f512b68b5b02d2&name=default 0.347s 2020-12-14 02:26:40.678 197 DEBUG tempest.lib.common.rest_client [req-7b1965f7-a175-438e-a464-0214be5cca12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-7b1965f7-a175-438e-a464-0214be5cca12', 'date': 'Mon, 14 Dec 2020 02:26:40 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ac751800db9d41fe89f512b68b5b02d2&name=default'} Body: b'{"security_groups": [{"id": "2284d980-ee7d-4021-985f-c09eb0c45416", "name": "default", "stateful": true, "tenant_id": "ac751800db9d41fe89f512b68b5b02d2", "description": "Default security group", "security_group_rules": [{"id": "18989c74-57cc-4603-8901-9f16b8a4b9a4", "tenant_id": "ac751800db9d41fe89f512b68b5b02d2", "security_group_id": "2284d980-ee7d-4021-985f-c09eb0c45416", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:26:40Z", "updated_at": "2020-12-14T02:26:40Z", "revision_number": 0, "project_id": "ac751800db9d41fe89f512b68b5b02d2"}, {"id": "625812b8-0284-43cc-b077-8cc27b324471", "tenant_id": "ac751800db9d41fe89f512b68b5b02d2", "security_group_id": "2284d980-ee7d-4021-985f-c09eb0c45416", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2284d980-ee7d-4021-985f-c09eb0c45416", "description": null, "tags": [], "created_at": "2020-12-14T02:26:40Z", "updated_at": "2020-12-14T02:26:40Z", "revision_number": 0, "project_id": "ac751800db9d41fe89f512b68b5b02d2"}, {"id": "67c3b779-afbb-4dae-b11b-cee6857f2552", "tenant_id": "ac751800db9d41fe89f512b68b5b02d2", "security_group_id": "2284d980-ee7d-4021-985f-c09eb0c45416", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2284d980-ee7d-4021-985f-c09eb0c45416", "description": null, "tags": [], "created_at": "2020-12-14T02:26:40Z", "updated_at": "2020-12-14T02:26:40Z", "revision_number": 0, "project_id": "ac751800db9d41fe89f512b68b5b02d2"}, {"id": "8c663fbd-ce7e-4dda-9c38-8e573ff506bc", "tenant_id": "ac751800db9d41fe89f512b68b5b02d2", "security_group_id": "2284d980-ee7d-4021-985f-c09eb0c45416", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:26:40Z", "updated_at": "2020-12-14T02:26:40Z", "revision_number": 0, "project_id": "ac751800db9d41fe89f512b68b5b02d2"}], "tags": [], "created_at": "2020-12-14T02:26:40Z", "updated_at": "2020-12-14T02:26:40Z", "revision_number": 1, "project_id": "ac751800db9d41fe89f512b68b5b02d2"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:40.847 197 INFO tempest.lib.common.rest_client [req-fc91f06d-dfd5-4c05-9044-14a2d176db2f ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/2284d980-ee7d-4021-985f-c09eb0c45416 0.163s 2020-12-14 02:26:40.850 197 DEBUG tempest.lib.common.rest_client [req-fc91f06d-dfd5-4c05-9044-14a2d176db2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-fc91f06d-dfd5-4c05-9044-14a2d176db2f', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:26:40 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/2284d980-ee7d-4021-985f-c09eb0c45416'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:40.992 197 INFO tempest.lib.common.rest_client [req-ccc5ce5a-7e70-4baf-bd09-3fc69a3c6bd8 ] Request (SnapshotsActionsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2 0.134s 2020-12-14 02:26:40.995 197 DEBUG tempest.lib.common.rest_client [req-ccc5ce5a-7e70-4baf-bd09-3fc69a3c6bd8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ccc5ce5a-7e70-4baf-bd09-3fc69a3c6bd8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ac751800db9d41fe89f512b68b5b02d2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:41.119 197 INFO tempest.lib.common.rest_client [req-d2925a71-7467-4ca3-9de1-ea0f8086d8e2 ] Request (VolumesActionsV310RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:26:41.122 197 DEBUG tempest.lib.common.rest_client [req-d2925a71-7467-4ca3-9de1-ea0f8086d8e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2925a71-7467-4ca3-9de1-ea0f8086d8e2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["AKt9AcuFTE2xFfm1L-QRiQ"], "expires_at": "2020-12-14T03:26:41.000000Z", "issued_at": "2020-12-14T02:26:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:41.227 197 INFO tempest.lib.common.rest_client [req-6547507b-7e28-42cd-8bd9-4041979accf9 ] Request (VolumesActionsV310RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:26:41.230 197 DEBUG tempest.lib.common.rest_client [req-6547507b-7e28-42cd-8bd9-4041979accf9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6547507b-7e28-42cd-8bd9-4041979accf9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Sm3WDWG8Sy2t6GGrsJJwvQ"], "expires_at": "2020-12-14T03:26:41.000000Z", "issued_at": "2020-12-14T02:26:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:41.315 197 INFO tempest.lib.common.rest_client [req-f3c1d1f4-c842-452f-9944-1ae97dd133c4 ] Request (VolumesActionsV310RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.077s 2020-12-14 02:26:41.318 197 DEBUG tempest.lib.common.rest_client [req-f3c1d1f4-c842-452f-9944-1ae97dd133c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3c1d1f4-c842-452f-9944-1ae97dd133c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:41.417 197 INFO tempest.lib.common.rest_client [req-a5548616-501c-40cb-b892-ff5c3161919d ] Request (VolumesActionsV310RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.090s 2020-12-14 02:26:41.420 197 DEBUG tempest.lib.common.rest_client [req-a5548616-501c-40cb-b892-ff5c3161919d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesActionsV310RbacTest-772153454-desc", "domain_id": "default", "name": "tempest-VolumesActionsV310RbacTest-772153454"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5548616-501c-40cb-b892-ff5c3161919d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "173d6491c02e4cab84fceca4bdb5bc93", "name": "tempest-VolumesActionsV310RbacTest-772153454", "domain_id": "default", "description": "tempest-VolumesActionsV310RbacTest-772153454-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:41.564 197 INFO tempest.lib.common.rest_client [req-46e76cdd-25c3-455a-9df4-bfb6dd71e9bd ] Request (VolumesActionsV310RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.133s 2020-12-14 02:26:41.567 197 DEBUG tempest.lib.common.rest_client [req-46e76cdd-25c3-455a-9df4-bfb6dd71e9bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesActionsV310RbacTest-772153454", "password": "P7#+z0L3=iigX1B", "project_id": "173d6491c02e4cab84fceca4bdb5bc93", "email": "tempest-VolumesActionsV310RbacTest-2055739856@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '407', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46e76cdd-25c3-455a-9df4-bfb6dd71e9bd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "173d6491c02e4cab84fceca4bdb5bc93", "email": "tempest-VolumesActionsV310RbacTest-2055739856@example.com", "id": "475113ab95b5451b99eddc0e808cc6b1", "name": "tempest-VolumesActionsV310RbacTest-772153454", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/475113ab95b5451b99eddc0e808cc6b1"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:41.649 197 INFO tempest.lib.common.rest_client [req-969942c1-26a2-4b30-bf26-f0cf4803329a ] Request (VolumesActionsV310RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.073s 2020-12-14 02:26:41.652 197 DEBUG tempest.lib.common.rest_client [req-969942c1-26a2-4b30-bf26-f0cf4803329a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-969942c1-26a2-4b30-bf26-f0cf4803329a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:41.724 197 INFO tempest.lib.common.rest_client [req-d3abcd13-2358-48ea-a6fe-541c4daee2f8 ] Request (VolumesActionsV310RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.064s 2020-12-14 02:26:41.727 197 DEBUG tempest.lib.common.rest_client [req-d3abcd13-2358-48ea-a6fe-541c4daee2f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3abcd13-2358-48ea-a6fe-541c4daee2f8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:41.816 197 INFO tempest.lib.common.rest_client [req-f0a48367-ef28-45f1-924c-6d0ce28cb48c ] Request (VolumesActionsV310RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles/72a4576c553448cd941b052c1ca0cf2d 0.080s 2020-12-14 02:26:41.818 197 DEBUG tempest.lib.common.rest_client [req-f0a48367-ef28-45f1-924c-6d0ce28cb48c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0a48367-ef28-45f1-924c-6d0ce28cb48c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:41.822 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesActionsV310RbacTest-772153454', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '173d6491c02e4cab84fceca4bdb5bc93', 'project_name': 'tempest-VolumesActionsV310RbacTest-772153454', 'tenant_id': '173d6491c02e4cab84fceca4bdb5bc93', 'tenant_name': 'tempest-VolumesActionsV310RbacTest-772153454', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '475113ab95b5451b99eddc0e808cc6b1'}, Network: None, Subnet: None, Router: None 2020-12-14 02:26:41.824 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesActionsV310RbacTest-772153454', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '173d6491c02e4cab84fceca4bdb5bc93', 'project_name': 'tempest-VolumesActionsV310RbacTest-772153454', 'tenant_id': '173d6491c02e4cab84fceca4bdb5bc93', 'tenant_name': 'tempest-VolumesActionsV310RbacTest-772153454', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '475113ab95b5451b99eddc0e808cc6b1'}, Network: None, Subnet: None, Router: None 2020-12-14 02:26:41.902 189 INFO tempest.lib.common.rest_client [req-aab783d2-ef17-40f5-a469-c54dd0c5ddb4 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.238s 2020-12-14 02:26:41.905 189 DEBUG tempest.lib.common.rest_client [req-aab783d2-ef17-40f5-a469-c54dd0c5ddb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aab783d2-ef17-40f5-a469-c54dd0c5ddb4', 'x-compute-request-id': 'req-aab783d2-ef17-40f5-a469-c54dd0c5ddb4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:42.004 197 INFO tempest.lib.common.rest_client [req-3a0176da-008b-4a44-abb5-e446a8bacc5c ] Request (VolumesActionsV310RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-12-14 02:26:42.007 197 DEBUG tempest.lib.common.rest_client [req-3a0176da-008b-4a44-abb5-e446a8bacc5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a0176da-008b-4a44-abb5-e446a8bacc5c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "475113ab95b5451b99eddc0e808cc6b1", "name": "tempest-VolumesActionsV310RbacTest-772153454", "password_expires_at": null}, "audit_ids": ["UPngrCQeR_Skj-RNIyhXDA"], "expires_at": "2020-12-14T03:26:41.000000Z", "issued_at": "2020-12-14T02:26:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "173d6491c02e4cab84fceca4bdb5bc93", "name": "tempest-VolumesActionsV310RbacTest-772153454"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:42.110 197 INFO tempest.lib.common.rest_client [req-9e04287c-5030-4ae7-aee2-b58b4171ca41 ] Request (VolumesActionsV310RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:26:42.114 197 DEBUG tempest.lib.common.rest_client [req-9e04287c-5030-4ae7-aee2-b58b4171ca41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e04287c-5030-4ae7-aee2-b58b4171ca41', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["I-Q5YHpTTEimvMHU964u1A"], "expires_at": "2020-12-14T03:26:42.000000Z", "issued_at": "2020-12-14T02:26:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:42.235 197 INFO tempest.lib.common.rest_client [req-7a27f81e-889f-48fc-8321-b8590c630634 ] Request (VolumesActionsV310RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:26:42.239 197 DEBUG tempest.lib.common.rest_client [req-7a27f81e-889f-48fc-8321-b8590c630634 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a27f81e-889f-48fc-8321-b8590c630634', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["AJxm-FRjTIe4QcLw3bxPyA"], "expires_at": "2020-12-14T03:26:42.000000Z", "issued_at": "2020-12-14T02:26:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:42.323 197 INFO tempest.lib.common.rest_client [req-e071a21e-21aa-4797-836b-bce865ac42c0 ] Request (VolumesActionsV310RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.074s 2020-12-14 02:26:42.325 197 DEBUG tempest.lib.common.rest_client [req-e071a21e-21aa-4797-836b-bce865ac42c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e071a21e-21aa-4797-836b-bce865ac42c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:42.393 197 INFO tempest.lib.common.rest_client [req-4dddf918-90b6-4dcd-83c9-4fcbd32bc742 ] Request (VolumesActionsV310RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:26:42.396 197 DEBUG tempest.lib.common.rest_client [req-4dddf918-90b6-4dcd-83c9-4fcbd32bc742 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4dddf918-90b6-4dcd-83c9-4fcbd32bc742', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:42.399 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:26:42.401 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:42.472 197 INFO tempest.lib.common.rest_client [req-d8bc057e-b939-4ba7-96b4-743944862ec7 ] Request (VolumesActionsV310RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles 0.065s 2020-12-14 02:26:42.475 197 DEBUG tempest.lib.common.rest_client [req-d8bc057e-b939-4ba7-96b4-743944862ec7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8bc057e-b939-4ba7-96b4-743944862ec7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:42.563 197 INFO tempest.lib.common.rest_client [req-fa945d47-2570-47ba-b53a-ebb662a9876a ] Request (VolumesActionsV310RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles/72a4576c553448cd941b052c1ca0cf2d 0.080s 2020-12-14 02:26:42.565 197 DEBUG tempest.lib.common.rest_client [req-fa945d47-2570-47ba-b53a-ebb662a9876a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa945d47-2570-47ba-b53a-ebb662a9876a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:42.694 197 INFO tempest.lib.common.rest_client [req-673e1160-41ed-443b-ba42-25e63024491a ] Request (VolumesActionsV310RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles/a629c95d64b3416fb80ae90af4f69c05 0.122s 2020-12-14 02:26:42.697 197 DEBUG tempest.lib.common.rest_client [req-673e1160-41ed-443b-ba42-25e63024491a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-673e1160-41ed-443b-ba42-25e63024491a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:43.250 189 INFO tempest.lib.common.rest_client [req-9aa57220-f22d-4fcd-a4e4-34dc0cca5485 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.238s 2020-12-14 02:26:43.253 189 DEBUG tempest.lib.common.rest_client [req-9aa57220-f22d-4fcd-a4e4-34dc0cca5485 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9aa57220-f22d-4fcd-a4e4-34dc0cca5485', 'x-compute-request-id': 'req-9aa57220-f22d-4fcd-a4e4-34dc0cca5485', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:43.814 197 INFO tempest.lib.common.rest_client [req-b380a7a6-b60c-47a2-a20f-0c6c3f2634af ] Request (VolumesActionsV310RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:26:43.818 197 DEBUG tempest.lib.common.rest_client [req-b380a7a6-b60c-47a2-a20f-0c6c3f2634af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b380a7a6-b60c-47a2-a20f-0c6c3f2634af', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "475113ab95b5451b99eddc0e808cc6b1", "name": "tempest-VolumesActionsV310RbacTest-772153454", "password_expires_at": null}, "audit_ids": ["kjML8KfYQ5CrBrWG4YZ0Og"], "expires_at": "2020-12-14T03:26:43.000000Z", "issued_at": "2020-12-14T02:26:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "173d6491c02e4cab84fceca4bdb5bc93", "name": "tempest-VolumesActionsV310RbacTest-772153454"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:44.356 197 INFO tempest.lib.common.rest_client [req-4bd51ba0-6d30-4b21-b7bf-02f1dba18c9b ] Request (VolumesActionsV310RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes 0.527s 2020-12-14 02:26:44.360 197 DEBUG tempest.lib.common.rest_client [req-4bd51ba0-6d30-4b21-b7bf-02f1dba18c9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesActionsV310RbacTest-Volume-211379251"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4bd51ba0-6d30-4b21-b7bf-02f1dba18c9b', 'content-length': '846', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4bd51ba0-6d30-4b21-b7bf-02f1dba18c9b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes'} Body: b'{"volume": {"id": "b78e7da6-6faf-4b7b-bf55-ff3575e40f54", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:26:44.000000", "updated_at": null, "name": "tempest-VolumesActionsV310RbacTest-Volume-211379251", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54"}], "user_id": "475113ab95b5451b99eddc0e808cc6b1", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:44.556 197 INFO tempest.lib.common.rest_client [req-41df045c-8df5-4978-9dcf-884a60c482aa ] Request (VolumesActionsV310RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54 0.081s 2020-12-14 02:26:44.559 197 DEBUG tempest.lib.common.rest_client [req-41df045c-8df5-4978-9dcf-884a60c482aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-41df045c-8df5-4978-9dcf-884a60c482aa', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-41df045c-8df5-4978-9dcf-884a60c482aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54'} Body: b'{"volume": {"id": "b78e7da6-6faf-4b7b-bf55-ff3575e40f54", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:26:44.000000", "updated_at": "2020-12-14T02:26:44.000000", "name": "tempest-VolumesActionsV310RbacTest-Volume-211379251", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54"}], "user_id": "475113ab95b5451b99eddc0e808cc6b1", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "173d6491c02e4cab84fceca4bdb5bc93"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:44.589 189 INFO tempest.lib.common.rest_client [req-cdb26c81-6022-455c-b6fc-d63b2499f11d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.230s 2020-12-14 02:26:44.593 189 DEBUG tempest.lib.common.rest_client [req-cdb26c81-6022-455c-b6fc-d63b2499f11d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cdb26c81-6022-455c-b6fc-d63b2499f11d', 'x-compute-request-id': 'req-cdb26c81-6022-455c-b6fc-d63b2499f11d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:45.745 197 INFO tempest.lib.common.rest_client [req-4f2cce5a-760e-4244-aaec-af2f5d028aee ] Request (VolumesActionsV310RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54 0.088s 2020-12-14 02:26:45.748 197 DEBUG tempest.lib.common.rest_client [req-4f2cce5a-760e-4244-aaec-af2f5d028aee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4f2cce5a-760e-4244-aaec-af2f5d028aee', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4f2cce5a-760e-4244-aaec-af2f5d028aee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54'} Body: b'{"volume": {"id": "b78e7da6-6faf-4b7b-bf55-ff3575e40f54", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:26:44.000000", "updated_at": "2020-12-14T02:26:45.000000", "name": "tempest-VolumesActionsV310RbacTest-Volume-211379251", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54"}], "user_id": "475113ab95b5451b99eddc0e808cc6b1", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "173d6491c02e4cab84fceca4bdb5bc93"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:45.839 197 INFO tempest.common.waiters [-] volume b78e7da6-6faf-4b7b-bf55-ff3575e40f54 reached available after waiting for 1.839376 seconds 2020-12-14 02:26:45.847 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:26:45.866 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_actions:upload_image, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:26:45.868 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:45.924 189 INFO tempest.lib.common.rest_client [req-66498f1d-80ca-4f75-9e89-9dca1e4f7aa9 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.226s 2020-12-14 02:26:45.926 189 DEBUG tempest.lib.common.rest_client [req-66498f1d-80ca-4f75-9e89-9dca1e4f7aa9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-66498f1d-80ca-4f75-9e89-9dca1e4f7aa9', 'x-compute-request-id': 'req-66498f1d-80ca-4f75-9e89-9dca1e4f7aa9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:45.992 197 INFO tempest.lib.common.rest_client [req-a2e2e925-06a2-43a9-9fa7-63579248b545 ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles 0.117s 2020-12-14 02:26:45.997 197 DEBUG tempest.lib.common.rest_client [req-a2e2e925-06a2-43a9-9fa7-63579248b545 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2e2e925-06a2-43a9-9fa7-63579248b545', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:46.052 197 INFO tempest.lib.common.rest_client [req-54c71841-b069-4346-b179-7c83e03902eb ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:26:46.055 197 DEBUG tempest.lib.common.rest_client [req-54c71841-b069-4346-b179-7c83e03902eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-54c71841-b069-4346-b179-7c83e03902eb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "475113ab95b5451b99eddc0e808cc6b1", "name": "tempest-VolumesActionsV310RbacTest-772153454", "password_expires_at": null}, "audit_ids": ["nSCsAnSYSi6oqWG8wdMIIg"], "expires_at": "2020-12-14T03:26:46.000000Z", "issued_at": "2020-12-14T02:26:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "173d6491c02e4cab84fceca4bdb5bc93", "name": "tempest-VolumesActionsV310RbacTest-772153454"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:46.335 197 INFO tempest.lib.common.rest_client [req-925a686c-0a08-4471-89d1-98eb32f511a4 ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 202 POST http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54/action 0.272s 2020-12-14 02:26:46.339 197 DEBUG tempest.lib.common.rest_client [req-925a686c-0a08-4471-89d1-98eb32f511a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.10', 'X-Auth-Token': ''} Body: {"os-volume_upload_image": {"image_name": "tempest-VolumesActionsV310RbacTest-Image-2050061618", "visibility": "private", "disk_format": "raw"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-925a686c-0a08-4471-89d1-98eb32f511a4', 'content-length': '688', 'openstack-api-version': 'volume 3.10', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-925a686c-0a08-4471-89d1-98eb32f511a4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54/action'} Body: b'{"os-volume_upload_image": {"id": "b78e7da6-6faf-4b7b-bf55-ff3575e40f54", "updated_at": "2020-12-14T02:26:45.000000", "status": "uploading", "display_description": null, "size": 1, "volume_type": {"id": "8f9ae869-3a34-4ca4-bf0a-bc1352b23a27", "name": "ceph", "description": null, "is_public": true, "extra_specs": {"volume_backend_name": "ceph"}, "qos_specs_id": null, "created_at": "2020-10-07T12:09:08.000000", "updated_at": null, "deleted_at": null, "deleted": false}, "image_id": "2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "container_format": "bare", "disk_format": "raw", "image_name": "tempest-VolumesActionsV310RbacTest-Image-2050061618", "protected": false, "visibility": "private"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:46.342 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:46.425 197 INFO tempest.lib.common.rest_client [req-b1087c64-9e82-47ae-a0ad-3a8035ef7586 ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles 0.077s 2020-12-14 02:26:46.429 197 DEBUG tempest.lib.common.rest_client [req-b1087c64-9e82-47ae-a0ad-3a8035ef7586 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1087c64-9e82-47ae-a0ad-3a8035ef7586', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:46.489 197 INFO tempest.lib.common.rest_client [req-9381e601-6c88-41b1-8bd2-eec1a950c1d9 ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:26:46.494 197 DEBUG tempest.lib.common.rest_client [req-9381e601-6c88-41b1-8bd2-eec1a950c1d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9381e601-6c88-41b1-8bd2-eec1a950c1d9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "475113ab95b5451b99eddc0e808cc6b1", "name": "tempest-VolumesActionsV310RbacTest-772153454", "password_expires_at": null}, "audit_ids": ["gxBYAthyQzOjVgXJXJowbw"], "expires_at": "2020-12-14T03:26:46.000000Z", "issued_at": "2020-12-14T02:26:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "173d6491c02e4cab84fceca4bdb5bc93", "name": "tempest-VolumesActionsV310RbacTest-772153454"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:46.676 197 INFO tempest.lib.common.rest_client [req-2e887087-9124-4b85-a1a1-ddf2f5d2cd79 ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f 0.171s 2020-12-14 02:26:46.680 197 DEBUG tempest.lib.common.rest_client [req-2e887087-9124-4b85-a1a1-ddf2f5d2cd79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '659', 'content-type': 'application/json', 'x-openstack-request-id': 'req-2e887087-9124-4b85-a1a1-ddf2f5d2cd79', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-2050061618", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "created_at": "2020-12-14T02:26:46Z", "updated_at": "2020-12-14T02:26:46Z", "tags": [], "self": "/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "file": "/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:47.258 189 INFO tempest.lib.common.rest_client [req-db8a1e67-f204-4722-a72c-72a8f489e161 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.228s 2020-12-14 02:26:47.261 189 DEBUG tempest.lib.common.rest_client [req-db8a1e67-f204-4722-a72c-72a8f489e161 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-db8a1e67-f204-4722-a72c-72a8f489e161', 'x-compute-request-id': 'req-db8a1e67-f204-4722-a72c-72a8f489e161', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:47.728 197 INFO tempest.lib.common.rest_client [req-48428d1e-1ab5-42f9-a252-88951734af9d ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f 0.039s 2020-12-14 02:26:47.731 197 DEBUG tempest.lib.common.rest_client [req-48428d1e-1ab5-42f9-a252-88951734af9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '659', 'content-type': 'application/json', 'x-openstack-request-id': 'req-48428d1e-1ab5-42f9-a252-88951734af9d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-2050061618", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "created_at": "2020-12-14T02:26:46Z", "updated_at": "2020-12-14T02:26:47Z", "tags": [], "self": "/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "file": "/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:48.607 189 INFO tempest.lib.common.rest_client [req-342f4334-3dbc-4304-b0f3-dcb0f31151e7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.240s 2020-12-14 02:26:48.611 189 DEBUG tempest.lib.common.rest_client [req-342f4334-3dbc-4304-b0f3-dcb0f31151e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-342f4334-3dbc-4304-b0f3-dcb0f31151e7', 'x-compute-request-id': 'req-342f4334-3dbc-4304-b0f3-dcb0f31151e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:48.782 197 INFO tempest.lib.common.rest_client [req-8a995009-77a6-44b5-8c0f-567d0841fea6 ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f 0.040s 2020-12-14 02:26:48.786 197 DEBUG tempest.lib.common.rest_client [req-8a995009-77a6-44b5-8c0f-567d0841fea6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '659', 'content-type': 'application/json', 'x-openstack-request-id': 'req-8a995009-77a6-44b5-8c0f-567d0841fea6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-2050061618", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "created_at": "2020-12-14T02:26:46Z", "updated_at": "2020-12-14T02:26:47Z", "tags": [], "self": "/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "file": "/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:49.830 197 INFO tempest.lib.common.rest_client [req-1c0aeeaa-6019-4cb7-b5f4-1048f325c84b ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f 0.036s 2020-12-14 02:26:49.834 197 DEBUG tempest.lib.common.rest_client [req-1c0aeeaa-6019-4cb7-b5f4-1048f325c84b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '659', 'content-type': 'application/json', 'x-openstack-request-id': 'req-1c0aeeaa-6019-4cb7-b5f4-1048f325c84b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-2050061618", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "created_at": "2020-12-14T02:26:46Z", "updated_at": "2020-12-14T02:26:47Z", "tags": [], "self": "/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "file": "/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:49.967 189 INFO tempest.lib.common.rest_client [req-3f231273-e9c1-4253-b3f4-7a4a2fc187c8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.239s 2020-12-14 02:26:49.970 189 DEBUG tempest.lib.common.rest_client [req-3f231273-e9c1-4253-b3f4-7a4a2fc187c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3f231273-e9c1-4253-b3f4-7a4a2fc187c8', 'x-compute-request-id': 'req-3f231273-e9c1-4253-b3f4-7a4a2fc187c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:50.880 197 INFO tempest.lib.common.rest_client [req-ce9213ec-95c4-48b0-852f-05a9ec96806a ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f 0.036s 2020-12-14 02:26:50.884 197 DEBUG tempest.lib.common.rest_client [req-ce9213ec-95c4-48b0-852f-05a9ec96806a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '659', 'content-type': 'application/json', 'x-openstack-request-id': 'req-ce9213ec-95c4-48b0-852f-05a9ec96806a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-2050061618", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "created_at": "2020-12-14T02:26:46Z", "updated_at": "2020-12-14T02:26:47Z", "tags": [], "self": "/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "file": "/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:51.326 189 INFO tempest.lib.common.rest_client [req-de189039-524b-4f7c-9f30-866aec05cd06 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.249s 2020-12-14 02:26:51.330 189 DEBUG tempest.lib.common.rest_client [req-de189039-524b-4f7c-9f30-866aec05cd06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-de189039-524b-4f7c-9f30-866aec05cd06', 'x-compute-request-id': 'req-de189039-524b-4f7c-9f30-866aec05cd06', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:51.933 197 INFO tempest.lib.common.rest_client [req-3d752db3-1173-4c66-b70d-35d1e7651ecb ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f 0.038s 2020-12-14 02:26:51.937 197 DEBUG tempest.lib.common.rest_client [req-3d752db3-1173-4c66-b70d-35d1e7651ecb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '659', 'content-type': 'application/json', 'x-openstack-request-id': 'req-3d752db3-1173-4c66-b70d-35d1e7651ecb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-2050061618", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "created_at": "2020-12-14T02:26:46Z", "updated_at": "2020-12-14T02:26:47Z", "tags": [], "self": "/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "file": "/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:52.688 189 INFO tempest.lib.common.rest_client [req-a43fd9a1-3863-4142-b65c-3d48cf346915 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.250s 2020-12-14 02:26:52.691 189 DEBUG tempest.lib.common.rest_client [req-a43fd9a1-3863-4142-b65c-3d48cf346915 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a43fd9a1-3863-4142-b65c-3d48cf346915', 'x-compute-request-id': 'req-a43fd9a1-3863-4142-b65c-3d48cf346915', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:52.983 197 INFO tempest.lib.common.rest_client [req-ecbca510-cb21-449c-8dd4-f57452c46adc ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f 0.037s 2020-12-14 02:26:52.988 197 DEBUG tempest.lib.common.rest_client [req-ecbca510-cb21-449c-8dd4-f57452c46adc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '659', 'content-type': 'application/json', 'x-openstack-request-id': 'req-ecbca510-cb21-449c-8dd4-f57452c46adc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-2050061618", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "created_at": "2020-12-14T02:26:46Z", "updated_at": "2020-12-14T02:26:47Z", "tags": [], "self": "/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "file": "/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:54.029 189 INFO tempest.lib.common.rest_client [req-bcea5f99-8ffc-4d3a-9979-bf671b4076c3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.226s 2020-12-14 02:26:54.032 189 DEBUG tempest.lib.common.rest_client [req-bcea5f99-8ffc-4d3a-9979-bf671b4076c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bcea5f99-8ffc-4d3a-9979-bf671b4076c3', 'x-compute-request-id': 'req-bcea5f99-8ffc-4d3a-9979-bf671b4076c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:54.035 197 INFO tempest.lib.common.rest_client [req-aa44d064-e0b0-4a0d-abbe-1bcd47bd2b02 ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f 0.036s 2020-12-14 02:26:54.038 197 DEBUG tempest.lib.common.rest_client [req-aa44d064-e0b0-4a0d-abbe-1bcd47bd2b02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '831', 'content-type': 'application/json', 'x-openstack-request-id': 'req-aa44d064-e0b0-4a0d-abbe-1bcd47bd2b02', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-2050061618", "disk_format": "raw", "container_format": "bare", "visibility": "private", "size": 1073741824, "virtual_size": 1073741824, "status": "active", "checksum": "cd573cfaace07e7949bc0c46028904ff", "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": "sha512", "os_hash_value": "c5041ae163cf0f65600acfe7f6a63f212101687d41a57a4e18ffd2a07a452cd8175b8f5a4868dd2330bfe5ae123f18216bdbc9e0f80d131e64b94913a7b40bb5", "id": "2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "created_at": "2020-12-14T02:26:46Z", "updated_at": "2020-12-14T02:26:54Z", "tags": [], "self": "/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f", "file": "/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:54.128 197 INFO tempest.lib.common.rest_client [req-9aec602f-29d0-40fb-84a2-09812234e991 ] Request (VolumesActionsV310RbacTest:test_volume_upload_image): 200 GET http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54 0.083s 2020-12-14 02:26:54.131 197 DEBUG tempest.lib.common.rest_client [req-9aec602f-29d0-40fb-84a2-09812234e991 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.10', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9aec602f-29d0-40fb-84a2-09812234e991', 'content-length': '1069', 'openstack-api-version': 'volume 3.10', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9aec602f-29d0-40fb-84a2-09812234e991', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54'} Body: b'{"volume": {"id": "b78e7da6-6faf-4b7b-bf55-ff3575e40f54", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:26:44.000000", "updated_at": "2020-12-14T02:26:54.000000", "name": "tempest-VolumesActionsV310RbacTest-Volume-211379251", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54"}], "user_id": "475113ab95b5451b99eddc0e808cc6b1", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "173d6491c02e4cab84fceca4bdb5bc93"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:54.224 197 INFO tempest.common.waiters [-] volume b78e7da6-6faf-4b7b-bf55-ff3575e40f54 reached available after waiting for 0.224233 seconds 2020-12-14 02:26:54.579 197 INFO tempest.lib.common.rest_client [req-1e4bd335-8cd7-4883-a432-40627173be9c ] Request (VolumesActionsV310RbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f 0.346s 2020-12-14 02:26:54.582 197 DEBUG tempest.lib.common.rest_client [req-1e4bd335-8cd7-4883-a432-40627173be9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-1e4bd335-8cd7-4883-a432-40627173be9c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/2845e65a-b9d6-48e9-84c8-2cf7d4fde66f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:54.597 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:26:54.615 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_actions:upload_public, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:26:54.617 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:54.683 197 INFO tempest.lib.common.rest_client [req-52a4b930-4080-4ca6-86d6-454bfc1e271d ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles 0.060s 2020-12-14 02:26:54.687 197 DEBUG tempest.lib.common.rest_client [req-52a4b930-4080-4ca6-86d6-454bfc1e271d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52a4b930-4080-4ca6-86d6-454bfc1e271d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:54.735 197 INFO tempest.lib.common.rest_client [req-9fd8fc8c-fa3b-4f4a-9f0b-9994fb7a2787 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:26:54.738 197 DEBUG tempest.lib.common.rest_client [req-9fd8fc8c-fa3b-4f4a-9f0b-9994fb7a2787 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9fd8fc8c-fa3b-4f4a-9f0b-9994fb7a2787', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "475113ab95b5451b99eddc0e808cc6b1", "name": "tempest-VolumesActionsV310RbacTest-772153454", "password_expires_at": null}, "audit_ids": ["OWzgrC5URQqcpAs_Q1lgGA"], "expires_at": "2020-12-14T03:26:54.000000Z", "issued_at": "2020-12-14T02:26:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "173d6491c02e4cab84fceca4bdb5bc93", "name": "tempest-VolumesActionsV310RbacTest-772153454"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:55.016 197 INFO tempest.lib.common.rest_client [req-a18ba610-952a-480d-9211-30a88e5658c8 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 202 POST http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54/action 0.269s 2020-12-14 02:26:55.021 197 DEBUG tempest.lib.common.rest_client [req-a18ba610-952a-480d-9211-30a88e5658c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.10', 'X-Auth-Token': ''} Body: {"os-volume_upload_image": {"image_name": "tempest-VolumesActionsV310RbacTest-Image-1941987810", "visibility": "public", "disk_format": "raw"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a18ba610-952a-480d-9211-30a88e5658c8', 'content-length': '687', 'openstack-api-version': 'volume 3.10', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a18ba610-952a-480d-9211-30a88e5658c8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54/action'} Body: b'{"os-volume_upload_image": {"id": "b78e7da6-6faf-4b7b-bf55-ff3575e40f54", "updated_at": "2020-12-14T02:26:54.000000", "status": "uploading", "display_description": null, "size": 1, "volume_type": {"id": "8f9ae869-3a34-4ca4-bf0a-bc1352b23a27", "name": "ceph", "description": null, "is_public": true, "extra_specs": {"volume_backend_name": "ceph"}, "qos_specs_id": null, "created_at": "2020-10-07T12:09:08.000000", "updated_at": null, "deleted_at": null, "deleted": false}, "image_id": "5e70690c-db57-4e30-88a6-ee9798312ff8", "container_format": "bare", "disk_format": "raw", "image_name": "tempest-VolumesActionsV310RbacTest-Image-1941987810", "protected": false, "visibility": "public"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:55.024 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:26:55.093 197 INFO tempest.lib.common.rest_client [req-3cad3f0a-9615-4084-8694-e4ed13d5a840 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles 0.063s 2020-12-14 02:26:55.095 197 DEBUG tempest.lib.common.rest_client [req-3cad3f0a-9615-4084-8694-e4ed13d5a840 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3cad3f0a-9615-4084-8694-e4ed13d5a840', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93/users/475113ab95b5451b99eddc0e808cc6b1/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:55.146 197 INFO tempest.lib.common.rest_client [req-46d0fdc5-900a-4f18-94f1-4c816c0b5d2b ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:26:55.149 197 DEBUG tempest.lib.common.rest_client [req-46d0fdc5-900a-4f18-94f1-4c816c0b5d2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46d0fdc5-900a-4f18-94f1-4c816c0b5d2b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "475113ab95b5451b99eddc0e808cc6b1", "name": "tempest-VolumesActionsV310RbacTest-772153454", "password_expires_at": null}, "audit_ids": ["D26c37vbSvuu2nzbUMCotg"], "expires_at": "2020-12-14T03:26:55.000000Z", "issued_at": "2020-12-14T02:26:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "173d6491c02e4cab84fceca4bdb5bc93", "name": "tempest-VolumesActionsV310RbacTest-772153454"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_173d6491c02e4cab84fceca4bdb5bc93", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:55.250 197 INFO tempest.lib.common.rest_client [req-7a4cb305-b1ba-4657-8820-5a63a8894cbd ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8 0.094s 2020-12-14 02:26:55.254 197 DEBUG tempest.lib.common.rest_client [req-7a4cb305-b1ba-4657-8820-5a63a8894cbd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '658', 'content-type': 'application/json', 'x-openstack-request-id': 'req-7a4cb305-b1ba-4657-8820-5a63a8894cbd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1941987810", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "5e70690c-db57-4e30-88a6-ee9798312ff8", "created_at": "2020-12-14T02:26:55Z", "updated_at": "2020-12-14T02:26:55Z", "tags": [], "self": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8", "file": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:55.349 189 INFO tempest.lib.common.rest_client [req-8b4fffc9-3f28-4ee3-ad6c-f0a16de1e4b0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.208s 2020-12-14 02:26:55.352 189 DEBUG tempest.lib.common.rest_client [req-8b4fffc9-3f28-4ee3-ad6c-f0a16de1e4b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8b4fffc9-3f28-4ee3-ad6c-f0a16de1e4b0', 'x-compute-request-id': 'req-8b4fffc9-3f28-4ee3-ad6c-f0a16de1e4b0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:56.304 197 INFO tempest.lib.common.rest_client [req-149893bd-5d14-41dd-ba5c-d3978bfa02c9 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8 0.040s 2020-12-14 02:26:56.307 197 DEBUG tempest.lib.common.rest_client [req-149893bd-5d14-41dd-ba5c-d3978bfa02c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '658', 'content-type': 'application/json', 'x-openstack-request-id': 'req-149893bd-5d14-41dd-ba5c-d3978bfa02c9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1941987810", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "5e70690c-db57-4e30-88a6-ee9798312ff8", "created_at": "2020-12-14T02:26:55Z", "updated_at": "2020-12-14T02:26:56Z", "tags": [], "self": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8", "file": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:56.689 189 INFO tempest.lib.common.rest_client [req-68f4afe0-9101-4121-85fe-93a5db368779 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.221s 2020-12-14 02:26:56.693 189 DEBUG tempest.lib.common.rest_client [req-68f4afe0-9101-4121-85fe-93a5db368779 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-68f4afe0-9101-4121-85fe-93a5db368779', 'x-compute-request-id': 'req-68f4afe0-9101-4121-85fe-93a5db368779', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:57.359 197 INFO tempest.lib.common.rest_client [req-7db56c08-e918-4db1-b2b2-f25d1d57ea0a ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8 0.041s 2020-12-14 02:26:57.363 197 DEBUG tempest.lib.common.rest_client [req-7db56c08-e918-4db1-b2b2-f25d1d57ea0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '658', 'content-type': 'application/json', 'x-openstack-request-id': 'req-7db56c08-e918-4db1-b2b2-f25d1d57ea0a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1941987810", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "5e70690c-db57-4e30-88a6-ee9798312ff8", "created_at": "2020-12-14T02:26:55Z", "updated_at": "2020-12-14T02:26:56Z", "tags": [], "self": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8", "file": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:58.077 189 INFO tempest.lib.common.rest_client [req-4b68f442-2a2a-4a44-bd9a-6adb77c8f49e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.272s 2020-12-14 02:26:58.081 189 DEBUG tempest.lib.common.rest_client [req-4b68f442-2a2a-4a44-bd9a-6adb77c8f49e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4b68f442-2a2a-4a44-bd9a-6adb77c8f49e', 'x-compute-request-id': 'req-4b68f442-2a2a-4a44-bd9a-6adb77c8f49e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:58.405 197 INFO tempest.lib.common.rest_client [req-f9864fbb-53aa-4232-86d1-b6f24afd1c84 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8 0.033s 2020-12-14 02:26:58.408 197 DEBUG tempest.lib.common.rest_client [req-f9864fbb-53aa-4232-86d1-b6f24afd1c84 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '658', 'content-type': 'application/json', 'x-openstack-request-id': 'req-f9864fbb-53aa-4232-86d1-b6f24afd1c84', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1941987810", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "5e70690c-db57-4e30-88a6-ee9798312ff8", "created_at": "2020-12-14T02:26:55Z", "updated_at": "2020-12-14T02:26:56Z", "tags": [], "self": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8", "file": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:59.420 189 INFO tempest.lib.common.rest_client [req-a424503c-c0e9-4b4b-acae-e559615d131a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.227s 2020-12-14 02:26:59.424 189 DEBUG tempest.lib.common.rest_client [req-a424503c-c0e9-4b4b-acae-e559615d131a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a424503c-c0e9-4b4b-acae-e559615d131a', 'x-compute-request-id': 'req-a424503c-c0e9-4b4b-acae-e559615d131a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:26:59.450 197 INFO tempest.lib.common.rest_client [req-810ae6c1-0fbc-4e41-939e-97f48e72a22c ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8 0.034s 2020-12-14 02:26:59.453 197 DEBUG tempest.lib.common.rest_client [req-810ae6c1-0fbc-4e41-939e-97f48e72a22c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:26:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '658', 'content-type': 'application/json', 'x-openstack-request-id': 'req-810ae6c1-0fbc-4e41-939e-97f48e72a22c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1941987810", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "5e70690c-db57-4e30-88a6-ee9798312ff8", "created_at": "2020-12-14T02:26:55Z", "updated_at": "2020-12-14T02:26:56Z", "tags": [], "self": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8", "file": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:00.494 197 INFO tempest.lib.common.rest_client [req-e2575f1d-ff37-45ba-b7d0-71d52444daec ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8 0.032s 2020-12-14 02:27:00.497 197 DEBUG tempest.lib.common.rest_client [req-e2575f1d-ff37-45ba-b7d0-71d52444daec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '658', 'content-type': 'application/json', 'x-openstack-request-id': 'req-e2575f1d-ff37-45ba-b7d0-71d52444daec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1941987810", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "5e70690c-db57-4e30-88a6-ee9798312ff8", "created_at": "2020-12-14T02:26:55Z", "updated_at": "2020-12-14T02:26:56Z", "tags": [], "self": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8", "file": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:00.784 189 INFO tempest.lib.common.rest_client [req-9f9e17e0-9480-47cd-8104-d7cac74ae496 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.253s 2020-12-14 02:27:00.787 189 DEBUG tempest.lib.common.rest_client [req-9f9e17e0-9480-47cd-8104-d7cac74ae496 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9f9e17e0-9480-47cd-8104-d7cac74ae496', 'x-compute-request-id': 'req-9f9e17e0-9480-47cd-8104-d7cac74ae496', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:01.545 197 INFO tempest.lib.common.rest_client [req-1ace2512-a9b8-472c-b825-64e984a20c66 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8 0.038s 2020-12-14 02:27:01.548 197 DEBUG tempest.lib.common.rest_client [req-1ace2512-a9b8-472c-b825-64e984a20c66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '658', 'content-type': 'application/json', 'x-openstack-request-id': 'req-1ace2512-a9b8-472c-b825-64e984a20c66', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1941987810", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "5e70690c-db57-4e30-88a6-ee9798312ff8", "created_at": "2020-12-14T02:26:55Z", "updated_at": "2020-12-14T02:26:56Z", "tags": [], "self": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8", "file": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:02.108 189 INFO tempest.lib.common.rest_client [req-6b90d2aa-86a4-4397-9504-234f512b39c7 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.217s 2020-12-14 02:27:02.112 189 DEBUG tempest.lib.common.rest_client [req-6b90d2aa-86a4-4397-9504-234f512b39c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6b90d2aa-86a4-4397-9504-234f512b39c7', 'x-compute-request-id': 'req-6b90d2aa-86a4-4397-9504-234f512b39c7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:02.595 197 INFO tempest.lib.common.rest_client [req-6d912157-23ce-47f8-ad9d-3b963c27958a ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8 0.036s 2020-12-14 02:27:02.598 197 DEBUG tempest.lib.common.rest_client [req-6d912157-23ce-47f8-ad9d-3b963c27958a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '658', 'content-type': 'application/json', 'x-openstack-request-id': 'req-6d912157-23ce-47f8-ad9d-3b963c27958a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1941987810", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "saving", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "5e70690c-db57-4e30-88a6-ee9798312ff8", "created_at": "2020-12-14T02:26:55Z", "updated_at": "2020-12-14T02:26:56Z", "tags": [], "self": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8", "file": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:03.426 189 INFO tempest.lib.common.rest_client [req-c5cd8527-643c-4490-97d5-4bb82fada8a8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.232s 2020-12-14 02:27:03.430 189 DEBUG tempest.lib.common.rest_client [req-c5cd8527-643c-4490-97d5-4bb82fada8a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c5cd8527-643c-4490-97d5-4bb82fada8a8', 'x-compute-request-id': 'req-c5cd8527-643c-4490-97d5-4bb82fada8a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:03.645 197 INFO tempest.lib.common.rest_client [req-a3f74662-441c-444c-9108-0447fbfabf74 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8 0.037s 2020-12-14 02:27:03.648 197 DEBUG tempest.lib.common.rest_client [req-a3f74662-441c-444c-9108-0447fbfabf74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '830', 'content-type': 'application/json', 'x-openstack-request-id': 'req-a3f74662-441c-444c-9108-0447fbfabf74', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8'} Body: b'{"name": "tempest-VolumesActionsV310RbacTest-Image-1941987810", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": 1073741824, "virtual_size": 1073741824, "status": "active", "checksum": "cd573cfaace07e7949bc0c46028904ff", "protected": false, "min_ram": 0, "min_disk": 0, "owner": "173d6491c02e4cab84fceca4bdb5bc93", "os_hidden": false, "os_hash_algo": "sha512", "os_hash_value": "c5041ae163cf0f65600acfe7f6a63f212101687d41a57a4e18ffd2a07a452cd8175b8f5a4868dd2330bfe5ae123f18216bdbc9e0f80d131e64b94913a7b40bb5", "id": "5e70690c-db57-4e30-88a6-ee9798312ff8", "created_at": "2020-12-14T02:26:55Z", "updated_at": "2020-12-14T02:27:03Z", "tags": [], "self": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8", "file": "/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:03.725 197 INFO tempest.lib.common.rest_client [req-3e89b112-afa8-4385-8173-08b746e02a30 ] Request (VolumesActionsV310RbacTest:test_volume_upload_public): 200 GET http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54 0.069s 2020-12-14 02:27:03.728 197 DEBUG tempest.lib.common.rest_client [req-3e89b112-afa8-4385-8173-08b746e02a30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.10', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3e89b112-afa8-4385-8173-08b746e02a30', 'content-length': '1069', 'openstack-api-version': 'volume 3.10', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3e89b112-afa8-4385-8173-08b746e02a30', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54'} Body: b'{"volume": {"id": "b78e7da6-6faf-4b7b-bf55-ff3575e40f54", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:26:44.000000", "updated_at": "2020-12-14T02:27:04.000000", "name": "tempest-VolumesActionsV310RbacTest-Volume-211379251", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54"}], "user_id": "475113ab95b5451b99eddc0e808cc6b1", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "173d6491c02e4cab84fceca4bdb5bc93"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:03.826 197 INFO tempest.common.waiters [-] volume b78e7da6-6faf-4b7b-bf55-ff3575e40f54 reached available after waiting for 0.825970 seconds 2020-12-14 02:27:04.339 197 INFO tempest.lib.common.rest_client [req-45d0eec6-3472-4624-a307-05eba24778fd ] Request (VolumesActionsV310RbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8 0.506s 2020-12-14 02:27:04.342 197 DEBUG tempest.lib.common.rest_client [req-45d0eec6-3472-4624-a307-05eba24778fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-45d0eec6-3472-4624-a307-05eba24778fd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/5e70690c-db57-4e30-88a6-ee9798312ff8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:04.459 197 INFO tempest.lib.common.rest_client [req-7416639d-a7aa-46b4-bb78-cdb157089efc ] Request (VolumesActionsV310RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54 0.096s 2020-12-14 02:27:04.461 197 DEBUG tempest.lib.common.rest_client [req-7416639d-a7aa-46b4-bb78-cdb157089efc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7416639d-a7aa-46b4-bb78-cdb157089efc', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:04.549 197 INFO tempest.lib.common.rest_client [req-f6b9f357-c245-4dfb-a263-6f9d8173ea5e ] Request (VolumesActionsV310RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54 0.082s 2020-12-14 02:27:04.552 197 DEBUG tempest.lib.common.rest_client [req-f6b9f357-c245-4dfb-a263-6f9d8173ea5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f6b9f357-c245-4dfb-a263-6f9d8173ea5e', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f6b9f357-c245-4dfb-a263-6f9d8173ea5e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54'} Body: b'{"volume": {"id": "b78e7da6-6faf-4b7b-bf55-ff3575e40f54", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:26:44.000000", "updated_at": "2020-12-14T02:27:04.000000", "name": "tempest-VolumesActionsV310RbacTest-Volume-211379251", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54"}], "user_id": "475113ab95b5451b99eddc0e808cc6b1", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "173d6491c02e4cab84fceca4bdb5bc93"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:04.782 189 INFO tempest.lib.common.rest_client [req-8febb7eb-8c9e-4212-8479-55719f40cc00 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.244s 2020-12-14 02:27:04.786 189 DEBUG tempest.lib.common.rest_client [req-8febb7eb-8c9e-4212-8479-55719f40cc00 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8febb7eb-8c9e-4212-8479-55719f40cc00', 'x-compute-request-id': 'req-8febb7eb-8c9e-4212-8479-55719f40cc00', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:05.716 197 INFO tempest.lib.common.rest_client [req-47ff3094-2240-4fcf-a6c9-e8afe845599d ] Request (VolumesActionsV310RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54 0.063s 2020-12-14 02:27:05.719 197 DEBUG tempest.lib.common.rest_client [req-47ff3094-2240-4fcf-a6c9-e8afe845599d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-47ff3094-2240-4fcf-a6c9-e8afe845599d', 'x-openstack-request-id': 'req-47ff3094-2240-4fcf-a6c9-e8afe845599d', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/173d6491c02e4cab84fceca4bdb5bc93/volumes/b78e7da6-6faf-4b7b-bf55-ff3575e40f54'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume b78e7da6-6faf-4b7b-bf55-ff3575e40f54 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:05.877 197 INFO tempest.lib.common.rest_client [req-c61a66e7-c972-4dcd-863a-40d1ae2e7385 ] Request (VolumesActionsV310RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/475113ab95b5451b99eddc0e808cc6b1 0.150s 2020-12-14 02:27:05.880 197 DEBUG tempest.lib.common.rest_client [req-c61a66e7-c972-4dcd-863a-40d1ae2e7385 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c61a66e7-c972-4dcd-863a-40d1ae2e7385', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/475113ab95b5451b99eddc0e808cc6b1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:05.983 197 INFO tempest.lib.common.rest_client [req-80c4a113-9c16-483b-8473-1de8693178c1 ] Request (VolumesActionsV310RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:27:05.986 197 DEBUG tempest.lib.common.rest_client [req-80c4a113-9c16-483b-8473-1de8693178c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-80c4a113-9c16-483b-8473-1de8693178c1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["wsige-ghRkCy35LpVu79dg"], "expires_at": "2020-12-14T03:27:05.000000Z", "issued_at": "2020-12-14T02:27:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:06.125 189 INFO tempest.lib.common.rest_client [req-a9c25623-e66c-438d-ac46-30ebe6bd7bec ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.227s 2020-12-14 02:27:06.128 189 DEBUG tempest.lib.common.rest_client [req-a9c25623-e66c-438d-ac46-30ebe6bd7bec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a9c25623-e66c-438d-ac46-30ebe6bd7bec', 'x-compute-request-id': 'req-a9c25623-e66c-438d-ac46-30ebe6bd7bec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:06.345 197 INFO tempest.lib.common.rest_client [req-3b37cc66-8416-471b-b741-e0978975783e ] Request (VolumesActionsV310RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=173d6491c02e4cab84fceca4bdb5bc93&name=default 0.348s 2020-12-14 02:27:06.348 197 DEBUG tempest.lib.common.rest_client [req-3b37cc66-8416-471b-b741-e0978975783e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-3b37cc66-8416-471b-b741-e0978975783e', 'date': 'Mon, 14 Dec 2020 02:27:06 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=173d6491c02e4cab84fceca4bdb5bc93&name=default'} Body: b'{"security_groups": [{"id": "a2061b0d-63be-421b-bff4-f3d5b5e47785", "name": "default", "stateful": true, "tenant_id": "173d6491c02e4cab84fceca4bdb5bc93", "description": "Default security group", "security_group_rules": [{"id": "2135e635-8b37-4d33-bfa1-c184ad7f356c", "tenant_id": "173d6491c02e4cab84fceca4bdb5bc93", "security_group_id": "a2061b0d-63be-421b-bff4-f3d5b5e47785", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a2061b0d-63be-421b-bff4-f3d5b5e47785", "description": null, "tags": [], "created_at": "2020-12-14T02:27:06Z", "updated_at": "2020-12-14T02:27:06Z", "revision_number": 0, "project_id": "173d6491c02e4cab84fceca4bdb5bc93"}, {"id": "216506b9-6eab-429b-8d2c-cd9ad18aaa51", "tenant_id": "173d6491c02e4cab84fceca4bdb5bc93", "security_group_id": "a2061b0d-63be-421b-bff4-f3d5b5e47785", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:27:06Z", "updated_at": "2020-12-14T02:27:06Z", "revision_number": 0, "project_id": "173d6491c02e4cab84fceca4bdb5bc93"}, {"id": "8ba2a443-67e8-4fb5-b21c-e82b5fcf51eb", "tenant_id": "173d6491c02e4cab84fceca4bdb5bc93", "security_group_id": "a2061b0d-63be-421b-bff4-f3d5b5e47785", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:27:06Z", "updated_at": "2020-12-14T02:27:06Z", "revision_number": 0, "project_id": "173d6491c02e4cab84fceca4bdb5bc93"}, {"id": "b2006950-a2d5-4bf0-814f-eff2c4eb8fbb", "tenant_id": "173d6491c02e4cab84fceca4bdb5bc93", "security_group_id": "a2061b0d-63be-421b-bff4-f3d5b5e47785", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a2061b0d-63be-421b-bff4-f3d5b5e47785", "description": null, "tags": [], "created_at": "2020-12-14T02:27:06Z", "updated_at": "2020-12-14T02:27:06Z", "revision_number": 0, "project_id": "173d6491c02e4cab84fceca4bdb5bc93"}], "tags": [], "created_at": "2020-12-14T02:27:06Z", "updated_at": "2020-12-14T02:27:06Z", "revision_number": 1, "project_id": "173d6491c02e4cab84fceca4bdb5bc93"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:06.559 197 INFO tempest.lib.common.rest_client [req-22021545-f2b0-4678-8f6f-34688fcf2b07 ] Request (VolumesActionsV310RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/a2061b0d-63be-421b-bff4-f3d5b5e47785 0.204s 2020-12-14 02:27:06.561 197 DEBUG tempest.lib.common.rest_client [req-22021545-f2b0-4678-8f6f-34688fcf2b07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-22021545-f2b0-4678-8f6f-34688fcf2b07', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:27:06 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/a2061b0d-63be-421b-bff4-f3d5b5e47785'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:06.705 197 INFO tempest.lib.common.rest_client [req-19ea801a-4a70-4f87-8a8b-c05d35e5b7de ] Request (VolumesActionsV310RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93 0.136s 2020-12-14 02:27:06.708 197 DEBUG tempest.lib.common.rest_client [req-19ea801a-4a70-4f87-8a8b-c05d35e5b7de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19ea801a-4a70-4f87-8a8b-c05d35e5b7de', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/173d6491c02e4cab84fceca4bdb5bc93'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:06.831 197 INFO tempest.lib.common.rest_client [req-a42076c4-5a03-410c-b978-98d8ad5157af ] Request (VolumeTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:27:06.834 197 DEBUG tempest.lib.common.rest_client [req-a42076c4-5a03-410c-b978-98d8ad5157af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a42076c4-5a03-410c-b978-98d8ad5157af', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ymUMBatVRcOogNo2x9qarg"], "expires_at": "2020-12-14T03:27:06.000000Z", "issued_at": "2020-12-14T02:27:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:06.931 197 INFO tempest.lib.common.rest_client [req-efdd72d3-40f1-4759-93d5-43051aa5e839 ] Request (VolumeTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:27:06.934 197 DEBUG tempest.lib.common.rest_client [req-efdd72d3-40f1-4759-93d5-43051aa5e839 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-efdd72d3-40f1-4759-93d5-43051aa5e839', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["AOcHuXUDQ6uDd35iv1OhoA"], "expires_at": "2020-12-14T03:27:06.000000Z", "issued_at": "2020-12-14T02:27:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:07.005 197 INFO tempest.lib.common.rest_client [req-6e1c22d5-feee-4026-b7df-91564aa2dd45 ] Request (VolumeTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.063s 2020-12-14 02:27:07.008 197 DEBUG tempest.lib.common.rest_client [req-6e1c22d5-feee-4026-b7df-91564aa2dd45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e1c22d5-feee-4026-b7df-91564aa2dd45', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:07.088 197 INFO tempest.lib.common.rest_client [req-4b5cb9d2-3219-4dfe-ae67-ca9bbb7b56c9 ] Request (VolumeTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.073s 2020-12-14 02:27:07.091 197 DEBUG tempest.lib.common.rest_client [req-4b5cb9d2-3219-4dfe-ae67-ca9bbb7b56c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeTypesRbacTest-2112016216-desc", "domain_id": "default", "name": "tempest-VolumeTypesRbacTest-2112016216"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b5cb9d2-3219-4dfe-ae67-ca9bbb7b56c9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "3171e9710c6048e78038598441e7671f", "name": "tempest-VolumeTypesRbacTest-2112016216", "domain_id": "default", "description": "tempest-VolumeTypesRbacTest-2112016216-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:07.241 197 INFO tempest.lib.common.rest_client [req-699d8c46-510a-4052-b4e8-ac8da05ebfe7 ] Request (VolumeTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.141s 2020-12-14 02:27:07.244 197 DEBUG tempest.lib.common.rest_client [req-699d8c46-510a-4052-b4e8-ac8da05ebfe7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeTypesRbacTest-2112016216", "password": "K5!x~k=5WYbLtPa", "project_id": "3171e9710c6048e78038598441e7671f", "email": "tempest-VolumeTypesRbacTest-1797186622@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '394', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-699d8c46-510a-4052-b4e8-ac8da05ebfe7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "3171e9710c6048e78038598441e7671f", "email": "tempest-VolumeTypesRbacTest-1797186622@example.com", "id": "76bf481d71184028b16d5e23a23e60e2", "name": "tempest-VolumeTypesRbacTest-2112016216", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/76bf481d71184028b16d5e23a23e60e2"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:07.314 197 INFO tempest.lib.common.rest_client [req-2938d96e-262d-459b-b6b0-0c76730bb42c ] Request (VolumeTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:27:07.317 197 DEBUG tempest.lib.common.rest_client [req-2938d96e-262d-459b-b6b0-0c76730bb42c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2938d96e-262d-459b-b6b0-0c76730bb42c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:07.384 197 INFO tempest.lib.common.rest_client [req-8e020732-349a-45eb-9e90-f3871583bdf0 ] Request (VolumeTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-12-14 02:27:07.387 197 DEBUG tempest.lib.common.rest_client [req-8e020732-349a-45eb-9e90-f3871583bdf0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e020732-349a-45eb-9e90-f3871583bdf0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:07.485 197 INFO tempest.lib.common.rest_client [req-66d440d8-38b0-4ab1-8d7d-6ef57bc68df4 ] Request (VolumeTypesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles/72a4576c553448cd941b052c1ca0cf2d 0.090s 2020-12-14 02:27:07.489 197 DEBUG tempest.lib.common.rest_client [req-66d440d8-38b0-4ab1-8d7d-6ef57bc68df4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66d440d8-38b0-4ab1-8d7d-6ef57bc68df4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:07.492 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeTypesRbacTest-2112016216', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3171e9710c6048e78038598441e7671f', 'project_name': 'tempest-VolumeTypesRbacTest-2112016216', 'tenant_id': '3171e9710c6048e78038598441e7671f', 'tenant_name': 'tempest-VolumeTypesRbacTest-2112016216', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '76bf481d71184028b16d5e23a23e60e2'}, Network: None, Subnet: None, Router: None 2020-12-14 02:27:07.494 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeTypesRbacTest-2112016216', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3171e9710c6048e78038598441e7671f', 'project_name': 'tempest-VolumeTypesRbacTest-2112016216', 'tenant_id': '3171e9710c6048e78038598441e7671f', 'tenant_name': 'tempest-VolumeTypesRbacTest-2112016216', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '76bf481d71184028b16d5e23a23e60e2'}, Network: None, Subnet: None, Router: None 2020-12-14 02:27:07.676 197 INFO tempest.lib.common.rest_client [req-4e9c2cbe-70ee-4717-9e28-1ca8cf5d0252 ] Request (VolumeTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-12-14 02:27:07.680 197 DEBUG tempest.lib.common.rest_client [req-4e9c2cbe-70ee-4717-9e28-1ca8cf5d0252 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e9c2cbe-70ee-4717-9e28-1ca8cf5d0252', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "76bf481d71184028b16d5e23a23e60e2", "name": "tempest-VolumeTypesRbacTest-2112016216", "password_expires_at": null}, "audit_ids": ["vBzrl-bQTZmabNDTayE-ig"], "expires_at": "2020-12-14T03:27:07.000000Z", "issued_at": "2020-12-14T02:27:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3171e9710c6048e78038598441e7671f", "name": "tempest-VolumeTypesRbacTest-2112016216"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:07.774 197 INFO tempest.lib.common.rest_client [req-fad3188b-8691-4f74-99a5-9e09c1fad239 ] Request (VolumeTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-12-14 02:27:07.777 197 DEBUG tempest.lib.common.rest_client [req-fad3188b-8691-4f74-99a5-9e09c1fad239 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fad3188b-8691-4f74-99a5-9e09c1fad239', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["dF43ZRdlRlCtJL9GgmIZaA"], "expires_at": "2020-12-14T03:27:07.000000Z", "issued_at": "2020-12-14T02:27:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:07.898 197 INFO tempest.lib.common.rest_client [req-9dac009c-39d8-4254-aa33-8c72f0b93e57 ] Request (VolumeTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.055s 2020-12-14 02:27:07.902 197 DEBUG tempest.lib.common.rest_client [req-9dac009c-39d8-4254-aa33-8c72f0b93e57 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9dac009c-39d8-4254-aa33-8c72f0b93e57', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["d00INY2iR7Wf9UMgt75Lvw"], "expires_at": "2020-12-14T03:27:07.000000Z", "issued_at": "2020-12-14T02:27:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:07.972 197 INFO tempest.lib.common.rest_client [req-732c98f5-6a33-48cb-9ea0-608f8c47ec66 ] Request (VolumeTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.063s 2020-12-14 02:27:07.976 197 DEBUG tempest.lib.common.rest_client [req-732c98f5-6a33-48cb-9ea0-608f8c47ec66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-732c98f5-6a33-48cb-9ea0-608f8c47ec66', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:08.048 197 INFO tempest.lib.common.rest_client [req-908af9dd-9e00-49b9-96cb-5cd6cbd104f3 ] Request (VolumeTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.065s 2020-12-14 02:27:08.051 197 DEBUG tempest.lib.common.rest_client [req-908af9dd-9e00-49b9-96cb-5cd6cbd104f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-908af9dd-9e00-49b9-96cb-5cd6cbd104f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:08.053 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:27:08.056 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:27:08.127 197 INFO tempest.lib.common.rest_client [req-8084ece7-875f-47bd-9c67-82c489fdb8ae ] Request (VolumeTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles 0.065s 2020-12-14 02:27:08.130 197 DEBUG tempest.lib.common.rest_client [req-8084ece7-875f-47bd-9c67-82c489fdb8ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8084ece7-875f-47bd-9c67-82c489fdb8ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:08.227 197 INFO tempest.lib.common.rest_client [req-b1b876f0-a977-416f-a6b5-b0e6227adec0 ] Request (VolumeTypesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles/72a4576c553448cd941b052c1ca0cf2d 0.090s 2020-12-14 02:27:08.229 197 DEBUG tempest.lib.common.rest_client [req-b1b876f0-a977-416f-a6b5-b0e6227adec0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1b876f0-a977-416f-a6b5-b0e6227adec0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:08.360 197 INFO tempest.lib.common.rest_client [req-770a4c45-7715-41b7-b805-ab416ddd3426 ] Request (VolumeTypesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles/a629c95d64b3416fb80ae90af4f69c05 0.124s 2020-12-14 02:27:08.364 197 DEBUG tempest.lib.common.rest_client [req-770a4c45-7715-41b7-b805-ab416ddd3426 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-770a4c45-7715-41b7-b805-ab416ddd3426', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:09.474 197 INFO tempest.lib.common.rest_client [req-3735b2a1-06e0-422b-97ea-a6e3b46bc029 ] Request (VolumeTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:27:09.482 197 DEBUG tempest.lib.common.rest_client [req-3735b2a1-06e0-422b-97ea-a6e3b46bc029 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3735b2a1-06e0-422b-97ea-a6e3b46bc029', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "76bf481d71184028b16d5e23a23e60e2", "name": "tempest-VolumeTypesRbacTest-2112016216", "password_expires_at": null}, "audit_ids": ["WpoMrWLHShirf5S3IOG-qg"], "expires_at": "2020-12-14T03:27:09.000000Z", "issued_at": "2020-12-14T02:27:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3171e9710c6048e78038598441e7671f", "name": "tempest-VolumeTypesRbacTest-2112016216"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:09.500 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:27:09.519 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:types_manage, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:27:09.521 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:27:09.638 197 INFO tempest.lib.common.rest_client [req-467659b0-15c6-44f5-87f8-9ac72f4e5a40 ] Request (VolumeTypesRbacTest:test_create_volume_type): 200 GET http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles 0.111s 2020-12-14 02:27:09.640 197 DEBUG tempest.lib.common.rest_client [req-467659b0-15c6-44f5-87f8-9ac72f4e5a40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-467659b0-15c6-44f5-87f8-9ac72f4e5a40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:09.697 197 INFO tempest.lib.common.rest_client [req-6b9a0259-1118-464e-8ace-b4057acd0b21 ] Request (VolumeTypesRbacTest:test_create_volume_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:27:09.701 197 DEBUG tempest.lib.common.rest_client [req-6b9a0259-1118-464e-8ace-b4057acd0b21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b9a0259-1118-464e-8ace-b4057acd0b21', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "76bf481d71184028b16d5e23a23e60e2", "name": "tempest-VolumeTypesRbacTest-2112016216", "password_expires_at": null}, "audit_ids": ["F8s-7zUtT0KH8F7NGaG75A"], "expires_at": "2020-12-14T03:27:09.000000Z", "issued_at": "2020-12-14T02:27:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3171e9710c6048e78038598441e7671f", "name": "tempest-VolumeTypesRbacTest-2112016216"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:09.917 197 INFO tempest.lib.common.rest_client [req-adff454f-6daf-43d5-839b-482313d4cec9 ] Request (VolumeTypesRbacTest:test_create_volume_type): 200 POST http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types 0.204s 2020-12-14 02:27:09.921 197 DEBUG tempest.lib.common.rest_client [req-adff454f-6daf-43d5-839b-482313d4cec9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeTypesRbacTest-volume-type-1266682637"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-adff454f-6daf-43d5-839b-482313d4cec9', 'content-length': '225', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-adff454f-6daf-43d5-839b-482313d4cec9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types'} Body: b'{"volume_type": {"id": "13fce47f-9017-4564-9c1c-ea2f4fa16ffc", "name": "tempest-VolumeTypesRbacTest-volume-type-1266682637", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:09.948 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:27:10.021 197 INFO tempest.lib.common.rest_client [req-a5ef434d-6213-4645-a8be-b8aaab00f9d9 ] Request (VolumeTypesRbacTest:test_create_volume_type): 200 GET http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles 0.067s 2020-12-14 02:27:10.023 197 DEBUG tempest.lib.common.rest_client [req-a5ef434d-6213-4645-a8be-b8aaab00f9d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5ef434d-6213-4645-a8be-b8aaab00f9d9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:10.079 197 INFO tempest.lib.common.rest_client [req-84fe31c1-9d47-48e9-bfc3-398f39c6f6f9 ] Request (VolumeTypesRbacTest:test_create_volume_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:27:10.084 197 DEBUG tempest.lib.common.rest_client [req-84fe31c1-9d47-48e9-bfc3-398f39c6f6f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84fe31c1-9d47-48e9-bfc3-398f39c6f6f9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "76bf481d71184028b16d5e23a23e60e2", "name": "tempest-VolumeTypesRbacTest-2112016216", "password_expires_at": null}, "audit_ids": ["8yWS_gWDSEOLDk4-9wVs3Q"], "expires_at": "2020-12-14T03:27:10.000000Z", "issued_at": "2020-12-14T02:27:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3171e9710c6048e78038598441e7671f", "name": "tempest-VolumeTypesRbacTest-2112016216"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:10.100 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:27:10.119 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:types_manage, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:27:10.248 197 INFO tempest.lib.common.rest_client [req-3dcdeb64-89cd-4adc-b11c-0da3fcbdcc98 ] Request (VolumeTypesRbacTest:test_delete_volume_type): 200 POST http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types 0.122s 2020-12-14 02:27:10.252 197 DEBUG tempest.lib.common.rest_client [req-3dcdeb64-89cd-4adc-b11c-0da3fcbdcc98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeTypesRbacTest-volume-type-1900396682"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3dcdeb64-89cd-4adc-b11c-0da3fcbdcc98', 'content-length': '225', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3dcdeb64-89cd-4adc-b11c-0da3fcbdcc98', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types'} Body: b'{"volume_type": {"id": "89a53d79-3e6c-4758-9cb3-618b8913e450", "name": "tempest-VolumeTypesRbacTest-volume-type-1900396682", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:10.276 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:27:10.354 197 INFO tempest.lib.common.rest_client [req-43f36435-1a31-48a1-9cd3-4edf6c9ac7c6 ] Request (VolumeTypesRbacTest:test_delete_volume_type): 200 GET http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles 0.071s 2020-12-14 02:27:10.357 197 DEBUG tempest.lib.common.rest_client [req-43f36435-1a31-48a1-9cd3-4edf6c9ac7c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43f36435-1a31-48a1-9cd3-4edf6c9ac7c6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:10.418 197 INFO tempest.lib.common.rest_client [req-f1eae78b-1eb1-433a-adf3-4b67aeda1729 ] Request (VolumeTypesRbacTest:test_delete_volume_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:27:10.422 197 DEBUG tempest.lib.common.rest_client [req-f1eae78b-1eb1-433a-adf3-4b67aeda1729 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1eae78b-1eb1-433a-adf3-4b67aeda1729', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "76bf481d71184028b16d5e23a23e60e2", "name": "tempest-VolumeTypesRbacTest-2112016216", "password_expires_at": null}, "audit_ids": ["lCe6SDoHQLiaqQxyQJXAcA"], "expires_at": "2020-12-14T03:27:10.000000Z", "issued_at": "2020-12-14T02:27:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3171e9710c6048e78038598441e7671f", "name": "tempest-VolumeTypesRbacTest-2112016216"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:10.575 197 INFO tempest.lib.common.rest_client [req-20950b48-00dc-4305-aa36-ae21a2b2e8a0 ] Request (VolumeTypesRbacTest:test_delete_volume_type): 202 DELETE http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/89a53d79-3e6c-4758-9cb3-618b8913e450 0.145s 2020-12-14 02:27:10.578 197 DEBUG tempest.lib.common.rest_client [req-20950b48-00dc-4305-aa36-ae21a2b2e8a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-20950b48-00dc-4305-aa36-ae21a2b2e8a0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/89a53d79-3e6c-4758-9cb3-618b8913e450'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:10.581 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:27:10.650 197 INFO tempest.lib.common.rest_client [req-4297acd9-df7a-4e0b-a104-7df024f2db19 ] Request (VolumeTypesRbacTest:test_delete_volume_type): 200 GET http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles 0.062s 2020-12-14 02:27:10.654 197 DEBUG tempest.lib.common.rest_client [req-4297acd9-df7a-4e0b-a104-7df024f2db19 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4297acd9-df7a-4e0b-a104-7df024f2db19', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:10.708 197 INFO tempest.lib.common.rest_client [req-cf6fbe4f-265a-4e97-980a-d2328d92d762 ] Request (VolumeTypesRbacTest:test_delete_volume_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:27:10.713 197 DEBUG tempest.lib.common.rest_client [req-cf6fbe4f-265a-4e97-980a-d2328d92d762 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf6fbe4f-265a-4e97-980a-d2328d92d762', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "76bf481d71184028b16d5e23a23e60e2", "name": "tempest-VolumeTypesRbacTest-2112016216", "password_expires_at": null}, "audit_ids": ["3KhsidASRdegZAI94cAFTA"], "expires_at": "2020-12-14T03:27:10.000000Z", "issued_at": "2020-12-14T02:27:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3171e9710c6048e78038598441e7671f", "name": "tempest-VolumeTypesRbacTest-2112016216"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:10.815 197 INFO tempest.lib.common.rest_client [req-45f51c04-d8a9-412d-9e3d-f0f0f57bd8e3 ] Request (VolumeTypesRbacTest:test_delete_volume_type): 404 GET http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/89a53d79-3e6c-4758-9cb3-618b8913e450 0.094s 2020-12-14 02:27:10.817 197 DEBUG tempest.lib.common.rest_client [req-45f51c04-d8a9-412d-9e3d-f0f0f57bd8e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-45f51c04-d8a9-412d-9e3d-f0f0f57bd8e3', 'x-openstack-request-id': 'req-45f51c04-d8a9-412d-9e3d-f0f0f57bd8e3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/89a53d79-3e6c-4758-9cb3-618b8913e450'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 89a53d79-3e6c-4758-9cb3-618b8913e450 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:10.830 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:27:10.848 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:types_manage, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:27:10.908 197 INFO tempest.lib.common.rest_client [req-de5b79a1-ee52-4125-883f-382039d1bfc3 ] Request (VolumeTypesRbacTest:test_update_volume_type): 200 POST http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types 0.054s 2020-12-14 02:27:10.911 197 DEBUG tempest.lib.common.rest_client [req-de5b79a1-ee52-4125-883f-382039d1bfc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-VolumeTypesRbacTest-volume-type-793663449"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-de5b79a1-ee52-4125-883f-382039d1bfc3', 'content-length': '224', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-de5b79a1-ee52-4125-883f-382039d1bfc3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types'} Body: b'{"volume_type": {"id": "357bce11-96ba-427f-a6f1-85b6934dd9ab", "name": "tempest-VolumeTypesRbacTest-volume-type-793663449", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:10.936 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:27:11.008 197 INFO tempest.lib.common.rest_client [req-098e09d1-85de-4931-9992-ccdc3a96c037 ] Request (VolumeTypesRbacTest:test_update_volume_type): 200 GET http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles 0.067s 2020-12-14 02:27:11.010 197 DEBUG tempest.lib.common.rest_client [req-098e09d1-85de-4931-9992-ccdc3a96c037 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-098e09d1-85de-4931-9992-ccdc3a96c037', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:11.058 197 INFO tempest.lib.common.rest_client [req-19dcea27-6eaf-497e-828d-dcdda3dad00f ] Request (VolumeTypesRbacTest:test_update_volume_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:27:11.061 197 DEBUG tempest.lib.common.rest_client [req-19dcea27-6eaf-497e-828d-dcdda3dad00f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19dcea27-6eaf-497e-828d-dcdda3dad00f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "76bf481d71184028b16d5e23a23e60e2", "name": "tempest-VolumeTypesRbacTest-2112016216", "password_expires_at": null}, "audit_ids": ["w-rVwFvUThy8rAOs0cvABw"], "expires_at": "2020-12-14T03:27:11.000000Z", "issued_at": "2020-12-14T02:27:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3171e9710c6048e78038598441e7671f", "name": "tempest-VolumeTypesRbacTest-2112016216"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:11.186 197 INFO tempest.lib.common.rest_client [req-4f7c6eb8-f923-4eb5-87b2-49683758dee4 ] Request (VolumeTypesRbacTest:test_update_volume_type): 200 PUT http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/357bce11-96ba-427f-a6f1-85b6934dd9ab 0.119s 2020-12-14 02:27:11.189 197 DEBUG tempest.lib.common.rest_client [req-4f7c6eb8-f923-4eb5-87b2-49683758dee4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"description": "updated-description"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4f7c6eb8-f923-4eb5-87b2-49683758dee4', 'content-length': '200', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4f7c6eb8-f923-4eb5-87b2-49683758dee4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/357bce11-96ba-427f-a6f1-85b6934dd9ab'} Body: b'{"volume_type": {"id": "357bce11-96ba-427f-a6f1-85b6934dd9ab", "name": "tempest-VolumeTypesRbacTest-volume-type-793663449", "is_public": true, "extra_specs": {}, "description": "updated-description"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:11.208 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:27:11.269 197 INFO tempest.lib.common.rest_client [req-cacda070-78a2-4b54-88e7-64f957d1c8b5 ] Request (VolumeTypesRbacTest:test_update_volume_type): 200 GET http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles 0.057s 2020-12-14 02:27:11.271 197 DEBUG tempest.lib.common.rest_client [req-cacda070-78a2-4b54-88e7-64f957d1c8b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cacda070-78a2-4b54-88e7-64f957d1c8b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f/users/76bf481d71184028b16d5e23a23e60e2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:11.316 197 INFO tempest.lib.common.rest_client [req-47d21ad7-6b31-4993-9612-c7ecfbc8aa8d ] Request (VolumeTypesRbacTest:test_update_volume_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:27:11.318 197 DEBUG tempest.lib.common.rest_client [req-47d21ad7-6b31-4993-9612-c7ecfbc8aa8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47d21ad7-6b31-4993-9612-c7ecfbc8aa8d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "76bf481d71184028b16d5e23a23e60e2", "name": "tempest-VolumeTypesRbacTest-2112016216", "password_expires_at": null}, "audit_ids": ["XT-RBJl4Q-29b6N4r_j1SA"], "expires_at": "2020-12-14T03:27:11.000000Z", "issued_at": "2020-12-14T02:27:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3171e9710c6048e78038598441e7671f", "name": "tempest-VolumeTypesRbacTest-2112016216"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3171e9710c6048e78038598441e7671f", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:11.457 197 INFO tempest.lib.common.rest_client [req-fdf65f44-f11b-404e-acc2-8099d04ae050 ] Request (VolumeTypesRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/357bce11-96ba-427f-a6f1-85b6934dd9ab 0.129s 2020-12-14 02:27:11.459 197 DEBUG tempest.lib.common.rest_client [req-fdf65f44-f11b-404e-acc2-8099d04ae050 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fdf65f44-f11b-404e-acc2-8099d04ae050', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/357bce11-96ba-427f-a6f1-85b6934dd9ab'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:11.495 197 INFO tempest.lib.common.rest_client [req-522b04da-c7c4-44b3-bd9a-48e4c1701d98 ] Request (VolumeTypesRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/357bce11-96ba-427f-a6f1-85b6934dd9ab 0.031s 2020-12-14 02:27:11.497 197 DEBUG tempest.lib.common.rest_client [req-522b04da-c7c4-44b3-bd9a-48e4c1701d98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-522b04da-c7c4-44b3-bd9a-48e4c1701d98', 'x-openstack-request-id': 'req-522b04da-c7c4-44b3-bd9a-48e4c1701d98', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/357bce11-96ba-427f-a6f1-85b6934dd9ab'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 357bce11-96ba-427f-a6f1-85b6934dd9ab could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:11.535 197 INFO tempest.lib.common.rest_client [req-f40137df-b72f-4c94-873b-d1ed4b93a56e ] Request (VolumeTypesRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/89a53d79-3e6c-4758-9cb3-618b8913e450 0.033s 2020-12-14 02:27:11.537 197 DEBUG tempest.lib.common.rest_client [req-f40137df-b72f-4c94-873b-d1ed4b93a56e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-f40137df-b72f-4c94-873b-d1ed4b93a56e', 'x-openstack-request-id': 'req-f40137df-b72f-4c94-873b-d1ed4b93a56e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/89a53d79-3e6c-4758-9cb3-618b8913e450'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 89a53d79-3e6c-4758-9cb3-618b8913e450 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:11.544 189 INFO tempest.lib.common.rest_client [req-14ff6329-4c3d-4ab2-a822-1ebed7877e8c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 4.307s 2020-12-14 02:27:11.547 189 DEBUG tempest.lib.common.rest_client [req-14ff6329-4c3d-4ab2-a822-1ebed7877e8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-14ff6329-4c3d-4ab2-a822-1ebed7877e8c', 'x-compute-request-id': 'req-14ff6329-4c3d-4ab2-a822-1ebed7877e8c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:11.569 197 INFO tempest.lib.common.rest_client [req-687ba6e2-8185-4e08-b760-fe6d49526b71 ] Request (VolumeTypesRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/89a53d79-3e6c-4758-9cb3-618b8913e450 0.028s 2020-12-14 02:27:11.572 197 DEBUG tempest.lib.common.rest_client [req-687ba6e2-8185-4e08-b760-fe6d49526b71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-687ba6e2-8185-4e08-b760-fe6d49526b71', 'x-openstack-request-id': 'req-687ba6e2-8185-4e08-b760-fe6d49526b71', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/89a53d79-3e6c-4758-9cb3-618b8913e450'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 89a53d79-3e6c-4758-9cb3-618b8913e450 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:11.654 197 INFO tempest.lib.common.rest_client [req-8e8e8dbb-6ac5-4ca8-939a-655986cd7378 ] Request (VolumeTypesRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/13fce47f-9017-4564-9c1c-ea2f4fa16ffc 0.078s 2020-12-14 02:27:11.655 197 DEBUG tempest.lib.common.rest_client [req-8e8e8dbb-6ac5-4ca8-939a-655986cd7378 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8e8e8dbb-6ac5-4ca8-939a-655986cd7378', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/13fce47f-9017-4564-9c1c-ea2f4fa16ffc'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:11.688 197 INFO tempest.lib.common.rest_client [req-60d80927-86aa-4b99-b451-85a9e4da25d6 ] Request (VolumeTypesRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/13fce47f-9017-4564-9c1c-ea2f4fa16ffc 0.029s 2020-12-14 02:27:11.690 197 DEBUG tempest.lib.common.rest_client [req-60d80927-86aa-4b99-b451-85a9e4da25d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-60d80927-86aa-4b99-b451-85a9e4da25d6', 'x-openstack-request-id': 'req-60d80927-86aa-4b99-b451-85a9e4da25d6', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3171e9710c6048e78038598441e7671f/types/13fce47f-9017-4564-9c1c-ea2f4fa16ffc'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 13fce47f-9017-4564-9c1c-ea2f4fa16ffc could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:11.839 197 INFO tempest.lib.common.rest_client [req-8bcb6680-b513-489a-92a3-03b86629439f ] Request (VolumeTypesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/76bf481d71184028b16d5e23a23e60e2 0.143s 2020-12-14 02:27:11.842 197 DEBUG tempest.lib.common.rest_client [req-8bcb6680-b513-489a-92a3-03b86629439f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8bcb6680-b513-489a-92a3-03b86629439f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/76bf481d71184028b16d5e23a23e60e2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:11.942 197 INFO tempest.lib.common.rest_client [req-04cf14ff-2357-4937-9c41-39c4632bc13c ] Request (VolumeTypesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:27:11.944 197 DEBUG tempest.lib.common.rest_client [req-04cf14ff-2357-4937-9c41-39c4632bc13c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04cf14ff-2357-4937-9c41-39c4632bc13c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ANd5igKIRC6X2v5T7GDInw"], "expires_at": "2020-12-14T03:27:11.000000Z", "issued_at": "2020-12-14T02:27:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:12.205 197 INFO tempest.lib.common.rest_client [req-b03e2080-30da-42d7-b83e-4939a9236310 ] Request (VolumeTypesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3171e9710c6048e78038598441e7671f&name=default 0.254s 2020-12-14 02:27:12.207 197 DEBUG tempest.lib.common.rest_client [req-b03e2080-30da-42d7-b83e-4939a9236310 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-b03e2080-30da-42d7-b83e-4939a9236310', 'date': 'Mon, 14 Dec 2020 02:27:12 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3171e9710c6048e78038598441e7671f&name=default'} Body: b'{"security_groups": [{"id": "f3c9dbf8-abb2-40bd-a447-e87df3117b90", "name": "default", "stateful": true, "tenant_id": "3171e9710c6048e78038598441e7671f", "description": "Default security group", "security_group_rules": [{"id": "17369701-9816-4043-9cfc-b244f84b22cb", "tenant_id": "3171e9710c6048e78038598441e7671f", "security_group_id": "f3c9dbf8-abb2-40bd-a447-e87df3117b90", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:27:12Z", "updated_at": "2020-12-14T02:27:12Z", "revision_number": 0, "project_id": "3171e9710c6048e78038598441e7671f"}, {"id": "5a8dc3d5-1932-450e-8b8e-71bd103cd36a", "tenant_id": "3171e9710c6048e78038598441e7671f", "security_group_id": "f3c9dbf8-abb2-40bd-a447-e87df3117b90", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f3c9dbf8-abb2-40bd-a447-e87df3117b90", "description": null, "tags": [], "created_at": "2020-12-14T02:27:12Z", "updated_at": "2020-12-14T02:27:12Z", "revision_number": 0, "project_id": "3171e9710c6048e78038598441e7671f"}, {"id": "8e691566-e66c-44fa-bc5f-c4d05a2c866c", "tenant_id": "3171e9710c6048e78038598441e7671f", "security_group_id": "f3c9dbf8-abb2-40bd-a447-e87df3117b90", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f3c9dbf8-abb2-40bd-a447-e87df3117b90", "description": null, "tags": [], "created_at": "2020-12-14T02:27:12Z", "updated_at": "2020-12-14T02:27:12Z", "revision_number": 0, "project_id": "3171e9710c6048e78038598441e7671f"}, {"id": "d5a7c413-2aeb-43eb-8fa2-f96f7a654e28", "tenant_id": "3171e9710c6048e78038598441e7671f", "security_group_id": "f3c9dbf8-abb2-40bd-a447-e87df3117b90", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:27:12Z", "updated_at": "2020-12-14T02:27:12Z", "revision_number": 0, "project_id": "3171e9710c6048e78038598441e7671f"}], "tags": [], "created_at": "2020-12-14T02:27:12Z", "updated_at": "2020-12-14T02:27:12Z", "revision_number": 1, "project_id": "3171e9710c6048e78038598441e7671f"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:12.346 197 INFO tempest.lib.common.rest_client [req-d0d5b89f-cc11-464e-903e-3df3de72eddc ] Request (VolumeTypesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/f3c9dbf8-abb2-40bd-a447-e87df3117b90 0.129s 2020-12-14 02:27:12.349 197 DEBUG tempest.lib.common.rest_client [req-d0d5b89f-cc11-464e-903e-3df3de72eddc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-d0d5b89f-cc11-464e-903e-3df3de72eddc', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:27:12 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/f3c9dbf8-abb2-40bd-a447-e87df3117b90'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:12.502 197 INFO tempest.lib.common.rest_client [req-4b578abd-a09d-4e69-b464-9efe5b650049 ] Request (VolumeTypesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f 0.145s 2020-12-14 02:27:12.505 197 DEBUG tempest.lib.common.rest_client [req-4b578abd-a09d-4e69-b464-9efe5b650049 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b578abd-a09d-4e69-b464-9efe5b650049', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3171e9710c6048e78038598441e7671f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:12.618 197 INFO tempest.lib.common.rest_client [req-5c781548-cd9b-4430-a5e8-48987fb0cf8d ] Request (VolumesBackupsV318RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:27:12.622 197 DEBUG tempest.lib.common.rest_client [req-5c781548-cd9b-4430-a5e8-48987fb0cf8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c781548-cd9b-4430-a5e8-48987fb0cf8d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["leCq9hfWRV6jlwTiGl1TZg"], "expires_at": "2020-12-14T03:27:12.000000Z", "issued_at": "2020-12-14T02:27:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:12.729 197 INFO tempest.lib.common.rest_client [req-41cb44da-1bf7-4460-82e4-332c72ac55ed ] Request (VolumesBackupsV318RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.057s 2020-12-14 02:27:12.732 197 DEBUG tempest.lib.common.rest_client [req-41cb44da-1bf7-4460-82e4-332c72ac55ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41cb44da-1bf7-4460-82e4-332c72ac55ed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["PaYJNk7bTgCCMZ3LOIkzjg"], "expires_at": "2020-12-14T03:27:12.000000Z", "issued_at": "2020-12-14T02:27:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:12.815 197 INFO tempest.lib.common.rest_client [req-59434d4b-4fc2-4b44-b904-cbfbd765ffd0 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.075s 2020-12-14 02:27:12.818 197 DEBUG tempest.lib.common.rest_client [req-59434d4b-4fc2-4b44-b904-cbfbd765ffd0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59434d4b-4fc2-4b44-b904-cbfbd765ffd0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:12.919 197 INFO tempest.lib.common.rest_client [req-391b7c12-4edb-491a-8194-d8e7b3660eee ] Request (VolumesBackupsV318RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.092s 2020-12-14 02:27:12.922 197 DEBUG tempest.lib.common.rest_client [req-391b7c12-4edb-491a-8194-d8e7b3660eee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesBackupsV318RbacTest-97932863-desc", "domain_id": "default", "name": "tempest-VolumesBackupsV318RbacTest-97932863"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-391b7c12-4edb-491a-8194-d8e7b3660eee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "17f409a27f2e448f90043f797b035273", "name": "tempest-VolumesBackupsV318RbacTest-97932863", "domain_id": "default", "description": "tempest-VolumesBackupsV318RbacTest-97932863-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:12.944 189 INFO tempest.lib.common.rest_client [req-b8521111-ac5e-48cc-bf6a-586bea763f4a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.288s 2020-12-14 02:27:12.947 189 DEBUG tempest.lib.common.rest_client [req-b8521111-ac5e-48cc-bf6a-586bea763f4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b8521111-ac5e-48cc-bf6a-586bea763f4a', 'x-compute-request-id': 'req-b8521111-ac5e-48cc-bf6a-586bea763f4a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:13.048 197 INFO tempest.lib.common.rest_client [req-ba1d7d8e-eeca-4bf3-ab7e-eb16928d8b6b ] Request (VolumesBackupsV318RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.118s 2020-12-14 02:27:13.050 197 DEBUG tempest.lib.common.rest_client [req-ba1d7d8e-eeca-4bf3-ab7e-eb16928d8b6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesBackupsV318RbacTest-97932863", "password": "M3+Z%pvaaGvUV_X", "project_id": "17f409a27f2e448f90043f797b035273", "email": "tempest-VolumesBackupsV318RbacTest-334163145@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '405', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba1d7d8e-eeca-4bf3-ab7e-eb16928d8b6b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "17f409a27f2e448f90043f797b035273", "email": "tempest-VolumesBackupsV318RbacTest-334163145@example.com", "id": "de67ac0c2db64e778089bddb2b45278c", "name": "tempest-VolumesBackupsV318RbacTest-97932863", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/de67ac0c2db64e778089bddb2b45278c"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:13.122 197 INFO tempest.lib.common.rest_client [req-11c429a3-43bf-4989-9fe6-22c552bce6eb ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.064s 2020-12-14 02:27:13.126 197 DEBUG tempest.lib.common.rest_client [req-11c429a3-43bf-4989-9fe6-22c552bce6eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-11c429a3-43bf-4989-9fe6-22c552bce6eb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:13.202 197 INFO tempest.lib.common.rest_client [req-338220e9-0f84-4815-a97d-a969bd569030 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.069s 2020-12-14 02:27:13.205 197 DEBUG tempest.lib.common.rest_client [req-338220e9-0f84-4815-a97d-a969bd569030 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-338220e9-0f84-4815-a97d-a969bd569030', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:13.305 197 INFO tempest.lib.common.rest_client [req-f2084f08-f315-4e59-8811-25e5066916ab ] Request (VolumesBackupsV318RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles/72a4576c553448cd941b052c1ca0cf2d 0.091s 2020-12-14 02:27:13.308 197 DEBUG tempest.lib.common.rest_client [req-f2084f08-f315-4e59-8811-25e5066916ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2084f08-f315-4e59-8811-25e5066916ab', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:13.311 197 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesBackupsV318RbacTest-97932863', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '17f409a27f2e448f90043f797b035273', 'project_name': 'tempest-VolumesBackupsV318RbacTest-97932863', 'tenant_id': '17f409a27f2e448f90043f797b035273', 'tenant_name': 'tempest-VolumesBackupsV318RbacTest-97932863', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'de67ac0c2db64e778089bddb2b45278c'}, Network: None, Subnet: None, Router: None 2020-12-14 02:27:13.314 197 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesBackupsV318RbacTest-97932863', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '17f409a27f2e448f90043f797b035273', 'project_name': 'tempest-VolumesBackupsV318RbacTest-97932863', 'tenant_id': '17f409a27f2e448f90043f797b035273', 'tenant_name': 'tempest-VolumesBackupsV318RbacTest-97932863', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'de67ac0c2db64e778089bddb2b45278c'}, Network: None, Subnet: None, Router: None 2020-12-14 02:27:13.945 197 INFO tempest.lib.common.rest_client [req-99e9f4db-ee47-47a5-8815-58f8e26bde68 ] Request (VolumesBackupsV318RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.128s 2020-12-14 02:27:13.949 197 DEBUG tempest.lib.common.rest_client [req-99e9f4db-ee47-47a5-8815-58f8e26bde68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-99e9f4db-ee47-47a5-8815-58f8e26bde68', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "de67ac0c2db64e778089bddb2b45278c", "name": "tempest-VolumesBackupsV318RbacTest-97932863", "password_expires_at": null}, "audit_ids": ["-eCvbby6S9OBSd0oh0ilDQ"], "expires_at": "2020-12-14T03:27:13.000000Z", "issued_at": "2020-12-14T02:27:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17f409a27f2e448f90043f797b035273", "name": "tempest-VolumesBackupsV318RbacTest-97932863"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:14.071 197 INFO tempest.lib.common.rest_client [req-71d0d1e8-de98-4045-949d-0c72565b453d ] Request (VolumesBackupsV318RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:27:14.074 197 DEBUG tempest.lib.common.rest_client [req-71d0d1e8-de98-4045-949d-0c72565b453d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-71d0d1e8-de98-4045-949d-0c72565b453d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["yDAhiMHJQbmIQpXjKh0zlw"], "expires_at": "2020-12-14T03:27:13.000000Z", "issued_at": "2020-12-14T02:27:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:14.200 197 INFO tempest.lib.common.rest_client [req-beb934eb-a610-496c-881b-0634f3a1f985 ] Request (VolumesBackupsV318RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:27:14.203 197 DEBUG tempest.lib.common.rest_client [req-beb934eb-a610-496c-881b-0634f3a1f985 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-beb934eb-a610-496c-881b-0634f3a1f985', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["lyVPTYgdQtiGyNvD8POfyQ"], "expires_at": "2020-12-14T03:27:14.000000Z", "issued_at": "2020-12-14T02:27:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:14.277 197 INFO tempest.lib.common.rest_client [req-cac873d7-46b5-46fb-a7c2-5dac104e6d35 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.067s 2020-12-14 02:27:14.281 197 DEBUG tempest.lib.common.rest_client [req-cac873d7-46b5-46fb-a7c2-5dac104e6d35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cac873d7-46b5-46fb-a7c2-5dac104e6d35', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:14.290 189 INFO tempest.lib.common.rest_client [req-0379797b-58a5-4478-84ba-2ea5622e5dd1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.227s 2020-12-14 02:27:14.294 189 DEBUG tempest.lib.common.rest_client [req-0379797b-58a5-4478-84ba-2ea5622e5dd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0379797b-58a5-4478-84ba-2ea5622e5dd1', 'x-compute-request-id': 'req-0379797b-58a5-4478-84ba-2ea5622e5dd1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:14.354 197 INFO tempest.lib.common.rest_client [req-39fcf660-9e61-4aa9-8a34-6cf9dd014cb1 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-12-14 02:27:14.358 197 DEBUG tempest.lib.common.rest_client [req-39fcf660-9e61-4aa9-8a34-6cf9dd014cb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39fcf660-9e61-4aa9-8a34-6cf9dd014cb1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:14.361 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:27:14.364 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:27:14.444 197 INFO tempest.lib.common.rest_client [req-9adc1da7-95d1-4ac4-b5a3-e612a007503a ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles 0.070s 2020-12-14 02:27:14.448 197 DEBUG tempest.lib.common.rest_client [req-9adc1da7-95d1-4ac4-b5a3-e612a007503a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9adc1da7-95d1-4ac4-b5a3-e612a007503a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:14.524 197 INFO tempest.lib.common.rest_client [req-d6cc43fb-c74a-445f-a7d8-131c1c391f31 ] Request (VolumesBackupsV318RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-12-14 02:27:14.526 197 DEBUG tempest.lib.common.rest_client [req-d6cc43fb-c74a-445f-a7d8-131c1c391f31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6cc43fb-c74a-445f-a7d8-131c1c391f31', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:14.658 197 INFO tempest.lib.common.rest_client [req-68a9b29a-7700-47d6-b29a-1ea083c70751 ] Request (VolumesBackupsV318RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles/a629c95d64b3416fb80ae90af4f69c05 0.126s 2020-12-14 02:27:14.660 197 DEBUG tempest.lib.common.rest_client [req-68a9b29a-7700-47d6-b29a-1ea083c70751 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68a9b29a-7700-47d6-b29a-1ea083c70751', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:15.613 189 INFO tempest.lib.common.rest_client [req-2db1b142-1e35-4d9b-9e88-219590253528 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.210s 2020-12-14 02:27:15.616 189 DEBUG tempest.lib.common.rest_client [req-2db1b142-1e35-4d9b-9e88-219590253528 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2db1b142-1e35-4d9b-9e88-219590253528', 'x-compute-request-id': 'req-2db1b142-1e35-4d9b-9e88-219590253528', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:15.765 197 INFO tempest.lib.common.rest_client [req-8670f874-ae63-4fe4-b003-933f185e9177 ] Request (VolumesBackupsV318RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:27:15.768 197 DEBUG tempest.lib.common.rest_client [req-8670f874-ae63-4fe4-b003-933f185e9177 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8670f874-ae63-4fe4-b003-933f185e9177', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "de67ac0c2db64e778089bddb2b45278c", "name": "tempest-VolumesBackupsV318RbacTest-97932863", "password_expires_at": null}, "audit_ids": ["evkQUPJQRfS1K-Qpndsgog"], "expires_at": "2020-12-14T03:27:15.000000Z", "issued_at": "2020-12-14T02:27:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17f409a27f2e448f90043f797b035273", "name": "tempest-VolumesBackupsV318RbacTest-97932863"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:16.272 197 INFO tempest.lib.common.rest_client [req-086b4b71-dfe8-411a-b1d7-5b098de462d6 ] Request (VolumesBackupsV318RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes 0.492s 2020-12-14 02:27:16.276 197 DEBUG tempest.lib.common.rest_client [req-086b4b71-dfe8-411a-b1d7-5b098de462d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesBackupsV318RbacTest-Volume-1437310003"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-086b4b71-dfe8-411a-b1d7-5b098de462d6', 'content-length': '847', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-086b4b71-dfe8-411a-b1d7-5b098de462d6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes'} Body: b'{"volume": {"id": "33a5b3f1-0726-4e04-a195-e207d081b7c8", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:27:16.000000", "updated_at": null, "name": "tempest-VolumesBackupsV318RbacTest-Volume-1437310003", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8"}], "user_id": "de67ac0c2db64e778089bddb2b45278c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:16.460 197 INFO tempest.lib.common.rest_client [req-0b9a385b-0c05-48f9-bb1c-f1235871b95f ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8 0.097s 2020-12-14 02:27:16.463 197 DEBUG tempest.lib.common.rest_client [req-0b9a385b-0c05-48f9-bb1c-f1235871b95f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0b9a385b-0c05-48f9-bb1c-f1235871b95f', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0b9a385b-0c05-48f9-bb1c-f1235871b95f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8'} Body: b'{"volume": {"id": "33a5b3f1-0726-4e04-a195-e207d081b7c8", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:27:16.000000", "updated_at": "2020-12-14T02:27:16.000000", "name": "tempest-VolumesBackupsV318RbacTest-Volume-1437310003", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8"}], "user_id": "de67ac0c2db64e778089bddb2b45278c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "17f409a27f2e448f90043f797b035273"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:16.972 189 INFO tempest.lib.common.rest_client [req-bbe6872d-6804-4b43-9493-4131297cb2c5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.246s 2020-12-14 02:27:16.975 189 DEBUG tempest.lib.common.rest_client [req-bbe6872d-6804-4b43-9493-4131297cb2c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bbe6872d-6804-4b43-9493-4131297cb2c5', 'x-compute-request-id': 'req-bbe6872d-6804-4b43-9493-4131297cb2c5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:17.647 197 INFO tempest.lib.common.rest_client [req-35490141-2819-458a-bde0-25d602ec4a09 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8 0.084s 2020-12-14 02:27:17.650 197 DEBUG tempest.lib.common.rest_client [req-35490141-2819-458a-bde0-25d602ec4a09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-35490141-2819-458a-bde0-25d602ec4a09', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-35490141-2819-458a-bde0-25d602ec4a09', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8'} Body: b'{"volume": {"id": "33a5b3f1-0726-4e04-a195-e207d081b7c8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:27:16.000000", "updated_at": "2020-12-14T02:27:16.000000", "name": "tempest-VolumesBackupsV318RbacTest-Volume-1437310003", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8"}], "user_id": "de67ac0c2db64e778089bddb2b45278c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "17f409a27f2e448f90043f797b035273"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:17.742 197 INFO tempest.common.waiters [-] volume 33a5b3f1-0726-4e04-a195-e207d081b7c8 reached available after waiting for 1.742243 seconds 2020-12-14 02:27:18.330 189 INFO tempest.lib.common.rest_client [req-3df8b904-1791-413a-805f-00de15754b54 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.246s 2020-12-14 02:27:18.392 189 DEBUG tempest.lib.common.rest_client [req-3df8b904-1791-413a-805f-00de15754b54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3df8b904-1791-413a-805f-00de15754b54', 'x-compute-request-id': 'req-3df8b904-1791-413a-805f-00de15754b54', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:20.762 197 INFO tempest.lib.common.rest_client [req-a72f56b1-0cf8-4b6f-ad87-7cf67a999418 ] Request (VolumesBackupsV318RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups 3.014s 2020-12-14 02:27:20.765 197 DEBUG tempest.lib.common.rest_client [req-a72f56b1-0cf8-4b6f-ad87-7cf67a999418 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"backup": {"volume_id": "33a5b3f1-0726-4e04-a195-e207d081b7c8", "name": "tempest-VolumesBackupsV318RbacTest-Backup-141805748"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a72f56b1-0cf8-4b6f-ad87-7cf67a999418', 'content-length': '405', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a72f56b1-0cf8-4b6f-ad87-7cf67a999418', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups'} Body: b'{"backup": {"id": "a47ae8a2-cd8b-43a4-bfd1-da40a718502c", "name": "tempest-VolumesBackupsV318RbacTest-Backup-141805748", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:20.837 197 INFO tempest.lib.common.rest_client [req-00c7785f-c383-4ac3-b568-ecf9b9498758 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c 0.042s 2020-12-14 02:27:20.839 197 DEBUG tempest.lib.common.rest_client [req-00c7785f-c383-4ac3-b568-ecf9b9498758 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-00c7785f-c383-4ac3-b568-ecf9b9498758', 'content-length': '812', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-00c7785f-c383-4ac3-b568-ecf9b9498758', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c'} Body: b'{"backup": {"id": "a47ae8a2-cd8b-43a4-bfd1-da40a718502c", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": null, "created_at": "2020-12-14T02:27:19.000000", "updated_at": "2020-12-14T02:27:21.000000", "name": "tempest-VolumesBackupsV318RbacTest-Backup-141805748", "description": null, "fail_reason": null, "volume_id": "33a5b3f1-0726-4e04-a195-e207d081b7c8", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:27:19.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:20.895 189 INFO tempest.lib.common.rest_client [req-99f2527a-7b7d-45ea-af5e-ae63c31c6eb2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 1.384s 2020-12-14 02:27:20.898 189 DEBUG tempest.lib.common.rest_client [req-99f2527a-7b7d-45ea-af5e-ae63c31c6eb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-99f2527a-7b7d-45ea-af5e-ae63c31c6eb2', 'x-compute-request-id': 'req-99f2527a-7b7d-45ea-af5e-ae63c31c6eb2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:21.942 197 INFO tempest.lib.common.rest_client [req-228e8781-4360-4ccf-8db8-3f0e83056040 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c 0.045s 2020-12-14 02:27:21.945 197 DEBUG tempest.lib.common.rest_client [req-228e8781-4360-4ccf-8db8-3f0e83056040 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-228e8781-4360-4ccf-8db8-3f0e83056040', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-228e8781-4360-4ccf-8db8-3f0e83056040', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c'} Body: b'{"backup": {"id": "a47ae8a2-cd8b-43a4-bfd1-da40a718502c", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:27:19.000000", "updated_at": "2020-12-14T02:27:21.000000", "name": "tempest-VolumesBackupsV318RbacTest-Backup-141805748", "description": null, "fail_reason": null, "volume_id": "33a5b3f1-0726-4e04-a195-e207d081b7c8", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:27:19.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:22.229 189 INFO tempest.lib.common.rest_client [req-17bcadd7-536a-46d8-80d2-5c88ff71d89b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.229s 2020-12-14 02:27:22.232 189 DEBUG tempest.lib.common.rest_client [req-17bcadd7-536a-46d8-80d2-5c88ff71d89b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-17bcadd7-536a-46d8-80d2-5c88ff71d89b', 'x-compute-request-id': 'req-17bcadd7-536a-46d8-80d2-5c88ff71d89b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:23.045 197 INFO tempest.lib.common.rest_client [req-4e358493-23bb-43b8-9a29-1fe47a3c7038 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c 0.043s 2020-12-14 02:27:23.048 197 DEBUG tempest.lib.common.rest_client [req-4e358493-23bb-43b8-9a29-1fe47a3c7038 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4e358493-23bb-43b8-9a29-1fe47a3c7038', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4e358493-23bb-43b8-9a29-1fe47a3c7038', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c'} Body: b'{"backup": {"id": "a47ae8a2-cd8b-43a4-bfd1-da40a718502c", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:27:19.000000", "updated_at": "2020-12-14T02:27:21.000000", "name": "tempest-VolumesBackupsV318RbacTest-Backup-141805748", "description": null, "fail_reason": null, "volume_id": "33a5b3f1-0726-4e04-a195-e207d081b7c8", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:27:19.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:23.667 189 INFO tempest.lib.common.rest_client [req-1c4ead7b-d3c8-45a0-9a41-cba18884cc7e ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.326s 2020-12-14 02:27:23.670 189 DEBUG tempest.lib.common.rest_client [req-1c4ead7b-d3c8-45a0-9a41-cba18884cc7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1c4ead7b-d3c8-45a0-9a41-cba18884cc7e', 'x-compute-request-id': 'req-1c4ead7b-d3c8-45a0-9a41-cba18884cc7e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:24.158 197 INFO tempest.lib.common.rest_client [req-715e1a12-31a3-4cc5-b114-7cced5957c86 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c 0.052s 2020-12-14 02:27:24.161 197 DEBUG tempest.lib.common.rest_client [req-715e1a12-31a3-4cc5-b114-7cced5957c86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-715e1a12-31a3-4cc5-b114-7cced5957c86', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-715e1a12-31a3-4cc5-b114-7cced5957c86', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c'} Body: b'{"backup": {"id": "a47ae8a2-cd8b-43a4-bfd1-da40a718502c", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:27:19.000000", "updated_at": "2020-12-14T02:27:21.000000", "name": "tempest-VolumesBackupsV318RbacTest-Backup-141805748", "description": null, "fail_reason": null, "volume_id": "33a5b3f1-0726-4e04-a195-e207d081b7c8", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:27:19.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:25.278 197 INFO tempest.lib.common.rest_client [req-146ec0ac-c302-4467-a592-1932f640040f ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c 0.057s 2020-12-14 02:27:25.281 197 DEBUG tempest.lib.common.rest_client [req-146ec0ac-c302-4467-a592-1932f640040f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-146ec0ac-c302-4467-a592-1932f640040f', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-146ec0ac-c302-4467-a592-1932f640040f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c'} Body: b'{"backup": {"id": "a47ae8a2-cd8b-43a4-bfd1-da40a718502c", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:27:19.000000", "updated_at": "2020-12-14T02:27:21.000000", "name": "tempest-VolumesBackupsV318RbacTest-Backup-141805748", "description": null, "fail_reason": null, "volume_id": "33a5b3f1-0726-4e04-a195-e207d081b7c8", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:27:19.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:25.836 189 INFO tempest.lib.common.rest_client [req-39188d5e-d624-4891-b3ad-ca020baa828f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 1.051s 2020-12-14 02:27:25.841 189 DEBUG tempest.lib.common.rest_client [req-39188d5e-d624-4891-b3ad-ca020baa828f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-39188d5e-d624-4891-b3ad-ca020baa828f', 'x-compute-request-id': 'req-39188d5e-d624-4891-b3ad-ca020baa828f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:26.392 197 INFO tempest.lib.common.rest_client [req-c91dcfb5-229b-4bcc-a206-124726813645 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c 0.046s 2020-12-14 02:27:26.395 197 DEBUG tempest.lib.common.rest_client [req-c91dcfb5-229b-4bcc-a206-124726813645 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c91dcfb5-229b-4bcc-a206-124726813645', 'content-length': '817', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c91dcfb5-229b-4bcc-a206-124726813645', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c'} Body: b'{"backup": {"id": "a47ae8a2-cd8b-43a4-bfd1-da40a718502c", "status": "creating", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:27:19.000000", "updated_at": "2020-12-14T02:27:21.000000", "name": "tempest-VolumesBackupsV318RbacTest-Backup-141805748", "description": null, "fail_reason": null, "volume_id": "33a5b3f1-0726-4e04-a195-e207d081b7c8", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:27:19.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:27.167 189 INFO tempest.lib.common.rest_client [req-eaa18a40-09a6-473e-a1a8-67f462d0495c ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.211s 2020-12-14 02:27:27.171 189 DEBUG tempest.lib.common.rest_client [req-eaa18a40-09a6-473e-a1a8-67f462d0495c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eaa18a40-09a6-473e-a1a8-67f462d0495c', 'x-compute-request-id': 'req-eaa18a40-09a6-473e-a1a8-67f462d0495c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:27.499 197 INFO tempest.lib.common.rest_client [req-02c8cd59-3d99-4ae7-81c0-8c2e0332b52e ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c 0.047s 2020-12-14 02:27:27.503 197 DEBUG tempest.lib.common.rest_client [req-02c8cd59-3d99-4ae7-81c0-8c2e0332b52e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-02c8cd59-3d99-4ae7-81c0-8c2e0332b52e', 'content-length': '818', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-02c8cd59-3d99-4ae7-81c0-8c2e0332b52e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c'} Body: b'{"backup": {"id": "a47ae8a2-cd8b-43a4-bfd1-da40a718502c", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:27:19.000000", "updated_at": "2020-12-14T02:27:27.000000", "name": "tempest-VolumesBackupsV318RbacTest-Backup-141805748", "description": null, "fail_reason": null, "volume_id": "33a5b3f1-0726-4e04-a195-e207d081b7c8", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:27:19.000000"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:27.554 197 INFO tempest.common.waiters [-] backup a47ae8a2-cd8b-43a4-bfd1-da40a718502c reached available after waiting for 7.553896 seconds 2020-12-14 02:27:27.638 197 INFO tempest.lib.common.rest_client [req-28d3a1a5-33e5-4053-afe8-92798aa84a16 ] Request (VolumesBackupsV318RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8 0.079s 2020-12-14 02:27:27.641 197 DEBUG tempest.lib.common.rest_client [req-28d3a1a5-33e5-4053-afe8-92798aa84a16 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-28d3a1a5-33e5-4053-afe8-92798aa84a16', 'content-length': '1070', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-28d3a1a5-33e5-4053-afe8-92798aa84a16', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8'} Body: b'{"volume": {"id": "33a5b3f1-0726-4e04-a195-e207d081b7c8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:27:16.000000", "updated_at": "2020-12-14T02:27:27.000000", "name": "tempest-VolumesBackupsV318RbacTest-Volume-1437310003", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8"}], "user_id": "de67ac0c2db64e778089bddb2b45278c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "17f409a27f2e448f90043f797b035273"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:27.734 197 INFO tempest.common.waiters [-] volume 33a5b3f1-0726-4e04-a195-e207d081b7c8 reached available after waiting for 0.734592 seconds 2020-12-14 02:27:27.740 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:27:27.759 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:backup_project_attribute, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:27:27.761 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:27:27.888 197 INFO tempest.lib.common.rest_client [req-b2e8c6bc-6e8b-4b9b-bb7a-930c2c47ce50 ] Request (VolumesBackupsV318RbacTest:test_list_backup_details_project_attribute): 200 GET http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles 0.121s 2020-12-14 02:27:27.891 197 DEBUG tempest.lib.common.rest_client [req-b2e8c6bc-6e8b-4b9b-bb7a-930c2c47ce50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2e8c6bc-6e8b-4b9b-bb7a-930c2c47ce50', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:27.945 197 INFO tempest.lib.common.rest_client [req-3cd0d609-91d0-4a97-ad71-07f403a4cd2c ] Request (VolumesBackupsV318RbacTest:test_list_backup_details_project_attribute): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:27:27.948 197 DEBUG tempest.lib.common.rest_client [req-3cd0d609-91d0-4a97-ad71-07f403a4cd2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3cd0d609-91d0-4a97-ad71-07f403a4cd2c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "de67ac0c2db64e778089bddb2b45278c", "name": "tempest-VolumesBackupsV318RbacTest-97932863", "password_expires_at": null}, "audit_ids": ["aA9-bUWnQPWMykMi9Ujl_g"], "expires_at": "2020-12-14T03:27:27.000000Z", "issued_at": "2020-12-14T02:27:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17f409a27f2e448f90043f797b035273", "name": "tempest-VolumesBackupsV318RbacTest-97932863"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:28.068 197 INFO tempest.lib.common.rest_client [req-0f36fb5b-a09d-4c68-b602-08c6f4a51e7e ] Request (VolumesBackupsV318RbacTest:test_list_backup_details_project_attribute): 200 GET http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/detail 0.112s 2020-12-14 02:27:28.071 197 DEBUG tempest.lib.common.rest_client [req-0f36fb5b-a09d-4c68-b602-08c6f4a51e7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.18', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0f36fb5b-a09d-4c68-b602-08c6f4a51e7e', 'content-length': '894', 'openstack-api-version': 'volume 3.18', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0f36fb5b-a09d-4c68-b602-08c6f4a51e7e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/detail'} Body: b'{"backups": [{"id": "a47ae8a2-cd8b-43a4-bfd1-da40a718502c", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:27:19.000000", "updated_at": "2020-12-14T02:27:27.000000", "name": "tempest-VolumesBackupsV318RbacTest-Backup-141805748", "description": null, "fail_reason": null, "volume_id": "33a5b3f1-0726-4e04-a195-e207d081b7c8", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:27:19.000000", "os-backup-project-attr:project_id": "17f409a27f2e448f90043f797b035273"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:28.126 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:27:28.205 197 INFO tempest.lib.common.rest_client [req-b8a2ab1e-fadb-4968-abaf-ccbab7bcd0fb ] Request (VolumesBackupsV318RbacTest:test_list_backup_details_project_attribute): 200 GET http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles 0.072s 2020-12-14 02:27:28.208 197 DEBUG tempest.lib.common.rest_client [req-b8a2ab1e-fadb-4968-abaf-ccbab7bcd0fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8a2ab1e-fadb-4968-abaf-ccbab7bcd0fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:28.259 197 INFO tempest.lib.common.rest_client [req-a1f73c33-452a-4944-b4c7-c7292cc71d3d ] Request (VolumesBackupsV318RbacTest:test_list_backup_details_project_attribute): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:27:28.263 197 DEBUG tempest.lib.common.rest_client [req-a1f73c33-452a-4944-b4c7-c7292cc71d3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1f73c33-452a-4944-b4c7-c7292cc71d3d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "de67ac0c2db64e778089bddb2b45278c", "name": "tempest-VolumesBackupsV318RbacTest-97932863", "password_expires_at": null}, "audit_ids": ["_8bePVn4S4mas1LlAAJN8A"], "expires_at": "2020-12-14T03:27:28.000000Z", "issued_at": "2020-12-14T02:27:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17f409a27f2e448f90043f797b035273", "name": "tempest-VolumesBackupsV318RbacTest-97932863"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:28.278 197 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'reader', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:27:28.296 197 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: backup:backup_project_attribute, [Role]: ['admin', 'reader', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:27:28.299 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:27:28.376 197 INFO tempest.lib.common.rest_client [req-446b4391-629e-43f6-8d7f-bfc9a78bda98 ] Request (VolumesBackupsV318RbacTest:test_show_backup_project_attribute): 200 GET http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles 0.071s 2020-12-14 02:27:28.379 197 DEBUG tempest.lib.common.rest_client [req-446b4391-629e-43f6-8d7f-bfc9a78bda98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-446b4391-629e-43f6-8d7f-bfc9a78bda98', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:28.431 197 INFO tempest.lib.common.rest_client [req-45beffc6-15a2-4eee-9044-e76280081414 ] Request (VolumesBackupsV318RbacTest:test_show_backup_project_attribute): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:27:28.434 197 DEBUG tempest.lib.common.rest_client [req-45beffc6-15a2-4eee-9044-e76280081414 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45beffc6-15a2-4eee-9044-e76280081414', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "de67ac0c2db64e778089bddb2b45278c", "name": "tempest-VolumesBackupsV318RbacTest-97932863", "password_expires_at": null}, "audit_ids": ["-zjcxNIJQS-Qc8Q3Wgw3Lw"], "expires_at": "2020-12-14T03:27:28.000000Z", "issued_at": "2020-12-14T02:27:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17f409a27f2e448f90043f797b035273", "name": "tempest-VolumesBackupsV318RbacTest-97932863"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:28.547 197 INFO tempest.lib.common.rest_client [req-c5c6328d-15f2-477d-8f4b-27e3d796d934 ] Request (VolumesBackupsV318RbacTest:test_show_backup_project_attribute): 200 GET http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c 0.106s 2020-12-14 02:27:28.550 197 DEBUG tempest.lib.common.rest_client [req-c5c6328d-15f2-477d-8f4b-27e3d796d934 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.18', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c5c6328d-15f2-477d-8f4b-27e3d796d934', 'content-length': '891', 'openstack-api-version': 'volume 3.18', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c5c6328d-15f2-477d-8f4b-27e3d796d934', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c'} Body: b'{"backup": {"id": "a47ae8a2-cd8b-43a4-bfd1-da40a718502c", "status": "available", "size": 1, "object_count": 0, "availability_zone": null, "container": "backups", "created_at": "2020-12-14T02:27:19.000000", "updated_at": "2020-12-14T02:27:27.000000", "name": "tempest-VolumesBackupsV318RbacTest-Backup-141805748", "description": null, "fail_reason": null, "volume_id": "33a5b3f1-0726-4e04-a195-e207d081b7c8", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c"}], "is_incremental": false, "has_dependent_backups": false, "snapshot_id": null, "data_timestamp": "2020-12-14T02:27:19.000000", "os-backup-project-attr:project_id": "17f409a27f2e448f90043f797b035273"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:28.563 189 INFO tempest.lib.common.rest_client [req-6fa6c22d-5e87-4e3d-a160-d94e544af904 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.284s 2020-12-14 02:27:28.566 189 DEBUG tempest.lib.common.rest_client [req-6fa6c22d-5e87-4e3d-a160-d94e544af904 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6fa6c22d-5e87-4e3d-a160-d94e544af904', 'x-compute-request-id': 'req-6fa6c22d-5e87-4e3d-a160-d94e544af904', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:28.602 197 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:27:28.758 197 INFO tempest.lib.common.rest_client [req-2471ee06-7f8a-483a-8ac3-a4936fb2548a ] Request (VolumesBackupsV318RbacTest:test_show_backup_project_attribute): 200 GET http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles 0.149s 2020-12-14 02:27:28.761 197 DEBUG tempest.lib.common.rest_client [req-2471ee06-7f8a-483a-8ac3-a4936fb2548a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2471ee06-7f8a-483a-8ac3-a4936fb2548a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273/users/de67ac0c2db64e778089bddb2b45278c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:28.815 197 INFO tempest.lib.common.rest_client [req-1b2eedcb-305d-4874-91a8-6c85bf735c35 ] Request (VolumesBackupsV318RbacTest:test_show_backup_project_attribute): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:27:28.820 197 DEBUG tempest.lib.common.rest_client [req-1b2eedcb-305d-4874-91a8-6c85bf735c35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b2eedcb-305d-4874-91a8-6c85bf735c35', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "de67ac0c2db64e778089bddb2b45278c", "name": "tempest-VolumesBackupsV318RbacTest-97932863", "password_expires_at": null}, "audit_ids": ["KcU8KPCjRG-GBcijneY4zA"], "expires_at": "2020-12-14T03:27:28.000000Z", "issued_at": "2020-12-14T02:27:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "17f409a27f2e448f90043f797b035273", "name": "tempest-VolumesBackupsV318RbacTest-97932863"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_17f409a27f2e448f90043f797b035273", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:29.163 197 INFO tempest.lib.common.rest_client [req-a12fdf39-5eae-4b0b-b022-6abf9f4bdda5 ] Request (VolumesBackupsV318RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c 0.130s 2020-12-14 02:27:29.166 197 DEBUG tempest.lib.common.rest_client [req-a12fdf39-5eae-4b0b-b022-6abf9f4bdda5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-a12fdf39-5eae-4b0b-b022-6abf9f4bdda5', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a12fdf39-5eae-4b0b-b022-6abf9f4bdda5', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/backups/a47ae8a2-cd8b-43a4-bfd1-da40a718502c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:29.275 197 INFO tempest.lib.common.rest_client [req-e41dc8ca-7a6e-435b-ae0c-86fb0b68ead2 ] Request (VolumesBackupsV318RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8 0.102s 2020-12-14 02:27:29.278 197 DEBUG tempest.lib.common.rest_client [req-e41dc8ca-7a6e-435b-ae0c-86fb0b68ead2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e41dc8ca-7a6e-435b-ae0c-86fb0b68ead2', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:29.371 197 INFO tempest.lib.common.rest_client [req-4a08c686-c867-449f-b940-84c23985f2e2 ] Request (VolumesBackupsV318RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8 0.085s 2020-12-14 02:27:29.374 197 DEBUG tempest.lib.common.rest_client [req-4a08c686-c867-449f-b940-84c23985f2e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4a08c686-c867-449f-b940-84c23985f2e2', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4a08c686-c867-449f-b940-84c23985f2e2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8'} Body: b'{"volume": {"id": "33a5b3f1-0726-4e04-a195-e207d081b7c8", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:27:16.000000", "updated_at": "2020-12-14T02:27:29.000000", "name": "tempest-VolumesBackupsV318RbacTest-Volume-1437310003", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8"}], "user_id": "de67ac0c2db64e778089bddb2b45278c", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "17f409a27f2e448f90043f797b035273"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:29.880 189 INFO tempest.lib.common.rest_client [req-81e52868-a00b-49c0-a2e2-6acba27cbac5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.206s 2020-12-14 02:27:29.883 189 DEBUG tempest.lib.common.rest_client [req-81e52868-a00b-49c0-a2e2-6acba27cbac5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-81e52868-a00b-49c0-a2e2-6acba27cbac5', 'x-compute-request-id': 'req-81e52868-a00b-49c0-a2e2-6acba27cbac5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:30.549 197 INFO tempest.lib.common.rest_client [req-b9e5b567-6eac-4254-8159-bb72bcafa259 ] Request (VolumesBackupsV318RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8 0.061s 2020-12-14 02:27:30.551 197 DEBUG tempest.lib.common.rest_client [req-b9e5b567-6eac-4254-8159-bb72bcafa259 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-b9e5b567-6eac-4254-8159-bb72bcafa259', 'x-openstack-request-id': 'req-b9e5b567-6eac-4254-8159-bb72bcafa259', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/17f409a27f2e448f90043f797b035273/volumes/33a5b3f1-0726-4e04-a195-e207d081b7c8'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 33a5b3f1-0726-4e04-a195-e207d081b7c8 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:30.695 197 INFO tempest.lib.common.rest_client [req-32803e0b-020f-40f2-9686-f07a4c179df4 ] Request (VolumesBackupsV318RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/de67ac0c2db64e778089bddb2b45278c 0.137s 2020-12-14 02:27:30.697 197 DEBUG tempest.lib.common.rest_client [req-32803e0b-020f-40f2-9686-f07a4c179df4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32803e0b-020f-40f2-9686-f07a4c179df4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/de67ac0c2db64e778089bddb2b45278c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:30.793 197 INFO tempest.lib.common.rest_client [req-2f00d0f1-b053-4216-beb5-fdb8f0e5bcdb ] Request (VolumesBackupsV318RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:27:30.796 197 DEBUG tempest.lib.common.rest_client [req-2f00d0f1-b053-4216-beb5-fdb8f0e5bcdb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f00d0f1-b053-4216-beb5-fdb8f0e5bcdb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["S6IE0VFhRfSeXScY1p9T7Q"], "expires_at": "2020-12-14T03:27:30.000000Z", "issued_at": "2020-12-14T02:27:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:31.170 197 INFO tempest.lib.common.rest_client [req-a816bfdc-81d1-4556-a628-0bbc052cf69e ] Request (VolumesBackupsV318RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=17f409a27f2e448f90043f797b035273&name=default 0.366s 2020-12-14 02:27:31.173 197 DEBUG tempest.lib.common.rest_client [req-a816bfdc-81d1-4556-a628-0bbc052cf69e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-a816bfdc-81d1-4556-a628-0bbc052cf69e', 'date': 'Mon, 14 Dec 2020 02:27:31 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=17f409a27f2e448f90043f797b035273&name=default'} Body: b'{"security_groups": [{"id": "14770641-66a8-4014-8ce5-d5ca70680f83", "name": "default", "stateful": true, "tenant_id": "17f409a27f2e448f90043f797b035273", "description": "Default security group", "security_group_rules": [{"id": "059ec550-977a-4705-8734-296f15badd6a", "tenant_id": "17f409a27f2e448f90043f797b035273", "security_group_id": "14770641-66a8-4014-8ce5-d5ca70680f83", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:27:31Z", "updated_at": "2020-12-14T02:27:31Z", "revision_number": 0, "project_id": "17f409a27f2e448f90043f797b035273"}, {"id": "61069513-62cb-4170-995b-52ac355375e8", "tenant_id": "17f409a27f2e448f90043f797b035273", "security_group_id": "14770641-66a8-4014-8ce5-d5ca70680f83", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:27:31Z", "updated_at": "2020-12-14T02:27:31Z", "revision_number": 0, "project_id": "17f409a27f2e448f90043f797b035273"}, {"id": "f1dbaa4d-6ceb-4ce1-833b-5ec9a965faa1", "tenant_id": "17f409a27f2e448f90043f797b035273", "security_group_id": "14770641-66a8-4014-8ce5-d5ca70680f83", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "14770641-66a8-4014-8ce5-d5ca70680f83", "description": null, "tags": [], "created_at": "2020-12-14T02:27:31Z", "updated_at": "2020-12-14T02:27:31Z", "revision_number": 0, "project_id": "17f409a27f2e448f90043f797b035273"}, {"id": "f54fafee-f2af-4b23-a8ac-c24830da9957", "tenant_id": "17f409a27f2e448f90043f797b035273", "security_group_id": "14770641-66a8-4014-8ce5-d5ca70680f83", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "14770641-66a8-4014-8ce5-d5ca70680f83", "description": null, "tags": [], "created_at": "2020-12-14T02:27:31Z", "updated_at": "2020-12-14T02:27:31Z", "revision_number": 0, "project_id": "17f409a27f2e448f90043f797b035273"}], "tags": [], "created_at": "2020-12-14T02:27:30Z", "updated_at": "2020-12-14T02:27:31Z", "revision_number": 1, "project_id": "17f409a27f2e448f90043f797b035273"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:31.272 189 INFO tempest.lib.common.rest_client [req-603657ea-4f69-4e30-a60a-9c9d9139daec ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.274s 2020-12-14 02:27:31.275 189 DEBUG tempest.lib.common.rest_client [req-603657ea-4f69-4e30-a60a-9c9d9139daec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-603657ea-4f69-4e30-a60a-9c9d9139daec', 'x-compute-request-id': 'req-603657ea-4f69-4e30-a60a-9c9d9139daec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:31.356 197 INFO tempest.lib.common.rest_client [req-0a21d629-6350-4e54-b3c0-a8de69f3249b ] Request (VolumesBackupsV318RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/14770641-66a8-4014-8ce5-d5ca70680f83 0.175s 2020-12-14 02:27:31.359 197 DEBUG tempest.lib.common.rest_client [req-0a21d629-6350-4e54-b3c0-a8de69f3249b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-0a21d629-6350-4e54-b3c0-a8de69f3249b', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:27:31 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/14770641-66a8-4014-8ce5-d5ca70680f83'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:31.499 197 INFO tempest.lib.common.rest_client [req-33d647db-1ed0-4b45-8d3c-987b7adbdec8 ] Request (VolumesBackupsV318RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273 0.132s 2020-12-14 02:27:31.502 197 DEBUG tempest.lib.common.rest_client [req-33d647db-1ed0-4b45-8d3c-987b7adbdec8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33d647db-1ed0-4b45-8d3c-987b7adbdec8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/17f409a27f2e448f90043f797b035273'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:32.650 189 INFO tempest.lib.common.rest_client [req-191f2dee-d122-4507-b411-08ebe9090842 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.267s 2020-12-14 02:27:32.653 189 DEBUG tempest.lib.common.rest_client [req-191f2dee-d122-4507-b411-08ebe9090842 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-191f2dee-d122-4507-b411-08ebe9090842', 'x-compute-request-id': 'req-191f2dee-d122-4507-b411-08ebe9090842', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:33.973 189 INFO tempest.lib.common.rest_client [req-2c3cbd4a-c8ed-4c2a-ba63-2c8873d4c63b ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.213s 2020-12-14 02:27:33.977 189 DEBUG tempest.lib.common.rest_client [req-2c3cbd4a-c8ed-4c2a-ba63-2c8873d4c63b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2c3cbd4a-c8ed-4c2a-ba63-2c8873d4c63b', 'x-compute-request-id': 'req-2c3cbd4a-c8ed-4c2a-ba63-2c8873d4c63b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:35.315 189 INFO tempest.lib.common.rest_client [req-cf1ec839-1899-4dce-9269-a7e730cb5684 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.230s 2020-12-14 02:27:35.318 189 DEBUG tempest.lib.common.rest_client [req-cf1ec839-1899-4dce-9269-a7e730cb5684 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cf1ec839-1899-4dce-9269-a7e730cb5684', 'x-compute-request-id': 'req-cf1ec839-1899-4dce-9269-a7e730cb5684', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:36.676 189 INFO tempest.lib.common.rest_client [req-9f5270b3-6ace-410c-bfec-c1d137d318f3 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.251s 2020-12-14 02:27:36.679 189 DEBUG tempest.lib.common.rest_client [req-9f5270b3-6ace-410c-bfec-c1d137d318f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9f5270b3-6ace-410c-bfec-c1d137d318f3', 'x-compute-request-id': 'req-9f5270b3-6ace-410c-bfec-c1d137d318f3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:38.001 189 INFO tempest.lib.common.rest_client [req-1c725de0-8561-4525-b425-a1b4b87377d2 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.216s 2020-12-14 02:27:38.004 189 DEBUG tempest.lib.common.rest_client [req-1c725de0-8561-4525-b425-a1b4b87377d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1c725de0-8561-4525-b425-a1b4b87377d2', 'x-compute-request-id': 'req-1c725de0-8561-4525-b425-a1b4b87377d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:39.334 189 INFO tempest.lib.common.rest_client [req-eedc2905-9295-49ee-a056-8e78f08c0c2d ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.223s 2020-12-14 02:27:39.337 189 DEBUG tempest.lib.common.rest_client [req-eedc2905-9295-49ee-a056-8e78f08c0c2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eedc2905-9295-49ee-a056-8e78f08c0c2d', 'x-compute-request-id': 'req-eedc2905-9295-49ee-a056-8e78f08c0c2d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:40.669 189 INFO tempest.lib.common.rest_client [req-dbc2f835-5daf-4a90-9292-bb175c4983a8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.221s 2020-12-14 02:27:40.673 189 DEBUG tempest.lib.common.rest_client [req-dbc2f835-5daf-4a90-9292-bb175c4983a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dbc2f835-5daf-4a90-9292-bb175c4983a8', 'x-compute-request-id': 'req-dbc2f835-5daf-4a90-9292-bb175c4983a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:42.157 189 INFO tempest.lib.common.rest_client [req-643633f3-da7d-42ba-bebf-cc538d3f3f1a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.373s 2020-12-14 02:27:42.160 189 DEBUG tempest.lib.common.rest_client [req-643633f3-da7d-42ba-bebf-cc538d3f3f1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-643633f3-da7d-42ba-bebf-cc538d3f3f1a', 'x-compute-request-id': 'req-643633f3-da7d-42ba-bebf-cc538d3f3f1a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:43.609 189 INFO tempest.lib.common.rest_client [req-09febb3d-9fe4-46fc-b57f-5025ed4f2c92 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.335s 2020-12-14 02:27:43.612 189 DEBUG tempest.lib.common.rest_client [req-09febb3d-9fe4-46fc-b57f-5025ed4f2c92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-09febb3d-9fe4-46fc-b57f-5025ed4f2c92', 'x-compute-request-id': 'req-09febb3d-9fe4-46fc-b57f-5025ed4f2c92', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:44.939 189 INFO tempest.lib.common.rest_client [req-afad86e3-1bad-4612-9929-f4fe2b4e59b1 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.219s 2020-12-14 02:27:44.941 189 DEBUG tempest.lib.common.rest_client [req-afad86e3-1bad-4612-9929-f4fe2b4e59b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-afad86e3-1bad-4612-9929-f4fe2b4e59b1', 'x-compute-request-id': 'req-afad86e3-1bad-4612-9929-f4fe2b4e59b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:46.290 189 INFO tempest.lib.common.rest_client [req-5afc87f5-8db3-4fbd-9279-9a6858c5502a ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.241s 2020-12-14 02:27:46.293 189 DEBUG tempest.lib.common.rest_client [req-5afc87f5-8db3-4fbd-9279-9a6858c5502a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5afc87f5-8db3-4fbd-9279-9a6858c5502a', 'x-compute-request-id': 'req-5afc87f5-8db3-4fbd-9279-9a6858c5502a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:47.713 189 INFO tempest.lib.common.rest_client [req-009b1dde-f79a-4cf8-bf21-ae7337c8eecf ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.312s 2020-12-14 02:27:47.717 189 DEBUG tempest.lib.common.rest_client [req-009b1dde-f79a-4cf8-bf21-ae7337c8eecf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-009b1dde-f79a-4cf8-bf21-ae7337c8eecf', 'x-compute-request-id': 'req-009b1dde-f79a-4cf8-bf21-ae7337c8eecf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:49.346 189 INFO tempest.lib.common.rest_client [req-44f38b06-0492-489a-aa6b-be01d19d4cf5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.521s 2020-12-14 02:27:49.350 189 DEBUG tempest.lib.common.rest_client [req-44f38b06-0492-489a-aa6b-be01d19d4cf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1705', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-44f38b06-0492-489a-aa6b-be01d19d4cf5', 'x-compute-request-id': 'req-44f38b06-0492-489a-aa6b-be01d19d4cf5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:22:47Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:49.682 189 INFO tempest.lib.common.rest_client [req-bfafd7e7-09dc-432f-965b-1199b53ef779 ] Request (ServerActionsRbacTest:setUp): 204 DELETE http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.224s 2020-12-14 02:27:49.686 189 DEBUG tempest.lib.common.rest_client [req-bfafd7e7-09dc-432f-965b-1199b53ef779 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bfafd7e7-09dc-432f-965b-1199b53ef779', 'x-compute-request-id': 'req-bfafd7e7-09dc-432f-965b-1199b53ef779', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:50.069 189 INFO tempest.lib.common.rest_client [req-13b7f384-e4df-48e0-8a25-93f73ac69ef0 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.376s 2020-12-14 02:27:50.074 189 DEBUG tempest.lib.common.rest_client [req-13b7f384-e4df-48e0-8a25-93f73ac69ef0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1711', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-13b7f384-e4df-48e0-8a25-93f73ac69ef0', 'x-compute-request-id': 'req-13b7f384-e4df-48e0-8a25-93f73ac69ef0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:27:50Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:51.355 189 INFO tempest.lib.common.rest_client [req-851d92e3-0ca5-4815-b445-c6914aa054e5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.155s 2020-12-14 02:27:51.358 189 DEBUG tempest.lib.common.rest_client [req-851d92e3-0ca5-4815-b445-c6914aa054e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1669', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-851d92e3-0ca5-4815-b445-c6914aa054e5', 'x-compute-request-id': 'req-851d92e3-0ca5-4815-b445-c6914aa054e5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"server": {"id": "820a810c-9e8d-4f74-a0be-3acfa48184b1", "name": "tempest-ServerActionsRbacTest-server-1369510427", "status": "SHUTOFF", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:21:30Z", "updated": "2020-12-14T02:27:51Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:8a:58:16"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:22:37.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbdc", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "stopped", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:52.562 189 INFO tempest.lib.common.rest_client [req-3b7a7c8c-efc8-49dd-b548-e2a766529135 ] Request (ServerActionsRbacTest:setUp): 404 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.106s 2020-12-14 02:27:52.567 189 DEBUG tempest.lib.common.rest_client [req-3b7a7c8c-efc8-49dd-b548-e2a766529135 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-3b7a7c8c-efc8-49dd-b548-e2a766529135', 'x-compute-request-id': 'req-3b7a7c8c-efc8-49dd-b548-e2a766529135', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 820a810c-9e8d-4f74-a0be-3acfa48184b1 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:52.717 189 INFO tempest.lib.common.rest_client [req-831b85b4-7e18-44ac-a1ec-4614b4d27457 ] Request (ServerActionsRbacTest:setUp): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.059s 2020-12-14 02:27:52.721 189 DEBUG tempest.lib.common.rest_client [req-831b85b4-7e18-44ac-a1ec-4614b4d27457 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-831b85b4-7e18-44ac-a1ec-4614b4d27457', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["j3Yz1gB1SQe53tD8v1HgEA"], "expires_at": "2020-12-14T03:27:52.000000Z", "issued_at": "2020-12-14T02:27:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:52.725 189 INFO tempest.lib.common.fixed_network [-] (ServerActionsRbacTest:setUp) Found network {'id': '1c085583-16aa-4f2c-b48c-e9cce6ab197b', 'name': 'tempest-ServerActionsRbacTest-2074532455-network', 'tenant_id': '3400d8caa66043d0b7fa128b68a28ecc', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3400d8caa66043d0b7fa128b68a28ecc', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:14:02Z', 'updated_at': '2020-12-14T02:14:02Z', 'revision_number': 1} available for tenant 2020-12-14 02:27:53.874 189 INFO tempest.lib.common.rest_client [req-eb976a86-ae0f-442e-a695-b532d249bb93 ] Request (ServerActionsRbacTest:setUp): 202 POST http://172.30.13.94/compute/v2.1/servers 1.141s 2020-12-14 02:27:53.877 189 DEBUG tempest.lib.common.rest_client [req-eb976a86-ae0f-442e-a695-b532d249bb93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerActionsRbacTest-server-1037513891", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "adminPass": "R4^4lLVXZ~!lw5Q", "networks": [{"uuid": "1c085583-16aa-4f2c-b48c-e9cce6ab197b"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '385', 'location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eb976a86-ae0f-442e-a695-b532d249bb93', 'x-compute-request-id': 'req-eb976a86-ae0f-442e-a695-b532d249bb93', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "R4^4lLVXZ~!lw5Q"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:54.022 189 INFO tempest.lib.common.rest_client [req-03c08364-502f-432c-920c-896975fac8c8 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.114s 2020-12-14 02:27:54.025 189 DEBUG tempest.lib.common.rest_client [req-03c08364-502f-432c-920c-896975fac8c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1397', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-03c08364-502f-432c-920c-896975fac8c8', 'x-compute-request-id': 'req-03c08364-502f-432c-920c-896975fac8c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:54Z", "updated": "2020-12-14T02:27:53Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:55.309 189 INFO tempest.lib.common.rest_client [req-2bbc0856-d4f0-4ffe-9b9a-8f9bcdf568f5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.163s 2020-12-14 02:27:55.312 189 DEBUG tempest.lib.common.rest_client [req-2bbc0856-d4f0-4ffe-9b9a-8f9bcdf568f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1484', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2bbc0856-d4f0-4ffe-9b9a-8f9bcdf568f5', 'x-compute-request-id': 'req-2bbc0856-d4f0-4ffe-9b9a-8f9bcdf568f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:27:55Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:55.423 189 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 1 second wait 2020-12-14 02:27:56.733 189 INFO tempest.lib.common.rest_client [req-2efee6ec-8cf5-4fe0-b59a-f1623f96191f ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.301s 2020-12-14 02:27:56.738 189 DEBUG tempest.lib.common.rest_client [req-2efee6ec-8cf5-4fe0-b59a-f1623f96191f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2efee6ec-8cf5-4fe0-b59a-f1623f96191f', 'x-compute-request-id': 'req-2efee6ec-8cf5-4fe0-b59a-f1623f96191f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:27:56Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:56.860 189 INFO tempest.common.waiters [-] State transition "BUILD/None" ==> "BUILD/spawning" after 2 second wait 2020-12-14 02:27:58.167 189 INFO tempest.lib.common.rest_client [req-e52a6960-27cf-48d9-a6b6-5d09f03b2965 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.298s 2020-12-14 02:27:58.170 189 DEBUG tempest.lib.common.rest_client [req-e52a6960-27cf-48d9-a6b6-5d09f03b2965 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e52a6960-27cf-48d9-a6b6-5d09f03b2965', 'x-compute-request-id': 'req-e52a6960-27cf-48d9-a6b6-5d09f03b2965', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:27:56Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:27:59.632 189 INFO tempest.lib.common.rest_client [req-2089e528-322d-481f-8d01-0831456c1ee5 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.343s 2020-12-14 02:27:59.635 189 DEBUG tempest.lib.common.rest_client [req-2089e528-322d-481f-8d01-0831456c1ee5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:27:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2089e528-322d-481f-8d01-0831456c1ee5', 'x-compute-request-id': 'req-2089e528-322d-481f-8d01-0831456c1ee5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:27:56Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:00.985 189 INFO tempest.lib.common.rest_client [req-4cf3050e-a777-46b0-a39c-7cd2dacc7933 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.235s 2020-12-14 02:28:00.988 189 DEBUG tempest.lib.common.rest_client [req-4cf3050e-a777-46b0-a39c-7cd2dacc7933 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4cf3050e-a777-46b0-a39c-7cd2dacc7933', 'x-compute-request-id': 'req-4cf3050e-a777-46b0-a39c-7cd2dacc7933', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "BUILD", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:27:56Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:02.401 189 INFO tempest.lib.common.rest_client [req-27d61cee-0d1c-46f1-b555-d89a2f6c5284 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.294s 2020-12-14 02:28:02.404 189 DEBUG tempest.lib.common.rest_client [req-27d61cee-0d1c-46f1-b555-d89a2f6c5284 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-27d61cee-0d1c-46f1-b555-d89a2f6c5284', 'x-compute-request-id': 'req-27d61cee-0d1c-46f1-b555-d89a2f6c5284', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:02Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:02.520 189 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 8 second wait 2020-12-14 02:28:02.523 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:28:02.528 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.531 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.535 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.538 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.542 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.546 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.550 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.553 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.556 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.558 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.561 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.564 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.567 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.570 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.574 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.577 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.580 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.583 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.586 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.589 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.591 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.594 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.597 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.600 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.603 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.605 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.608 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.611 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.614 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.616 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.619 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.622 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.624 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.627 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.630 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.633 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.635 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.638 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.641 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.644 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.647 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.650 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.652 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.656 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.659 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.661 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.664 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.667 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.669 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.672 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.675 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.677 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.679 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.681 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.684 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.686 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.691 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.693 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.695 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.697 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.699 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.702 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.703 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.705 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.708 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.710 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.712 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.714 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.715 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.718 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.719 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:02.728 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-pause-server:unpause, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:28:02.913 189 INFO tempest.lib.common.rest_client [req-d2088fab-28b4-4f1c-8ca7-243c750fae1e ] Request (ServerActionsRbacTest:test_unpause_server): 202 POST http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42/action 0.181s 2020-12-14 02:28:02.916 189 DEBUG tempest.lib.common.rest_client [req-d2088fab-28b4-4f1c-8ca7-243c750fae1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"pause": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d2088fab-28b4-4f1c-8ca7-243c750fae1e', 'x-compute-request-id': 'req-d2088fab-28b4-4f1c-8ca7-243c750fae1e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:03.288 189 INFO tempest.lib.common.rest_client [req-84ac3083-62d0-4b16-80e2-377bf8092fe7 ] Request (ServerActionsRbacTest:test_unpause_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.364s 2020-12-14 02:28:03.291 189 DEBUG tempest.lib.common.rest_client [req-84ac3083-62d0-4b16-80e2-377bf8092fe7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1704', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-84ac3083-62d0-4b16-80e2-377bf8092fe7', 'x-compute-request-id': 'req-84ac3083-62d0-4b16-80e2-377bf8092fe7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "PAUSED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:03Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "paused", "OS-EXT-STS:power_state": 3, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:03.377 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:28:03.503 189 INFO tempest.lib.common.rest_client [req-8858ca41-8d8a-4426-bc72-fc58a7748c8d ] Request (ServerActionsRbacTest:test_unpause_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.121s 2020-12-14 02:28:03.505 189 DEBUG tempest.lib.common.rest_client [req-8858ca41-8d8a-4426-bc72-fc58a7748c8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8858ca41-8d8a-4426-bc72-fc58a7748c8d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:03.559 189 INFO tempest.lib.common.rest_client [req-17fab54d-7970-4fc7-b6e4-0e8f4cf1563c ] Request (ServerActionsRbacTest:test_unpause_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:28:03.562 189 DEBUG tempest.lib.common.rest_client [req-17fab54d-7970-4fc7-b6e4-0e8f4cf1563c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17fab54d-7970-4fc7-b6e4-0e8f4cf1563c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["NC9mYUVDTaqRNylwbdDQ9w"], "expires_at": "2020-12-14T03:28:03.000000Z", "issued_at": "2020-12-14T02:28:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:03.813 189 INFO tempest.lib.common.rest_client [req-8d5784dd-f5f5-4885-a847-e5c8b205bd30 ] Request (ServerActionsRbacTest:test_unpause_server): 202 POST http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42/action 0.243s 2020-12-14 02:28:03.817 189 DEBUG tempest.lib.common.rest_client [req-8d5784dd-f5f5-4885-a847-e5c8b205bd30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unpause": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8d5784dd-f5f5-4885-a847-e5c8b205bd30', 'x-compute-request-id': 'req-8d5784dd-f5f5-4885-a847-e5c8b205bd30', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:03.819 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:28:03.891 189 INFO tempest.lib.common.rest_client [req-af5eb80a-4011-4e4d-a328-4b2c10302397 ] Request (ServerActionsRbacTest:test_unpause_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.066s 2020-12-14 02:28:03.894 189 DEBUG tempest.lib.common.rest_client [req-af5eb80a-4011-4e4d-a328-4b2c10302397 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af5eb80a-4011-4e4d-a328-4b2c10302397', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:03.949 189 INFO tempest.lib.common.rest_client [req-6666ae27-11f4-47f7-8d81-9a65ba32cfab ] Request (ServerActionsRbacTest:test_unpause_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:28:03.953 189 DEBUG tempest.lib.common.rest_client [req-6666ae27-11f4-47f7-8d81-9a65ba32cfab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6666ae27-11f4-47f7-8d81-9a65ba32cfab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["xs6IPmT3QYmgBANhXBlwiQ"], "expires_at": "2020-12-14T03:28:03.000000Z", "issued_at": "2020-12-14T02:28:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:04.351 189 INFO tempest.lib.common.rest_client [req-cc028d61-5de6-4d4f-ad1f-d3f550b22191 ] Request (ServerActionsRbacTest:test_unpause_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.391s 2020-12-14 02:28:04.354 189 DEBUG tempest.lib.common.rest_client [req-cc028d61-5de6-4d4f-ad1f-d3f550b22191 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cc028d61-5de6-4d4f-ad1f-d3f550b22191', 'x-compute-request-id': 'req-cc028d61-5de6-4d4f-ad1f-d3f550b22191', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:04Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:04.892 189 INFO tempest.lib.common.rest_client [req-ca6d63aa-ce22-4f5f-952b-d29b8b56be96 ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.424s 2020-12-14 02:28:04.895 189 DEBUG tempest.lib.common.rest_client [req-ca6d63aa-ce22-4f5f-952b-d29b8b56be96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ca6d63aa-ce22-4f5f-952b-d29b8b56be96', 'x-compute-request-id': 'req-ca6d63aa-ce22-4f5f-952b-d29b8b56be96', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:04Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:05.806 189 INFO tempest.lib.common.rest_client [req-f323180f-19bc-465f-ae86-3f6ec58fab22 ] Request (ServerActionsRbacTest:setUp): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.209s 2020-12-14 02:28:05.809 189 DEBUG tempest.lib.common.rest_client [req-f323180f-19bc-465f-ae86-3f6ec58fab22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f323180f-19bc-465f-ae86-3f6ec58fab22', 'x-compute-request-id': 'req-f323180f-19bc-465f-ae86-3f6ec58fab22', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:04Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:05.911 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:28:05.916 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.919 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.923 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.927 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.932 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.936 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.942 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.946 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.949 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.953 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.957 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.960 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.963 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.965 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.968 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.970 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.973 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.975 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.977 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.980 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.982 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.984 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.986 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.988 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.990 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.992 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.995 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.997 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:05.999 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.002 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.004 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.007 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.009 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.011 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.013 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.016 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.018 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.020 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.023 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.025 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.028 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.030 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.032 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.036 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.038 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.040 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.043 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.045 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.047 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.050 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.052 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.055 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.057 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.060 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.063 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.066 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.070 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.073 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.075 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.078 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.080 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.082 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.085 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.087 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.089 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.091 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.093 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.095 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.098 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.100 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.102 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:28:06.111 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-shelve:unshelve, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:28:06.456 189 INFO tempest.lib.common.rest_client [req-b7aabe21-a66b-4616-8526-1b7c7226ac4f ] Request (ServerActionsRbacTest:test_unshelve_server): 202 POST http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42/action 0.339s 2020-12-14 02:28:06.459 189 DEBUG tempest.lib.common.rest_client [req-b7aabe21-a66b-4616-8526-1b7c7226ac4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"shelve": {}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b7aabe21-a66b-4616-8526-1b7c7226ac4f', 'x-compute-request-id': 'req-b7aabe21-a66b-4616-8526-1b7c7226ac4f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:06.681 189 INFO tempest.lib.common.rest_client [req-5fd74470-a2c0-4c0f-ba06-6758cfce2a3e ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.216s 2020-12-14 02:28:06.685 189 DEBUG tempest.lib.common.rest_client [req-5fd74470-a2c0-4c0f-ba06-6758cfce2a3e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5fd74470-a2c0-4c0f-ba06-6758cfce2a3e', 'x-compute-request-id': 'req-5fd74470-a2c0-4c0f-ba06-6758cfce2a3e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:06Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:07.973 189 INFO tempest.lib.common.rest_client [req-b8d9d169-8746-449c-9dac-2136d9304938 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.198s 2020-12-14 02:28:07.975 189 DEBUG tempest.lib.common.rest_client [req-b8d9d169-8746-449c-9dac-2136d9304938 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1746', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b8d9d169-8746-449c-9dac-2136d9304938', 'x-compute-request-id': 'req-b8d9d169-8746-449c-9dac-2136d9304938', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:07Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_pending_upload", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:08.079 189 INFO tempest.common.waiters [-] State transition "ACTIVE/shelving" ==> "ACTIVE/shelving_image_pending_upload" after 2 second wait 2020-12-14 02:28:09.350 189 INFO tempest.lib.common.rest_client [req-80277c07-a9d1-464a-8f2b-12b6cf5c1fa3 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.263s 2020-12-14 02:28:09.354 189 DEBUG tempest.lib.common.rest_client [req-80277c07-a9d1-464a-8f2b-12b6cf5c1fa3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1741', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-80277c07-a9d1-464a-8f2b-12b6cf5c1fa3', 'x-compute-request-id': 'req-80277c07-a9d1-464a-8f2b-12b6cf5c1fa3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:08Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:09.463 189 INFO tempest.common.waiters [-] State transition "ACTIVE/shelving_image_pending_upload" ==> "ACTIVE/shelving_image_uploading" after 3 second wait 2020-12-14 02:28:10.700 189 INFO tempest.lib.common.rest_client [req-b96fa51f-2ed5-4313-88bd-33c41cb3b61b ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.229s 2020-12-14 02:28:10.704 189 DEBUG tempest.lib.common.rest_client [req-b96fa51f-2ed5-4313-88bd-33c41cb3b61b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1741', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b96fa51f-2ed5-4313-88bd-33c41cb3b61b', 'x-compute-request-id': 'req-b96fa51f-2ed5-4313-88bd-33c41cb3b61b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:08Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:12.248 189 INFO tempest.lib.common.rest_client [req-017757f2-7b7e-4322-91d1-608a3efd9bea ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.443s 2020-12-14 02:28:12.251 189 DEBUG tempest.lib.common.rest_client [req-017757f2-7b7e-4322-91d1-608a3efd9bea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1741', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-017757f2-7b7e-4322-91d1-608a3efd9bea', 'x-compute-request-id': 'req-017757f2-7b7e-4322-91d1-608a3efd9bea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:08Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:16.393 189 INFO tempest.lib.common.rest_client [req-6021eb80-3e87-41de-83e3-2c77829d6e25 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 3.029s 2020-12-14 02:28:16.397 189 DEBUG tempest.lib.common.rest_client [req-6021eb80-3e87-41de-83e3-2c77829d6e25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1741', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6021eb80-3e87-41de-83e3-2c77829d6e25', 'x-compute-request-id': 'req-6021eb80-3e87-41de-83e3-2c77829d6e25', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:08Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "shelving_image_uploading", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:17.885 189 INFO tempest.lib.common.rest_client [req-d5908e4d-99c5-44ef-863f-cfee16adb70e ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.373s 2020-12-14 02:28:17.889 189 DEBUG tempest.lib.common.rest_client [req-d5908e4d-99c5-44ef-863f-cfee16adb70e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1648', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d5908e4d-99c5-44ef-863f-cfee16adb70e', 'x-compute-request-id': 'req-d5908e4d-99c5-44ef-863f-cfee16adb70e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:17Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:18.016 189 INFO tempest.common.waiters [-] State transition "ACTIVE/shelving_image_uploading" ==> "SHELVED_OFFLOADED/None" after 12 second wait 2020-12-14 02:28:18.019 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:28:18.195 189 INFO tempest.lib.common.rest_client [req-9e9886a5-38d4-4837-8425-26c4a11b070f ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.170s 2020-12-14 02:28:18.197 189 DEBUG tempest.lib.common.rest_client [req-9e9886a5-38d4-4837-8425-26c4a11b070f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e9886a5-38d4-4837-8425-26c4a11b070f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:18.295 189 INFO tempest.lib.common.rest_client [req-adacd04a-8ddd-4dcd-a43b-e7446b1c8a23 ] Request (ServerActionsRbacTest:test_unshelve_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:28:18.298 189 DEBUG tempest.lib.common.rest_client [req-adacd04a-8ddd-4dcd-a43b-e7446b1c8a23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-adacd04a-8ddd-4dcd-a43b-e7446b1c8a23', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["F5zzVMexR5uIjGV8w9OTJg"], "expires_at": "2020-12-14T03:28:18.000000Z", "issued_at": "2020-12-14T02:28:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:18.798 189 INFO tempest.lib.common.rest_client [req-d747324c-cf3e-41e3-88e5-f0e04c089c31 ] Request (ServerActionsRbacTest:test_unshelve_server): 202 POST http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42/action 0.492s 2020-12-14 02:28:18.802 189 DEBUG tempest.lib.common.rest_client [req-d747324c-cf3e-41e3-88e5-f0e04c089c31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"unshelve": null} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d747324c-cf3e-41e3-88e5-f0e04c089c31', 'x-compute-request-id': 'req-d747324c-cf3e-41e3-88e5-f0e04c089c31', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:18.805 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:28:19.070 189 INFO tempest.lib.common.rest_client [req-fb8857cc-36e0-410d-a9d6-95cf870d1fb0 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles 0.258s 2020-12-14 02:28:19.074 189 DEBUG tempest.lib.common.rest_client [req-fb8857cc-36e0-410d-a9d6-95cf870d1fb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fb8857cc-36e0-410d-a9d6-95cf870d1fb0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc/users/fc49b78fc1304d33aaa92419232a1e0d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:19.171 189 INFO tempest.lib.common.rest_client [req-dedce445-5538-4799-8d8b-b577e57aa9fe ] Request (ServerActionsRbacTest:test_unshelve_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:28:19.175 189 DEBUG tempest.lib.common.rest_client [req-dedce445-5538-4799-8d8b-b577e57aa9fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dedce445-5538-4799-8d8b-b577e57aa9fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc49b78fc1304d33aaa92419232a1e0d", "name": "tempest-ServerActionsRbacTest-1901705202", "password_expires_at": null}, "audit_ids": ["wApXOZ4QT0SY8Znzke7F9g"], "expires_at": "2020-12-14T03:28:19.000000Z", "issued_at": "2020-12-14T02:28:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3400d8caa66043d0b7fa128b68a28ecc", "name": "tempest-ServerActionsRbacTest-1901705202"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3400d8caa66043d0b7fa128b68a28ecc", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:19.739 189 INFO tempest.lib.common.rest_client [req-b49afa0f-c895-47fd-b679-6864b4c01f8b ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.552s 2020-12-14 02:28:19.743 189 DEBUG tempest.lib.common.rest_client [req-b49afa0f-c895-47fd-b679-6864b4c01f8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1656', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b49afa0f-c895-47fd-b679-6864b4c01f8b', 'x-compute-request-id': 'req-b49afa0f-c895-47fd-b679-6864b4c01f8b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:19Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "unshelving", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:21.073 189 INFO tempest.lib.common.rest_client [req-d98409c8-0b4e-43ad-b9a4-167b358d581a ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.205s 2020-12-14 02:28:21.077 189 DEBUG tempest.lib.common.rest_client [req-d98409c8-0b4e-43ad-b9a4-167b358d581a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d98409c8-0b4e-43ad-b9a4-167b358d581a', 'x-compute-request-id': 'req-d98409c8-0b4e-43ad-b9a4-167b358d581a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "dfd6c3b2-f392-4aec-80cd-af75ec75d4fd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dfd6c3b2-f392-4aec-80cd-af75ec75d4fd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:21Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:21.161 189 INFO tempest.common.waiters [-] State transition "SHELVED_OFFLOADED/unshelving" ==> "SHELVED_OFFLOADED/spawning" after 2 second wait 2020-12-14 02:28:26.660 189 INFO tempest.lib.common.rest_client [req-03ffe4f9-964b-4515-b765-d556f82f1a3b ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 4.490s 2020-12-14 02:28:26.663 189 DEBUG tempest.lib.common.rest_client [req-03ffe4f9-964b-4515-b765-d556f82f1a3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-03ffe4f9-964b-4515-b765-d556f82f1a3b', 'x-compute-request-id': 'req-03ffe4f9-964b-4515-b765-d556f82f1a3b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "dfd6c3b2-f392-4aec-80cd-af75ec75d4fd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dfd6c3b2-f392-4aec-80cd-af75ec75d4fd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:21Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:28.023 189 INFO tempest.lib.common.rest_client [req-790a971c-3e9c-4ae2-be00-76a1edb5f38c ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.252s 2020-12-14 02:28:28.028 189 DEBUG tempest.lib.common.rest_client [req-790a971c-3e9c-4ae2-be00-76a1edb5f38c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-790a971c-3e9c-4ae2-be00-76a1edb5f38c', 'x-compute-request-id': 'req-790a971c-3e9c-4ae2-be00-76a1edb5f38c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "dfd6c3b2-f392-4aec-80cd-af75ec75d4fd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dfd6c3b2-f392-4aec-80cd-af75ec75d4fd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:21Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:29.378 189 INFO tempest.lib.common.rest_client [req-74f98ad9-8f01-4e98-843b-7b4cd02bf237 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.201s 2020-12-14 02:28:29.382 189 DEBUG tempest.lib.common.rest_client [req-74f98ad9-8f01-4e98-843b-7b4cd02bf237 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-74f98ad9-8f01-4e98-843b-7b4cd02bf237', 'x-compute-request-id': 'req-74f98ad9-8f01-4e98-843b-7b4cd02bf237', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "dfd6c3b2-f392-4aec-80cd-af75ec75d4fd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dfd6c3b2-f392-4aec-80cd-af75ec75d4fd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:21Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:30.716 189 INFO tempest.lib.common.rest_client [req-be154f80-b5df-47d5-b23c-667b802c9c39 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.228s 2020-12-14 02:28:30.719 189 DEBUG tempest.lib.common.rest_client [req-be154f80-b5df-47d5-b23c-667b802c9c39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-be154f80-b5df-47d5-b23c-667b802c9c39', 'x-compute-request-id': 'req-be154f80-b5df-47d5-b23c-667b802c9c39', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "dfd6c3b2-f392-4aec-80cd-af75ec75d4fd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dfd6c3b2-f392-4aec-80cd-af75ec75d4fd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:21Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:32.062 189 INFO tempest.lib.common.rest_client [req-ec5801d0-f999-4c8f-b867-40f3af60aed8 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.252s 2020-12-14 02:28:32.066 189 DEBUG tempest.lib.common.rest_client [req-ec5801d0-f999-4c8f-b867-40f3af60aed8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ec5801d0-f999-4c8f-b867-40f3af60aed8', 'x-compute-request-id': 'req-ec5801d0-f999-4c8f-b867-40f3af60aed8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "dfd6c3b2-f392-4aec-80cd-af75ec75d4fd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dfd6c3b2-f392-4aec-80cd-af75ec75d4fd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:21Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:33.755 189 INFO tempest.lib.common.rest_client [req-a6170bc2-bd41-49d6-ae78-adbd2d2931bf ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.581s 2020-12-14 02:28:33.758 189 DEBUG tempest.lib.common.rest_client [req-a6170bc2-bd41-49d6-ae78-adbd2d2931bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a6170bc2-bd41-49d6-ae78-adbd2d2931bf', 'x-compute-request-id': 'req-a6170bc2-bd41-49d6-ae78-adbd2d2931bf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "dfd6c3b2-f392-4aec-80cd-af75ec75d4fd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dfd6c3b2-f392-4aec-80cd-af75ec75d4fd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:21Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:35.115 189 INFO tempest.lib.common.rest_client [req-c706dd7d-cd4f-4421-b0d4-2773ac3fec87 ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.246s 2020-12-14 02:28:35.118 189 DEBUG tempest.lib.common.rest_client [req-c706dd7d-cd4f-4421-b0d4-2773ac3fec87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c706dd7d-cd4f-4421-b0d4-2773ac3fec87', 'x-compute-request-id': 'req-c706dd7d-cd4f-4421-b0d4-2773ac3fec87', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "dfd6c3b2-f392-4aec-80cd-af75ec75d4fd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dfd6c3b2-f392-4aec-80cd-af75ec75d4fd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:21Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:36.412 189 INFO tempest.lib.common.rest_client [req-d0777db6-2b50-441a-9427-2fcd9cc1d8ca ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.183s 2020-12-14 02:28:36.415 189 DEBUG tempest.lib.common.rest_client [req-d0777db6-2b50-441a-9427-2fcd9cc1d8ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1732', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d0777db6-2b50-441a-9427-2fcd9cc1d8ca', 'x-compute-request-id': 'req-d0777db6-2b50-441a-9427-2fcd9cc1d8ca', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "SHELVED_OFFLOADED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "dfd6c3b2-f392-4aec-80cd-af75ec75d4fd", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/dfd6c3b2-f392-4aec-80cd-af75ec75d4fd"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:21Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "shelved_offloaded", "OS-EXT-STS:power_state": 4, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:37.847 189 INFO tempest.lib.common.rest_client [req-9d8609bb-0ab6-4580-9b2f-cabe59abe3ea ] Request (ServerActionsRbacTest:test_unshelve_server): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.324s 2020-12-14 02:28:37.850 189 DEBUG tempest.lib.common.rest_client [req-9d8609bb-0ab6-4580-9b2f-cabe59abe3ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9d8609bb-0ab6-4580-9b2f-cabe59abe3ea', 'x-compute-request-id': 'req-9d8609bb-0ab6-4580-9b2f-cabe59abe3ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:37Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:36.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:37.977 189 INFO tempest.common.waiters [-] State transition "SHELVED_OFFLOADED/spawning" ==> "ACTIVE/None" after 18 second wait 2020-12-14 02:28:38.199 189 INFO tempest.lib.common.rest_client [req-e08c5fdc-21e3-48b2-b2d0-bdf41bb3507d ] Request (ServerActionsRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.213s 2020-12-14 02:28:38.202 189 DEBUG tempest.lib.common.rest_client [req-e08c5fdc-21e3-48b2-b2d0-bdf41bb3507d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e08c5fdc-21e3-48b2-b2d0-bdf41bb3507d', 'x-compute-request-id': 'req-e08c5fdc-21e3-48b2-b2d0-bdf41bb3507d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:37Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:36.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:38.640 189 INFO tempest.lib.common.rest_client [req-49af298d-5c4a-43b6-ba5b-b0fec0114c23 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.261s 2020-12-14 02:28:38.643 189 DEBUG tempest.lib.common.rest_client [req-49af298d-5c4a-43b6-ba5b-b0fec0114c23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-49af298d-5c4a-43b6-ba5b-b0fec0114c23', 'x-compute-request-id': 'req-49af298d-5c4a-43b6-ba5b-b0fec0114c23', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:38.905 189 INFO tempest.lib.common.rest_client [req-2959bf17-1370-4a34-9052-a6834a1a4b4c ] Request (ServerActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.257s 2020-12-14 02:28:38.909 189 DEBUG tempest.lib.common.rest_client [req-2959bf17-1370-4a34-9052-a6834a1a4b4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2959bf17-1370-4a34-9052-a6834a1a4b4c', 'x-compute-request-id': 'req-2959bf17-1370-4a34-9052-a6834a1a4b4c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:39Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:36.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:40.256 189 INFO tempest.lib.common.rest_client [req-a2e167be-2cf6-4009-b788-33b99567e637 ] Request (ServerActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.239s 2020-12-14 02:28:40.260 189 DEBUG tempest.lib.common.rest_client [req-a2e167be-2cf6-4009-b788-33b99567e637 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a2e167be-2cf6-4009-b788-33b99567e637', 'x-compute-request-id': 'req-a2e167be-2cf6-4009-b788-33b99567e637', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:40Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:36.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:41.648 189 INFO tempest.lib.common.rest_client [req-375756f5-02ef-44bf-b749-76974e2228b6 ] Request (ServerActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.287s 2020-12-14 02:28:41.651 189 DEBUG tempest.lib.common.rest_client [req-375756f5-02ef-44bf-b749-76974e2228b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-375756f5-02ef-44bf-b749-76974e2228b6', 'x-compute-request-id': 'req-375756f5-02ef-44bf-b749-76974e2228b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:40Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:36.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:43.058 189 INFO tempest.lib.common.rest_client [req-fe26f442-6617-4630-9db5-18da1df66401 ] Request (ServerActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.298s 2020-12-14 02:28:43.061 189 DEBUG tempest.lib.common.rest_client [req-fe26f442-6617-4630-9db5-18da1df66401 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fe26f442-6617-4630-9db5-18da1df66401', 'x-compute-request-id': 'req-fe26f442-6617-4630-9db5-18da1df66401', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:40Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:36.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:44.503 189 INFO tempest.lib.common.rest_client [req-8a50a256-9f02-4a98-ac7d-14cd51f390e6 ] Request (ServerActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.334s 2020-12-14 02:28:44.505 189 DEBUG tempest.lib.common.rest_client [req-8a50a256-9f02-4a98-ac7d-14cd51f390e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8a50a256-9f02-4a98-ac7d-14cd51f390e6', 'x-compute-request-id': 'req-8a50a256-9f02-4a98-ac7d-14cd51f390e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "ACTIVE", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:40Z", "addresses": {"tempest-ServerActionsRbacTest-2074532455-network": [{"version": 4, "addr": "192.168.120.13", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:61:16:83"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:36.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:45.839 189 INFO tempest.lib.common.rest_client [req-6cfc921a-6529-4f42-b1bb-d770b871ca2e ] Request (ServerActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.226s 2020-12-14 02:28:45.841 189 DEBUG tempest.lib.common.rest_client [req-6cfc921a-6529-4f42-b1bb-d770b871ca2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1518', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6cfc921a-6529-4f42-b1bb-d770b871ca2e', 'x-compute-request-id': 'req-6cfc921a-6529-4f42-b1bb-d770b871ca2e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"server": {"id": "78efd6cd-3203-4dd2-9cc1-85e10596ef42", "name": "tempest-ServerActionsRbacTest-server-1037513891", "status": "DELETED", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "user_id": "fc49b78fc1304d33aaa92419232a1e0d", "metadata": {}, "hostId": "a8d6551881409699edd0150deb5667017751fbac5db6e1ad0e3ce94b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:27:53Z", "updated": "2020-12-14T02:28:45Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:28:36.000000", "OS-SRV-USG:terminated_at": "2020-12-14T02:28:45.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbe7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:45.945 189 INFO tempest.common.waiters [-] State transition "ACTIVE/deleting" ==> "DELETED/None" after 6 second wait 2020-12-14 02:28:47.039 189 INFO tempest.lib.common.rest_client [req-cbf2ed72-26f0-44c1-a79d-fce4353a491c ] Request (ServerActionsRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42 0.085s 2020-12-14 02:28:47.042 189 DEBUG tempest.lib.common.rest_client [req-cbf2ed72-26f0-44c1-a79d-fce4353a491c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-cbf2ed72-26f0-44c1-a79d-fce4353a491c', 'x-compute-request-id': 'req-cbf2ed72-26f0-44c1-a79d-fce4353a491c', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/78efd6cd-3203-4dd2-9cc1-85e10596ef42'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 78efd6cd-3203-4dd2-9cc1-85e10596ef42 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:47.117 189 INFO tempest.lib.common.rest_client [req-21dbee2a-351f-4c66-ad4d-26ec4e3793db ] Request (ServerActionsRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.069s 2020-12-14 02:28:47.119 189 DEBUG tempest.lib.common.rest_client [req-21dbee2a-351f-4c66-ad4d-26ec4e3793db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-21dbee2a-351f-4c66-ad4d-26ec4e3793db', 'x-compute-request-id': 'req-21dbee2a-351f-4c66-ad4d-26ec4e3793db', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 820a810c-9e8d-4f74-a0be-3acfa48184b1 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:47.198 189 INFO tempest.lib.common.rest_client [req-c3897239-668f-4d43-9c3e-64381b2c5934 ] Request (ServerActionsRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1 0.073s 2020-12-14 02:28:47.201 189 DEBUG tempest.lib.common.rest_client [req-c3897239-668f-4d43-9c3e-64381b2c5934 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-c3897239-668f-4d43-9c3e-64381b2c5934', 'x-compute-request-id': 'req-c3897239-668f-4d43-9c3e-64381b2c5934', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/820a810c-9e8d-4f74-a0be-3acfa48184b1'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 820a810c-9e8d-4f74-a0be-3acfa48184b1 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:47.255 189 INFO tempest.lib.common.rest_client [req-3b52b3ee-d601-47fe-a15e-1746fc90a7e0 ] Request (ServerActionsRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/os-keypairs/tempest-keypair-175601893 0.047s 2020-12-14 02:28:47.257 189 DEBUG tempest.lib.common.rest_client [req-3b52b3ee-d601-47fe-a15e-1746fc90a7e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3b52b3ee-d601-47fe-a15e-1746fc90a7e0', 'x-compute-request-id': 'req-3b52b3ee-d601-47fe-a15e-1746fc90a7e0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-keypair-175601893'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:47.493 189 INFO tempest.lib.common.rest_client [req-d575cba2-e709-4f09-ae95-5f4e8f42b19b ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/80a59580-8b3e-4bc8-bfa2-6a0abe825893 0.229s 2020-12-14 02:28:47.496 189 DEBUG tempest.lib.common.rest_client [req-d575cba2-e709-4f09-ae95-5f4e8f42b19b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-d575cba2-e709-4f09-ae95-5f4e8f42b19b', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:28:47 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/80a59580-8b3e-4bc8-bfa2-6a0abe825893'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:47.543 189 INFO tempest.lib.common.rest_client [req-451e719e-04ca-4832-b3f2-e933402f0e53 ] Request (ServerActionsRbacTest:tearDownClass): 404 GET http://172.30.13.94:9696/v2.0/security-groups/80a59580-8b3e-4bc8-bfa2-6a0abe825893 0.040s 2020-12-14 02:28:47.546 189 DEBUG tempest.lib.common.rest_client [req-451e719e-04ca-4832-b3f2-e933402f0e53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '146', 'x-openstack-request-id': 'req-451e719e-04ca-4832-b3f2-e933402f0e53', 'date': 'Mon, 14 Dec 2020 02:28:47 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/80a59580-8b3e-4bc8-bfa2-6a0abe825893'} Body: b'{"NeutronError": {"type": "SecurityGroupNotFound", "message": "Security group 80a59580-8b3e-4bc8-bfa2-6a0abe825893 does not exist", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:48.463 189 INFO tempest.lib.common.rest_client [req-4d4f164c-30ab-45d5-b4d0-64ee758ece5b ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/floatingips/178e1afc-6c88-4c8e-8967-60e69d98e2c0 0.909s 2020-12-14 02:28:48.467 189 DEBUG tempest.lib.common.rest_client [req-4d4f164c-30ab-45d5-b4d0-64ee758ece5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-4d4f164c-30ab-45d5-b4d0-64ee758ece5b', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:28:48 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/floatingips/178e1afc-6c88-4c8e-8967-60e69d98e2c0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:48.972 189 INFO tempest.lib.common.rest_client [req-c43c36a4-5473-4ab5-9feb-266bed8208d1 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4 0.492s 2020-12-14 02:28:48.974 189 DEBUG tempest.lib.common.rest_client [req-c43c36a4-5473-4ab5-9feb-266bed8208d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c43c36a4-5473-4ab5-9feb-266bed8208d1', 'x-compute-request-id': 'req-c43c36a4-5473-4ab5-9feb-266bed8208d1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bf373ca7-1be1-45ed-8b48-f5993213a7b4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:49.052 189 INFO tempest.lib.common.rest_client [req-8857daa4-c051-4e21-aa34-cea548828837 ] Request (ServerActionsRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.071s 2020-12-14 02:28:49.055 189 DEBUG tempest.lib.common.rest_client [req-8857daa4-c051-4e21-aa34-cea548828837 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-8857daa4-c051-4e21-aa34-cea548828837', 'x-compute-request-id': 'req-8857daa4-c051-4e21-aa34-cea548828837', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 8a964bf0-ede1-4949-849b-ad52455f93cf could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:49.141 189 INFO tempest.lib.common.rest_client [req-dec59e05-9de7-4738-b744-a9b14639a942 ] Request (ServerActionsRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf 0.080s 2020-12-14 02:28:49.143 189 DEBUG tempest.lib.common.rest_client [req-dec59e05-9de7-4738-b744-a9b14639a942 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:28:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-dec59e05-9de7-4738-b744-a9b14639a942', 'x-compute-request-id': 'req-dec59e05-9de7-4738-b744-a9b14639a942', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/8a964bf0-ede1-4949-849b-ad52455f93cf'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 8a964bf0-ede1-4949-849b-ad52455f93cf could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:49.146 189 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '1c085583-16aa-4f2c-b48c-e9cce6ab197b', 'name': 'tempest-ServerActionsRbacTest-2074532455-network', 'tenant_id': '3400d8caa66043d0b7fa128b68a28ecc', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '3400d8caa66043d0b7fa128b68a28ecc', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:14:02Z', 'updated_at': '2020-12-14T02:14:02Z', 'revision_number': 1}, subnet: {'id': '44ba7cc9-68a6-4156-9489-4626e8414142', 'name': 'tempest-ServerActionsRbacTest-2074532455-subnet', 'tenant_id': '3400d8caa66043d0b7fa128b68a28ecc', 'network_id': '1c085583-16aa-4f2c-b48c-e9cce6ab197b', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:02Z', 'updated_at': '2020-12-14T02:14:02Z', 'revision_number': 0, 'project_id': '3400d8caa66043d0b7fa128b68a28ecc'}, router: {'id': 'fe52c74c-54df-444b-921e-383460bb9202', 'name': 'tempest-ServerActionsRbacTest-2074532455-router', 'tenant_id': '3400d8caa66043d0b7fa128b68a28ecc', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.223'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::29'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:03Z', 'updated_at': '2020-12-14T02:14:04Z', 'revision_number': 3, 'project_id': '3400d8caa66043d0b7fa128b68a28ecc'} _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:28:51.443 189 INFO tempest.lib.common.rest_client [req-31b57563-a4fa-4e0f-b505-71d441bacd32 ] Request (ServerActionsRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/fe52c74c-54df-444b-921e-383460bb9202/remove_router_interface 2.290s 2020-12-14 02:28:51.446 189 DEBUG tempest.lib.common.rest_client [req-31b57563-a4fa-4e0f-b505-71d441bacd32 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "44ba7cc9-68a6-4156-9489-4626e8414142"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-31b57563-a4fa-4e0f-b505-71d441bacd32', 'date': 'Mon, 14 Dec 2020 02:28:51 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/fe52c74c-54df-444b-921e-383460bb9202/remove_router_interface'} Body: b'{"id": "fe52c74c-54df-444b-921e-383460bb9202", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "port_id": "e29c3e28-f4dd-4c26-9ffb-fc98d7a6cdf3", "network_id": "1c085583-16aa-4f2c-b48c-e9cce6ab197b", "subnet_id": "44ba7cc9-68a6-4156-9489-4626e8414142", "subnet_ids": ["44ba7cc9-68a6-4156-9489-4626e8414142"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:52.600 189 INFO tempest.lib.common.rest_client [req-a4ffd9fd-fafa-4e6a-8d42-50f57a8f1f92 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/fe52c74c-54df-444b-921e-383460bb9202 1.149s 2020-12-14 02:28:52.603 189 DEBUG tempest.lib.common.rest_client [req-a4ffd9fd-fafa-4e6a-8d42-50f57a8f1f92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-a4ffd9fd-fafa-4e6a-8d42-50f57a8f1f92', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:28:52 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/fe52c74c-54df-444b-921e-383460bb9202'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:53.038 189 INFO tempest.lib.common.rest_client [req-cb563bb5-605e-48a2-a68b-3cea34396274 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/44ba7cc9-68a6-4156-9489-4626e8414142 0.428s 2020-12-14 02:28:53.041 189 DEBUG tempest.lib.common.rest_client [req-cb563bb5-605e-48a2-a68b-3cea34396274 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-cb563bb5-605e-48a2-a68b-3cea34396274', 'date': 'Mon, 14 Dec 2020 02:28:53 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/44ba7cc9-68a6-4156-9489-4626e8414142'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:53.968 189 INFO tempest.lib.common.rest_client [req-f7fd70de-8302-4a69-9e92-216189427e9c ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/1c085583-16aa-4f2c-b48c-e9cce6ab197b 0.921s 2020-12-14 02:28:53.973 189 DEBUG tempest.lib.common.rest_client [req-f7fd70de-8302-4a69-9e92-216189427e9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-f7fd70de-8302-4a69-9e92-216189427e9c', 'date': 'Mon, 14 Dec 2020 02:28:53 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/1c085583-16aa-4f2c-b48c-e9cce6ab197b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:28:53.975 189 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '7b3948bf-9b3c-4c81-bbb7-bc525dd2ef6c', 'name': 'tempest-ServerActionsRbacTest-1387900475-network', 'tenant_id': '70770d0b5506411ca294041fa7d6b3d9', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '70770d0b5506411ca294041fa7d6b3d9', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 59, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:14:07Z', 'updated_at': '2020-12-14T02:14:07Z', 'revision_number': 1}, subnet: {'id': 'a7d43c78-7c2a-4816-80bf-ed206c4f523d', 'name': 'tempest-ServerActionsRbacTest-1387900475-subnet', 'tenant_id': '70770d0b5506411ca294041fa7d6b3d9', 'network_id': '7b3948bf-9b3c-4c81-bbb7-bc525dd2ef6c', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:08Z', 'updated_at': '2020-12-14T02:14:08Z', 'revision_number': 0, 'project_id': '70770d0b5506411ca294041fa7d6b3d9'}, router: {'id': '9b8eb022-a890-45ec-a77d-8e12781894d2', 'name': 'tempest-ServerActionsRbacTest-1387900475-router', 'tenant_id': '70770d0b5506411ca294041fa7d6b3d9', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.84'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::2bb'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:14:13Z', 'updated_at': '2020-12-14T02:14:14Z', 'revision_number': 3, 'project_id': '70770d0b5506411ca294041fa7d6b3d9'} _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:29:02.088 189 INFO tempest.lib.common.rest_client [req-4a6ddec2-60f3-4ab3-9882-ae3aab8258b9 ] Request (ServerActionsRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/9b8eb022-a890-45ec-a77d-8e12781894d2/remove_router_interface 8.106s 2020-12-14 02:29:02.091 189 DEBUG tempest.lib.common.rest_client [req-4a6ddec2-60f3-4ab3-9882-ae3aab8258b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "a7d43c78-7c2a-4816-80bf-ed206c4f523d"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-4a6ddec2-60f3-4ab3-9882-ae3aab8258b9', 'date': 'Mon, 14 Dec 2020 02:29:02 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/9b8eb022-a890-45ec-a77d-8e12781894d2/remove_router_interface'} Body: b'{"id": "9b8eb022-a890-45ec-a77d-8e12781894d2", "tenant_id": "70770d0b5506411ca294041fa7d6b3d9", "port_id": "a7758ef2-03ad-49db-a0a4-f504eb9e09ff", "network_id": "7b3948bf-9b3c-4c81-bbb7-bc525dd2ef6c", "subnet_id": "a7d43c78-7c2a-4816-80bf-ed206c4f523d", "subnet_ids": ["a7d43c78-7c2a-4816-80bf-ed206c4f523d"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:04.022 189 INFO tempest.lib.common.rest_client [req-2259854d-edb4-4edf-b7c0-4d6dd2d6fd01 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/9b8eb022-a890-45ec-a77d-8e12781894d2 1.922s 2020-12-14 02:29:04.025 189 DEBUG tempest.lib.common.rest_client [req-2259854d-edb4-4edf-b7c0-4d6dd2d6fd01 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2259854d-edb4-4edf-b7c0-4d6dd2d6fd01', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:29:04 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/9b8eb022-a890-45ec-a77d-8e12781894d2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:04.607 189 INFO tempest.lib.common.rest_client [req-ef764f04-841e-4201-8af7-d22936321c04 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/a7d43c78-7c2a-4816-80bf-ed206c4f523d 0.575s 2020-12-14 02:29:04.611 189 DEBUG tempest.lib.common.rest_client [req-ef764f04-841e-4201-8af7-d22936321c04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-ef764f04-841e-4201-8af7-d22936321c04', 'date': 'Mon, 14 Dec 2020 02:29:04 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/a7d43c78-7c2a-4816-80bf-ed206c4f523d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:05.245 189 INFO tempest.lib.common.rest_client [req-e09846fd-844f-4d01-9324-faa2c0a7642e ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/7b3948bf-9b3c-4c81-bbb7-bc525dd2ef6c 0.627s 2020-12-14 02:29:05.248 189 DEBUG tempest.lib.common.rest_client [req-e09846fd-844f-4d01-9324-faa2c0a7642e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-e09846fd-844f-4d01-9324-faa2c0a7642e', 'date': 'Mon, 14 Dec 2020 02:29:05 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/7b3948bf-9b3c-4c81-bbb7-bc525dd2ef6c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:05.534 189 INFO tempest.lib.common.rest_client [req-665d2ace-f7aa-4f25-b239-8a3115222ffc ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/fc49b78fc1304d33aaa92419232a1e0d 0.279s 2020-12-14 02:29:05.537 189 DEBUG tempest.lib.common.rest_client [req-665d2ace-f7aa-4f25-b239-8a3115222ffc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-665d2ace-f7aa-4f25-b239-8a3115222ffc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/fc49b78fc1304d33aaa92419232a1e0d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:05.622 189 INFO tempest.lib.common.rest_client [req-ebe06df0-cbb5-4fae-872d-0e82801f200f ] Request (ServerActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3400d8caa66043d0b7fa128b68a28ecc&name=default 0.079s 2020-12-14 02:29:05.624 189 DEBUG tempest.lib.common.rest_client [req-ebe06df0-cbb5-4fae-872d-0e82801f200f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-ebe06df0-cbb5-4fae-872d-0e82801f200f', 'date': 'Mon, 14 Dec 2020 02:29:05 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3400d8caa66043d0b7fa128b68a28ecc&name=default'} Body: b'{"security_groups": [{"id": "de485082-0de4-4e49-b087-a74fb0bca4d2", "name": "default", "stateful": true, "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "description": "Default security group", "security_group_rules": [{"id": "0d09b049-8fee-4deb-ba2c-5139bba0e148", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "security_group_id": "de485082-0de4-4e49-b087-a74fb0bca4d2", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:02Z", "updated_at": "2020-12-14T02:14:02Z", "revision_number": 0, "project_id": "3400d8caa66043d0b7fa128b68a28ecc"}, {"id": "4754da16-57ff-4970-acf4-c37c8d2c9946", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "security_group_id": "de485082-0de4-4e49-b087-a74fb0bca4d2", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "de485082-0de4-4e49-b087-a74fb0bca4d2", "description": null, "tags": [], "created_at": "2020-12-14T02:14:02Z", "updated_at": "2020-12-14T02:14:02Z", "revision_number": 0, "project_id": "3400d8caa66043d0b7fa128b68a28ecc"}, {"id": "b8d2fcbd-b3be-4729-8238-4eaa3a7d3f7c", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "security_group_id": "de485082-0de4-4e49-b087-a74fb0bca4d2", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:02Z", "updated_at": "2020-12-14T02:14:02Z", "revision_number": 0, "project_id": "3400d8caa66043d0b7fa128b68a28ecc"}, {"id": "cf689c29-e809-4c79-ba6c-09255e9050f8", "tenant_id": "3400d8caa66043d0b7fa128b68a28ecc", "security_group_id": "de485082-0de4-4e49-b087-a74fb0bca4d2", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "de485082-0de4-4e49-b087-a74fb0bca4d2", "description": null, "tags": [], "created_at": "2020-12-14T02:14:02Z", "updated_at": "2020-12-14T02:14:02Z", "revision_number": 0, "project_id": "3400d8caa66043d0b7fa128b68a28ecc"}], "tags": [], "created_at": "2020-12-14T02:14:01Z", "updated_at": "2020-12-14T02:14:02Z", "revision_number": 1, "project_id": "3400d8caa66043d0b7fa128b68a28ecc"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:05.788 189 INFO tempest.lib.common.rest_client [req-62df7f4d-ec44-46f9-9c5e-1ce6ca7911df ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/de485082-0de4-4e49-b087-a74fb0bca4d2 0.158s 2020-12-14 02:29:05.791 189 DEBUG tempest.lib.common.rest_client [req-62df7f4d-ec44-46f9-9c5e-1ce6ca7911df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-62df7f4d-ec44-46f9-9c5e-1ce6ca7911df', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:29:05 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/de485082-0de4-4e49-b087-a74fb0bca4d2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:05.991 189 INFO tempest.lib.common.rest_client [req-132c149e-2778-4ea7-963a-85cd255f4d54 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc 0.195s 2020-12-14 02:29:05.993 189 DEBUG tempest.lib.common.rest_client [req-132c149e-2778-4ea7-963a-85cd255f4d54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-132c149e-2778-4ea7-963a-85cd255f4d54', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3400d8caa66043d0b7fa128b68a28ecc'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:06.173 189 INFO tempest.lib.common.rest_client [req-307224a8-db37-42e5-90c1-6c17c1fdc532 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/085f65123c634e01beaa63852dd155c8 0.174s 2020-12-14 02:29:06.177 189 DEBUG tempest.lib.common.rest_client [req-307224a8-db37-42e5-90c1-6c17c1fdc532 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-307224a8-db37-42e5-90c1-6c17c1fdc532', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/085f65123c634e01beaa63852dd155c8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:06.242 189 INFO tempest.lib.common.rest_client [req-95e9bf02-9d67-4e73-8bf7-f7561a3aac95 ] Request (ServerActionsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=70770d0b5506411ca294041fa7d6b3d9&name=default 0.058s 2020-12-14 02:29:06.245 189 DEBUG tempest.lib.common.rest_client [req-95e9bf02-9d67-4e73-8bf7-f7561a3aac95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-95e9bf02-9d67-4e73-8bf7-f7561a3aac95', 'date': 'Mon, 14 Dec 2020 02:29:06 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=70770d0b5506411ca294041fa7d6b3d9&name=default'} Body: b'{"security_groups": [{"id": "1a7f5fc9-484f-459f-907f-104785e40697", "name": "default", "stateful": true, "tenant_id": "70770d0b5506411ca294041fa7d6b3d9", "description": "Default security group", "security_group_rules": [{"id": "02276099-5ad8-4bce-8c5d-10636e41924c", "tenant_id": "70770d0b5506411ca294041fa7d6b3d9", "security_group_id": "1a7f5fc9-484f-459f-907f-104785e40697", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:07Z", "updated_at": "2020-12-14T02:14:07Z", "revision_number": 0, "project_id": "70770d0b5506411ca294041fa7d6b3d9"}, {"id": "0295f76d-c853-4170-95a3-609a8a22b71c", "tenant_id": "70770d0b5506411ca294041fa7d6b3d9", "security_group_id": "1a7f5fc9-484f-459f-907f-104785e40697", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1a7f5fc9-484f-459f-907f-104785e40697", "description": null, "tags": [], "created_at": "2020-12-14T02:14:07Z", "updated_at": "2020-12-14T02:14:07Z", "revision_number": 0, "project_id": "70770d0b5506411ca294041fa7d6b3d9"}, {"id": "1c8d0fa6-59da-4ac4-81f8-d6965f7c49e8", "tenant_id": "70770d0b5506411ca294041fa7d6b3d9", "security_group_id": "1a7f5fc9-484f-459f-907f-104785e40697", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:14:07Z", "updated_at": "2020-12-14T02:14:07Z", "revision_number": 0, "project_id": "70770d0b5506411ca294041fa7d6b3d9"}, {"id": "e8f04e9f-bd26-4baa-8837-c7725e3e0b8f", "tenant_id": "70770d0b5506411ca294041fa7d6b3d9", "security_group_id": "1a7f5fc9-484f-459f-907f-104785e40697", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "1a7f5fc9-484f-459f-907f-104785e40697", "description": null, "tags": [], "created_at": "2020-12-14T02:14:07Z", "updated_at": "2020-12-14T02:14:07Z", "revision_number": 0, "project_id": "70770d0b5506411ca294041fa7d6b3d9"}], "tags": [], "created_at": "2020-12-14T02:14:07Z", "updated_at": "2020-12-14T02:14:07Z", "revision_number": 1, "project_id": "70770d0b5506411ca294041fa7d6b3d9"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:06.463 189 INFO tempest.lib.common.rest_client [req-bf78a1a5-68f5-4e8c-9bb3-d60d6dfc4d00 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/1a7f5fc9-484f-459f-907f-104785e40697 0.211s 2020-12-14 02:29:06.465 189 DEBUG tempest.lib.common.rest_client [req-bf78a1a5-68f5-4e8c-9bb3-d60d6dfc4d00 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-bf78a1a5-68f5-4e8c-9bb3-d60d6dfc4d00', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:29:06 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/1a7f5fc9-484f-459f-907f-104785e40697'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:06.654 189 INFO tempest.lib.common.rest_client [req-764e06fe-544e-405c-99be-d99cc3705d71 ] Request (ServerActionsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/70770d0b5506411ca294041fa7d6b3d9 0.184s 2020-12-14 02:29:06.657 189 DEBUG tempest.lib.common.rest_client [req-764e06fe-544e-405c-99be-d99cc3705d71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-764e06fe-544e-405c-99be-d99cc3705d71', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/70770d0b5506411ca294041fa7d6b3d9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:06.751 189 INFO tempest.lib.common.rest_client [req-bafd9cd7-0249-40ef-8a51-3b9b21a29345 ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.075s 2020-12-14 02:29:06.754 189 DEBUG tempest.lib.common.rest_client [req-bafd9cd7-0249-40ef-8a51-3b9b21a29345 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bafd9cd7-0249-40ef-8a51-3b9b21a29345', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["FkCT1zg0Swme8WtyM8t96Q"], "expires_at": "2020-12-14T03:29:06.000000Z", "issued_at": "2020-12-14T02:29:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:06.849 189 INFO tempest.lib.common.rest_client [req-977cd6c5-8fa6-4529-9a48-e64b9c60555b ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:29:06.851 189 DEBUG tempest.lib.common.rest_client [req-977cd6c5-8fa6-4529-9a48-e64b9c60555b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-977cd6c5-8fa6-4529-9a48-e64b9c60555b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["a32XT-VcSHuQb6OCRKUxTg"], "expires_at": "2020-12-14T03:29:06.000000Z", "issued_at": "2020-12-14T02:29:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:06.908 189 INFO tempest.lib.common.rest_client [req-e9a4c406-cedb-4ccb-b8fe-637f9c286f53 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.051s 2020-12-14 02:29:06.910 189 DEBUG tempest.lib.common.rest_client [req-e9a4c406-cedb-4ccb-b8fe-637f9c286f53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9a4c406-cedb-4ccb-b8fe-637f9c286f53', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:06.985 189 INFO tempest.lib.common.rest_client [req-d685c34a-8d5a-4115-b901-86abe2a54dad ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.068s 2020-12-14 02:29:06.987 189 DEBUG tempest.lib.common.rest_client [req-d685c34a-8d5a-4115-b901-86abe2a54dad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerActionsV216RbacTest-1641826490-desc", "domain_id": "default", "name": "tempest-ServerActionsV216RbacTest-1641826490"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d685c34a-8d5a-4115-b901-86abe2a54dad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "e4a0523dd92448a0a50bc80c7983b30a", "name": "tempest-ServerActionsV216RbacTest-1641826490", "domain_id": "default", "description": "tempest-ServerActionsV216RbacTest-1641826490-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:07.201 189 INFO tempest.lib.common.rest_client [req-5a74fd4b-dbbb-4c82-b61c-e7c432dfb519 ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.209s 2020-12-14 02:29:07.203 189 DEBUG tempest.lib.common.rest_client [req-5a74fd4b-dbbb-4c82-b61c-e7c432dfb519 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerActionsV216RbacTest-1641826490", "password": "I3^BTW4BVw7AdLQ", "project_id": "e4a0523dd92448a0a50bc80c7983b30a", "email": "tempest-ServerActionsV216RbacTest-804236001@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '405', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a74fd4b-dbbb-4c82-b61c-e7c432dfb519', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "e4a0523dd92448a0a50bc80c7983b30a", "email": "tempest-ServerActionsV216RbacTest-804236001@example.com", "id": "86ec523af9584c6c8e355bbd01f5478d", "name": "tempest-ServerActionsV216RbacTest-1641826490", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/86ec523af9584c6c8e355bbd01f5478d"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:07.262 189 INFO tempest.lib.common.rest_client [req-9582e926-2a09-4024-9f1e-bb52dc55eb3c ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-12-14 02:29:07.266 189 DEBUG tempest.lib.common.rest_client [req-9582e926-2a09-4024-9f1e-bb52dc55eb3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9582e926-2a09-4024-9f1e-bb52dc55eb3c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:07.328 189 INFO tempest.lib.common.rest_client [req-2a678fa4-4544-435c-9d32-4f1f909ad096 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:29:07.330 189 DEBUG tempest.lib.common.rest_client [req-2a678fa4-4544-435c-9d32-4f1f909ad096 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a678fa4-4544-435c-9d32-4f1f909ad096', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:07.401 189 INFO tempest.lib.common.rest_client [req-01a7e5ee-bab1-46d3-b712-01fe8a62605b ] Request (ServerActionsV216RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a/users/86ec523af9584c6c8e355bbd01f5478d/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-12-14 02:29:07.403 189 DEBUG tempest.lib.common.rest_client [req-01a7e5ee-bab1-46d3-b712-01fe8a62605b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-01a7e5ee-bab1-46d3-b712-01fe8a62605b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a/users/86ec523af9584c6c8e355bbd01f5478d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:07.405 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsV216RbacTest-1641826490', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e4a0523dd92448a0a50bc80c7983b30a', 'project_name': 'tempest-ServerActionsV216RbacTest-1641826490', 'tenant_id': 'e4a0523dd92448a0a50bc80c7983b30a', 'tenant_name': 'tempest-ServerActionsV216RbacTest-1641826490', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '86ec523af9584c6c8e355bbd01f5478d'}, Network: None, Subnet: None, Router: None 2020-12-14 02:29:07.512 189 INFO tempest.lib.common.rest_client [req-329ae3c0-0769-4c8c-ae72-9adcdcf1751e ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:29:07.514 189 DEBUG tempest.lib.common.rest_client [req-329ae3c0-0769-4c8c-ae72-9adcdcf1751e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-329ae3c0-0769-4c8c-ae72-9adcdcf1751e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ztyeHFiATlCZvgNUBS-IEw"], "expires_at": "2020-12-14T03:29:07.000000Z", "issued_at": "2020-12-14T02:29:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:08.209 189 INFO tempest.lib.common.rest_client [req-be1b5165-046f-494a-a10a-bafef9a9609c ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.689s 2020-12-14 02:29:08.211 189 DEBUG tempest.lib.common.rest_client [req-be1b5165-046f-494a-a10a-bafef9a9609c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerActionsV216RbacTest-205257695-network", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a"}} Response - Headers: {'content-type': 'application/json', 'content-length': '740', 'x-openstack-request-id': 'req-be1b5165-046f-494a-a10a-bafef9a9609c', 'date': 'Mon, 14 Dec 2020 02:29:08 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"8204944d-4fb8-462f-853b-dcd220a9cc94","name":"tempest-ServerActionsV216RbacTest-205257695-network","tenant_id":"e4a0523dd92448a0a50bc80c7983b30a","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"e4a0523dd92448a0a50bc80c7983b30a","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":61,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:29:07Z","updated_at":"2020-12-14T02:29:08Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:09.019 189 INFO tempest.lib.common.rest_client [req-b2151d4f-1ea9-4963-83a0-6fbafa04407a ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.800s 2020-12-14 02:29:09.024 189 DEBUG tempest.lib.common.rest_client [req-b2151d4f-1ea9-4963-83a0-6fbafa04407a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "8204944d-4fb8-462f-853b-dcd220a9cc94", "cidr": "192.168.120.0/28", "name": "tempest-ServerActionsV216RbacTest-205257695-subnet", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '712', 'x-openstack-request-id': 'req-b2151d4f-1ea9-4963-83a0-6fbafa04407a', 'date': 'Mon, 14 Dec 2020 02:29:09 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"4279a678-3536-45ee-b6ae-306088f8d19a","name":"tempest-ServerActionsV216RbacTest-205257695-subnet","tenant_id":"e4a0523dd92448a0a50bc80c7983b30a","network_id":"8204944d-4fb8-462f-853b-dcd220a9cc94","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:29:08Z","updated_at":"2020-12-14T02:29:08Z","revision_number":0,"project_id":"e4a0523dd92448a0a50bc80c7983b30a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:10.474 189 INFO tempest.lib.common.rest_client [req-9e4983dd-6de7-4fe8-82d8-d8fe1c3fae5a ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.442s 2020-12-14 02:29:10.476 189 DEBUG tempest.lib.common.rest_client [req-9e4983dd-6de7-4fe8-82d8-d8fe1c3fae5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerActionsV216RbacTest-205257695-router", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '813', 'x-openstack-request-id': 'req-9e4983dd-6de7-4fe8-82d8-d8fe1c3fae5a', 'date': 'Mon, 14 Dec 2020 02:29:10 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "d01266b6-9f35-4a37-8400-f3990cd2a308", "name": "tempest-ServerActionsV216RbacTest-205257695-router", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.74"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::186"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:29:09Z", "updated_at": "2020-12-14T02:29:10Z", "revision_number": 3, "project_id": "e4a0523dd92448a0a50bc80c7983b30a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:16.829 189 INFO tempest.lib.common.rest_client [req-ce57b229-6efe-462b-86ce-c59762c72696 ] Request (ServerActionsV216RbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/d01266b6-9f35-4a37-8400-f3990cd2a308/add_router_interface 6.345s 2020-12-14 02:29:16.833 189 DEBUG tempest.lib.common.rest_client [req-ce57b229-6efe-462b-86ce-c59762c72696 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "4279a678-3536-45ee-b6ae-306088f8d19a"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-ce57b229-6efe-462b-86ce-c59762c72696', 'date': 'Mon, 14 Dec 2020 02:29:16 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d01266b6-9f35-4a37-8400-f3990cd2a308/add_router_interface'} Body: b'{"id": "d01266b6-9f35-4a37-8400-f3990cd2a308", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "port_id": "968dba80-9309-48b0-9fbf-f9cfe0a68a89", "network_id": "8204944d-4fb8-462f-853b-dcd220a9cc94", "subnet_id": "4279a678-3536-45ee-b6ae-306088f8d19a", "subnet_ids": ["4279a678-3536-45ee-b6ae-306088f8d19a"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:16.835 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsV216RbacTest-1641826490', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e4a0523dd92448a0a50bc80c7983b30a', 'project_name': 'tempest-ServerActionsV216RbacTest-1641826490', 'tenant_id': 'e4a0523dd92448a0a50bc80c7983b30a', 'tenant_name': 'tempest-ServerActionsV216RbacTest-1641826490', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '86ec523af9584c6c8e355bbd01f5478d'}, Network: {'id': '8204944d-4fb8-462f-853b-dcd220a9cc94', 'name': 'tempest-ServerActionsV216RbacTest-205257695-network', 'tenant_id': 'e4a0523dd92448a0a50bc80c7983b30a', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'e4a0523dd92448a0a50bc80c7983b30a', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 61, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:29:07Z', 'updated_at': '2020-12-14T02:29:08Z', 'revision_number': 1}, Subnet: {'id': '4279a678-3536-45ee-b6ae-306088f8d19a', 'name': 'tempest-ServerActionsV216RbacTest-205257695-subnet', 'tenant_id': 'e4a0523dd92448a0a50bc80c7983b30a', 'network_id': '8204944d-4fb8-462f-853b-dcd220a9cc94', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:29:08Z', 'updated_at': '2020-12-14T02:29:08Z', 'revision_number': 0, 'project_id': 'e4a0523dd92448a0a50bc80c7983b30a'}, Router: {'id': 'd01266b6-9f35-4a37-8400-f3990cd2a308', 'name': 'tempest-ServerActionsV216RbacTest-205257695-router', 'tenant_id': 'e4a0523dd92448a0a50bc80c7983b30a', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.74'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::186'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:29:09Z', 'updated_at': '2020-12-14T02:29:10Z', 'revision_number': 3, 'project_id': 'e4a0523dd92448a0a50bc80c7983b30a'} 2020-12-14 02:29:17.007 189 INFO tempest.lib.common.rest_client [req-f312d826-58ee-4196-8c23-175a5fd6e4b5 ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:29:17.010 189 DEBUG tempest.lib.common.rest_client [req-f312d826-58ee-4196-8c23-175a5fd6e4b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f312d826-58ee-4196-8c23-175a5fd6e4b5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "86ec523af9584c6c8e355bbd01f5478d", "name": "tempest-ServerActionsV216RbacTest-1641826490", "password_expires_at": null}, "audit_ids": ["ISWKdPoGSlCX0y23ZWqP-Q"], "expires_at": "2020-12-14T03:29:16.000000Z", "issued_at": "2020-12-14T02:29:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e4a0523dd92448a0a50bc80c7983b30a", "name": "tempest-ServerActionsV216RbacTest-1641826490"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:17.065 189 INFO tempest.lib.common.rest_client [req-56e7e58f-e628-433a-a757-9bbb2cb20342 ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:29:17.068 189 DEBUG tempest.lib.common.rest_client [req-56e7e58f-e628-433a-a757-9bbb2cb20342 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56e7e58f-e628-433a-a757-9bbb2cb20342', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ZVqoWVmdQsSWXhLRmRNfWQ"], "expires_at": "2020-12-14T03:29:17.000000Z", "issued_at": "2020-12-14T02:29:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:17.177 189 INFO tempest.lib.common.rest_client [req-f5abfc33-9e1a-47a5-92dc-1e754b9eb70f ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:29:17.179 189 DEBUG tempest.lib.common.rest_client [req-f5abfc33-9e1a-47a5-92dc-1e754b9eb70f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f5abfc33-9e1a-47a5-92dc-1e754b9eb70f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["WyLY9LKhR_Wct45hK0nH0g"], "expires_at": "2020-12-14T03:29:17.000000Z", "issued_at": "2020-12-14T02:29:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:17.246 189 INFO tempest.lib.common.rest_client [req-19d454b1-9d90-4c02-b042-83c6d69bf3a8 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.060s 2020-12-14 02:29:17.248 189 DEBUG tempest.lib.common.rest_client [req-19d454b1-9d90-4c02-b042-83c6d69bf3a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19d454b1-9d90-4c02-b042-83c6d69bf3a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:17.318 189 INFO tempest.lib.common.rest_client [req-466b190e-2eef-43f1-aeb2-4a22390c84ae ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:29:17.320 189 DEBUG tempest.lib.common.rest_client [req-466b190e-2eef-43f1-aeb2-4a22390c84ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-466b190e-2eef-43f1-aeb2-4a22390c84ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:17.323 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:29:17.326 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:29:17.396 189 INFO tempest.lib.common.rest_client [req-b48bf234-0cfc-4289-80e1-6cf0c68b9413 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a/users/86ec523af9584c6c8e355bbd01f5478d/roles 0.064s 2020-12-14 02:29:17.399 189 DEBUG tempest.lib.common.rest_client [req-b48bf234-0cfc-4289-80e1-6cf0c68b9413 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b48bf234-0cfc-4289-80e1-6cf0c68b9413', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a/users/86ec523af9584c6c8e355bbd01f5478d/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a/users/86ec523af9584c6c8e355bbd01f5478d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:17.472 189 INFO tempest.lib.common.rest_client [req-2be7dcca-0cca-4a87-8f92-b0457916ccd3 ] Request (ServerActionsV216RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a/users/86ec523af9584c6c8e355bbd01f5478d/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-12-14 02:29:17.474 189 DEBUG tempest.lib.common.rest_client [req-2be7dcca-0cca-4a87-8f92-b0457916ccd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2be7dcca-0cca-4a87-8f92-b0457916ccd3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a/users/86ec523af9584c6c8e355bbd01f5478d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:17.598 189 INFO tempest.lib.common.rest_client [req-7a773994-2a30-4ef1-814b-f99a67836ca8 ] Request (ServerActionsV216RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a/users/86ec523af9584c6c8e355bbd01f5478d/roles/a629c95d64b3416fb80ae90af4f69c05 0.114s 2020-12-14 02:29:17.601 189 DEBUG tempest.lib.common.rest_client [req-7a773994-2a30-4ef1-814b-f99a67836ca8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a773994-2a30-4ef1-814b-f99a67836ca8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a/users/86ec523af9584c6c8e355bbd01f5478d/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:18.714 189 INFO tempest.lib.common.rest_client [req-c62e4314-9c73-4b07-afee-8ec0dd70dbba ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-14 02:29:18.718 189 DEBUG tempest.lib.common.rest_client [req-c62e4314-9c73-4b07-afee-8ec0dd70dbba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c62e4314-9c73-4b07-afee-8ec0dd70dbba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "86ec523af9584c6c8e355bbd01f5478d", "name": "tempest-ServerActionsV216RbacTest-1641826490", "password_expires_at": null}, "audit_ids": ["D9e9LDwQRcCS-OdxoanLeA"], "expires_at": "2020-12-14T03:29:18.000000Z", "issued_at": "2020-12-14T02:29:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e4a0523dd92448a0a50bc80c7983b30a", "name": "tempest-ServerActionsV216RbacTest-1641826490"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:18.846 189 INFO tempest.lib.common.rest_client [req-ec6d3a99-36a7-4c67-813e-bd3b310cad27 ] Request (ServerActionsV216RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:29:18.849 189 DEBUG tempest.lib.common.rest_client [req-ec6d3a99-36a7-4c67-813e-bd3b310cad27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec6d3a99-36a7-4c67-813e-bd3b310cad27', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "86ec523af9584c6c8e355bbd01f5478d", "name": "tempest-ServerActionsV216RbacTest-1641826490", "password_expires_at": null}, "audit_ids": ["-zsIKHysT6SLkGieMLqSrw"], "expires_at": "2020-12-14T03:29:18.000000Z", "issued_at": "2020-12-14T02:29:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e4a0523dd92448a0a50bc80c7983b30a", "name": "tempest-ServerActionsV216RbacTest-1641826490"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:18.855 189 INFO tempest.lib.common.fixed_network [-] (ServerActionsV216RbacTest:setUpClass) Found network {'id': '8204944d-4fb8-462f-853b-dcd220a9cc94', 'name': 'tempest-ServerActionsV216RbacTest-205257695-network', 'tenant_id': 'e4a0523dd92448a0a50bc80c7983b30a', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'e4a0523dd92448a0a50bc80c7983b30a', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 61, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:29:07Z', 'updated_at': '2020-12-14T02:29:08Z', 'revision_number': 1} available for tenant 2020-12-14 02:29:19.884 189 INFO tempest.lib.common.rest_client [req-9dcab359-5a4c-4127-a14b-2f89884ffa65 ] Request (ServerActionsV216RbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 1.018s 2020-12-14 02:29:19.887 189 DEBUG tempest.lib.common.rest_client [req-9dcab359-5a4c-4127-a14b-2f89884ffa65 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerActionsV216RbacTest-server-1711687866", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "8204944d-4fb8-462f-853b-dcd220a9cc94"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9dcab359-5a4c-4127-a14b-2f89884ffa65', 'x-compute-request-id': 'req-9dcab359-5a4c-4127-a14b-2f89884ffa65', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "19451fea-090f-40ff-a4ed-633b97371eea", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19451fea-090f-40ff-a4ed-633b97371eea"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "vapPJYin35An"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:20.045 189 INFO tempest.lib.common.rest_client [req-05d512dd-6468-4a95-8e9a-a10d5eee851e ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 0.127s 2020-12-14 02:29:20.048 189 DEBUG tempest.lib.common.rest_client [req-05d512dd-6468-4a95-8e9a-a10d5eee851e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1401', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-05d512dd-6468-4a95-8e9a-a10d5eee851e', 'x-compute-request-id': 'req-05d512dd-6468-4a95-8e9a-a10d5eee851e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'{"server": {"id": "19451fea-090f-40ff-a4ed-633b97371eea", "name": "tempest-ServerActionsV216RbacTest-server-1711687866", "status": "BUILD", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "user_id": "86ec523af9584c6c8e355bbd01f5478d", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:20Z", "updated": "2020-12-14T02:29:19Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19451fea-090f-40ff-a4ed-633b97371eea"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:21.313 189 INFO tempest.lib.common.rest_client [req-6885968a-d1ef-438f-9a1b-310bdc691576 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 0.154s 2020-12-14 02:29:21.315 189 DEBUG tempest.lib.common.rest_client [req-6885968a-d1ef-438f-9a1b-310bdc691576 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1496', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6885968a-d1ef-438f-9a1b-310bdc691576', 'x-compute-request-id': 'req-6885968a-d1ef-438f-9a1b-310bdc691576', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'{"server": {"id": "19451fea-090f-40ff-a4ed-633b97371eea", "name": "tempest-ServerActionsV216RbacTest-server-1711687866", "status": "BUILD", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "user_id": "86ec523af9584c6c8e355bbd01f5478d", "metadata": {}, "hostId": "7c27b8feec078ff996f534d26d861c20fc97854435f08ef992a82110", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:19Z", "updated": "2020-12-14T02:29:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19451fea-090f-40ff-a4ed-633b97371eea"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:21.417 189 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/networking" after 1 second wait 2020-12-14 02:29:22.973 189 INFO tempest.lib.common.rest_client [req-c08669e5-f31a-46d0-a5b0-21d69ff03856 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 0.546s 2020-12-14 02:29:22.975 189 DEBUG tempest.lib.common.rest_client [req-c08669e5-f31a-46d0-a5b0-21d69ff03856 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c08669e5-f31a-46d0-a5b0-21d69ff03856', 'x-compute-request-id': 'req-c08669e5-f31a-46d0-a5b0-21d69ff03856', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'{"server": {"id": "19451fea-090f-40ff-a4ed-633b97371eea", "name": "tempest-ServerActionsV216RbacTest-server-1711687866", "status": "BUILD", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "user_id": "86ec523af9584c6c8e355bbd01f5478d", "metadata": {}, "hostId": "7c27b8feec078ff996f534d26d861c20fc97854435f08ef992a82110", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:19Z", "updated": "2020-12-14T02:29:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19451fea-090f-40ff-a4ed-633b97371eea"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:23.074 189 INFO tempest.common.waiters [-] State transition "BUILD/networking" ==> "BUILD/spawning" after 3 second wait 2020-12-14 02:29:24.347 189 INFO tempest.lib.common.rest_client [req-7cd02abf-0362-4eba-b85a-0b8a372312a3 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 0.263s 2020-12-14 02:29:24.351 189 DEBUG tempest.lib.common.rest_client [req-7cd02abf-0362-4eba-b85a-0b8a372312a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7cd02abf-0362-4eba-b85a-0b8a372312a3', 'x-compute-request-id': 'req-7cd02abf-0362-4eba-b85a-0b8a372312a3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'{"server": {"id": "19451fea-090f-40ff-a4ed-633b97371eea", "name": "tempest-ServerActionsV216RbacTest-server-1711687866", "status": "BUILD", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "user_id": "86ec523af9584c6c8e355bbd01f5478d", "metadata": {}, "hostId": "7c27b8feec078ff996f534d26d861c20fc97854435f08ef992a82110", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:19Z", "updated": "2020-12-14T02:29:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19451fea-090f-40ff-a4ed-633b97371eea"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:25.688 189 INFO tempest.lib.common.rest_client [req-2e3b66af-aabf-4d97-ada7-2abaf5f64420 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 0.227s 2020-12-14 02:29:25.691 189 DEBUG tempest.lib.common.rest_client [req-2e3b66af-aabf-4d97-ada7-2abaf5f64420 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2e3b66af-aabf-4d97-ada7-2abaf5f64420', 'x-compute-request-id': 'req-2e3b66af-aabf-4d97-ada7-2abaf5f64420', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'{"server": {"id": "19451fea-090f-40ff-a4ed-633b97371eea", "name": "tempest-ServerActionsV216RbacTest-server-1711687866", "status": "BUILD", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "user_id": "86ec523af9584c6c8e355bbd01f5478d", "metadata": {}, "hostId": "7c27b8feec078ff996f534d26d861c20fc97854435f08ef992a82110", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:19Z", "updated": "2020-12-14T02:29:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19451fea-090f-40ff-a4ed-633b97371eea"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:27.076 189 INFO tempest.lib.common.rest_client [req-c9a4bd86-bbee-49ba-9e6c-6636d4f0853e ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 0.250s 2020-12-14 02:29:27.079 189 DEBUG tempest.lib.common.rest_client [req-c9a4bd86-bbee-49ba-9e6c-6636d4f0853e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c9a4bd86-bbee-49ba-9e6c-6636d4f0853e', 'x-compute-request-id': 'req-c9a4bd86-bbee-49ba-9e6c-6636d4f0853e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'{"server": {"id": "19451fea-090f-40ff-a4ed-633b97371eea", "name": "tempest-ServerActionsV216RbacTest-server-1711687866", "status": "BUILD", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "user_id": "86ec523af9584c6c8e355bbd01f5478d", "metadata": {}, "hostId": "7c27b8feec078ff996f534d26d861c20fc97854435f08ef992a82110", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:19Z", "updated": "2020-12-14T02:29:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19451fea-090f-40ff-a4ed-633b97371eea"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:28.547 189 INFO tempest.lib.common.rest_client [req-281308f4-a711-42e1-87f7-a95eb23a3ff9 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 0.358s 2020-12-14 02:29:28.550 189 DEBUG tempest.lib.common.rest_client [req-281308f4-a711-42e1-87f7-a95eb23a3ff9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-281308f4-a711-42e1-87f7-a95eb23a3ff9', 'x-compute-request-id': 'req-281308f4-a711-42e1-87f7-a95eb23a3ff9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'{"server": {"id": "19451fea-090f-40ff-a4ed-633b97371eea", "name": "tempest-ServerActionsV216RbacTest-server-1711687866", "status": "BUILD", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "user_id": "86ec523af9584c6c8e355bbd01f5478d", "metadata": {}, "hostId": "7c27b8feec078ff996f534d26d861c20fc97854435f08ef992a82110", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:19Z", "updated": "2020-12-14T02:29:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19451fea-090f-40ff-a4ed-633b97371eea"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:29.884 189 INFO tempest.lib.common.rest_client [req-eeb853b3-b15a-41cc-b53a-6b72460e7f17 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 0.228s 2020-12-14 02:29:29.887 189 DEBUG tempest.lib.common.rest_client [req-eeb853b3-b15a-41cc-b53a-6b72460e7f17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-eeb853b3-b15a-41cc-b53a-6b72460e7f17', 'x-compute-request-id': 'req-eeb853b3-b15a-41cc-b53a-6b72460e7f17', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'{"server": {"id": "19451fea-090f-40ff-a4ed-633b97371eea", "name": "tempest-ServerActionsV216RbacTest-server-1711687866", "status": "BUILD", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "user_id": "86ec523af9584c6c8e355bbd01f5478d", "metadata": {}, "hostId": "7c27b8feec078ff996f534d26d861c20fc97854435f08ef992a82110", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:19Z", "updated": "2020-12-14T02:29:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19451fea-090f-40ff-a4ed-633b97371eea"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:31.238 189 INFO tempest.lib.common.rest_client [req-0ad48442-df9e-4ae2-ba3e-92bd3cc7076d ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 0.246s 2020-12-14 02:29:31.242 189 DEBUG tempest.lib.common.rest_client [req-0ad48442-df9e-4ae2-ba3e-92bd3cc7076d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0ad48442-df9e-4ae2-ba3e-92bd3cc7076d', 'x-compute-request-id': 'req-0ad48442-df9e-4ae2-ba3e-92bd3cc7076d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'{"server": {"id": "19451fea-090f-40ff-a4ed-633b97371eea", "name": "tempest-ServerActionsV216RbacTest-server-1711687866", "status": "BUILD", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "user_id": "86ec523af9584c6c8e355bbd01f5478d", "metadata": {}, "hostId": "7c27b8feec078ff996f534d26d861c20fc97854435f08ef992a82110", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:19Z", "updated": "2020-12-14T02:29:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19451fea-090f-40ff-a4ed-633b97371eea"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:32.719 189 INFO tempest.lib.common.rest_client [req-911a43d2-3929-459d-886d-12ef82920e87 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 0.374s 2020-12-14 02:29:32.722 189 DEBUG tempest.lib.common.rest_client [req-911a43d2-3929-459d-886d-12ef82920e87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-911a43d2-3929-459d-886d-12ef82920e87', 'x-compute-request-id': 'req-911a43d2-3929-459d-886d-12ef82920e87', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'{"server": {"id": "19451fea-090f-40ff-a4ed-633b97371eea", "name": "tempest-ServerActionsV216RbacTest-server-1711687866", "status": "BUILD", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "user_id": "86ec523af9584c6c8e355bbd01f5478d", "metadata": {}, "hostId": "7c27b8feec078ff996f534d26d861c20fc97854435f08ef992a82110", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:19Z", "updated": "2020-12-14T02:29:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19451fea-090f-40ff-a4ed-633b97371eea"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:34.040 189 INFO tempest.lib.common.rest_client [req-254ebe10-70ca-4cc9-89d4-58d6c21dbec4 ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 0.213s 2020-12-14 02:29:34.043 189 DEBUG tempest.lib.common.rest_client [req-254ebe10-70ca-4cc9-89d4-58d6c21dbec4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1536', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-254ebe10-70ca-4cc9-89d4-58d6c21dbec4', 'x-compute-request-id': 'req-254ebe10-70ca-4cc9-89d4-58d6c21dbec4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'{"server": {"id": "19451fea-090f-40ff-a4ed-633b97371eea", "name": "tempest-ServerActionsV216RbacTest-server-1711687866", "status": "BUILD", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "user_id": "86ec523af9584c6c8e355bbd01f5478d", "metadata": {}, "hostId": "7c27b8feec078ff996f534d26d861c20fc97854435f08ef992a82110", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:19Z", "updated": "2020-12-14T02:29:21Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19451fea-090f-40ff-a4ed-633b97371eea"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:35.368 189 INFO tempest.lib.common.rest_client [req-7bbe8682-8e0c-4a53-a351-92fa22a4b33c ] Request (ServerActionsV216RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 0.220s 2020-12-14 02:29:35.371 189 DEBUG tempest.lib.common.rest_client [req-7bbe8682-8e0c-4a53-a351-92fa22a4b33c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7bbe8682-8e0c-4a53-a351-92fa22a4b33c', 'x-compute-request-id': 'req-7bbe8682-8e0c-4a53-a351-92fa22a4b33c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'{"server": {"id": "19451fea-090f-40ff-a4ed-633b97371eea", "name": "tempest-ServerActionsV216RbacTest-server-1711687866", "status": "ACTIVE", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "user_id": "86ec523af9584c6c8e355bbd01f5478d", "metadata": {}, "hostId": "7c27b8feec078ff996f534d26d861c20fc97854435f08ef992a82110", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:19Z", "updated": "2020-12-14T02:29:35Z", "addresses": {"tempest-ServerActionsV216RbacTest-205257695-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:57:a6:ac"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19451fea-090f-40ff-a4ed-633b97371eea"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:29:34.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:35.470 189 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 15 second wait 2020-12-14 02:29:35.478 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:29:35.483 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.486 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.489 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.492 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.496 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.500 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.505 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.507 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.510 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.513 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.515 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.518 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.521 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.524 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.527 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.530 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.533 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.535 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.538 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.541 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.543 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.546 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.549 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.551 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.554 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.556 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.559 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.562 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.564 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.567 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.570 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.572 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.575 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.577 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.580 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.583 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.585 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.588 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.591 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.594 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.597 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.600 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.602 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.606 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.609 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.611 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.614 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.616 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.619 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.622 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.624 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.627 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.629 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.632 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.636 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.638 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.644 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.646 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.649 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.652 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.655 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.657 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.660 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.663 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.665 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.668 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.670 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.673 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.676 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.678 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.681 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:29:35.689 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:show:host_status, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:29:35.691 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:29:35.805 189 INFO tempest.lib.common.rest_client [req-43b421fb-0b7a-4c09-9c09-d6280ba32449 ] Request (ServerActionsV216RbacTest:test_show_server_host_status): 200 GET http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a/users/86ec523af9584c6c8e355bbd01f5478d/roles 0.108s 2020-12-14 02:29:35.808 189 DEBUG tempest.lib.common.rest_client [req-43b421fb-0b7a-4c09-9c09-d6280ba32449 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43b421fb-0b7a-4c09-9c09-d6280ba32449', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a/users/86ec523af9584c6c8e355bbd01f5478d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a/users/86ec523af9584c6c8e355bbd01f5478d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:35.868 189 INFO tempest.lib.common.rest_client [req-d12d36ea-e228-46c5-ad71-ec06817a1948 ] Request (ServerActionsV216RbacTest:test_show_server_host_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:29:35.871 189 DEBUG tempest.lib.common.rest_client [req-d12d36ea-e228-46c5-ad71-ec06817a1948 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d12d36ea-e228-46c5-ad71-ec06817a1948', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "86ec523af9584c6c8e355bbd01f5478d", "name": "tempest-ServerActionsV216RbacTest-1641826490", "password_expires_at": null}, "audit_ids": ["WV_y0lwqQqmSujXFaq3hqw"], "expires_at": "2020-12-14T03:29:35.000000Z", "issued_at": "2020-12-14T02:29:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e4a0523dd92448a0a50bc80c7983b30a", "name": "tempest-ServerActionsV216RbacTest-1641826490"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:37.286 189 INFO tempest.lib.common.rest_client [req-e72a7a2e-fc7e-4bad-8ddb-dfd4a7a74b21 ] Request (ServerActionsV216RbacTest:test_show_server_host_status): 200 GET http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 1.407s 2020-12-14 02:29:37.289 189 DEBUG tempest.lib.common.rest_client [req-e72a7a2e-fc7e-4bad-8ddb-dfd4a7a74b21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.16', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2079', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.16', 'x-openstack-nova-api-version': '2.16', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e72a7a2e-fc7e-4bad-8ddb-dfd4a7a74b21', 'x-compute-request-id': 'req-e72a7a2e-fc7e-4bad-8ddb-dfd4a7a74b21', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'{"server": {"id": "19451fea-090f-40ff-a4ed-633b97371eea", "name": "tempest-ServerActionsV216RbacTest-server-1711687866", "status": "ACTIVE", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "user_id": "86ec523af9584c6c8e355bbd01f5478d", "metadata": {}, "hostId": "7c27b8feec078ff996f534d26d861c20fc97854435f08ef992a82110", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:19Z", "updated": "2020-12-14T02:29:35Z", "addresses": {"tempest-ServerActionsV216RbacTest-205257695-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:57:a6:ac"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19451fea-090f-40ff-a4ed-633b97371eea"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:29:34.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-SRV-ATTR:reservation_id": "r-1e8a3z81", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "tempest-serveractionsv216rbactest-server-1711687866", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": "/dev/sda", "OS-EXT-SRV-ATTR:user_data": null, "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [], "host_status": "UP", "locked": false}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:37.415 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:29:37.530 189 INFO tempest.lib.common.rest_client [req-e48dd99a-c6f6-4aff-b80e-4ff04e37ed4f ] Request (ServerActionsV216RbacTest:test_show_server_host_status): 200 GET http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a/users/86ec523af9584c6c8e355bbd01f5478d/roles 0.107s 2020-12-14 02:29:37.533 189 DEBUG tempest.lib.common.rest_client [req-e48dd99a-c6f6-4aff-b80e-4ff04e37ed4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e48dd99a-c6f6-4aff-b80e-4ff04e37ed4f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a/users/86ec523af9584c6c8e355bbd01f5478d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a/users/86ec523af9584c6c8e355bbd01f5478d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:37.737 189 INFO tempest.lib.common.rest_client [req-d0711f80-ca4c-46a4-9794-5c153523ecb7 ] Request (ServerActionsV216RbacTest:test_show_server_host_status): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.196s 2020-12-14 02:29:37.741 189 DEBUG tempest.lib.common.rest_client [req-d0711f80-ca4c-46a4-9794-5c153523ecb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0711f80-ca4c-46a4-9794-5c153523ecb7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "86ec523af9584c6c8e355bbd01f5478d", "name": "tempest-ServerActionsV216RbacTest-1641826490", "password_expires_at": null}, "audit_ids": ["FmGUjO8EQnefxP9-iqkeZw"], "expires_at": "2020-12-14T03:29:37.000000Z", "issued_at": "2020-12-14T02:29:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e4a0523dd92448a0a50bc80c7983b30a", "name": "tempest-ServerActionsV216RbacTest-1641826490"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e4a0523dd92448a0a50bc80c7983b30a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:38.106 189 INFO tempest.lib.common.rest_client [req-f7cf884b-0c0c-4433-8b44-64dc65c26582 ] Request (ServerActionsV216RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 0.333s 2020-12-14 02:29:38.109 189 DEBUG tempest.lib.common.rest_client [req-f7cf884b-0c0c-4433-8b44-64dc65c26582 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f7cf884b-0c0c-4433-8b44-64dc65c26582', 'x-compute-request-id': 'req-f7cf884b-0c0c-4433-8b44-64dc65c26582', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:38.330 189 INFO tempest.lib.common.rest_client [req-3d83af13-4ead-4c4f-a2da-d82cab18e992 ] Request (ServerActionsV216RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 0.215s 2020-12-14 02:29:38.333 189 DEBUG tempest.lib.common.rest_client [req-3d83af13-4ead-4c4f-a2da-d82cab18e992 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1731', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3d83af13-4ead-4c4f-a2da-d82cab18e992', 'x-compute-request-id': 'req-3d83af13-4ead-4c4f-a2da-d82cab18e992', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'{"server": {"id": "19451fea-090f-40ff-a4ed-633b97371eea", "name": "tempest-ServerActionsV216RbacTest-server-1711687866", "status": "ACTIVE", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "user_id": "86ec523af9584c6c8e355bbd01f5478d", "metadata": {}, "hostId": "7c27b8feec078ff996f534d26d861c20fc97854435f08ef992a82110", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:19Z", "updated": "2020-12-14T02:29:38Z", "addresses": {"tempest-ServerActionsV216RbacTest-205257695-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:57:a6:ac"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19451fea-090f-40ff-a4ed-633b97371eea"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:29:34.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:39.637 189 INFO tempest.lib.common.rest_client [req-3ef4034a-fc70-4706-a26b-a083e6e10e72 ] Request (ServerActionsV216RbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 0.200s 2020-12-14 02:29:39.641 189 DEBUG tempest.lib.common.rest_client [req-3ef4034a-fc70-4706-a26b-a083e6e10e72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1689', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3ef4034a-fc70-4706-a26b-a083e6e10e72', 'x-compute-request-id': 'req-3ef4034a-fc70-4706-a26b-a083e6e10e72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'{"server": {"id": "19451fea-090f-40ff-a4ed-633b97371eea", "name": "tempest-ServerActionsV216RbacTest-server-1711687866", "status": "ACTIVE", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "user_id": "86ec523af9584c6c8e355bbd01f5478d", "metadata": {}, "hostId": "7c27b8feec078ff996f534d26d861c20fc97854435f08ef992a82110", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:19Z", "updated": "2020-12-14T02:29:39Z", "addresses": {"tempest-ServerActionsV216RbacTest-205257695-network": [{"version": 4, "addr": "192.168.120.2", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:57:a6:ac"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/19451fea-090f-40ff-a4ed-633b97371eea"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:29:34.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbee", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:40.833 189 INFO tempest.lib.common.rest_client [req-7c6893e5-22cf-4d57-b060-7c8a42fc736a ] Request (ServerActionsV216RbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea 0.083s 2020-12-14 02:29:40.836 189 DEBUG tempest.lib.common.rest_client [req-7c6893e5-22cf-4d57-b060-7c8a42fc736a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-7c6893e5-22cf-4d57-b060-7c8a42fc736a', 'x-compute-request-id': 'req-7c6893e5-22cf-4d57-b060-7c8a42fc736a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/19451fea-090f-40ff-a4ed-633b97371eea'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 19451fea-090f-40ff-a4ed-633b97371eea could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:40.838 189 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '8204944d-4fb8-462f-853b-dcd220a9cc94', 'name': 'tempest-ServerActionsV216RbacTest-205257695-network', 'tenant_id': 'e4a0523dd92448a0a50bc80c7983b30a', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'e4a0523dd92448a0a50bc80c7983b30a', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 61, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:29:07Z', 'updated_at': '2020-12-14T02:29:08Z', 'revision_number': 1}, subnet: {'id': '4279a678-3536-45ee-b6ae-306088f8d19a', 'name': 'tempest-ServerActionsV216RbacTest-205257695-subnet', 'tenant_id': 'e4a0523dd92448a0a50bc80c7983b30a', 'network_id': '8204944d-4fb8-462f-853b-dcd220a9cc94', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:29:08Z', 'updated_at': '2020-12-14T02:29:08Z', 'revision_number': 0, 'project_id': 'e4a0523dd92448a0a50bc80c7983b30a'}, router: {'id': 'd01266b6-9f35-4a37-8400-f3990cd2a308', 'name': 'tempest-ServerActionsV216RbacTest-205257695-router', 'tenant_id': 'e4a0523dd92448a0a50bc80c7983b30a', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.74'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::186'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:29:09Z', 'updated_at': '2020-12-14T02:29:10Z', 'revision_number': 3, 'project_id': 'e4a0523dd92448a0a50bc80c7983b30a'} _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:29:42.839 189 INFO tempest.lib.common.rest_client [req-058ed40b-27b5-4b33-8425-133846380f4a ] Request (ServerActionsV216RbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/d01266b6-9f35-4a37-8400-f3990cd2a308/remove_router_interface 1.994s 2020-12-14 02:29:42.842 189 DEBUG tempest.lib.common.rest_client [req-058ed40b-27b5-4b33-8425-133846380f4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "4279a678-3536-45ee-b6ae-306088f8d19a"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-058ed40b-27b5-4b33-8425-133846380f4a', 'date': 'Mon, 14 Dec 2020 02:29:42 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d01266b6-9f35-4a37-8400-f3990cd2a308/remove_router_interface'} Body: b'{"id": "d01266b6-9f35-4a37-8400-f3990cd2a308", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "port_id": "968dba80-9309-48b0-9fbf-f9cfe0a68a89", "network_id": "8204944d-4fb8-462f-853b-dcd220a9cc94", "subnet_id": "4279a678-3536-45ee-b6ae-306088f8d19a", "subnet_ids": ["4279a678-3536-45ee-b6ae-306088f8d19a"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:43.962 189 INFO tempest.lib.common.rest_client [req-859c7e33-17cb-464d-a261-c989380c0052 ] Request (ServerActionsV216RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/d01266b6-9f35-4a37-8400-f3990cd2a308 1.112s 2020-12-14 02:29:43.964 189 DEBUG tempest.lib.common.rest_client [req-859c7e33-17cb-464d-a261-c989380c0052 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-859c7e33-17cb-464d-a261-c989380c0052', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:29:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/d01266b6-9f35-4a37-8400-f3990cd2a308'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:44.381 189 INFO tempest.lib.common.rest_client [req-52384f60-d56c-4f42-bcf0-d66eee630c62 ] Request (ServerActionsV216RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/4279a678-3536-45ee-b6ae-306088f8d19a 0.410s 2020-12-14 02:29:44.385 189 DEBUG tempest.lib.common.rest_client [req-52384f60-d56c-4f42-bcf0-d66eee630c62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-52384f60-d56c-4f42-bcf0-d66eee630c62', 'date': 'Mon, 14 Dec 2020 02:29:44 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/4279a678-3536-45ee-b6ae-306088f8d19a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:45.092 189 INFO tempest.lib.common.rest_client [req-eb80ab9a-9d46-4ede-b5a3-b688c9904f6c ] Request (ServerActionsV216RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/8204944d-4fb8-462f-853b-dcd220a9cc94 0.701s 2020-12-14 02:29:45.095 189 DEBUG tempest.lib.common.rest_client [req-eb80ab9a-9d46-4ede-b5a3-b688c9904f6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-eb80ab9a-9d46-4ede-b5a3-b688c9904f6c', 'date': 'Mon, 14 Dec 2020 02:29:45 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/8204944d-4fb8-462f-853b-dcd220a9cc94'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:45.299 189 INFO tempest.lib.common.rest_client [req-7128cdab-3beb-4e9b-bb73-7f3760aa4607 ] Request (ServerActionsV216RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/86ec523af9584c6c8e355bbd01f5478d 0.197s 2020-12-14 02:29:45.302 189 DEBUG tempest.lib.common.rest_client [req-7128cdab-3beb-4e9b-bb73-7f3760aa4607 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7128cdab-3beb-4e9b-bb73-7f3760aa4607', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/86ec523af9584c6c8e355bbd01f5478d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:45.388 189 INFO tempest.lib.common.rest_client [req-98ade743-c613-40ea-b846-3c4f6d0543f2 ] Request (ServerActionsV216RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e4a0523dd92448a0a50bc80c7983b30a&name=default 0.080s 2020-12-14 02:29:45.390 189 DEBUG tempest.lib.common.rest_client [req-98ade743-c613-40ea-b846-3c4f6d0543f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-98ade743-c613-40ea-b846-3c4f6d0543f2', 'date': 'Mon, 14 Dec 2020 02:29:45 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e4a0523dd92448a0a50bc80c7983b30a&name=default'} Body: b'{"security_groups": [{"id": "c73a8304-8ae0-43f9-92ff-9f163dc214b5", "name": "default", "stateful": true, "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "description": "Default security group", "security_group_rules": [{"id": "801e5f64-d5d6-4000-acae-55e612475b4a", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "security_group_id": "c73a8304-8ae0-43f9-92ff-9f163dc214b5", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:29:07Z", "updated_at": "2020-12-14T02:29:07Z", "revision_number": 0, "project_id": "e4a0523dd92448a0a50bc80c7983b30a"}, {"id": "99c791df-01fa-448c-8bb3-c86a2806227a", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "security_group_id": "c73a8304-8ae0-43f9-92ff-9f163dc214b5", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c73a8304-8ae0-43f9-92ff-9f163dc214b5", "description": null, "tags": [], "created_at": "2020-12-14T02:29:07Z", "updated_at": "2020-12-14T02:29:07Z", "revision_number": 0, "project_id": "e4a0523dd92448a0a50bc80c7983b30a"}, {"id": "a189a69b-49fb-4c01-9ef1-a0d377b363eb", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "security_group_id": "c73a8304-8ae0-43f9-92ff-9f163dc214b5", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:29:07Z", "updated_at": "2020-12-14T02:29:07Z", "revision_number": 0, "project_id": "e4a0523dd92448a0a50bc80c7983b30a"}, {"id": "a64d16ab-a7fb-4377-a736-9ef79b115512", "tenant_id": "e4a0523dd92448a0a50bc80c7983b30a", "security_group_id": "c73a8304-8ae0-43f9-92ff-9f163dc214b5", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c73a8304-8ae0-43f9-92ff-9f163dc214b5", "description": null, "tags": [], "created_at": "2020-12-14T02:29:07Z", "updated_at": "2020-12-14T02:29:07Z", "revision_number": 0, "project_id": "e4a0523dd92448a0a50bc80c7983b30a"}], "tags": [], "created_at": "2020-12-14T02:29:07Z", "updated_at": "2020-12-14T02:29:07Z", "revision_number": 1, "project_id": "e4a0523dd92448a0a50bc80c7983b30a"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:45.580 189 INFO tempest.lib.common.rest_client [req-23c4ec60-ff12-4d92-a941-d0639d235f31 ] Request (ServerActionsV216RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/c73a8304-8ae0-43f9-92ff-9f163dc214b5 0.184s 2020-12-14 02:29:45.582 189 DEBUG tempest.lib.common.rest_client [req-23c4ec60-ff12-4d92-a941-d0639d235f31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-23c4ec60-ff12-4d92-a941-d0639d235f31', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:29:45 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/c73a8304-8ae0-43f9-92ff-9f163dc214b5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:45.788 189 INFO tempest.lib.common.rest_client [req-51af28f1-0ad8-4a9b-bcd0-e617948bcd04 ] Request (ServerActionsV216RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a 0.200s 2020-12-14 02:29:45.791 189 DEBUG tempest.lib.common.rest_client [req-51af28f1-0ad8-4a9b-bcd0-e617948bcd04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51af28f1-0ad8-4a9b-bcd0-e617948bcd04', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e4a0523dd92448a0a50bc80c7983b30a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:45.920 189 INFO tempest.lib.common.rest_client [req-f4298569-05d0-4d67-8083-a09ebf85c507 ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-12-14 02:29:45.923 189 DEBUG tempest.lib.common.rest_client [req-f4298569-05d0-4d67-8083-a09ebf85c507 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4298569-05d0-4d67-8083-a09ebf85c507', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["L0L1-9fXRvy0RhvBovhgww"], "expires_at": "2020-12-14T03:29:45.000000Z", "issued_at": "2020-12-14T02:29:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:46.020 189 INFO tempest.lib.common.rest_client [req-ae8f4708-4849-464f-8745-e31398d1d819 ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:29:46.024 189 DEBUG tempest.lib.common.rest_client [req-ae8f4708-4849-464f-8745-e31398d1d819 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae8f4708-4849-464f-8745-e31398d1d819', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["A07_IkvlTGGoDrxgO4vMsw"], "expires_at": "2020-12-14T03:29:46.000000Z", "issued_at": "2020-12-14T02:29:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:46.090 189 INFO tempest.lib.common.rest_client [req-c7077a8e-587e-4dbc-8c35-db8ce407f95f ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.058s 2020-12-14 02:29:46.093 189 DEBUG tempest.lib.common.rest_client [req-c7077a8e-587e-4dbc-8c35-db8ce407f95f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7077a8e-587e-4dbc-8c35-db8ce407f95f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:46.173 189 INFO tempest.lib.common.rest_client [req-941fd5bb-6beb-4eab-aecc-f1dabb64afb5 ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.071s 2020-12-14 02:29:46.177 189 DEBUG tempest.lib.common.rest_client [req-941fd5bb-6beb-4eab-aecc-f1dabb64afb5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ComputeServersRbacTest-121605784-desc", "domain_id": "default", "name": "tempest-ComputeServersRbacTest-121605784"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-941fd5bb-6beb-4eab-aecc-f1dabb64afb5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784", "domain_id": "default", "description": "tempest-ComputeServersRbacTest-121605784-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:46.316 189 INFO tempest.lib.common.rest_client [req-e27ca605-ff2f-4eb8-a2d5-e90e916fce44 ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.127s 2020-12-14 02:29:46.319 189 DEBUG tempest.lib.common.rest_client [req-e27ca605-ff2f-4eb8-a2d5-e90e916fce44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ComputeServersRbacTest-121605784", "password": "F9^&y+b5+_#_Wz+", "project_id": "37e420629ca343bfb1c753e936941e51", "email": "tempest-ComputeServersRbacTest-47619524@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '397', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e27ca605-ff2f-4eb8-a2d5-e90e916fce44', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "37e420629ca343bfb1c753e936941e51", "email": "tempest-ComputeServersRbacTest-47619524@example.com", "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/a71eda81c57a48ea9dabbfe7a9771505"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:46.391 189 INFO tempest.lib.common.rest_client [req-ad6f5074-6813-43cf-8880-d84cf7e63e57 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-12-14 02:29:46.394 189 DEBUG tempest.lib.common.rest_client [req-ad6f5074-6813-43cf-8880-d84cf7e63e57 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad6f5074-6813-43cf-8880-d84cf7e63e57', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:46.472 189 INFO tempest.lib.common.rest_client [req-138b76be-af9b-40fb-9914-05500e66da25 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.069s 2020-12-14 02:29:46.475 189 DEBUG tempest.lib.common.rest_client [req-138b76be-af9b-40fb-9914-05500e66da25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-138b76be-af9b-40fb-9914-05500e66da25', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:46.573 189 INFO tempest.lib.common.rest_client [req-c6f2bbcc-73ce-425f-b70b-5c3413419912 ] Request (ComputeServersRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles/72a4576c553448cd941b052c1ca0cf2d 0.090s 2020-12-14 02:29:46.577 189 DEBUG tempest.lib.common.rest_client [req-c6f2bbcc-73ce-425f-b70b-5c3413419912 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6f2bbcc-73ce-425f-b70b-5c3413419912', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:46.579 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ComputeServersRbacTest-121605784', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '37e420629ca343bfb1c753e936941e51', 'project_name': 'tempest-ComputeServersRbacTest-121605784', 'tenant_id': '37e420629ca343bfb1c753e936941e51', 'tenant_name': 'tempest-ComputeServersRbacTest-121605784', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'a71eda81c57a48ea9dabbfe7a9771505'}, Network: None, Subnet: None, Router: None 2020-12-14 02:29:46.680 189 INFO tempest.lib.common.rest_client [req-cca55ae8-fb1c-4a7f-99a5-e75fa35b87fe ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:29:46.684 189 DEBUG tempest.lib.common.rest_client [req-cca55ae8-fb1c-4a7f-99a5-e75fa35b87fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cca55ae8-fb1c-4a7f-99a5-e75fa35b87fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["VepNJrLnT7m1FUTh9eIuyw"], "expires_at": "2020-12-14T03:29:46.000000Z", "issued_at": "2020-12-14T02:29:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:47.393 189 INFO tempest.lib.common.rest_client [req-be59e6f9-34d9-4d7f-8bbc-f6ee2445b05a ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.702s 2020-12-14 02:29:47.395 189 DEBUG tempest.lib.common.rest_client [req-be59e6f9-34d9-4d7f-8bbc-f6ee2445b05a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ComputeServersRbacTest-206536169-network", "tenant_id": "37e420629ca343bfb1c753e936941e51"}} Response - Headers: {'content-type': 'application/json', 'content-length': '737', 'x-openstack-request-id': 'req-be59e6f9-34d9-4d7f-8bbc-f6ee2445b05a', 'date': 'Mon, 14 Dec 2020 02:29:47 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"f732ef78-a453-4519-9007-4a452f8849d3","name":"tempest-ComputeServersRbacTest-206536169-network","tenant_id":"37e420629ca343bfb1c753e936941e51","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"37e420629ca343bfb1c753e936941e51","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":53,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:29:47Z","updated_at":"2020-12-14T02:29:47Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:48.142 189 INFO tempest.lib.common.rest_client [req-b6640735-a02a-4712-971f-e47f52700cf1 ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.734s 2020-12-14 02:29:48.144 189 DEBUG tempest.lib.common.rest_client [req-b6640735-a02a-4712-971f-e47f52700cf1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "f732ef78-a453-4519-9007-4a452f8849d3", "cidr": "192.168.120.0/28", "name": "tempest-ComputeServersRbacTest-206536169-subnet", "tenant_id": "37e420629ca343bfb1c753e936941e51", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '709', 'x-openstack-request-id': 'req-b6640735-a02a-4712-971f-e47f52700cf1', 'date': 'Mon, 14 Dec 2020 02:29:48 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"a1f63961-1db2-4d18-95bc-c8c1a74df7b6","name":"tempest-ComputeServersRbacTest-206536169-subnet","tenant_id":"37e420629ca343bfb1c753e936941e51","network_id":"f732ef78-a453-4519-9007-4a452f8849d3","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:29:47Z","updated_at":"2020-12-14T02:29:47Z","revision_number":0,"project_id":"37e420629ca343bfb1c753e936941e51"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:49.517 189 INFO tempest.lib.common.rest_client [req-a516adc2-b4d3-4aa5-b88a-506e188e3223 ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.365s 2020-12-14 02:29:49.520 189 DEBUG tempest.lib.common.rest_client [req-a516adc2-b4d3-4aa5-b88a-506e188e3223 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ComputeServersRbacTest-206536169-router", "tenant_id": "37e420629ca343bfb1c753e936941e51", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '810', 'x-openstack-request-id': 'req-a516adc2-b4d3-4aa5-b88a-506e188e3223', 'date': 'Mon, 14 Dec 2020 02:29:49 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "82ffbca8-b190-4581-af9f-f735ada3b9a8", "name": "tempest-ComputeServersRbacTest-206536169-router", "tenant_id": "37e420629ca343bfb1c753e936941e51", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.39"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::309"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:29:48Z", "updated_at": "2020-12-14T02:29:49Z", "revision_number": 3, "project_id": "37e420629ca343bfb1c753e936941e51"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:51.237 189 INFO tempest.lib.common.rest_client [req-0892a869-cc46-403b-8cfa-64d24055533f ] Request (ComputeServersRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/82ffbca8-b190-4581-af9f-f735ada3b9a8/add_router_interface 1.709s 2020-12-14 02:29:51.239 189 DEBUG tempest.lib.common.rest_client [req-0892a869-cc46-403b-8cfa-64d24055533f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "a1f63961-1db2-4d18-95bc-c8c1a74df7b6"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-0892a869-cc46-403b-8cfa-64d24055533f', 'date': 'Mon, 14 Dec 2020 02:29:51 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/82ffbca8-b190-4581-af9f-f735ada3b9a8/add_router_interface'} Body: b'{"id": "82ffbca8-b190-4581-af9f-f735ada3b9a8", "tenant_id": "37e420629ca343bfb1c753e936941e51", "port_id": "2b53d7ab-7c97-4804-9277-c1f42e98db94", "network_id": "f732ef78-a453-4519-9007-4a452f8849d3", "subnet_id": "a1f63961-1db2-4d18-95bc-c8c1a74df7b6", "subnet_ids": ["a1f63961-1db2-4d18-95bc-c8c1a74df7b6"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:51.242 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ComputeServersRbacTest-121605784', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '37e420629ca343bfb1c753e936941e51', 'project_name': 'tempest-ComputeServersRbacTest-121605784', 'tenant_id': '37e420629ca343bfb1c753e936941e51', 'tenant_name': 'tempest-ComputeServersRbacTest-121605784', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'a71eda81c57a48ea9dabbfe7a9771505'}, Network: {'id': 'f732ef78-a453-4519-9007-4a452f8849d3', 'name': 'tempest-ComputeServersRbacTest-206536169-network', 'tenant_id': '37e420629ca343bfb1c753e936941e51', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '37e420629ca343bfb1c753e936941e51', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:29:47Z', 'updated_at': '2020-12-14T02:29:47Z', 'revision_number': 1}, Subnet: {'id': 'a1f63961-1db2-4d18-95bc-c8c1a74df7b6', 'name': 'tempest-ComputeServersRbacTest-206536169-subnet', 'tenant_id': '37e420629ca343bfb1c753e936941e51', 'network_id': 'f732ef78-a453-4519-9007-4a452f8849d3', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:29:47Z', 'updated_at': '2020-12-14T02:29:47Z', 'revision_number': 0, 'project_id': '37e420629ca343bfb1c753e936941e51'}, Router: {'id': '82ffbca8-b190-4581-af9f-f735ada3b9a8', 'name': 'tempest-ComputeServersRbacTest-206536169-router', 'tenant_id': '37e420629ca343bfb1c753e936941e51', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.39'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::309'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:29:48Z', 'updated_at': '2020-12-14T02:29:49Z', 'revision_number': 3, 'project_id': '37e420629ca343bfb1c753e936941e51'} 2020-12-14 02:29:51.443 189 INFO tempest.lib.common.rest_client [req-d28f2dcf-269b-452b-8735-9d89cf77791f ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.137s 2020-12-14 02:29:51.446 189 DEBUG tempest.lib.common.rest_client [req-d28f2dcf-269b-452b-8735-9d89cf77791f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6573', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d28f2dcf-269b-452b-8735-9d89cf77791f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["g66vSeIWQie7m9V98u8RSw"], "expires_at": "2020-12-14T03:29:51.000000Z", "issued_at": "2020-12-14T02:29:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://1 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:51.503 189 INFO tempest.lib.common.rest_client [req-ceeb938b-e6ad-45e0-bda5-7e1f24894258 ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:29:51.506 189 DEBUG tempest.lib.common.rest_client [req-ceeb938b-e6ad-45e0-bda5-7e1f24894258 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ceeb938b-e6ad-45e0-bda5-7e1f24894258', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["AOKK8-WoRM24acii4kA_3w"], "expires_at": "2020-12-14T03:29:51.000000Z", "issued_at": "2020-12-14T02:29:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:51.621 189 INFO tempest.lib.common.rest_client [req-e8c6402a-acd8-458e-a808-12bd28d6708d ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:29:51.624 189 DEBUG tempest.lib.common.rest_client [req-e8c6402a-acd8-458e-a808-12bd28d6708d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e8c6402a-acd8-458e-a808-12bd28d6708d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["yRvjaqvITr2c3nCMWfbzFQ"], "expires_at": "2020-12-14T03:29:51.000000Z", "issued_at": "2020-12-14T02:29:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:51.690 189 INFO tempest.lib.common.rest_client [req-abca6cd6-5039-446a-9a78-a082331df625 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.058s 2020-12-14 02:29:51.693 189 DEBUG tempest.lib.common.rest_client [req-abca6cd6-5039-446a-9a78-a082331df625 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-abca6cd6-5039-446a-9a78-a082331df625', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:51.766 189 INFO tempest.lib.common.rest_client [req-7e1e69c0-1308-4297-8ab3-99db65b3c99a ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.065s 2020-12-14 02:29:51.769 189 DEBUG tempest.lib.common.rest_client [req-7e1e69c0-1308-4297-8ab3-99db65b3c99a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e1e69c0-1308-4297-8ab3-99db65b3c99a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:51.772 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:29:51.774 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:29:51.847 189 INFO tempest.lib.common.rest_client [req-94a74a03-384e-4787-9277-9db13721c5fa ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles 0.067s 2020-12-14 02:29:51.849 189 DEBUG tempest.lib.common.rest_client [req-94a74a03-384e-4787-9277-9db13721c5fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94a74a03-384e-4787-9277-9db13721c5fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:51.924 189 INFO tempest.lib.common.rest_client [req-d4c269db-a40d-4da6-80d5-33c224584930 ] Request (ComputeServersRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-12-14 02:29:51.927 189 DEBUG tempest.lib.common.rest_client [req-d4c269db-a40d-4da6-80d5-33c224584930 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4c269db-a40d-4da6-80d5-33c224584930', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:52.070 189 INFO tempest.lib.common.rest_client [req-25118a8e-92ed-4519-9b13-b706d65baf3c ] Request (ComputeServersRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles/a629c95d64b3416fb80ae90af4f69c05 0.135s 2020-12-14 02:29:52.073 189 DEBUG tempest.lib.common.rest_client [req-25118a8e-92ed-4519-9b13-b706d65baf3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25118a8e-92ed-4519-9b13-b706d65baf3c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:53.194 189 INFO tempest.lib.common.rest_client [req-3297eb04-6d11-4686-9204-7bd5dd23b72f ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.113s 2020-12-14 02:29:53.199 189 DEBUG tempest.lib.common.rest_client [req-3297eb04-6d11-4686-9204-7bd5dd23b72f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3297eb04-6d11-4686-9204-7bd5dd23b72f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["s8wyS31gSA-eSHlQFDPMzQ"], "expires_at": "2020-12-14T03:29:53.000000Z", "issued_at": "2020-12-14T02:29:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:53.321 189 INFO tempest.lib.common.rest_client [req-657178cb-0d53-43b8-9b06-a13a4d166e1e ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:29:53.324 189 DEBUG tempest.lib.common.rest_client [req-657178cb-0d53-43b8-9b06-a13a4d166e1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-657178cb-0d53-43b8-9b06-a13a4d166e1e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["vpc2kjjwQsSECh3ESgI9vw"], "expires_at": "2020-12-14T03:29:53.000000Z", "issued_at": "2020-12-14T02:29:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:53.329 189 INFO tempest.lib.common.fixed_network [-] (ComputeServersRbacTest:setUpClass) Found network {'id': 'f732ef78-a453-4519-9007-4a452f8849d3', 'name': 'tempest-ComputeServersRbacTest-206536169-network', 'tenant_id': '37e420629ca343bfb1c753e936941e51', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '37e420629ca343bfb1c753e936941e51', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:29:47Z', 'updated_at': '2020-12-14T02:29:47Z', 'revision_number': 1} available for tenant 2020-12-14 02:29:54.383 189 INFO tempest.lib.common.rest_client [req-67b51a67-e9b4-44a9-b041-83e9275b26c6 ] Request (ComputeServersRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 1.045s 2020-12-14 02:29:54.385 189 DEBUG tempest.lib.common.rest_client [req-67b51a67-e9b4-44a9-b041-83e9275b26c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ComputeServersRbacTest-server-231705967", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "f732ef78-a453-4519-9007-4a452f8849d3"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-67b51a67-e9b4-44a9-b041-83e9275b26c6', 'x-compute-request-id': 'req-67b51a67-e9b4-44a9-b041-83e9275b26c6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "3e46b6d9-db36-41d3-8a39-65036332620f", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "q2E4RmGdQ9mf"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:54.528 189 INFO tempest.lib.common.rest_client [req-b6707134-457a-4ed1-8c2f-7100ed461df7 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f 0.112s 2020-12-14 02:29:54.530 189 DEBUG tempest.lib.common.rest_client [req-b6707134-457a-4ed1-8c2f-7100ed461df7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1397', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b6707134-457a-4ed1-8c2f-7100ed461df7', 'x-compute-request-id': 'req-b6707134-457a-4ed1-8c2f-7100ed461df7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f'} Body: b'{"server": {"id": "3e46b6d9-db36-41d3-8a39-65036332620f", "name": "tempest-ComputeServersRbacTest-server-231705967", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:54Z", "updated": "2020-12-14T02:29:54Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:55.778 189 INFO tempest.lib.common.rest_client [req-5a9fd4ea-56bb-4c02-a9f9-967feeafbc98 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f 0.143s 2020-12-14 02:29:55.781 189 DEBUG tempest.lib.common.rest_client [req-5a9fd4ea-56bb-4c02-a9f9-967feeafbc98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1502', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5a9fd4ea-56bb-4c02-a9f9-967feeafbc98', 'x-compute-request-id': 'req-5a9fd4ea-56bb-4c02-a9f9-967feeafbc98', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f'} Body: b'{"server": {"id": "3e46b6d9-db36-41d3-8a39-65036332620f", "name": "tempest-ComputeServersRbacTest-server-231705967", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "faddde5d1cc1525db043e6ad17e8074f19630f2f396bca285c14b7da", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:54Z", "updated": "2020-12-14T02:29:56Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "block_device_mapping", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:55.879 189 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/block_device_mapping" after 1 second wait 2020-12-14 02:29:57.172 189 INFO tempest.lib.common.rest_client [req-c09d258f-24f8-4bd6-94cf-cddfdffbd254 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f 0.285s 2020-12-14 02:29:57.176 189 DEBUG tempest.lib.common.rest_client [req-c09d258f-24f8-4bd6-94cf-cddfdffbd254 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c09d258f-24f8-4bd6-94cf-cddfdffbd254', 'x-compute-request-id': 'req-c09d258f-24f8-4bd6-94cf-cddfdffbd254', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f'} Body: b'{"server": {"id": "3e46b6d9-db36-41d3-8a39-65036332620f", "name": "tempest-ComputeServersRbacTest-server-231705967", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "faddde5d1cc1525db043e6ad17e8074f19630f2f396bca285c14b7da", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:54Z", "updated": "2020-12-14T02:29:56Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:57.274 189 INFO tempest.common.waiters [-] State transition "BUILD/block_device_mapping" ==> "BUILD/spawning" after 3 second wait 2020-12-14 02:29:58.520 189 INFO tempest.lib.common.rest_client [req-0ac630d7-815e-4ca0-b1cb-d50c889c32e7 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f 0.238s 2020-12-14 02:29:58.523 189 DEBUG tempest.lib.common.rest_client [req-0ac630d7-815e-4ca0-b1cb-d50c889c32e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0ac630d7-815e-4ca0-b1cb-d50c889c32e7', 'x-compute-request-id': 'req-0ac630d7-815e-4ca0-b1cb-d50c889c32e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f'} Body: b'{"server": {"id": "3e46b6d9-db36-41d3-8a39-65036332620f", "name": "tempest-ComputeServersRbacTest-server-231705967", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "faddde5d1cc1525db043e6ad17e8074f19630f2f396bca285c14b7da", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:54Z", "updated": "2020-12-14T02:29:56Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:29:59.887 189 INFO tempest.lib.common.rest_client [req-215d1f24-df59-425f-a4b9-b6d5b5158c7c ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f 0.258s 2020-12-14 02:29:59.889 189 DEBUG tempest.lib.common.rest_client [req-215d1f24-df59-425f-a4b9-b6d5b5158c7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:29:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-215d1f24-df59-425f-a4b9-b6d5b5158c7c', 'x-compute-request-id': 'req-215d1f24-df59-425f-a4b9-b6d5b5158c7c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f'} Body: b'{"server": {"id": "3e46b6d9-db36-41d3-8a39-65036332620f", "name": "tempest-ComputeServersRbacTest-server-231705967", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "faddde5d1cc1525db043e6ad17e8074f19630f2f396bca285c14b7da", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:54Z", "updated": "2020-12-14T02:29:56Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:01.211 189 INFO tempest.lib.common.rest_client [req-56017c6b-3efb-4892-b8b0-951fa902de3c ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f 0.212s 2020-12-14 02:30:01.214 189 DEBUG tempest.lib.common.rest_client [req-56017c6b-3efb-4892-b8b0-951fa902de3c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-56017c6b-3efb-4892-b8b0-951fa902de3c', 'x-compute-request-id': 'req-56017c6b-3efb-4892-b8b0-951fa902de3c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f'} Body: b'{"server": {"id": "3e46b6d9-db36-41d3-8a39-65036332620f", "name": "tempest-ComputeServersRbacTest-server-231705967", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "faddde5d1cc1525db043e6ad17e8074f19630f2f396bca285c14b7da", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:54Z", "updated": "2020-12-14T02:29:56Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:02.571 189 INFO tempest.lib.common.rest_client [req-af101402-977a-44e0-8df2-e7a958f66797 ] Request (ComputeServersRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f 0.251s 2020-12-14 02:30:02.573 189 DEBUG tempest.lib.common.rest_client [req-af101402-977a-44e0-8df2-e7a958f66797 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-af101402-977a-44e0-8df2-e7a958f66797', 'x-compute-request-id': 'req-af101402-977a-44e0-8df2-e7a958f66797', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f'} Body: b'{"server": {"id": "3e46b6d9-db36-41d3-8a39-65036332620f", "name": "tempest-ComputeServersRbacTest-server-231705967", "status": "ACTIVE", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "faddde5d1cc1525db043e6ad17e8074f19630f2f396bca285c14b7da", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:54Z", "updated": "2020-12-14T02:30:02Z", "addresses": {"tempest-ComputeServersRbacTest-206536169-network": [{"version": 4, "addr": "192.168.120.4", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:b8:ca:26"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:30:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:02.676 189 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 8 second wait 2020-12-14 02:30:02.785 189 INFO tempest.lib.common.rest_client [req-676c0f4c-9a26-46bd-bf18-d7f2bd02d0b1 ] Request (ComputeServersRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:30:02.788 189 DEBUG tempest.lib.common.rest_client [req-676c0f4c-9a26-46bd-bf18-d7f2bd02d0b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-676c0f4c-9a26-46bd-bf18-d7f2bd02d0b1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["WQRRLg_ZTfKx5GtHYONEsQ"], "expires_at": "2020-12-14T03:30:02.000000Z", "issued_at": "2020-12-14T02:30:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:02.793 189 INFO tempest.lib.common.fixed_network [-] (ComputeServersRbacTest:setUpClass) Found network {'id': 'f732ef78-a453-4519-9007-4a452f8849d3', 'name': 'tempest-ComputeServersRbacTest-206536169-network', 'tenant_id': '37e420629ca343bfb1c753e936941e51', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '37e420629ca343bfb1c753e936941e51', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:29:47Z', 'updated_at': '2020-12-14T02:29:47Z', 'revision_number': 1} available for tenant 2020-12-14 02:30:02.801 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:30:02.806 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.809 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.812 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.815 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.819 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.822 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.827 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.830 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.832 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.835 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.838 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.840 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.843 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.846 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.849 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.852 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.855 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.857 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.860 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.862 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.865 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.868 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.870 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.873 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.875 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.878 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.880 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.883 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.886 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.888 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.891 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.893 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.896 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.899 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.901 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.904 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.907 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.909 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.912 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.916 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.918 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.921 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.924 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.927 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.930 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.932 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.935 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.938 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.940 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.943 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.946 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.948 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.951 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.954 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.958 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.960 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.966 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.969 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.971 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.975 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.977 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.980 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.983 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.985 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.988 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.990 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.992 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.994 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.996 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:02.998 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:03.000 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:03.006 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:create, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:30:03.007 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:30:03.120 189 INFO tempest.lib.common.rest_client [req-6a8ccb06-6c76-416e-8797-a8df9ee1124b ] Request (ComputeServersRbacTest:test_create_server): 200 GET http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles 0.107s 2020-12-14 02:30:03.123 189 DEBUG tempest.lib.common.rest_client [req-6a8ccb06-6c76-416e-8797-a8df9ee1124b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a8ccb06-6c76-416e-8797-a8df9ee1124b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:03.168 189 INFO tempest.lib.common.rest_client [req-c960cae1-9076-4302-b44f-1bedc3c2838a ] Request (ComputeServersRbacTest:test_create_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:30:03.172 189 DEBUG tempest.lib.common.rest_client [req-c960cae1-9076-4302-b44f-1bedc3c2838a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c960cae1-9076-4302-b44f-1bedc3c2838a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["0pylEwPDQoKQuxOcNN8rlg"], "expires_at": "2020-12-14T03:30:03.000000Z", "issued_at": "2020-12-14T02:30:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:03.996 189 INFO tempest.lib.common.rest_client [req-a60f4509-6563-4d25-9019-7fbc0f1ffd58 ] Request (ComputeServersRbacTest:test_create_server): 202 POST http://172.30.13.94/compute/v2.1/servers 0.817s 2020-12-14 02:30:03.999 189 DEBUG tempest.lib.common.rest_client [req-a60f4509-6563-4d25-9019-7fbc0f1ffd58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ComputeServersRbacTest-Server-1543606893", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "networks": [{"uuid": "f732ef78-a453-4519-9007-4a452f8849d3"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/5bafe707-b08b-4c55-84a0-cfbf9b61e125', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a60f4509-6563-4d25-9019-7fbc0f1ffd58', 'x-compute-request-id': 'req-a60f4509-6563-4d25-9019-7fbc0f1ffd58', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "5bafe707-b08b-4c55-84a0-cfbf9b61e125", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/5bafe707-b08b-4c55-84a0-cfbf9b61e125"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/5bafe707-b08b-4c55-84a0-cfbf9b61e125"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "gM4Ae5KCV2r7"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:04.021 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:30:04.074 189 INFO tempest.lib.common.rest_client [req-7f767df9-6607-430e-8be0-948644ecdbb4 ] Request (ComputeServersRbacTest:test_create_server): 200 GET http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles 0.048s 2020-12-14 02:30:04.076 189 DEBUG tempest.lib.common.rest_client [req-7f767df9-6607-430e-8be0-948644ecdbb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f767df9-6607-430e-8be0-948644ecdbb4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:04.121 189 INFO tempest.lib.common.rest_client [req-be84a7b8-0452-4478-9e36-900fdb6402a3 ] Request (ComputeServersRbacTest:test_create_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:30:04.125 189 DEBUG tempest.lib.common.rest_client [req-be84a7b8-0452-4478-9e36-900fdb6402a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be84a7b8-0452-4478-9e36-900fdb6402a3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["Y7NqLB-fQAa1MdsJBqoD5A"], "expires_at": "2020-12-14T03:30:04.000000Z", "issued_at": "2020-12-14T02:30:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:04.517 189 INFO tempest.lib.common.rest_client [req-09951b21-c892-4249-9fc4-cd29b2616148 ] Request (ComputeServersRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/5bafe707-b08b-4c55-84a0-cfbf9b61e125 0.382s 2020-12-14 02:30:04.520 189 DEBUG tempest.lib.common.rest_client [req-09951b21-c892-4249-9fc4-cd29b2616148 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-09951b21-c892-4249-9fc4-cd29b2616148', 'x-compute-request-id': 'req-09951b21-c892-4249-9fc4-cd29b2616148', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/5bafe707-b08b-4c55-84a0-cfbf9b61e125'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:04.598 189 INFO tempest.lib.common.rest_client [req-d6a6794b-2948-45c9-940d-27b9642b2384 ] Request (ComputeServersRbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/servers/5bafe707-b08b-4c55-84a0-cfbf9b61e125 0.071s 2020-12-14 02:30:04.601 189 DEBUG tempest.lib.common.rest_client [req-d6a6794b-2948-45c9-940d-27b9642b2384 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-d6a6794b-2948-45c9-940d-27b9642b2384', 'x-compute-request-id': 'req-d6a6794b-2948-45c9-940d-27b9642b2384', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/5bafe707-b08b-4c55-84a0-cfbf9b61e125'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 5bafe707-b08b-4c55-84a0-cfbf9b61e125 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:04.624 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:30:04.632 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.636 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.639 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.641 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.645 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.648 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.653 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.655 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.657 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.659 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.662 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.664 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.667 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.669 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.671 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.674 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.676 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.678 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.680 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.682 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.684 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.686 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.688 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.690 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.692 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.695 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.697 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.699 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.701 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.703 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.705 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.707 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.710 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.712 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.714 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.717 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.719 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.722 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.724 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.727 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.729 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.731 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.733 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.736 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.739 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.741 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.743 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.745 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.747 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.750 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.752 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.754 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.757 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.759 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.764 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.768 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.774 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.777 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.780 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.784 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.788 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.790 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.792 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.796 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.799 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.803 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.807 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.811 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.814 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.817 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.820 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:04.827 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:create:attach_network, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:30:05.271 189 INFO tempest.lib.common.rest_client [req-930c6f4f-72db-4dd1-9d30-8f5b95304c7d ] Request (ComputeServersRbacTest:test_create_server_attach_network): 201 POST http://172.30.13.94:9696/v2.0/networks 0.433s 2020-12-14 02:30:05.276 189 DEBUG tempest.lib.common.rest_client [req-930c6f4f-72db-4dd1-9d30-8f5b95304c7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ComputeServersRbacTest-network-1069964291", "port_security_enabled": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '738', 'x-openstack-request-id': 'req-930c6f4f-72db-4dd1-9d30-8f5b95304c7d', 'date': 'Mon, 14 Dec 2020 02:30:05 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"9df44746-fe1f-443d-b8f0-77374e2c652d","name":"tempest-ComputeServersRbacTest-network-1069964291","tenant_id":"37e420629ca343bfb1c753e936941e51","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"37e420629ca343bfb1c753e936941e51","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":59,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:30:05Z","updated_at":"2020-12-14T02:30:05Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:05.874 189 INFO tempest.lib.common.rest_client [req-06337ad6-8f0a-40cc-8a1b-5c426b6d9d6e ] Request (ComputeServersRbacTest:test_create_server_attach_network): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.589s 2020-12-14 02:30:05.878 189 DEBUG tempest.lib.common.rest_client [req-06337ad6-8f0a-40cc-8a1b-5c426b6d9d6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"name": "tempest-ComputeServersRbacTest-subnet-376518995", "network_id": "9df44746-fe1f-443d-b8f0-77374e2c652d", "cidr": "192.168.120.0/24", "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '709', 'x-openstack-request-id': 'req-06337ad6-8f0a-40cc-8a1b-5c426b6d9d6e', 'date': 'Mon, 14 Dec 2020 02:30:05 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"c37e34e3-a42e-4cda-9b4a-abeca39623a7","name":"tempest-ComputeServersRbacTest-subnet-376518995","tenant_id":"37e420629ca343bfb1c753e936941e51","network_id":"9df44746-fe1f-443d-b8f0-77374e2c652d","ip_version":4,"subnetpool_id":null,"enable_dhcp":true,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/24","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:30:05Z","updated_at":"2020-12-14T02:30:05Z","revision_number":0,"project_id":"37e420629ca343bfb1c753e936941e51"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:05.882 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:30:05.957 189 INFO tempest.lib.common.rest_client [req-c4455c4b-1f00-42da-9921-0ddd5ee1ca5a ] Request (ComputeServersRbacTest:test_create_server_attach_network): 200 GET http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles 0.066s 2020-12-14 02:30:05.961 189 DEBUG tempest.lib.common.rest_client [req-c4455c4b-1f00-42da-9921-0ddd5ee1ca5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c4455c4b-1f00-42da-9921-0ddd5ee1ca5a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:06.011 189 INFO tempest.lib.common.rest_client [req-e788afdf-2766-4dd1-8b47-9ab959ec9570 ] Request (ComputeServersRbacTest:test_create_server_attach_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:30:06.015 189 DEBUG tempest.lib.common.rest_client [req-e788afdf-2766-4dd1-8b47-9ab959ec9570 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e788afdf-2766-4dd1-8b47-9ab959ec9570', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["Qd_LKGdSRTCAx6S6mSLc5w"], "expires_at": "2020-12-14T03:30:05.000000Z", "issued_at": "2020-12-14T02:30:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:06.882 189 INFO tempest.lib.common.rest_client [req-91148959-6ef9-45e0-ab71-cc9c9aa44985 ] Request (ComputeServersRbacTest:test_create_server_attach_network): 202 POST http://172.30.13.94/compute/v2.1/servers 0.858s 2020-12-14 02:30:06.885 189 DEBUG tempest.lib.common.rest_client [req-91148959-6ef9-45e0-ab71-cc9c9aa44985 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ComputeServersRbacTest-Server-460753282", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "networks": [{"uuid": "9df44746-fe1f-443d-b8f0-77374e2c652d"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/ada6c4d8-20ec-456c-b128-8ad2f0565275', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-91148959-6ef9-45e0-ab71-cc9c9aa44985', 'x-compute-request-id': 'req-91148959-6ef9-45e0-ab71-cc9c9aa44985', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "ada6c4d8-20ec-456c-b128-8ad2f0565275", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/ada6c4d8-20ec-456c-b128-8ad2f0565275"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/ada6c4d8-20ec-456c-b128-8ad2f0565275"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "jeJPY45hspXK"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:06.912 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:30:06.981 189 INFO tempest.lib.common.rest_client [req-3056b770-2dae-489a-8846-ca554037789e ] Request (ComputeServersRbacTest:test_create_server_attach_network): 200 GET http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles 0.061s 2020-12-14 02:30:06.985 189 DEBUG tempest.lib.common.rest_client [req-3056b770-2dae-489a-8846-ca554037789e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3056b770-2dae-489a-8846-ca554037789e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:07.051 189 INFO tempest.lib.common.rest_client [req-0fb9f99d-7ceb-4188-afa7-42e5454eef30 ] Request (ComputeServersRbacTest:test_create_server_attach_network): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-12-14 02:30:07.055 189 DEBUG tempest.lib.common.rest_client [req-0fb9f99d-7ceb-4188-afa7-42e5454eef30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0fb9f99d-7ceb-4188-afa7-42e5454eef30', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["2ZlY6xl_QO-zuNqSrR_nfw"], "expires_at": "2020-12-14T03:30:07.000000Z", "issued_at": "2020-12-14T02:30:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:07.358 189 INFO tempest.lib.common.rest_client [req-58df8959-7a3b-461e-a417-7e879270d078 ] Request (ComputeServersRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/ada6c4d8-20ec-456c-b128-8ad2f0565275 0.292s 2020-12-14 02:30:07.361 189 DEBUG tempest.lib.common.rest_client [req-58df8959-7a3b-461e-a417-7e879270d078 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-58df8959-7a3b-461e-a417-7e879270d078', 'x-compute-request-id': 'req-58df8959-7a3b-461e-a417-7e879270d078', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ada6c4d8-20ec-456c-b128-8ad2f0565275'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:07.400 189 INFO tempest.lib.common.rest_client [req-dd1c158a-ed92-4fbb-92df-0c3d186d4fc8 ] Request (ComputeServersRbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/servers/ada6c4d8-20ec-456c-b128-8ad2f0565275 0.033s 2020-12-14 02:30:07.403 189 DEBUG tempest.lib.common.rest_client [req-dd1c158a-ed92-4fbb-92df-0c3d186d4fc8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-dd1c158a-ed92-4fbb-92df-0c3d186d4fc8', 'x-compute-request-id': 'req-dd1c158a-ed92-4fbb-92df-0c3d186d4fc8', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/ada6c4d8-20ec-456c-b128-8ad2f0565275'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance ada6c4d8-20ec-456c-b128-8ad2f0565275 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:07.952 189 INFO tempest.lib.common.rest_client [req-7d6cb95e-5bdf-4403-b0dd-98a12d80f4ca ] Request (ComputeServersRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/c37e34e3-a42e-4cda-9b4a-abeca39623a7 0.543s 2020-12-14 02:30:07.956 189 DEBUG tempest.lib.common.rest_client [req-7d6cb95e-5bdf-4403-b0dd-98a12d80f4ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-7d6cb95e-5bdf-4403-b0dd-98a12d80f4ca', 'date': 'Mon, 14 Dec 2020 02:30:07 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/c37e34e3-a42e-4cda-9b4a-abeca39623a7'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:08.990 189 INFO tempest.lib.common.rest_client [req-c586a735-b149-47d2-a140-e6e99b90f12d ] Request (ComputeServersRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/networks/9df44746-fe1f-443d-b8f0-77374e2c652d 1.027s 2020-12-14 02:30:08.994 189 DEBUG tempest.lib.common.rest_client [req-c586a735-b149-47d2-a140-e6e99b90f12d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-c586a735-b149-47d2-a140-e6e99b90f12d', 'date': 'Mon, 14 Dec 2020 02:30:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/9df44746-fe1f-443d-b8f0-77374e2c652d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:09.018 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:30:09.023 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.026 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.029 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.032 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.036 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.040 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.044 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.047 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.050 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.053 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.055 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.058 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.061 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.064 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.067 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.070 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.073 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.076 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.079 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.081 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.084 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.086 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.088 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.090 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.092 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.094 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.096 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.098 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.100 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.103 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.105 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.107 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.109 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.111 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.114 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.116 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.119 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.121 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.124 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.127 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.129 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.131 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.134 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.136 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.138 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.140 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.143 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.145 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.147 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.149 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.152 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.154 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.156 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.158 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.161 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.163 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.168 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.170 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.172 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.174 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.177 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.179 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.181 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.183 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.185 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.187 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.189 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.191 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.193 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.196 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.198 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:09.204 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:create:attach_volume, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:30:09.702 189 INFO tempest.lib.common.rest_client [req-07eae585-015a-45d0-a82c-342f2e2f8056 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 202 POST http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes 0.491s 2020-12-14 02:30:09.706 189 DEBUG tempest.lib.common.rest_client [req-07eae585-015a-45d0-a82c-342f2e2f8056 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "size": 1, "display_name": "tempest-ComputeServersRbacTest-volume-415376230"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-07eae585-015a-45d0-a82c-342f2e2f8056', 'content-length': '842', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-07eae585-015a-45d0-a82c-342f2e2f8056', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes'} Body: b'{"volume": {"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:30:10.000000", "updated_at": null, "name": "tempest-ComputeServersRbacTest-volume-415376230", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}], "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:09.910 189 INFO tempest.lib.common.rest_client [req-4aba05f7-11fb-42d3-93e6-712586963926 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 0.089s 2020-12-14 02:30:09.914 189 DEBUG tempest.lib.common.rest_client [req-4aba05f7-11fb-42d3-93e6-712586963926 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4aba05f7-11fb-42d3-93e6-712586963926', 'content-length': '1064', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4aba05f7-11fb-42d3-93e6-712586963926', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4'} Body: b'{"volume": {"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:30:10.000000", "updated_at": "2020-12-14T02:30:10.000000", "name": "tempest-ComputeServersRbacTest-volume-415376230", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}], "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "37e420629ca343bfb1c753e936941e51"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:11.087 189 INFO tempest.lib.common.rest_client [req-bbcdf074-aa33-47cd-a234-0eafe33e7bd3 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 0.089s 2020-12-14 02:30:11.091 189 DEBUG tempest.lib.common.rest_client [req-bbcdf074-aa33-47cd-a234-0eafe33e7bd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bbcdf074-aa33-47cd-a234-0eafe33e7bd3', 'content-length': '1122', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bbcdf074-aa33-47cd-a234-0eafe33e7bd3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4'} Body: b'{"volume": {"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:30:10.000000", "updated_at": "2020-12-14T02:30:10.000000", "name": "tempest-ComputeServersRbacTest-volume-415376230", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}], "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "37e420629ca343bfb1c753e936941e51"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:12.279 189 INFO tempest.lib.common.rest_client [req-45a4074e-a3fc-4ba1-aadf-6697e95c94f4 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 0.087s 2020-12-14 02:30:12.282 189 DEBUG tempest.lib.common.rest_client [req-45a4074e-a3fc-4ba1-aadf-6697e95c94f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-45a4074e-a3fc-4ba1-aadf-6697e95c94f4', 'content-length': '1125', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-45a4074e-a3fc-4ba1-aadf-6697e95c94f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4'} Body: b'{"volume": {"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4", "status": "downloading", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:30:10.000000", "updated_at": "2020-12-14T02:30:12.000000", "name": "tempest-ComputeServersRbacTest-volume-415376230", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}], "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "37e420629ca343bfb1c753e936941e51"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:13.473 189 INFO tempest.lib.common.rest_client [req-bbe6959a-1d1d-477c-a478-79aca55986c8 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 0.092s 2020-12-14 02:30:13.477 189 DEBUG tempest.lib.common.rest_client [req-bbe6959a-1d1d-477c-a478-79aca55986c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bbe6959a-1d1d-477c-a478-79aca55986c8', 'content-length': '1125', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bbe6959a-1d1d-477c-a478-79aca55986c8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4'} Body: b'{"volume": {"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4", "status": "downloading", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:30:10.000000", "updated_at": "2020-12-14T02:30:12.000000", "name": "tempest-ComputeServersRbacTest-volume-415376230", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}], "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "37e420629ca343bfb1c753e936941e51"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:14.662 189 INFO tempest.lib.common.rest_client [req-8add21c0-83bf-4b16-bf24-7e127ff3ebba ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 0.086s 2020-12-14 02:30:14.665 189 DEBUG tempest.lib.common.rest_client [req-8add21c0-83bf-4b16-bf24-7e127ff3ebba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8add21c0-83bf-4b16-bf24-7e127ff3ebba', 'content-length': '1125', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8add21c0-83bf-4b16-bf24-7e127ff3ebba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4'} Body: b'{"volume": {"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4", "status": "downloading", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:30:10.000000", "updated_at": "2020-12-14T02:30:12.000000", "name": "tempest-ComputeServersRbacTest-volume-415376230", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}], "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "37e420629ca343bfb1c753e936941e51"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:15.858 189 INFO tempest.lib.common.rest_client [req-7d8a32b8-6032-4c58-b758-064484922ec7 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 0.090s 2020-12-14 02:30:15.862 189 DEBUG tempest.lib.common.rest_client [req-7d8a32b8-6032-4c58-b758-064484922ec7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7d8a32b8-6032-4c58-b758-064484922ec7', 'content-length': '1125', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7d8a32b8-6032-4c58-b758-064484922ec7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4'} Body: b'{"volume": {"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4", "status": "downloading", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:30:10.000000", "updated_at": "2020-12-14T02:30:12.000000", "name": "tempest-ComputeServersRbacTest-volume-415376230", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}], "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "37e420629ca343bfb1c753e936941e51"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:17.063 189 INFO tempest.lib.common.rest_client [req-a379a9fa-fe1e-457b-bbd6-36157b672a15 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 0.094s 2020-12-14 02:30:17.067 189 DEBUG tempest.lib.common.rest_client [req-a379a9fa-fe1e-457b-bbd6-36157b672a15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a379a9fa-fe1e-457b-bbd6-36157b672a15', 'content-length': '1125', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a379a9fa-fe1e-457b-bbd6-36157b672a15', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4'} Body: b'{"volume": {"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4", "status": "downloading", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:30:10.000000", "updated_at": "2020-12-14T02:30:12.000000", "name": "tempest-ComputeServersRbacTest-volume-415376230", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}], "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "37e420629ca343bfb1c753e936941e51"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:18.267 189 INFO tempest.lib.common.rest_client [req-5a88c323-e5f1-45da-8c86-2110283139e7 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 0.097s 2020-12-14 02:30:18.270 189 DEBUG tempest.lib.common.rest_client [req-5a88c323-e5f1-45da-8c86-2110283139e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5a88c323-e5f1-45da-8c86-2110283139e7', 'content-length': '1125', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5a88c323-e5f1-45da-8c86-2110283139e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4'} Body: b'{"volume": {"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4", "status": "downloading", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:30:10.000000", "updated_at": "2020-12-14T02:30:12.000000", "name": "tempest-ComputeServersRbacTest-volume-415376230", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}], "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "37e420629ca343bfb1c753e936941e51"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:19.459 189 INFO tempest.lib.common.rest_client [req-859faf34-8df2-4d3d-9aac-9e168408d026 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 0.087s 2020-12-14 02:30:19.463 189 DEBUG tempest.lib.common.rest_client [req-859faf34-8df2-4d3d-9aac-9e168408d026 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-859faf34-8df2-4d3d-9aac-9e168408d026', 'content-length': '1125', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-859faf34-8df2-4d3d-9aac-9e168408d026', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4'} Body: b'{"volume": {"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4", "status": "downloading", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:30:10.000000", "updated_at": "2020-12-14T02:30:12.000000", "name": "tempest-ComputeServersRbacTest-volume-415376230", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}], "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "37e420629ca343bfb1c753e936941e51"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:20.655 189 INFO tempest.lib.common.rest_client [req-f155e43e-fbed-4ae7-9ebe-f915c5e0dc52 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 0.089s 2020-12-14 02:30:20.658 189 DEBUG tempest.lib.common.rest_client [req-f155e43e-fbed-4ae7-9ebe-f915c5e0dc52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f155e43e-fbed-4ae7-9ebe-f915c5e0dc52', 'content-length': '1125', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f155e43e-fbed-4ae7-9ebe-f915c5e0dc52', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4'} Body: b'{"volume": {"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4", "status": "downloading", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:30:10.000000", "updated_at": "2020-12-14T02:30:12.000000", "name": "tempest-ComputeServersRbacTest-volume-415376230", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}], "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "37e420629ca343bfb1c753e936941e51"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:21.836 189 INFO tempest.lib.common.rest_client [req-876a9cfb-b8a2-4a9c-8934-ca2fa72e1c42 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 0.077s 2020-12-14 02:30:21.840 189 DEBUG tempest.lib.common.rest_client [req-876a9cfb-b8a2-4a9c-8934-ca2fa72e1c42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-876a9cfb-b8a2-4a9c-8934-ca2fa72e1c42', 'content-length': '1718', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-876a9cfb-b8a2-4a9c-8934-ca2fa72e1c42', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4'} Body: b'{"volume": {"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:30:10.000000", "updated_at": "2020-12-14T02:30:21.000000", "name": "tempest-ComputeServersRbacTest-volume-415376230", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}], "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "bootable": "true", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "image_id": "cd332004-33aa-4c81-9e50-54766a6df097", "image_name": "patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "container_format": "bare", "disk_format": "qcow2", "min_disk": "0", "min_ram": "0", "size": "12716032"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "37e420629ca343bfb1c753e936941e51"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:21.933 189 INFO tempest.common.waiters [-] volume bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 reached available after waiting for 12.933559 seconds 2020-12-14 02:30:21.936 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:30:22.010 189 INFO tempest.lib.common.rest_client [req-c1b6182f-4db5-48b2-9f2a-0aa1bbcfd633 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles 0.067s 2020-12-14 02:30:22.013 189 DEBUG tempest.lib.common.rest_client [req-c1b6182f-4db5-48b2-9f2a-0aa1bbcfd633 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c1b6182f-4db5-48b2-9f2a-0aa1bbcfd633', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:22.068 189 INFO tempest.lib.common.rest_client [req-d444e3ff-df1d-41cd-b669-be18fc0afcb2 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:30:22.071 189 DEBUG tempest.lib.common.rest_client [req-d444e3ff-df1d-41cd-b669-be18fc0afcb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d444e3ff-df1d-41cd-b669-be18fc0afcb2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["fkyRXIRVQ2qN3feWo-d03w"], "expires_at": "2020-12-14T03:30:22.000000Z", "issued_at": "2020-12-14T02:30:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:23.090 189 INFO tempest.lib.common.rest_client [req-5deaa690-33cf-4d22-8053-3a5494e90fa0 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 202 POST http://172.30.13.94/compute/v2.1/servers 1.010s 2020-12-14 02:30:23.094 189 DEBUG tempest.lib.common.rest_client [req-5deaa690-33cf-4d22-8053-3a5494e90fa0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ComputeServersRbacTest-Server-2008147398", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "imageRef": "", "networks": [{"uuid": "f732ef78-a453-4519-9007-4a452f8849d3"}], "block_device_mapping_v2": [{"uuid": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4", "source_type": "volume", "destination_type": "volume", "boot_index": 0, "delete_on_termination": false}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5deaa690-33cf-4d22-8053-3a5494e90fa0', 'x-compute-request-id': 'req-5deaa690-33cf-4d22-8053-3a5494e90fa0', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "03ba83eb-b486-4d94-b579-1d86546039af", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/03ba83eb-b486-4d94-b579-1d86546039af"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "A2s4tLjPacWU"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:23.119 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:30:23.178 189 INFO tempest.lib.common.rest_client [req-81c7591e-e347-4c67-ac74-2823161c4d24 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles 0.053s 2020-12-14 02:30:23.180 189 DEBUG tempest.lib.common.rest_client [req-81c7591e-e347-4c67-ac74-2823161c4d24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81c7591e-e347-4c67-ac74-2823161c4d24', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:23.229 189 INFO tempest.lib.common.rest_client [req-6ca0eed3-ce5d-4fc6-8f92-c0642a13ce81 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:30:23.232 189 DEBUG tempest.lib.common.rest_client [req-6ca0eed3-ce5d-4fc6-8f92-c0642a13ce81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ca0eed3-ce5d-4fc6-8f92-c0642a13ce81', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["yT48JFYVSY-MAGpcCHPeBw"], "expires_at": "2020-12-14T03:30:23.000000Z", "issued_at": "2020-12-14T02:30:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:23.416 189 INFO tempest.lib.common.rest_client [req-6dad7ad9-1683-4dd7-8f3a-86e0a31a2846 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af 0.176s 2020-12-14 02:30:23.419 189 DEBUG tempest.lib.common.rest_client [req-6dad7ad9-1683-4dd7-8f3a-86e0a31a2846 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1239', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6dad7ad9-1683-4dd7-8f3a-86e0a31a2846', 'x-compute-request-id': 'req-6dad7ad9-1683-4dd7-8f3a-86e0a31a2846', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af'} Body: b'{"server": {"id": "03ba83eb-b486-4d94-b579-1d86546039af", "name": "tempest-ComputeServersRbacTest-Server-2008147398", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "", "image": "", "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:23Z", "updated": "2020-12-14T02:30:23Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/03ba83eb-b486-4d94-b579-1d86546039af"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:24.726 189 INFO tempest.lib.common.rest_client [req-fe6995f2-f0e1-4b6b-bfe7-edd07e9a6288 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af 0.198s 2020-12-14 02:30:24.730 189 DEBUG tempest.lib.common.rest_client [req-fe6995f2-f0e1-4b6b-bfe7-edd07e9a6288 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1390', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fe6995f2-f0e1-4b6b-bfe7-edd07e9a6288', 'x-compute-request-id': 'req-fe6995f2-f0e1-4b6b-bfe7-edd07e9a6288', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af'} Body: b'{"server": {"id": "03ba83eb-b486-4d94-b579-1d86546039af", "name": "tempest-ComputeServersRbacTest-Server-2008147398", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "6051a7b0689f832c2a5f9c104e38d261bdda953db810054facf4298b", "image": "", "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:23Z", "updated": "2020-12-14T02:30:24Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/03ba83eb-b486-4d94-b579-1d86546039af"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "block_device_mapping", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [{"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:24.825 189 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/block_device_mapping" after 1 second wait 2020-12-14 02:30:26.093 189 INFO tempest.lib.common.rest_client [req-8df458dd-41c7-4d79-af8f-1bb86cdb76cb ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af 0.260s 2020-12-14 02:30:26.097 189 DEBUG tempest.lib.common.rest_client [req-8df458dd-41c7-4d79-af8f-1bb86cdb76cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1420', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8df458dd-41c7-4d79-af8f-1bb86cdb76cb', 'x-compute-request-id': 'req-8df458dd-41c7-4d79-af8f-1bb86cdb76cb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af'} Body: b'{"server": {"id": "03ba83eb-b486-4d94-b579-1d86546039af", "name": "tempest-ComputeServersRbacTest-Server-2008147398", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "6051a7b0689f832c2a5f9c104e38d261bdda953db810054facf4298b", "image": "", "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:23Z", "updated": "2020-12-14T02:30:25Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/03ba83eb-b486-4d94-b579-1d86546039af"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [{"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:26.194 189 INFO tempest.common.waiters [-] State transition "BUILD/block_device_mapping" ==> "BUILD/spawning" after 3 second wait 2020-12-14 02:30:27.413 189 INFO tempest.lib.common.rest_client [req-41f4f7b6-ebca-4896-949a-628dea3f3bb6 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af 0.209s 2020-12-14 02:30:27.417 189 DEBUG tempest.lib.common.rest_client [req-41f4f7b6-ebca-4896-949a-628dea3f3bb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1420', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-41f4f7b6-ebca-4896-949a-628dea3f3bb6', 'x-compute-request-id': 'req-41f4f7b6-ebca-4896-949a-628dea3f3bb6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af'} Body: b'{"server": {"id": "03ba83eb-b486-4d94-b579-1d86546039af", "name": "tempest-ComputeServersRbacTest-Server-2008147398", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "6051a7b0689f832c2a5f9c104e38d261bdda953db810054facf4298b", "image": "", "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:23Z", "updated": "2020-12-14T02:30:25Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/03ba83eb-b486-4d94-b579-1d86546039af"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [{"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:28.838 189 INFO tempest.lib.common.rest_client [req-e6a3d279-9ac6-48d9-879a-77b88db53826 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af 0.315s 2020-12-14 02:30:28.842 189 DEBUG tempest.lib.common.rest_client [req-e6a3d279-9ac6-48d9-879a-77b88db53826 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1420', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e6a3d279-9ac6-48d9-879a-77b88db53826', 'x-compute-request-id': 'req-e6a3d279-9ac6-48d9-879a-77b88db53826', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af'} Body: b'{"server": {"id": "03ba83eb-b486-4d94-b579-1d86546039af", "name": "tempest-ComputeServersRbacTest-Server-2008147398", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "6051a7b0689f832c2a5f9c104e38d261bdda953db810054facf4298b", "image": "", "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:23Z", "updated": "2020-12-14T02:30:25Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/03ba83eb-b486-4d94-b579-1d86546039af"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [{"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:30.242 189 INFO tempest.lib.common.rest_client [req-50be37ca-4e0f-474c-bc0e-509a9cb4a5b4 ] Request (ComputeServersRbacTest:test_create_server_attach_volume): 200 GET http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af 0.259s 2020-12-14 02:30:30.245 189 DEBUG tempest.lib.common.rest_client [req-50be37ca-4e0f-474c-bc0e-509a9cb4a5b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1606', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-50be37ca-4e0f-474c-bc0e-509a9cb4a5b4', 'x-compute-request-id': 'req-50be37ca-4e0f-474c-bc0e-509a9cb4a5b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af'} Body: b'{"server": {"id": "03ba83eb-b486-4d94-b579-1d86546039af", "name": "tempest-ComputeServersRbacTest-Server-2008147398", "status": "ACTIVE", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "6051a7b0689f832c2a5f9c104e38d261bdda953db810054facf4298b", "image": "", "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:23Z", "updated": "2020-12-14T02:30:29Z", "addresses": {"tempest-ComputeServersRbacTest-206536169-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5d:fd:21"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/03ba83eb-b486-4d94-b579-1d86546039af"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:30:29.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:30.368 189 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 7 second wait 2020-12-14 02:30:30.556 189 INFO tempest.lib.common.rest_client [req-381c0ce3-c510-43b8-9a92-2775bec8b1aa ] Request (ComputeServersRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af 0.182s 2020-12-14 02:30:30.558 189 DEBUG tempest.lib.common.rest_client [req-381c0ce3-c510-43b8-9a92-2775bec8b1aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-381c0ce3-c510-43b8-9a92-2775bec8b1aa', 'x-compute-request-id': 'req-381c0ce3-c510-43b8-9a92-2775bec8b1aa', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:30.785 189 INFO tempest.lib.common.rest_client [req-2f19083b-3d1b-497f-b0dc-89524cdc9232 ] Request (ComputeServersRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af 0.219s 2020-12-14 02:30:30.788 189 DEBUG tempest.lib.common.rest_client [req-2f19083b-3d1b-497f-b0dc-89524cdc9232 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1612', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2f19083b-3d1b-497f-b0dc-89524cdc9232', 'x-compute-request-id': 'req-2f19083b-3d1b-497f-b0dc-89524cdc9232', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af'} Body: b'{"server": {"id": "03ba83eb-b486-4d94-b579-1d86546039af", "name": "tempest-ComputeServersRbacTest-Server-2008147398", "status": "ACTIVE", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "6051a7b0689f832c2a5f9c104e38d261bdda953db810054facf4298b", "image": "", "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:23Z", "updated": "2020-12-14T02:30:30Z", "addresses": {"tempest-ComputeServersRbacTest-206536169-network": [{"version": 4, "addr": "192.168.120.5", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5d:fd:21"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/03ba83eb-b486-4d94-b579-1d86546039af"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:30:29.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:32.047 189 INFO tempest.lib.common.rest_client [req-e376403f-766d-42c8-89a3-f5a1f63c71c1 ] Request (ComputeServersRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af 0.155s 2020-12-14 02:30:32.050 189 DEBUG tempest.lib.common.rest_client [req-e376403f-766d-42c8-89a3-f5a1f63c71c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1401', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e376403f-766d-42c8-89a3-f5a1f63c71c1', 'x-compute-request-id': 'req-e376403f-766d-42c8-89a3-f5a1f63c71c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af'} Body: b'{"server": {"id": "03ba83eb-b486-4d94-b579-1d86546039af", "name": "tempest-ComputeServersRbacTest-Server-2008147398", "status": "ACTIVE", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "6051a7b0689f832c2a5f9c104e38d261bdda953db810054facf4298b", "image": "", "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:23Z", "updated": "2020-12-14T02:30:31Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/03ba83eb-b486-4d94-b579-1d86546039af"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:30:29.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf3", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": [{"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:33.241 189 INFO tempest.lib.common.rest_client [req-6cabe6eb-e526-4353-9a0c-e536b8ef8300 ] Request (ComputeServersRbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af 0.081s 2020-12-14 02:30:33.245 189 DEBUG tempest.lib.common.rest_client [req-6cabe6eb-e526-4353-9a0c-e536b8ef8300 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-6cabe6eb-e526-4353-9a0c-e536b8ef8300', 'x-compute-request-id': 'req-6cabe6eb-e526-4353-9a0c-e536b8ef8300', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 03ba83eb-b486-4d94-b579-1d86546039af could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:33.331 189 INFO tempest.lib.common.rest_client [req-8c3b4c46-d6c3-4218-a9eb-c976e5fa964b ] Request (ComputeServersRbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af 0.077s 2020-12-14 02:30:33.334 189 DEBUG tempest.lib.common.rest_client [req-8c3b4c46-d6c3-4218-a9eb-c976e5fa964b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-8c3b4c46-d6c3-4218-a9eb-c976e5fa964b', 'x-compute-request-id': 'req-8c3b4c46-d6c3-4218-a9eb-c976e5fa964b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/03ba83eb-b486-4d94-b579-1d86546039af'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 03ba83eb-b486-4d94-b579-1d86546039af could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:33.426 189 INFO tempest.lib.common.rest_client [req-65a46e6a-8971-4aa2-95dc-d324bc04d662 ] Request (ComputeServersRbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 0.085s 2020-12-14 02:30:33.429 189 DEBUG tempest.lib.common.rest_client [req-65a46e6a-8971-4aa2-95dc-d324bc04d662 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-65a46e6a-8971-4aa2-95dc-d324bc04d662', 'content-length': '1718', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-65a46e6a-8971-4aa2-95dc-d324bc04d662', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4'} Body: b'{"volume": {"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:30:10.000000", "updated_at": "2020-12-14T02:30:32.000000", "name": "tempest-ComputeServersRbacTest-volume-415376230", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}], "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "bootable": "true", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "image_id": "cd332004-33aa-4c81-9e50-54766a6df097", "image_name": "patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "container_format": "bare", "disk_format": "qcow2", "min_disk": "0", "min_ram": "0", "size": "12716032"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "37e420629ca343bfb1c753e936941e51"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:33.523 189 INFO tempest.common.waiters [-] volume bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 reached available after waiting for 0.523452 seconds 2020-12-14 02:30:33.600 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:30:33.606 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.609 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.612 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.616 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.619 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.623 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.628 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.630 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.633 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.636 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.639 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.641 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.644 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.647 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.650 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.653 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.656 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.659 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.662 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.664 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.667 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.670 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.672 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.675 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.678 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.681 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.684 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.686 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.689 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.692 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.694 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.697 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.700 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.703 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.706 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.708 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.711 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.714 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.717 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.720 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.723 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.726 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.729 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.732 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.735 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.738 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.741 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.743 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.746 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.749 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.751 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.754 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.757 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.760 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.763 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.766 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.772 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.775 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.777 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.781 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.783 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.786 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.789 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.792 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.795 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.798 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.800 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.803 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.806 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.809 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.811 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:33.819 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:create:forced_host, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:30:33.884 189 INFO tempest.lib.common.rest_client [req-c780a090-e307-4931-95d3-3b3dcb829c40 ] Request (ComputeServersRbacTest:test_create_server_forced_host): 200 GET http://172.30.13.94/compute/v2.1/os-availability-zone/detail 0.058s 2020-12-14 02:30:33.888 189 DEBUG tempest.lib.common.rest_client [req-c780a090-e307-4931-95d3-3b3dcb829c40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '607', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c780a090-e307-4931-95d3-3b3dcb829c40', 'x-compute-request-id': 'req-c780a090-e307-4931-95d3-3b3dcb829c40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-availability-zone/detail'} Body: b'{"availabilityZoneInfo": [{"zoneName": "internal", "zoneState": {"available": true}, "hosts": {"lf-virtual9": {"nova-scheduler": {"available": true, "active": true, "updated_at": "2020-12-14T02:30:28.000000"}, "nova-conductor": {"available": true, "active": true, "updated_at": "2020-12-14T02:30:29.000000"}}}}, {"zoneName": "nova", "zoneState": {"available": true}, "hosts": {"lf-virtual9": {"nova-compute": {"available": true, "active": true, "updated_at": "2020-12-14T02:30:30.000000"}}, "lf-virtual8": {"nova-compute": {"available": true, "active": true, "updated_at": "2020-12-14T02:30:26.000000"}}}}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:33.934 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:30:34.054 189 INFO tempest.lib.common.rest_client [req-4a3030f1-3366-4582-9ebc-e6aa3adb1f29 ] Request (ComputeServersRbacTest:test_create_server_forced_host): 200 GET http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles 0.115s 2020-12-14 02:30:34.057 189 DEBUG tempest.lib.common.rest_client [req-4a3030f1-3366-4582-9ebc-e6aa3adb1f29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a3030f1-3366-4582-9ebc-e6aa3adb1f29', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:34.154 189 INFO tempest.lib.common.rest_client [req-1e85b641-4b48-4edf-9370-93d021402091 ] Request (ComputeServersRbacTest:test_create_server_forced_host): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:30:34.158 189 DEBUG tempest.lib.common.rest_client [req-1e85b641-4b48-4edf-9370-93d021402091 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e85b641-4b48-4edf-9370-93d021402091', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["ajWZkZrCSHiIe_fo_7_p0Q"], "expires_at": "2020-12-14T03:30:34.000000Z", "issued_at": "2020-12-14T02:30:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:35.034 189 INFO tempest.lib.common.rest_client [req-00cde919-f6d0-4ad1-a79d-398ef32f945b ] Request (ComputeServersRbacTest:test_create_server_forced_host): 202 POST http://172.30.13.94/compute/v2.1/servers 0.868s 2020-12-14 02:30:35.036 189 DEBUG tempest.lib.common.rest_client [req-00cde919-f6d0-4ad1-a79d-398ef32f945b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ComputeServersRbacTest-Server-294648408", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "networks": [{"uuid": "f732ef78-a453-4519-9007-4a452f8849d3"}], "availability_zone": "nova:lf-virtual9"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/63009b51-9f4a-4a44-9850-0f550f0f2afe', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-00cde919-f6d0-4ad1-a79d-398ef32f945b', 'x-compute-request-id': 'req-00cde919-f6d0-4ad1-a79d-398ef32f945b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "63009b51-9f4a-4a44-9850-0f550f0f2afe", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/63009b51-9f4a-4a44-9850-0f550f0f2afe"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/63009b51-9f4a-4a44-9850-0f550f0f2afe"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "LzrBtCkw6yN6"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:35.062 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:30:35.249 189 INFO tempest.lib.common.rest_client [req-67f6abf6-17ef-40e4-a8de-7a667e63ed46 ] Request (ComputeServersRbacTest:test_create_server_forced_host): 200 GET http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles 0.180s 2020-12-14 02:30:35.253 189 DEBUG tempest.lib.common.rest_client [req-67f6abf6-17ef-40e4-a8de-7a667e63ed46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67f6abf6-17ef-40e4-a8de-7a667e63ed46', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:35.353 189 INFO tempest.lib.common.rest_client [req-ac4f20fc-4211-4d83-87d1-0f8e63c24bd6 ] Request (ComputeServersRbacTest:test_create_server_forced_host): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:30:35.356 189 DEBUG tempest.lib.common.rest_client [req-ac4f20fc-4211-4d83-87d1-0f8e63c24bd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac4f20fc-4211-4d83-87d1-0f8e63c24bd6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["z5NELgcYTRWOh0FQcp1-Ig"], "expires_at": "2020-12-14T03:30:35.000000Z", "issued_at": "2020-12-14T02:30:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:35.916 189 INFO tempest.lib.common.rest_client [req-3f7040ef-d46a-42d9-b4be-af38f9e34878 ] Request (ComputeServersRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/63009b51-9f4a-4a44-9850-0f550f0f2afe 0.551s 2020-12-14 02:30:35.919 189 DEBUG tempest.lib.common.rest_client [req-3f7040ef-d46a-42d9-b4be-af38f9e34878 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3f7040ef-d46a-42d9-b4be-af38f9e34878', 'x-compute-request-id': 'req-3f7040ef-d46a-42d9-b4be-af38f9e34878', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/63009b51-9f4a-4a44-9850-0f550f0f2afe'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:36.086 189 INFO tempest.lib.common.rest_client [req-9121f7dd-07ba-46ea-9555-b47decf788d1 ] Request (ComputeServersRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/63009b51-9f4a-4a44-9850-0f550f0f2afe 0.154s 2020-12-14 02:30:36.089 189 DEBUG tempest.lib.common.rest_client [req-9121f7dd-07ba-46ea-9555-b47decf788d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1490', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9121f7dd-07ba-46ea-9555-b47decf788d1', 'x-compute-request-id': 'req-9121f7dd-07ba-46ea-9555-b47decf788d1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/63009b51-9f4a-4a44-9850-0f550f0f2afe'} Body: b'{"server": {"id": "63009b51-9f4a-4a44-9850-0f550f0f2afe", "name": "tempest-ComputeServersRbacTest-Server-294648408", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "6051a7b0689f832c2a5f9c104e38d261bdda953db810054facf4298b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:35Z", "updated": "2020-12-14T02:30:36Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/63009b51-9f4a-4a44-9850-0f550f0f2afe"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/63009b51-9f4a-4a44-9850-0f550f0f2afe"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf4", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:37.313 189 INFO tempest.lib.common.rest_client [req-59644f54-3314-41b1-9b11-4b997b7fff18 ] Request (ComputeServersRbacTest:_run_cleanups): 200 GET http://172.30.13.94/compute/v2.1/servers/63009b51-9f4a-4a44-9850-0f550f0f2afe 0.142s 2020-12-14 02:30:37.316 189 DEBUG tempest.lib.common.rest_client [req-59644f54-3314-41b1-9b11-4b997b7fff18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1418', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-59644f54-3314-41b1-9b11-4b997b7fff18', 'x-compute-request-id': 'req-59644f54-3314-41b1-9b11-4b997b7fff18', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/63009b51-9f4a-4a44-9850-0f550f0f2afe'} Body: b'{"server": {"id": "63009b51-9f4a-4a44-9850-0f550f0f2afe", "name": "tempest-ComputeServersRbacTest-Server-294648408", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:35Z", "updated": "2020-12-14T02:30:37Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/63009b51-9f4a-4a44-9850-0f550f0f2afe"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/63009b51-9f4a-4a44-9850-0f550f0f2afe"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf4", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:37.396 189 INFO tempest.common.waiters [-] State transition "BUILD/deleting" ==> "BUILD/networking" after 1 second wait 2020-12-14 02:30:38.481 189 INFO tempest.lib.common.rest_client [req-1207fd07-27bc-458e-8046-926dbf2560f2 ] Request (ComputeServersRbacTest:_run_cleanups): 404 GET http://172.30.13.94/compute/v2.1/servers/63009b51-9f4a-4a44-9850-0f550f0f2afe 0.077s 2020-12-14 02:30:38.483 189 DEBUG tempest.lib.common.rest_client [req-1207fd07-27bc-458e-8046-926dbf2560f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-1207fd07-27bc-458e-8046-926dbf2560f2', 'x-compute-request-id': 'req-1207fd07-27bc-458e-8046-926dbf2560f2', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/63009b51-9f4a-4a44-9850-0f550f0f2afe'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 63009b51-9f4a-4a44-9850-0f550f0f2afe could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:38.512 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:30:38.516 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.518 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.520 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.523 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.526 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.529 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.532 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.535 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.537 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.539 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.541 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.543 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.545 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.547 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.550 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.552 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.554 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.556 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.558 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.560 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.562 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.564 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.566 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.568 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.570 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.572 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.574 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.576 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.578 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.580 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.582 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.584 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.586 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.588 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.590 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.591 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.593 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.595 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.597 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.600 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.602 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.603 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.605 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.608 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.610 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.612 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.613 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.615 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.617 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.619 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.621 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.623 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.625 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.627 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.629 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.631 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.635 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.637 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.638 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.641 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.642 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.644 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.646 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.648 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.650 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.651 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.653 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.655 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.657 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.659 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.661 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:38.669 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:delete, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:30:38.801 189 INFO tempest.lib.common.rest_client [req-72d45a03-efc6-4606-98aa-b6157082a64d ] Request (ComputeServersRbacTest:test_delete_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:30:38.803 189 DEBUG tempest.lib.common.rest_client [req-72d45a03-efc6-4606-98aa-b6157082a64d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-72d45a03-efc6-4606-98aa-b6157082a64d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["WIYByKpYTFqk0q_PrNiJJw"], "expires_at": "2020-12-14T03:30:38.000000Z", "issued_at": "2020-12-14T02:30:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:38.806 189 INFO tempest.lib.common.fixed_network [-] (ComputeServersRbacTest:test_delete_server) Found network {'id': 'f732ef78-a453-4519-9007-4a452f8849d3', 'name': 'tempest-ComputeServersRbacTest-206536169-network', 'tenant_id': '37e420629ca343bfb1c753e936941e51', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '37e420629ca343bfb1c753e936941e51', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:29:47Z', 'updated_at': '2020-12-14T02:29:47Z', 'revision_number': 1} available for tenant 2020-12-14 02:30:39.775 189 INFO tempest.lib.common.rest_client [req-81695ba1-15d1-4552-8308-3e2014ae2b9f ] Request (ComputeServersRbacTest:test_delete_server): 202 POST http://172.30.13.94/compute/v2.1/servers 0.961s 2020-12-14 02:30:39.780 189 DEBUG tempest.lib.common.rest_client [req-81695ba1-15d1-4552-8308-3e2014ae2b9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ComputeServersRbacTest-server-552243453", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "f732ef78-a453-4519-9007-4a452f8849d3"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-81695ba1-15d1-4552-8308-3e2014ae2b9f', 'x-compute-request-id': 'req-81695ba1-15d1-4552-8308-3e2014ae2b9f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "d73de482-0089-4aa7-8b67-709bebd39a52", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "B8Ck3amc6wN6"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:39.925 189 INFO tempest.lib.common.rest_client [req-f34046a7-e837-4e2d-a31d-7b7f8516530f ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52 0.105s 2020-12-14 02:30:39.928 189 DEBUG tempest.lib.common.rest_client [req-f34046a7-e837-4e2d-a31d-7b7f8516530f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1397', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f34046a7-e837-4e2d-a31d-7b7f8516530f', 'x-compute-request-id': 'req-f34046a7-e837-4e2d-a31d-7b7f8516530f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52'} Body: b'{"server": {"id": "d73de482-0089-4aa7-8b67-709bebd39a52", "name": "tempest-ComputeServersRbacTest-server-552243453", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:40Z", "updated": "2020-12-14T02:30:39Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:41.216 189 INFO tempest.lib.common.rest_client [req-f42e44d4-117e-4d98-a6b5-d460751ec750 ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52 0.178s 2020-12-14 02:30:41.219 189 DEBUG tempest.lib.common.rest_client [req-f42e44d4-117e-4d98-a6b5-d460751ec750 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1492', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f42e44d4-117e-4d98-a6b5-d460751ec750', 'x-compute-request-id': 'req-f42e44d4-117e-4d98-a6b5-d460751ec750', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52'} Body: b'{"server": {"id": "d73de482-0089-4aa7-8b67-709bebd39a52", "name": "tempest-ComputeServersRbacTest-server-552243453", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "6051a7b0689f832c2a5f9c104e38d261bdda953db810054facf4298b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:39Z", "updated": "2020-12-14T02:30:41Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf5", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:41.320 189 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/networking" after 1 second wait 2020-12-14 02:30:42.747 189 INFO tempest.lib.common.rest_client [req-bed68376-ba8b-474e-9e18-20502b62e755 ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52 0.418s 2020-12-14 02:30:42.751 189 DEBUG tempest.lib.common.rest_client [req-bed68376-ba8b-474e-9e18-20502b62e755 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-bed68376-ba8b-474e-9e18-20502b62e755', 'x-compute-request-id': 'req-bed68376-ba8b-474e-9e18-20502b62e755', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52'} Body: b'{"server": {"id": "d73de482-0089-4aa7-8b67-709bebd39a52", "name": "tempest-ComputeServersRbacTest-server-552243453", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "6051a7b0689f832c2a5f9c104e38d261bdda953db810054facf4298b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:39Z", "updated": "2020-12-14T02:30:41Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf5", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:42.850 189 INFO tempest.common.waiters [-] State transition "BUILD/networking" ==> "BUILD/spawning" after 2 second wait 2020-12-14 02:30:44.247 189 INFO tempest.lib.common.rest_client [req-5c2a6b91-df2c-4558-bb1c-57d7ba2d5fc9 ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52 0.387s 2020-12-14 02:30:44.250 189 DEBUG tempest.lib.common.rest_client [req-5c2a6b91-df2c-4558-bb1c-57d7ba2d5fc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5c2a6b91-df2c-4558-bb1c-57d7ba2d5fc9', 'x-compute-request-id': 'req-5c2a6b91-df2c-4558-bb1c-57d7ba2d5fc9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52'} Body: b'{"server": {"id": "d73de482-0089-4aa7-8b67-709bebd39a52", "name": "tempest-ComputeServersRbacTest-server-552243453", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "6051a7b0689f832c2a5f9c104e38d261bdda953db810054facf4298b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:39Z", "updated": "2020-12-14T02:30:41Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf5", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:45.587 189 INFO tempest.lib.common.rest_client [req-c1ae282e-48d7-404d-a3ed-45e7098842d4 ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52 0.231s 2020-12-14 02:30:45.591 189 DEBUG tempest.lib.common.rest_client [req-c1ae282e-48d7-404d-a3ed-45e7098842d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c1ae282e-48d7-404d-a3ed-45e7098842d4', 'x-compute-request-id': 'req-c1ae282e-48d7-404d-a3ed-45e7098842d4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52'} Body: b'{"server": {"id": "d73de482-0089-4aa7-8b67-709bebd39a52", "name": "tempest-ComputeServersRbacTest-server-552243453", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "6051a7b0689f832c2a5f9c104e38d261bdda953db810054facf4298b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:39Z", "updated": "2020-12-14T02:30:41Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf5", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:46.913 189 INFO tempest.lib.common.rest_client [req-df414a7a-961f-4704-a1f5-3326fc951d70 ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52 0.214s 2020-12-14 02:30:46.916 189 DEBUG tempest.lib.common.rest_client [req-df414a7a-961f-4704-a1f5-3326fc951d70 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1532', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-df414a7a-961f-4704-a1f5-3326fc951d70', 'x-compute-request-id': 'req-df414a7a-961f-4704-a1f5-3326fc951d70', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52'} Body: b'{"server": {"id": "d73de482-0089-4aa7-8b67-709bebd39a52", "name": "tempest-ComputeServersRbacTest-server-552243453", "status": "BUILD", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "6051a7b0689f832c2a5f9c104e38d261bdda953db810054facf4298b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:39Z", "updated": "2020-12-14T02:30:41Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf5", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:48.267 189 INFO tempest.lib.common.rest_client [req-0fe8acd8-bca1-447f-b20c-eb858ded461b ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52 0.241s 2020-12-14 02:30:48.270 189 DEBUG tempest.lib.common.rest_client [req-0fe8acd8-bca1-447f-b20c-eb858ded461b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0fe8acd8-bca1-447f-b20c-eb858ded461b', 'x-compute-request-id': 'req-0fe8acd8-bca1-447f-b20c-eb858ded461b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52'} Body: b'{"server": {"id": "d73de482-0089-4aa7-8b67-709bebd39a52", "name": "tempest-ComputeServersRbacTest-server-552243453", "status": "ACTIVE", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "6051a7b0689f832c2a5f9c104e38d261bdda953db810054facf4298b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:39Z", "updated": "2020-12-14T02:30:47Z", "addresses": {"tempest-ComputeServersRbacTest-206536169-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5e:2d:40"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:30:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf5", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:48.380 189 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 8 second wait 2020-12-14 02:30:48.383 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:30:48.552 189 INFO tempest.lib.common.rest_client [req-0b788f90-8b9c-43d1-a872-fa23f89b297a ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles 0.162s 2020-12-14 02:30:48.556 189 DEBUG tempest.lib.common.rest_client [req-0b788f90-8b9c-43d1-a872-fa23f89b297a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b788f90-8b9c-43d1-a872-fa23f89b297a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:48.655 189 INFO tempest.lib.common.rest_client [req-3b7b7886-1577-4580-8c6c-cbc754beff6d ] Request (ComputeServersRbacTest:test_delete_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:30:48.659 189 DEBUG tempest.lib.common.rest_client [req-3b7b7886-1577-4580-8c6c-cbc754beff6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b7b7886-1577-4580-8c6c-cbc754beff6d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["G_OghX9fRGW6P0ucmx-NKg"], "expires_at": "2020-12-14T03:30:48.000000Z", "issued_at": "2020-12-14T02:30:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:48.995 189 INFO tempest.lib.common.rest_client [req-79918da8-d7c2-4bd1-84f3-e72f453a83c0 ] Request (ComputeServersRbacTest:test_delete_server): 204 DELETE http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52 0.327s 2020-12-14 02:30:48.999 189 DEBUG tempest.lib.common.rest_client [req-79918da8-d7c2-4bd1-84f3-e72f453a83c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-79918da8-d7c2-4bd1-84f3-e72f453a83c0', 'x-compute-request-id': 'req-79918da8-d7c2-4bd1-84f3-e72f453a83c0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:49.002 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:30:49.078 189 INFO tempest.lib.common.rest_client [req-1aff8fba-8958-47a6-ad04-fa82c5c15ba5 ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles 0.070s 2020-12-14 02:30:49.082 189 DEBUG tempest.lib.common.rest_client [req-1aff8fba-8958-47a6-ad04-fa82c5c15ba5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1aff8fba-8958-47a6-ad04-fa82c5c15ba5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:49.133 189 INFO tempest.lib.common.rest_client [req-dcbd6604-24a4-4c0d-8e8a-847994713e99 ] Request (ComputeServersRbacTest:test_delete_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:30:49.136 189 DEBUG tempest.lib.common.rest_client [req-dcbd6604-24a4-4c0d-8e8a-847994713e99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dcbd6604-24a4-4c0d-8e8a-847994713e99', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["WKdqnwYDSSWWEy12SRfX_w"], "expires_at": "2020-12-14T03:30:49.000000Z", "issued_at": "2020-12-14T02:30:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:49.473 189 INFO tempest.lib.common.rest_client [req-a27ecc52-0bdc-48c3-94fd-abc823fc9da6 ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52 0.328s 2020-12-14 02:30:49.476 189 DEBUG tempest.lib.common.rest_client [req-a27ecc52-0bdc-48c3-94fd-abc823fc9da6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1724', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a27ecc52-0bdc-48c3-94fd-abc823fc9da6', 'x-compute-request-id': 'req-a27ecc52-0bdc-48c3-94fd-abc823fc9da6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52'} Body: b'{"server": {"id": "d73de482-0089-4aa7-8b67-709bebd39a52", "name": "tempest-ComputeServersRbacTest-server-552243453", "status": "ACTIVE", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "6051a7b0689f832c2a5f9c104e38d261bdda953db810054facf4298b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:39Z", "updated": "2020-12-14T02:30:49Z", "addresses": {"tempest-ComputeServersRbacTest-206536169-network": [{"version": 4, "addr": "192.168.120.6", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5e:2d:40"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:30:46.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf5", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:50.746 189 INFO tempest.lib.common.rest_client [req-ba56d676-8639-4cf7-bfa4-5dfebda3d038 ] Request (ComputeServersRbacTest:test_delete_server): 200 GET http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52 0.152s 2020-12-14 02:30:50.750 189 DEBUG tempest.lib.common.rest_client [req-ba56d676-8639-4cf7-bfa4-5dfebda3d038 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1518', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ba56d676-8639-4cf7-bfa4-5dfebda3d038', 'x-compute-request-id': 'req-ba56d676-8639-4cf7-bfa4-5dfebda3d038', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52'} Body: b'{"server": {"id": "d73de482-0089-4aa7-8b67-709bebd39a52", "name": "tempest-ComputeServersRbacTest-server-552243453", "status": "DELETED", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "6051a7b0689f832c2a5f9c104e38d261bdda953db810054facf4298b", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:30:39Z", "updated": "2020-12-14T02:30:51Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/d73de482-0089-4aa7-8b67-709bebd39a52"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:30:46.000000", "OS-SRV-USG:terminated_at": "2020-12-14T02:30:50.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf5", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:50.852 189 INFO tempest.common.waiters [-] State transition "ACTIVE/deleting" ==> "DELETED/None" after 1 second wait 2020-12-14 02:30:51.934 189 INFO tempest.lib.common.rest_client [req-24633397-3026-4550-a80a-7c0b4e301f19 ] Request (ComputeServersRbacTest:test_delete_server): 404 GET http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52 0.074s 2020-12-14 02:30:51.938 189 DEBUG tempest.lib.common.rest_client [req-24633397-3026-4550-a80a-7c0b4e301f19 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-24633397-3026-4550-a80a-7c0b4e301f19', 'x-compute-request-id': 'req-24633397-3026-4550-a80a-7c0b4e301f19', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance d73de482-0089-4aa7-8b67-709bebd39a52 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:52.000 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:30:52.005 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.008 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.011 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.015 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.018 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.022 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.027 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.029 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.032 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.035 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.038 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.040 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.043 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.046 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.049 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.052 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.055 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.058 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.061 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.063 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.066 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.069 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.072 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.074 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.077 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.080 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.082 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.085 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.088 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.091 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.093 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.096 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.099 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.101 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.104 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.107 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.110 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.113 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.116 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.119 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.122 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.125 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.128 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.132 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.134 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.137 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.140 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.143 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.145 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.148 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.151 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.153 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.156 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.159 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.163 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.165 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.171 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.174 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.177 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.180 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.183 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.185 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.188 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.191 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.194 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.196 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.199 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.202 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.205 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.207 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.210 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:30:52.221 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:servers:update, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:30:52.224 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:30:52.303 189 INFO tempest.lib.common.rest_client [req-1aa5e0f6-9d89-4491-8c55-68c8d24e93ae ] Request (ComputeServersRbacTest:test_update_server): 200 GET http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles 0.072s 2020-12-14 02:30:52.307 189 DEBUG tempest.lib.common.rest_client [req-1aa5e0f6-9d89-4491-8c55-68c8d24e93ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1aa5e0f6-9d89-4491-8c55-68c8d24e93ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:52.362 189 INFO tempest.lib.common.rest_client [req-8b46405c-74e0-4334-bba4-727063490de4 ] Request (ComputeServersRbacTest:test_update_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:30:52.366 189 DEBUG tempest.lib.common.rest_client [req-8b46405c-74e0-4334-bba4-727063490de4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b46405c-74e0-4334-bba4-727063490de4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["l9tJ4SqWSSK9YaQFpBwwDg"], "expires_at": "2020-12-14T03:30:52.000000Z", "issued_at": "2020-12-14T02:30:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:52.584 189 INFO tempest.lib.common.rest_client [req-fc27c7a5-d520-4949-8c50-636106d2eab2 ] Request (ComputeServersRbacTest:test_update_server): 200 PUT http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f 0.210s 2020-12-14 02:30:52.587 189 DEBUG tempest.lib.common.rest_client [req-fc27c7a5-d520-4949-8c50-636106d2eab2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ComputeServersRbacTest-server-1060869571"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1150', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fc27c7a5-d520-4949-8c50-636106d2eab2', 'x-compute-request-id': 'req-fc27c7a5-d520-4949-8c50-636106d2eab2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f'} Body: b'{"server": {"id": "3e46b6d9-db36-41d3-8a39-65036332620f", "name": "tempest-ComputeServersRbacTest-server-1060869571", "status": "ACTIVE", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "faddde5d1cc1525db043e6ad17e8074f19630f2f396bca285c14b7da", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:54Z", "updated": "2020-12-14T02:30:02Z", "addresses": {"tempest-ComputeServersRbacTest-206536169-network": [{"version": 4, "addr": "192.168.120.4"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:52.666 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:30:52.742 189 INFO tempest.lib.common.rest_client [req-b90c558a-34c4-49e4-9c0e-6ffc2dd72131 ] Request (ComputeServersRbacTest:test_update_server): 200 GET http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles 0.069s 2020-12-14 02:30:52.745 189 DEBUG tempest.lib.common.rest_client [req-b90c558a-34c4-49e4-9c0e-6ffc2dd72131 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b90c558a-34c4-49e4-9c0e-6ffc2dd72131', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51/users/a71eda81c57a48ea9dabbfe7a9771505/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:52.802 189 INFO tempest.lib.common.rest_client [req-642aac37-a1a8-4c96-8691-ea4c202d3fa7 ] Request (ComputeServersRbacTest:test_update_server): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:30:52.806 189 DEBUG tempest.lib.common.rest_client [req-642aac37-a1a8-4c96-8691-ea4c202d3fa7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-642aac37-a1a8-4c96-8691-ea4c202d3fa7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "a71eda81c57a48ea9dabbfe7a9771505", "name": "tempest-ComputeServersRbacTest-121605784", "password_expires_at": null}, "audit_ids": ["Mnb4_kzvT4SWDRA5eeIA3Q"], "expires_at": "2020-12-14T03:30:52.000000Z", "issued_at": "2020-12-14T02:30:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "37e420629ca343bfb1c753e936941e51", "name": "tempest-ComputeServersRbacTest-121605784"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_37e420629ca343bfb1c753e936941e51", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:53.102 189 INFO tempest.lib.common.rest_client [req-862c43e0-0da2-418e-9ec0-c1a083e21e22 ] Request (ComputeServersRbacTest:test_update_server): 200 GET http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f 0.287s 2020-12-14 02:30:53.106 189 DEBUG tempest.lib.common.rest_client [req-862c43e0-0da2-418e-9ec0-c1a083e21e22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1719', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-862c43e0-0da2-418e-9ec0-c1a083e21e22', 'x-compute-request-id': 'req-862c43e0-0da2-418e-9ec0-c1a083e21e22', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f'} Body: b'{"server": {"id": "3e46b6d9-db36-41d3-8a39-65036332620f", "name": "tempest-ComputeServersRbacTest-server-1060869571", "status": "ACTIVE", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "faddde5d1cc1525db043e6ad17e8074f19630f2f396bca285c14b7da", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:54Z", "updated": "2020-12-14T02:30:53Z", "addresses": {"tempest-ComputeServersRbacTest-206536169-network": [{"version": 4, "addr": "192.168.120.4", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:b8:ca:26"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:30:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:53.312 189 INFO tempest.lib.common.rest_client [req-8cb51f0d-66c0-49c7-a0c1-97313213ab46 ] Request (ComputeServersRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52 0.076s 2020-12-14 02:30:53.315 189 DEBUG tempest.lib.common.rest_client [req-8cb51f0d-66c0-49c7-a0c1-97313213ab46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-8cb51f0d-66c0-49c7-a0c1-97313213ab46', 'x-compute-request-id': 'req-8cb51f0d-66c0-49c7-a0c1-97313213ab46', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance d73de482-0089-4aa7-8b67-709bebd39a52 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:53.393 189 INFO tempest.lib.common.rest_client [req-c8e72ed9-ca4e-44f1-89bf-16e2a31a74f1 ] Request (ComputeServersRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52 0.073s 2020-12-14 02:30:53.395 189 DEBUG tempest.lib.common.rest_client [req-c8e72ed9-ca4e-44f1-89bf-16e2a31a74f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-c8e72ed9-ca4e-44f1-89bf-16e2a31a74f1', 'x-compute-request-id': 'req-c8e72ed9-ca4e-44f1-89bf-16e2a31a74f1', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/d73de482-0089-4aa7-8b67-709bebd39a52'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance d73de482-0089-4aa7-8b67-709bebd39a52 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:53.496 189 INFO tempest.lib.common.rest_client [req-927bcc19-561a-4092-ad51-bc3ef9bab468 ] Request (ComputeServersRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 0.095s 2020-12-14 02:30:53.498 189 DEBUG tempest.lib.common.rest_client [req-927bcc19-561a-4092-ad51-bc3ef9bab468 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-927bcc19-561a-4092-ad51-bc3ef9bab468', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:53.576 189 INFO tempest.lib.common.rest_client [req-20e70223-f7d9-4b7e-b03a-7f2a7c173d7f ] Request (ComputeServersRbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 0.074s 2020-12-14 02:30:53.578 189 DEBUG tempest.lib.common.rest_client [req-20e70223-f7d9-4b7e-b03a-7f2a7c173d7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-20e70223-f7d9-4b7e-b03a-7f2a7c173d7f', 'content-length': '1717', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-20e70223-f7d9-4b7e-b03a-7f2a7c173d7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4'} Body: b'{"volume": {"id": "bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:30:10.000000", "updated_at": "2020-12-14T02:30:53.000000", "name": "tempest-ComputeServersRbacTest-volume-415376230", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4"}], "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "bootable": "true", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "image_id": "cd332004-33aa-4c81-9e50-54766a6df097", "image_name": "patrole_reader-img_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "container_format": "bare", "disk_format": "qcow2", "min_disk": "0", "min_ram": "0", "size": "12716032"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "37e420629ca343bfb1c753e936941e51"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:54.721 189 INFO tempest.lib.common.rest_client [req-0aa9d79a-2dfa-4b57-9de4-154085cb68a6 ] Request (ComputeServersRbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 0.062s 2020-12-14 02:30:54.725 189 DEBUG tempest.lib.common.rest_client [req-0aa9d79a-2dfa-4b57-9de4-154085cb68a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-0aa9d79a-2dfa-4b57-9de4-154085cb68a6', 'x-openstack-request-id': 'req-0aa9d79a-2dfa-4b57-9de4-154085cb68a6', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/37e420629ca343bfb1c753e936941e51/volumes/bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume bd72f6e4-52f2-4e9e-8a42-8fc47dccf6c4 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:54.910 189 INFO tempest.lib.common.rest_client [req-c4339473-9f02-49ba-9c15-f011db271752 ] Request (ComputeServersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f 0.178s 2020-12-14 02:30:54.913 189 DEBUG tempest.lib.common.rest_client [req-c4339473-9f02-49ba-9c15-f011db271752 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c4339473-9f02-49ba-9c15-f011db271752', 'x-compute-request-id': 'req-c4339473-9f02-49ba-9c15-f011db271752', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:55.226 189 INFO tempest.lib.common.rest_client [req-976eb42b-2aa7-45e7-8aec-3966cab72e74 ] Request (ComputeServersRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f 0.307s 2020-12-14 02:30:55.229 189 DEBUG tempest.lib.common.rest_client [req-976eb42b-2aa7-45e7-8aec-3966cab72e74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1725', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-976eb42b-2aa7-45e7-8aec-3966cab72e74', 'x-compute-request-id': 'req-976eb42b-2aa7-45e7-8aec-3966cab72e74', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f'} Body: b'{"server": {"id": "3e46b6d9-db36-41d3-8a39-65036332620f", "name": "tempest-ComputeServersRbacTest-server-1060869571", "status": "ACTIVE", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "faddde5d1cc1525db043e6ad17e8074f19630f2f396bca285c14b7da", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:54Z", "updated": "2020-12-14T02:30:55Z", "addresses": {"tempest-ComputeServersRbacTest-206536169-network": [{"version": 4, "addr": "192.168.120.4", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:b8:ca:26"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:30:01.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:56.534 189 INFO tempest.lib.common.rest_client [req-befcaf85-f9e3-4891-914c-416eb82b59ea ] Request (ComputeServersRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f 0.194s 2020-12-14 02:30:56.536 189 DEBUG tempest.lib.common.rest_client [req-befcaf85-f9e3-4891-914c-416eb82b59ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1519', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-befcaf85-f9e3-4891-914c-416eb82b59ea', 'x-compute-request-id': 'req-befcaf85-f9e3-4891-914c-416eb82b59ea', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f'} Body: b'{"server": {"id": "3e46b6d9-db36-41d3-8a39-65036332620f", "name": "tempest-ComputeServersRbacTest-server-1060869571", "status": "DELETED", "tenant_id": "37e420629ca343bfb1c753e936941e51", "user_id": "a71eda81c57a48ea9dabbfe7a9771505", "metadata": {}, "hostId": "faddde5d1cc1525db043e6ad17e8074f19630f2f396bca285c14b7da", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:29:54Z", "updated": "2020-12-14T02:30:56Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/3e46b6d9-db36-41d3-8a39-65036332620f"}], "OS-DCF:diskConfig": "MANUAL", "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:30:01.000000", "OS-SRV-USG:terminated_at": "2020-12-14T02:30:56.000000", "OS-EXT-SRV-ATTR:host": "lf-virtual8", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf0", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual8", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "deleted", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:56.635 189 INFO tempest.common.waiters [-] State transition "ACTIVE/deleting" ==> "DELETED/None" after 1 second wait 2020-12-14 02:30:57.719 189 INFO tempest.lib.common.rest_client [req-e98323d7-32b8-4ad1-87be-28837c35e954 ] Request (ComputeServersRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f 0.075s 2020-12-14 02:30:57.721 189 DEBUG tempest.lib.common.rest_client [req-e98323d7-32b8-4ad1-87be-28837c35e954 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:30:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-e98323d7-32b8-4ad1-87be-28837c35e954', 'x-compute-request-id': 'req-e98323d7-32b8-4ad1-87be-28837c35e954', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/3e46b6d9-db36-41d3-8a39-65036332620f'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 3e46b6d9-db36-41d3-8a39-65036332620f could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:30:57.724 189 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': 'f732ef78-a453-4519-9007-4a452f8849d3', 'name': 'tempest-ComputeServersRbacTest-206536169-network', 'tenant_id': '37e420629ca343bfb1c753e936941e51', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '37e420629ca343bfb1c753e936941e51', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:29:47Z', 'updated_at': '2020-12-14T02:29:47Z', 'revision_number': 1}, subnet: {'id': 'a1f63961-1db2-4d18-95bc-c8c1a74df7b6', 'name': 'tempest-ComputeServersRbacTest-206536169-subnet', 'tenant_id': '37e420629ca343bfb1c753e936941e51', 'network_id': 'f732ef78-a453-4519-9007-4a452f8849d3', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:29:47Z', 'updated_at': '2020-12-14T02:29:47Z', 'revision_number': 0, 'project_id': '37e420629ca343bfb1c753e936941e51'}, router: {'id': '82ffbca8-b190-4581-af9f-f735ada3b9a8', 'name': 'tempest-ComputeServersRbacTest-206536169-router', 'tenant_id': '37e420629ca343bfb1c753e936941e51', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.39'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::309'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:29:48Z', 'updated_at': '2020-12-14T02:29:49Z', 'revision_number': 3, 'project_id': '37e420629ca343bfb1c753e936941e51'} _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:30:59.768 189 INFO tempest.lib.common.rest_client [req-7169f306-08a6-4c2c-97b8-e66d5ed53e85 ] Request (ComputeServersRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/82ffbca8-b190-4581-af9f-f735ada3b9a8/remove_router_interface 2.036s 2020-12-14 02:30:59.772 189 DEBUG tempest.lib.common.rest_client [req-7169f306-08a6-4c2c-97b8-e66d5ed53e85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "a1f63961-1db2-4d18-95bc-c8c1a74df7b6"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-7169f306-08a6-4c2c-97b8-e66d5ed53e85', 'date': 'Mon, 14 Dec 2020 02:30:59 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/82ffbca8-b190-4581-af9f-f735ada3b9a8/remove_router_interface'} Body: b'{"id": "82ffbca8-b190-4581-af9f-f735ada3b9a8", "tenant_id": "37e420629ca343bfb1c753e936941e51", "port_id": "2b53d7ab-7c97-4804-9277-c1f42e98db94", "network_id": "f732ef78-a453-4519-9007-4a452f8849d3", "subnet_id": "a1f63961-1db2-4d18-95bc-c8c1a74df7b6", "subnet_ids": ["a1f63961-1db2-4d18-95bc-c8c1a74df7b6"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:00.881 189 INFO tempest.lib.common.rest_client [req-5719c2b5-7baa-40fe-949c-58349973cb07 ] Request (ComputeServersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/82ffbca8-b190-4581-af9f-f735ada3b9a8 1.100s 2020-12-14 02:31:00.885 189 DEBUG tempest.lib.common.rest_client [req-5719c2b5-7baa-40fe-949c-58349973cb07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5719c2b5-7baa-40fe-949c-58349973cb07', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:31:00 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/82ffbca8-b190-4581-af9f-f735ada3b9a8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:01.314 189 INFO tempest.lib.common.rest_client [req-8b1dca20-1dc1-446a-be1b-c9dd16a694a8 ] Request (ComputeServersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/a1f63961-1db2-4d18-95bc-c8c1a74df7b6 0.423s 2020-12-14 02:31:01.316 189 DEBUG tempest.lib.common.rest_client [req-8b1dca20-1dc1-446a-be1b-c9dd16a694a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-8b1dca20-1dc1-446a-be1b-c9dd16a694a8', 'date': 'Mon, 14 Dec 2020 02:31:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/a1f63961-1db2-4d18-95bc-c8c1a74df7b6'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:01.939 189 INFO tempest.lib.common.rest_client [req-ef782ad5-e80e-4b4e-83c4-9f4ecff96a17 ] Request (ComputeServersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/f732ef78-a453-4519-9007-4a452f8849d3 0.617s 2020-12-14 02:31:01.941 189 DEBUG tempest.lib.common.rest_client [req-ef782ad5-e80e-4b4e-83c4-9f4ecff96a17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-ef782ad5-e80e-4b4e-83c4-9f4ecff96a17', 'date': 'Mon, 14 Dec 2020 02:31:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/f732ef78-a453-4519-9007-4a452f8849d3'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:02.098 189 INFO tempest.lib.common.rest_client [req-cf7ce7ca-0992-4e51-8f23-84fa5ff2a2ff ] Request (ComputeServersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/a71eda81c57a48ea9dabbfe7a9771505 0.150s 2020-12-14 02:31:02.101 189 DEBUG tempest.lib.common.rest_client [req-cf7ce7ca-0992-4e51-8f23-84fa5ff2a2ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf7ce7ca-0992-4e51-8f23-84fa5ff2a2ff', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/a71eda81c57a48ea9dabbfe7a9771505'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:02.176 189 INFO tempest.lib.common.rest_client [req-4fd665a8-bd9f-45dd-a3c3-7b6513b991f4 ] Request (ComputeServersRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=37e420629ca343bfb1c753e936941e51&name=default 0.069s 2020-12-14 02:31:02.179 189 DEBUG tempest.lib.common.rest_client [req-4fd665a8-bd9f-45dd-a3c3-7b6513b991f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-4fd665a8-bd9f-45dd-a3c3-7b6513b991f4', 'date': 'Mon, 14 Dec 2020 02:31:02 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=37e420629ca343bfb1c753e936941e51&name=default'} Body: b'{"security_groups": [{"id": "019e721a-1af6-4fa9-8b7e-ddc7d759fb71", "name": "default", "stateful": true, "tenant_id": "37e420629ca343bfb1c753e936941e51", "description": "Default security group", "security_group_rules": [{"id": "1bae2d48-f4d2-484c-a020-11d367659238", "tenant_id": "37e420629ca343bfb1c753e936941e51", "security_group_id": "019e721a-1af6-4fa9-8b7e-ddc7d759fb71", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "019e721a-1af6-4fa9-8b7e-ddc7d759fb71", "description": null, "tags": [], "created_at": "2020-12-14T02:29:47Z", "updated_at": "2020-12-14T02:29:47Z", "revision_number": 0, "project_id": "37e420629ca343bfb1c753e936941e51"}, {"id": "84810bec-b53f-4b7d-9f7e-4dae9dd30b0d", "tenant_id": "37e420629ca343bfb1c753e936941e51", "security_group_id": "019e721a-1af6-4fa9-8b7e-ddc7d759fb71", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:29:47Z", "updated_at": "2020-12-14T02:29:47Z", "revision_number": 0, "project_id": "37e420629ca343bfb1c753e936941e51"}, {"id": "bd0476aa-a56d-4bed-919c-fcbb7afe527a", "tenant_id": "37e420629ca343bfb1c753e936941e51", "security_group_id": "019e721a-1af6-4fa9-8b7e-ddc7d759fb71", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "019e721a-1af6-4fa9-8b7e-ddc7d759fb71", "description": null, "tags": [], "created_at": "2020-12-14T02:29:47Z", "updated_at": "2020-12-14T02:29:47Z", "revision_number": 0, "project_id": "37e420629ca343bfb1c753e936941e51"}, {"id": "df79b9f4-8ebb-49bb-9d24-0ffc1062599d", "tenant_id": "37e420629ca343bfb1c753e936941e51", "security_group_id": "019e721a-1af6-4fa9-8b7e-ddc7d759fb71", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:29:47Z", "updated_at": "2020-12-14T02:29:47Z", "revision_number": 0, "project_id": "37e420629ca343bfb1c753e936941e51"}], "tags": [], "created_at": "2020-12-14T02:29:47Z", "updated_at": "2020-12-14T02:29:47Z", "revision_number": 1, "project_id": "37e420629ca343bfb1c753e936941e51"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:02.345 189 INFO tempest.lib.common.rest_client [req-83df4d6a-c29f-427f-abcc-2239a0bf620c ] Request (ComputeServersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/019e721a-1af6-4fa9-8b7e-ddc7d759fb71 0.157s 2020-12-14 02:31:02.348 189 DEBUG tempest.lib.common.rest_client [req-83df4d6a-c29f-427f-abcc-2239a0bf620c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-83df4d6a-c29f-427f-abcc-2239a0bf620c', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:31:02 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/019e721a-1af6-4fa9-8b7e-ddc7d759fb71'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:02.527 189 INFO tempest.lib.common.rest_client [req-ef4fae5b-da7a-4243-9e9a-59bb0253f680 ] Request (ComputeServersRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51 0.173s 2020-12-14 02:31:02.529 189 DEBUG tempest.lib.common.rest_client [req-ef4fae5b-da7a-4243-9e9a-59bb0253f680 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef4fae5b-da7a-4243-9e9a-59bb0253f680', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/37e420629ca343bfb1c753e936941e51'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:02.632 189 INFO tempest.lib.common.rest_client [req-b81c02b1-2bbb-4427-9e69-8b446f59709b ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-12-14 02:31:02.635 189 DEBUG tempest.lib.common.rest_client [req-b81c02b1-2bbb-4427-9e69-8b446f59709b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b81c02b1-2bbb-4427-9e69-8b446f59709b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["kE19SXCeTT2NWNr7kRiAPQ"], "expires_at": "2020-12-14T03:31:02.000000Z", "issued_at": "2020-12-14T02:31:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:02.734 189 INFO tempest.lib.common.rest_client [req-be581975-fe19-46ae-95f7-8e3e9c8ccd03 ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:31:02.738 189 DEBUG tempest.lib.common.rest_client [req-be581975-fe19-46ae-95f7-8e3e9c8ccd03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be581975-fe19-46ae-95f7-8e3e9c8ccd03', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["8ANHq8aaStyHxyvSi7VeVw"], "expires_at": "2020-12-14T03:31:02.000000Z", "issued_at": "2020-12-14T02:31:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:02.813 189 INFO tempest.lib.common.rest_client [req-85e9a5f4-7d22-48e9-bead-0e39c5a14224 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.068s 2020-12-14 02:31:02.816 189 DEBUG tempest.lib.common.rest_client [req-85e9a5f4-7d22-48e9-bead-0e39c5a14224 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85e9a5f4-7d22-48e9-bead-0e39c5a14224', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:02.891 189 INFO tempest.lib.common.rest_client [req-ca1298bf-bb06-4638-87b0-7636158b5af8 ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.068s 2020-12-14 02:31:02.893 189 DEBUG tempest.lib.common.rest_client [req-ca1298bf-bb06-4638-87b0-7636158b5af8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerTagsRbacTest-1173236656-desc", "domain_id": "default", "name": "tempest-ServerTagsRbacTest-1173236656"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '374', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca1298bf-bb06-4638-87b0-7636158b5af8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "075affa4d4aa46c1bd86d1846426d0fe", "name": "tempest-ServerTagsRbacTest-1173236656", "domain_id": "default", "description": "tempest-ServerTagsRbacTest-1173236656-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:03.027 189 INFO tempest.lib.common.rest_client [req-c6f9ecb6-c9f1-4e4e-bf8d-b25036600b17 ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.127s 2020-12-14 02:31:03.030 189 DEBUG tempest.lib.common.rest_client [req-c6f9ecb6-c9f1-4e4e-bf8d-b25036600b17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerTagsRbacTest-1173236656", "password": "J2!8FAPokLM^n#t", "project_id": "075affa4d4aa46c1bd86d1846426d0fe", "email": "tempest-ServerTagsRbacTest-1741898941@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '392', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6f9ecb6-c9f1-4e4e-bf8d-b25036600b17', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "075affa4d4aa46c1bd86d1846426d0fe", "email": "tempest-ServerTagsRbacTest-1741898941@example.com", "id": "e358892b43f64a58a3b2f97b7ab7974f", "name": "tempest-ServerTagsRbacTest-1173236656", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/e358892b43f64a58a3b2f97b7ab7974f"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:03.095 189 INFO tempest.lib.common.rest_client [req-6efab58b-ad80-42fb-ba4e-272c30e2d8ff ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-12-14 02:31:03.098 189 DEBUG tempest.lib.common.rest_client [req-6efab58b-ad80-42fb-ba4e-272c30e2d8ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6efab58b-ad80-42fb-ba4e-272c30e2d8ff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:03.170 189 INFO tempest.lib.common.rest_client [req-c68e1bba-e97c-41be-8b58-9e8d45ba3eba ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:31:03.173 189 DEBUG tempest.lib.common.rest_client [req-c68e1bba-e97c-41be-8b58-9e8d45ba3eba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c68e1bba-e97c-41be-8b58-9e8d45ba3eba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:03.251 189 INFO tempest.lib.common.rest_client [req-0f8714f4-5c81-4a19-b1e4-9fb6a56e709f ] Request (ServerTagsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles/72a4576c553448cd941b052c1ca0cf2d 0.071s 2020-12-14 02:31:03.253 189 DEBUG tempest.lib.common.rest_client [req-0f8714f4-5c81-4a19-b1e4-9fb6a56e709f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f8714f4-5c81-4a19-b1e4-9fb6a56e709f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:03.257 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerTagsRbacTest-1173236656', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '075affa4d4aa46c1bd86d1846426d0fe', 'project_name': 'tempest-ServerTagsRbacTest-1173236656', 'tenant_id': '075affa4d4aa46c1bd86d1846426d0fe', 'tenant_name': 'tempest-ServerTagsRbacTest-1173236656', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'e358892b43f64a58a3b2f97b7ab7974f'}, Network: None, Subnet: None, Router: None 2020-12-14 02:31:03.354 189 INFO tempest.lib.common.rest_client [req-ff5744ef-89f0-4aa3-b743-f1080695da5d ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:31:03.356 189 DEBUG tempest.lib.common.rest_client [req-ff5744ef-89f0-4aa3-b743-f1080695da5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff5744ef-89f0-4aa3-b743-f1080695da5d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["loNOInwsR1W57110naHbdQ"], "expires_at": "2020-12-14T03:31:03.000000Z", "issued_at": "2020-12-14T02:31:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:03.989 189 INFO tempest.lib.common.rest_client [req-91d62beb-9466-46e7-b672-484b7b2f1b3d ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.626s 2020-12-14 02:31:03.991 189 DEBUG tempest.lib.common.rest_client [req-91d62beb-9466-46e7-b672-484b7b2f1b3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-ServerTagsRbacTest-1469242918-network", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe"}} Response - Headers: {'content-type': 'application/json', 'content-length': '734', 'x-openstack-request-id': 'req-91d62beb-9466-46e7-b672-484b7b2f1b3d', 'date': 'Mon, 14 Dec 2020 02:31:03 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"19fd3335-d8b4-41bf-b26b-ffa2210313cf","name":"tempest-ServerTagsRbacTest-1469242918-network","tenant_id":"075affa4d4aa46c1bd86d1846426d0fe","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"075affa4d4aa46c1bd86d1846426d0fe","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":53,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:31:03Z","updated_at":"2020-12-14T02:31:03Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:04.655 189 INFO tempest.lib.common.rest_client [req-299cc240-1272-4e34-afc8-dac7c75815b6 ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.655s 2020-12-14 02:31:04.658 189 DEBUG tempest.lib.common.rest_client [req-299cc240-1272-4e34-afc8-dac7c75815b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "19fd3335-d8b4-41bf-b26b-ffa2210313cf", "cidr": "192.168.120.0/28", "name": "tempest-ServerTagsRbacTest-1469242918-subnet", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '706', 'x-openstack-request-id': 'req-299cc240-1272-4e34-afc8-dac7c75815b6', 'date': 'Mon, 14 Dec 2020 02:31:04 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"777d42cb-89b3-446b-950f-78f989e5c32a","name":"tempest-ServerTagsRbacTest-1469242918-subnet","tenant_id":"075affa4d4aa46c1bd86d1846426d0fe","network_id":"19fd3335-d8b4-41bf-b26b-ffa2210313cf","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-14T02:31:04Z","updated_at":"2020-12-14T02:31:04Z","revision_number":0,"project_id":"075affa4d4aa46c1bd86d1846426d0fe"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:06.291 189 INFO tempest.lib.common.rest_client [req-c6c65a5d-c65c-41e8-a010-ad547c04cef0 ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 1.626s 2020-12-14 02:31:06.293 189 DEBUG tempest.lib.common.rest_client [req-c6c65a5d-c65c-41e8-a010-ad547c04cef0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-ServerTagsRbacTest-1469242918-router", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea"}}} Response - Headers: {'content-type': 'application/json', 'content-length': '808', 'x-openstack-request-id': 'req-c6c65a5d-c65c-41e8-a010-ad547c04cef0', 'date': 'Mon, 14 Dec 2020 02:31:06 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "418c6472-fcce-47bf-a348-9cc116b3c532", "name": "tempest-ServerTagsRbacTest-1469242918-router", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": {"network_id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "external_fixed_ips": [{"subnet_id": "72d79dc6-ca18-4491-924f-283ab190f863", "ip_address": "172.24.4.187"}, {"subnet_id": "886f7675-1d95-43e4-a213-604399f9af5c", "ip_address": "2001:db8::39b"}], "enable_snat": true}, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:31:04Z", "updated_at": "2020-12-14T02:31:05Z", "revision_number": 3, "project_id": "075affa4d4aa46c1bd86d1846426d0fe"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:11.930 189 INFO tempest.lib.common.rest_client [req-84a31a80-a9a5-4d6d-ac9f-b89d59da6353 ] Request (ServerTagsRbacTest:setUpClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/418c6472-fcce-47bf-a348-9cc116b3c532/add_router_interface 5.627s 2020-12-14 02:31:11.932 189 DEBUG tempest.lib.common.rest_client [req-84a31a80-a9a5-4d6d-ac9f-b89d59da6353 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "777d42cb-89b3-446b-950f-78f989e5c32a"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-84a31a80-a9a5-4d6d-ac9f-b89d59da6353', 'date': 'Mon, 14 Dec 2020 02:31:11 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/418c6472-fcce-47bf-a348-9cc116b3c532/add_router_interface'} Body: b'{"id": "418c6472-fcce-47bf-a348-9cc116b3c532", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "port_id": "de98716f-6305-4b16-b134-711c3d065e84", "network_id": "19fd3335-d8b4-41bf-b26b-ffa2210313cf", "subnet_id": "777d42cb-89b3-446b-950f-78f989e5c32a", "subnet_ids": ["777d42cb-89b3-446b-950f-78f989e5c32a"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:11.934 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerTagsRbacTest-1173236656', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '075affa4d4aa46c1bd86d1846426d0fe', 'project_name': 'tempest-ServerTagsRbacTest-1173236656', 'tenant_id': '075affa4d4aa46c1bd86d1846426d0fe', 'tenant_name': 'tempest-ServerTagsRbacTest-1173236656', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'e358892b43f64a58a3b2f97b7ab7974f'}, Network: {'id': '19fd3335-d8b4-41bf-b26b-ffa2210313cf', 'name': 'tempest-ServerTagsRbacTest-1469242918-network', 'tenant_id': '075affa4d4aa46c1bd86d1846426d0fe', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '075affa4d4aa46c1bd86d1846426d0fe', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:31:03Z', 'updated_at': '2020-12-14T02:31:03Z', 'revision_number': 1}, Subnet: {'id': '777d42cb-89b3-446b-950f-78f989e5c32a', 'name': 'tempest-ServerTagsRbacTest-1469242918-subnet', 'tenant_id': '075affa4d4aa46c1bd86d1846426d0fe', 'network_id': '19fd3335-d8b4-41bf-b26b-ffa2210313cf', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:31:04Z', 'updated_at': '2020-12-14T02:31:04Z', 'revision_number': 0, 'project_id': '075affa4d4aa46c1bd86d1846426d0fe'}, Router: {'id': '418c6472-fcce-47bf-a348-9cc116b3c532', 'name': 'tempest-ServerTagsRbacTest-1469242918-router', 'tenant_id': '075affa4d4aa46c1bd86d1846426d0fe', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.187'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::39b'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:31:04Z', 'updated_at': '2020-12-14T02:31:05Z', 'revision_number': 3, 'project_id': '075affa4d4aa46c1bd86d1846426d0fe'} 2020-12-14 02:31:12.116 189 INFO tempest.lib.common.rest_client [req-1f03a44c-1eed-490d-978a-24ec4c3f0ed2 ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.130s 2020-12-14 02:31:12.120 189 DEBUG tempest.lib.common.rest_client [req-1f03a44c-1eed-490d-978a-24ec4c3f0ed2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6567', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f03a44c-1eed-490d-978a-24ec4c3f0ed2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e358892b43f64a58a3b2f97b7ab7974f", "name": "tempest-ServerTagsRbacTest-1173236656", "password_expires_at": null}, "audit_ids": ["kb4XtZUuRAqLfIco7tJMqw"], "expires_at": "2020-12-14T03:31:12.000000Z", "issued_at": "2020-12-14T02:31:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "075affa4d4aa46c1bd86d1846426d0fe", "name": "tempest-ServerTagsRbacTest-1173236656"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30. _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:12.228 189 INFO tempest.lib.common.rest_client [req-db6129b1-30ba-4e7c-ac0e-a92622750ec9 ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:31:12.231 189 DEBUG tempest.lib.common.rest_client [req-db6129b1-30ba-4e7c-ac0e-a92622750ec9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db6129b1-30ba-4e7c-ac0e-a92622750ec9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["SslrTbFUQ7CtZgSUNV_zYw"], "expires_at": "2020-12-14T03:31:12.000000Z", "issued_at": "2020-12-14T02:31:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:12.354 189 INFO tempest.lib.common.rest_client [req-87a36d47-b7ab-4987-a78e-49ff6d35849c ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.059s 2020-12-14 02:31:12.357 189 DEBUG tempest.lib.common.rest_client [req-87a36d47-b7ab-4987-a78e-49ff6d35849c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87a36d47-b7ab-4987-a78e-49ff6d35849c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["TK4X51D0StqGKvgcECoLzg"], "expires_at": "2020-12-14T03:31:12.000000Z", "issued_at": "2020-12-14T02:31:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:12.438 189 INFO tempest.lib.common.rest_client [req-bce16cac-181d-4988-b0ca-33e0e13d2adb ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.072s 2020-12-14 02:31:12.441 189 DEBUG tempest.lib.common.rest_client [req-bce16cac-181d-4988-b0ca-33e0e13d2adb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bce16cac-181d-4988-b0ca-33e0e13d2adb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:12.515 189 INFO tempest.lib.common.rest_client [req-442f7cac-d02b-45a0-a33f-2d5e0ef640d4 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:31:12.517 189 DEBUG tempest.lib.common.rest_client [req-442f7cac-d02b-45a0-a33f-2d5e0ef640d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-442f7cac-d02b-45a0-a33f-2d5e0ef640d4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:12.520 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:31:12.523 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:12.597 189 INFO tempest.lib.common.rest_client [req-df3d1136-9778-4cd9-9cdf-4bfd23c52785 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles 0.069s 2020-12-14 02:31:12.599 189 DEBUG tempest.lib.common.rest_client [req-df3d1136-9778-4cd9-9cdf-4bfd23c52785 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df3d1136-9778-4cd9-9cdf-4bfd23c52785', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:12.708 189 INFO tempest.lib.common.rest_client [req-f0e1a628-9b79-41c2-834d-347ddc92edec ] Request (ServerTagsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles/72a4576c553448cd941b052c1ca0cf2d 0.102s 2020-12-14 02:31:12.711 189 DEBUG tempest.lib.common.rest_client [req-f0e1a628-9b79-41c2-834d-347ddc92edec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0e1a628-9b79-41c2-834d-347ddc92edec', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:12.857 189 INFO tempest.lib.common.rest_client [req-a1371e3b-cd21-4ae4-8ad4-79547067af14 ] Request (ServerTagsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles/a629c95d64b3416fb80ae90af4f69c05 0.139s 2020-12-14 02:31:12.860 189 DEBUG tempest.lib.common.rest_client [req-a1371e3b-cd21-4ae4-8ad4-79547067af14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1371e3b-cd21-4ae4-8ad4-79547067af14', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:13.981 189 INFO tempest.lib.common.rest_client [req-5c643a60-e69e-4dd0-8def-143d39129e37 ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.112s 2020-12-14 02:31:13.984 189 DEBUG tempest.lib.common.rest_client [req-5c643a60-e69e-4dd0-8def-143d39129e37 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c643a60-e69e-4dd0-8def-143d39129e37', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e358892b43f64a58a3b2f97b7ab7974f", "name": "tempest-ServerTagsRbacTest-1173236656", "password_expires_at": null}, "audit_ids": ["WhiBmX-TRAuZwHECTvqckg"], "expires_at": "2020-12-14T03:31:13.000000Z", "issued_at": "2020-12-14T02:31:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "075affa4d4aa46c1bd86d1846426d0fe", "name": "tempest-ServerTagsRbacTest-1173236656"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:14.099 189 INFO tempest.lib.common.rest_client [req-3e4a6705-fe8c-49e2-bb28-793f30e0965c ] Request (ServerTagsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:31:14.102 189 DEBUG tempest.lib.common.rest_client [req-3e4a6705-fe8c-49e2-bb28-793f30e0965c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3e4a6705-fe8c-49e2-bb28-793f30e0965c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e358892b43f64a58a3b2f97b7ab7974f", "name": "tempest-ServerTagsRbacTest-1173236656", "password_expires_at": null}, "audit_ids": ["KmZtZLpJSgyeAc2G8kYgLQ"], "expires_at": "2020-12-14T03:31:14.000000Z", "issued_at": "2020-12-14T02:31:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "075affa4d4aa46c1bd86d1846426d0fe", "name": "tempest-ServerTagsRbacTest-1173236656"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:14.105 189 INFO tempest.lib.common.fixed_network [-] (ServerTagsRbacTest:setUpClass) Found network {'id': '19fd3335-d8b4-41bf-b26b-ffa2210313cf', 'name': 'tempest-ServerTagsRbacTest-1469242918-network', 'tenant_id': '075affa4d4aa46c1bd86d1846426d0fe', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '075affa4d4aa46c1bd86d1846426d0fe', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:31:03Z', 'updated_at': '2020-12-14T02:31:03Z', 'revision_number': 1} available for tenant 2020-12-14 02:31:15.216 189 INFO tempest.lib.common.rest_client [req-584b0857-9aa7-4e77-9d6f-795e4c2f7794 ] Request (ServerTagsRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 1.103s 2020-12-14 02:31:15.218 189 DEBUG tempest.lib.common.rest_client [req-584b0857-9aa7-4e77-9d6f-795e4c2f7794 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-ServerTagsRbacTest-server-1346376835", "imageRef": "cd332004-33aa-4c81-9e50-54766a6df097", "flavorRef": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "networks": [{"uuid": "19fd3335-d8b4-41bf-b26b-ffa2210313cf"}]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-584b0857-9aa7-4e77-9d6f-795e4c2f7794', 'x-compute-request-id': 'req-584b0857-9aa7-4e77-9d6f-795e4c2f7794', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "398bf184-e124-4dd5-85d4-cf2339b5431f", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "2ktkFr2zbc3Y"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:15.378 189 INFO tempest.lib.common.rest_client [req-98f59a0c-5588-4cbe-bda1-156eb231e73a ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f 0.137s 2020-12-14 02:31:15.380 189 DEBUG tempest.lib.common.rest_client [req-98f59a0c-5588-4cbe-bda1-156eb231e73a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1394', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-98f59a0c-5588-4cbe-bda1-156eb231e73a', 'x-compute-request-id': 'req-98f59a0c-5588-4cbe-bda1-156eb231e73a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f'} Body: b'{"server": {"id": "398bf184-e124-4dd5-85d4-cf2339b5431f", "name": "tempest-ServerTagsRbacTest-server-1346376835", "status": "BUILD", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "user_id": "e358892b43f64a58a3b2f97b7ab7974f", "metadata": {}, "hostId": "", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:31:15Z", "updated": "2020-12-14T02:31:15Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:16.627 189 INFO tempest.lib.common.rest_client [req-278648fc-8ec2-4e2c-a405-78d9c08dfd50 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f 0.156s 2020-12-14 02:31:16.630 189 DEBUG tempest.lib.common.rest_client [req-278648fc-8ec2-4e2c-a405-78d9c08dfd50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1489', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-278648fc-8ec2-4e2c-a405-78d9c08dfd50', 'x-compute-request-id': 'req-278648fc-8ec2-4e2c-a405-78d9c08dfd50', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f'} Body: b'{"server": {"id": "398bf184-e124-4dd5-85d4-cf2339b5431f", "name": "tempest-ServerTagsRbacTest-server-1346376835", "status": "BUILD", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "user_id": "e358892b43f64a58a3b2f97b7ab7974f", "metadata": {}, "hostId": "0aad2686d57ef21b6574ddc603dfdab5905f17d456477372a4a6ddd6", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:31:15Z", "updated": "2020-12-14T02:31:16Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "networking", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:16.729 189 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/networking" after 1 second wait 2020-12-14 02:31:17.979 189 INFO tempest.lib.common.rest_client [req-c12387e2-0fb0-49ca-814d-db80111714f2 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f 0.240s 2020-12-14 02:31:17.982 189 DEBUG tempest.lib.common.rest_client [req-c12387e2-0fb0-49ca-814d-db80111714f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1529', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c12387e2-0fb0-49ca-814d-db80111714f2', 'x-compute-request-id': 'req-c12387e2-0fb0-49ca-814d-db80111714f2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f'} Body: b'{"server": {"id": "398bf184-e124-4dd5-85d4-cf2339b5431f", "name": "tempest-ServerTagsRbacTest-server-1346376835", "status": "BUILD", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "user_id": "e358892b43f64a58a3b2f97b7ab7974f", "metadata": {}, "hostId": "0aad2686d57ef21b6574ddc603dfdab5905f17d456477372a4a6ddd6", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:31:15Z", "updated": "2020-12-14T02:31:17Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:18.088 189 INFO tempest.common.waiters [-] State transition "BUILD/networking" ==> "BUILD/spawning" after 3 second wait 2020-12-14 02:31:19.333 189 INFO tempest.lib.common.rest_client [req-1d30ab91-0add-4960-af55-942e5bf1f439 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f 0.236s 2020-12-14 02:31:19.336 189 DEBUG tempest.lib.common.rest_client [req-1d30ab91-0add-4960-af55-942e5bf1f439 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1529', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1d30ab91-0add-4960-af55-942e5bf1f439', 'x-compute-request-id': 'req-1d30ab91-0add-4960-af55-942e5bf1f439', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f'} Body: b'{"server": {"id": "398bf184-e124-4dd5-85d4-cf2339b5431f", "name": "tempest-ServerTagsRbacTest-server-1346376835", "status": "BUILD", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "user_id": "e358892b43f64a58a3b2f97b7ab7974f", "metadata": {}, "hostId": "0aad2686d57ef21b6574ddc603dfdab5905f17d456477372a4a6ddd6", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:31:15Z", "updated": "2020-12-14T02:31:17Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:20.843 189 INFO tempest.lib.common.rest_client [req-885e4480-c9e3-4dd6-9e6d-1dbe4b2aed60 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f 0.398s 2020-12-14 02:31:20.846 189 DEBUG tempest.lib.common.rest_client [req-885e4480-c9e3-4dd6-9e6d-1dbe4b2aed60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1529', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-885e4480-c9e3-4dd6-9e6d-1dbe4b2aed60', 'x-compute-request-id': 'req-885e4480-c9e3-4dd6-9e6d-1dbe4b2aed60', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f'} Body: b'{"server": {"id": "398bf184-e124-4dd5-85d4-cf2339b5431f", "name": "tempest-ServerTagsRbacTest-server-1346376835", "status": "BUILD", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "user_id": "e358892b43f64a58a3b2f97b7ab7974f", "metadata": {}, "hostId": "0aad2686d57ef21b6574ddc603dfdab5905f17d456477372a4a6ddd6", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:31:15Z", "updated": "2020-12-14T02:31:17Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:22.338 189 INFO tempest.lib.common.rest_client [req-f0a05035-4435-4fac-9c65-2d984bd85252 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f 0.382s 2020-12-14 02:31:22.342 189 DEBUG tempest.lib.common.rest_client [req-f0a05035-4435-4fac-9c65-2d984bd85252 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1529', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f0a05035-4435-4fac-9c65-2d984bd85252', 'x-compute-request-id': 'req-f0a05035-4435-4fac-9c65-2d984bd85252', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f'} Body: b'{"server": {"id": "398bf184-e124-4dd5-85d4-cf2339b5431f", "name": "tempest-ServerTagsRbacTest-server-1346376835", "status": "BUILD", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "user_id": "e358892b43f64a58a3b2f97b7ab7974f", "metadata": {}, "hostId": "0aad2686d57ef21b6574ddc603dfdab5905f17d456477372a4a6ddd6", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:31:15Z", "updated": "2020-12-14T02:31:17Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:23.795 189 INFO tempest.lib.common.rest_client [req-77d8399b-28c5-4f29-b4b0-410a6bc3eb41 ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f 0.345s 2020-12-14 02:31:23.798 189 DEBUG tempest.lib.common.rest_client [req-77d8399b-28c5-4f29-b4b0-410a6bc3eb41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1529', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-77d8399b-28c5-4f29-b4b0-410a6bc3eb41', 'x-compute-request-id': 'req-77d8399b-28c5-4f29-b4b0-410a6bc3eb41', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f'} Body: b'{"server": {"id": "398bf184-e124-4dd5-85d4-cf2339b5431f", "name": "tempest-ServerTagsRbacTest-server-1346376835", "status": "BUILD", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "user_id": "e358892b43f64a58a3b2f97b7ab7974f", "metadata": {}, "hostId": "0aad2686d57ef21b6574ddc603dfdab5905f17d456477372a4a6ddd6", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:31:15Z", "updated": "2020-12-14T02:31:17Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "spawning", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:25.117 189 INFO tempest.lib.common.rest_client [req-c976ca5c-fe2c-4f51-b012-42f9c495c72a ] Request (ServerTagsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f 0.210s 2020-12-14 02:31:25.120 189 DEBUG tempest.lib.common.rest_client [req-c976ca5c-fe2c-4f51-b012-42f9c495c72a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1712', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c976ca5c-fe2c-4f51-b012-42f9c495c72a', 'x-compute-request-id': 'req-c976ca5c-fe2c-4f51-b012-42f9c495c72a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f'} Body: b'{"server": {"id": "398bf184-e124-4dd5-85d4-cf2339b5431f", "name": "tempest-ServerTagsRbacTest-server-1346376835", "status": "ACTIVE", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "user_id": "e358892b43f64a58a3b2f97b7ab7974f", "metadata": {}, "hostId": "0aad2686d57ef21b6574ddc603dfdab5905f17d456477372a4a6ddd6", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:31:15Z", "updated": "2020-12-14T02:31:24Z", "addresses": {"tempest-ServerTagsRbacTest-1469242918-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5a:d5:b8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:31:23.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:25.224 189 INFO tempest.common.waiters [-] State transition "BUILD/spawning" ==> "ACTIVE/None" after 10 second wait 2020-12-14 02:31:25.231 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:31:25.236 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.239 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.243 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.246 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.250 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.253 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.258 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.261 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.264 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.266 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.269 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.272 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.275 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.277 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.281 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.284 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.287 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.289 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.292 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.295 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.297 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.300 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.303 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.305 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.308 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.311 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.314 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.316 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.319 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.321 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.323 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.325 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.328 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.330 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.332 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.334 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.336 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.338 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.341 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.343 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.345 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.348 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.350 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.352 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.355 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.357 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.359 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.361 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.363 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.365 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.367 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.370 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.372 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.374 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.376 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.379 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.383 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.385 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.387 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.390 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.392 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.394 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.396 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.398 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.400 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.402 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.404 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.407 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.409 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.411 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.413 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:25.421 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-tags:show, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:31:25.577 189 INFO tempest.lib.common.rest_client [req-08ddbb7c-14a3-497f-a02f-6ad662d0dda1 ] Request (ServerTagsRbacTest:test_check_tag_existence): 201 PUT http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags/tempest-ServerTagsRbacTest-tag-507078583 0.151s 2020-12-14 02:31:25.579 189 DEBUG tempest.lib.common.rest_client [req-08ddbb7c-14a3-497f-a02f-6ad662d0dda1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'content-length': '0', 'location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags/tempest-ServerTagsRbacTest-tag-507078583', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-08ddbb7c-14a3-497f-a02f-6ad662d0dda1', 'x-compute-request-id': 'req-08ddbb7c-14a3-497f-a02f-6ad662d0dda1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags/tempest-ServerTagsRbacTest-tag-507078583'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:25.603 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:25.740 189 INFO tempest.lib.common.rest_client [req-02d1686d-fde9-4b3e-86d2-0a7fd6dbf9c9 ] Request (ServerTagsRbacTest:test_check_tag_existence): 200 GET http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles 0.128s 2020-12-14 02:31:25.743 189 DEBUG tempest.lib.common.rest_client [req-02d1686d-fde9-4b3e-86d2-0a7fd6dbf9c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02d1686d-fde9-4b3e-86d2-0a7fd6dbf9c9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:25.804 189 INFO tempest.lib.common.rest_client [req-d9e8c045-8f50-43c6-a62e-b0381d2a8d8f ] Request (ServerTagsRbacTest:test_check_tag_existence): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.053s 2020-12-14 02:31:25.807 189 DEBUG tempest.lib.common.rest_client [req-d9e8c045-8f50-43c6-a62e-b0381d2a8d8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9e8c045-8f50-43c6-a62e-b0381d2a8d8f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e358892b43f64a58a3b2f97b7ab7974f", "name": "tempest-ServerTagsRbacTest-1173236656", "password_expires_at": null}, "audit_ids": ["b_ZpGVaTRAiMfK10iJCN0g"], "expires_at": "2020-12-14T03:31:25.000000Z", "issued_at": "2020-12-14T02:31:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "075affa4d4aa46c1bd86d1846426d0fe", "name": "tempest-ServerTagsRbacTest-1173236656"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:25.927 189 INFO tempest.lib.common.rest_client [req-edda52ef-708d-4c9a-b420-ea06caadb015 ] Request (ServerTagsRbacTest:test_check_tag_existence): 204 GET http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags/tempest-ServerTagsRbacTest-tag-507078583 0.113s 2020-12-14 02:31:25.929 189 DEBUG tempest.lib.common.rest_client [req-edda52ef-708d-4c9a-b420-ea06caadb015 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-edda52ef-708d-4c9a-b420-ea06caadb015', 'x-compute-request-id': 'req-edda52ef-708d-4c9a-b420-ea06caadb015', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags/tempest-ServerTagsRbacTest-tag-507078583'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:25.934 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:26.005 189 INFO tempest.lib.common.rest_client [req-0208e7ab-fdfb-4894-afce-ecec3fe3ac6a ] Request (ServerTagsRbacTest:test_check_tag_existence): 200 GET http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles 0.066s 2020-12-14 02:31:26.008 189 DEBUG tempest.lib.common.rest_client [req-0208e7ab-fdfb-4894-afce-ecec3fe3ac6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0208e7ab-fdfb-4894-afce-ecec3fe3ac6a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:26.061 189 INFO tempest.lib.common.rest_client [req-5c344940-1a1d-4898-aa47-ed372dc08152 ] Request (ServerTagsRbacTest:test_check_tag_existence): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:31:26.065 189 DEBUG tempest.lib.common.rest_client [req-5c344940-1a1d-4898-aa47-ed372dc08152 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c344940-1a1d-4898-aa47-ed372dc08152', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e358892b43f64a58a3b2f97b7ab7974f", "name": "tempest-ServerTagsRbacTest-1173236656", "password_expires_at": null}, "audit_ids": ["1QvyfRRTQSCHV1EUFAjdUQ"], "expires_at": "2020-12-14T03:31:26.000000Z", "issued_at": "2020-12-14T02:31:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "075affa4d4aa46c1bd86d1846426d0fe", "name": "tempest-ServerTagsRbacTest-1173236656"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:26.294 189 INFO tempest.lib.common.rest_client [req-0948fdb5-6943-4447-914f-ebf75e0628c8 ] Request (ServerTagsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags 0.219s 2020-12-14 02:31:26.297 189 DEBUG tempest.lib.common.rest_client [req-0948fdb5-6943-4447-914f-ebf75e0628c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0948fdb5-6943-4447-914f-ebf75e0628c8', 'x-compute-request-id': 'req-0948fdb5-6943-4447-914f-ebf75e0628c8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:26.321 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:31:26.325 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.328 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.331 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.335 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.339 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.342 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.347 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.350 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.353 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.356 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.359 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.362 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.365 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.368 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.371 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.374 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.377 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.380 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.383 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.385 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.388 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.391 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.394 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.397 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.399 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.402 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.405 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.408 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.410 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.413 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.416 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.419 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.421 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.424 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.427 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.430 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.433 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.435 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.439 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.442 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.445 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.448 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.450 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.454 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.457 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.460 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.462 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.465 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.468 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.471 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.474 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.477 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.479 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.482 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.486 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.489 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.495 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.498 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.500 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.504 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.506 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.509 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.512 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.515 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.518 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.520 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.523 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.526 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.529 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.531 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.534 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:26.546 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-tags:delete_all, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:31:26.548 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:26.620 189 INFO tempest.lib.common.rest_client [req-9e77f3da-99bf-42a0-aba7-b2bea9d52268 ] Request (ServerTagsRbacTest:test_delete_all_tags): 200 GET http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles 0.066s 2020-12-14 02:31:26.623 189 DEBUG tempest.lib.common.rest_client [req-9e77f3da-99bf-42a0-aba7-b2bea9d52268 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e77f3da-99bf-42a0-aba7-b2bea9d52268', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:26.669 189 INFO tempest.lib.common.rest_client [req-b0a6f208-f8f3-47e2-a43a-3d254682d94b ] Request (ServerTagsRbacTest:test_delete_all_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:31:26.672 189 DEBUG tempest.lib.common.rest_client [req-b0a6f208-f8f3-47e2-a43a-3d254682d94b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b0a6f208-f8f3-47e2-a43a-3d254682d94b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e358892b43f64a58a3b2f97b7ab7974f", "name": "tempest-ServerTagsRbacTest-1173236656", "password_expires_at": null}, "audit_ids": ["oO-jjZu7Q4KjW8bvSnv3IQ"], "expires_at": "2020-12-14T03:31:26.000000Z", "issued_at": "2020-12-14T02:31:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "075affa4d4aa46c1bd86d1846426d0fe", "name": "tempest-ServerTagsRbacTest-1173236656"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:26.860 189 INFO tempest.lib.common.rest_client [req-d5df1e17-6116-4c52-a983-c87257efa450 ] Request (ServerTagsRbacTest:test_delete_all_tags): 204 DELETE http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags 0.181s 2020-12-14 02:31:26.864 189 DEBUG tempest.lib.common.rest_client [req-d5df1e17-6116-4c52-a983-c87257efa450 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d5df1e17-6116-4c52-a983-c87257efa450', 'x-compute-request-id': 'req-d5df1e17-6116-4c52-a983-c87257efa450', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:26.870 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:26.937 189 INFO tempest.lib.common.rest_client [req-4c86dea6-a425-428a-b88a-a4b3daed4d91 ] Request (ServerTagsRbacTest:test_delete_all_tags): 200 GET http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles 0.061s 2020-12-14 02:31:26.941 189 DEBUG tempest.lib.common.rest_client [req-4c86dea6-a425-428a-b88a-a4b3daed4d91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c86dea6-a425-428a-b88a-a4b3daed4d91', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:26.993 189 INFO tempest.lib.common.rest_client [req-4f622d0e-5290-4abb-a6de-df8bbc77b4b5 ] Request (ServerTagsRbacTest:test_delete_all_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:31:26.996 189 DEBUG tempest.lib.common.rest_client [req-4f622d0e-5290-4abb-a6de-df8bbc77b4b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4f622d0e-5290-4abb-a6de-df8bbc77b4b5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e358892b43f64a58a3b2f97b7ab7974f", "name": "tempest-ServerTagsRbacTest-1173236656", "password_expires_at": null}, "audit_ids": ["xaENVNlhQeqBdtv-UIJ8oA"], "expires_at": "2020-12-14T03:31:26.000000Z", "issued_at": "2020-12-14T02:31:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "075affa4d4aa46c1bd86d1846426d0fe", "name": "tempest-ServerTagsRbacTest-1173236656"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:27.023 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:31:27.027 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.031 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.034 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.037 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.041 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.045 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.050 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.053 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.056 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.058 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.061 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.064 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.067 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.070 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.073 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.077 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.079 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.082 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.085 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.088 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.091 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.093 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.096 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.099 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.102 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.105 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.107 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.110 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.113 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.116 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.118 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.122 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.125 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.128 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.131 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.134 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.137 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.140 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.143 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.147 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.150 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.152 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.155 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.159 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.162 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.164 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.167 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.170 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.173 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.175 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.178 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.181 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.184 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.187 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.190 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.193 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.199 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.202 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.205 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.208 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.211 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.214 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.216 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.222 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.225 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.227 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.230 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.233 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.236 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.239 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.242 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:27.254 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-tags:delete, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:31:27.483 189 INFO tempest.lib.common.rest_client [req-2c237b45-bf47-48e7-b2fc-da4975175f68 ] Request (ServerTagsRbacTest:test_delete_tag): 201 PUT http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags/tempest-ServerTagsRbacTest-tag-1694963208 0.222s 2020-12-14 02:31:27.487 189 DEBUG tempest.lib.common.rest_client [req-2c237b45-bf47-48e7-b2fc-da4975175f68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'content-length': '0', 'location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags/tempest-ServerTagsRbacTest-tag-1694963208', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2c237b45-bf47-48e7-b2fc-da4975175f68', 'x-compute-request-id': 'req-2c237b45-bf47-48e7-b2fc-da4975175f68', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags/tempest-ServerTagsRbacTest-tag-1694963208'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:27.512 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:27.580 189 INFO tempest.lib.common.rest_client [req-8cdff877-dc57-491a-a05f-c1831052f1d5 ] Request (ServerTagsRbacTest:test_delete_tag): 200 GET http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles 0.062s 2020-12-14 02:31:27.583 189 DEBUG tempest.lib.common.rest_client [req-8cdff877-dc57-491a-a05f-c1831052f1d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8cdff877-dc57-491a-a05f-c1831052f1d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:27.632 189 INFO tempest.lib.common.rest_client [req-e9a0b0bd-352e-48a8-862a-eb59e0661974 ] Request (ServerTagsRbacTest:test_delete_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:31:27.635 189 DEBUG tempest.lib.common.rest_client [req-e9a0b0bd-352e-48a8-862a-eb59e0661974 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9a0b0bd-352e-48a8-862a-eb59e0661974', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e358892b43f64a58a3b2f97b7ab7974f", "name": "tempest-ServerTagsRbacTest-1173236656", "password_expires_at": null}, "audit_ids": ["vE395uXtSOSa3c8h6zMtNg"], "expires_at": "2020-12-14T03:31:27.000000Z", "issued_at": "2020-12-14T02:31:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "075affa4d4aa46c1bd86d1846426d0fe", "name": "tempest-ServerTagsRbacTest-1173236656"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:27.855 189 INFO tempest.lib.common.rest_client [req-9349a1fc-ee73-45aa-8b1f-caf363c002c9 ] Request (ServerTagsRbacTest:test_delete_tag): 204 DELETE http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags/tempest-ServerTagsRbacTest-tag-1694963208 0.212s 2020-12-14 02:31:27.858 189 DEBUG tempest.lib.common.rest_client [req-9349a1fc-ee73-45aa-8b1f-caf363c002c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9349a1fc-ee73-45aa-8b1f-caf363c002c9', 'x-compute-request-id': 'req-9349a1fc-ee73-45aa-8b1f-caf363c002c9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags/tempest-ServerTagsRbacTest-tag-1694963208'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:27.863 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:27.931 189 INFO tempest.lib.common.rest_client [req-0f604c54-b243-4433-b417-e962a1eb338a ] Request (ServerTagsRbacTest:test_delete_tag): 200 GET http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles 0.063s 2020-12-14 02:31:27.933 189 DEBUG tempest.lib.common.rest_client [req-0f604c54-b243-4433-b417-e962a1eb338a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f604c54-b243-4433-b417-e962a1eb338a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:27.996 189 INFO tempest.lib.common.rest_client [req-8186f0ed-ee96-4dc6-b427-4b725a0faf99 ] Request (ServerTagsRbacTest:test_delete_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-12-14 02:31:27.999 189 DEBUG tempest.lib.common.rest_client [req-8186f0ed-ee96-4dc6-b427-4b725a0faf99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8186f0ed-ee96-4dc6-b427-4b725a0faf99', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e358892b43f64a58a3b2f97b7ab7974f", "name": "tempest-ServerTagsRbacTest-1173236656", "password_expires_at": null}, "audit_ids": ["fVgoIQlTSFqRWhzr6iv-DQ"], "expires_at": "2020-12-14T03:31:27.000000Z", "issued_at": "2020-12-14T02:31:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "075affa4d4aa46c1bd86d1846426d0fe", "name": "tempest-ServerTagsRbacTest-1173236656"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:28.228 189 INFO tempest.lib.common.rest_client [req-b6a77aef-3db1-4ebc-aca9-bcaec069ac7b ] Request (ServerTagsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags 0.219s 2020-12-14 02:31:28.232 189 DEBUG tempest.lib.common.rest_client [req-b6a77aef-3db1-4ebc-aca9-bcaec069ac7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b6a77aef-3db1-4ebc-aca9-bcaec069ac7b', 'x-compute-request-id': 'req-b6a77aef-3db1-4ebc-aca9-bcaec069ac7b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:28.259 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:31:28.263 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.267 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.270 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.273 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.277 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.281 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.286 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.289 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.292 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.294 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.297 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.300 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.303 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.306 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.309 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.313 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.316 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.319 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.321 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.324 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.327 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.330 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.333 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.336 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.339 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.341 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.344 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.347 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.350 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.353 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.355 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.358 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.361 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.364 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.367 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.370 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.373 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.375 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.379 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.383 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.386 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.389 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.392 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.396 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.399 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.402 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.404 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.407 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.410 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.413 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.416 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.419 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.421 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.424 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.428 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.431 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.437 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.440 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.443 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.446 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.449 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.452 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.455 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.457 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.460 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.463 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.466 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.468 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.471 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.474 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.477 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.488 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-tags:index, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:31:28.490 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:28.558 189 INFO tempest.lib.common.rest_client [req-baf1987b-a126-4df6-a10b-9982b6104fb0 ] Request (ServerTagsRbacTest:test_list_tags): 200 GET http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles 0.062s 2020-12-14 02:31:28.562 189 DEBUG tempest.lib.common.rest_client [req-baf1987b-a126-4df6-a10b-9982b6104fb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-baf1987b-a126-4df6-a10b-9982b6104fb0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:28.622 189 INFO tempest.lib.common.rest_client [req-0a367f15-6f1d-420b-a4ef-bd26ace94e5b ] Request (ServerTagsRbacTest:test_list_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:31:28.625 189 DEBUG tempest.lib.common.rest_client [req-0a367f15-6f1d-420b-a4ef-bd26ace94e5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0a367f15-6f1d-420b-a4ef-bd26ace94e5b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e358892b43f64a58a3b2f97b7ab7974f", "name": "tempest-ServerTagsRbacTest-1173236656", "password_expires_at": null}, "audit_ids": ["a_gJAh0IQh2hCOgaBMAczw"], "expires_at": "2020-12-14T03:31:28.000000Z", "issued_at": "2020-12-14T02:31:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "075affa4d4aa46c1bd86d1846426d0fe", "name": "tempest-ServerTagsRbacTest-1173236656"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:28.756 189 INFO tempest.lib.common.rest_client [req-93df5732-80e9-4986-b7f0-ba23918ac129 ] Request (ServerTagsRbacTest:test_list_tags): 200 GET http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags 0.123s 2020-12-14 02:31:28.759 189 DEBUG tempest.lib.common.rest_client [req-93df5732-80e9-4986-b7f0-ba23918ac129 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '12', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-93df5732-80e9-4986-b7f0-ba23918ac129', 'x-compute-request-id': 'req-93df5732-80e9-4986-b7f0-ba23918ac129', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags'} Body: b'{"tags": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:28.781 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:28.854 189 INFO tempest.lib.common.rest_client [req-3714e5a8-b31f-4394-8e99-a0b5ec704254 ] Request (ServerTagsRbacTest:test_list_tags): 200 GET http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles 0.067s 2020-12-14 02:31:28.857 189 DEBUG tempest.lib.common.rest_client [req-3714e5a8-b31f-4394-8e99-a0b5ec704254 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3714e5a8-b31f-4394-8e99-a0b5ec704254', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:28.909 189 INFO tempest.lib.common.rest_client [req-3c90a9bd-3f11-4a34-bc5c-9e30786a736c ] Request (ServerTagsRbacTest:test_list_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:31:28.912 189 DEBUG tempest.lib.common.rest_client [req-3c90a9bd-3f11-4a34-bc5c-9e30786a736c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c90a9bd-3f11-4a34-bc5c-9e30786a736c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e358892b43f64a58a3b2f97b7ab7974f", "name": "tempest-ServerTagsRbacTest-1173236656", "password_expires_at": null}, "audit_ids": ["A41DymVZT82MthY_pUvWmg"], "expires_at": "2020-12-14T03:31:28.000000Z", "issued_at": "2020-12-14T02:31:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "075affa4d4aa46c1bd86d1846426d0fe", "name": "tempest-ServerTagsRbacTest-1173236656"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:28.939 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:31:28.944 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.947 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.950 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.954 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.957 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.961 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.966 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.969 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.972 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.974 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.977 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.980 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.983 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.986 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.989 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.993 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.995 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:28.998 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.001 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.004 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.006 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.009 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.012 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.015 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.018 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.020 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.023 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.026 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.029 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.031 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.034 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.037 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.040 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.043 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.045 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.048 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.051 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.054 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.057 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.060 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.063 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.066 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.069 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.072 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.075 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.078 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.081 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.084 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.086 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.089 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.092 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.095 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.098 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.100 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.104 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.107 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.113 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.116 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.118 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.122 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.125 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.128 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.130 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.133 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.136 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.138 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.141 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.144 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.147 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.149 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.152 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.163 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-tags:update_all, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:31:29.165 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:29.299 189 INFO tempest.lib.common.rest_client [req-59e9728b-b540-4e0d-9cbf-0a7093ba2875 ] Request (ServerTagsRbacTest:test_update_all_tags): 200 GET http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles 0.128s 2020-12-14 02:31:29.301 189 DEBUG tempest.lib.common.rest_client [req-59e9728b-b540-4e0d-9cbf-0a7093ba2875 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59e9728b-b540-4e0d-9cbf-0a7093ba2875', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:29.415 189 INFO tempest.lib.common.rest_client [req-4e415b40-ea11-4f7a-a93a-84009e0902b7 ] Request (ServerTagsRbacTest:test_update_all_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:31:29.418 189 DEBUG tempest.lib.common.rest_client [req-4e415b40-ea11-4f7a-a93a-84009e0902b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e415b40-ea11-4f7a-a93a-84009e0902b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e358892b43f64a58a3b2f97b7ab7974f", "name": "tempest-ServerTagsRbacTest-1173236656", "password_expires_at": null}, "audit_ids": ["OgUsRAlTTdad4Tg3c7ekUQ"], "expires_at": "2020-12-14T03:31:29.000000Z", "issued_at": "2020-12-14T02:31:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "075affa4d4aa46c1bd86d1846426d0fe", "name": "tempest-ServerTagsRbacTest-1173236656"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:29.671 189 INFO tempest.lib.common.rest_client [req-cf373a23-231f-4242-a06a-165e507bebeb ] Request (ServerTagsRbacTest:test_update_all_tags): 200 PUT http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags 0.244s 2020-12-14 02:31:29.674 189 DEBUG tempest.lib.common.rest_client [req-cf373a23-231f-4242-a06a-165e507bebeb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: {"tags": ["tempest-ServerTagsRbacTest-tag-1194945871"]} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '55', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cf373a23-231f-4242-a06a-165e507bebeb', 'x-compute-request-id': 'req-cf373a23-231f-4242-a06a-165e507bebeb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags'} Body: b'{"tags": ["tempest-ServerTagsRbacTest-tag-1194945871"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:29.694 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:29.821 189 INFO tempest.lib.common.rest_client [req-027b99e3-9501-43eb-8686-0a9e03427af8 ] Request (ServerTagsRbacTest:test_update_all_tags): 200 GET http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles 0.119s 2020-12-14 02:31:29.824 189 DEBUG tempest.lib.common.rest_client [req-027b99e3-9501-43eb-8686-0a9e03427af8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-027b99e3-9501-43eb-8686-0a9e03427af8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:29.933 189 INFO tempest.lib.common.rest_client [req-3465ac81-9efe-481d-8e53-170e40a321f3 ] Request (ServerTagsRbacTest:test_update_all_tags): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-14 02:31:29.938 189 DEBUG tempest.lib.common.rest_client [req-3465ac81-9efe-481d-8e53-170e40a321f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3465ac81-9efe-481d-8e53-170e40a321f3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e358892b43f64a58a3b2f97b7ab7974f", "name": "tempest-ServerTagsRbacTest-1173236656", "password_expires_at": null}, "audit_ids": ["gc7ZCWW9TNiM-zaoLeiUWA"], "expires_at": "2020-12-14T03:31:29.000000Z", "issued_at": "2020-12-14T02:31:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "075affa4d4aa46c1bd86d1846426d0fe", "name": "tempest-ServerTagsRbacTest-1173236656"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:29.958 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:31:29.962 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.965 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.968 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.972 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.975 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.979 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.984 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.986 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.989 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.992 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.994 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:29.997 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.000 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.003 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.006 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.009 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.012 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.015 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.019 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.022 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.025 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.028 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.030 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.033 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.036 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.039 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.042 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.044 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.047 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.050 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.053 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.055 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.058 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.061 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.064 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.066 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.069 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.072 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.075 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.078 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.081 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.084 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.087 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.090 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.093 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.096 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.099 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.102 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.104 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.107 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.110 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.113 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.116 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.119 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.124 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.127 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.133 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.136 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.139 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.142 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.145 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.148 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.150 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.153 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.156 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.159 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.162 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.164 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.167 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.170 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.173 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:30.184 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-server-tags:update, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:31:30.187 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:30.320 189 INFO tempest.lib.common.rest_client [req-8659ff1c-d370-4669-a65e-7168f4e37bd7 ] Request (ServerTagsRbacTest:test_update_tag): 200 GET http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles 0.126s 2020-12-14 02:31:30.324 189 DEBUG tempest.lib.common.rest_client [req-8659ff1c-d370-4669-a65e-7168f4e37bd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8659ff1c-d370-4669-a65e-7168f4e37bd7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:30.429 189 INFO tempest.lib.common.rest_client [req-b2b0a70e-97cb-45cc-bcef-08d3b622c60d ] Request (ServerTagsRbacTest:test_update_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:31:30.434 189 DEBUG tempest.lib.common.rest_client [req-b2b0a70e-97cb-45cc-bcef-08d3b622c60d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2b0a70e-97cb-45cc-bcef-08d3b622c60d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e358892b43f64a58a3b2f97b7ab7974f", "name": "tempest-ServerTagsRbacTest-1173236656", "password_expires_at": null}, "audit_ids": ["NPekNonqRl2xJZkoCBWQxg"], "expires_at": "2020-12-14T03:31:30.000000Z", "issued_at": "2020-12-14T02:31:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "075affa4d4aa46c1bd86d1846426d0fe", "name": "tempest-ServerTagsRbacTest-1173236656"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:30.827 189 INFO tempest.lib.common.rest_client [req-4fba7cf3-8212-4bcd-8d5a-34c27ebf3e2f ] Request (ServerTagsRbacTest:test_update_tag): 201 PUT http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags/tempest-ServerTagsRbacTest-tag-2052716511 0.383s 2020-12-14 02:31:30.830 189 DEBUG tempest.lib.common.rest_client [req-4fba7cf3-8212-4bcd-8d5a-34c27ebf3e2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'content-length': '0', 'location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags/tempest-ServerTagsRbacTest-tag-2052716511', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4fba7cf3-8212-4bcd-8d5a-34c27ebf3e2f', 'x-compute-request-id': 'req-4fba7cf3-8212-4bcd-8d5a-34c27ebf3e2f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags/tempest-ServerTagsRbacTest-tag-2052716511'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:30.845 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:30.969 189 INFO tempest.lib.common.rest_client [req-215b044a-2469-44d3-9db2-702dadb1a262 ] Request (ServerTagsRbacTest:test_update_tag): 200 GET http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles 0.118s 2020-12-14 02:31:30.972 189 DEBUG tempest.lib.common.rest_client [req-215b044a-2469-44d3-9db2-702dadb1a262 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-215b044a-2469-44d3-9db2-702dadb1a262', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe/users/e358892b43f64a58a3b2f97b7ab7974f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:31.027 189 INFO tempest.lib.common.rest_client [req-b4e09937-1bc3-4902-a242-e0b638bf372f ] Request (ServerTagsRbacTest:test_update_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:31:31.032 189 DEBUG tempest.lib.common.rest_client [req-b4e09937-1bc3-4902-a242-e0b638bf372f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b4e09937-1bc3-4902-a242-e0b638bf372f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e358892b43f64a58a3b2f97b7ab7974f", "name": "tempest-ServerTagsRbacTest-1173236656", "password_expires_at": null}, "audit_ids": ["1aTtJFJxTbiW6Qp49wzHBA"], "expires_at": "2020-12-14T03:31:31.000000Z", "issued_at": "2020-12-14T02:31:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "075affa4d4aa46c1bd86d1846426d0fe", "name": "tempest-ServerTagsRbacTest-1173236656"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_075affa4d4aa46c1bd86d1846426d0fe", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:31.297 189 INFO tempest.lib.common.rest_client [req-f05ecf7b-0ff5-4dbc-bad4-0f89c55352e8 ] Request (ServerTagsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags 0.256s 2020-12-14 02:31:31.300 189 DEBUG tempest.lib.common.rest_client [req-f05ecf7b-0ff5-4dbc-bad4-0f89c55352e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-OpenStack-Nova-API-Version': '2.26', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.26', 'x-openstack-nova-api-version': '2.26', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f05ecf7b-0ff5-4dbc-bad4-0f89c55352e8', 'x-compute-request-id': 'req-f05ecf7b-0ff5-4dbc-bad4-0f89c55352e8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f/tags'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:31.652 189 INFO tempest.lib.common.rest_client [req-76934b9d-5d2c-4e1d-b60d-88c8ec23111e ] Request (ServerTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f 0.323s 2020-12-14 02:31:31.654 189 DEBUG tempest.lib.common.rest_client [req-76934b9d-5d2c-4e1d-b60d-88c8ec23111e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-76934b9d-5d2c-4e1d-b60d-88c8ec23111e', 'x-compute-request-id': 'req-76934b9d-5d2c-4e1d-b60d-88c8ec23111e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:31.904 189 INFO tempest.lib.common.rest_client [req-3c24de76-d6bd-421c-977d-db6c0fb8e71d ] Request (ServerTagsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f 0.244s 2020-12-14 02:31:31.907 189 DEBUG tempest.lib.common.rest_client [req-3c24de76-d6bd-421c-977d-db6c0fb8e71d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1718', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3c24de76-d6bd-421c-977d-db6c0fb8e71d', 'x-compute-request-id': 'req-3c24de76-d6bd-421c-977d-db6c0fb8e71d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f'} Body: b'{"server": {"id": "398bf184-e124-4dd5-85d4-cf2339b5431f", "name": "tempest-ServerTagsRbacTest-server-1346376835", "status": "ACTIVE", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "user_id": "e358892b43f64a58a3b2f97b7ab7974f", "metadata": {}, "hostId": "0aad2686d57ef21b6574ddc603dfdab5905f17d456477372a4a6ddd6", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:31:15Z", "updated": "2020-12-14T02:31:32Z", "addresses": {"tempest-ServerTagsRbacTest-1469242918-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5a:d5:b8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:31:23.000000", "OS-SRV-USG:terminated_at": null, "security_groups": [{"name": "default"}], "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:33.169 189 INFO tempest.lib.common.rest_client [req-3cd32413-8a9f-4405-b35f-b4f7fbf92004 ] Request (ServerTagsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f 0.149s 2020-12-14 02:31:33.173 189 DEBUG tempest.lib.common.rest_client [req-3cd32413-8a9f-4405-b35f-b4f7fbf92004 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1676', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3cd32413-8a9f-4405-b35f-b4f7fbf92004', 'x-compute-request-id': 'req-3cd32413-8a9f-4405-b35f-b4f7fbf92004', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f'} Body: b'{"server": {"id": "398bf184-e124-4dd5-85d4-cf2339b5431f", "name": "tempest-ServerTagsRbacTest-server-1346376835", "status": "ACTIVE", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "user_id": "e358892b43f64a58a3b2f97b7ab7974f", "metadata": {}, "hostId": "0aad2686d57ef21b6574ddc603dfdab5905f17d456477372a4a6ddd6", "image": {"id": "cd332004-33aa-4c81-9e50-54766a6df097", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/cd332004-33aa-4c81-9e50-54766a6df097"}]}, "flavor": {"id": "1311a6a1-b18c-4e52-af0a-b273bda5931b", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1311a6a1-b18c-4e52-af0a-b273bda5931b"}]}, "created": "2020-12-14T02:31:15Z", "updated": "2020-12-14T02:31:32Z", "addresses": {"tempest-ServerTagsRbacTest-1469242918-network": [{"version": 4, "addr": "192.168.120.8", "OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:5a:d5:b8"}]}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/398bf184-e124-4dd5-85d4-cf2339b5431f"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": "2020-12-14T02:31:23.000000", "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000dbf7", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": "active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:34.364 189 INFO tempest.lib.common.rest_client [req-eaa1fa2a-3fe7-4c97-af4d-b8e05cda910a ] Request (ServerTagsRbacTest:tearDownClass): 404 GET http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f 0.079s 2020-12-14 02:31:34.367 189 DEBUG tempest.lib.common.rest_client [req-eaa1fa2a-3fe7-4c97-af4d-b8e05cda910a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '111', 'x-openstack-request-id': 'req-eaa1fa2a-3fe7-4c97-af4d-b8e05cda910a', 'x-compute-request-id': 'req-eaa1fa2a-3fe7-4c97-af4d-b8e05cda910a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/398bf184-e124-4dd5-85d4-cf2339b5431f'} Body: b'{"itemNotFound": {"code": 404, "message": "Instance 398bf184-e124-4dd5-85d4-cf2339b5431f could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:34.370 189 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '19fd3335-d8b4-41bf-b26b-ffa2210313cf', 'name': 'tempest-ServerTagsRbacTest-1469242918-network', 'tenant_id': '075affa4d4aa46c1bd86d1846426d0fe', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '075affa4d4aa46c1bd86d1846426d0fe', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:31:03Z', 'updated_at': '2020-12-14T02:31:03Z', 'revision_number': 1}, subnet: {'id': '777d42cb-89b3-446b-950f-78f989e5c32a', 'name': 'tempest-ServerTagsRbacTest-1469242918-subnet', 'tenant_id': '075affa4d4aa46c1bd86d1846426d0fe', 'network_id': '19fd3335-d8b4-41bf-b26b-ffa2210313cf', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-14T02:31:04Z', 'updated_at': '2020-12-14T02:31:04Z', 'revision_number': 0, 'project_id': '075affa4d4aa46c1bd86d1846426d0fe'}, router: {'id': '418c6472-fcce-47bf-a348-9cc116b3c532', 'name': 'tempest-ServerTagsRbacTest-1469242918-router', 'tenant_id': '075affa4d4aa46c1bd86d1846426d0fe', 'admin_state_up': True, 'status': 'ACTIVE', 'external_gateway_info': {'network_id': '3fe4fc32-89a3-4f72-b166-6eb7100e1fea', 'external_fixed_ips': [{'subnet_id': '72d79dc6-ca18-4491-924f-283ab190f863', 'ip_address': '172.24.4.187'}, {'subnet_id': '886f7675-1d95-43e4-a213-604399f9af5c', 'ip_address': '2001:db8::39b'}], 'enable_snat': True}, 'description': '', 'availability_zones': [], 'distributed': False, 'ha': False, 'availability_zone_hints': [], 'routes': [], 'flavor_id': None, 'tags': [], 'created_at': '2020-12-14T02:31:04Z', 'updated_at': '2020-12-14T02:31:05Z', 'revision_number': 3, 'project_id': '075affa4d4aa46c1bd86d1846426d0fe'} _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:31:40.207 189 INFO tempest.lib.common.rest_client [req-34c9e494-8195-45d2-b064-3bf6344e2844 ] Request (ServerTagsRbacTest:tearDownClass): 200 PUT http://172.30.13.94:9696/v2.0/routers/418c6472-fcce-47bf-a348-9cc116b3c532/remove_router_interface 5.831s 2020-12-14 02:31:40.210 189 DEBUG tempest.lib.common.rest_client [req-34c9e494-8195-45d2-b064-3bf6344e2844 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet_id": "777d42cb-89b3-446b-950f-78f989e5c32a"} Response - Headers: {'content-type': 'application/json', 'content-length': '309', 'x-openstack-request-id': 'req-34c9e494-8195-45d2-b064-3bf6344e2844', 'date': 'Mon, 14 Dec 2020 02:31:40 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/418c6472-fcce-47bf-a348-9cc116b3c532/remove_router_interface'} Body: b'{"id": "418c6472-fcce-47bf-a348-9cc116b3c532", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "port_id": "de98716f-6305-4b16-b134-711c3d065e84", "network_id": "19fd3335-d8b4-41bf-b26b-ffa2210313cf", "subnet_id": "777d42cb-89b3-446b-950f-78f989e5c32a", "subnet_ids": ["777d42cb-89b3-446b-950f-78f989e5c32a"]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:41.333 189 INFO tempest.lib.common.rest_client [req-fcc06eb3-889c-4c36-9d54-634ce3d68d9d ] Request (ServerTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/418c6472-fcce-47bf-a348-9cc116b3c532 1.117s 2020-12-14 02:31:41.335 189 DEBUG tempest.lib.common.rest_client [req-fcc06eb3-889c-4c36-9d54-634ce3d68d9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-fcc06eb3-889c-4c36-9d54-634ce3d68d9d', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:31:41 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/418c6472-fcce-47bf-a348-9cc116b3c532'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:41.730 189 INFO tempest.lib.common.rest_client [req-1b74343c-0d0f-4fc9-b174-6baf4f9d5f59 ] Request (ServerTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/subnets/777d42cb-89b3-446b-950f-78f989e5c32a 0.389s 2020-12-14 02:31:41.732 189 DEBUG tempest.lib.common.rest_client [req-1b74343c-0d0f-4fc9-b174-6baf4f9d5f59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-1b74343c-0d0f-4fc9-b174-6baf4f9d5f59', 'date': 'Mon, 14 Dec 2020 02:31:41 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets/777d42cb-89b3-446b-950f-78f989e5c32a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:42.368 189 INFO tempest.lib.common.rest_client [req-ac12b7a0-16ec-41f2-9a45-fa022662197b ] Request (ServerTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/19fd3335-d8b4-41bf-b26b-ffa2210313cf 0.630s 2020-12-14 02:31:42.370 189 DEBUG tempest.lib.common.rest_client [req-ac12b7a0-16ec-41f2-9a45-fa022662197b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-ac12b7a0-16ec-41f2-9a45-fa022662197b', 'date': 'Mon, 14 Dec 2020 02:31:42 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/19fd3335-d8b4-41bf-b26b-ffa2210313cf'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:42.523 189 INFO tempest.lib.common.rest_client [req-6d25a32f-7e82-46ab-9744-d440be45897d ] Request (ServerTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/e358892b43f64a58a3b2f97b7ab7974f 0.147s 2020-12-14 02:31:42.526 189 DEBUG tempest.lib.common.rest_client [req-6d25a32f-7e82-46ab-9744-d440be45897d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d25a32f-7e82-46ab-9744-d440be45897d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/e358892b43f64a58a3b2f97b7ab7974f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:42.604 189 INFO tempest.lib.common.rest_client [req-5c4913a6-f5a4-4b9b-ad89-34436ace2135 ] Request (ServerTagsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=075affa4d4aa46c1bd86d1846426d0fe&name=default 0.071s 2020-12-14 02:31:42.607 189 DEBUG tempest.lib.common.rest_client [req-5c4913a6-f5a4-4b9b-ad89-34436ace2135 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-5c4913a6-f5a4-4b9b-ad89-34436ace2135', 'date': 'Mon, 14 Dec 2020 02:31:42 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=075affa4d4aa46c1bd86d1846426d0fe&name=default'} Body: b'{"security_groups": [{"id": "a83784ad-f83c-4cb3-8d26-e846eaf8f373", "name": "default", "stateful": true, "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "description": "Default security group", "security_group_rules": [{"id": "5b8ae34d-f4dd-4da0-b108-e92f89a1c8aa", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "security_group_id": "a83784ad-f83c-4cb3-8d26-e846eaf8f373", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:31:03Z", "updated_at": "2020-12-14T02:31:03Z", "revision_number": 0, "project_id": "075affa4d4aa46c1bd86d1846426d0fe"}, {"id": "c23e05c4-ee55-4c14-a91d-45a0c258ea62", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "security_group_id": "a83784ad-f83c-4cb3-8d26-e846eaf8f373", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:31:03Z", "updated_at": "2020-12-14T02:31:03Z", "revision_number": 0, "project_id": "075affa4d4aa46c1bd86d1846426d0fe"}, {"id": "cfe38fd8-086f-4333-8619-f412df902e6c", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "security_group_id": "a83784ad-f83c-4cb3-8d26-e846eaf8f373", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a83784ad-f83c-4cb3-8d26-e846eaf8f373", "description": null, "tags": [], "created_at": "2020-12-14T02:31:03Z", "updated_at": "2020-12-14T02:31:03Z", "revision_number": 0, "project_id": "075affa4d4aa46c1bd86d1846426d0fe"}, {"id": "f469b904-6251-4023-b3ff-8863a70243d7", "tenant_id": "075affa4d4aa46c1bd86d1846426d0fe", "security_group_id": "a83784ad-f83c-4cb3-8d26-e846eaf8f373", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a83784ad-f83c-4cb3-8d26-e846eaf8f373", "description": null, "tags": [], "created_at": "2020-12-14T02:31:03Z", "updated_at": "2020-12-14T02:31:03Z", "revision_number": 0, "project_id": "075affa4d4aa46c1bd86d1846426d0fe"}], "tags": [], "created_at": "2020-12-14T02:31:03Z", "updated_at": "2020-12-14T02:31:03Z", "revision_number": 1, "project_id": "075affa4d4aa46c1bd86d1846426d0fe"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:42.780 189 INFO tempest.lib.common.rest_client [req-bc393908-ab4d-4d77-992e-c472c28f1d43 ] Request (ServerTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/a83784ad-f83c-4cb3-8d26-e846eaf8f373 0.162s 2020-12-14 02:31:42.784 189 DEBUG tempest.lib.common.rest_client [req-bc393908-ab4d-4d77-992e-c472c28f1d43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-bc393908-ab4d-4d77-992e-c472c28f1d43', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:31:42 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/a83784ad-f83c-4cb3-8d26-e846eaf8f373'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:43.021 189 INFO tempest.lib.common.rest_client [req-c8ea2027-12ac-46e9-beb1-9033152276d5 ] Request (ServerTagsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe 0.230s 2020-12-14 02:31:43.024 189 DEBUG tempest.lib.common.rest_client [req-c8ea2027-12ac-46e9-beb1-9033152276d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8ea2027-12ac-46e9-beb1-9033152276d5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/075affa4d4aa46c1bd86d1846426d0fe'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:43.147 189 INFO tempest.lib.common.rest_client [req-c790ab62-a60f-4f29-9cd3-b026eae5fdc3 ] Request (ServicesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:31:43.150 189 DEBUG tempest.lib.common.rest_client [req-c790ab62-a60f-4f29-9cd3-b026eae5fdc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c790ab62-a60f-4f29-9cd3-b026eae5fdc3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["9r-c8QLyT7CDMbCWz8ON5A"], "expires_at": "2020-12-14T03:31:43.000000Z", "issued_at": "2020-12-14T02:31:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:43.261 189 INFO tempest.lib.common.rest_client [req-f9a1529f-23e9-46f7-a8c7-815903b44bc1 ] Request (ServicesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.059s 2020-12-14 02:31:43.264 189 DEBUG tempest.lib.common.rest_client [req-f9a1529f-23e9-46f7-a8c7-815903b44bc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9a1529f-23e9-46f7-a8c7-815903b44bc1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["bFSFyqCLTfaeS4SubX7VbQ"], "expires_at": "2020-12-14T03:31:43.000000Z", "issued_at": "2020-12-14T02:31:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:43.347 189 INFO tempest.lib.common.rest_client [req-1cdaa634-6b46-43b5-9800-b383ea631416 ] Request (ServicesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.073s 2020-12-14 02:31:43.350 189 DEBUG tempest.lib.common.rest_client [req-1cdaa634-6b46-43b5-9800-b383ea631416 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1cdaa634-6b46-43b5-9800-b383ea631416', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:43.430 189 INFO tempest.lib.common.rest_client [req-05a7293d-3f2c-4538-b760-92801b51fdf1 ] Request (ServicesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.073s 2020-12-14 02:31:43.431 189 DEBUG tempest.lib.common.rest_client [req-05a7293d-3f2c-4538-b760-92801b51fdf1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServicesRbacTest-1295103934-desc", "domain_id": "default", "name": "tempest-ServicesRbacTest-1295103934"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '370', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05a7293d-3f2c-4538-b760-92801b51fdf1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "a50cd5b87cbf439ea37347b7b7ba3cd8", "name": "tempest-ServicesRbacTest-1295103934", "domain_id": "default", "description": "tempest-ServicesRbacTest-1295103934-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:43.558 189 INFO tempest.lib.common.rest_client [req-2f005667-0ccd-45f1-a423-a3f96aaecd36 ] Request (ServicesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.120s 2020-12-14 02:31:43.561 189 DEBUG tempest.lib.common.rest_client [req-2f005667-0ccd-45f1-a423-a3f96aaecd36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServicesRbacTest-1295103934", "password": "C4!je^ov&LcR=f1", "project_id": "a50cd5b87cbf439ea37347b7b7ba3cd8", "email": "tempest-ServicesRbacTest-958943791@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '387', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f005667-0ccd-45f1-a423-a3f96aaecd36', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "a50cd5b87cbf439ea37347b7b7ba3cd8", "email": "tempest-ServicesRbacTest-958943791@example.com", "id": "34e98036cf0a4acdbbc4c44b3353cc8a", "name": "tempest-ServicesRbacTest-1295103934", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/34e98036cf0a4acdbbc4c44b3353cc8a"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:43.622 189 INFO tempest.lib.common.rest_client [req-cd952336-f78c-406d-9ba2-20e940e54831 ] Request (ServicesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-14 02:31:43.624 189 DEBUG tempest.lib.common.rest_client [req-cd952336-f78c-406d-9ba2-20e940e54831 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd952336-f78c-406d-9ba2-20e940e54831', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:43.681 189 INFO tempest.lib.common.rest_client [req-467c8f8b-2ac2-455c-b17b-ec3b3bb97a36 ] Request (ServicesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-12-14 02:31:43.682 189 DEBUG tempest.lib.common.rest_client [req-467c8f8b-2ac2-455c-b17b-ec3b3bb97a36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-467c8f8b-2ac2-455c-b17b-ec3b3bb97a36', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:43.748 189 INFO tempest.lib.common.rest_client [req-460dbe56-dc25-480e-9b7c-82a97ed69c4f ] Request (ServicesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8/users/34e98036cf0a4acdbbc4c44b3353cc8a/roles/72a4576c553448cd941b052c1ca0cf2d 0.060s 2020-12-14 02:31:43.751 189 DEBUG tempest.lib.common.rest_client [req-460dbe56-dc25-480e-9b7c-82a97ed69c4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-460dbe56-dc25-480e-9b7c-82a97ed69c4f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8/users/34e98036cf0a4acdbbc4c44b3353cc8a/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:43.754 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServicesRbacTest-1295103934', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a50cd5b87cbf439ea37347b7b7ba3cd8', 'project_name': 'tempest-ServicesRbacTest-1295103934', 'tenant_id': 'a50cd5b87cbf439ea37347b7b7ba3cd8', 'tenant_name': 'tempest-ServicesRbacTest-1295103934', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '34e98036cf0a4acdbbc4c44b3353cc8a'}, Network: None, Subnet: None, Router: None 2020-12-14 02:31:43.755 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServicesRbacTest-1295103934', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a50cd5b87cbf439ea37347b7b7ba3cd8', 'project_name': 'tempest-ServicesRbacTest-1295103934', 'tenant_id': 'a50cd5b87cbf439ea37347b7b7ba3cd8', 'tenant_name': 'tempest-ServicesRbacTest-1295103934', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '34e98036cf0a4acdbbc4c44b3353cc8a'}, Network: None, Subnet: None, Router: None 2020-12-14 02:31:43.906 189 INFO tempest.lib.common.rest_client [req-d62a65c0-3261-4266-96d4-7d52326bfc5e ] Request (ServicesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-12-14 02:31:43.908 189 DEBUG tempest.lib.common.rest_client [req-d62a65c0-3261-4266-96d4-7d52326bfc5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6563', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d62a65c0-3261-4266-96d4-7d52326bfc5e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "34e98036cf0a4acdbbc4c44b3353cc8a", "name": "tempest-ServicesRbacTest-1295103934", "password_expires_at": null}, "audit_ids": ["bEKdhK2xRDGHdYjigKh7yg"], "expires_at": "2020-12-14T03:31:43.000000Z", "issued_at": "2020-12-14T02:31:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a50cd5b87cbf439ea37347b7b7ba3cd8", "name": "tempest-ServicesRbacTest-1295103934"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:44.006 189 INFO tempest.lib.common.rest_client [req-0520ae83-3e22-4fa9-9690-a36d76f23342 ] Request (ServicesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:31:44.010 189 DEBUG tempest.lib.common.rest_client [req-0520ae83-3e22-4fa9-9690-a36d76f23342 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0520ae83-3e22-4fa9-9690-a36d76f23342', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["zrtAWQ9NQW-HdCsTvI_Smw"], "expires_at": "2020-12-14T03:31:43.000000Z", "issued_at": "2020-12-14T02:31:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:44.112 189 INFO tempest.lib.common.rest_client [req-038014ab-ab02-43a5-9f2b-0d211f83b4f7 ] Request (ServicesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:31:44.114 189 DEBUG tempest.lib.common.rest_client [req-038014ab-ab02-43a5-9f2b-0d211f83b4f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-038014ab-ab02-43a5-9f2b-0d211f83b4f7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["saSkpwpZQri-gfntqbl9pQ"], "expires_at": "2020-12-14T03:31:44.000000Z", "issued_at": "2020-12-14T02:31:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:44.178 189 INFO tempest.lib.common.rest_client [req-de700602-19dd-4ea5-9dbc-b8126a3877f0 ] Request (ServicesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.057s 2020-12-14 02:31:44.181 189 DEBUG tempest.lib.common.rest_client [req-de700602-19dd-4ea5-9dbc-b8126a3877f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de700602-19dd-4ea5-9dbc-b8126a3877f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:44.246 189 INFO tempest.lib.common.rest_client [req-1c1a69ec-4292-4b27-9fab-ff84c62778fd ] Request (ServicesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:31:44.248 189 DEBUG tempest.lib.common.rest_client [req-1c1a69ec-4292-4b27-9fab-ff84c62778fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c1a69ec-4292-4b27-9fab-ff84c62778fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:44.251 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:31:44.253 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:44.321 189 INFO tempest.lib.common.rest_client [req-0160be71-9004-4a91-b1b7-e386862e3676 ] Request (ServicesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8/users/34e98036cf0a4acdbbc4c44b3353cc8a/roles 0.062s 2020-12-14 02:31:44.323 189 DEBUG tempest.lib.common.rest_client [req-0160be71-9004-4a91-b1b7-e386862e3676 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0160be71-9004-4a91-b1b7-e386862e3676', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8/users/34e98036cf0a4acdbbc4c44b3353cc8a/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8/users/34e98036cf0a4acdbbc4c44b3353cc8a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:44.406 189 INFO tempest.lib.common.rest_client [req-4ba9d612-6b64-40a8-bbec-8f5669a3571b ] Request (ServicesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8/users/34e98036cf0a4acdbbc4c44b3353cc8a/roles/72a4576c553448cd941b052c1ca0cf2d 0.076s 2020-12-14 02:31:44.409 189 DEBUG tempest.lib.common.rest_client [req-4ba9d612-6b64-40a8-bbec-8f5669a3571b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ba9d612-6b64-40a8-bbec-8f5669a3571b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8/users/34e98036cf0a4acdbbc4c44b3353cc8a/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:44.534 189 INFO tempest.lib.common.rest_client [req-11343f13-4417-40f2-aa6d-669f3f291dc0 ] Request (ServicesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8/users/34e98036cf0a4acdbbc4c44b3353cc8a/roles/a629c95d64b3416fb80ae90af4f69c05 0.118s 2020-12-14 02:31:44.536 189 DEBUG tempest.lib.common.rest_client [req-11343f13-4417-40f2-aa6d-669f3f291dc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-11343f13-4417-40f2-aa6d-669f3f291dc0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8/users/34e98036cf0a4acdbbc4c44b3353cc8a/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:45.650 189 INFO tempest.lib.common.rest_client [req-504bbe96-136c-40ae-86a5-4399865d0151 ] Request (ServicesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-12-14 02:31:45.653 189 DEBUG tempest.lib.common.rest_client [req-504bbe96-136c-40ae-86a5-4399865d0151 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-504bbe96-136c-40ae-86a5-4399865d0151', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "34e98036cf0a4acdbbc4c44b3353cc8a", "name": "tempest-ServicesRbacTest-1295103934", "password_expires_at": null}, "audit_ids": ["OQ8rhta8ST2BqtnNOPkvlw"], "expires_at": "2020-12-14T03:31:45.000000Z", "issued_at": "2020-12-14T02:31:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a50cd5b87cbf439ea37347b7b7ba3cd8", "name": "tempest-ServicesRbacTest-1295103934"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:45.671 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:31:45.676 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.680 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.683 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.687 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.691 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.695 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.700 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.703 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.706 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.709 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.712 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.714 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.717 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.720 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.723 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.727 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.730 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.732 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.735 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.738 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.741 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.744 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.747 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.749 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.752 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.755 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.758 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.761 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.764 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.766 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.769 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.772 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.775 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.778 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.780 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.783 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.786 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.789 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.793 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.796 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.799 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.802 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.804 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.808 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.811 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.814 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.817 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.820 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.823 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.825 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.828 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.831 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.834 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.837 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.841 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.843 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.848 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.851 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.853 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.855 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.858 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.860 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.862 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.864 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.866 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.868 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.871 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.873 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.875 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.877 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.879 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:45.888 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-services:list, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:31:45.890 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:46.011 189 INFO tempest.lib.common.rest_client [req-3e812fb0-bbd8-42a2-8e70-36e8a76e178c ] Request (ServicesRbacTest:test_list_services): 200 GET http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8/users/34e98036cf0a4acdbbc4c44b3353cc8a/roles 0.115s 2020-12-14 02:31:46.015 189 DEBUG tempest.lib.common.rest_client [req-3e812fb0-bbd8-42a2-8e70-36e8a76e178c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3e812fb0-bbd8-42a2-8e70-36e8a76e178c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8/users/34e98036cf0a4acdbbc4c44b3353cc8a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8/users/34e98036cf0a4acdbbc4c44b3353cc8a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:46.076 189 INFO tempest.lib.common.rest_client [req-da64dd28-05e9-463a-9d7d-6cf344a68432 ] Request (ServicesRbacTest:test_list_services): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:31:46.080 189 DEBUG tempest.lib.common.rest_client [req-da64dd28-05e9-463a-9d7d-6cf344a68432 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da64dd28-05e9-463a-9d7d-6cf344a68432', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "34e98036cf0a4acdbbc4c44b3353cc8a", "name": "tempest-ServicesRbacTest-1295103934", "password_expires_at": null}, "audit_ids": ["ugvSjXbQQoKmd-PAvrxLeg"], "expires_at": "2020-12-14T03:31:46.000000Z", "issued_at": "2020-12-14T02:31:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a50cd5b87cbf439ea37347b7b7ba3cd8", "name": "tempest-ServicesRbacTest-1295103934"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:46.346 189 INFO tempest.lib.common.rest_client [req-63d247c3-3a6e-4ff5-84d5-9a976adb3aee ] Request (ServicesRbacTest:test_list_services): 200 GET http://172.30.13.94/compute/v2.1/os-services 0.258s 2020-12-14 02:31:46.348 189 DEBUG tempest.lib.common.rest_client [req-63d247c3-3a6e-4ff5-84d5-9a976adb3aee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '937', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-63d247c3-3a6e-4ff5-84d5-9a976adb3aee', 'x-compute-request-id': 'req-63d247c3-3a6e-4ff5-84d5-9a976adb3aee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-services'} Body: b'{"services": [{"binary": "nova-scheduler", "host": "lf-virtual9", "id": 2, "zone": "internal", "status": "enabled", "state": "up", "updated_at": "2020-12-14T02:31:38.000000", "disabled_reason": null}, {"binary": "nova-conductor", "host": "lf-virtual9", "id": 9, "zone": "internal", "status": "enabled", "state": "up", "updated_at": "2020-12-14T02:31:45.000000", "disabled_reason": null}, {"binary": "nova-conductor", "host": "lf-virtual9", "id": 1, "zone": "internal", "status": "enabled", "state": "up", "updated_at": "2020-12-14T02:31:39.000000", "disabled_reason": null}, {"binary": "nova-compute", "host": "lf-virtual9", "id": 2, "zone": "nova", "status": "enabled", "state": "up", "updated_at": "2020-12-14T02:31:40.000000", "disabled_reason": null}, {"binary": "nova-compute", "host": "lf-virtual8", "id": 3, "zone": "nova", "status": "enabled", "state": "up", "updated_at": "2020-12-14T02:31:46.000000", "disabled_reason": null}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:46.379 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:46.450 189 INFO tempest.lib.common.rest_client [req-b42775ad-8bf0-471a-8de7-ce5ebbf2f62e ] Request (ServicesRbacTest:test_list_services): 200 GET http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8/users/34e98036cf0a4acdbbc4c44b3353cc8a/roles 0.066s 2020-12-14 02:31:46.452 189 DEBUG tempest.lib.common.rest_client [req-b42775ad-8bf0-471a-8de7-ce5ebbf2f62e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b42775ad-8bf0-471a-8de7-ce5ebbf2f62e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8/users/34e98036cf0a4acdbbc4c44b3353cc8a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8/users/34e98036cf0a4acdbbc4c44b3353cc8a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:46.501 189 INFO tempest.lib.common.rest_client [req-6fd12f66-5d41-4e9d-b32c-4d77a901c10f ] Request (ServicesRbacTest:test_list_services): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:31:46.504 189 DEBUG tempest.lib.common.rest_client [req-6fd12f66-5d41-4e9d-b32c-4d77a901c10f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6fd12f66-5d41-4e9d-b32c-4d77a901c10f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "34e98036cf0a4acdbbc4c44b3353cc8a", "name": "tempest-ServicesRbacTest-1295103934", "password_expires_at": null}, "audit_ids": ["W8GVnur-TnmtUH_FHNyQUQ"], "expires_at": "2020-12-14T03:31:46.000000Z", "issued_at": "2020-12-14T02:31:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a50cd5b87cbf439ea37347b7b7ba3cd8", "name": "tempest-ServicesRbacTest-1295103934"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a50cd5b87cbf439ea37347b7b7ba3cd8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:46.692 189 INFO tempest.lib.common.rest_client [req-28aa928a-cd3f-4831-bd83-069b033eac37 ] Request (ServicesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/34e98036cf0a4acdbbc4c44b3353cc8a 0.159s 2020-12-14 02:31:46.696 189 DEBUG tempest.lib.common.rest_client [req-28aa928a-cd3f-4831-bd83-069b033eac37 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28aa928a-cd3f-4831-bd83-069b033eac37', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/34e98036cf0a4acdbbc4c44b3353cc8a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:46.811 189 INFO tempest.lib.common.rest_client [req-c3f6ad75-b609-45d9-a5f1-2b7d48f22e63 ] Request (ServicesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-12-14 02:31:46.814 189 DEBUG tempest.lib.common.rest_client [req-c3f6ad75-b609-45d9-a5f1-2b7d48f22e63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c3f6ad75-b609-45d9-a5f1-2b7d48f22e63', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["vl8WdrzGQMalVUlwhEKH1Q"], "expires_at": "2020-12-14T03:31:46.000000Z", "issued_at": "2020-12-14T02:31:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:47.135 189 INFO tempest.lib.common.rest_client [req-3c1fca18-a080-4824-877c-5d026520f415 ] Request (ServicesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a50cd5b87cbf439ea37347b7b7ba3cd8&name=default 0.314s 2020-12-14 02:31:47.137 189 DEBUG tempest.lib.common.rest_client [req-3c1fca18-a080-4824-877c-5d026520f415 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-3c1fca18-a080-4824-877c-5d026520f415', 'date': 'Mon, 14 Dec 2020 02:31:47 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a50cd5b87cbf439ea37347b7b7ba3cd8&name=default'} Body: b'{"security_groups": [{"id": "095f784a-d5bc-45c9-a4e1-7d4c2a36dc45", "name": "default", "stateful": true, "tenant_id": "a50cd5b87cbf439ea37347b7b7ba3cd8", "description": "Default security group", "security_group_rules": [{"id": "0b1e46fd-0026-44d9-a288-69f8c8113610", "tenant_id": "a50cd5b87cbf439ea37347b7b7ba3cd8", "security_group_id": "095f784a-d5bc-45c9-a4e1-7d4c2a36dc45", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:31:47Z", "updated_at": "2020-12-14T02:31:47Z", "revision_number": 0, "project_id": "a50cd5b87cbf439ea37347b7b7ba3cd8"}, {"id": "14b099b3-15cf-46c0-adab-2a45fef9456d", "tenant_id": "a50cd5b87cbf439ea37347b7b7ba3cd8", "security_group_id": "095f784a-d5bc-45c9-a4e1-7d4c2a36dc45", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "095f784a-d5bc-45c9-a4e1-7d4c2a36dc45", "description": null, "tags": [], "created_at": "2020-12-14T02:31:47Z", "updated_at": "2020-12-14T02:31:47Z", "revision_number": 0, "project_id": "a50cd5b87cbf439ea37347b7b7ba3cd8"}, {"id": "4c4d6790-6f98-4bbe-a1ac-a1a606babe07", "tenant_id": "a50cd5b87cbf439ea37347b7b7ba3cd8", "security_group_id": "095f784a-d5bc-45c9-a4e1-7d4c2a36dc45", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:31:47Z", "updated_at": "2020-12-14T02:31:47Z", "revision_number": 0, "project_id": "a50cd5b87cbf439ea37347b7b7ba3cd8"}, {"id": "51a7490c-ed33-4459-a482-26368e0e1f03", "tenant_id": "a50cd5b87cbf439ea37347b7b7ba3cd8", "security_group_id": "095f784a-d5bc-45c9-a4e1-7d4c2a36dc45", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "095f784a-d5bc-45c9-a4e1-7d4c2a36dc45", "description": null, "tags": [], "created_at": "2020-12-14T02:31:47Z", "updated_at": "2020-12-14T02:31:47Z", "revision_number": 0, "project_id": "a50cd5b87cbf439ea37347b7b7ba3cd8"}], "tags": [], "created_at": "2020-12-14T02:31:47Z", "updated_at": "2020-12-14T02:31:47Z", "revision_number": 1, "project_id": "a50cd5b87cbf439ea37347b7b7ba3cd8"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:47.478 189 INFO tempest.lib.common.rest_client [req-aaf11d27-2213-497c-b842-7a7fdd14f511 ] Request (ServicesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/095f784a-d5bc-45c9-a4e1-7d4c2a36dc45 0.333s 2020-12-14 02:31:47.481 189 DEBUG tempest.lib.common.rest_client [req-aaf11d27-2213-497c-b842-7a7fdd14f511 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-aaf11d27-2213-497c-b842-7a7fdd14f511', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:31:47 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/095f784a-d5bc-45c9-a4e1-7d4c2a36dc45'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:47.648 189 INFO tempest.lib.common.rest_client [req-1392c21d-e704-44f6-9f83-5f9b1ae798cd ] Request (ServicesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8 0.160s 2020-12-14 02:31:47.652 189 DEBUG tempest.lib.common.rest_client [req-1392c21d-e704-44f6-9f83-5f9b1ae798cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1392c21d-e704-44f6-9f83-5f9b1ae798cd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a50cd5b87cbf439ea37347b7b7ba3cd8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:47.776 189 INFO tempest.lib.common.rest_client [req-1e6ebe1e-0b22-4488-ba6c-8cc4f27f5fa8 ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-14 02:31:47.779 189 DEBUG tempest.lib.common.rest_client [req-1e6ebe1e-0b22-4488-ba6c-8cc4f27f5fa8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e6ebe1e-0b22-4488-ba6c-8cc4f27f5fa8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["cWct-dnnQ0-diTb0oUOY8Q"], "expires_at": "2020-12-14T03:31:47.000000Z", "issued_at": "2020-12-14T02:31:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:47.866 189 INFO tempest.lib.common.rest_client [req-eda7da02-97ca-4bbd-beee-753cd112c6a2 ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:31:47.868 189 DEBUG tempest.lib.common.rest_client [req-eda7da02-97ca-4bbd-beee-753cd112c6a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eda7da02-97ca-4bbd-beee-753cd112c6a2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["O1B8QnVkS0OoT_4hd_UZyg"], "expires_at": "2020-12-14T03:31:47.000000Z", "issued_at": "2020-12-14T02:31:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:47.936 189 INFO tempest.lib.common.rest_client [req-202e245c-4ce4-4448-9cb2-9d2f2ee4779e ] Request (TenantNetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.060s 2020-12-14 02:31:47.938 189 DEBUG tempest.lib.common.rest_client [req-202e245c-4ce4-4448-9cb2-9d2f2ee4779e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-202e245c-4ce4-4448-9cb2-9d2f2ee4779e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:48.013 189 INFO tempest.lib.common.rest_client [req-4ff47bf8-0ab5-4a48-9155-1e57d029148e ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.067s 2020-12-14 02:31:48.015 189 DEBUG tempest.lib.common.rest_client [req-4ff47bf8-0ab5-4a48-9155-1e57d029148e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-TenantNetworksRbacTest-322667352-desc", "domain_id": "default", "name": "tempest-TenantNetworksRbacTest-322667352"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ff47bf8-0ab5-4a48-9155-1e57d029148e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "e188ecac9016447cb2631ed8a177f7ca", "name": "tempest-TenantNetworksRbacTest-322667352", "domain_id": "default", "description": "tempest-TenantNetworksRbacTest-322667352-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:48.137 189 INFO tempest.lib.common.rest_client [req-2b12a49a-91ee-4d1d-a935-54fda7bfdbb9 ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.114s 2020-12-14 02:31:48.139 189 DEBUG tempest.lib.common.rest_client [req-2b12a49a-91ee-4d1d-a935-54fda7bfdbb9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-TenantNetworksRbacTest-322667352", "password": "X5+*ZO64QyRQj5&", "project_id": "e188ecac9016447cb2631ed8a177f7ca", "email": "tempest-TenantNetworksRbacTest-1828286043@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '399', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b12a49a-91ee-4d1d-a935-54fda7bfdbb9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "e188ecac9016447cb2631ed8a177f7ca", "email": "tempest-TenantNetworksRbacTest-1828286043@example.com", "id": "d859418ca87c4f31be7a9603d188832f", "name": "tempest-TenantNetworksRbacTest-322667352", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/d859418ca87c4f31be7a9603d188832f"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:48.210 189 INFO tempest.lib.common.rest_client [req-62acbb15-3867-4503-9ac0-e52aa6874aac ] Request (TenantNetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.064s 2020-12-14 02:31:48.213 189 DEBUG tempest.lib.common.rest_client [req-62acbb15-3867-4503-9ac0-e52aa6874aac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-62acbb15-3867-4503-9ac0-e52aa6874aac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:48.280 189 INFO tempest.lib.common.rest_client [req-1300f24b-0a11-4472-957f-96af19b0daa8 ] Request (TenantNetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:31:48.282 189 DEBUG tempest.lib.common.rest_client [req-1300f24b-0a11-4472-957f-96af19b0daa8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1300f24b-0a11-4472-957f-96af19b0daa8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:48.362 189 INFO tempest.lib.common.rest_client [req-8e8f1ab0-e514-465d-9b9b-4b9f68de4b66 ] Request (TenantNetworksRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca/users/d859418ca87c4f31be7a9603d188832f/roles/72a4576c553448cd941b052c1ca0cf2d 0.072s 2020-12-14 02:31:48.364 189 DEBUG tempest.lib.common.rest_client [req-8e8f1ab0-e514-465d-9b9b-4b9f68de4b66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e8f1ab0-e514-465d-9b9b-4b9f68de4b66', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca/users/d859418ca87c4f31be7a9603d188832f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:48.367 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-TenantNetworksRbacTest-322667352', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e188ecac9016447cb2631ed8a177f7ca', 'project_name': 'tempest-TenantNetworksRbacTest-322667352', 'tenant_id': 'e188ecac9016447cb2631ed8a177f7ca', 'tenant_name': 'tempest-TenantNetworksRbacTest-322667352', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd859418ca87c4f31be7a9603d188832f'}, Network: None, Subnet: None, Router: None 2020-12-14 02:31:48.462 189 INFO tempest.lib.common.rest_client [req-057bb886-b57a-4c44-807c-9a9a1458565e ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-14 02:31:48.464 189 DEBUG tempest.lib.common.rest_client [req-057bb886-b57a-4c44-807c-9a9a1458565e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-057bb886-b57a-4c44-807c-9a9a1458565e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["yzxusfb6QcSygHbL9lG9hg"], "expires_at": "2020-12-14T03:31:48.000000Z", "issued_at": "2020-12-14T02:31:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:49.087 189 INFO tempest.lib.common.rest_client [req-07ba27e1-ed45-4dd8-915f-6aaf019551a6 ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.615s 2020-12-14 02:31:49.091 189 DEBUG tempest.lib.common.rest_client [req-07ba27e1-ed45-4dd8-915f-6aaf019551a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-TenantNetworksRbacTest-1655235911-network", "tenant_id": "e188ecac9016447cb2631ed8a177f7ca"}} Response - Headers: {'content-type': 'application/json', 'content-length': '738', 'x-openstack-request-id': 'req-07ba27e1-ed45-4dd8-915f-6aaf019551a6', 'date': 'Mon, 14 Dec 2020 02:31:49 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"6704d7e5-d458-4097-b35b-d43a89e1968b","name":"tempest-TenantNetworksRbacTest-1655235911-network","tenant_id":"e188ecac9016447cb2631ed8a177f7ca","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"e188ecac9016447cb2631ed8a177f7ca","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":53,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:31:48Z","updated_at":"2020-12-14T02:31:48Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:49.094 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-TenantNetworksRbacTest-322667352', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'e188ecac9016447cb2631ed8a177f7ca', 'project_name': 'tempest-TenantNetworksRbacTest-322667352', 'tenant_id': 'e188ecac9016447cb2631ed8a177f7ca', 'tenant_name': 'tempest-TenantNetworksRbacTest-322667352', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd859418ca87c4f31be7a9603d188832f'}, Network: {'id': '6704d7e5-d458-4097-b35b-d43a89e1968b', 'name': 'tempest-TenantNetworksRbacTest-1655235911-network', 'tenant_id': 'e188ecac9016447cb2631ed8a177f7ca', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'e188ecac9016447cb2631ed8a177f7ca', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:31:48Z', 'updated_at': '2020-12-14T02:31:48Z', 'revision_number': 1}, Subnet: None, Router: None 2020-12-14 02:31:49.252 189 INFO tempest.lib.common.rest_client [req-b770016d-d7b8-42d3-9c60-b8bfd0d08245 ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-12-14 02:31:49.255 189 DEBUG tempest.lib.common.rest_client [req-b770016d-d7b8-42d3-9c60-b8bfd0d08245 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6573', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b770016d-d7b8-42d3-9c60-b8bfd0d08245', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d859418ca87c4f31be7a9603d188832f", "name": "tempest-TenantNetworksRbacTest-322667352", "password_expires_at": null}, "audit_ids": ["llS-96o1R7KUFa5OPpm8EQ"], "expires_at": "2020-12-14T03:31:49.000000Z", "issued_at": "2020-12-14T02:31:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e188ecac9016447cb2631ed8a177f7ca", "name": "tempest-TenantNetworksRbacTest-322667352"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://1 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:49.309 189 INFO tempest.lib.common.rest_client [req-be03f978-a0a4-44ca-8ca7-6d322edc97b8 ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:31:49.313 189 DEBUG tempest.lib.common.rest_client [req-be03f978-a0a4-44ca-8ca7-6d322edc97b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be03f978-a0a4-44ca-8ca7-6d322edc97b8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["XW-wIFNiRQ21z_cWpjM9Xg"], "expires_at": "2020-12-14T03:31:49.000000Z", "issued_at": "2020-12-14T02:31:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:49.411 189 INFO tempest.lib.common.rest_client [req-81599fa0-726f-4f18-9e50-38ea3481e673 ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:31:49.413 189 DEBUG tempest.lib.common.rest_client [req-81599fa0-726f-4f18-9e50-38ea3481e673 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81599fa0-726f-4f18-9e50-38ea3481e673', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ajdSmUvrSGy2UCFNpLL0lQ"], "expires_at": "2020-12-14T03:31:49.000000Z", "issued_at": "2020-12-14T02:31:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:49.478 189 INFO tempest.lib.common.rest_client [req-baa7742c-f68c-42b9-8e45-cce4b588866a ] Request (TenantNetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.059s 2020-12-14 02:31:49.480 189 DEBUG tempest.lib.common.rest_client [req-baa7742c-f68c-42b9-8e45-cce4b588866a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-baa7742c-f68c-42b9-8e45-cce4b588866a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:49.550 189 INFO tempest.lib.common.rest_client [req-74a78b48-73e6-4e0c-bfc0-877bc842a5b3 ] Request (TenantNetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.061s 2020-12-14 02:31:49.553 189 DEBUG tempest.lib.common.rest_client [req-74a78b48-73e6-4e0c-bfc0-877bc842a5b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74a78b48-73e6-4e0c-bfc0-877bc842a5b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:49.555 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:31:49.557 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:49.617 189 INFO tempest.lib.common.rest_client [req-6a66394e-aa2a-4f5f-b19f-4e015fd4c3e6 ] Request (TenantNetworksRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca/users/d859418ca87c4f31be7a9603d188832f/roles 0.056s 2020-12-14 02:31:49.619 189 DEBUG tempest.lib.common.rest_client [req-6a66394e-aa2a-4f5f-b19f-4e015fd4c3e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a66394e-aa2a-4f5f-b19f-4e015fd4c3e6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca/users/d859418ca87c4f31be7a9603d188832f/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca/users/d859418ca87c4f31be7a9603d188832f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:49.694 189 INFO tempest.lib.common.rest_client [req-6d7cd9d1-d6f6-40b7-befd-40644fd9f017 ] Request (TenantNetworksRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca/users/d859418ca87c4f31be7a9603d188832f/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-12-14 02:31:49.697 189 DEBUG tempest.lib.common.rest_client [req-6d7cd9d1-d6f6-40b7-befd-40644fd9f017 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d7cd9d1-d6f6-40b7-befd-40644fd9f017', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca/users/d859418ca87c4f31be7a9603d188832f/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:49.818 189 INFO tempest.lib.common.rest_client [req-2f601b0f-2bce-43f8-a6ff-a9ebd6e56269 ] Request (TenantNetworksRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca/users/d859418ca87c4f31be7a9603d188832f/roles/a629c95d64b3416fb80ae90af4f69c05 0.114s 2020-12-14 02:31:49.821 189 DEBUG tempest.lib.common.rest_client [req-2f601b0f-2bce-43f8-a6ff-a9ebd6e56269 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f601b0f-2bce-43f8-a6ff-a9ebd6e56269', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca/users/d859418ca87c4f31be7a9603d188832f/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:50.943 189 INFO tempest.lib.common.rest_client [req-5715a075-d5aa-43d8-b183-d644a99673dc ] Request (TenantNetworksRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.113s 2020-12-14 02:31:50.946 189 DEBUG tempest.lib.common.rest_client [req-5715a075-d5aa-43d8-b183-d644a99673dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5715a075-d5aa-43d8-b183-d644a99673dc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d859418ca87c4f31be7a9603d188832f", "name": "tempest-TenantNetworksRbacTest-322667352", "password_expires_at": null}, "audit_ids": ["ZxUoTnC3QjuxdUJbJUuwNw"], "expires_at": "2020-12-14T03:31:50.000000Z", "issued_at": "2020-12-14T02:31:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e188ecac9016447cb2631ed8a177f7ca", "name": "tempest-TenantNetworksRbacTest-322667352"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:50.958 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:31:50.963 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:50.967 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:50.970 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:50.973 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:50.977 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:50.981 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:50.985 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:50.988 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:50.991 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:50.993 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:50.996 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:50.999 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.002 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.005 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.008 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.011 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.014 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.017 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.019 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.022 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.025 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.027 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.030 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.033 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.036 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.038 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.041 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.044 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.046 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.049 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.052 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.054 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.057 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.060 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.063 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.065 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.068 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.071 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.074 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.077 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.080 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.083 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.085 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.089 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.092 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.094 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.096 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.098 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.100 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.102 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.104 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.106 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.108 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.110 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.112 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.114 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.118 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.120 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.123 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.126 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.128 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.130 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.132 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.134 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.136 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.138 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.140 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.142 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.144 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.145 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.147 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:51.156 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-tenant-networks:list, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:31:51.157 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:51.290 189 INFO tempest.lib.common.rest_client [req-5e742024-4265-42c0-b8d9-cf914c9eabf0 ] Request (TenantNetworksRbacTest:test_list_show_tenant_networks): 200 GET http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca/users/d859418ca87c4f31be7a9603d188832f/roles 0.127s 2020-12-14 02:31:51.296 189 DEBUG tempest.lib.common.rest_client [req-5e742024-4265-42c0-b8d9-cf914c9eabf0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e742024-4265-42c0-b8d9-cf914c9eabf0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca/users/d859418ca87c4f31be7a9603d188832f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca/users/d859418ca87c4f31be7a9603d188832f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:51.349 189 INFO tempest.lib.common.rest_client [req-c7731039-e459-4d25-ac77-18f6050ddde0 ] Request (TenantNetworksRbacTest:test_list_show_tenant_networks): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:31:51.351 189 DEBUG tempest.lib.common.rest_client [req-c7731039-e459-4d25-ac77-18f6050ddde0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7731039-e459-4d25-ac77-18f6050ddde0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d859418ca87c4f31be7a9603d188832f", "name": "tempest-TenantNetworksRbacTest-322667352", "password_expires_at": null}, "audit_ids": ["x_K-XIfhT2K8dyZ6iLAu8A"], "expires_at": "2020-12-14T03:31:51.000000Z", "issued_at": "2020-12-14T02:31:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e188ecac9016447cb2631ed8a177f7ca", "name": "tempest-TenantNetworksRbacTest-322667352"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:51.793 189 INFO tempest.lib.common.rest_client [req-391e3a4b-c03f-4b5e-b840-68835ae35027 ] Request (TenantNetworksRbacTest:test_list_show_tenant_networks): 200 GET http://172.30.13.94/compute/v2.1/os-tenant-networks 0.433s 2020-12-14 02:31:51.797 189 DEBUG tempest.lib.common.rest_client [req-391e3a4b-c03f-4b5e-b840-68835ae35027 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '7878', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-391e3a4b-c03f-4b5e-b840-68835ae35027', 'x-compute-request-id': 'req-391e3a4b-c03f-4b5e-b840-68835ae35027', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-tenant-networks'} Body: b'{"networks": [{"id": "0271f828-506d-471c-80e1-655c753a8b19", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-190587910-network"}, {"id": "063503db-115b-4919-a9a6-1f3519d69592", "cidr": "None", "label": "tempest-test-network--1200798417"}, {"id": "09616387-dfe6-4d1f-9c5a-0be30adf60e8", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1784355696-network"}, {"id": "0d133d7f-cfa3-406c-bf2e-9e2becbbe589", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1880416163-network"}, {"id": "11e7deb5-beae-4249-9f34-285ba605afd2", "cidr": "None", "label": "patrole_reader-net_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, {"id": "124e719e-8437-47a4-973c-977c7c572a7d", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1295474568-network"}, {"id": "1349c40f-b4d6-4ba8-bebb-b7551d1c2049", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1164513363-network"}, {"id": "1c02029e-3385-4b0f-8ea8-64f5a5e9c878", "cidr": "None", "label": "private"}, {"id": "1ca8edaf-7493-44c9-ad42-6a23fe16ce6e", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1843014320-network"}, {"id": "2667161c-7e50-4cea-b3b6-a347ff14696e", "cidr": "None", "label": "tempest-test-network--55543034"}, {"id": "2e850320-7833-47c7-a469-1064f6b1ed25", "cidr": "None", "label": "tempest-RoutersIpV6AdminTest-1081145424"}, {"id": "317a1ea1-43dc-4ea6-9136-f9f7abf3b618", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-921642971-network"}, {"id": "3482a5cb-be2c-4498-bb86-24132e1bbf43", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1360362954-network"}, {"id": "35367aaf-d910-4553-9acb-6bca561bb20c", "cidr": "None", "label": "tempest_slow-net_85214e35-2aab-4294-9a48-45b27036dd9f"}, {"id": "36bd4af3-8d61-4b12-b1f1-1225e32357f7", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-494650061-network"}, {"id": "3f107d72-2ad3-4bbe-8446-b876d424f6f2", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-845893616-network"}, {"id": "3fe4fc32-89a3-4f72-b166-6eb7100e1fea", "cidr": "None", "label": "public"}, {"id": "3ffd6d5b-6f3d-45dc-882b-fc5a5fee4462", "cidr": "None", "label": "shared"}, {"id": "46ca4eb6-e2ab-422a-81e5-7048fed04ab4", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-340080645-network"}, {"id": "47b274e8-f112-47e2-8441-f4e56fd4222b", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1594897412-network"}, {"id": "4942f019-a5e4-4990-a446-65d9c8bd85cf", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1106266480-network"}, {"id": "49f03e9a-2350-4cd2-a7d5-7d339edabedc", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1596908108-network"}, {"id": "4a71cce6-2ba2-449c-a71a-3870f3432be4", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-759270033-network"}, {"id": "4d0aad37-728e-4816-8a61-b141b5e369b2", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-159602780-network"}, {"id": "514d46da-b6fe-4b35-b2a4-dac33c21c7c4", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1209327994-network"}, {"id": "58d4b91f-7c91-47db-a107-dc36c3ef2ae0", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-196172978-network"}, {"id": "59e40330-4bd6-41ce-af96-2bf0caf4d293", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1445858449-network"}, {"id": "5d711d74-9717-4d0e-b1e1-cb99a9c56726", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1195775949-network"}, {"id": "5e37b9a6-feb5-486c-bd34-d2ec2bb30e0e", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-1034929783-network"}, {"id": "6704d7e5-d458-4097-b35b-d43a89e1968b", "cidr": "None", "label": "tempest-TenantNetworksRbacTest-1655235911-network"}, {"id": "7779c170-dcd9-41f4-80e2-9ffaf6338e38", "cidr": "None", "label": "tempest_barbican-net_e10a41e8-cb84-4155-820f-5657fdb8b298"}, {"id": "7a97169b-2fcc-4e08-89c4-33959bbfed7a", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-2131228697-network"}, {"id": "7b0332b8-42bd-4dec-b8aa-c5850d8f58a9", "cidr": "None", "label": "tempest-MultipleCreateTestJSON-377036126-network"}, {"id": "7b3691d8-070d-462a-8a09-31d1b9489ae5", "cidr": "None", "label": "tempest-test-n _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:51.878 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:51.952 189 INFO tempest.lib.common.rest_client [req-b0e2b619-41fd-4874-822f-b2f759e258c2 ] Request (TenantNetworksRbacTest:test_list_show_tenant_networks): 200 GET http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca/users/d859418ca87c4f31be7a9603d188832f/roles 0.067s 2020-12-14 02:31:51.955 189 DEBUG tempest.lib.common.rest_client [req-b0e2b619-41fd-4874-822f-b2f759e258c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b0e2b619-41fd-4874-822f-b2f759e258c2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca/users/d859418ca87c4f31be7a9603d188832f/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca/users/d859418ca87c4f31be7a9603d188832f/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:52.005 189 INFO tempest.lib.common.rest_client [req-60bbc8f5-90e2-4ebf-b54c-3a167f09fa63 ] Request (TenantNetworksRbacTest:test_list_show_tenant_networks): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:31:52.008 189 DEBUG tempest.lib.common.rest_client [req-60bbc8f5-90e2-4ebf-b54c-3a167f09fa63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60bbc8f5-90e2-4ebf-b54c-3a167f09fa63', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d859418ca87c4f31be7a9603d188832f", "name": "tempest-TenantNetworksRbacTest-322667352", "password_expires_at": null}, "audit_ids": ["BbwBUypTSUGqyiWaSZycLA"], "expires_at": "2020-12-14T03:31:51.000000Z", "issued_at": "2020-12-14T02:31:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "e188ecac9016447cb2631ed8a177f7ca", "name": "tempest-TenantNetworksRbacTest-322667352"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_e188ecac9016447cb2631ed8a177f7ca", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:52.058 189 DEBUG tempest.lib.common.dynamic_creds [-] Clearing network: {'id': '6704d7e5-d458-4097-b35b-d43a89e1968b', 'name': 'tempest-TenantNetworksRbacTest-1655235911-network', 'tenant_id': 'e188ecac9016447cb2631ed8a177f7ca', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': 'e188ecac9016447cb2631ed8a177f7ca', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 53, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-14T02:31:48Z', 'updated_at': '2020-12-14T02:31:48Z', 'revision_number': 1}, subnet: None, router: None _clear_isolated_net_resources /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/dynamic_creds.py:418 2020-12-14 02:31:52.987 189 INFO tempest.lib.common.rest_client [req-07eae1aa-e8b3-4c3b-9f69-3478623a60e3 ] Request (TenantNetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/6704d7e5-d458-4097-b35b-d43a89e1968b 0.923s 2020-12-14 02:31:52.989 189 DEBUG tempest.lib.common.rest_client [req-07eae1aa-e8b3-4c3b-9f69-3478623a60e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-07eae1aa-e8b3-4c3b-9f69-3478623a60e3', 'date': 'Mon, 14 Dec 2020 02:31:52 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/6704d7e5-d458-4097-b35b-d43a89e1968b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:53.151 189 INFO tempest.lib.common.rest_client [req-32b17f32-2c5a-41a8-b938-d2caa670da15 ] Request (TenantNetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/d859418ca87c4f31be7a9603d188832f 0.155s 2020-12-14 02:31:53.154 189 DEBUG tempest.lib.common.rest_client [req-32b17f32-2c5a-41a8-b938-d2caa670da15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32b17f32-2c5a-41a8-b938-d2caa670da15', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/d859418ca87c4f31be7a9603d188832f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:53.290 189 INFO tempest.lib.common.rest_client [req-cf796683-ced9-4e75-8179-729db9abd009 ] Request (TenantNetworksRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e188ecac9016447cb2631ed8a177f7ca&name=default 0.130s 2020-12-14 02:31:53.292 189 DEBUG tempest.lib.common.rest_client [req-cf796683-ced9-4e75-8179-729db9abd009 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-cf796683-ced9-4e75-8179-729db9abd009', 'date': 'Mon, 14 Dec 2020 02:31:53 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=e188ecac9016447cb2631ed8a177f7ca&name=default'} Body: b'{"security_groups": [{"id": "412648cc-cf30-47fd-9ae5-f75c79c60aa4", "name": "default", "stateful": true, "tenant_id": "e188ecac9016447cb2631ed8a177f7ca", "description": "Default security group", "security_group_rules": [{"id": "8c5f8ac7-3958-4932-b7fe-b64b878c0c09", "tenant_id": "e188ecac9016447cb2631ed8a177f7ca", "security_group_id": "412648cc-cf30-47fd-9ae5-f75c79c60aa4", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:31:48Z", "updated_at": "2020-12-14T02:31:48Z", "revision_number": 0, "project_id": "e188ecac9016447cb2631ed8a177f7ca"}, {"id": "ac0f6db6-c26c-4763-976a-e72796f9b223", "tenant_id": "e188ecac9016447cb2631ed8a177f7ca", "security_group_id": "412648cc-cf30-47fd-9ae5-f75c79c60aa4", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:31:48Z", "updated_at": "2020-12-14T02:31:48Z", "revision_number": 0, "project_id": "e188ecac9016447cb2631ed8a177f7ca"}, {"id": "c33e6859-7881-479a-bc81-faa4524e88b5", "tenant_id": "e188ecac9016447cb2631ed8a177f7ca", "security_group_id": "412648cc-cf30-47fd-9ae5-f75c79c60aa4", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "412648cc-cf30-47fd-9ae5-f75c79c60aa4", "description": null, "tags": [], "created_at": "2020-12-14T02:31:48Z", "updated_at": "2020-12-14T02:31:48Z", "revision_number": 0, "project_id": "e188ecac9016447cb2631ed8a177f7ca"}, {"id": "e55738c0-8807-4c97-a0f1-7c2fc198ebbc", "tenant_id": "e188ecac9016447cb2631ed8a177f7ca", "security_group_id": "412648cc-cf30-47fd-9ae5-f75c79c60aa4", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "412648cc-cf30-47fd-9ae5-f75c79c60aa4", "description": null, "tags": [], "created_at": "2020-12-14T02:31:48Z", "updated_at": "2020-12-14T02:31:48Z", "revision_number": 0, "project_id": "e188ecac9016447cb2631ed8a177f7ca"}], "tags": [], "created_at": "2020-12-14T02:31:48Z", "updated_at": "2020-12-14T02:31:48Z", "revision_number": 1, "project_id": "e188ecac9016447cb2631ed8a177f7ca"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:53.443 189 INFO tempest.lib.common.rest_client [req-935a2d78-bb6b-49e7-b396-5e6dbb8d898d ] Request (TenantNetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/412648cc-cf30-47fd-9ae5-f75c79c60aa4 0.144s 2020-12-14 02:31:53.446 189 DEBUG tempest.lib.common.rest_client [req-935a2d78-bb6b-49e7-b396-5e6dbb8d898d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-935a2d78-bb6b-49e7-b396-5e6dbb8d898d', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:31:53 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/412648cc-cf30-47fd-9ae5-f75c79c60aa4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:53.655 189 INFO tempest.lib.common.rest_client [req-bcfcd6d3-78d0-4ee0-8e5b-609a235ba28b ] Request (TenantNetworksRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca 0.204s 2020-12-14 02:31:53.657 189 DEBUG tempest.lib.common.rest_client [req-bcfcd6d3-78d0-4ee0-8e5b-609a235ba28b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bcfcd6d3-78d0-4ee0-8e5b-609a235ba28b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e188ecac9016447cb2631ed8a177f7ca'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:53.766 189 INFO tempest.lib.common.rest_client [req-be30a247-1043-4341-bd84-8bdfb2a8736a ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:31:53.769 189 DEBUG tempest.lib.common.rest_client [req-be30a247-1043-4341-bd84-8bdfb2a8736a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be30a247-1043-4341-bd84-8bdfb2a8736a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["s5gZ4BcPTl635M-kzQfy1g"], "expires_at": "2020-12-14T03:31:53.000000Z", "issued_at": "2020-12-14T02:31:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:53.869 189 INFO tempest.lib.common.rest_client [req-8a8e3ea1-ad0b-4921-b415-b23d02f9384c ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:31:53.872 189 DEBUG tempest.lib.common.rest_client [req-8a8e3ea1-ad0b-4921-b415-b23d02f9384c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a8e3ea1-ad0b-4921-b415-b23d02f9384c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ZQewrHqSQZegENDlRWsIFQ"], "expires_at": "2020-12-14T03:31:53.000000Z", "issued_at": "2020-12-14T02:31:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:53.938 189 INFO tempest.lib.common.rest_client [req-f68d1654-668d-4964-8b85-5ae330eeda4f ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.058s 2020-12-14 02:31:53.940 189 DEBUG tempest.lib.common.rest_client [req-f68d1654-668d-4964-8b85-5ae330eeda4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f68d1654-668d-4964-8b85-5ae330eeda4f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:54.010 189 INFO tempest.lib.common.rest_client [req-462d0459-ae96-4a87-b443-5a32115f09cf ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.063s 2020-12-14 02:31:54.011 189 DEBUG tempest.lib.common.rest_client [req-462d0459-ae96-4a87-b443-5a32115f09cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImageNamespacesObjectsRbacTest-2054993765-desc", "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '398', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-462d0459-ae96-4a87-b443-5a32115f09cf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "faa788ecb5924eeda5eb3cf7873c685c", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765", "domain_id": "default", "description": "tempest-ImageNamespacesObjectsRbacTest-2054993765-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:54.129 189 INFO tempest.lib.common.rest_client [req-3d20e7a2-87d8-41f6-9830-c6788d5754fe ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.110s 2020-12-14 02:31:54.132 189 DEBUG tempest.lib.common.rest_client [req-3d20e7a2-87d8-41f6-9830-c6788d5754fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImageNamespacesObjectsRbacTest-2054993765", "password": "M0_idEgiTcgIACd", "project_id": "faa788ecb5924eeda5eb3cf7873c685c", "email": "tempest-ImageNamespacesObjectsRbacTest-1022616899@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '416', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d20e7a2-87d8-41f6-9830-c6788d5754fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "faa788ecb5924eeda5eb3cf7873c685c", "email": "tempest-ImageNamespacesObjectsRbacTest-1022616899@example.com", "id": "6b198befef414bdaaea093be9d1b49f2", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/6b198befef414bdaaea093be9d1b49f2"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:54.186 189 INFO tempest.lib.common.rest_client [req-bf35bb0c-f54c-4a30-990b-50e7aeddf4b3 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-12-14 02:31:54.188 189 DEBUG tempest.lib.common.rest_client [req-bf35bb0c-f54c-4a30-990b-50e7aeddf4b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf35bb0c-f54c-4a30-990b-50e7aeddf4b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:54.250 189 INFO tempest.lib.common.rest_client [req-f83b7f2b-f0f8-4344-ad81-c2520016a403 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-12-14 02:31:54.253 189 DEBUG tempest.lib.common.rest_client [req-f83b7f2b-f0f8-4344-ad81-c2520016a403 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f83b7f2b-f0f8-4344-ad81-c2520016a403', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:54.328 189 INFO tempest.lib.common.rest_client [req-0078b793-d611-4955-9d44-3692b96795e1 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles/72a4576c553448cd941b052c1ca0cf2d 0.070s 2020-12-14 02:31:54.330 189 DEBUG tempest.lib.common.rest_client [req-0078b793-d611-4955-9d44-3692b96795e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0078b793-d611-4955-9d44-3692b96795e1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:54.332 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageNamespacesObjectsRbacTest-2054993765', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'faa788ecb5924eeda5eb3cf7873c685c', 'project_name': 'tempest-ImageNamespacesObjectsRbacTest-2054993765', 'tenant_id': 'faa788ecb5924eeda5eb3cf7873c685c', 'tenant_name': 'tempest-ImageNamespacesObjectsRbacTest-2054993765', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '6b198befef414bdaaea093be9d1b49f2'}, Network: None, Subnet: None, Router: None 2020-12-14 02:31:54.333 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageNamespacesObjectsRbacTest-2054993765', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'faa788ecb5924eeda5eb3cf7873c685c', 'project_name': 'tempest-ImageNamespacesObjectsRbacTest-2054993765', 'tenant_id': 'faa788ecb5924eeda5eb3cf7873c685c', 'tenant_name': 'tempest-ImageNamespacesObjectsRbacTest-2054993765', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '6b198befef414bdaaea093be9d1b49f2'}, Network: None, Subnet: None, Router: None 2020-12-14 02:31:54.489 189 INFO tempest.lib.common.rest_client [req-b2fc3397-0c15-470f-ac22-5a5a43197999 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-12-14 02:31:54.492 189 DEBUG tempest.lib.common.rest_client [req-b2fc3397-0c15-470f-ac22-5a5a43197999 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6591', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2fc3397-0c15-470f-ac22-5a5a43197999', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6b198befef414bdaaea093be9d1b49f2", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765", "password_expires_at": null}, "audit_ids": ["ZP7XkMiuSjikiUZ_LnE3EA"], "expires_at": "2020-12-14T03:31:54.000000Z", "issued_at": "2020-12-14T02:31:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "faa788ecb5924eeda5eb3cf7873c685c", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:54.586 189 INFO tempest.lib.common.rest_client [req-7384e504-37c4-4a2c-ba1a-cd18285693c8 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-14 02:31:54.589 189 DEBUG tempest.lib.common.rest_client [req-7384e504-37c4-4a2c-ba1a-cd18285693c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7384e504-37c4-4a2c-ba1a-cd18285693c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["zs_bDV7gT6-R8QQj4ZPLLQ"], "expires_at": "2020-12-14T03:31:54.000000Z", "issued_at": "2020-12-14T02:31:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:55.005 189 INFO tempest.lib.common.rest_client [req-661d2dd6-2382-426b-924d-580b98da3baa ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:31:55.008 189 DEBUG tempest.lib.common.rest_client [req-661d2dd6-2382-426b-924d-580b98da3baa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-661d2dd6-2382-426b-924d-580b98da3baa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["3R8ztvz8SceNIUB3irSTlA"], "expires_at": "2020-12-14T03:31:54.000000Z", "issued_at": "2020-12-14T02:31:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:55.074 189 INFO tempest.lib.common.rest_client [req-6a35abee-547a-436c-b52b-cfe5d9af50b6 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.060s 2020-12-14 02:31:55.075 189 DEBUG tempest.lib.common.rest_client [req-6a35abee-547a-436c-b52b-cfe5d9af50b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a35abee-547a-436c-b52b-cfe5d9af50b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:55.138 189 INFO tempest.lib.common.rest_client [req-c0f1c608-ddac-45b7-bc98-5f88d4759e5c ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-12-14 02:31:55.140 189 DEBUG tempest.lib.common.rest_client [req-c0f1c608-ddac-45b7-bc98-5f88d4759e5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c0f1c608-ddac-45b7-bc98-5f88d4759e5c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:55.142 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:31:55.144 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:55.206 189 INFO tempest.lib.common.rest_client [req-dc873ce2-2534-4d20-82f9-ff0969451cd1 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles 0.057s 2020-12-14 02:31:55.208 189 DEBUG tempest.lib.common.rest_client [req-dc873ce2-2534-4d20-82f9-ff0969451cd1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc873ce2-2534-4d20-82f9-ff0969451cd1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:55.280 189 INFO tempest.lib.common.rest_client [req-d3e792bb-884b-4118-ba9b-59b7e5cc61cc ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-12-14 02:31:55.282 189 DEBUG tempest.lib.common.rest_client [req-d3e792bb-884b-4118-ba9b-59b7e5cc61cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3e792bb-884b-4118-ba9b-59b7e5cc61cc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:55.386 189 INFO tempest.lib.common.rest_client [req-a39fee1c-2baf-4b6b-aa65-b18b15085e43 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles/a629c95d64b3416fb80ae90af4f69c05 0.099s 2020-12-14 02:31:55.387 189 DEBUG tempest.lib.common.rest_client [req-a39fee1c-2baf-4b6b-aa65-b18b15085e43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a39fee1c-2baf-4b6b-aa65-b18b15085e43', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:56.498 189 INFO tempest.lib.common.rest_client [req-45e82fd6-177c-4d89-a129-b83db0538459 ] Request (ImageNamespacesObjectsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-14 02:31:56.502 189 DEBUG tempest.lib.common.rest_client [req-45e82fd6-177c-4d89-a129-b83db0538459 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45e82fd6-177c-4d89-a129-b83db0538459', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6b198befef414bdaaea093be9d1b49f2", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765", "password_expires_at": null}, "audit_ids": ["RpNmKSMhQOm8gUkgS_r7XA"], "expires_at": "2020-12-14T03:31:56.000000Z", "issued_at": "2020-12-14T02:31:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "faa788ecb5924eeda5eb3cf7873c685c", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:56.520 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:31:56.527 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:56.541 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_metadef_object, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:31:56.751 189 INFO tempest.lib.common.rest_client [req-d39c70f3-5208-4cca-90bf-37c0e4697bdc ] Request (ImageNamespacesObjectsRbacTest:test_create_metadef_object_in_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.204s 2020-12-14 02:31:56.754 189 DEBUG tempest.lib.common.rest_client [req-d39c70f3-5208-4cca-90bf-37c0e4697bdc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-test-ns-2109405807", "visibility": "public", "description": "Tempest", "protected": false, "display_name": "tempest-test-ns-2109405807"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '386', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-test-ns-2109405807', 'x-openstack-request-id': 'req-d39c70f3-5208-4cca-90bf-37c0e4697bdc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-test-ns-2109405807", "display_name": "tempest-test-ns-2109405807", "description": "Tempest", "visibility": "public", "protected": false, "owner": "faa788ecb5924eeda5eb3cf7873c685c", "created_at": "2020-12-14T02:31:56Z", "updated_at": "2020-12-14T02:31:56Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-2109405807", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:56.757 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:56.886 189 INFO tempest.lib.common.rest_client [req-dbc93a89-c929-4bbc-a860-bf8436e4a30a ] Request (ImageNamespacesObjectsRbacTest:test_create_metadef_object_in_namespace): 200 GET http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles 0.123s 2020-12-14 02:31:56.889 189 DEBUG tempest.lib.common.rest_client [req-dbc93a89-c929-4bbc-a860-bf8436e4a30a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dbc93a89-c929-4bbc-a860-bf8436e4a30a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:56.943 189 INFO tempest.lib.common.rest_client [req-719eb538-1294-45cf-b115-f9d5bc05c1c2 ] Request (ImageNamespacesObjectsRbacTest:test_create_metadef_object_in_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:31:56.946 189 DEBUG tempest.lib.common.rest_client [req-719eb538-1294-45cf-b115-f9d5bc05c1c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-719eb538-1294-45cf-b115-f9d5bc05c1c2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6b198befef414bdaaea093be9d1b49f2", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765", "password_expires_at": null}, "audit_ids": ["G-i1oMuqScGBPAjIAvqoUw"], "expires_at": "2020-12-14T03:31:56.000000Z", "issued_at": "2020-12-14T02:31:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "faa788ecb5924eeda5eb3cf7873c685c", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:57.099 189 INFO tempest.lib.common.rest_client [req-54020f61-fe8c-4b77-a1f9-9a437afdfcdb ] Request (ImageNamespacesObjectsRbacTest:test_create_metadef_object_in_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-2109405807/objects 0.145s 2020-12-14 02:31:57.102 189 DEBUG tempest.lib.common.rest_client [req-54020f61-fe8c-4b77-a1f9-9a437afdfcdb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImageNamespacesObjectsRbacTest-test-object-488686371"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '320', 'content-type': 'application/json', 'x-openstack-request-id': 'req-54020f61-fe8c-4b77-a1f9-9a437afdfcdb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-2109405807/objects'} Body: b'{"name": "tempest-ImageNamespacesObjectsRbacTest-test-object-488686371", "created_at": "2020-12-14T02:31:57Z", "updated_at": "2020-12-14T02:31:57Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-2109405807/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-488686371", "schema": "/v2/schemas/metadefs/object"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:57.105 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:57.183 189 INFO tempest.lib.common.rest_client [req-a41e7797-cf0e-4c95-8a94-7912293eb34f ] Request (ImageNamespacesObjectsRbacTest:test_create_metadef_object_in_namespace): 200 GET http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles 0.071s 2020-12-14 02:31:57.186 189 DEBUG tempest.lib.common.rest_client [req-a41e7797-cf0e-4c95-8a94-7912293eb34f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a41e7797-cf0e-4c95-8a94-7912293eb34f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:57.243 189 INFO tempest.lib.common.rest_client [req-548f07a3-d66c-42bf-a60b-f2c438771781 ] Request (ImageNamespacesObjectsRbacTest:test_create_metadef_object_in_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:31:57.247 189 DEBUG tempest.lib.common.rest_client [req-548f07a3-d66c-42bf-a60b-f2c438771781 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-548f07a3-d66c-42bf-a60b-f2c438771781', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6b198befef414bdaaea093be9d1b49f2", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765", "password_expires_at": null}, "audit_ids": ["3BOa7W-yT6quL1PZJPZBQw"], "expires_at": "2020-12-14T03:31:57.000000Z", "issued_at": "2020-12-14T02:31:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "faa788ecb5924eeda5eb3cf7873c685c", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:57.361 189 INFO tempest.lib.common.rest_client [req-2b29b9c3-3947-400c-94e8-e029256e9c88 ] Request (ImageNamespacesObjectsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-2109405807/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-488686371 0.104s 2020-12-14 02:31:57.365 189 DEBUG tempest.lib.common.rest_client [req-2b29b9c3-3947-400c-94e8-e029256e9c88 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-2b29b9c3-3947-400c-94e8-e029256e9c88', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-2109405807/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-488686371'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:57.419 189 INFO tempest.lib.common.rest_client [req-e5cc92c0-933c-4534-b3cc-574ea40ea0bb ] Request (ImageNamespacesObjectsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-2109405807 0.046s 2020-12-14 02:31:57.422 189 DEBUG tempest.lib.common.rest_client [req-e5cc92c0-933c-4534-b3cc-574ea40ea0bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-e5cc92c0-933c-4534-b3cc-574ea40ea0bb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-2109405807'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:57.435 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:31:57.439 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:57.447 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_metadef_objects, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:31:57.482 189 INFO tempest.lib.common.rest_client [req-c97f35b5-6d62-449e-ba50-22d4f7532465 ] Request (ImageNamespacesObjectsRbacTest:test_list_metadef_objects_in_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.028s 2020-12-14 02:31:57.484 189 DEBUG tempest.lib.common.rest_client [req-c97f35b5-6d62-449e-ba50-22d4f7532465 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-test-ns-865258211", "visibility": "public", "description": "Tempest", "protected": false, "display_name": "tempest-test-ns-865258211"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '383', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-test-ns-865258211', 'x-openstack-request-id': 'req-c97f35b5-6d62-449e-ba50-22d4f7532465', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-test-ns-865258211", "display_name": "tempest-test-ns-865258211", "description": "Tempest", "visibility": "public", "protected": false, "owner": "faa788ecb5924eeda5eb3cf7873c685c", "created_at": "2020-12-14T02:31:57Z", "updated_at": "2020-12-14T02:31:57Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-865258211", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:57.488 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:57.554 189 INFO tempest.lib.common.rest_client [req-70a38e8e-a6d5-436b-83f5-1e8695314b5b ] Request (ImageNamespacesObjectsRbacTest:test_list_metadef_objects_in_namespace): 200 GET http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles 0.060s 2020-12-14 02:31:57.557 189 DEBUG tempest.lib.common.rest_client [req-70a38e8e-a6d5-436b-83f5-1e8695314b5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70a38e8e-a6d5-436b-83f5-1e8695314b5b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:57.607 189 INFO tempest.lib.common.rest_client [req-76209a40-121f-4d87-bdb9-79994f4811e5 ] Request (ImageNamespacesObjectsRbacTest:test_list_metadef_objects_in_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:31:57.610 189 DEBUG tempest.lib.common.rest_client [req-76209a40-121f-4d87-bdb9-79994f4811e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76209a40-121f-4d87-bdb9-79994f4811e5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6b198befef414bdaaea093be9d1b49f2", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765", "password_expires_at": null}, "audit_ids": ["eFUoZO8dR72BDM5niqhsiw"], "expires_at": "2020-12-14T03:31:57.000000Z", "issued_at": "2020-12-14T02:31:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "faa788ecb5924eeda5eb3cf7873c685c", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:57.711 189 INFO tempest.lib.common.rest_client [req-ecbc2b55-a00c-4579-bb01-e4a2babfb909 ] Request (ImageNamespacesObjectsRbacTest:test_list_metadef_objects_in_namespace): 200 GET http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-865258211/objects 0.094s 2020-12-14 02:31:57.713 189 DEBUG tempest.lib.common.rest_client [req-ecbc2b55-a00c-4579-bb01-e4a2babfb909 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '56', 'content-type': 'application/json', 'x-openstack-request-id': 'req-ecbc2b55-a00c-4579-bb01-e4a2babfb909', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-865258211/objects'} Body: b'{"objects": [], "schema": "v2/schemas/metadefs/objects"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:57.716 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:57.783 189 INFO tempest.lib.common.rest_client [req-ff5806f8-4b84-40c1-a56d-121a418456fd ] Request (ImageNamespacesObjectsRbacTest:test_list_metadef_objects_in_namespace): 200 GET http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles 0.060s 2020-12-14 02:31:57.786 189 DEBUG tempest.lib.common.rest_client [req-ff5806f8-4b84-40c1-a56d-121a418456fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff5806f8-4b84-40c1-a56d-121a418456fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:57.839 189 INFO tempest.lib.common.rest_client [req-c2b918ae-74fe-4430-8f9f-4b66be5139cf ] Request (ImageNamespacesObjectsRbacTest:test_list_metadef_objects_in_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:31:57.843 189 DEBUG tempest.lib.common.rest_client [req-c2b918ae-74fe-4430-8f9f-4b66be5139cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2b918ae-74fe-4430-8f9f-4b66be5139cf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6b198befef414bdaaea093be9d1b49f2", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765", "password_expires_at": null}, "audit_ids": ["P7nf-ti6R4mJGUBZmVx8MQ"], "expires_at": "2020-12-14T03:31:57.000000Z", "issued_at": "2020-12-14T02:31:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "faa788ecb5924eeda5eb3cf7873c685c", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:57.951 189 INFO tempest.lib.common.rest_client [req-3cb0879b-cd33-4c7e-92ab-f8faade34802 ] Request (ImageNamespacesObjectsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-865258211 0.098s 2020-12-14 02:31:57.955 189 DEBUG tempest.lib.common.rest_client [req-3cb0879b-cd33-4c7e-92ab-f8faade34802 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-3cb0879b-cd33-4c7e-92ab-f8faade34802', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-865258211'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:57.967 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:31:57.971 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:57.979 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_metadef_object, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:31:58.020 189 INFO tempest.lib.common.rest_client [req-6b0226ed-70a3-49b2-a452-70a1f4086ecd ] Request (ImageNamespacesObjectsRbacTest:test_show_metadef_object_in_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.035s 2020-12-14 02:31:58.023 189 DEBUG tempest.lib.common.rest_client [req-6b0226ed-70a3-49b2-a452-70a1f4086ecd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-test-ns-1708309945", "visibility": "public", "description": "Tempest", "protected": false, "display_name": "tempest-test-ns-1708309945"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '386', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-test-ns-1708309945', 'x-openstack-request-id': 'req-6b0226ed-70a3-49b2-a452-70a1f4086ecd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-test-ns-1708309945", "display_name": "tempest-test-ns-1708309945", "description": "Tempest", "visibility": "public", "protected": false, "owner": "faa788ecb5924eeda5eb3cf7873c685c", "created_at": "2020-12-14T02:31:58Z", "updated_at": "2020-12-14T02:31:58Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-1708309945", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:58.069 189 INFO tempest.lib.common.rest_client [req-4f573081-91c3-411c-a1d4-c108fd0835d7 ] Request (ImageNamespacesObjectsRbacTest:test_show_metadef_object_in_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1708309945/objects 0.038s 2020-12-14 02:31:58.072 189 DEBUG tempest.lib.common.rest_client [req-4f573081-91c3-411c-a1d4-c108fd0835d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImageNamespacesObjectsRbacTest-test-object-824426956"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '320', 'content-type': 'application/json', 'x-openstack-request-id': 'req-4f573081-91c3-411c-a1d4-c108fd0835d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1708309945/objects'} Body: b'{"name": "tempest-ImageNamespacesObjectsRbacTest-test-object-824426956", "created_at": "2020-12-14T02:31:58Z", "updated_at": "2020-12-14T02:31:58Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-1708309945/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-824426956", "schema": "/v2/schemas/metadefs/object"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:58.077 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:58.155 189 INFO tempest.lib.common.rest_client [req-6664c688-724d-49ce-8af3-f06136ed4290 ] Request (ImageNamespacesObjectsRbacTest:test_show_metadef_object_in_namespace): 200 GET http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles 0.071s 2020-12-14 02:31:58.159 189 DEBUG tempest.lib.common.rest_client [req-6664c688-724d-49ce-8af3-f06136ed4290 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6664c688-724d-49ce-8af3-f06136ed4290', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:58.211 189 INFO tempest.lib.common.rest_client [req-9744abe1-ad15-4238-b103-12738379b676 ] Request (ImageNamespacesObjectsRbacTest:test_show_metadef_object_in_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:31:58.215 189 DEBUG tempest.lib.common.rest_client [req-9744abe1-ad15-4238-b103-12738379b676 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9744abe1-ad15-4238-b103-12738379b676', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6b198befef414bdaaea093be9d1b49f2", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765", "password_expires_at": null}, "audit_ids": ["EuW3a2e4QvOa_bD0-2hYfQ"], "expires_at": "2020-12-14T03:31:58.000000Z", "issued_at": "2020-12-14T02:31:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "faa788ecb5924eeda5eb3cf7873c685c", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:58.327 189 INFO tempest.lib.common.rest_client [req-a2dc4611-385d-4c3e-8292-662737161848 ] Request (ImageNamespacesObjectsRbacTest:test_show_metadef_object_in_namespace): 200 GET http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1708309945/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-824426956 0.103s 2020-12-14 02:31:58.330 189 DEBUG tempest.lib.common.rest_client [req-a2dc4611-385d-4c3e-8292-662737161848 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '354', 'content-type': 'application/json', 'x-openstack-request-id': 'req-a2dc4611-385d-4c3e-8292-662737161848', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1708309945/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-824426956'} Body: b'{"name": "tempest-ImageNamespacesObjectsRbacTest-test-object-824426956", "required": [], "properties": {}, "created_at": "2020-12-14T02:31:58Z", "updated_at": "2020-12-14T02:31:58Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-1708309945/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-824426956", "schema": "/v2/schemas/metadefs/object"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:58.333 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:58.411 189 INFO tempest.lib.common.rest_client [req-f81f8677-6cee-4165-86ba-2f978c0e9b50 ] Request (ImageNamespacesObjectsRbacTest:test_show_metadef_object_in_namespace): 200 GET http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles 0.072s 2020-12-14 02:31:58.414 189 DEBUG tempest.lib.common.rest_client [req-f81f8677-6cee-4165-86ba-2f978c0e9b50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f81f8677-6cee-4165-86ba-2f978c0e9b50', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:58.468 189 INFO tempest.lib.common.rest_client [req-a572856f-605c-4573-aad6-73b5b688f3a3 ] Request (ImageNamespacesObjectsRbacTest:test_show_metadef_object_in_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:31:58.472 189 DEBUG tempest.lib.common.rest_client [req-a572856f-605c-4573-aad6-73b5b688f3a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a572856f-605c-4573-aad6-73b5b688f3a3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6b198befef414bdaaea093be9d1b49f2", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765", "password_expires_at": null}, "audit_ids": ["1Pj7UTFRRPq1GjLdD3NWWg"], "expires_at": "2020-12-14T03:31:58.000000Z", "issued_at": "2020-12-14T02:31:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "faa788ecb5924eeda5eb3cf7873c685c", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:58.601 189 INFO tempest.lib.common.rest_client [req-18a134e9-82ab-4d0d-843a-92298c66bf54 ] Request (ImageNamespacesObjectsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1708309945/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-824426956 0.118s 2020-12-14 02:31:58.605 189 DEBUG tempest.lib.common.rest_client [req-18a134e9-82ab-4d0d-843a-92298c66bf54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-18a134e9-82ab-4d0d-843a-92298c66bf54', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1708309945/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-824426956'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:58.657 189 INFO tempest.lib.common.rest_client [req-50057311-1a71-42a6-b978-4711ef2ccc94 ] Request (ImageNamespacesObjectsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1708309945 0.043s 2020-12-14 02:31:58.660 189 DEBUG tempest.lib.common.rest_client [req-50057311-1a71-42a6-b978-4711ef2ccc94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-50057311-1a71-42a6-b978-4711ef2ccc94', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1708309945'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:58.673 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:31:58.677 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:31:58.686 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_metadef_object, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:31:58.722 189 INFO tempest.lib.common.rest_client [req-f1232c45-373a-473b-bfa6-575915564d1f ] Request (ImageNamespacesObjectsRbacTest:test_update_metadef_object_in_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.031s 2020-12-14 02:31:58.725 189 DEBUG tempest.lib.common.rest_client [req-f1232c45-373a-473b-bfa6-575915564d1f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-test-ns-1489108722", "visibility": "public", "description": "Tempest", "protected": false, "display_name": "tempest-test-ns-1489108722"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '386', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-test-ns-1489108722', 'x-openstack-request-id': 'req-f1232c45-373a-473b-bfa6-575915564d1f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-test-ns-1489108722", "display_name": "tempest-test-ns-1489108722", "description": "Tempest", "visibility": "public", "protected": false, "owner": "faa788ecb5924eeda5eb3cf7873c685c", "created_at": "2020-12-14T02:31:58Z", "updated_at": "2020-12-14T02:31:58Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-1489108722", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:58.778 189 INFO tempest.lib.common.rest_client [req-a898fc8b-15c8-47ef-b4af-0c8d451c2799 ] Request (ImageNamespacesObjectsRbacTest:test_update_metadef_object_in_namespace): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1489108722/objects 0.040s 2020-12-14 02:31:58.780 189 DEBUG tempest.lib.common.rest_client [req-a898fc8b-15c8-47ef-b4af-0c8d451c2799 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImageNamespacesObjectsRbacTest-test-object-785301903"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '320', 'content-type': 'application/json', 'x-openstack-request-id': 'req-a898fc8b-15c8-47ef-b4af-0c8d451c2799', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1489108722/objects'} Body: b'{"name": "tempest-ImageNamespacesObjectsRbacTest-test-object-785301903", "created_at": "2020-12-14T02:31:58Z", "updated_at": "2020-12-14T02:31:58Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-1489108722/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-785301903", "schema": "/v2/schemas/metadefs/object"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:58.784 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:58.855 189 INFO tempest.lib.common.rest_client [req-84987fd1-7cf1-4464-8547-386175579e36 ] Request (ImageNamespacesObjectsRbacTest:test_update_metadef_object_in_namespace): 200 GET http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles 0.065s 2020-12-14 02:31:58.858 189 DEBUG tempest.lib.common.rest_client [req-84987fd1-7cf1-4464-8547-386175579e36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84987fd1-7cf1-4464-8547-386175579e36', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:58.908 189 INFO tempest.lib.common.rest_client [req-9b3f31b5-f75b-4d03-b381-501c23a0fcf8 ] Request (ImageNamespacesObjectsRbacTest:test_update_metadef_object_in_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:31:58.912 189 DEBUG tempest.lib.common.rest_client [req-9b3f31b5-f75b-4d03-b381-501c23a0fcf8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b3f31b5-f75b-4d03-b381-501c23a0fcf8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6b198befef414bdaaea093be9d1b49f2", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765", "password_expires_at": null}, "audit_ids": ["HENSYxWWRFe7nWlQHTLGZA"], "expires_at": "2020-12-14T03:31:58.000000Z", "issued_at": "2020-12-14T02:31:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "faa788ecb5924eeda5eb3cf7873c685c", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:59.021 189 INFO tempest.lib.common.rest_client [req-574b08e9-86ad-428e-9e2c-2eb29738166d ] Request (ImageNamespacesObjectsRbacTest:test_update_metadef_object_in_namespace): 200 PUT http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1489108722/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-785301903 0.102s 2020-12-14 02:31:59.024 189 DEBUG tempest.lib.common.rest_client [req-574b08e9-86ad-428e-9e2c-2eb29738166d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "Object New Name"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '230', 'content-type': 'application/json', 'x-openstack-request-id': 'req-574b08e9-86ad-428e-9e2c-2eb29738166d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1489108722/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-785301903'} Body: b'{"name": "Object New Name", "created_at": "2020-12-14T02:31:59Z", "updated_at": "2020-12-14T02:31:59Z", "self": "/v2/metadefs/namespaces/tempest-test-ns-1489108722/objects/Object New Name", "schema": "/v2/schemas/metadefs/object"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:59.026 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:31:59.093 189 INFO tempest.lib.common.rest_client [req-ab022cb9-7f90-408b-8654-12b7ede22071 ] Request (ImageNamespacesObjectsRbacTest:test_update_metadef_object_in_namespace): 200 GET http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles 0.060s 2020-12-14 02:31:59.096 189 DEBUG tempest.lib.common.rest_client [req-ab022cb9-7f90-408b-8654-12b7ede22071 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ab022cb9-7f90-408b-8654-12b7ede22071', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c/users/6b198befef414bdaaea093be9d1b49f2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:59.149 189 INFO tempest.lib.common.rest_client [req-a3912861-6580-4dbf-af07-ee5b88e4f2f6 ] Request (ImageNamespacesObjectsRbacTest:test_update_metadef_object_in_namespace): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:31:59.152 189 DEBUG tempest.lib.common.rest_client [req-a3912861-6580-4dbf-af07-ee5b88e4f2f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3912861-6580-4dbf-af07-ee5b88e4f2f6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6b198befef414bdaaea093be9d1b49f2", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765", "password_expires_at": null}, "audit_ids": ["pQp9i7UTTAu-EeMsI5ufsQ"], "expires_at": "2020-12-14T03:31:59.000000Z", "issued_at": "2020-12-14T02:31:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "faa788ecb5924eeda5eb3cf7873c685c", "name": "tempest-ImageNamespacesObjectsRbacTest-2054993765"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_faa788ecb5924eeda5eb3cf7873c685c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:59.255 189 INFO tempest.lib.common.rest_client [req-bafd0082-1dcf-441f-9eb6-624a454fcf7e ] Request (ImageNamespacesObjectsRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1489108722/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-785301903 0.094s 2020-12-14 02:31:59.258 189 DEBUG tempest.lib.common.rest_client [req-bafd0082-1dcf-441f-9eb6-624a454fcf7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '171', 'content-type': 'application/json', 'x-openstack-request-id': 'req-bafd0082-1dcf-441f-9eb6-624a454fcf7e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1489108722/objects/tempest-ImageNamespacesObjectsRbacTest-test-object-785301903'} Body: b'{"message": "Could not find metadata object tempest-ImageNamespacesObjectsRbacTest-test-object-785301903

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:59.308 189 INFO tempest.lib.common.rest_client [req-9135b590-ebee-464a-ab6b-6f79eabb57ce ] Request (ImageNamespacesObjectsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1489108722 0.042s 2020-12-14 02:31:59.310 189 DEBUG tempest.lib.common.rest_client [req-9135b590-ebee-464a-ab6b-6f79eabb57ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-9135b590-ebee-464a-ab6b-6f79eabb57ce', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-test-ns-1489108722'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:59.477 189 INFO tempest.lib.common.rest_client [req-7668ad32-fee0-4bdf-85ae-3f80e38ad3a2 ] Request (ImageNamespacesObjectsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/6b198befef414bdaaea093be9d1b49f2 0.152s 2020-12-14 02:31:59.479 189 DEBUG tempest.lib.common.rest_client [req-7668ad32-fee0-4bdf-85ae-3f80e38ad3a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7668ad32-fee0-4bdf-85ae-3f80e38ad3a2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/6b198befef414bdaaea093be9d1b49f2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:59.577 189 INFO tempest.lib.common.rest_client [req-80ca1c18-edb3-4f9e-88a7-acb7ce52d10f ] Request (ImageNamespacesObjectsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:31:59.581 189 DEBUG tempest.lib.common.rest_client [req-80ca1c18-edb3-4f9e-88a7-acb7ce52d10f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:31:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-80ca1c18-edb3-4f9e-88a7-acb7ce52d10f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["MvDrcoyaQxStEEgthTe6_A"], "expires_at": "2020-12-14T03:31:59.000000Z", "issued_at": "2020-12-14T02:31:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:31:59.907 189 INFO tempest.lib.common.rest_client [req-4d32b68e-b045-4add-bfcc-856fe717d95b ] Request (ImageNamespacesObjectsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=faa788ecb5924eeda5eb3cf7873c685c&name=default 0.320s 2020-12-14 02:31:59.915 189 DEBUG tempest.lib.common.rest_client [req-4d32b68e-b045-4add-bfcc-856fe717d95b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-4d32b68e-b045-4add-bfcc-856fe717d95b', 'date': 'Mon, 14 Dec 2020 02:31:59 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=faa788ecb5924eeda5eb3cf7873c685c&name=default'} Body: b'{"security_groups": [{"id": "7b215031-9765-47bf-a6c4-9991ad87d1dc", "name": "default", "stateful": true, "tenant_id": "faa788ecb5924eeda5eb3cf7873c685c", "description": "Default security group", "security_group_rules": [{"id": "489c42a5-7753-447c-acac-1800ee9f8121", "tenant_id": "faa788ecb5924eeda5eb3cf7873c685c", "security_group_id": "7b215031-9765-47bf-a6c4-9991ad87d1dc", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "7b215031-9765-47bf-a6c4-9991ad87d1dc", "description": null, "tags": [], "created_at": "2020-12-14T02:31:59Z", "updated_at": "2020-12-14T02:31:59Z", "revision_number": 0, "project_id": "faa788ecb5924eeda5eb3cf7873c685c"}, {"id": "60fa4e4b-31aa-4395-bff6-38a9ef1eb242", "tenant_id": "faa788ecb5924eeda5eb3cf7873c685c", "security_group_id": "7b215031-9765-47bf-a6c4-9991ad87d1dc", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:31:59Z", "updated_at": "2020-12-14T02:31:59Z", "revision_number": 0, "project_id": "faa788ecb5924eeda5eb3cf7873c685c"}, {"id": "a81ae8f3-3213-49a9-a845-b7f5d8cd9057", "tenant_id": "faa788ecb5924eeda5eb3cf7873c685c", "security_group_id": "7b215031-9765-47bf-a6c4-9991ad87d1dc", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "7b215031-9765-47bf-a6c4-9991ad87d1dc", "description": null, "tags": [], "created_at": "2020-12-14T02:31:59Z", "updated_at": "2020-12-14T02:31:59Z", "revision_number": 0, "project_id": "faa788ecb5924eeda5eb3cf7873c685c"}, {"id": "d045a799-b473-4493-b756-9b9566fbc48a", "tenant_id": "faa788ecb5924eeda5eb3cf7873c685c", "security_group_id": "7b215031-9765-47bf-a6c4-9991ad87d1dc", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:31:59Z", "updated_at": "2020-12-14T02:31:59Z", "revision_number": 0, "project_id": "faa788ecb5924eeda5eb3cf7873c685c"}], "tags": [], "created_at": "2020-12-14T02:31:59Z", "updated_at": "2020-12-14T02:31:59Z", "revision_number": 1, "project_id": "faa788ecb5924eeda5eb3cf7873c685c"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:00.080 189 INFO tempest.lib.common.rest_client [req-6a1fb071-3f0d-44ca-b5ee-38941cef8657 ] Request (ImageNamespacesObjectsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/7b215031-9765-47bf-a6c4-9991ad87d1dc 0.156s 2020-12-14 02:32:00.083 189 DEBUG tempest.lib.common.rest_client [req-6a1fb071-3f0d-44ca-b5ee-38941cef8657 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6a1fb071-3f0d-44ca-b5ee-38941cef8657', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:00 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/7b215031-9765-47bf-a6c4-9991ad87d1dc'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:00.221 189 INFO tempest.lib.common.rest_client [req-ccc394b1-1254-40cf-bb42-fcb6bccd7558 ] Request (ImageNamespacesObjectsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c 0.132s 2020-12-14 02:32:00.224 189 DEBUG tempest.lib.common.rest_client [req-ccc394b1-1254-40cf-bb42-fcb6bccd7558 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ccc394b1-1254-40cf-bb42-fcb6bccd7558', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/faa788ecb5924eeda5eb3cf7873c685c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:00.339 189 INFO tempest.lib.common.rest_client [req-c5d85a10-dbdc-4570-bf42-526bb59ba2ab ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:32:00.341 189 DEBUG tempest.lib.common.rest_client [req-c5d85a10-dbdc-4570-bf42-526bb59ba2ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c5d85a10-dbdc-4570-bf42-526bb59ba2ab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["48sL7b8hTvKEnEWU4LGcrg"], "expires_at": "2020-12-14T03:32:00.000000Z", "issued_at": "2020-12-14T02:32:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:00.440 189 INFO tempest.lib.common.rest_client [req-c6cfa945-95b3-491a-8901-ecdb3f8c688c ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:32:00.442 189 DEBUG tempest.lib.common.rest_client [req-c6cfa945-95b3-491a-8901-ecdb3f8c688c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6cfa945-95b3-491a-8901-ecdb3f8c688c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["QE1SnaaeQ3mXnNpFCtIaWw"], "expires_at": "2020-12-14T03:32:00.000000Z", "issued_at": "2020-12-14T02:32:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:00.511 189 INFO tempest.lib.common.rest_client [req-34cd00c3-dc38-40ea-aba4-863fbf197d77 ] Request (ImageResourceTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.062s 2020-12-14 02:32:00.513 189 DEBUG tempest.lib.common.rest_client [req-34cd00c3-dc38-40ea-aba4-863fbf197d77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34cd00c3-dc38-40ea-aba4-863fbf197d77', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:00.605 189 INFO tempest.lib.common.rest_client [req-b633aaa6-4e06-4aa3-94e5-37ad0e52b096 ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.083s 2020-12-14 02:32:00.607 189 DEBUG tempest.lib.common.rest_client [req-b633aaa6-4e06-4aa3-94e5-37ad0e52b096 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImageResourceTypesRbacTest-1708810836-desc", "domain_id": "default", "name": "tempest-ImageResourceTypesRbacTest-1708810836"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b633aaa6-4e06-4aa3-94e5-37ad0e52b096', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "4d446b05e04045809f573ffd82b1ace2", "name": "tempest-ImageResourceTypesRbacTest-1708810836", "domain_id": "default", "description": "tempest-ImageResourceTypesRbacTest-1708810836-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:00.739 189 INFO tempest.lib.common.rest_client [req-adffea26-aa05-44d8-bd52-7ac38f2f3ed0 ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.124s 2020-12-14 02:32:00.742 189 DEBUG tempest.lib.common.rest_client [req-adffea26-aa05-44d8-bd52-7ac38f2f3ed0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImageResourceTypesRbacTest-1708810836", "password": "R6~wzJBGjDdgZeu", "project_id": "4d446b05e04045809f573ffd82b1ace2", "email": "tempest-ImageResourceTypesRbacTest-1516161121@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '408', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-adffea26-aa05-44d8-bd52-7ac38f2f3ed0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "4d446b05e04045809f573ffd82b1ace2", "email": "tempest-ImageResourceTypesRbacTest-1516161121@example.com", "id": "222028c408da432a8b22229f3c661bcb", "name": "tempest-ImageResourceTypesRbacTest-1708810836", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/222028c408da432a8b22229f3c661bcb"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:00.811 189 INFO tempest.lib.common.rest_client [req-50fe1295-8f98-4d5b-b7af-3317c80d1103 ] Request (ImageResourceTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:32:00.813 189 DEBUG tempest.lib.common.rest_client [req-50fe1295-8f98-4d5b-b7af-3317c80d1103 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-50fe1295-8f98-4d5b-b7af-3317c80d1103', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:00.886 189 INFO tempest.lib.common.rest_client [req-96e63477-63cc-49a6-b092-66b6719d7f1b ] Request (ImageResourceTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.065s 2020-12-14 02:32:00.888 189 DEBUG tempest.lib.common.rest_client [req-96e63477-63cc-49a6-b092-66b6719d7f1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96e63477-63cc-49a6-b092-66b6719d7f1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:00.974 189 INFO tempest.lib.common.rest_client [req-8ce69346-58ba-41b4-92cc-893564370732 ] Request (ImageResourceTypesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles/72a4576c553448cd941b052c1ca0cf2d 0.077s 2020-12-14 02:32:00.977 189 DEBUG tempest.lib.common.rest_client [req-8ce69346-58ba-41b4-92cc-893564370732 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ce69346-58ba-41b4-92cc-893564370732', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:00.980 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageResourceTypesRbacTest-1708810836', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4d446b05e04045809f573ffd82b1ace2', 'project_name': 'tempest-ImageResourceTypesRbacTest-1708810836', 'tenant_id': '4d446b05e04045809f573ffd82b1ace2', 'tenant_name': 'tempest-ImageResourceTypesRbacTest-1708810836', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '222028c408da432a8b22229f3c661bcb'}, Network: None, Subnet: None, Router: None 2020-12-14 02:32:00.982 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageResourceTypesRbacTest-1708810836', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4d446b05e04045809f573ffd82b1ace2', 'project_name': 'tempest-ImageResourceTypesRbacTest-1708810836', 'tenant_id': '4d446b05e04045809f573ffd82b1ace2', 'tenant_name': 'tempest-ImageResourceTypesRbacTest-1708810836', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '222028c408da432a8b22229f3c661bcb'}, Network: None, Subnet: None, Router: None 2020-12-14 02:32:01.154 189 INFO tempest.lib.common.rest_client [req-c7c83b34-584f-46fd-b62c-988f078235df ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-12-14 02:32:01.157 189 DEBUG tempest.lib.common.rest_client [req-c7c83b34-584f-46fd-b62c-988f078235df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6583', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7c83b34-584f-46fd-b62c-988f078235df', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "222028c408da432a8b22229f3c661bcb", "name": "tempest-ImageResourceTypesRbacTest-1708810836", "password_expires_at": null}, "audit_ids": ["E-i69JPnSNi4mMyb06l40A"], "expires_at": "2020-12-14T03:32:01.000000Z", "issued_at": "2020-12-14T02:32:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d446b05e04045809f573ffd82b1ace2", "name": "tempest-ImageResourceTypesRbacTest-1708810836"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:01.263 189 INFO tempest.lib.common.rest_client [req-0d944328-334d-4c1e-98c4-ccc7386131fd ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:32:01.267 189 DEBUG tempest.lib.common.rest_client [req-0d944328-334d-4c1e-98c4-ccc7386131fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d944328-334d-4c1e-98c4-ccc7386131fd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["77RSOz92RX--b8QsIkt55w"], "expires_at": "2020-12-14T03:32:01.000000Z", "issued_at": "2020-12-14T02:32:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:01.393 189 INFO tempest.lib.common.rest_client [req-918efe37-b2d6-40b0-97a0-e5e24ded2c73 ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.055s 2020-12-14 02:32:01.397 189 DEBUG tempest.lib.common.rest_client [req-918efe37-b2d6-40b0-97a0-e5e24ded2c73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-918efe37-b2d6-40b0-97a0-e5e24ded2c73', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["zCb-b1O6QPeVLQLO3k-r4A"], "expires_at": "2020-12-14T03:32:01.000000Z", "issued_at": "2020-12-14T02:32:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:01.469 189 INFO tempest.lib.common.rest_client [req-7540fcfa-3ecf-4254-945a-09a7bc8e1973 ] Request (ImageResourceTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.064s 2020-12-14 02:32:01.472 189 DEBUG tempest.lib.common.rest_client [req-7540fcfa-3ecf-4254-945a-09a7bc8e1973 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7540fcfa-3ecf-4254-945a-09a7bc8e1973', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:01.538 189 INFO tempest.lib.common.rest_client [req-b837621f-54ba-45c7-a496-568a4b752c86 ] Request (ImageResourceTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:32:01.540 189 DEBUG tempest.lib.common.rest_client [req-b837621f-54ba-45c7-a496-568a4b752c86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b837621f-54ba-45c7-a496-568a4b752c86', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:01.542 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:32:01.545 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:01.610 189 INFO tempest.lib.common.rest_client [req-ca066932-3239-42cb-b2e2-c5166b61e17b ] Request (ImageResourceTypesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles 0.060s 2020-12-14 02:32:01.612 189 DEBUG tempest.lib.common.rest_client [req-ca066932-3239-42cb-b2e2-c5166b61e17b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca066932-3239-42cb-b2e2-c5166b61e17b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:01.683 189 INFO tempest.lib.common.rest_client [req-0f28e342-9df2-4a5f-8c8e-221861f72680 ] Request (ImageResourceTypesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-12-14 02:32:01.684 189 DEBUG tempest.lib.common.rest_client [req-0f28e342-9df2-4a5f-8c8e-221861f72680 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f28e342-9df2-4a5f-8c8e-221861f72680', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:01.798 189 INFO tempest.lib.common.rest_client [req-a8cd4f04-5b31-4e5d-bf6a-d13f3781da2a ] Request (ImageResourceTypesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles/a629c95d64b3416fb80ae90af4f69c05 0.107s 2020-12-14 02:32:01.801 189 DEBUG tempest.lib.common.rest_client [req-a8cd4f04-5b31-4e5d-bf6a-d13f3781da2a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8cd4f04-5b31-4e5d-bf6a-d13f3781da2a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:02.929 189 INFO tempest.lib.common.rest_client [req-9b1c39a7-07e8-4988-a99f-491642c0f7c7 ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.119s 2020-12-14 02:32:02.933 189 DEBUG tempest.lib.common.rest_client [req-9b1c39a7-07e8-4988-a99f-491642c0f7c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b1c39a7-07e8-4988-a99f-491642c0f7c7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "222028c408da432a8b22229f3c661bcb", "name": "tempest-ImageResourceTypesRbacTest-1708810836", "password_expires_at": null}, "audit_ids": ["an9M5g1lTvqvUYpLj4rufQ"], "expires_at": "2020-12-14T03:32:02.000000Z", "issued_at": "2020-12-14T02:32:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d446b05e04045809f573ffd82b1ace2", "name": "tempest-ImageResourceTypesRbacTest-1708810836"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:03.124 189 INFO tempest.lib.common.rest_client [req-f94ad28f-664e-45e7-83de-06487c5196ed ] Request (ImageResourceTypesRbacTest:setUpClass): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces 0.181s 2020-12-14 02:32:03.127 189 DEBUG tempest.lib.common.rest_client [req-f94ad28f-664e-45e7-83de-06487c5196ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"namespace": "tempest-ImageResourceTypesRbacTest-test-ns-1302116222", "protected": false} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '369', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/metadefs/namespaces/tempest-ImageResourceTypesRbacTest-test-ns-1302116222', 'x-openstack-request-id': 'req-f94ad28f-664e-45e7-83de-06487c5196ed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces'} Body: b'{"namespace": "tempest-ImageResourceTypesRbacTest-test-ns-1302116222", "visibility": "private", "protected": false, "owner": "4d446b05e04045809f573ffd82b1ace2", "created_at": "2020-12-14T02:32:03Z", "updated_at": "2020-12-14T02:32:03Z", "self": "/v2/metadefs/namespaces/tempest-ImageResourceTypesRbacTest-test-ns-1302116222", "schema": "/v2/schemas/metadefs/namespace"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:03.134 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:03.139 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:32:03.147 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_metadef_resource_type_association, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:03.152 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:03.273 189 INFO tempest.lib.common.rest_client [req-a034f9bd-89f2-4d84-af26-e4e3581c74b6 ] Request (ImageResourceTypesRbacTest:test_add_metadef_resource_type): 200 GET http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles 0.114s 2020-12-14 02:32:03.277 189 DEBUG tempest.lib.common.rest_client [req-a034f9bd-89f2-4d84-af26-e4e3581c74b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a034f9bd-89f2-4d84-af26-e4e3581c74b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:03.327 189 INFO tempest.lib.common.rest_client [req-c6626554-792a-46ec-a451-e3cf25f6e7df ] Request (ImageResourceTypesRbacTest:test_add_metadef_resource_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:32:03.330 189 DEBUG tempest.lib.common.rest_client [req-c6626554-792a-46ec-a451-e3cf25f6e7df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6626554-792a-46ec-a451-e3cf25f6e7df', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "222028c408da432a8b22229f3c661bcb", "name": "tempest-ImageResourceTypesRbacTest-1708810836", "password_expires_at": null}, "audit_ids": ["xI9cRRvHRVelJMAoE84knw"], "expires_at": "2020-12-14T03:32:03.000000Z", "issued_at": "2020-12-14T02:32:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d446b05e04045809f573ffd82b1ace2", "name": "tempest-ImageResourceTypesRbacTest-1708810836"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:03.498 189 INFO tempest.lib.common.rest_client [req-4f6da180-78fe-4442-8f5c-19ed7d4be49e ] Request (ImageResourceTypesRbacTest:test_add_metadef_resource_type): 201 POST http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageResourceTypesRbacTest-test-ns-1302116222/resource_types 0.161s 2020-12-14 02:32:03.502 189 DEBUG tempest.lib.common.rest_client [req-4f6da180-78fe-4442-8f5c-19ed7d4be49e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-658594671"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '105', 'content-type': 'application/json', 'x-openstack-request-id': 'req-4f6da180-78fe-4442-8f5c-19ed7d4be49e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageResourceTypesRbacTest-test-ns-1302116222/resource_types'} Body: b'{"name": "tempest-658594671", "created_at": "2020-12-14T02:32:03Z", "updated_at": "2020-12-14T02:32:03Z"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:03.504 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:03.566 189 INFO tempest.lib.common.rest_client [req-d59e8e75-4144-4b23-a6f1-bacf29c4b47b ] Request (ImageResourceTypesRbacTest:test_add_metadef_resource_type): 200 GET http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles 0.057s 2020-12-14 02:32:03.569 189 DEBUG tempest.lib.common.rest_client [req-d59e8e75-4144-4b23-a6f1-bacf29c4b47b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d59e8e75-4144-4b23-a6f1-bacf29c4b47b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:03.622 189 INFO tempest.lib.common.rest_client [req-582322b5-66bb-4651-9bcd-c872fc14620c ] Request (ImageResourceTypesRbacTest:test_add_metadef_resource_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:32:03.626 189 DEBUG tempest.lib.common.rest_client [req-582322b5-66bb-4651-9bcd-c872fc14620c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-582322b5-66bb-4651-9bcd-c872fc14620c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "222028c408da432a8b22229f3c661bcb", "name": "tempest-ImageResourceTypesRbacTest-1708810836", "password_expires_at": null}, "audit_ids": ["PvCmuVrjT1yvpIVJD8oeWg"], "expires_at": "2020-12-14T03:32:03.000000Z", "issued_at": "2020-12-14T02:32:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d446b05e04045809f573ffd82b1ace2", "name": "tempest-ImageResourceTypesRbacTest-1708810836"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:03.640 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:03.646 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:32:03.656 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_metadef_resource_type, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:03.659 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:03.723 189 INFO tempest.lib.common.rest_client [req-155fe58b-5277-4cb9-b346-0f5a9fcd39de ] Request (ImageResourceTypesRbacTest:test_get_metadef_resource_type): 200 GET http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles 0.057s 2020-12-14 02:32:03.726 189 DEBUG tempest.lib.common.rest_client [req-155fe58b-5277-4cb9-b346-0f5a9fcd39de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-155fe58b-5277-4cb9-b346-0f5a9fcd39de', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:03.774 189 INFO tempest.lib.common.rest_client [req-5f5bc1ef-f228-4716-950c-2d9b6843fb8a ] Request (ImageResourceTypesRbacTest:test_get_metadef_resource_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:32:03.778 189 DEBUG tempest.lib.common.rest_client [req-5f5bc1ef-f228-4716-950c-2d9b6843fb8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f5bc1ef-f228-4716-950c-2d9b6843fb8a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "222028c408da432a8b22229f3c661bcb", "name": "tempest-ImageResourceTypesRbacTest-1708810836", "password_expires_at": null}, "audit_ids": ["MBunHXKmSneNwkkNhXynSg"], "expires_at": "2020-12-14T03:32:03.000000Z", "issued_at": "2020-12-14T02:32:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d446b05e04045809f573ffd82b1ace2", "name": "tempest-ImageResourceTypesRbacTest-1708810836"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:03.882 189 INFO tempest.lib.common.rest_client [req-8e3c685f-6d75-4770-bb99-807d26ef4115 ] Request (ImageResourceTypesRbacTest:test_get_metadef_resource_type): 200 GET http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageResourceTypesRbacTest-test-ns-1302116222/resource_types 0.095s 2020-12-14 02:32:03.886 189 DEBUG tempest.lib.common.rest_client [req-8e3c685f-6d75-4770-bb99-807d26ef4115 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-8e3c685f-6d75-4770-bb99-807d26ef4115', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageResourceTypesRbacTest-test-ns-1302116222/resource_types'} Body: b'{"resource_type_associations": [{"name": "tempest-658594671", "created_at": "2020-12-14T02:32:03Z", "updated_at": "2020-12-14T02:32:03Z"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:03.890 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:03.965 189 INFO tempest.lib.common.rest_client [req-ac46b7ce-f4f3-4473-95ff-6d3032f4fa80 ] Request (ImageResourceTypesRbacTest:test_get_metadef_resource_type): 200 GET http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles 0.069s 2020-12-14 02:32:03.968 189 DEBUG tempest.lib.common.rest_client [req-ac46b7ce-f4f3-4473-95ff-6d3032f4fa80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac46b7ce-f4f3-4473-95ff-6d3032f4fa80', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:04.019 189 INFO tempest.lib.common.rest_client [req-c5e6403c-2ffe-4a5e-8ab1-a6b83c836df1 ] Request (ImageResourceTypesRbacTest:test_get_metadef_resource_type): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:32:04.023 189 DEBUG tempest.lib.common.rest_client [req-c5e6403c-2ffe-4a5e-8ab1-a6b83c836df1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c5e6403c-2ffe-4a5e-8ab1-a6b83c836df1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "222028c408da432a8b22229f3c661bcb", "name": "tempest-ImageResourceTypesRbacTest-1708810836", "password_expires_at": null}, "audit_ids": ["T07aeiO5S7-zvmw-UOTbuw"], "expires_at": "2020-12-14T03:32:04.000000Z", "issued_at": "2020-12-14T02:32:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d446b05e04045809f573ffd82b1ace2", "name": "tempest-ImageResourceTypesRbacTest-1708810836"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:04.036 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:04.040 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:32:04.049 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: list_metadef_resource_types, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:04.052 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:04.179 189 INFO tempest.lib.common.rest_client [req-0d4e13f4-9073-45c1-8350-a8f88f0a7f42 ] Request (ImageResourceTypesRbacTest:test_list_metadef_resource_types): 200 GET http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles 0.120s 2020-12-14 02:32:04.182 189 DEBUG tempest.lib.common.rest_client [req-0d4e13f4-9073-45c1-8350-a8f88f0a7f42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d4e13f4-9073-45c1-8350-a8f88f0a7f42', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:04.292 189 INFO tempest.lib.common.rest_client [req-fbda7864-4f26-458f-b7ca-22c41c180b17 ] Request (ImageResourceTypesRbacTest:test_list_metadef_resource_types): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:32:04.295 189 DEBUG tempest.lib.common.rest_client [req-fbda7864-4f26-458f-b7ca-22c41c180b17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fbda7864-4f26-458f-b7ca-22c41c180b17', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "222028c408da432a8b22229f3c661bcb", "name": "tempest-ImageResourceTypesRbacTest-1708810836", "password_expires_at": null}, "audit_ids": ["Z52ygKIFR7mNEQZ9bp_jIw"], "expires_at": "2020-12-14T03:32:04.000000Z", "issued_at": "2020-12-14T02:32:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d446b05e04045809f573ffd82b1ace2", "name": "tempest-ImageResourceTypesRbacTest-1708810836"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:04.481 189 INFO tempest.lib.common.rest_client [req-43c93ed5-f621-4944-9d31-89aec12f77a9 ] Request (ImageResourceTypesRbacTest:test_list_metadef_resource_types): 200 GET http://172.30.13.94/image/v2/metadefs/resource_types 0.178s 2020-12-14 02:32:04.486 189 DEBUG tempest.lib.common.rest_client [req-43c93ed5-f621-4944-9d31-89aec12f77a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '31701', 'content-type': 'application/json', 'x-openstack-request-id': 'req-43c93ed5-f621-4944-9d31-89aec12f77a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/metadefs/resource_types'} Body: b'{"resource_types": [{"name": "OS::Glance::Image", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Cinder::Volume", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Nova::Flavor", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Nova::Aggregate", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Nova::Server", "created_at": "2020-10-07T11:57:58Z"}, {"name": "OS::Trove::Instance", "created_at": "2020-10-07T11:57:59Z"}, {"name": "tempest-353086331", "created_at": "2020-10-07T14:14:37Z", "updated_at": "2020-10-07T14:14:37Z"}, {"name": "tempest-1984004422", "created_at": "2020-10-07T14:30:19Z", "updated_at": "2020-10-07T14:30:19Z"}, {"name": "tempest-372173246", "created_at": "2020-10-07T14:49:22Z", "updated_at": "2020-10-07T14:49:22Z"}, {"name": "tempest-1164139581", "created_at": "2020-10-07T18:47:05Z", "updated_at": "2020-10-07T18:47:05Z"}, {"name": "tempest-993868956", "created_at": "2020-10-07T19:08:26Z", "updated_at": "2020-10-07T19:08:26Z"}, {"name": "tempest-272848155", "created_at": "2020-10-07T19:09:07Z", "updated_at": "2020-10-07T19:09:07Z"}, {"name": "tempest-1639040349", "created_at": "2020-10-08T06:37:04Z", "updated_at": "2020-10-08T06:37:04Z"}, {"name": "tempest-2908543", "created_at": "2020-10-08T07:02:30Z", "updated_at": "2020-10-08T07:02:30Z"}, {"name": "tempest-1856760566", "created_at": "2020-10-08T07:03:05Z", "updated_at": "2020-10-08T07:03:05Z"}, {"name": "tempest-1004252970", "created_at": "2020-10-08T08:19:46Z", "updated_at": "2020-10-08T08:19:46Z"}, {"name": "tempest-407059419", "created_at": "2020-10-08T08:33:34Z", "updated_at": "2020-10-08T08:33:34Z"}, {"name": "tempest-189587598", "created_at": "2020-10-08T08:35:59Z", "updated_at": "2020-10-08T08:35:59Z"}, {"name": "tempest-1704015896", "created_at": "2020-10-09T18:06:13Z", "updated_at": "2020-10-09T18:06:13Z"}, {"name": "tempest-1953541337", "created_at": "2020-10-09T18:17:00Z", "updated_at": "2020-10-09T18:17:00Z"}, {"name": "tempest-173577", "created_at": "2020-10-09T18:22:23Z", "updated_at": "2020-10-09T18:22:23Z"}, {"name": "tempest-333147695", "created_at": "2020-10-10T09:00:37Z", "updated_at": "2020-10-10T09:00:37Z"}, {"name": "tempest-1397311640", "created_at": "2020-10-10T09:36:16Z", "updated_at": "2020-10-10T09:36:16Z"}, {"name": "tempest-1935990982", "created_at": "2020-10-10T09:45:43Z", "updated_at": "2020-10-10T09:45:43Z"}, {"name": "tempest-455257376", "created_at": "2020-10-10T11:37:35Z", "updated_at": "2020-10-10T11:37:35Z"}, {"name": "tempest-304188733", "created_at": "2020-10-10T12:00:21Z", "updated_at": "2020-10-10T12:00:21Z"}, {"name": "tempest-2047170226", "created_at": "2020-10-10T12:04:22Z", "updated_at": "2020-10-10T12:04:22Z"}, {"name": "tempest-988388815", "created_at": "2020-10-10T13:30:05Z", "updated_at": "2020-10-10T13:30:05Z"}, {"name": "tempest-453722785", "created_at": "2020-10-10T13:54:03Z", "updated_at": "2020-10-10T13:54:03Z"}, {"name": "tempest-2101685032", "created_at": "2020-10-10T14:07:17Z", "updated_at": "2020-10-10T14:07:17Z"}, {"name": "tempest-487587532", "created_at": "2020-10-11T12:03:41Z", "updated_at": "2020-10-11T12:03:41Z"}, {"name": "tempest-92343007", "created_at": "2020-10-11T12:20:17Z", "updated_at": "2020-10-11T12:20:17Z"}, {"name": "tempest-1873204973", "created_at": "2020-10-11T12:37:23Z", "updated_at": "2020-10-11T12:37:23Z"}, {"name": "tempest-976247736", "created_at": "2020-10-12T14:24:39Z", "updated_at": "2020-10-12T14:24:39Z"}, {"name": "tempest-723114723", "created_at": "2020-10-12T14:30:01Z", "updated_at": "2020-10-12T14:30:01Z"}, {"name": "tempest-1242055933", "created_at": "2020-10-12T14:31:50Z", "updated_at": "2020-10-12T14:31:50Z"}, {"name": "tempest-1267333658", "created_at": "2020-10-16T17:36:11Z", "updated_at": "2020-10-16T17:36:11Z"}, {"name": "tempest-776499970", "created_at": "2020-10-16T17:54:29Z", "updated_at": "2020-10-16T17:54:29Z"}, {"name": "tempest-799976223", "created_at": "2020-10-16T17:59:18Z", "updated_at": "2020-10-16T17:59:18Z"}, {"name": "tempest-1471385054", "created_at": "2020-10-17T13:13:43Z", "updated_at": "2020-10-17T13:13:43Z"}, {"name": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:04.495 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:04.617 189 INFO tempest.lib.common.rest_client [req-040e32e9-717f-4f00-b3db-051c4e7c0f49 ] Request (ImageResourceTypesRbacTest:test_list_metadef_resource_types): 200 GET http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles 0.116s 2020-12-14 02:32:04.621 189 DEBUG tempest.lib.common.rest_client [req-040e32e9-717f-4f00-b3db-051c4e7c0f49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-040e32e9-717f-4f00-b3db-051c4e7c0f49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2/users/222028c408da432a8b22229f3c661bcb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:04.718 189 INFO tempest.lib.common.rest_client [req-b7327905-2c1e-4203-99b4-96fcb84bc625 ] Request (ImageResourceTypesRbacTest:test_list_metadef_resource_types): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:32:04.721 189 DEBUG tempest.lib.common.rest_client [req-b7327905-2c1e-4203-99b4-96fcb84bc625 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7327905-2c1e-4203-99b4-96fcb84bc625', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "222028c408da432a8b22229f3c661bcb", "name": "tempest-ImageResourceTypesRbacTest-1708810836", "password_expires_at": null}, "audit_ids": ["d7VjoIg1Q1Cnk5G1vYNduQ"], "expires_at": "2020-12-14T03:32:04.000000Z", "issued_at": "2020-12-14T02:32:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d446b05e04045809f573ffd82b1ace2", "name": "tempest-ImageResourceTypesRbacTest-1708810836"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d446b05e04045809f573ffd82b1ace2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:04.958 189 INFO tempest.lib.common.rest_client [req-eca697e5-c4b8-4397-ada2-9678fa139598 ] Request (ImageResourceTypesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageResourceTypesRbacTest-test-ns-1302116222 0.223s 2020-12-14 02:32:04.961 189 DEBUG tempest.lib.common.rest_client [req-eca697e5-c4b8-4397-ada2-9678fa139598 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-eca697e5-c4b8-4397-ada2-9678fa139598', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/metadefs/namespaces/tempest-ImageResourceTypesRbacTest-test-ns-1302116222'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:05.153 189 INFO tempest.lib.common.rest_client [req-64265ecc-e0ad-408d-a19a-502227627e55 ] Request (ImageResourceTypesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/222028c408da432a8b22229f3c661bcb 0.186s 2020-12-14 02:32:05.156 189 DEBUG tempest.lib.common.rest_client [req-64265ecc-e0ad-408d-a19a-502227627e55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-64265ecc-e0ad-408d-a19a-502227627e55', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/222028c408da432a8b22229f3c661bcb'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:05.254 189 INFO tempest.lib.common.rest_client [req-c6743960-f891-424a-8dc2-c335cb296524 ] Request (ImageResourceTypesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:32:05.256 189 DEBUG tempest.lib.common.rest_client [req-c6743960-f891-424a-8dc2-c335cb296524 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6743960-f891-424a-8dc2-c335cb296524', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["tEot0IH-RZO5nyR90vKs1w"], "expires_at": "2020-12-14T03:32:05.000000Z", "issued_at": "2020-12-14T02:32:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:05.602 189 INFO tempest.lib.common.rest_client [req-bf349cf6-ce9d-48af-af15-38ea7795f0a1 ] Request (ImageResourceTypesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4d446b05e04045809f573ffd82b1ace2&name=default 0.338s 2020-12-14 02:32:05.605 189 DEBUG tempest.lib.common.rest_client [req-bf349cf6-ce9d-48af-af15-38ea7795f0a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-bf349cf6-ce9d-48af-af15-38ea7795f0a1', 'date': 'Mon, 14 Dec 2020 02:32:05 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4d446b05e04045809f573ffd82b1ace2&name=default'} Body: b'{"security_groups": [{"id": "85e7fe82-c0fe-4dbe-ac73-19842884278e", "name": "default", "stateful": true, "tenant_id": "4d446b05e04045809f573ffd82b1ace2", "description": "Default security group", "security_group_rules": [{"id": "1f54352b-235e-4986-8ed3-2e1518aba374", "tenant_id": "4d446b05e04045809f573ffd82b1ace2", "security_group_id": "85e7fe82-c0fe-4dbe-ac73-19842884278e", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:32:05Z", "updated_at": "2020-12-14T02:32:05Z", "revision_number": 0, "project_id": "4d446b05e04045809f573ffd82b1ace2"}, {"id": "a3e28cdb-bf1f-44ae-b7f3-8f54ff940226", "tenant_id": "4d446b05e04045809f573ffd82b1ace2", "security_group_id": "85e7fe82-c0fe-4dbe-ac73-19842884278e", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "85e7fe82-c0fe-4dbe-ac73-19842884278e", "description": null, "tags": [], "created_at": "2020-12-14T02:32:05Z", "updated_at": "2020-12-14T02:32:05Z", "revision_number": 0, "project_id": "4d446b05e04045809f573ffd82b1ace2"}, {"id": "b4a2bcce-f466-4e70-adc2-fcfaa2a9e9b5", "tenant_id": "4d446b05e04045809f573ffd82b1ace2", "security_group_id": "85e7fe82-c0fe-4dbe-ac73-19842884278e", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:32:05Z", "updated_at": "2020-12-14T02:32:05Z", "revision_number": 0, "project_id": "4d446b05e04045809f573ffd82b1ace2"}, {"id": "bd34ae29-7f00-4d4c-91a8-c56af2275eec", "tenant_id": "4d446b05e04045809f573ffd82b1ace2", "security_group_id": "85e7fe82-c0fe-4dbe-ac73-19842884278e", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "85e7fe82-c0fe-4dbe-ac73-19842884278e", "description": null, "tags": [], "created_at": "2020-12-14T02:32:05Z", "updated_at": "2020-12-14T02:32:05Z", "revision_number": 0, "project_id": "4d446b05e04045809f573ffd82b1ace2"}], "tags": [], "created_at": "2020-12-14T02:32:05Z", "updated_at": "2020-12-14T02:32:05Z", "revision_number": 1, "project_id": "4d446b05e04045809f573ffd82b1ace2"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:05.751 189 INFO tempest.lib.common.rest_client [req-35d27ea0-409d-4618-960c-420baba5568d ] Request (ImageResourceTypesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/85e7fe82-c0fe-4dbe-ac73-19842884278e 0.139s 2020-12-14 02:32:05.754 189 DEBUG tempest.lib.common.rest_client [req-35d27ea0-409d-4618-960c-420baba5568d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-35d27ea0-409d-4618-960c-420baba5568d', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:05 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/85e7fe82-c0fe-4dbe-ac73-19842884278e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:05.952 189 INFO tempest.lib.common.rest_client [req-b60a8700-82f0-43f2-bdad-9fd37ab0e8fc ] Request (ImageResourceTypesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2 0.191s 2020-12-14 02:32:05.954 189 DEBUG tempest.lib.common.rest_client [req-b60a8700-82f0-43f2-bdad-9fd37ab0e8fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b60a8700-82f0-43f2-bdad-9fd37ab0e8fc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d446b05e04045809f573ffd82b1ace2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:06.075 189 INFO tempest.lib.common.rest_client [req-aa151271-11c7-4134-950d-3091b0476ebb ] Request (BasicOperationsImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:32:06.078 189 DEBUG tempest.lib.common.rest_client [req-aa151271-11c7-4134-950d-3091b0476ebb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa151271-11c7-4134-950d-3091b0476ebb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["FhvGjRa8QkeambInEbNJ6Q"], "expires_at": "2020-12-14T03:32:06.000000Z", "issued_at": "2020-12-14T02:32:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:06.185 189 INFO tempest.lib.common.rest_client [req-8970ac62-9f3a-4f93-b3f6-a7836e8068e7 ] Request (BasicOperationsImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:32:06.188 189 DEBUG tempest.lib.common.rest_client [req-8970ac62-9f3a-4f93-b3f6-a7836e8068e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8970ac62-9f3a-4f93-b3f6-a7836e8068e7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["llMuC5fNShyX0QMPj5F-jg"], "expires_at": "2020-12-14T03:32:06.000000Z", "issued_at": "2020-12-14T02:32:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:06.253 189 INFO tempest.lib.common.rest_client [req-f2ad5a32-113e-4b9c-a352-70d6d6dcb251 ] Request (BasicOperationsImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.058s 2020-12-14 02:32:06.255 189 DEBUG tempest.lib.common.rest_client [req-f2ad5a32-113e-4b9c-a352-70d6d6dcb251 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2ad5a32-113e-4b9c-a352-70d6d6dcb251', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:06.330 189 INFO tempest.lib.common.rest_client [req-4fb67217-640b-4486-b3f1-2569ed97c298 ] Request (BasicOperationsImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.068s 2020-12-14 02:32:06.333 189 DEBUG tempest.lib.common.rest_client [req-4fb67217-640b-4486-b3f1-2569ed97c298 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-BasicOperationsImagesRbacTest-735409845-desc", "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '394', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4fb67217-640b-4486-b3f1-2569ed97c298', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "domain_id": "default", "description": "tempest-BasicOperationsImagesRbacTest-735409845-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:06.454 189 INFO tempest.lib.common.rest_client [req-b92eef7e-2721-4651-9c22-f383d2a610a3 ] Request (BasicOperationsImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.113s 2020-12-14 02:32:06.456 189 DEBUG tempest.lib.common.rest_client [req-b92eef7e-2721-4651-9c22-f383d2a610a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-BasicOperationsImagesRbacTest-735409845", "password": "F7~br3PlBtsfSAv", "project_id": "fca221c07010486799d031a52c770f47", "email": "tempest-BasicOperationsImagesRbacTest-1601181297@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '413', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b92eef7e-2721-4651-9c22-f383d2a610a3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "fca221c07010486799d031a52c770f47", "email": "tempest-BasicOperationsImagesRbacTest-1601181297@example.com", "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/43c2db1e8ca4400f9e4650db298c804c"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:06.520 189 INFO tempest.lib.common.rest_client [req-6e7e0d25-6b26-4177-bd99-d7f15d083093 ] Request (BasicOperationsImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:32:06.523 189 DEBUG tempest.lib.common.rest_client [req-6e7e0d25-6b26-4177-bd99-d7f15d083093 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e7e0d25-6b26-4177-bd99-d7f15d083093', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:06.596 189 INFO tempest.lib.common.rest_client [req-e9d6d5f6-30af-44f7-9658-60812c5cf05d ] Request (BasicOperationsImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:32:06.599 189 DEBUG tempest.lib.common.rest_client [req-e9d6d5f6-30af-44f7-9658-60812c5cf05d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9d6d5f6-30af-44f7-9658-60812c5cf05d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:06.690 189 INFO tempest.lib.common.rest_client [req-5d873986-c2ae-4387-83cc-5a3f1a8bed4c ] Request (BasicOperationsImagesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles/72a4576c553448cd941b052c1ca0cf2d 0.082s 2020-12-14 02:32:06.692 189 DEBUG tempest.lib.common.rest_client [req-5d873986-c2ae-4387-83cc-5a3f1a8bed4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d873986-c2ae-4387-83cc-5a3f1a8bed4c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:06.695 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-BasicOperationsImagesRbacTest-735409845', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'fca221c07010486799d031a52c770f47', 'project_name': 'tempest-BasicOperationsImagesRbacTest-735409845', 'tenant_id': 'fca221c07010486799d031a52c770f47', 'tenant_name': 'tempest-BasicOperationsImagesRbacTest-735409845', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '43c2db1e8ca4400f9e4650db298c804c'}, Network: None, Subnet: None, Router: None 2020-12-14 02:32:06.697 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-BasicOperationsImagesRbacTest-735409845', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'fca221c07010486799d031a52c770f47', 'project_name': 'tempest-BasicOperationsImagesRbacTest-735409845', 'tenant_id': 'fca221c07010486799d031a52c770f47', 'tenant_name': 'tempest-BasicOperationsImagesRbacTest-735409845', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '43c2db1e8ca4400f9e4650db298c804c'}, Network: None, Subnet: None, Router: None 2020-12-14 02:32:06.875 189 INFO tempest.lib.common.rest_client [req-b919c958-a345-454d-afdc-6c488010d0f3 ] Request (BasicOperationsImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-12-14 02:32:06.878 189 DEBUG tempest.lib.common.rest_client [req-b919c958-a345-454d-afdc-6c488010d0f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6587', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b919c958-a345-454d-afdc-6c488010d0f3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["G4Yd4IKJQom4L-Ao4kYvOA"], "expires_at": "2020-12-14T03:32:06.000000Z", "issued_at": "2020-12-14T02:32:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "u _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:07.064 189 INFO tempest.lib.common.rest_client [req-645a3429-9b41-45d9-92d3-59a1e074395c ] Request (BasicOperationsImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.177s 2020-12-14 02:32:07.067 189 DEBUG tempest.lib.common.rest_client [req-645a3429-9b41-45d9-92d3-59a1e074395c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-645a3429-9b41-45d9-92d3-59a1e074395c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["7afbYmRnSB6C6SkzbxEEwA"], "expires_at": "2020-12-14T03:32:07.000000Z", "issued_at": "2020-12-14T02:32:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:07.158 189 INFO tempest.lib.common.rest_client [req-447cf08a-b963-40f5-9d97-80ec2eb20410 ] Request (BasicOperationsImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:32:07.160 189 DEBUG tempest.lib.common.rest_client [req-447cf08a-b963-40f5-9d97-80ec2eb20410 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-447cf08a-b963-40f5-9d97-80ec2eb20410', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["tupORkPqTriZ-hS8fWS8Ig"], "expires_at": "2020-12-14T03:32:07.000000Z", "issued_at": "2020-12-14T02:32:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:07.221 189 INFO tempest.lib.common.rest_client [req-f8a1885e-0e40-43e5-9b76-ffb69567adb5 ] Request (BasicOperationsImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.054s 2020-12-14 02:32:07.224 189 DEBUG tempest.lib.common.rest_client [req-f8a1885e-0e40-43e5-9b76-ffb69567adb5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f8a1885e-0e40-43e5-9b76-ffb69567adb5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:07.287 189 INFO tempest.lib.common.rest_client [req-dda9da8b-1262-4206-b412-cdb0656bd0ed ] Request (BasicOperationsImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-12-14 02:32:07.289 189 DEBUG tempest.lib.common.rest_client [req-dda9da8b-1262-4206-b412-cdb0656bd0ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dda9da8b-1262-4206-b412-cdb0656bd0ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:07.291 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:32:07.293 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:07.361 189 INFO tempest.lib.common.rest_client [req-c08c504e-e632-4f3e-8ab4-bb829fa59763 ] Request (BasicOperationsImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.063s 2020-12-14 02:32:07.363 189 DEBUG tempest.lib.common.rest_client [req-c08c504e-e632-4f3e-8ab4-bb829fa59763 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c08c504e-e632-4f3e-8ab4-bb829fa59763', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:07.440 189 INFO tempest.lib.common.rest_client [req-1617ba47-9df8-4c46-974e-3385e2641d20 ] Request (BasicOperationsImagesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles/72a4576c553448cd941b052c1ca0cf2d 0.071s 2020-12-14 02:32:07.441 189 DEBUG tempest.lib.common.rest_client [req-1617ba47-9df8-4c46-974e-3385e2641d20 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1617ba47-9df8-4c46-974e-3385e2641d20', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:07.538 189 INFO tempest.lib.common.rest_client [req-4caf497c-9633-4961-a30d-4a1aa4c9e15f ] Request (BasicOperationsImagesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles/a629c95d64b3416fb80ae90af4f69c05 0.092s 2020-12-14 02:32:07.539 189 DEBUG tempest.lib.common.rest_client [req-4caf497c-9633-4961-a30d-4a1aa4c9e15f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4caf497c-9633-4961-a30d-4a1aa4c9e15f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:08.649 189 INFO tempest.lib.common.rest_client [req-36087bd9-0f2e-475a-a731-aeb369c2f097 ] Request (BasicOperationsImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:32:08.652 189 DEBUG tempest.lib.common.rest_client [req-36087bd9-0f2e-475a-a731-aeb369c2f097 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36087bd9-0f2e-475a-a731-aeb369c2f097', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["bnKjP9jFRXSXfcLHD6b-FA"], "expires_at": "2020-12-14T03:32:08.000000Z", "issued_at": "2020-12-14T02:32:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:08.663 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:08.667 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:32:08.681 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: communitize_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:08.684 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:08.792 189 INFO tempest.lib.common.rest_client [req-02d3c96b-df4a-4f5d-a5d1-faa102ec5401 ] Request (BasicOperationsImagesRbacTest:test_communitize_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.103s 2020-12-14 02:32:08.795 189 DEBUG tempest.lib.common.rest_client [req-02d3c96b-df4a-4f5d-a5d1-faa102ec5401 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02d3c96b-df4a-4f5d-a5d1-faa102ec5401', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:08.845 189 INFO tempest.lib.common.rest_client [req-bfc4c181-b1d1-4b2a-ab40-141aaa60ffc2 ] Request (BasicOperationsImagesRbacTest:test_communitize_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:32:08.849 189 DEBUG tempest.lib.common.rest_client [req-bfc4c181-b1d1-4b2a-ab40-141aaa60ffc2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bfc4c181-b1d1-4b2a-ab40-141aaa60ffc2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["yszIffkXTeu71c6ki3MmQw"], "expires_at": "2020-12-14T03:32:08.000000Z", "issued_at": "2020-12-14T02:32:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:09.060 189 INFO tempest.lib.common.rest_client [req-7a1a3ee3-bbe7-48de-a78e-ab8123db7a5b ] Request (BasicOperationsImagesRbacTest:test_communitize_image): 201 POST http://172.30.13.94/image/v2/images 0.203s 2020-12-14 02:32:09.063 189 DEBUG tempest.lib.common.rest_client [req-7a1a3ee3-bbe7-48de-a78e-ab8123db7a5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-106337999", "container_format": "bare", "disk_format": "raw", "visibility": "community"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '663', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/fa1b2593-07e1-49e2-bc6b-bf2cf723956d', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-7a1a3ee3-bbe7-48de-a78e-ab8123db7a5b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-106337999", "disk_format": "raw", "container_format": "bare", "visibility": "community", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "fa1b2593-07e1-49e2-bc6b-bf2cf723956d", "created_at": "2020-12-14T02:32:09Z", "updated_at": "2020-12-14T02:32:09Z", "tags": [], "self": "/v2/images/fa1b2593-07e1-49e2-bc6b-bf2cf723956d", "file": "/v2/images/fa1b2593-07e1-49e2-bc6b-bf2cf723956d/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:09.066 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:09.139 189 INFO tempest.lib.common.rest_client [req-101aa6e9-bc0b-44a8-b563-143afff72309 ] Request (BasicOperationsImagesRbacTest:test_communitize_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.068s 2020-12-14 02:32:09.142 189 DEBUG tempest.lib.common.rest_client [req-101aa6e9-bc0b-44a8-b563-143afff72309 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-101aa6e9-bc0b-44a8-b563-143afff72309', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:09.194 189 INFO tempest.lib.common.rest_client [req-2f34e1b9-e861-49de-96ca-f2eaeea3b8fe ] Request (BasicOperationsImagesRbacTest:test_communitize_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:32:09.198 189 DEBUG tempest.lib.common.rest_client [req-2f34e1b9-e861-49de-96ca-f2eaeea3b8fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f34e1b9-e861-49de-96ca-f2eaeea3b8fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["bVADf2ipQmOubMJta5wgaA"], "expires_at": "2020-12-14T03:32:09.000000Z", "issued_at": "2020-12-14T02:32:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:09.212 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:09.216 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:32:09.224 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:09.227 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:09.293 189 INFO tempest.lib.common.rest_client [req-d3bd58d0-f809-4347-a890-064bcd8ace7f ] Request (BasicOperationsImagesRbacTest:test_create_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.060s 2020-12-14 02:32:09.297 189 DEBUG tempest.lib.common.rest_client [req-d3bd58d0-f809-4347-a890-064bcd8ace7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3bd58d0-f809-4347-a890-064bcd8ace7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:09.347 189 INFO tempest.lib.common.rest_client [req-8663b4e3-b903-4fbe-be27-390f581f6f56 ] Request (BasicOperationsImagesRbacTest:test_create_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:09.350 189 DEBUG tempest.lib.common.rest_client [req-8663b4e3-b903-4fbe-be27-390f581f6f56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8663b4e3-b903-4fbe-be27-390f581f6f56', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["YqNp9Z83T7KITY_lMShm7Q"], "expires_at": "2020-12-14T03:32:09.000000Z", "issued_at": "2020-12-14T02:32:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:09.498 189 INFO tempest.lib.common.rest_client [req-3141efec-813c-4e01-b7b6-6a2f58e87631 ] Request (BasicOperationsImagesRbacTest:test_create_image): 201 POST http://172.30.13.94/image/v2/images 0.141s 2020-12-14 02:32:09.500 189 DEBUG tempest.lib.common.rest_client [req-3141efec-813c-4e01-b7b6-6a2f58e87631 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-1329699915", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/724cee86-d23d-4cb3-8e5f-e7cd16365ee0', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-3141efec-813c-4e01-b7b6-6a2f58e87631', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-1329699915", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "724cee86-d23d-4cb3-8e5f-e7cd16365ee0", "created_at": "2020-12-14T02:32:09Z", "updated_at": "2020-12-14T02:32:09Z", "tags": [], "self": "/v2/images/724cee86-d23d-4cb3-8e5f-e7cd16365ee0", "file": "/v2/images/724cee86-d23d-4cb3-8e5f-e7cd16365ee0/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:09.503 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:09.564 189 INFO tempest.lib.common.rest_client [req-4ab63059-af2b-4861-9f71-c39d97ab8cc8 ] Request (BasicOperationsImagesRbacTest:test_create_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.056s 2020-12-14 02:32:09.567 189 DEBUG tempest.lib.common.rest_client [req-4ab63059-af2b-4861-9f71-c39d97ab8cc8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ab63059-af2b-4861-9f71-c39d97ab8cc8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:09.615 189 INFO tempest.lib.common.rest_client [req-de490e82-40b2-4286-956f-5a31b2b8f196 ] Request (BasicOperationsImagesRbacTest:test_create_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:32:09.619 189 DEBUG tempest.lib.common.rest_client [req-de490e82-40b2-4286-956f-5a31b2b8f196 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de490e82-40b2-4286-956f-5a31b2b8f196', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["esPASM3EQDOgYf-VmIvZ3Q"], "expires_at": "2020-12-14T03:32:09.000000Z", "issued_at": "2020-12-14T02:32:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:09.630 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:09.633 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:32:09.640 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:09.745 189 INFO tempest.lib.common.rest_client [req-26dc4fae-09f6-4481-8c5f-e00d161ec693 ] Request (BasicOperationsImagesRbacTest:test_create_image_tag): 201 POST http://172.30.13.94/image/v2/images 0.100s 2020-12-14 02:32:09.748 189 DEBUG tempest.lib.common.rest_client [req-26dc4fae-09f6-4481-8c5f-e00d161ec693 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-1158070592", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/d81e2176-8482-4ab5-b27d-48555d637a64', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-26dc4fae-09f6-4481-8c5f-e00d161ec693', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-1158070592", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "d81e2176-8482-4ab5-b27d-48555d637a64", "created_at": "2020-12-14T02:32:10Z", "updated_at": "2020-12-14T02:32:10Z", "tags": [], "self": "/v2/images/d81e2176-8482-4ab5-b27d-48555d637a64", "file": "/v2/images/d81e2176-8482-4ab5-b27d-48555d637a64/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:09.752 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:09.825 189 INFO tempest.lib.common.rest_client [req-9d3a5c46-bca5-4400-a957-942cd74d181e ] Request (BasicOperationsImagesRbacTest:test_create_image_tag): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.066s 2020-12-14 02:32:09.829 189 DEBUG tempest.lib.common.rest_client [req-9d3a5c46-bca5-4400-a957-942cd74d181e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9d3a5c46-bca5-4400-a957-942cd74d181e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:09.885 189 INFO tempest.lib.common.rest_client [req-cf55efac-7eab-42f0-af13-c71d6d19254e ] Request (BasicOperationsImagesRbacTest:test_create_image_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:32:09.889 189 DEBUG tempest.lib.common.rest_client [req-cf55efac-7eab-42f0-af13-c71d6d19254e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf55efac-7eab-42f0-af13-c71d6d19254e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["c5WP6NpDRhCa8XhoBsTz3g"], "expires_at": "2020-12-14T03:32:09.000000Z", "issued_at": "2020-12-14T02:32:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:10.025 189 INFO tempest.lib.common.rest_client [req-dd1349c3-a175-4b68-b878-30538ce5a1d9 ] Request (BasicOperationsImagesRbacTest:test_create_image_tag): 204 PUT http://172.30.13.94/image/v2/images/d81e2176-8482-4ab5-b27d-48555d637a64/tags/tempest-BasicOperationsImagesRbacTest-tag-44285739 0.127s 2020-12-14 02:32:10.029 189 DEBUG tempest.lib.common.rest_client [req-dd1349c3-a175-4b68-b878-30538ce5a1d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-dd1349c3-a175-4b68-b878-30538ce5a1d9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/d81e2176-8482-4ab5-b27d-48555d637a64/tags/tempest-BasicOperationsImagesRbacTest-tag-44285739'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:10.031 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:10.151 189 INFO tempest.lib.common.rest_client [req-00ae4e70-7a7e-417e-9b94-c53f7fe58929 ] Request (BasicOperationsImagesRbacTest:test_create_image_tag): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.113s 2020-12-14 02:32:10.155 189 DEBUG tempest.lib.common.rest_client [req-00ae4e70-7a7e-417e-9b94-c53f7fe58929 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-00ae4e70-7a7e-417e-9b94-c53f7fe58929', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:10.273 189 INFO tempest.lib.common.rest_client [req-5645fc7c-934a-4a77-94e5-42ee15f667ad ] Request (BasicOperationsImagesRbacTest:test_create_image_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-12-14 02:32:10.278 189 DEBUG tempest.lib.common.rest_client [req-5645fc7c-934a-4a77-94e5-42ee15f667ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5645fc7c-934a-4a77-94e5-42ee15f667ad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["3ieO0QI_RMG3fkqyB4oqdA"], "expires_at": "2020-12-14T03:32:10.000000Z", "issued_at": "2020-12-14T02:32:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:10.290 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:10.294 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:32:10.302 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: deactivate, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:10.595 189 INFO tempest.lib.common.rest_client [req-16573af6-d7b5-484c-a5ce-6aa24df18c40 ] Request (BasicOperationsImagesRbacTest:test_deactivate_image): 201 POST http://172.30.13.94/image/v2/images 0.286s 2020-12-14 02:32:10.599 189 DEBUG tempest.lib.common.rest_client [req-16573af6-d7b5-484c-a5ce-6aa24df18c40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-1165833564", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/7ccbe02d-8382-4271-b927-78dc43a7aac1', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-16573af6-d7b5-484c-a5ce-6aa24df18c40', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-1165833564", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "7ccbe02d-8382-4271-b927-78dc43a7aac1", "created_at": "2020-12-14T02:32:11Z", "updated_at": "2020-12-14T02:32:11Z", "tags": [], "self": "/v2/images/7ccbe02d-8382-4271-b927-78dc43a7aac1", "file": "/v2/images/7ccbe02d-8382-4271-b927-78dc43a7aac1/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:10.642 189 DEBUG patrole_tempest_plugin.tests.api.image.test_images_rbac [-] Image file content type _upload_image /usr/lib/python3.8/site-packages/patrole_tempest_plugin/tests/api/image/test_images_rbac.py:45 2020-12-14 02:32:11.067 189 INFO tempest.lib.common.rest_client [req-e0313dab-084b-4bc4-baaf-907abbc43afe ] Request (BasicOperationsImagesRbacTest:test_deactivate_image): 204 PUT http://172.30.13.94/image/v2/images/7ccbe02d-8382-4271-b927-78dc43a7aac1/file 0.418s 2020-12-14 02:32:11.070 189 DEBUG tempest.lib.common.rest_client [req-e0313dab-084b-4bc4-baaf-907abbc43afe ] Request - Headers: {'Content-Type': 'application/octet-stream', 'X-Auth-Token': ''} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-e0313dab-084b-4bc4-baaf-907abbc43afe', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/7ccbe02d-8382-4271-b927-78dc43a7aac1/file'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:11.072 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:11.186 189 INFO tempest.lib.common.rest_client [req-3f001e96-9c8b-4b5b-af18-54a50e210933 ] Request (BasicOperationsImagesRbacTest:test_deactivate_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.108s 2020-12-14 02:32:11.189 189 DEBUG tempest.lib.common.rest_client [req-3f001e96-9c8b-4b5b-af18-54a50e210933 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f001e96-9c8b-4b5b-af18-54a50e210933', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:11.241 189 INFO tempest.lib.common.rest_client [req-3eb7b486-ed78-4366-b99d-c82066939040 ] Request (BasicOperationsImagesRbacTest:test_deactivate_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:32:11.244 189 DEBUG tempest.lib.common.rest_client [req-3eb7b486-ed78-4366-b99d-c82066939040 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3eb7b486-ed78-4366-b99d-c82066939040', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["N8sR-tO7SR66M8JUugn4Bg"], "expires_at": "2020-12-14T03:32:11.000000Z", "issued_at": "2020-12-14T02:32:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:11.390 189 INFO tempest.lib.common.rest_client [req-0cb19267-eea8-4abc-89a7-15078f7889eb ] Request (BasicOperationsImagesRbacTest:test_deactivate_image): 204 POST http://172.30.13.94/image/v2/images/7ccbe02d-8382-4271-b927-78dc43a7aac1/actions/deactivate 0.139s 2020-12-14 02:32:11.393 189 DEBUG tempest.lib.common.rest_client [req-0cb19267-eea8-4abc-89a7-15078f7889eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-0cb19267-eea8-4abc-89a7-15078f7889eb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/7ccbe02d-8382-4271-b927-78dc43a7aac1/actions/deactivate'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:11.397 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:11.462 189 INFO tempest.lib.common.rest_client [req-b044b55b-5ea7-4faf-b16f-2cf3db9edd86 ] Request (BasicOperationsImagesRbacTest:test_deactivate_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.060s 2020-12-14 02:32:11.466 189 DEBUG tempest.lib.common.rest_client [req-b044b55b-5ea7-4faf-b16f-2cf3db9edd86 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b044b55b-5ea7-4faf-b16f-2cf3db9edd86', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:11.521 189 INFO tempest.lib.common.rest_client [req-1cbbd0ea-4d17-4008-9619-4ae6a493e2dd ] Request (BasicOperationsImagesRbacTest:test_deactivate_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:32:11.524 189 DEBUG tempest.lib.common.rest_client [req-1cbbd0ea-4d17-4008-9619-4ae6a493e2dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1cbbd0ea-4d17-4008-9619-4ae6a493e2dd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["C_o07rBlQpKd28ZaJzaT1Q"], "expires_at": "2020-12-14T03:32:11.000000Z", "issued_at": "2020-12-14T02:32:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:11.542 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:11.545 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:32:11.554 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:11.671 189 INFO tempest.lib.common.rest_client [req-e24ba060-88d8-41e7-9e3c-a5b989d99649 ] Request (BasicOperationsImagesRbacTest:test_delete_image): 201 POST http://172.30.13.94/image/v2/images 0.112s 2020-12-14 02:32:11.676 189 DEBUG tempest.lib.common.rest_client [req-e24ba060-88d8-41e7-9e3c-a5b989d99649 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-1523071213", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/9db1d093-9d48-494b-bdf9-66b9cbb6f19d', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-e24ba060-88d8-41e7-9e3c-a5b989d99649', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-1523071213", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "9db1d093-9d48-494b-bdf9-66b9cbb6f19d", "created_at": "2020-12-14T02:32:12Z", "updated_at": "2020-12-14T02:32:12Z", "tags": [], "self": "/v2/images/9db1d093-9d48-494b-bdf9-66b9cbb6f19d", "file": "/v2/images/9db1d093-9d48-494b-bdf9-66b9cbb6f19d/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:11.680 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:11.749 189 INFO tempest.lib.common.rest_client [req-4a8e88eb-841e-4572-8af4-fb3651bf5a87 ] Request (BasicOperationsImagesRbacTest:test_delete_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.062s 2020-12-14 02:32:11.752 189 DEBUG tempest.lib.common.rest_client [req-4a8e88eb-841e-4572-8af4-fb3651bf5a87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a8e88eb-841e-4572-8af4-fb3651bf5a87', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:11.815 189 INFO tempest.lib.common.rest_client [req-6ef1e19f-fdbd-444f-91f4-cd72148dc6cb ] Request (BasicOperationsImagesRbacTest:test_delete_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.055s 2020-12-14 02:32:11.818 189 DEBUG tempest.lib.common.rest_client [req-6ef1e19f-fdbd-444f-91f4-cd72148dc6cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ef1e19f-fdbd-444f-91f4-cd72148dc6cb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["x7-0fOvCTQGkXQ9JS3MBmA"], "expires_at": "2020-12-14T03:32:11.000000Z", "issued_at": "2020-12-14T02:32:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:11.964 189 INFO tempest.lib.common.rest_client [req-4a9b5386-c304-4350-8662-48a5d2323893 ] Request (BasicOperationsImagesRbacTest:test_delete_image): 204 DELETE http://172.30.13.94/image/v2/images/9db1d093-9d48-494b-bdf9-66b9cbb6f19d 0.138s 2020-12-14 02:32:11.969 189 DEBUG tempest.lib.common.rest_client [req-4a9b5386-c304-4350-8662-48a5d2323893 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-4a9b5386-c304-4350-8662-48a5d2323893', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/9db1d093-9d48-494b-bdf9-66b9cbb6f19d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:11.971 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:12.046 189 INFO tempest.lib.common.rest_client [req-77d5c85d-10b1-4f44-aa62-f1f409811cae ] Request (BasicOperationsImagesRbacTest:test_delete_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.069s 2020-12-14 02:32:12.048 189 DEBUG tempest.lib.common.rest_client [req-77d5c85d-10b1-4f44-aa62-f1f409811cae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-77d5c85d-10b1-4f44-aa62-f1f409811cae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:12.104 189 INFO tempest.lib.common.rest_client [req-0eecfdd5-6405-4b2d-8e72-995a7a4e2d63 ] Request (BasicOperationsImagesRbacTest:test_delete_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:32:12.108 189 DEBUG tempest.lib.common.rest_client [req-0eecfdd5-6405-4b2d-8e72-995a7a4e2d63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0eecfdd5-6405-4b2d-8e72-995a7a4e2d63', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["HwikHTDcR02ORKSOafdKOA"], "expires_at": "2020-12-14T03:32:12.000000Z", "issued_at": "2020-12-14T02:32:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:12.212 189 INFO tempest.lib.common.rest_client [req-bdde6c81-7e2b-4f40-962f-9470d2ac23ce ] Request (BasicOperationsImagesRbacTest:test_delete_image): 404 GET http://172.30.13.94/image/v2/images/9db1d093-9d48-494b-bdf9-66b9cbb6f19d 0.095s 2020-12-14 02:32:12.215 189 DEBUG tempest.lib.common.rest_client [req-bdde6c81-7e2b-4f40-962f-9470d2ac23ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-bdde6c81-7e2b-4f40-962f-9470d2ac23ce', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/9db1d093-9d48-494b-bdf9-66b9cbb6f19d'} Body: b'{"message": "No image found with ID 9db1d093-9d48-494b-bdf9-66b9cbb6f19d

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:12.228 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:12.232 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:32:12.241 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:12.302 189 INFO tempest.lib.common.rest_client [req-5863cacd-d664-4462-a386-393507ebab2d ] Request (BasicOperationsImagesRbacTest:test_delete_image_tag): 201 POST http://172.30.13.94/image/v2/images 0.055s 2020-12-14 02:32:12.305 189 DEBUG tempest.lib.common.rest_client [req-5863cacd-d664-4462-a386-393507ebab2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-1199856295", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/79050724-30b7-43ca-a61e-eb645b57d255', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-5863cacd-d664-4462-a386-393507ebab2d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-1199856295", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "79050724-30b7-43ca-a61e-eb645b57d255", "created_at": "2020-12-14T02:32:12Z", "updated_at": "2020-12-14T02:32:12Z", "tags": [], "self": "/v2/images/79050724-30b7-43ca-a61e-eb645b57d255", "file": "/v2/images/79050724-30b7-43ca-a61e-eb645b57d255/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:12.388 189 INFO tempest.lib.common.rest_client [req-9fe230f4-9bf1-4fbc-bf19-1084290a63c1 ] Request (BasicOperationsImagesRbacTest:test_delete_image_tag): 204 PUT http://172.30.13.94/image/v2/images/79050724-30b7-43ca-a61e-eb645b57d255/tags/tempest-BasicOperationsImagesRbacTest-tag-1126355152 0.076s 2020-12-14 02:32:12.390 189 DEBUG tempest.lib.common.rest_client [req-9fe230f4-9bf1-4fbc-bf19-1084290a63c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-9fe230f4-9bf1-4fbc-bf19-1084290a63c1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/79050724-30b7-43ca-a61e-eb645b57d255/tags/tempest-BasicOperationsImagesRbacTest-tag-1126355152'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:12.393 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:12.467 189 INFO tempest.lib.common.rest_client [req-2795d79e-42a2-4ee3-870c-f8483d85b7d0 ] Request (BasicOperationsImagesRbacTest:test_delete_image_tag): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.069s 2020-12-14 02:32:12.470 189 DEBUG tempest.lib.common.rest_client [req-2795d79e-42a2-4ee3-870c-f8483d85b7d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2795d79e-42a2-4ee3-870c-f8483d85b7d0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:12.526 189 INFO tempest.lib.common.rest_client [req-270ed1ae-4f58-4a51-8119-9179a3e2dfd4 ] Request (BasicOperationsImagesRbacTest:test_delete_image_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:32:12.530 189 DEBUG tempest.lib.common.rest_client [req-270ed1ae-4f58-4a51-8119-9179a3e2dfd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-270ed1ae-4f58-4a51-8119-9179a3e2dfd4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["w3_Oazs7QdmXLIKoRQ0t5A"], "expires_at": "2020-12-14T03:32:12.000000Z", "issued_at": "2020-12-14T02:32:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:12.665 189 INFO tempest.lib.common.rest_client [req-761cc5cb-74e9-41f5-bef9-b0d1dfc7b105 ] Request (BasicOperationsImagesRbacTest:test_delete_image_tag): 204 DELETE http://172.30.13.94/image/v2/images/79050724-30b7-43ca-a61e-eb645b57d255/tags/tempest-BasicOperationsImagesRbacTest-tag-1126355152 0.127s 2020-12-14 02:32:12.668 189 DEBUG tempest.lib.common.rest_client [req-761cc5cb-74e9-41f5-bef9-b0d1dfc7b105 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-761cc5cb-74e9-41f5-bef9-b0d1dfc7b105', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/79050724-30b7-43ca-a61e-eb645b57d255/tags/tempest-BasicOperationsImagesRbacTest-tag-1126355152'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:12.670 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:12.744 189 INFO tempest.lib.common.rest_client [req-4fa1430f-252f-481d-8ab7-866b7e7d2356 ] Request (BasicOperationsImagesRbacTest:test_delete_image_tag): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.069s 2020-12-14 02:32:12.747 189 DEBUG tempest.lib.common.rest_client [req-4fa1430f-252f-481d-8ab7-866b7e7d2356 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4fa1430f-252f-481d-8ab7-866b7e7d2356', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:12.805 189 INFO tempest.lib.common.rest_client [req-8464bbe7-c9ad-41a3-a30b-9d03c81de03a ] Request (BasicOperationsImagesRbacTest:test_delete_image_tag): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:32:12.809 189 DEBUG tempest.lib.common.rest_client [req-8464bbe7-c9ad-41a3-a30b-9d03c81de03a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8464bbe7-c9ad-41a3-a30b-9d03c81de03a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["bo_BFCaYRSOrb1kSOlWP5A"], "expires_at": "2020-12-14T03:32:12.000000Z", "issued_at": "2020-12-14T02:32:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:12.824 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:12.828 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:32:12.837 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: download_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:12.949 189 INFO tempest.lib.common.rest_client [req-b372f5a9-2142-41fe-a65b-e6a68df370d6 ] Request (BasicOperationsImagesRbacTest:test_download_image): 201 POST http://172.30.13.94/image/v2/images 0.106s 2020-12-14 02:32:12.953 189 DEBUG tempest.lib.common.rest_client [req-b372f5a9-2142-41fe-a65b-e6a68df370d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-1290704359", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/ad1faad5-e5dc-40c1-87c0-cb8f7b4aa2b8', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-b372f5a9-2142-41fe-a65b-e6a68df370d6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-1290704359", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "ad1faad5-e5dc-40c1-87c0-cb8f7b4aa2b8", "created_at": "2020-12-14T02:32:13Z", "updated_at": "2020-12-14T02:32:13Z", "tags": [], "self": "/v2/images/ad1faad5-e5dc-40c1-87c0-cb8f7b4aa2b8", "file": "/v2/images/ad1faad5-e5dc-40c1-87c0-cb8f7b4aa2b8/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:12.997 189 DEBUG patrole_tempest_plugin.tests.api.image.test_images_rbac [-] Image file content type _upload_image /usr/lib/python3.8/site-packages/patrole_tempest_plugin/tests/api/image/test_images_rbac.py:45 2020-12-14 02:32:13.246 189 INFO tempest.lib.common.rest_client [req-ca0d941d-0f91-4dca-8019-b946dcab2f45 ] Request (BasicOperationsImagesRbacTest:test_download_image): 204 PUT http://172.30.13.94/image/v2/images/ad1faad5-e5dc-40c1-87c0-cb8f7b4aa2b8/file 0.243s 2020-12-14 02:32:13.249 189 DEBUG tempest.lib.common.rest_client [req-ca0d941d-0f91-4dca-8019-b946dcab2f45 ] Request - Headers: {'Content-Type': 'application/octet-stream', 'X-Auth-Token': ''} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-ca0d941d-0f91-4dca-8019-b946dcab2f45', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/ad1faad5-e5dc-40c1-87c0-cb8f7b4aa2b8/file'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:13.251 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:13.329 189 INFO tempest.lib.common.rest_client [req-d5523f2b-5286-4983-924d-10a67332fbdb ] Request (BasicOperationsImagesRbacTest:test_download_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.071s 2020-12-14 02:32:13.332 189 DEBUG tempest.lib.common.rest_client [req-d5523f2b-5286-4983-924d-10a67332fbdb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5523f2b-5286-4983-924d-10a67332fbdb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:13.384 189 INFO tempest.lib.common.rest_client [req-aebc05f8-7d36-47fb-b880-29732dbaa9db ] Request (BasicOperationsImagesRbacTest:test_download_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:13.389 189 DEBUG tempest.lib.common.rest_client [req-aebc05f8-7d36-47fb-b880-29732dbaa9db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aebc05f8-7d36-47fb-b880-29732dbaa9db', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["0W1vOYZ9T16H9EGy5kOQIg"], "expires_at": "2020-12-14T03:32:13.000000Z", "issued_at": "2020-12-14T02:32:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:13.609 189 INFO tempest.lib.common.rest_client [req-bf98c021-d4fb-403b-9630-722e866bf941 ] Request (BasicOperationsImagesRbacTest:test_download_image): 200 GET http://172.30.13.94/image/v2/images/ad1faad5-e5dc-40c1-87c0-cb8f7b4aa2b8/file 0.213s 2020-12-14 02:32:13.612 189 DEBUG tempest.lib.common.rest_client [req-bf98c021-d4fb-403b-9630-722e866bf941 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/octet-stream', 'content-md5': 'd6a7aec3450d928a837b37fa083b7259', 'x-openstack-request-id': 'req-bf98c021-d4fb-403b-9630-722e866bf941', 'connection': 'close', 'transfer-encoding': 'chunked', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/ad1faad5-e5dc-40c1-87c0-cb8f7b4aa2b8/file'} Body: b'\x0b\x15\x9a\xe0L\xe1p\xcfMC\xab\xcf\xe0C\xeb2L\x0c\x9eXE\xa2\x9b5\xf8\x12\xe8\xffpF\x7f\xd8\xe1\xcf\xf3X\xac\xbdD%\xe7\x17xG\x8c\x0e\ts\xeb\x84Y\xe4\x84\xf95\xe0c\xf8\xe4\xea\xb1\x08q\x03\\l.\x93O\xbf\xcb.w\x17[\xaf;\x96\xe2\x0cIf\x8c\x16\x0c\xdbm)\xd7\xe7\xa8\xa8=j\xf6)\xbd\x90\xe3\x8bl&k\xcf\xd4\x9f\x86\x0b\x80\x00\xcd\xa6\x87\xc4\xe8\x95\xcfrE\'\xeda\xb2\xa6\x04\xa8\xce\x9b\x91\x16\x9c\xb7\x7f\xb4\r0\xa1\x1c\x1f&94\x93\x96X\x82\x01\xb6\xdbz79\x87\xacF9K}\xa5\xcd\x15j:\x1e\x88w\x1bG\xa6\xaeJf\x98\xfd\xbe\xbb\x93wE`\xa9\xa2\xbf1$\xa5\xab\xbd\x11\xe3\xbcH\xb8\x05"\xab\xaa\x19$W9\x17\x83}8\xd2\xb9\xe8\xa0\xc9\x04\xfb\xac\xbe\xde\x0b\xc7x\xe7\x83\x8e\x1b\x86\xb4#Rn\xce\xf7\x17\xedu\x15\xc9\xd1\x80\x13r\x18F\xf9\x9e\xb7\xd4\xbd\xe6\xa2h\xcd\xd8%\x85\xf1L\xf9\x14Y\xafk_\xa9g\x03\xa3\xaaQ=\x86YU\xfey\xaf%@\x90\xd5i\xaa.\x8c\'\xc6\xae!\xff\x14\x93\xca\x98@%\xbf\x9bnt9\xd8\xc11\xfe\'\xff\xf7\xdc\xe9n\n\xb0\x84v\x15\xc3\x13\xa7\xf1\x99\x99\xd7\xe22\x08m\xd8H\x11\xfab\x8e\x86\xd7\x1a\r`\xf3v\xb7\x941\xdd\xcf3I\xd6\xe1x\x98\xf20\x7f\xb0~\xc4\x8c\x96\x9e\xce\xc6\x8a\x12,\x86\xa8s\xb9\x00\xf2\x02\xea\xcc\xf9\xea\x16\x05C\xe1\x9a#\xa9@;\xb5\r{r&\x17\xdf\xe3\xfb\xc8:\x8fB\xe3n\x87\xc6\xf80-q!!0#}\x85\x84^\x9f\x93[\xbf\xb5t\xab\x8b5\x14\xf5=]\xb3FT\x81\xcd\x9a9\'\xb2\x9dz\xc8\x1a\xa96\xeb\xa8(\xfe\x97\xdaM?T\x08\x86\xd8\xe5\xf1d\xc6\x98\xb9\xbd!ib\xb7(\xfb\x9b,\xe3\x91\xa8\x9f\xf4\x02\x97o\xd0\xaf\xe3\xea38\x1d\xab:DcBT\xa8=\xf8E\xaf\xd0gm\x12:\x16\x16\x82xg\xa9\xf5E\xa5\rJ\x95{:\x05\x88\x06;\n4\xa8}e!\xc0T\xd5N\xea\xa2M\x16\x0c\xedO$\x068[\xc8\xce\xbb\x16RR$ie\x96\xd7\x18\'\xf6\x0c\xbb\xba\x9e\xbbC\x03K:\xa9O\xc2\x05\xb2\xec\xea\xa5\x1f\xa3\x04\xe7\xb9\x9d.\xf8\xe9\x13\x88\xc5/\xdd\xd7\x08>\xdd)\x19\xa5Oh\x90\x1e\xce\xebY\xe1\x18\xfd\xe0\x0e=\xe7M\x80\'\xea\x04Z/\xdf\t\x89\\m\xd3\xef)\x7f\xd5wLc\xa2H\xda\x93\'\xa0G*X\xee\xce\xf7\xf8\xb1?\xda)\xd7\xcd\xb3l:\xd3=\xd0\xb3\x07\xb8Y\xb1\x016\x16\xf3\xe8t\x97ZDg\x90F/1i\x11A0]\xae8zGBDOl\x0b\xac\xd489K\x1b\x07\xcd\x1f\xe2e \xc8(ry\xfe\xcb(i!\x9d\xf4\xca\xd2\xf3\x15\xd1\x83\x1b-sG\x17\xc7I\x16\x84L@(\x0e \xe8\xd4}\xdd\xb4\x86\x00\x10\x82\x1e\xf1\xaa\xc1h\x9e\xec\xf6\x8f\xd3\x12\x0c\xbf\xed\x8b\xc3QK\x16\xcd\xe2*T\x1d\\\xec2s\x7f\xe4\x9a\xfd\x03a\xea5\xa5\x86%\x12\x12\xe4\tC\x00\xef \x8d\x8a~\x99\x85:\x85(+\xe87Y\n\t\xf7\xd7\x8f\xbcBb\x8d\xa4\xd9\xd9\xcfR\xf2w\x185\x19\x07\x82\xc9\xa86G\xf7J\xc5\x01\x97\x8b\x11\xee\xb8\x1c\xe5\x14\xba]\xdd\xec\xc5h\x02`\x9a\x05\xcc0Fo67\x8a\x02J\xd2\x1c\xce\x83Fl\xa7/QD\xa4\xf9f\xc8\xf0&E;\x84\xee/\xeb`\xbb\x94\xe9\x11{KQ\xbb\xc7\r\xee\x81 IU\xfd\xb7\xd0\x06\xd3\x80d\xed\x91\xd3\xd4e\xd7\x8beL3\x97\xaa\xe1\x90\xd4\xe6\xa0U\xcbK\xea\xbaf\x86"4\xbbPp\xc2\xcf\x08\xf2L\xf7\x9e\x08\xf0o\xc5Jv\xe2\xc9\r\x92\xa7\x14-\x14\x80<\x99\xc2\xaf1@\x95\x8a?\x1c\xf5<\x16\x83aU8\xd2\x15\x99\xef\xb6\x92\'\x8d\x88_q~\x0f\xed\x16\xe0\xc3MZX\xb7H,\xab\xc9=\xe0I[\xd2\x16\x13El\xa7\xa0\xccg9\xd5M\xa7\x0bE\x8a\t\nS\x11\xe5\x16\xf3Ra\xd4<\xec\xfd\x1a\xdds\x1f|\xab*' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:13.615 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:13.684 189 INFO tempest.lib.common.rest_client [req-b7c7975f-fefd-4816-bcb4-964dfb62e013 ] Request (BasicOperationsImagesRbacTest:test_download_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.063s 2020-12-14 02:32:13.688 189 DEBUG tempest.lib.common.rest_client [req-b7c7975f-fefd-4816-bcb4-964dfb62e013 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7c7975f-fefd-4816-bcb4-964dfb62e013', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:13.739 189 INFO tempest.lib.common.rest_client [req-ae33cf41-535f-4e6b-8da1-431cc78c5838 ] Request (BasicOperationsImagesRbacTest:test_download_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:32:13.744 189 DEBUG tempest.lib.common.rest_client [req-ae33cf41-535f-4e6b-8da1-431cc78c5838 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae33cf41-535f-4e6b-8da1-431cc78c5838', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["YpUjKoiaRb2DUCaL3rvnzw"], "expires_at": "2020-12-14T03:32:13.000000Z", "issued_at": "2020-12-14T02:32:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:13.759 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:13.763 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:32:13.772 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_images, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:13.775 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:13.846 189 INFO tempest.lib.common.rest_client [req-31fe2090-3cec-4ac6-a0ca-e7c3e7916705 ] Request (BasicOperationsImagesRbacTest:test_list_images): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.065s 2020-12-14 02:32:13.850 189 DEBUG tempest.lib.common.rest_client [req-31fe2090-3cec-4ac6-a0ca-e7c3e7916705 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31fe2090-3cec-4ac6-a0ca-e7c3e7916705', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:13.901 189 INFO tempest.lib.common.rest_client [req-e47ccd04-fcc5-4d7c-9d77-26341fdffea6 ] Request (BasicOperationsImagesRbacTest:test_list_images): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:13.904 189 DEBUG tempest.lib.common.rest_client [req-e47ccd04-fcc5-4d7c-9d77-26341fdffea6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e47ccd04-fcc5-4d7c-9d77-26341fdffea6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["MQ6kyddIQLmw1NIZPpRjNA"], "expires_at": "2020-12-14T03:32:13.000000Z", "issued_at": "2020-12-14T02:32:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:14.022 189 INFO tempest.lib.common.rest_client [req-3212d821-ee0f-45c3-8209-3430e1b36459 ] Request (BasicOperationsImagesRbacTest:test_list_images): 200 GET http://172.30.13.94/image/v2/images 0.109s 2020-12-14 02:32:14.027 189 DEBUG tempest.lib.common.rest_client [req-3212d821-ee0f-45c3-8209-3430e1b36459 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '14476', 'content-type': 'application/json', 'x-openstack-request-id': 'req-3212d821-ee0f-45c3-8209-3430e1b36459', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"images": [{"name": "tempest-BasicOperationsImagesRbacTest-Image-1290704359", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": 1024, "virtual_size": 1024, "status": "active", "checksum": "d6a7aec3450d928a837b37fa083b7259", "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": "sha512", "os_hash_value": "f04dee79664150d2418a69ed92356bcee9fedc81f4684070359c0347d6ea910ab020e42d44c0ac3b014ef897d487aebec18f0ce267c2ed84f65c24bec0b287bb", "id": "ad1faad5-e5dc-40c1-87c0-cb8f7b4aa2b8", "created_at": "2020-12-14T02:32:13Z", "updated_at": "2020-12-14T02:32:13Z", "tags": [], "self": "/v2/images/ad1faad5-e5dc-40c1-87c0-cb8f7b4aa2b8", "file": "/v2/images/ad1faad5-e5dc-40c1-87c0-cb8f7b4aa2b8/file", "schema": "/v2/schemas/image"}, {"name": "tempest-BasicOperationsImagesRbacTest-Image-1199856295", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "79050724-30b7-43ca-a61e-eb645b57d255", "created_at": "2020-12-14T02:32:12Z", "updated_at": "2020-12-14T02:32:13Z", "tags": [], "self": "/v2/images/79050724-30b7-43ca-a61e-eb645b57d255", "file": "/v2/images/79050724-30b7-43ca-a61e-eb645b57d255/file", "schema": "/v2/schemas/image"}, {"name": "tempest-BasicOperationsImagesRbacTest-Image-1165833564", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": 1024, "virtual_size": 1024, "status": "deactivated", "checksum": "6bd834ecaef626175ee4487f1012f025", "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": "sha512", "os_hash_value": "c6e3b1d3ad10c288d658c1732f66872f7ce8b64ad5e87773ed97906f9a566f41fb155daf9a2ae17f4038e8f2d536743697cbb6950e45ddfd2bc0a328cca9bfc2", "id": "7ccbe02d-8382-4271-b927-78dc43a7aac1", "created_at": "2020-12-14T02:32:11Z", "updated_at": "2020-12-14T02:32:11Z", "tags": [], "self": "/v2/images/7ccbe02d-8382-4271-b927-78dc43a7aac1", "file": "/v2/images/7ccbe02d-8382-4271-b927-78dc43a7aac1/file", "schema": "/v2/schemas/image"}, {"name": "tempest-BasicOperationsImagesRbacTest-Image-1158070592", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "d81e2176-8482-4ab5-b27d-48555d637a64", "created_at": "2020-12-14T02:32:10Z", "updated_at": "2020-12-14T02:32:10Z", "tags": ["tempest-BasicOperationsImagesRbacTest-tag-44285739"], "self": "/v2/images/d81e2176-8482-4ab5-b27d-48555d637a64", "file": "/v2/images/d81e2176-8482-4ab5-b27d-48555d637a64/file", "schema": "/v2/schemas/image"}, {"name": "tempest-BasicOperationsImagesRbacTest-Image-106337999", "disk_format": "raw", "container_format": "bare", "visibility": "community", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "fa1b2593-07e1-49e2-bc6b-bf2cf723956d", "created_at": "2020-12-14T02:32:09Z", "updated_at": "2020-12-14T02:32:09Z", "tags": [], "self": "/v2/images/fa1b2593-07e1-49e2-bc6b-bf2cf723956d", "file": "/v2/images/fa1b2593-07e1-49e2-bc6b-bf2cf723956d/file", "schema": "/v2/schemas/image"}, {"name": "tempest-BasicOperationsImagesRbacTest-Image-1329699915", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "724cee8 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:14.033 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:14.102 189 INFO tempest.lib.common.rest_client [req-1dfaedf7-0875-44da-99b8-03d48287cd2c ] Request (BasicOperationsImagesRbacTest:test_list_images): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.063s 2020-12-14 02:32:14.105 189 DEBUG tempest.lib.common.rest_client [req-1dfaedf7-0875-44da-99b8-03d48287cd2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1dfaedf7-0875-44da-99b8-03d48287cd2c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:14.164 189 INFO tempest.lib.common.rest_client [req-b63d8765-2a48-4124-9271-bfef549f0c2b ] Request (BasicOperationsImagesRbacTest:test_list_images): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:32:14.169 189 DEBUG tempest.lib.common.rest_client [req-b63d8765-2a48-4124-9271-bfef549f0c2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b63d8765-2a48-4124-9271-bfef549f0c2b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["ZmQDWqXIR3iTLT2m-VPAdQ"], "expires_at": "2020-12-14T03:32:14.000000Z", "issued_at": "2020-12-14T02:32:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:14.183 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:14.187 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:32:14.194 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: publicize_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:14.196 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:14.264 189 INFO tempest.lib.common.rest_client [req-8f606807-7ecd-4545-9066-0887ef098369 ] Request (BasicOperationsImagesRbacTest:test_publicize_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.062s 2020-12-14 02:32:14.268 189 DEBUG tempest.lib.common.rest_client [req-8f606807-7ecd-4545-9066-0887ef098369 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f606807-7ecd-4545-9066-0887ef098369', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:14.320 189 INFO tempest.lib.common.rest_client [req-646a2b0c-b352-485b-af3a-edda55fb5ffe ] Request (BasicOperationsImagesRbacTest:test_publicize_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:32:14.323 189 DEBUG tempest.lib.common.rest_client [req-646a2b0c-b352-485b-af3a-edda55fb5ffe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-646a2b0c-b352-485b-af3a-edda55fb5ffe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["qLY2oocyQUWiJZOpn2zJpg"], "expires_at": "2020-12-14T03:32:14.000000Z", "issued_at": "2020-12-14T02:32:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:14.437 189 INFO tempest.lib.common.rest_client [req-a4ff08f3-84e9-435b-b44a-7b61ed7ee21a ] Request (BasicOperationsImagesRbacTest:test_publicize_image): 201 POST http://172.30.13.94/image/v2/images 0.106s 2020-12-14 02:32:14.440 189 DEBUG tempest.lib.common.rest_client [req-a4ff08f3-84e9-435b-b44a-7b61ed7ee21a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-824344182", "container_format": "bare", "disk_format": "raw", "visibility": "public"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '660', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/235cf908-b6fc-45e3-ae7b-8e96e2b4214e', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-a4ff08f3-84e9-435b-b44a-7b61ed7ee21a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-824344182", "disk_format": "raw", "container_format": "bare", "visibility": "public", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "235cf908-b6fc-45e3-ae7b-8e96e2b4214e", "created_at": "2020-12-14T02:32:14Z", "updated_at": "2020-12-14T02:32:14Z", "tags": [], "self": "/v2/images/235cf908-b6fc-45e3-ae7b-8e96e2b4214e", "file": "/v2/images/235cf908-b6fc-45e3-ae7b-8e96e2b4214e/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:14.443 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:14.512 189 INFO tempest.lib.common.rest_client [req-a2584ca0-5e4a-450b-b57b-b10d978a9c68 ] Request (BasicOperationsImagesRbacTest:test_publicize_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.063s 2020-12-14 02:32:14.515 189 DEBUG tempest.lib.common.rest_client [req-a2584ca0-5e4a-450b-b57b-b10d978a9c68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2584ca0-5e4a-450b-b57b-b10d978a9c68', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:14.565 189 INFO tempest.lib.common.rest_client [req-a43c209b-2a3f-4cc7-bc20-f64b6ac47f41 ] Request (BasicOperationsImagesRbacTest:test_publicize_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:32:14.568 189 DEBUG tempest.lib.common.rest_client [req-a43c209b-2a3f-4cc7-bc20-f64b6ac47f41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a43c209b-2a3f-4cc7-bc20-f64b6ac47f41', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["YFEjB8M1ToGQqkn7bX8zsw"], "expires_at": "2020-12-14T03:32:14.000000Z", "issued_at": "2020-12-14T02:32:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:14.583 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:14.587 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:32:14.599 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: reactivate, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:14.705 189 INFO tempest.lib.common.rest_client [req-44039da9-de42-44f3-8ffa-ae199dbf7784 ] Request (BasicOperationsImagesRbacTest:test_reactivate_image): 201 POST http://172.30.13.94/image/v2/images 0.099s 2020-12-14 02:32:14.709 189 DEBUG tempest.lib.common.rest_client [req-44039da9-de42-44f3-8ffa-ae199dbf7784 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-2053671933", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/fc590b3f-c831-48a2-863e-abb3fd74fa10', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-44039da9-de42-44f3-8ffa-ae199dbf7784', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-2053671933", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "fc590b3f-c831-48a2-863e-abb3fd74fa10", "created_at": "2020-12-14T02:32:15Z", "updated_at": "2020-12-14T02:32:15Z", "tags": [], "self": "/v2/images/fc590b3f-c831-48a2-863e-abb3fd74fa10", "file": "/v2/images/fc590b3f-c831-48a2-863e-abb3fd74fa10/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:14.754 189 DEBUG patrole_tempest_plugin.tests.api.image.test_images_rbac [-] Image file content type _upload_image /usr/lib/python3.8/site-packages/patrole_tempest_plugin/tests/api/image/test_images_rbac.py:45 2020-12-14 02:32:14.997 189 INFO tempest.lib.common.rest_client [req-fb2939c8-59d5-4710-8321-99831ea4a1af ] Request (BasicOperationsImagesRbacTest:test_reactivate_image): 204 PUT http://172.30.13.94/image/v2/images/fc590b3f-c831-48a2-863e-abb3fd74fa10/file 0.237s 2020-12-14 02:32:15.001 189 DEBUG tempest.lib.common.rest_client [req-fb2939c8-59d5-4710-8321-99831ea4a1af ] Request - Headers: {'Content-Type': 'application/octet-stream', 'X-Auth-Token': ''} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-fb2939c8-59d5-4710-8321-99831ea4a1af', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/fc590b3f-c831-48a2-863e-abb3fd74fa10/file'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:15.005 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:15.069 189 INFO tempest.lib.common.rest_client [req-eee84648-2017-4538-b16c-9e32342e4de1 ] Request (BasicOperationsImagesRbacTest:test_reactivate_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.058s 2020-12-14 02:32:15.073 189 DEBUG tempest.lib.common.rest_client [req-eee84648-2017-4538-b16c-9e32342e4de1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eee84648-2017-4538-b16c-9e32342e4de1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:15.121 189 INFO tempest.lib.common.rest_client [req-88a442c6-c3da-4a5b-9341-735fca1c87ce ] Request (BasicOperationsImagesRbacTest:test_reactivate_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:32:15.125 189 DEBUG tempest.lib.common.rest_client [req-88a442c6-c3da-4a5b-9341-735fca1c87ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88a442c6-c3da-4a5b-9341-735fca1c87ce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["c_5BYSDoSG-yiChpVmAtJw"], "expires_at": "2020-12-14T03:32:15.000000Z", "issued_at": "2020-12-14T02:32:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:15.222 189 INFO tempest.lib.common.rest_client [req-aa6161d5-a02a-422e-a10c-cbc267723bd0 ] Request (BasicOperationsImagesRbacTest:test_reactivate_image): 204 POST http://172.30.13.94/image/v2/images/fc590b3f-c831-48a2-863e-abb3fd74fa10/actions/reactivate 0.088s 2020-12-14 02:32:15.226 189 DEBUG tempest.lib.common.rest_client [req-aa6161d5-a02a-422e-a10c-cbc267723bd0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-aa6161d5-a02a-422e-a10c-cbc267723bd0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/fc590b3f-c831-48a2-863e-abb3fd74fa10/actions/reactivate'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:15.229 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:15.299 189 INFO tempest.lib.common.rest_client [req-8a52370c-2878-40b1-9e84-102a9c63211d ] Request (BasicOperationsImagesRbacTest:test_reactivate_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.063s 2020-12-14 02:32:15.303 189 DEBUG tempest.lib.common.rest_client [req-8a52370c-2878-40b1-9e84-102a9c63211d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a52370c-2878-40b1-9e84-102a9c63211d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:15.352 189 INFO tempest.lib.common.rest_client [req-83e51c11-898e-4d4c-bb0c-82c48597ac2e ] Request (BasicOperationsImagesRbacTest:test_reactivate_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:32:15.355 189 DEBUG tempest.lib.common.rest_client [req-83e51c11-898e-4d4c-bb0c-82c48597ac2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83e51c11-898e-4d4c-bb0c-82c48597ac2e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["KcXZ7IAVRguLT6c37DdRXg"], "expires_at": "2020-12-14T03:32:15.000000Z", "issued_at": "2020-12-14T02:32:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:15.370 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:15.374 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:32:15.384 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:15.488 189 INFO tempest.lib.common.rest_client [req-e8b89148-982a-4952-aa06-54bb3427de1a ] Request (BasicOperationsImagesRbacTest:test_show_image): 201 POST http://172.30.13.94/image/v2/images 0.098s 2020-12-14 02:32:15.492 189 DEBUG tempest.lib.common.rest_client [req-e8b89148-982a-4952-aa06-54bb3427de1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-413267044", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '660', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/72ca6858-d90d-4cdb-8c15-bec07c611c44', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-e8b89148-982a-4952-aa06-54bb3427de1a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-413267044", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "72ca6858-d90d-4cdb-8c15-bec07c611c44", "created_at": "2020-12-14T02:32:15Z", "updated_at": "2020-12-14T02:32:15Z", "tags": [], "self": "/v2/images/72ca6858-d90d-4cdb-8c15-bec07c611c44", "file": "/v2/images/72ca6858-d90d-4cdb-8c15-bec07c611c44/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:15.495 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:15.561 189 INFO tempest.lib.common.rest_client [req-cbbc1b6c-dddc-46fb-bf62-897c719c98e7 ] Request (BasicOperationsImagesRbacTest:test_show_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.059s 2020-12-14 02:32:15.564 189 DEBUG tempest.lib.common.rest_client [req-cbbc1b6c-dddc-46fb-bf62-897c719c98e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cbbc1b6c-dddc-46fb-bf62-897c719c98e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:15.617 189 INFO tempest.lib.common.rest_client [req-35f292ac-f85f-4153-b2f2-327c526dc868 ] Request (BasicOperationsImagesRbacTest:test_show_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:32:15.620 189 DEBUG tempest.lib.common.rest_client [req-35f292ac-f85f-4153-b2f2-327c526dc868 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-35f292ac-f85f-4153-b2f2-327c526dc868', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["lGMN8xlcRPqVBkp7K_frpQ"], "expires_at": "2020-12-14T03:32:15.000000Z", "issued_at": "2020-12-14T02:32:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:15.715 189 INFO tempest.lib.common.rest_client [req-36cc71a0-44ed-4664-8c17-37035db8cfb9 ] Request (BasicOperationsImagesRbacTest:test_show_image): 200 GET http://172.30.13.94/image/v2/images/72ca6858-d90d-4cdb-8c15-bec07c611c44 0.087s 2020-12-14 02:32:15.718 189 DEBUG tempest.lib.common.rest_client [req-36cc71a0-44ed-4664-8c17-37035db8cfb9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '660', 'content-type': 'application/json', 'x-openstack-request-id': 'req-36cc71a0-44ed-4664-8c17-37035db8cfb9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/72ca6858-d90d-4cdb-8c15-bec07c611c44'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-413267044", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "72ca6858-d90d-4cdb-8c15-bec07c611c44", "created_at": "2020-12-14T02:32:15Z", "updated_at": "2020-12-14T02:32:15Z", "tags": [], "self": "/v2/images/72ca6858-d90d-4cdb-8c15-bec07c611c44", "file": "/v2/images/72ca6858-d90d-4cdb-8c15-bec07c611c44/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:15.721 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:15.792 189 INFO tempest.lib.common.rest_client [req-9429a667-2cb9-4aaf-83a6-075bc04f7c11 ] Request (BasicOperationsImagesRbacTest:test_show_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.065s 2020-12-14 02:32:15.795 189 DEBUG tempest.lib.common.rest_client [req-9429a667-2cb9-4aaf-83a6-075bc04f7c11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9429a667-2cb9-4aaf-83a6-075bc04f7c11', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:15.845 189 INFO tempest.lib.common.rest_client [req-aa83272a-1a6c-4742-9c3b-d81ce3d49331 ] Request (BasicOperationsImagesRbacTest:test_show_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:32:15.848 189 DEBUG tempest.lib.common.rest_client [req-aa83272a-1a6c-4742-9c3b-d81ce3d49331 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aa83272a-1a6c-4742-9c3b-d81ce3d49331', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["4xAUnLe1TIq6E01exdcsVg"], "expires_at": "2020-12-14T03:32:15.000000Z", "issued_at": "2020-12-14T02:32:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:15.862 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:15.866 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:32:15.875 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:15.984 189 INFO tempest.lib.common.rest_client [req-e7bb71fd-fd59-46d3-b39f-0ef04face48e ] Request (BasicOperationsImagesRbacTest:test_update_image): 201 POST http://172.30.13.94/image/v2/images 0.103s 2020-12-14 02:32:15.987 189 DEBUG tempest.lib.common.rest_client [req-e7bb71fd-fd59-46d3-b39f-0ef04face48e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-87307157", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '659', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/2bbf974a-38e4-4574-b022-6d92ae135b75', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-e7bb71fd-fd59-46d3-b39f-0ef04face48e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-87307157", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "2bbf974a-38e4-4574-b022-6d92ae135b75", "created_at": "2020-12-14T02:32:16Z", "updated_at": "2020-12-14T02:32:16Z", "tags": [], "self": "/v2/images/2bbf974a-38e4-4574-b022-6d92ae135b75", "file": "/v2/images/2bbf974a-38e4-4574-b022-6d92ae135b75/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:15.990 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:16.046 189 INFO tempest.lib.common.rest_client [req-e7f15f3d-5162-47cf-aa23-629a562d2592 ] Request (BasicOperationsImagesRbacTest:test_update_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.049s 2020-12-14 02:32:16.050 189 DEBUG tempest.lib.common.rest_client [req-e7f15f3d-5162-47cf-aa23-629a562d2592 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7f15f3d-5162-47cf-aa23-629a562d2592', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:16.101 189 INFO tempest.lib.common.rest_client [req-ad9d1dd5-3ab1-4515-88bc-78614528b2bd ] Request (BasicOperationsImagesRbacTest:test_update_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:32:16.105 189 DEBUG tempest.lib.common.rest_client [req-ad9d1dd5-3ab1-4515-88bc-78614528b2bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad9d1dd5-3ab1-4515-88bc-78614528b2bd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["mnlBmNe0QPKzCeGUnyccyg"], "expires_at": "2020-12-14T03:32:16.000000Z", "issued_at": "2020-12-14T02:32:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:16.234 189 INFO tempest.lib.common.rest_client [req-9b00e415-fb32-4af8-9c54-69f46613a125 ] Request (BasicOperationsImagesRbacTest:test_update_image): 200 PATCH http://172.30.13.94/image/v2/images/2bbf974a-38e4-4574-b022-6d92ae135b75 0.121s 2020-12-14 02:32:16.237 189 DEBUG tempest.lib.common.rest_client [req-9b00e415-fb32-4af8-9c54-69f46613a125 ] Request - Headers: {'Content-Type': 'application/openstack-images-v2.0-json-patch', 'X-Auth-Token': ''} Body: [{"replace": "/name", "value": "tempest-BasicOperationsImagesRbacTest-image-616893091"}] Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '660', 'content-type': 'application/json', 'x-openstack-request-id': 'req-9b00e415-fb32-4af8-9c54-69f46613a125', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/image/v2/images/2bbf974a-38e4-4574-b022-6d92ae135b75'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-image-616893091", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "2bbf974a-38e4-4574-b022-6d92ae135b75", "created_at": "2020-12-14T02:32:16Z", "updated_at": "2020-12-14T02:32:16Z", "tags": [], "self": "/v2/images/2bbf974a-38e4-4574-b022-6d92ae135b75", "file": "/v2/images/2bbf974a-38e4-4574-b022-6d92ae135b75/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:16.241 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:16.320 189 INFO tempest.lib.common.rest_client [req-8c7dbec4-d9fb-4203-a7c5-07ae7381bc7e ] Request (BasicOperationsImagesRbacTest:test_update_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.071s 2020-12-14 02:32:16.323 189 DEBUG tempest.lib.common.rest_client [req-8c7dbec4-d9fb-4203-a7c5-07ae7381bc7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8c7dbec4-d9fb-4203-a7c5-07ae7381bc7e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:16.377 189 INFO tempest.lib.common.rest_client [req-ecd4d270-5ba4-4854-83d8-696a73aaa06a ] Request (BasicOperationsImagesRbacTest:test_update_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:32:16.382 189 DEBUG tempest.lib.common.rest_client [req-ecd4d270-5ba4-4854-83d8-696a73aaa06a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ecd4d270-5ba4-4854-83d8-696a73aaa06a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["aNOHI4j4SkuYIH72faI_Hg"], "expires_at": "2020-12-14T03:32:16.000000Z", "issued_at": "2020-12-14T02:32:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:16.399 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:16.404 189 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-14 02:32:16.413 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: upload_image, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:16.523 189 INFO tempest.lib.common.rest_client [req-c616d8ce-3b0b-41ba-a569-faee664f2592 ] Request (BasicOperationsImagesRbacTest:test_upload_image): 201 POST http://172.30.13.94/image/v2/images 0.104s 2020-12-14 02:32:16.526 189 DEBUG tempest.lib.common.rest_client [req-c616d8ce-3b0b-41ba-a569-faee664f2592 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-BasicOperationsImagesRbacTest-Image-1319020168", "container_format": "bare", "disk_format": "raw"} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '661', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/8bee43e5-0390-45ec-9aaf-ffc36b8f09c0', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-c616d8ce-3b0b-41ba-a569-faee664f2592', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-BasicOperationsImagesRbacTest-Image-1319020168", "disk_format": "raw", "container_format": "bare", "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fca221c07010486799d031a52c770f47", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "8bee43e5-0390-45ec-9aaf-ffc36b8f09c0", "created_at": "2020-12-14T02:32:16Z", "updated_at": "2020-12-14T02:32:16Z", "tags": [], "self": "/v2/images/8bee43e5-0390-45ec-9aaf-ffc36b8f09c0", "file": "/v2/images/8bee43e5-0390-45ec-9aaf-ffc36b8f09c0/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:16.530 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:16.591 189 INFO tempest.lib.common.rest_client [req-977c65db-a4bb-40ad-a8c7-64e5d1739e14 ] Request (BasicOperationsImagesRbacTest:test_upload_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.055s 2020-12-14 02:32:16.595 189 DEBUG tempest.lib.common.rest_client [req-977c65db-a4bb-40ad-a8c7-64e5d1739e14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-977c65db-a4bb-40ad-a8c7-64e5d1739e14', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:16.639 189 INFO tempest.lib.common.rest_client [req-8b3671a1-0484-4361-97a9-0674c3e1949d ] Request (BasicOperationsImagesRbacTest:test_upload_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-12-14 02:32:16.643 189 DEBUG tempest.lib.common.rest_client [req-8b3671a1-0484-4361-97a9-0674c3e1949d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b3671a1-0484-4361-97a9-0674c3e1949d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["pPEkAX-5Spe0nE6aV9VUAw"], "expires_at": "2020-12-14T03:32:16.000000Z", "issued_at": "2020-12-14T02:32:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:16.688 189 DEBUG patrole_tempest_plugin.tests.api.image.test_images_rbac [-] Image file content type _upload_image /usr/lib/python3.8/site-packages/patrole_tempest_plugin/tests/api/image/test_images_rbac.py:45 2020-12-14 02:32:16.990 189 INFO tempest.lib.common.rest_client [req-32a9bd31-cab5-4a79-8135-c1a20d7b35ee ] Request (BasicOperationsImagesRbacTest:test_upload_image): 204 PUT http://172.30.13.94/image/v2/images/8bee43e5-0390-45ec-9aaf-ffc36b8f09c0/file 0.296s 2020-12-14 02:32:16.994 189 DEBUG tempest.lib.common.rest_client [req-32a9bd31-cab5-4a79-8135-c1a20d7b35ee ] Request - Headers: {'Content-Type': 'application/octet-stream', 'X-Auth-Token': ''} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-32a9bd31-cab5-4a79-8135-c1a20d7b35ee', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/8bee43e5-0390-45ec-9aaf-ffc36b8f09c0/file'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:16.996 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:17.063 189 INFO tempest.lib.common.rest_client [req-fe5b6b21-57a9-4706-8989-2647697e4d7a ] Request (BasicOperationsImagesRbacTest:test_upload_image): 200 GET http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles 0.060s 2020-12-14 02:32:17.066 189 DEBUG tempest.lib.common.rest_client [req-fe5b6b21-57a9-4706-8989-2647697e4d7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe5b6b21-57a9-4706-8989-2647697e4d7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47/users/43c2db1e8ca4400f9e4650db298c804c/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:17.119 189 INFO tempest.lib.common.rest_client [req-28b96029-9cea-43af-be88-4cfec3568ec4 ] Request (BasicOperationsImagesRbacTest:test_upload_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:17.123 189 DEBUG tempest.lib.common.rest_client [req-28b96029-9cea-43af-be88-4cfec3568ec4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28b96029-9cea-43af-be88-4cfec3568ec4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "43c2db1e8ca4400f9e4650db298c804c", "name": "tempest-BasicOperationsImagesRbacTest-735409845", "password_expires_at": null}, "audit_ids": ["wsfyNnxARpmYMA51fw2tgA"], "expires_at": "2020-12-14T03:32:17.000000Z", "issued_at": "2020-12-14T02:32:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fca221c07010486799d031a52c770f47", "name": "tempest-BasicOperationsImagesRbacTest-735409845"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fca221c07010486799d031a52c770f47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:17.407 189 INFO tempest.lib.common.rest_client [req-4a6cadc5-738e-4a93-ab66-98ac6d290aab ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/8bee43e5-0390-45ec-9aaf-ffc36b8f09c0 0.265s 2020-12-14 02:32:17.411 189 DEBUG tempest.lib.common.rest_client [req-4a6cadc5-738e-4a93-ab66-98ac6d290aab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-4a6cadc5-738e-4a93-ab66-98ac6d290aab', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/8bee43e5-0390-45ec-9aaf-ffc36b8f09c0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:17.446 189 INFO tempest.lib.common.rest_client [req-603a990c-d2f8-4730-bc31-85e65dad79b6 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/8bee43e5-0390-45ec-9aaf-ffc36b8f09c0 0.028s 2020-12-14 02:32:17.448 189 DEBUG tempest.lib.common.rest_client [req-603a990c-d2f8-4730-bc31-85e65dad79b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-603a990c-d2f8-4730-bc31-85e65dad79b6', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/8bee43e5-0390-45ec-9aaf-ffc36b8f09c0'} Body: b'{"message": "No image found with ID 8bee43e5-0390-45ec-9aaf-ffc36b8f09c0

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:17.526 189 INFO tempest.lib.common.rest_client [req-8d21cc6c-1a69-47a5-8f64-745f92640f00 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/2bbf974a-38e4-4574-b022-6d92ae135b75 0.071s 2020-12-14 02:32:17.529 189 DEBUG tempest.lib.common.rest_client [req-8d21cc6c-1a69-47a5-8f64-745f92640f00 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-8d21cc6c-1a69-47a5-8f64-745f92640f00', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/2bbf974a-38e4-4574-b022-6d92ae135b75'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:17.561 189 INFO tempest.lib.common.rest_client [req-3c1b7e7c-a36b-466b-bf01-8a61ef579d05 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/2bbf974a-38e4-4574-b022-6d92ae135b75 0.026s 2020-12-14 02:32:17.563 189 DEBUG tempest.lib.common.rest_client [req-3c1b7e7c-a36b-466b-bf01-8a61ef579d05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-3c1b7e7c-a36b-466b-bf01-8a61ef579d05', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/2bbf974a-38e4-4574-b022-6d92ae135b75'} Body: b'{"message": "No image found with ID 2bbf974a-38e4-4574-b022-6d92ae135b75

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:17.642 189 INFO tempest.lib.common.rest_client [req-0f4ab529-a685-4989-acef-5192cdb4c603 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/72ca6858-d90d-4cdb-8c15-bec07c611c44 0.073s 2020-12-14 02:32:17.645 189 DEBUG tempest.lib.common.rest_client [req-0f4ab529-a685-4989-acef-5192cdb4c603 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-0f4ab529-a685-4989-acef-5192cdb4c603', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/72ca6858-d90d-4cdb-8c15-bec07c611c44'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:17.682 189 INFO tempest.lib.common.rest_client [req-41475354-d378-4034-8cec-4e845308833e ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/72ca6858-d90d-4cdb-8c15-bec07c611c44 0.031s 2020-12-14 02:32:17.685 189 DEBUG tempest.lib.common.rest_client [req-41475354-d378-4034-8cec-4e845308833e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-41475354-d378-4034-8cec-4e845308833e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/72ca6858-d90d-4cdb-8c15-bec07c611c44'} Body: b'{"message": "No image found with ID 72ca6858-d90d-4cdb-8c15-bec07c611c44

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:17.888 189 INFO tempest.lib.common.rest_client [req-8288da23-d3b3-4464-a777-bd22e3aac42d ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/fc590b3f-c831-48a2-863e-abb3fd74fa10 0.198s 2020-12-14 02:32:17.891 189 DEBUG tempest.lib.common.rest_client [req-8288da23-d3b3-4464-a777-bd22e3aac42d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-8288da23-d3b3-4464-a777-bd22e3aac42d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/fc590b3f-c831-48a2-863e-abb3fd74fa10'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:17.922 189 INFO tempest.lib.common.rest_client [req-063f78bd-e23e-422a-acde-c1d24a4fca74 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/fc590b3f-c831-48a2-863e-abb3fd74fa10 0.026s 2020-12-14 02:32:17.924 189 DEBUG tempest.lib.common.rest_client [req-063f78bd-e23e-422a-acde-c1d24a4fca74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-063f78bd-e23e-422a-acde-c1d24a4fca74', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/fc590b3f-c831-48a2-863e-abb3fd74fa10'} Body: b'{"message": "No image found with ID fc590b3f-c831-48a2-863e-abb3fd74fa10

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:18.005 189 INFO tempest.lib.common.rest_client [req-6dfeb470-e59d-4bc4-a2ad-045682de6960 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/235cf908-b6fc-45e3-ae7b-8e96e2b4214e 0.075s 2020-12-14 02:32:18.009 189 DEBUG tempest.lib.common.rest_client [req-6dfeb470-e59d-4bc4-a2ad-045682de6960 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-6dfeb470-e59d-4bc4-a2ad-045682de6960', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/235cf908-b6fc-45e3-ae7b-8e96e2b4214e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:18.047 189 INFO tempest.lib.common.rest_client [req-e26a4127-560d-46c0-a9aa-8ce008fdc84f ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/235cf908-b6fc-45e3-ae7b-8e96e2b4214e 0.033s 2020-12-14 02:32:18.049 189 DEBUG tempest.lib.common.rest_client [req-e26a4127-560d-46c0-a9aa-8ce008fdc84f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-e26a4127-560d-46c0-a9aa-8ce008fdc84f', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/235cf908-b6fc-45e3-ae7b-8e96e2b4214e'} Body: b'{"message": "No image found with ID 235cf908-b6fc-45e3-ae7b-8e96e2b4214e

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:18.268 189 INFO tempest.lib.common.rest_client [req-d5005e28-22be-4b4b-8d81-d384d10ce8da ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/ad1faad5-e5dc-40c1-87c0-cb8f7b4aa2b8 0.211s 2020-12-14 02:32:18.271 189 DEBUG tempest.lib.common.rest_client [req-d5005e28-22be-4b4b-8d81-d384d10ce8da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-d5005e28-22be-4b4b-8d81-d384d10ce8da', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/ad1faad5-e5dc-40c1-87c0-cb8f7b4aa2b8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:18.316 189 INFO tempest.lib.common.rest_client [req-9ef0a2ae-6678-405f-901f-b3070823cdca ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/ad1faad5-e5dc-40c1-87c0-cb8f7b4aa2b8 0.038s 2020-12-14 02:32:18.319 189 DEBUG tempest.lib.common.rest_client [req-9ef0a2ae-6678-405f-901f-b3070823cdca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-9ef0a2ae-6678-405f-901f-b3070823cdca', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/ad1faad5-e5dc-40c1-87c0-cb8f7b4aa2b8'} Body: b'{"message": "No image found with ID ad1faad5-e5dc-40c1-87c0-cb8f7b4aa2b8

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:18.405 189 INFO tempest.lib.common.rest_client [req-7a8fae20-4427-4b7d-a625-ca28edc914fd ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/79050724-30b7-43ca-a61e-eb645b57d255 0.079s 2020-12-14 02:32:18.408 189 DEBUG tempest.lib.common.rest_client [req-7a8fae20-4427-4b7d-a625-ca28edc914fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-7a8fae20-4427-4b7d-a625-ca28edc914fd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/79050724-30b7-43ca-a61e-eb645b57d255'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:18.439 189 INFO tempest.lib.common.rest_client [req-242d4d6e-f8a2-441a-b97d-9d8b8b4625bd ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/79050724-30b7-43ca-a61e-eb645b57d255 0.025s 2020-12-14 02:32:18.441 189 DEBUG tempest.lib.common.rest_client [req-242d4d6e-f8a2-441a-b97d-9d8b8b4625bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-242d4d6e-f8a2-441a-b97d-9d8b8b4625bd', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/79050724-30b7-43ca-a61e-eb645b57d255'} Body: b'{"message": "No image found with ID 79050724-30b7-43ca-a61e-eb645b57d255

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:18.484 189 INFO tempest.lib.common.rest_client [req-30952a23-c712-427f-a2d3-6dd4d90a21a0 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/image/v2/images/9db1d093-9d48-494b-bdf9-66b9cbb6f19d 0.037s 2020-12-14 02:32:18.487 189 DEBUG tempest.lib.common.rest_client [req-30952a23-c712-427f-a2d3-6dd4d90a21a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '147', 'content-type': 'application/json', 'x-openstack-request-id': 'req-30952a23-c712-427f-a2d3-6dd4d90a21a0', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/9db1d093-9d48-494b-bdf9-66b9cbb6f19d'} Body: b'{"message": "Failed to find image 9db1d093-9d48-494b-bdf9-66b9cbb6f19d to delete

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:18.523 189 INFO tempest.lib.common.rest_client [req-36e04644-67b1-4f9f-be8d-a398a1695b7b ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/9db1d093-9d48-494b-bdf9-66b9cbb6f19d 0.030s 2020-12-14 02:32:18.525 189 DEBUG tempest.lib.common.rest_client [req-36e04644-67b1-4f9f-be8d-a398a1695b7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-36e04644-67b1-4f9f-be8d-a398a1695b7b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/9db1d093-9d48-494b-bdf9-66b9cbb6f19d'} Body: b'{"message": "No image found with ID 9db1d093-9d48-494b-bdf9-66b9cbb6f19d

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:18.724 189 INFO tempest.lib.common.rest_client [req-c5d48a29-5a39-49cc-8bb7-0223a7180289 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/7ccbe02d-8382-4271-b927-78dc43a7aac1 0.192s 2020-12-14 02:32:18.726 189 DEBUG tempest.lib.common.rest_client [req-c5d48a29-5a39-49cc-8bb7-0223a7180289 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-c5d48a29-5a39-49cc-8bb7-0223a7180289', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/7ccbe02d-8382-4271-b927-78dc43a7aac1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:18.760 189 INFO tempest.lib.common.rest_client [req-c7d42808-acf4-4dd5-a838-8cc6ffdf9e08 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/7ccbe02d-8382-4271-b927-78dc43a7aac1 0.028s 2020-12-14 02:32:18.762 189 DEBUG tempest.lib.common.rest_client [req-c7d42808-acf4-4dd5-a838-8cc6ffdf9e08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-c7d42808-acf4-4dd5-a838-8cc6ffdf9e08', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/7ccbe02d-8382-4271-b927-78dc43a7aac1'} Body: b'{"message": "No image found with ID 7ccbe02d-8382-4271-b927-78dc43a7aac1

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:18.845 189 INFO tempest.lib.common.rest_client [req-a8eeffc5-4576-4289-8d5f-4061d1e1ee46 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/d81e2176-8482-4ab5-b27d-48555d637a64 0.077s 2020-12-14 02:32:18.847 189 DEBUG tempest.lib.common.rest_client [req-a8eeffc5-4576-4289-8d5f-4061d1e1ee46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-a8eeffc5-4576-4289-8d5f-4061d1e1ee46', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/d81e2176-8482-4ab5-b27d-48555d637a64'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:18.884 189 INFO tempest.lib.common.rest_client [req-02f73f9f-16df-4f64-bdce-4ed3eb0f9cae ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/d81e2176-8482-4ab5-b27d-48555d637a64 0.031s 2020-12-14 02:32:18.886 189 DEBUG tempest.lib.common.rest_client [req-02f73f9f-16df-4f64-bdce-4ed3eb0f9cae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-02f73f9f-16df-4f64-bdce-4ed3eb0f9cae', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/d81e2176-8482-4ab5-b27d-48555d637a64'} Body: b'{"message": "No image found with ID d81e2176-8482-4ab5-b27d-48555d637a64

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:18.966 189 INFO tempest.lib.common.rest_client [req-4b1dd85b-e9eb-4e1f-abbd-64b01e898e2f ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/724cee86-d23d-4cb3-8e5f-e7cd16365ee0 0.074s 2020-12-14 02:32:18.969 189 DEBUG tempest.lib.common.rest_client [req-4b1dd85b-e9eb-4e1f-abbd-64b01e898e2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-4b1dd85b-e9eb-4e1f-abbd-64b01e898e2f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/724cee86-d23d-4cb3-8e5f-e7cd16365ee0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:19.002 189 INFO tempest.lib.common.rest_client [req-ec691f09-eb75-4f3d-bc92-3974854cda21 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/724cee86-d23d-4cb3-8e5f-e7cd16365ee0 0.027s 2020-12-14 02:32:19.005 189 DEBUG tempest.lib.common.rest_client [req-ec691f09-eb75-4f3d-bc92-3974854cda21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-ec691f09-eb75-4f3d-bc92-3974854cda21', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/724cee86-d23d-4cb3-8e5f-e7cd16365ee0'} Body: b'{"message": "No image found with ID 724cee86-d23d-4cb3-8e5f-e7cd16365ee0

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:19.090 189 INFO tempest.lib.common.rest_client [req-f6d4ba72-8c52-4a80-9f47-998c9ec2e524 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/fa1b2593-07e1-49e2-bc6b-bf2cf723956d 0.077s 2020-12-14 02:32:19.093 189 DEBUG tempest.lib.common.rest_client [req-f6d4ba72-8c52-4a80-9f47-998c9ec2e524 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-f6d4ba72-8c52-4a80-9f47-998c9ec2e524', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/fa1b2593-07e1-49e2-bc6b-bf2cf723956d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:19.131 189 INFO tempest.lib.common.rest_client [req-4b891101-aef6-4b3c-8e6e-83eb10e6ffed ] Request (BasicOperationsImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/fa1b2593-07e1-49e2-bc6b-bf2cf723956d 0.032s 2020-12-14 02:32:19.133 189 DEBUG tempest.lib.common.rest_client [req-4b891101-aef6-4b3c-8e6e-83eb10e6ffed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-4b891101-aef6-4b3c-8e6e-83eb10e6ffed', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/fa1b2593-07e1-49e2-bc6b-bf2cf723956d'} Body: b'{"message": "No image found with ID fa1b2593-07e1-49e2-bc6b-bf2cf723956d

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:19.282 189 INFO tempest.lib.common.rest_client [req-85f2b122-15f5-46ad-a59a-3f2e2cb68ebe ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/43c2db1e8ca4400f9e4650db298c804c 0.141s 2020-12-14 02:32:19.286 189 DEBUG tempest.lib.common.rest_client [req-85f2b122-15f5-46ad-a59a-3f2e2cb68ebe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85f2b122-15f5-46ad-a59a-3f2e2cb68ebe', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/43c2db1e8ca4400f9e4650db298c804c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:19.399 189 INFO tempest.lib.common.rest_client [req-5980aed2-c9a8-49df-b2c8-ba6ab0d46f4c ] Request (BasicOperationsImagesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:32:19.401 189 DEBUG tempest.lib.common.rest_client [req-5980aed2-c9a8-49df-b2c8-ba6ab0d46f4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5980aed2-c9a8-49df-b2c8-ba6ab0d46f4c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["-qieyZ2zRdaF1ti2mx6GWw"], "expires_at": "2020-12-14T03:32:19.000000Z", "issued_at": "2020-12-14T02:32:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:19.902 189 INFO tempest.lib.common.rest_client [req-068339d6-6d3b-4164-a6ea-1e6c2b521790 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=fca221c07010486799d031a52c770f47&name=default 0.495s 2020-12-14 02:32:19.905 189 DEBUG tempest.lib.common.rest_client [req-068339d6-6d3b-4164-a6ea-1e6c2b521790 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-068339d6-6d3b-4164-a6ea-1e6c2b521790', 'date': 'Mon, 14 Dec 2020 02:32:19 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=fca221c07010486799d031a52c770f47&name=default'} Body: b'{"security_groups": [{"id": "c02f566c-a684-4d5d-86e5-378ca2ea5cbc", "name": "default", "stateful": true, "tenant_id": "fca221c07010486799d031a52c770f47", "description": "Default security group", "security_group_rules": [{"id": "130d07e0-afc4-4562-adbd-81e827186309", "tenant_id": "fca221c07010486799d031a52c770f47", "security_group_id": "c02f566c-a684-4d5d-86e5-378ca2ea5cbc", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c02f566c-a684-4d5d-86e5-378ca2ea5cbc", "description": null, "tags": [], "created_at": "2020-12-14T02:32:19Z", "updated_at": "2020-12-14T02:32:19Z", "revision_number": 0, "project_id": "fca221c07010486799d031a52c770f47"}, {"id": "5726365e-7fd9-48e4-be66-c6fafd50ac9c", "tenant_id": "fca221c07010486799d031a52c770f47", "security_group_id": "c02f566c-a684-4d5d-86e5-378ca2ea5cbc", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:32:19Z", "updated_at": "2020-12-14T02:32:19Z", "revision_number": 0, "project_id": "fca221c07010486799d031a52c770f47"}, {"id": "a6a07084-9184-4eb3-8e71-c42daf58e089", "tenant_id": "fca221c07010486799d031a52c770f47", "security_group_id": "c02f566c-a684-4d5d-86e5-378ca2ea5cbc", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c02f566c-a684-4d5d-86e5-378ca2ea5cbc", "description": null, "tags": [], "created_at": "2020-12-14T02:32:19Z", "updated_at": "2020-12-14T02:32:19Z", "revision_number": 0, "project_id": "fca221c07010486799d031a52c770f47"}, {"id": "bbd41d54-aac2-46b4-b1e5-de96ed6f5221", "tenant_id": "fca221c07010486799d031a52c770f47", "security_group_id": "c02f566c-a684-4d5d-86e5-378ca2ea5cbc", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:32:19Z", "updated_at": "2020-12-14T02:32:19Z", "revision_number": 0, "project_id": "fca221c07010486799d031a52c770f47"}], "tags": [], "created_at": "2020-12-14T02:32:19Z", "updated_at": "2020-12-14T02:32:19Z", "revision_number": 1, "project_id": "fca221c07010486799d031a52c770f47"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:20.066 189 INFO tempest.lib.common.rest_client [req-6cb4cecb-eed7-452d-9034-a580b22f5a6a ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/c02f566c-a684-4d5d-86e5-378ca2ea5cbc 0.154s 2020-12-14 02:32:20.069 189 DEBUG tempest.lib.common.rest_client [req-6cb4cecb-eed7-452d-9034-a580b22f5a6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6cb4cecb-eed7-452d-9034-a580b22f5a6a', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:20 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/c02f566c-a684-4d5d-86e5-378ca2ea5cbc'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:20.223 189 INFO tempest.lib.common.rest_client [req-3bdbb586-b6b7-47f0-b204-d2aaaf8c85d4 ] Request (BasicOperationsImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47 0.147s 2020-12-14 02:32:20.226 189 DEBUG tempest.lib.common.rest_client [req-3bdbb586-b6b7-47f0-b204-d2aaaf8c85d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3bdbb586-b6b7-47f0-b204-d2aaaf8c85d4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fca221c07010486799d031a52c770f47'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:20.340 189 INFO tempest.lib.common.rest_client [req-5c9ac279-050e-4fae-9236-9e0f6030c3e4 ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:32:20.342 189 DEBUG tempest.lib.common.rest_client [req-5c9ac279-050e-4fae-9236-9e0f6030c3e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c9ac279-050e-4fae-9236-9e0f6030c3e4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["3kSoALXVRl6zZWEOVvYtGQ"], "expires_at": "2020-12-14T03:32:20.000000Z", "issued_at": "2020-12-14T02:32:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:20.436 189 INFO tempest.lib.common.rest_client [req-fbfa6131-006d-4cf8-8d72-6c4198cf9b3a ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:32:20.439 189 DEBUG tempest.lib.common.rest_client [req-fbfa6131-006d-4cf8-8d72-6c4198cf9b3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fbfa6131-006d-4cf8-8d72-6c4198cf9b3a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["x0AP1wFQR4eFzXB8kCibtw"], "expires_at": "2020-12-14T03:32:20.000000Z", "issued_at": "2020-12-14T02:32:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:20.510 189 INFO tempest.lib.common.rest_client [req-eb20f2c0-0066-47b2-bb78-2900dfe78792 ] Request (L3AgentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.063s 2020-12-14 02:32:20.513 189 DEBUG tempest.lib.common.rest_client [req-eb20f2c0-0066-47b2-bb78-2900dfe78792 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb20f2c0-0066-47b2-bb78-2900dfe78792', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:20.601 189 INFO tempest.lib.common.rest_client [req-87cd6086-9a78-440f-82b1-36c1679f465d ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.080s 2020-12-14 02:32:20.604 189 DEBUG tempest.lib.common.rest_client [req-87cd6086-9a78-440f-82b1-36c1679f465d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-L3AgentsExtRbacTest-815691415-desc", "domain_id": "default", "name": "tempest-L3AgentsExtRbacTest-815691415"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '374', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87cd6086-9a78-440f-82b1-36c1679f465d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "1d9f9c3d9a984c979bcd52e7e1663fa0", "name": "tempest-L3AgentsExtRbacTest-815691415", "domain_id": "default", "description": "tempest-L3AgentsExtRbacTest-815691415-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:20.736 189 INFO tempest.lib.common.rest_client [req-d14d5184-1a5e-43e5-b743-55e9cd8db1d7 ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.123s 2020-12-14 02:32:20.738 189 DEBUG tempest.lib.common.rest_client [req-d14d5184-1a5e-43e5-b743-55e9cd8db1d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-L3AgentsExtRbacTest-815691415", "password": "A6@69hEEDxes!Mx", "project_id": "1d9f9c3d9a984c979bcd52e7e1663fa0", "email": "tempest-L3AgentsExtRbacTest-1548142204@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '393', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d14d5184-1a5e-43e5-b743-55e9cd8db1d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "1d9f9c3d9a984c979bcd52e7e1663fa0", "email": "tempest-L3AgentsExtRbacTest-1548142204@example.com", "id": "2a004516239848e4a6f67605eda28818", "name": "tempest-L3AgentsExtRbacTest-815691415", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/2a004516239848e4a6f67605eda28818"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:20.806 189 INFO tempest.lib.common.rest_client [req-da0ee305-8da0-4782-a083-c808fd9b9360 ] Request (L3AgentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:32:20.809 189 DEBUG tempest.lib.common.rest_client [req-da0ee305-8da0-4782-a083-c808fd9b9360 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da0ee305-8da0-4782-a083-c808fd9b9360', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:20.876 189 INFO tempest.lib.common.rest_client [req-13ca784c-32d5-4674-853c-77f19acc7378 ] Request (L3AgentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:32:20.880 189 DEBUG tempest.lib.common.rest_client [req-13ca784c-32d5-4674-853c-77f19acc7378 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13ca784c-32d5-4674-853c-77f19acc7378', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:20.963 189 INFO tempest.lib.common.rest_client [req-286298c2-c43b-450f-9beb-ba4c668a07d0 ] Request (L3AgentsExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0/users/2a004516239848e4a6f67605eda28818/roles/72a4576c553448cd941b052c1ca0cf2d 0.072s 2020-12-14 02:32:20.966 189 DEBUG tempest.lib.common.rest_client [req-286298c2-c43b-450f-9beb-ba4c668a07d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-286298c2-c43b-450f-9beb-ba4c668a07d0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0/users/2a004516239848e4a6f67605eda28818/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:20.968 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-L3AgentsExtRbacTest-815691415', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1d9f9c3d9a984c979bcd52e7e1663fa0', 'project_name': 'tempest-L3AgentsExtRbacTest-815691415', 'tenant_id': '1d9f9c3d9a984c979bcd52e7e1663fa0', 'tenant_name': 'tempest-L3AgentsExtRbacTest-815691415', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '2a004516239848e4a6f67605eda28818'}, Network: None, Subnet: None, Router: None 2020-12-14 02:32:20.971 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-L3AgentsExtRbacTest-815691415', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1d9f9c3d9a984c979bcd52e7e1663fa0', 'project_name': 'tempest-L3AgentsExtRbacTest-815691415', 'tenant_id': '1d9f9c3d9a984c979bcd52e7e1663fa0', 'tenant_name': 'tempest-L3AgentsExtRbacTest-815691415', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '2a004516239848e4a6f67605eda28818'}, Network: None, Subnet: None, Router: None 2020-12-14 02:32:21.146 189 INFO tempest.lib.common.rest_client [req-1fc441d7-e0ce-47c1-a6f1-da710a871c2d ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-12-14 02:32:21.149 189 DEBUG tempest.lib.common.rest_client [req-1fc441d7-e0ce-47c1-a6f1-da710a871c2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6567', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1fc441d7-e0ce-47c1-a6f1-da710a871c2d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2a004516239848e4a6f67605eda28818", "name": "tempest-L3AgentsExtRbacTest-815691415", "password_expires_at": null}, "audit_ids": ["NMkHAtblTn21URhAMDPqcQ"], "expires_at": "2020-12-14T03:32:21.000000Z", "issued_at": "2020-12-14T02:32:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1d9f9c3d9a984c979bcd52e7e1663fa0", "name": "tempest-L3AgentsExtRbacTest-815691415"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30. _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:21.154 189 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-12-14 02:32:21.283 189 INFO tempest.lib.common.rest_client [req-3fe887d1-5c62-473d-86c2-aded28a66d8e ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:32:21.289 189 DEBUG tempest.lib.common.rest_client [req-3fe887d1-5c62-473d-86c2-aded28a66d8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3fe887d1-5c62-473d-86c2-aded28a66d8e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["P3WoU9vLQJaO4l8MLw7aGQ"], "expires_at": "2020-12-14T03:32:21.000000Z", "issued_at": "2020-12-14T02:32:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:21.416 189 INFO tempest.lib.common.rest_client [req-8481e02b-0f4d-4996-9942-22386dbce98a ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:32:21.419 189 DEBUG tempest.lib.common.rest_client [req-8481e02b-0f4d-4996-9942-22386dbce98a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8481e02b-0f4d-4996-9942-22386dbce98a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["409DfznFQ8qmHriMZp5ALQ"], "expires_at": "2020-12-14T03:32:21.000000Z", "issued_at": "2020-12-14T02:32:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:21.485 189 INFO tempest.lib.common.rest_client [req-d505d204-614b-4770-9bd5-6f8c69b7bc64 ] Request (L3AgentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.059s 2020-12-14 02:32:21.488 189 DEBUG tempest.lib.common.rest_client [req-d505d204-614b-4770-9bd5-6f8c69b7bc64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d505d204-614b-4770-9bd5-6f8c69b7bc64', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:21.550 189 INFO tempest.lib.common.rest_client [req-67ab569a-b539-4c38-b6a3-6f6d94d526a5 ] Request (L3AgentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:32:21.554 189 DEBUG tempest.lib.common.rest_client [req-67ab569a-b539-4c38-b6a3-6f6d94d526a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67ab569a-b539-4c38-b6a3-6f6d94d526a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:21.558 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:32:21.560 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:21.623 189 INFO tempest.lib.common.rest_client [req-6f2ad64f-ae72-4147-b8c0-00a5f465950e ] Request (L3AgentsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0/users/2a004516239848e4a6f67605eda28818/roles 0.058s 2020-12-14 02:32:21.626 189 DEBUG tempest.lib.common.rest_client [req-6f2ad64f-ae72-4147-b8c0-00a5f465950e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f2ad64f-ae72-4147-b8c0-00a5f465950e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0/users/2a004516239848e4a6f67605eda28818/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0/users/2a004516239848e4a6f67605eda28818/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:21.696 189 INFO tempest.lib.common.rest_client [req-bf1423f2-9fd7-4062-a08a-2c2113919633 ] Request (L3AgentsExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0/users/2a004516239848e4a6f67605eda28818/roles/72a4576c553448cd941b052c1ca0cf2d 0.064s 2020-12-14 02:32:21.699 189 DEBUG tempest.lib.common.rest_client [req-bf1423f2-9fd7-4062-a08a-2c2113919633 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf1423f2-9fd7-4062-a08a-2c2113919633', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0/users/2a004516239848e4a6f67605eda28818/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:21.818 189 INFO tempest.lib.common.rest_client [req-7367df4f-7551-4487-9bf7-0c5a4989d878 ] Request (L3AgentsExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0/users/2a004516239848e4a6f67605eda28818/roles/a629c95d64b3416fb80ae90af4f69c05 0.113s 2020-12-14 02:32:21.821 189 DEBUG tempest.lib.common.rest_client [req-7367df4f-7551-4487-9bf7-0c5a4989d878 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7367df4f-7551-4487-9bf7-0c5a4989d878', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0/users/2a004516239848e4a6f67605eda28818/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:22.930 189 INFO tempest.lib.common.rest_client [req-2b1a0b73-1339-4655-9ce3-b92d99282d96 ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:32:22.933 189 DEBUG tempest.lib.common.rest_client [req-2b1a0b73-1339-4655-9ce3-b92d99282d96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b1a0b73-1339-4655-9ce3-b92d99282d96', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2a004516239848e4a6f67605eda28818", "name": "tempest-L3AgentsExtRbacTest-815691415", "password_expires_at": null}, "audit_ids": ["K9E68_G6QQOEtwOWmMjsVA"], "expires_at": "2020-12-14T03:32:22.000000Z", "issued_at": "2020-12-14T02:32:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1d9f9c3d9a984c979bcd52e7e1663fa0", "name": "tempest-L3AgentsExtRbacTest-815691415"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:22.986 189 INFO tempest.lib.common.rest_client [req-67704b63-9578-41a3-aa07-6b587174ff55 ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:32:22.989 189 DEBUG tempest.lib.common.rest_client [req-67704b63-9578-41a3-aa07-6b587174ff55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67704b63-9578-41a3-aa07-6b587174ff55', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2a004516239848e4a6f67605eda28818", "name": "tempest-L3AgentsExtRbacTest-815691415", "password_expires_at": null}, "audit_ids": ["zH0RdF5rQY6y29Irx_ZTnQ"], "expires_at": "2020-12-14T03:32:22.000000Z", "issued_at": "2020-12-14T02:32:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1d9f9c3d9a984c979bcd52e7e1663fa0", "name": "tempest-L3AgentsExtRbacTest-815691415"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:23.450 189 INFO tempest.lib.common.rest_client [req-ec112255-0854-4f25-b4b4-b7dd2cecb801 ] Request (L3AgentsExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/routers 0.449s 2020-12-14 02:32:23.453 189 DEBUG tempest.lib.common.rest_client [req-ec112255-0854-4f25-b4b4-b7dd2cecb801 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"router": {"name": "tempest-L3AgentsExtRbacTest-Router-649524396", "admin_state_up": true}} Response - Headers: {'content-type': 'application/json', 'content-length': '542', 'x-openstack-request-id': 'req-ec112255-0854-4f25-b4b4-b7dd2cecb801', 'date': 'Mon, 14 Dec 2020 02:32:23 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/routers'} Body: b'{"router": {"id": "80ac8fdc-0a32-41f3-9eb7-ee116668d861", "name": "tempest-L3AgentsExtRbacTest-Router-649524396", "tenant_id": "1d9f9c3d9a984c979bcd52e7e1663fa0", "admin_state_up": true, "status": "ACTIVE", "external_gateway_info": null, "description": "", "availability_zones": [], "distributed": false, "ha": false, "availability_zone_hints": [], "routes": [], "flavor_id": null, "tags": [], "created_at": "2020-12-14T02:32:23Z", "updated_at": "2020-12-14T02:32:23Z", "revision_number": 1, "project_id": "1d9f9c3d9a984c979bcd52e7e1663fa0"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:23.462 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:23.698 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_l3-agents, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:23.702 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:23.818 189 INFO tempest.lib.common.rest_client [req-f6f633e6-21d8-43c7-a309-b84260df24ba ] Request (L3AgentsExtRbacTest:test_list_l3_agents_on_router): 200 GET http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0/users/2a004516239848e4a6f67605eda28818/roles 0.109s 2020-12-14 02:32:23.820 189 DEBUG tempest.lib.common.rest_client [req-f6f633e6-21d8-43c7-a309-b84260df24ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6f633e6-21d8-43c7-a309-b84260df24ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0/users/2a004516239848e4a6f67605eda28818/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0/users/2a004516239848e4a6f67605eda28818/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:23.868 189 INFO tempest.lib.common.rest_client [req-a9f7ebfc-03eb-4a21-8946-8823971bbcfc ] Request (L3AgentsExtRbacTest:test_list_l3_agents_on_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:32:23.870 189 DEBUG tempest.lib.common.rest_client [req-a9f7ebfc-03eb-4a21-8946-8823971bbcfc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9f7ebfc-03eb-4a21-8946-8823971bbcfc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2a004516239848e4a6f67605eda28818", "name": "tempest-L3AgentsExtRbacTest-815691415", "password_expires_at": null}, "audit_ids": ["ytjGrYWoT4yFSjvy9LOcgg"], "expires_at": "2020-12-14T03:32:23.000000Z", "issued_at": "2020-12-14T02:32:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1d9f9c3d9a984c979bcd52e7e1663fa0", "name": "tempest-L3AgentsExtRbacTest-815691415"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:23.910 189 INFO tempest.lib.common.rest_client [req-cb7edcff-80b0-4b91-80a7-72dabbdcbb91 ] Request (L3AgentsExtRbacTest:test_list_l3_agents_on_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-12-14 02:32:23.913 189 DEBUG tempest.lib.common.rest_client [req-cb7edcff-80b0-4b91-80a7-72dabbdcbb91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb7edcff-80b0-4b91-80a7-72dabbdcbb91', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2a004516239848e4a6f67605eda28818", "name": "tempest-L3AgentsExtRbacTest-815691415", "password_expires_at": null}, "audit_ids": ["oBl66L29S8-GN-Q1sYyusw"], "expires_at": "2020-12-14T03:32:23.000000Z", "issued_at": "2020-12-14T02:32:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1d9f9c3d9a984c979bcd52e7e1663fa0", "name": "tempest-L3AgentsExtRbacTest-815691415"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:24.078 189 INFO tempest.lib.common.rest_client [req-5f38e9cd-84c9-4277-b598-af36642ace0e ] Request (L3AgentsExtRbacTest:test_list_l3_agents_on_router): 200 GET http://172.30.13.94:9696/v2.0/routers/80ac8fdc-0a32-41f3-9eb7-ee116668d861/l3-agents 0.158s 2020-12-14 02:32:24.080 189 DEBUG tempest.lib.common.rest_client [req-5f38e9cd-84c9-4277-b598-af36642ace0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '14', 'x-openstack-request-id': 'req-5f38e9cd-84c9-4277-b598-af36642ace0e', 'date': 'Mon, 14 Dec 2020 02:32:24 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/80ac8fdc-0a32-41f3-9eb7-ee116668d861/l3-agents'} Body: b'{"agents": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:24.083 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:24.143 189 INFO tempest.lib.common.rest_client [req-72e97fc2-9301-487b-b7a5-28b3a980e5ad ] Request (L3AgentsExtRbacTest:test_list_l3_agents_on_router): 200 GET http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0/users/2a004516239848e4a6f67605eda28818/roles 0.054s 2020-12-14 02:32:24.145 189 DEBUG tempest.lib.common.rest_client [req-72e97fc2-9301-487b-b7a5-28b3a980e5ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-72e97fc2-9301-487b-b7a5-28b3a980e5ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0/users/2a004516239848e4a6f67605eda28818/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0/users/2a004516239848e4a6f67605eda28818/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:24.193 189 INFO tempest.lib.common.rest_client [req-b3b3b706-afe0-4097-8f3e-f2a2bfc06968 ] Request (L3AgentsExtRbacTest:test_list_l3_agents_on_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:32:24.196 189 DEBUG tempest.lib.common.rest_client [req-b3b3b706-afe0-4097-8f3e-f2a2bfc06968 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3b3b706-afe0-4097-8f3e-f2a2bfc06968', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2a004516239848e4a6f67605eda28818", "name": "tempest-L3AgentsExtRbacTest-815691415", "password_expires_at": null}, "audit_ids": ["F8a2Mo3LSICv3X4-1akJHQ"], "expires_at": "2020-12-14T03:32:24.000000Z", "issued_at": "2020-12-14T02:32:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1d9f9c3d9a984c979bcd52e7e1663fa0", "name": "tempest-L3AgentsExtRbacTest-815691415"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:24.243 189 INFO tempest.lib.common.rest_client [req-97ac5fc8-146a-4240-b3dd-bae5e663803b ] Request (L3AgentsExtRbacTest:test_list_l3_agents_on_router): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:32:24.246 189 DEBUG tempest.lib.common.rest_client [req-97ac5fc8-146a-4240-b3dd-bae5e663803b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97ac5fc8-146a-4240-b3dd-bae5e663803b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2a004516239848e4a6f67605eda28818", "name": "tempest-L3AgentsExtRbacTest-815691415", "password_expires_at": null}, "audit_ids": ["7d_FCS7KQLe2qrHqHX_37w"], "expires_at": "2020-12-14T03:32:24.000000Z", "issued_at": "2020-12-14T02:32:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1d9f9c3d9a984c979bcd52e7e1663fa0", "name": "tempest-L3AgentsExtRbacTest-815691415"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1d9f9c3d9a984c979bcd52e7e1663fa0", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:24.741 189 INFO tempest.lib.common.rest_client [req-a79eb3c2-f5ea-4fd3-99ee-b2a2694fb2dc ] Request (L3AgentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/routers/80ac8fdc-0a32-41f3-9eb7-ee116668d861 0.481s 2020-12-14 02:32:24.745 189 DEBUG tempest.lib.common.rest_client [req-a79eb3c2-f5ea-4fd3-99ee-b2a2694fb2dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-a79eb3c2-f5ea-4fd3-99ee-b2a2694fb2dc', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:24 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/routers/80ac8fdc-0a32-41f3-9eb7-ee116668d861'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:24.920 189 INFO tempest.lib.common.rest_client [req-90c0f9e0-f133-4d1e-87a5-b1fe3e476ef8 ] Request (L3AgentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/2a004516239848e4a6f67605eda28818 0.169s 2020-12-14 02:32:24.922 189 DEBUG tempest.lib.common.rest_client [req-90c0f9e0-f133-4d1e-87a5-b1fe3e476ef8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90c0f9e0-f133-4d1e-87a5-b1fe3e476ef8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/2a004516239848e4a6f67605eda28818'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:25.025 189 INFO tempest.lib.common.rest_client [req-733bee2e-0693-4dd2-9e65-df488b3af5ee ] Request (L3AgentsExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:32:25.029 189 DEBUG tempest.lib.common.rest_client [req-733bee2e-0693-4dd2-9e65-df488b3af5ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-733bee2e-0693-4dd2-9e65-df488b3af5ee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["5Yd9KRYRTJyAS2vHozm2-Q"], "expires_at": "2020-12-14T03:32:24.000000Z", "issued_at": "2020-12-14T02:32:24.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:25.312 189 INFO tempest.lib.common.rest_client [req-3f4020fd-cdfe-4006-9628-1cc3f554e7d1 ] Request (L3AgentsExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1d9f9c3d9a984c979bcd52e7e1663fa0&name=default 0.275s 2020-12-14 02:32:25.315 189 DEBUG tempest.lib.common.rest_client [req-3f4020fd-cdfe-4006-9628-1cc3f554e7d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-3f4020fd-cdfe-4006-9628-1cc3f554e7d1', 'date': 'Mon, 14 Dec 2020 02:32:25 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1d9f9c3d9a984c979bcd52e7e1663fa0&name=default'} Body: b'{"security_groups": [{"id": "9e180fcf-ee2c-4195-802b-d868f62ad595", "name": "default", "stateful": true, "tenant_id": "1d9f9c3d9a984c979bcd52e7e1663fa0", "description": "Default security group", "security_group_rules": [{"id": "518972b0-db2b-45a5-a3e7-30502850fe70", "tenant_id": "1d9f9c3d9a984c979bcd52e7e1663fa0", "security_group_id": "9e180fcf-ee2c-4195-802b-d868f62ad595", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:32:25Z", "updated_at": "2020-12-14T02:32:25Z", "revision_number": 0, "project_id": "1d9f9c3d9a984c979bcd52e7e1663fa0"}, {"id": "6c24c651-b3c8-4e7e-b727-083f2dd70026", "tenant_id": "1d9f9c3d9a984c979bcd52e7e1663fa0", "security_group_id": "9e180fcf-ee2c-4195-802b-d868f62ad595", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "9e180fcf-ee2c-4195-802b-d868f62ad595", "description": null, "tags": [], "created_at": "2020-12-14T02:32:25Z", "updated_at": "2020-12-14T02:32:25Z", "revision_number": 0, "project_id": "1d9f9c3d9a984c979bcd52e7e1663fa0"}, {"id": "911c98d3-84cd-4f36-b1ca-bbb7f8bf8b5a", "tenant_id": "1d9f9c3d9a984c979bcd52e7e1663fa0", "security_group_id": "9e180fcf-ee2c-4195-802b-d868f62ad595", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "9e180fcf-ee2c-4195-802b-d868f62ad595", "description": null, "tags": [], "created_at": "2020-12-14T02:32:25Z", "updated_at": "2020-12-14T02:32:25Z", "revision_number": 0, "project_id": "1d9f9c3d9a984c979bcd52e7e1663fa0"}, {"id": "fc9bf59b-d6f5-4a04-afdc-67ac9dcaf597", "tenant_id": "1d9f9c3d9a984c979bcd52e7e1663fa0", "security_group_id": "9e180fcf-ee2c-4195-802b-d868f62ad595", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:32:25Z", "updated_at": "2020-12-14T02:32:25Z", "revision_number": 0, "project_id": "1d9f9c3d9a984c979bcd52e7e1663fa0"}], "tags": [], "created_at": "2020-12-14T02:32:25Z", "updated_at": "2020-12-14T02:32:25Z", "revision_number": 1, "project_id": "1d9f9c3d9a984c979bcd52e7e1663fa0"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:25.452 189 INFO tempest.lib.common.rest_client [req-33a446d1-e45a-4fe1-a4de-0570c2491f0e ] Request (L3AgentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/9e180fcf-ee2c-4195-802b-d868f62ad595 0.129s 2020-12-14 02:32:25.455 189 DEBUG tempest.lib.common.rest_client [req-33a446d1-e45a-4fe1-a4de-0570c2491f0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-33a446d1-e45a-4fe1-a4de-0570c2491f0e', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:25 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/9e180fcf-ee2c-4195-802b-d868f62ad595'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:25.592 189 INFO tempest.lib.common.rest_client [req-1bd0377a-2925-46bd-bc4d-4bb24e49dc7f ] Request (L3AgentsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0 0.130s 2020-12-14 02:32:25.595 189 DEBUG tempest.lib.common.rest_client [req-1bd0377a-2925-46bd-bc4d-4bb24e49dc7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1bd0377a-2925-46bd-bc4d-4bb24e49dc7f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1d9f9c3d9a984c979bcd52e7e1663fa0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:25.707 189 INFO tempest.lib.common.rest_client [req-da8b42ff-40de-493c-8bca-e7e4232ccebc ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:32:25.710 189 DEBUG tempest.lib.common.rest_client [req-da8b42ff-40de-493c-8bca-e7e4232ccebc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da8b42ff-40de-493c-8bca-e7e4232ccebc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["-5hU_HXOQxy6qjTvq79zpQ"], "expires_at": "2020-12-14T03:32:25.000000Z", "issued_at": "2020-12-14T02:32:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:25.805 189 INFO tempest.lib.common.rest_client [req-5e2fa4ea-757d-4b01-9407-06a8549dc3ba ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:32:25.808 189 DEBUG tempest.lib.common.rest_client [req-5e2fa4ea-757d-4b01-9407-06a8549dc3ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e2fa4ea-757d-4b01-9407-06a8549dc3ba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["newqrXDMSjKgPgc9UPvC8g"], "expires_at": "2020-12-14T03:32:25.000000Z", "issued_at": "2020-12-14T02:32:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:25.888 189 INFO tempest.lib.common.rest_client [req-a9449de0-80dc-4c08-9169-32db95d7a7a4 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.072s 2020-12-14 02:32:25.891 189 DEBUG tempest.lib.common.rest_client [req-a9449de0-80dc-4c08-9169-32db95d7a7a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9449de0-80dc-4c08-9169-32db95d7a7a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:25.978 189 INFO tempest.lib.common.rest_client [req-4d537023-6081-4069-9213-ce3b60279499 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.078s 2020-12-14 02:32:25.981 189 DEBUG tempest.lib.common.rest_client [req-4d537023-6081-4069-9213-ce3b60279499 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-DscpMarkingRuleExtRbacTest-1926998618-desc", "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d537023-6081-4069-9213-ce3b60279499', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "domain_id": "default", "description": "tempest-DscpMarkingRuleExtRbacTest-1926998618-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:26.103 189 INFO tempest.lib.common.rest_client [req-891da4a7-4893-4a9c-abe6-35d4fdb0bd66 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.113s 2020-12-14 02:32:26.106 189 DEBUG tempest.lib.common.rest_client [req-891da4a7-4893-4a9c-abe6-35d4fdb0bd66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password": "R4_aZILGhMih^@b", "project_id": "7f544115badf4276bdc16b4e0d675945", "email": "tempest-DscpMarkingRuleExtRbacTest-1426906637@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '408', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-891da4a7-4893-4a9c-abe6-35d4fdb0bd66', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "7f544115badf4276bdc16b4e0d675945", "email": "tempest-DscpMarkingRuleExtRbacTest-1426906637@example.com", "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/2c00466c69f24802b7da842ff1137d85"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:26.173 189 INFO tempest.lib.common.rest_client [req-24c055ab-1ad8-4d3e-9d7d-22c2364d2bbb ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:32:26.176 189 DEBUG tempest.lib.common.rest_client [req-24c055ab-1ad8-4d3e-9d7d-22c2364d2bbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24c055ab-1ad8-4d3e-9d7d-22c2364d2bbb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:26.243 189 INFO tempest.lib.common.rest_client [req-cb90c7d2-e610-4430-9756-9c40d6eb8238 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:32:26.245 189 DEBUG tempest.lib.common.rest_client [req-cb90c7d2-e610-4430-9756-9c40d6eb8238 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb90c7d2-e610-4430-9756-9c40d6eb8238', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:26.335 189 INFO tempest.lib.common.rest_client [req-04e6e6ed-1a9f-427d-b3ea-dcae13d37ff9 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles/72a4576c553448cd941b052c1ca0cf2d 0.082s 2020-12-14 02:32:26.338 189 DEBUG tempest.lib.common.rest_client [req-04e6e6ed-1a9f-427d-b3ea-dcae13d37ff9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04e6e6ed-1a9f-427d-b3ea-dcae13d37ff9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:26.342 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-DscpMarkingRuleExtRbacTest-1926998618', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '7f544115badf4276bdc16b4e0d675945', 'project_name': 'tempest-DscpMarkingRuleExtRbacTest-1926998618', 'tenant_id': '7f544115badf4276bdc16b4e0d675945', 'tenant_name': 'tempest-DscpMarkingRuleExtRbacTest-1926998618', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '2c00466c69f24802b7da842ff1137d85'}, Network: None, Subnet: None, Router: None 2020-12-14 02:32:26.345 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-DscpMarkingRuleExtRbacTest-1926998618', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '7f544115badf4276bdc16b4e0d675945', 'project_name': 'tempest-DscpMarkingRuleExtRbacTest-1926998618', 'tenant_id': '7f544115badf4276bdc16b4e0d675945', 'tenant_name': 'tempest-DscpMarkingRuleExtRbacTest-1926998618', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '2c00466c69f24802b7da842ff1137d85'}, Network: None, Subnet: None, Router: None 2020-12-14 02:32:26.519 189 INFO tempest.lib.common.rest_client [req-99f85458-e581-46a8-aace-7a42affee707 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-12-14 02:32:26.523 189 DEBUG tempest.lib.common.rest_client [req-99f85458-e581-46a8-aace-7a42affee707 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6583', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-99f85458-e581-46a8-aace-7a42affee707', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["IVw09E7nS1ucnndtwKfvew"], "expires_at": "2020-12-14T03:32:26.000000Z", "issued_at": "2020-12-14T02:32:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:26.526 189 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-12-14 02:32:26.643 189 INFO tempest.lib.common.rest_client [req-2f23e0d1-3679-4941-b92c-b525cd944c50 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-14 02:32:26.646 189 DEBUG tempest.lib.common.rest_client [req-2f23e0d1-3679-4941-b92c-b525cd944c50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f23e0d1-3679-4941-b92c-b525cd944c50', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["h5zcfhPsQ5OJ_XesCugDPg"], "expires_at": "2020-12-14T03:32:26.000000Z", "issued_at": "2020-12-14T02:32:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:26.763 189 INFO tempest.lib.common.rest_client [req-83bdc4a1-1dec-4fe9-aa19-8c64c8017bf1 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:26.766 189 DEBUG tempest.lib.common.rest_client [req-83bdc4a1-1dec-4fe9-aa19-8c64c8017bf1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83bdc4a1-1dec-4fe9-aa19-8c64c8017bf1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["mieAbOGBRXyAGhOidSHOuA"], "expires_at": "2020-12-14T03:32:26.000000Z", "issued_at": "2020-12-14T02:32:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:26.832 189 INFO tempest.lib.common.rest_client [req-904f3e19-97d2-4b27-b6cd-1032f83d1412 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.059s 2020-12-14 02:32:26.835 189 DEBUG tempest.lib.common.rest_client [req-904f3e19-97d2-4b27-b6cd-1032f83d1412 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-904f3e19-97d2-4b27-b6cd-1032f83d1412', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:26.897 189 INFO tempest.lib.common.rest_client [req-e932c5d4-e180-4ad5-a372-b68c3132bc37 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:32:26.900 189 DEBUG tempest.lib.common.rest_client [req-e932c5d4-e180-4ad5-a372-b68c3132bc37 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e932c5d4-e180-4ad5-a372-b68c3132bc37', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:26.904 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:32:26.906 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:26.977 189 INFO tempest.lib.common.rest_client [req-af201547-7324-489d-b722-4712fee8381f ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles 0.065s 2020-12-14 02:32:26.980 189 DEBUG tempest.lib.common.rest_client [req-af201547-7324-489d-b722-4712fee8381f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af201547-7324-489d-b722-4712fee8381f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:27.058 189 INFO tempest.lib.common.rest_client [req-4c3996ba-a1c0-4ef7-8732-69f125b5d424 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles/72a4576c553448cd941b052c1ca0cf2d 0.073s 2020-12-14 02:32:27.061 189 DEBUG tempest.lib.common.rest_client [req-4c3996ba-a1c0-4ef7-8732-69f125b5d424 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4c3996ba-a1c0-4ef7-8732-69f125b5d424', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:27.183 189 INFO tempest.lib.common.rest_client [req-4eb76d1b-581c-4d5c-a7fd-5d0c7614b841 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles/a629c95d64b3416fb80ae90af4f69c05 0.116s 2020-12-14 02:32:27.187 189 DEBUG tempest.lib.common.rest_client [req-4eb76d1b-581c-4d5c-a7fd-5d0c7614b841 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4eb76d1b-581c-4d5c-a7fd-5d0c7614b841', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:28.302 189 INFO tempest.lib.common.rest_client [req-6b50bcd9-cc05-42b8-a8cb-725222788338 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-12-14 02:32:28.305 189 DEBUG tempest.lib.common.rest_client [req-6b50bcd9-cc05-42b8-a8cb-725222788338 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b50bcd9-cc05-42b8-a8cb-725222788338', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["85PvKsBwRryxfgDO7JQSEQ"], "expires_at": "2020-12-14T03:32:28.000000Z", "issued_at": "2020-12-14T02:32:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:28.353 189 INFO tempest.lib.common.rest_client [req-10f7c367-39f4-453e-991f-c96214df0738 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:32:28.356 189 DEBUG tempest.lib.common.rest_client [req-10f7c367-39f4-453e-991f-c96214df0738 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10f7c367-39f4-453e-991f-c96214df0738', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["EbXGs8DcTkqUqGhNiBq3Ng"], "expires_at": "2020-12-14T03:32:28.000000Z", "issued_at": "2020-12-14T02:32:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:28.580 189 INFO tempest.lib.common.rest_client [req-2859a75d-8513-45d6-b49e-f1ee2d2f4fb5 ] Request (DscpMarkingRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/qos/policies 0.212s 2020-12-14 02:32:28.583 189 DEBUG tempest.lib.common.rest_client [req-2859a75d-8513-45d6-b49e-f1ee2d2f4fb5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"name": "tempest-DscpMarkingRuleExtRbacTest-qos-1808479122", "shared": false, "is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '398', 'x-openstack-request-id': 'req-2859a75d-8513-45d6-b49e-f1ee2d2f4fb5', 'date': 'Mon, 14 Dec 2020 02:32:28 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies'} Body: b'{"policy": {"id": "0474b51c-5114-468c-b3c5-c791b7ab254e", "project_id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-qos-1808479122", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-12-14T02:32:28Z", "updated_at": "2020-12-14T02:32:28Z", "tenant_id": "7f544115badf4276bdc16b4e0d675945", "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:28.591 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:28.614 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_policy_dscp_marking_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:28.617 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:28.738 189 INFO tempest.lib.common.rest_client [req-f10d5a3c-5a50-4351-96dc-ff84a276915c ] Request (DscpMarkingRuleExtRbacTest:test_create_policy_dscp_marking_rule): 200 GET http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles 0.114s 2020-12-14 02:32:28.742 189 DEBUG tempest.lib.common.rest_client [req-f10d5a3c-5a50-4351-96dc-ff84a276915c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f10d5a3c-5a50-4351-96dc-ff84a276915c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:28.797 189 INFO tempest.lib.common.rest_client [req-8e557580-df67-4d81-a3b6-a14b367c97dd ] Request (DscpMarkingRuleExtRbacTest:test_create_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:32:28.801 189 DEBUG tempest.lib.common.rest_client [req-8e557580-df67-4d81-a3b6-a14b367c97dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e557580-df67-4d81-a3b6-a14b367c97dd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["UxLK6NTuR1aY9QjNmgTtAQ"], "expires_at": "2020-12-14T03:32:28.000000Z", "issued_at": "2020-12-14T02:32:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:28.854 189 INFO tempest.lib.common.rest_client [req-995c504f-fc08-43df-a1a2-214f45f47ee1 ] Request (DscpMarkingRuleExtRbacTest:test_create_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:32:28.858 189 DEBUG tempest.lib.common.rest_client [req-995c504f-fc08-43df-a1a2-214f45f47ee1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-995c504f-fc08-43df-a1a2-214f45f47ee1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["WVgLZsvyRzaWhNmLridxrg"], "expires_at": "2020-12-14T03:32:28.000000Z", "issued_at": "2020-12-14T02:32:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:28.865 189 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request_start', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/utils/test_utils.py:77 2020-12-14 02:32:29.052 189 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/utils/test_utils.py:77 2020-12-14 02:32:29.056 189 INFO tempest.lib.common.rest_client [req-4970a774-1e2c-4728-a29a-765e653f4430 ] Request (None): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules 0.186s 2020-12-14 02:32:29.059 189 DEBUG tempest.lib.common.rest_client [req-4970a774-1e2c-4728-a29a-765e653f4430 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"dscp_marking_rule": {"dscp_mark": 10}} Response - Headers: {'content-type': 'application/json', 'content-length': '86', 'x-openstack-request-id': 'req-4970a774-1e2c-4728-a29a-765e653f4430', 'date': 'Mon, 14 Dec 2020 02:32:29 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules'} Body: b'{"dscp_marking_rule": {"dscp_mark": 10, "id": "186a2769-3cce-45a4-9c40-3e6a5471b818"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:29.062 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:29.130 189 INFO tempest.lib.common.rest_client [req-da9fd52d-7d11-424a-94f9-a425b8ef6e53 ] Request (DscpMarkingRuleExtRbacTest:test_create_policy_dscp_marking_rule): 200 GET http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles 0.061s 2020-12-14 02:32:29.135 189 DEBUG tempest.lib.common.rest_client [req-da9fd52d-7d11-424a-94f9-a425b8ef6e53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da9fd52d-7d11-424a-94f9-a425b8ef6e53', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:29.194 189 INFO tempest.lib.common.rest_client [req-d4e8afa3-4cc6-498b-81c8-da532211e9bb ] Request (DscpMarkingRuleExtRbacTest:test_create_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:32:29.196 189 DEBUG tempest.lib.common.rest_client [req-d4e8afa3-4cc6-498b-81c8-da532211e9bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4e8afa3-4cc6-498b-81c8-da532211e9bb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["sj-RjnQlTzK4DHyNDnhudg"], "expires_at": "2020-12-14T03:32:29.000000Z", "issued_at": "2020-12-14T02:32:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:29.249 189 INFO tempest.lib.common.rest_client [req-58f3d635-0905-4de8-b213-6dd879d0e4ff ] Request (DscpMarkingRuleExtRbacTest:test_create_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:32:29.253 189 DEBUG tempest.lib.common.rest_client [req-58f3d635-0905-4de8-b213-6dd879d0e4ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58f3d635-0905-4de8-b213-6dd879d0e4ff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["-FPV9aqCTOq7cH5EhhHvAQ"], "expires_at": "2020-12-14T03:32:29.000000Z", "issued_at": "2020-12-14T02:32:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:29.417 189 INFO tempest.lib.common.rest_client [req-e44ae9e0-c74c-47cb-ae42-c9038ac74455 ] Request (DscpMarkingRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules/186a2769-3cce-45a4-9c40-3e6a5471b818 0.155s 2020-12-14 02:32:29.419 189 DEBUG tempest.lib.common.rest_client [req-e44ae9e0-c74c-47cb-ae42-c9038ac74455 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e44ae9e0-c74c-47cb-ae42-c9038ac74455', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:29 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules/186a2769-3cce-45a4-9c40-3e6a5471b818'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:29.433 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:29.456 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_dscp_marking_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:29.459 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:29.482 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_policy_dscp_marking_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:29.488 189 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request_start', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/utils/test_utils.py:77 2020-12-14 02:32:29.611 189 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/utils/test_utils.py:77 2020-12-14 02:32:29.615 189 INFO tempest.lib.common.rest_client [req-02e447f0-e06d-4bb0-b126-30e3875147c2 ] Request (None): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules 0.123s 2020-12-14 02:32:29.618 189 DEBUG tempest.lib.common.rest_client [req-02e447f0-e06d-4bb0-b126-30e3875147c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"dscp_marking_rule": {"dscp_mark": 10}} Response - Headers: {'content-type': 'application/json', 'content-length': '86', 'x-openstack-request-id': 'req-02e447f0-e06d-4bb0-b126-30e3875147c2', 'date': 'Mon, 14 Dec 2020 02:32:29 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules'} Body: b'{"dscp_marking_rule": {"dscp_mark": 10, "id": "846f5a16-0db8-44c6-ab28-2b7eee89339b"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:29.621 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:29.688 189 INFO tempest.lib.common.rest_client [req-535331d8-261b-4847-b77f-1af981747a02 ] Request (DscpMarkingRuleExtRbacTest:test_delete_policy_dscp_marking_rule): 200 GET http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles 0.061s 2020-12-14 02:32:29.691 189 DEBUG tempest.lib.common.rest_client [req-535331d8-261b-4847-b77f-1af981747a02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-535331d8-261b-4847-b77f-1af981747a02', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:29.737 189 INFO tempest.lib.common.rest_client [req-7808ce11-e5f3-4e16-8040-3e39d1d7e90e ] Request (DscpMarkingRuleExtRbacTest:test_delete_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:32:29.741 189 DEBUG tempest.lib.common.rest_client [req-7808ce11-e5f3-4e16-8040-3e39d1d7e90e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7808ce11-e5f3-4e16-8040-3e39d1d7e90e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["Z5tNOBtGSPSUr_b6uyK1FA"], "expires_at": "2020-12-14T03:32:29.000000Z", "issued_at": "2020-12-14T02:32:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:29.793 189 INFO tempest.lib.common.rest_client [req-45397a9d-5d39-45ee-b9ab-861a0807aa27 ] Request (DscpMarkingRuleExtRbacTest:test_delete_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:29.797 189 DEBUG tempest.lib.common.rest_client [req-45397a9d-5d39-45ee-b9ab-861a0807aa27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45397a9d-5d39-45ee-b9ab-861a0807aa27', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["3dCJYTzZRq68PZYgf4vqlw"], "expires_at": "2020-12-14T03:32:29.000000Z", "issued_at": "2020-12-14T02:32:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:29.944 189 INFO tempest.lib.common.rest_client [req-5fbc8457-7b95-42d0-a069-d0a1b84d2292 ] Request (DscpMarkingRuleExtRbacTest:test_delete_policy_dscp_marking_rule): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules/846f5a16-0db8-44c6-ab28-2b7eee89339b 0.139s 2020-12-14 02:32:29.948 189 DEBUG tempest.lib.common.rest_client [req-5fbc8457-7b95-42d0-a069-d0a1b84d2292 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5fbc8457-7b95-42d0-a069-d0a1b84d2292', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:29 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules/846f5a16-0db8-44c6-ab28-2b7eee89339b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:29.951 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:30.022 189 INFO tempest.lib.common.rest_client [req-71b35c34-3c38-42ba-9667-747c30cb7b72 ] Request (DscpMarkingRuleExtRbacTest:test_delete_policy_dscp_marking_rule): 200 GET http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles 0.064s 2020-12-14 02:32:30.026 189 DEBUG tempest.lib.common.rest_client [req-71b35c34-3c38-42ba-9667-747c30cb7b72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-71b35c34-3c38-42ba-9667-747c30cb7b72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:30.080 189 INFO tempest.lib.common.rest_client [req-f223771a-28fc-4810-b8ed-e6e70c6803af ] Request (DscpMarkingRuleExtRbacTest:test_delete_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:32:30.084 189 DEBUG tempest.lib.common.rest_client [req-f223771a-28fc-4810-b8ed-e6e70c6803af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f223771a-28fc-4810-b8ed-e6e70c6803af', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["SpcAMnSyQoKZLk6Et7SGYw"], "expires_at": "2020-12-14T03:32:30.000000Z", "issued_at": "2020-12-14T02:32:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:30.138 189 INFO tempest.lib.common.rest_client [req-02092365-e9a2-40ba-9753-e3f2fa7cff6a ] Request (DscpMarkingRuleExtRbacTest:test_delete_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:32:30.141 189 DEBUG tempest.lib.common.rest_client [req-02092365-e9a2-40ba-9753-e3f2fa7cff6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02092365-e9a2-40ba-9753-e3f2fa7cff6a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["_2FWv9f8QS24CZ9l9I98KQ"], "expires_at": "2020-12-14T03:32:30.000000Z", "issued_at": "2020-12-14T02:32:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:30.260 189 INFO tempest.lib.common.rest_client [req-35fd3272-bd49-4f35-bff3-6c39d9a0a9fc ] Request (DscpMarkingRuleExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules/846f5a16-0db8-44c6-ab28-2b7eee89339b 0.109s 2020-12-14 02:32:30.264 189 DEBUG tempest.lib.common.rest_client [req-35fd3272-bd49-4f35-bff3-6c39d9a0a9fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '187', 'x-openstack-request-id': 'req-35fd3272-bd49-4f35-bff3-6c39d9a0a9fc', 'date': 'Mon, 14 Dec 2020 02:32:30 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules/846f5a16-0db8-44c6-ab28-2b7eee89339b'} Body: b'{"NeutronError": {"type": "QosRuleNotFound", "message": "QoS rule 846f5a16-0db8-44c6-ab28-2b7eee89339b for policy 0474b51c-5114-468c-b3c5-c791b7ab254e could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:30.278 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:30.301 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_dscp_marking_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:30.306 189 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request_start', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/utils/test_utils.py:77 2020-12-14 02:32:30.432 189 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/utils/test_utils.py:77 2020-12-14 02:32:30.435 189 INFO tempest.lib.common.rest_client [req-02a786b7-f720-44c0-8c84-503d84b0de83 ] Request (None): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules 0.125s 2020-12-14 02:32:30.437 189 DEBUG tempest.lib.common.rest_client [req-02a786b7-f720-44c0-8c84-503d84b0de83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"dscp_marking_rule": {"dscp_mark": 10}} Response - Headers: {'content-type': 'application/json', 'content-length': '86', 'x-openstack-request-id': 'req-02a786b7-f720-44c0-8c84-503d84b0de83', 'date': 'Mon, 14 Dec 2020 02:32:30 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules'} Body: b'{"dscp_marking_rule": {"dscp_mark": 10, "id": "731f9375-7be0-4175-adb1-be19a5c57f23"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:30.440 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:30.511 189 INFO tempest.lib.common.rest_client [req-57c1d19a-3162-4431-beb6-95c068f9ade4 ] Request (DscpMarkingRuleExtRbacTest:test_list_policy_dscp_marking_rules): 200 GET http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles 0.064s 2020-12-14 02:32:30.515 189 DEBUG tempest.lib.common.rest_client [req-57c1d19a-3162-4431-beb6-95c068f9ade4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57c1d19a-3162-4431-beb6-95c068f9ade4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:30.572 189 INFO tempest.lib.common.rest_client [req-4a86052b-f118-406b-ae9d-5910f087f85e ] Request (DscpMarkingRuleExtRbacTest:test_list_policy_dscp_marking_rules): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:32:30.576 189 DEBUG tempest.lib.common.rest_client [req-4a86052b-f118-406b-ae9d-5910f087f85e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4a86052b-f118-406b-ae9d-5910f087f85e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["qs2Zbt4zRReAWSuQbVRyuQ"], "expires_at": "2020-12-14T03:32:30.000000Z", "issued_at": "2020-12-14T02:32:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:30.628 189 INFO tempest.lib.common.rest_client [req-3fdb146e-05e6-45f6-b4bb-ec1b46c292df ] Request (DscpMarkingRuleExtRbacTest:test_list_policy_dscp_marking_rules): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:30.632 189 DEBUG tempest.lib.common.rest_client [req-3fdb146e-05e6-45f6-b4bb-ec1b46c292df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3fdb146e-05e6-45f6-b4bb-ec1b46c292df', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["CHjkClg8Qe6VcdgflhVH8A"], "expires_at": "2020-12-14T03:32:30.000000Z", "issued_at": "2020-12-14T02:32:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:30.781 189 INFO tempest.lib.common.rest_client [req-fb006a04-3e83-425b-b7b0-1bc9164b5eb6 ] Request (DscpMarkingRuleExtRbacTest:test_list_policy_dscp_marking_rules): 200 GET http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules 0.141s 2020-12-14 02:32:30.785 189 DEBUG tempest.lib.common.rest_client [req-fb006a04-3e83-425b-b7b0-1bc9164b5eb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '89', 'x-openstack-request-id': 'req-fb006a04-3e83-425b-b7b0-1bc9164b5eb6', 'date': 'Mon, 14 Dec 2020 02:32:30 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules'} Body: b'{"dscp_marking_rules": [{"dscp_mark": 10, "id": "731f9375-7be0-4175-adb1-be19a5c57f23"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:30.788 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:30.855 189 INFO tempest.lib.common.rest_client [req-316bddfd-349b-476a-a671-9033bcc27b89 ] Request (DscpMarkingRuleExtRbacTest:test_list_policy_dscp_marking_rules): 200 GET http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles 0.061s 2020-12-14 02:32:30.859 189 DEBUG tempest.lib.common.rest_client [req-316bddfd-349b-476a-a671-9033bcc27b89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-316bddfd-349b-476a-a671-9033bcc27b89', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:30.912 189 INFO tempest.lib.common.rest_client [req-6839e7cc-c3ae-4c0a-97db-89d3e0338ee2 ] Request (DscpMarkingRuleExtRbacTest:test_list_policy_dscp_marking_rules): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:30.916 189 DEBUG tempest.lib.common.rest_client [req-6839e7cc-c3ae-4c0a-97db-89d3e0338ee2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6839e7cc-c3ae-4c0a-97db-89d3e0338ee2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["7NhqBeAATH6173PWM_MwZQ"], "expires_at": "2020-12-14T03:32:30.000000Z", "issued_at": "2020-12-14T02:32:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:30.967 189 INFO tempest.lib.common.rest_client [req-e08619d1-5c82-4b4d-9515-f36e0e4af467 ] Request (DscpMarkingRuleExtRbacTest:test_list_policy_dscp_marking_rules): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:32:30.971 189 DEBUG tempest.lib.common.rest_client [req-e08619d1-5c82-4b4d-9515-f36e0e4af467 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e08619d1-5c82-4b4d-9515-f36e0e4af467', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["qo11IJs4Q4CO1OJhp-6GPg"], "expires_at": "2020-12-14T03:32:30.000000Z", "issued_at": "2020-12-14T02:32:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:31.108 189 INFO tempest.lib.common.rest_client [req-8af015c3-7def-4a48-b821-5ade13600c4c ] Request (DscpMarkingRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules/731f9375-7be0-4175-adb1-be19a5c57f23 0.127s 2020-12-14 02:32:31.111 189 DEBUG tempest.lib.common.rest_client [req-8af015c3-7def-4a48-b821-5ade13600c4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-8af015c3-7def-4a48-b821-5ade13600c4c', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:31 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules/731f9375-7be0-4175-adb1-be19a5c57f23'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:31.124 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:31.147 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_dscp_marking_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:31.152 189 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request_start', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/utils/test_utils.py:77 2020-12-14 02:32:31.257 189 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/utils/test_utils.py:77 2020-12-14 02:32:31.261 189 INFO tempest.lib.common.rest_client [req-e2edc57a-43f3-4ac3-8af0-012fad25ff66 ] Request (None): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules 0.104s 2020-12-14 02:32:31.264 189 DEBUG tempest.lib.common.rest_client [req-e2edc57a-43f3-4ac3-8af0-012fad25ff66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"dscp_marking_rule": {"dscp_mark": 10}} Response - Headers: {'content-type': 'application/json', 'content-length': '86', 'x-openstack-request-id': 'req-e2edc57a-43f3-4ac3-8af0-012fad25ff66', 'date': 'Mon, 14 Dec 2020 02:32:31 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules'} Body: b'{"dscp_marking_rule": {"dscp_mark": 10, "id": "be8363af-3dce-4e55-b354-e426cc9b4c7c"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:31.267 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:31.334 189 INFO tempest.lib.common.rest_client [req-5d0ae8b1-5526-44bd-88ac-11b10264bdef ] Request (DscpMarkingRuleExtRbacTest:test_show_policy_dscp_marking_rule): 200 GET http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles 0.060s 2020-12-14 02:32:31.338 189 DEBUG tempest.lib.common.rest_client [req-5d0ae8b1-5526-44bd-88ac-11b10264bdef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d0ae8b1-5526-44bd-88ac-11b10264bdef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:31.386 189 INFO tempest.lib.common.rest_client [req-caf823ff-963a-47e3-b52a-da50d983660e ] Request (DscpMarkingRuleExtRbacTest:test_show_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:32:31.390 189 DEBUG tempest.lib.common.rest_client [req-caf823ff-963a-47e3-b52a-da50d983660e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-caf823ff-963a-47e3-b52a-da50d983660e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["IgpWS3B9TbCucIwg5NkXWA"], "expires_at": "2020-12-14T03:32:31.000000Z", "issued_at": "2020-12-14T02:32:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:31.438 189 INFO tempest.lib.common.rest_client [req-0434d416-4e7d-4058-8546-ac636da5960f ] Request (DscpMarkingRuleExtRbacTest:test_show_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:32:31.441 189 DEBUG tempest.lib.common.rest_client [req-0434d416-4e7d-4058-8546-ac636da5960f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0434d416-4e7d-4058-8546-ac636da5960f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["OVyipMxCQK2eyt6qNEDxig"], "expires_at": "2020-12-14T03:32:31.000000Z", "issued_at": "2020-12-14T02:32:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:31.550 189 INFO tempest.lib.common.rest_client [req-225b7077-5e0f-4f35-a4ba-bcedf6678295 ] Request (DscpMarkingRuleExtRbacTest:test_show_policy_dscp_marking_rule): 200 GET http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules/be8363af-3dce-4e55-b354-e426cc9b4c7c 0.102s 2020-12-14 02:32:31.553 189 DEBUG tempest.lib.common.rest_client [req-225b7077-5e0f-4f35-a4ba-bcedf6678295 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '86', 'x-openstack-request-id': 'req-225b7077-5e0f-4f35-a4ba-bcedf6678295', 'date': 'Mon, 14 Dec 2020 02:32:31 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules/be8363af-3dce-4e55-b354-e426cc9b4c7c'} Body: b'{"dscp_marking_rule": {"dscp_mark": 10, "id": "be8363af-3dce-4e55-b354-e426cc9b4c7c"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:31.556 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:31.623 189 INFO tempest.lib.common.rest_client [req-a63b4a15-fcc8-476e-926a-025707ce0213 ] Request (DscpMarkingRuleExtRbacTest:test_show_policy_dscp_marking_rule): 200 GET http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles 0.060s 2020-12-14 02:32:31.626 189 DEBUG tempest.lib.common.rest_client [req-a63b4a15-fcc8-476e-926a-025707ce0213 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a63b4a15-fcc8-476e-926a-025707ce0213', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:31.674 189 INFO tempest.lib.common.rest_client [req-8d6487f7-6009-4ee0-a651-434471a57231 ] Request (DscpMarkingRuleExtRbacTest:test_show_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:32:31.678 189 DEBUG tempest.lib.common.rest_client [req-8d6487f7-6009-4ee0-a651-434471a57231 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8d6487f7-6009-4ee0-a651-434471a57231', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["UgNhbPZPT1SigScETAaU-Q"], "expires_at": "2020-12-14T03:32:31.000000Z", "issued_at": "2020-12-14T02:32:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:31.726 189 INFO tempest.lib.common.rest_client [req-eba2a805-192d-45ee-a336-42da62390fec ] Request (DscpMarkingRuleExtRbacTest:test_show_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:32:31.729 189 DEBUG tempest.lib.common.rest_client [req-eba2a805-192d-45ee-a336-42da62390fec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eba2a805-192d-45ee-a336-42da62390fec', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["nEsMM7HAQzyKFPNXS3KKmg"], "expires_at": "2020-12-14T03:32:31.000000Z", "issued_at": "2020-12-14T02:32:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:31.879 189 INFO tempest.lib.common.rest_client [req-f883db01-8003-48c8-b4db-b691211af2b8 ] Request (DscpMarkingRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules/be8363af-3dce-4e55-b354-e426cc9b4c7c 0.142s 2020-12-14 02:32:31.882 189 DEBUG tempest.lib.common.rest_client [req-f883db01-8003-48c8-b4db-b691211af2b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f883db01-8003-48c8-b4db-b691211af2b8', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:31 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules/be8363af-3dce-4e55-b354-e426cc9b4c7c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:31.895 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:31.917 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_dscp_marking_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:31.920 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:31.942 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_policy_dscp_marking_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:31.947 189 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request_start', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/utils/test_utils.py:77 2020-12-14 02:32:32.050 189 DEBUG tempest.lib.common.utils.test_utils [-] Sane call name not found in ['_log_request', 'raw_request', '_request', 'request', 'post', 'create_dscp_marking_rule', 'create_policy_dscp_marking_rule'] find_test_caller /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/utils/test_utils.py:77 2020-12-14 02:32:32.053 189 INFO tempest.lib.common.rest_client [req-d8a9f2cd-43f3-4daf-a93d-d0f52d7489de ] Request (None): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules 0.103s 2020-12-14 02:32:32.055 189 DEBUG tempest.lib.common.rest_client [req-d8a9f2cd-43f3-4daf-a93d-d0f52d7489de ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"dscp_marking_rule": {"dscp_mark": 10}} Response - Headers: {'content-type': 'application/json', 'content-length': '86', 'x-openstack-request-id': 'req-d8a9f2cd-43f3-4daf-a93d-d0f52d7489de', 'date': 'Mon, 14 Dec 2020 02:32:32 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules'} Body: b'{"dscp_marking_rule": {"dscp_mark": 10, "id": "58759e16-9eb0-4704-9d83-6ca73ee7ac06"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:32.058 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:32.133 189 INFO tempest.lib.common.rest_client [req-87d9cc33-1730-45d6-80ff-f056b77972a9 ] Request (DscpMarkingRuleExtRbacTest:test_update_policy_dscp_marking_rule): 200 GET http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles 0.069s 2020-12-14 02:32:32.137 189 DEBUG tempest.lib.common.rest_client [req-87d9cc33-1730-45d6-80ff-f056b77972a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87d9cc33-1730-45d6-80ff-f056b77972a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:32.196 189 INFO tempest.lib.common.rest_client [req-c9405ab4-5d9c-44a6-a758-4e466c7d06d0 ] Request (DscpMarkingRuleExtRbacTest:test_update_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:32:32.199 189 DEBUG tempest.lib.common.rest_client [req-c9405ab4-5d9c-44a6-a758-4e466c7d06d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9405ab4-5d9c-44a6-a758-4e466c7d06d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["YWwK9VPFS36agrQQdwc5eA"], "expires_at": "2020-12-14T03:32:32.000000Z", "issued_at": "2020-12-14T02:32:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:32.256 189 INFO tempest.lib.common.rest_client [req-58635396-0019-4820-9934-39d13a59dfbb ] Request (DscpMarkingRuleExtRbacTest:test_update_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:32:32.261 189 DEBUG tempest.lib.common.rest_client [req-58635396-0019-4820-9934-39d13a59dfbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58635396-0019-4820-9934-39d13a59dfbb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["7xAzHSRuSny68j-QzjvVFg"], "expires_at": "2020-12-14T03:32:32.000000Z", "issued_at": "2020-12-14T02:32:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:32.428 189 INFO tempest.lib.common.rest_client [req-d4d6658f-6828-47c5-80e1-e15347881e58 ] Request (DscpMarkingRuleExtRbacTest:test_update_policy_dscp_marking_rule): 200 PUT http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules/58759e16-9eb0-4704-9d83-6ca73ee7ac06 0.160s 2020-12-14 02:32:32.431 189 DEBUG tempest.lib.common.rest_client [req-d4d6658f-6828-47c5-80e1-e15347881e58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"dscp_marking_rule": {"dscp_mark": 16}} Response - Headers: {'content-type': 'application/json', 'content-length': '86', 'x-openstack-request-id': 'req-d4d6658f-6828-47c5-80e1-e15347881e58', 'date': 'Mon, 14 Dec 2020 02:32:32 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules/58759e16-9eb0-4704-9d83-6ca73ee7ac06'} Body: b'{"dscp_marking_rule": {"dscp_mark": 16, "id": "58759e16-9eb0-4704-9d83-6ca73ee7ac06"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:32.434 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:32.512 189 INFO tempest.lib.common.rest_client [req-fcc9774d-4a12-4cb4-8d18-f4df30514dc8 ] Request (DscpMarkingRuleExtRbacTest:test_update_policy_dscp_marking_rule): 200 GET http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles 0.071s 2020-12-14 02:32:32.516 189 DEBUG tempest.lib.common.rest_client [req-fcc9774d-4a12-4cb4-8d18-f4df30514dc8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fcc9774d-4a12-4cb4-8d18-f4df30514dc8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945/users/2c00466c69f24802b7da842ff1137d85/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:32.565 189 INFO tempest.lib.common.rest_client [req-eda10b67-a41b-4edd-9662-6f9c9d6f742d ] Request (DscpMarkingRuleExtRbacTest:test_update_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:32:32.568 189 DEBUG tempest.lib.common.rest_client [req-eda10b67-a41b-4edd-9662-6f9c9d6f742d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eda10b67-a41b-4edd-9662-6f9c9d6f742d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["yZv4kxLzTWeE3S1VSKnfIg"], "expires_at": "2020-12-14T03:32:32.000000Z", "issued_at": "2020-12-14T02:32:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:32.617 189 INFO tempest.lib.common.rest_client [req-da20fde0-308e-4f6d-a14c-e141f602e9d0 ] Request (DscpMarkingRuleExtRbacTest:test_update_policy_dscp_marking_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:32:32.620 189 DEBUG tempest.lib.common.rest_client [req-da20fde0-308e-4f6d-a14c-e141f602e9d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6644', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da20fde0-308e-4f6d-a14c-e141f602e9d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2c00466c69f24802b7da842ff1137d85", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618", "password_expires_at": null}, "audit_ids": ["DYOqofrMS9O7rRUoB5hLnw"], "expires_at": "2020-12-14T03:32:32.000000Z", "issued_at": "2020-12-14T02:32:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "7f544115badf4276bdc16b4e0d675945", "name": "tempest-DscpMarkingRuleExtRbacTest-1926998618"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_7f544115badf4276bdc16b4e0d675945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:32.781 189 INFO tempest.lib.common.rest_client [req-aa88f77f-c85d-436e-8dcb-4d61a8b6a2d0 ] Request (DscpMarkingRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules/58759e16-9eb0-4704-9d83-6ca73ee7ac06 0.153s 2020-12-14 02:32:32.783 189 DEBUG tempest.lib.common.rest_client [req-aa88f77f-c85d-436e-8dcb-4d61a8b6a2d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-aa88f77f-c85d-436e-8dcb-4d61a8b6a2d0', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:32 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e/dscp_marking_rules/58759e16-9eb0-4704-9d83-6ca73ee7ac06'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:32.897 189 INFO tempest.lib.common.rest_client [req-4ee2e400-d4a5-47ba-a5db-9d21f2486893 ] Request (DscpMarkingRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e 0.099s 2020-12-14 02:32:32.900 189 DEBUG tempest.lib.common.rest_client [req-4ee2e400-d4a5-47ba-a5db-9d21f2486893 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-4ee2e400-d4a5-47ba-a5db-9d21f2486893', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:32 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/0474b51c-5114-468c-b3c5-c791b7ab254e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:33.057 189 INFO tempest.lib.common.rest_client [req-65d844ce-5ef4-4818-9e8e-e34cb6e8fa75 ] Request (DscpMarkingRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/2c00466c69f24802b7da842ff1137d85 0.150s 2020-12-14 02:32:33.060 189 DEBUG tempest.lib.common.rest_client [req-65d844ce-5ef4-4818-9e8e-e34cb6e8fa75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-65d844ce-5ef4-4818-9e8e-e34cb6e8fa75', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/2c00466c69f24802b7da842ff1137d85'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:33.188 189 INFO tempest.lib.common.rest_client [req-beed22ba-b5e8-44ff-a497-4cab6116df89 ] Request (DscpMarkingRuleExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.119s 2020-12-14 02:32:33.192 189 DEBUG tempest.lib.common.rest_client [req-beed22ba-b5e8-44ff-a497-4cab6116df89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-beed22ba-b5e8-44ff-a497-4cab6116df89', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["bWHBbwI7QwCTwWMmG-jsNw"], "expires_at": "2020-12-14T03:32:33.000000Z", "issued_at": "2020-12-14T02:32:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:33.476 189 INFO tempest.lib.common.rest_client [req-10ad7f51-a530-469f-b0a6-cc3700366497 ] Request (DscpMarkingRuleExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=7f544115badf4276bdc16b4e0d675945&name=default 0.275s 2020-12-14 02:32:33.478 189 DEBUG tempest.lib.common.rest_client [req-10ad7f51-a530-469f-b0a6-cc3700366497 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-10ad7f51-a530-469f-b0a6-cc3700366497', 'date': 'Mon, 14 Dec 2020 02:32:33 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=7f544115badf4276bdc16b4e0d675945&name=default'} Body: b'{"security_groups": [{"id": "f9c0869b-14ed-4cb0-b460-a3a5a9fc7a7c", "name": "default", "stateful": true, "tenant_id": "7f544115badf4276bdc16b4e0d675945", "description": "Default security group", "security_group_rules": [{"id": "24c4f0eb-29fd-4017-97c5-3ad33c72ac95", "tenant_id": "7f544115badf4276bdc16b4e0d675945", "security_group_id": "f9c0869b-14ed-4cb0-b460-a3a5a9fc7a7c", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:32:33Z", "updated_at": "2020-12-14T02:32:33Z", "revision_number": 0, "project_id": "7f544115badf4276bdc16b4e0d675945"}, {"id": "82c3f1fb-f57c-4d90-a118-ad4e466e446b", "tenant_id": "7f544115badf4276bdc16b4e0d675945", "security_group_id": "f9c0869b-14ed-4cb0-b460-a3a5a9fc7a7c", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f9c0869b-14ed-4cb0-b460-a3a5a9fc7a7c", "description": null, "tags": [], "created_at": "2020-12-14T02:32:33Z", "updated_at": "2020-12-14T02:32:33Z", "revision_number": 0, "project_id": "7f544115badf4276bdc16b4e0d675945"}, {"id": "e6f00245-0281-4ae2-995f-4373b99d3dc8", "tenant_id": "7f544115badf4276bdc16b4e0d675945", "security_group_id": "f9c0869b-14ed-4cb0-b460-a3a5a9fc7a7c", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:32:33Z", "updated_at": "2020-12-14T02:32:33Z", "revision_number": 0, "project_id": "7f544115badf4276bdc16b4e0d675945"}, {"id": "fd0d6d39-693f-4653-b400-b08476994c48", "tenant_id": "7f544115badf4276bdc16b4e0d675945", "security_group_id": "f9c0869b-14ed-4cb0-b460-a3a5a9fc7a7c", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "f9c0869b-14ed-4cb0-b460-a3a5a9fc7a7c", "description": null, "tags": [], "created_at": "2020-12-14T02:32:33Z", "updated_at": "2020-12-14T02:32:33Z", "revision_number": 0, "project_id": "7f544115badf4276bdc16b4e0d675945"}], "tags": [], "created_at": "2020-12-14T02:32:33Z", "updated_at": "2020-12-14T02:32:33Z", "revision_number": 1, "project_id": "7f544115badf4276bdc16b4e0d675945"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:33.630 189 INFO tempest.lib.common.rest_client [req-7c5876d8-74fa-4841-8d86-27f773c4ef58 ] Request (DscpMarkingRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/f9c0869b-14ed-4cb0-b460-a3a5a9fc7a7c 0.144s 2020-12-14 02:32:33.633 189 DEBUG tempest.lib.common.rest_client [req-7c5876d8-74fa-4841-8d86-27f773c4ef58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-7c5876d8-74fa-4841-8d86-27f773c4ef58', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:33 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/f9c0869b-14ed-4cb0-b460-a3a5a9fc7a7c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:33.839 189 INFO tempest.lib.common.rest_client [req-aed40c02-ca1b-4ba3-b204-abd436d376d3 ] Request (DscpMarkingRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945 0.199s 2020-12-14 02:32:33.842 189 DEBUG tempest.lib.common.rest_client [req-aed40c02-ca1b-4ba3-b204-abd436d376d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aed40c02-ca1b-4ba3-b204-abd436d376d3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/7f544115badf4276bdc16b4e0d675945'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:33.960 189 INFO tempest.lib.common.rest_client [req-eb06fee6-9a79-40d8-97f3-16abfbd090f8 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:32:33.963 189 DEBUG tempest.lib.common.rest_client [req-eb06fee6-9a79-40d8-97f3-16abfbd090f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb06fee6-9a79-40d8-97f3-16abfbd090f8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["CTbT4wYST2CFYrt78XlSCA"], "expires_at": "2020-12-14T03:32:33.000000Z", "issued_at": "2020-12-14T02:32:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:34.063 189 INFO tempest.lib.common.rest_client [req-b28ae746-16a0-470a-a9eb-c366eaf2cbc1 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:32:34.066 189 DEBUG tempest.lib.common.rest_client [req-b28ae746-16a0-470a-a9eb-c366eaf2cbc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b28ae746-16a0-470a-a9eb-c366eaf2cbc1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["IyqscBoRTj6GTFvthwpwMg"], "expires_at": "2020-12-14T03:32:34.000000Z", "issued_at": "2020-12-14T02:32:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:34.161 189 INFO tempest.lib.common.rest_client [req-1a0472c9-1343-4601-9fcb-fda215fae658 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.086s 2020-12-14 02:32:34.164 189 DEBUG tempest.lib.common.rest_client [req-1a0472c9-1343-4601-9fcb-fda215fae658 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a0472c9-1343-4601-9fcb-fda215fae658', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:34.258 189 INFO tempest.lib.common.rest_client [req-6f19ab1c-41b1-4134-84c8-59cf20540dfd ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.084s 2020-12-14 02:32:34.261 189 DEBUG tempest.lib.common.rest_client [req-6f19ab1c-41b1-4134-84c8-59cf20540dfd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FlavorsServiceProfileExtRbacTest-1853912379-desc", "domain_id": "default", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '402', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f19ab1c-41b1-4134-84c8-59cf20540dfd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "b65fb167b8e34107adb8b47f658c8945", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379", "domain_id": "default", "description": "tempest-FlavorsServiceProfileExtRbacTest-1853912379-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:34.398 189 INFO tempest.lib.common.rest_client [req-2ad90437-832f-4e31-a8d8-0e0f260e43ae ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.128s 2020-12-14 02:32:34.402 189 DEBUG tempest.lib.common.rest_client [req-2ad90437-832f-4e31-a8d8-0e0f260e43ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379", "password": "O0&Kw3EzCas0xE~", "project_id": "b65fb167b8e34107adb8b47f658c8945", "email": "tempest-FlavorsServiceProfileExtRbacTest-236875610@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '419', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ad90437-832f-4e31-a8d8-0e0f260e43ae', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "b65fb167b8e34107adb8b47f658c8945", "email": "tempest-FlavorsServiceProfileExtRbacTest-236875610@example.com", "id": "3cbec48e4e79492eae920b223c810b69", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/3cbec48e4e79492eae920b223c810b69"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:34.476 189 INFO tempest.lib.common.rest_client [req-7798ef7d-64f6-4bb2-927f-fd8d38483705 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.068s 2020-12-14 02:32:34.478 189 DEBUG tempest.lib.common.rest_client [req-7798ef7d-64f6-4bb2-927f-fd8d38483705 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7798ef7d-64f6-4bb2-927f-fd8d38483705', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:34.554 189 INFO tempest.lib.common.rest_client [req-b9a4e56b-ca1f-4a75-b2ee-c8616f5fbcf8 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:32:34.558 189 DEBUG tempest.lib.common.rest_client [req-b9a4e56b-ca1f-4a75-b2ee-c8616f5fbcf8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9a4e56b-ca1f-4a75-b2ee-c8616f5fbcf8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:34.649 189 INFO tempest.lib.common.rest_client [req-fd906c50-4563-40d7-947e-a3dc5f3760bd ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles/72a4576c553448cd941b052c1ca0cf2d 0.083s 2020-12-14 02:32:34.653 189 DEBUG tempest.lib.common.rest_client [req-fd906c50-4563-40d7-947e-a3dc5f3760bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd906c50-4563-40d7-947e-a3dc5f3760bd', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:34.656 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorsServiceProfileExtRbacTest-1853912379', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'b65fb167b8e34107adb8b47f658c8945', 'project_name': 'tempest-FlavorsServiceProfileExtRbacTest-1853912379', 'tenant_id': 'b65fb167b8e34107adb8b47f658c8945', 'tenant_name': 'tempest-FlavorsServiceProfileExtRbacTest-1853912379', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '3cbec48e4e79492eae920b223c810b69'}, Network: None, Subnet: None, Router: None 2020-12-14 02:32:34.660 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorsServiceProfileExtRbacTest-1853912379', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'b65fb167b8e34107adb8b47f658c8945', 'project_name': 'tempest-FlavorsServiceProfileExtRbacTest-1853912379', 'tenant_id': 'b65fb167b8e34107adb8b47f658c8945', 'tenant_name': 'tempest-FlavorsServiceProfileExtRbacTest-1853912379', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '3cbec48e4e79492eae920b223c810b69'}, Network: None, Subnet: None, Router: None 2020-12-14 02:32:34.853 189 INFO tempest.lib.common.rest_client [req-c62167a2-2ca3-4d50-a961-bd2c8d795ea3 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.124s 2020-12-14 02:32:34.857 189 DEBUG tempest.lib.common.rest_client [req-c62167a2-2ca3-4d50-a961-bd2c8d795ea3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6595', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c62167a2-2ca3-4d50-a961-bd2c8d795ea3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3cbec48e4e79492eae920b223c810b69", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379", "password_expires_at": null}, "audit_ids": ["bA3d45YYTzqPwhByDeer4w"], "expires_at": "2020-12-14T03:32:34.000000Z", "issued_at": "2020-12-14T02:32:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b65fb167b8e34107adb8b47f658c8945", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "Region _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:34.861 189 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-12-14 02:32:34.994 189 INFO tempest.lib.common.rest_client [req-7cb14f1e-3646-4850-920e-4f10e8d63e32 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:32:34.997 189 DEBUG tempest.lib.common.rest_client [req-7cb14f1e-3646-4850-920e-4f10e8d63e32 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7cb14f1e-3646-4850-920e-4f10e8d63e32', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["53o-1yeKRwes5lJmKJ7m5Q"], "expires_at": "2020-12-14T03:32:34.000000Z", "issued_at": "2020-12-14T02:32:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:35.128 189 INFO tempest.lib.common.rest_client [req-c8d508bc-bc8b-4391-bdb4-e7bda03a8386 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:35.131 189 DEBUG tempest.lib.common.rest_client [req-c8d508bc-bc8b-4391-bdb4-e7bda03a8386 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8d508bc-bc8b-4391-bdb4-e7bda03a8386', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["qQmxjrjHTtmWQmrex8LktQ"], "expires_at": "2020-12-14T03:32:35.000000Z", "issued_at": "2020-12-14T02:32:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:35.189 189 INFO tempest.lib.common.rest_client [req-a806cbb9-a70f-4421-9985-ec45e023aa16 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.052s 2020-12-14 02:32:35.191 189 DEBUG tempest.lib.common.rest_client [req-a806cbb9-a70f-4421-9985-ec45e023aa16 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a806cbb9-a70f-4421-9985-ec45e023aa16', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:35.258 189 INFO tempest.lib.common.rest_client [req-d4d43498-8995-4185-811a-aced48843dec ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-14 02:32:35.260 189 DEBUG tempest.lib.common.rest_client [req-d4d43498-8995-4185-811a-aced48843dec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4d43498-8995-4185-811a-aced48843dec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:35.263 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:32:35.265 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:35.334 189 INFO tempest.lib.common.rest_client [req-2aa2e2d3-9edc-4f42-a5c4-f991fc23f331 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles 0.063s 2020-12-14 02:32:35.336 189 DEBUG tempest.lib.common.rest_client [req-2aa2e2d3-9edc-4f42-a5c4-f991fc23f331 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2aa2e2d3-9edc-4f42-a5c4-f991fc23f331', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:35.424 189 INFO tempest.lib.common.rest_client [req-d2822fd3-38e9-40c2-bcb4-c9ce6d49e5b9 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles/72a4576c553448cd941b052c1ca0cf2d 0.081s 2020-12-14 02:32:35.427 189 DEBUG tempest.lib.common.rest_client [req-d2822fd3-38e9-40c2-bcb4-c9ce6d49e5b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2822fd3-38e9-40c2-bcb4-c9ce6d49e5b9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:35.553 189 INFO tempest.lib.common.rest_client [req-538c95d7-8940-47d7-b256-1efc1f10a2b9 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles/a629c95d64b3416fb80ae90af4f69c05 0.119s 2020-12-14 02:32:35.557 189 DEBUG tempest.lib.common.rest_client [req-538c95d7-8940-47d7-b256-1efc1f10a2b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-538c95d7-8940-47d7-b256-1efc1f10a2b9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:36.661 189 INFO tempest.lib.common.rest_client [req-85bc8de8-5b32-4728-ae96-29de16966d71 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:32:36.664 189 DEBUG tempest.lib.common.rest_client [req-85bc8de8-5b32-4728-ae96-29de16966d71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85bc8de8-5b32-4728-ae96-29de16966d71', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3cbec48e4e79492eae920b223c810b69", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379", "password_expires_at": null}, "audit_ids": ["a0f244xaQl6EfnzQufgb_g"], "expires_at": "2020-12-14T03:32:36.000000Z", "issued_at": "2020-12-14T02:32:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b65fb167b8e34107adb8b47f658c8945", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:36.715 189 INFO tempest.lib.common.rest_client [req-f2552843-4110-475f-a2d5-c5831b04bb07 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:32:36.718 189 DEBUG tempest.lib.common.rest_client [req-f2552843-4110-475f-a2d5-c5831b04bb07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2552843-4110-475f-a2d5-c5831b04bb07', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3cbec48e4e79492eae920b223c810b69", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379", "password_expires_at": null}, "audit_ids": ["WyYTfVFLRSiBJx5XnnFNbA"], "expires_at": "2020-12-14T03:32:36.000000Z", "issued_at": "2020-12-14T02:32:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b65fb167b8e34107adb8b47f658c8945", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:36.881 189 INFO tempest.lib.common.rest_client [req-eaa4b747-0f0c-4706-89a9-4acfddefcc3d ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 200 GET http://172.30.13.94:9696/v2.0/service-providers 0.153s 2020-12-14 02:32:36.883 189 DEBUG tempest.lib.common.rest_client [req-eaa4b747-0f0c-4706-89a9-4acfddefcc3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '304', 'x-openstack-request-id': 'req-eaa4b747-0f0c-4706-89a9-4acfddefcc3d', 'date': 'Mon, 14 Dec 2020 02:32:36 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/service-providers'} Body: b'{"service_providers": [{"service_type": "L3_ROUTER_NAT", "name": "dvrha", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "dvr", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "ha", "default": false}, {"service_type": "L3_ROUTER_NAT", "name": "single_node", "default": false}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:36.921 189 INFO tempest.lib.common.rest_client [req-7462a5f6-a148-4f96-a0a5-2a8ac0a47292 ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/flavors 0.030s 2020-12-14 02:32:36.923 189 DEBUG tempest.lib.common.rest_client [req-7462a5f6-a148-4f96-a0a5-2a8ac0a47292 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"service_type": "L3_ROUTER_NAT"}} Response - Headers: {'content-type': 'application/json', 'content-length': '163', 'x-openstack-request-id': 'req-7462a5f6-a148-4f96-a0a5-2a8ac0a47292', 'date': 'Mon, 14 Dec 2020 02:32:36 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors'} Body: b'{"flavor": {"id": "fb53bdb4-5033-4184-bda0-8971246cea79", "name": "", "description": "", "service_type": "L3_ROUTER_NAT", "enabled": true, "service_profiles": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:36.970 189 INFO tempest.lib.common.rest_client [req-b2731166-954b-40e5-8080-4238febca29d ] Request (FlavorsServiceProfileExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/service_profiles 0.040s 2020-12-14 02:32:36.972 189 DEBUG tempest.lib.common.rest_client [req-b2731166-954b-40e5-8080-4238febca29d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"service_profile": {"metainfo": "{\"foo\": \"bar\"}"}} Response - Headers: {'content-type': 'application/json', 'content-length': '151', 'x-openstack-request-id': 'req-b2731166-954b-40e5-8080-4238febca29d', 'date': 'Mon, 14 Dec 2020 02:32:36 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles'} Body: b'{"service_profile": {"id": "a26a9c7a-bef1-47b6-bc3a-3389a57ac9c5", "description": "", "driver": "", "enabled": true, "metainfo": "{\\"foo\\": \\"bar\\"}"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:36.979 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:37.002 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_flavor_service_profile, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:37.005 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:37.113 189 INFO tempest.lib.common.rest_client [req-caa06ed3-9faf-4fb1-95b3-f114fcc700c0 ] Request (FlavorsServiceProfileExtRbacTest:test_create_flavor_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles 0.101s 2020-12-14 02:32:37.116 189 DEBUG tempest.lib.common.rest_client [req-caa06ed3-9faf-4fb1-95b3-f114fcc700c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-caa06ed3-9faf-4fb1-95b3-f114fcc700c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:37.168 189 INFO tempest.lib.common.rest_client [req-c239cbe3-1058-48f9-9e83-5f044c9512e7 ] Request (FlavorsServiceProfileExtRbacTest:test_create_flavor_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:32:37.172 189 DEBUG tempest.lib.common.rest_client [req-c239cbe3-1058-48f9-9e83-5f044c9512e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c239cbe3-1058-48f9-9e83-5f044c9512e7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3cbec48e4e79492eae920b223c810b69", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379", "password_expires_at": null}, "audit_ids": ["ap-PGMrRTui3Is31kex35A"], "expires_at": "2020-12-14T03:32:37.000000Z", "issued_at": "2020-12-14T02:32:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b65fb167b8e34107adb8b47f658c8945", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:37.222 189 INFO tempest.lib.common.rest_client [req-6568ea02-5067-446b-8b13-cc63ac77fa83 ] Request (FlavorsServiceProfileExtRbacTest:test_create_flavor_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:32:37.226 189 DEBUG tempest.lib.common.rest_client [req-6568ea02-5067-446b-8b13-cc63ac77fa83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6568ea02-5067-446b-8b13-cc63ac77fa83', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3cbec48e4e79492eae920b223c810b69", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379", "password_expires_at": null}, "audit_ids": ["ImX-HoTPSwKxx-OB5YI7hA"], "expires_at": "2020-12-14T03:32:37.000000Z", "issued_at": "2020-12-14T02:32:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b65fb167b8e34107adb8b47f658c8945", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:37.368 189 INFO tempest.lib.common.rest_client [req-cd0cb644-994a-4979-b59c-e141437d78f4 ] Request (FlavorsServiceProfileExtRbacTest:test_create_flavor_service_profile): 201 POST http://172.30.13.94:9696/v2.0/flavors/fb53bdb4-5033-4184-bda0-8971246cea79/service_profiles 0.133s 2020-12-14 02:32:37.372 189 DEBUG tempest.lib.common.rest_client [req-cd0cb644-994a-4979-b59c-e141437d78f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"service_profile": {"id": "a26a9c7a-bef1-47b6-bc3a-3389a57ac9c5"}} Response - Headers: {'content-type': 'application/json', 'content-length': '67', 'x-openstack-request-id': 'req-cd0cb644-994a-4979-b59c-e141437d78f4', 'date': 'Mon, 14 Dec 2020 02:32:37 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/fb53bdb4-5033-4184-bda0-8971246cea79/service_profiles'} Body: b'{"service_profile": {"id": "fb53bdb4-5033-4184-bda0-8971246cea79"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:37.375 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:37.442 189 INFO tempest.lib.common.rest_client [req-a3f3c793-1bed-403f-9d5a-6e23265dc715 ] Request (FlavorsServiceProfileExtRbacTest:test_create_flavor_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles 0.060s 2020-12-14 02:32:37.445 189 DEBUG tempest.lib.common.rest_client [req-a3f3c793-1bed-403f-9d5a-6e23265dc715 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3f3c793-1bed-403f-9d5a-6e23265dc715', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:37.500 189 INFO tempest.lib.common.rest_client [req-f573e074-9eeb-4cec-8397-12744c954193 ] Request (FlavorsServiceProfileExtRbacTest:test_create_flavor_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:32:37.503 189 DEBUG tempest.lib.common.rest_client [req-f573e074-9eeb-4cec-8397-12744c954193 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f573e074-9eeb-4cec-8397-12744c954193', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3cbec48e4e79492eae920b223c810b69", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379", "password_expires_at": null}, "audit_ids": ["vY4WWS-kQW6kYkk2dfLYaA"], "expires_at": "2020-12-14T03:32:37.000000Z", "issued_at": "2020-12-14T02:32:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b65fb167b8e34107adb8b47f658c8945", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:37.556 189 INFO tempest.lib.common.rest_client [req-8b0e3b15-eb74-44e6-bc31-0dd997c3b9da ] Request (FlavorsServiceProfileExtRbacTest:test_create_flavor_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:32:37.560 189 DEBUG tempest.lib.common.rest_client [req-8b0e3b15-eb74-44e6-bc31-0dd997c3b9da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8b0e3b15-eb74-44e6-bc31-0dd997c3b9da', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3cbec48e4e79492eae920b223c810b69", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379", "password_expires_at": null}, "audit_ids": ["30LKJOMpRxS37atpl3aVmA"], "expires_at": "2020-12-14T03:32:37.000000Z", "issued_at": "2020-12-14T02:32:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b65fb167b8e34107adb8b47f658c8945", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:37.697 189 INFO tempest.lib.common.rest_client [req-103796c6-fd31-4e7c-b781-51572cc975a1 ] Request (FlavorsServiceProfileExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/flavors/fb53bdb4-5033-4184-bda0-8971246cea79/service_profiles/a26a9c7a-bef1-47b6-bc3a-3389a57ac9c5 0.127s 2020-12-14 02:32:37.700 189 DEBUG tempest.lib.common.rest_client [req-103796c6-fd31-4e7c-b781-51572cc975a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-103796c6-fd31-4e7c-b781-51572cc975a1', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:37 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/fb53bdb4-5033-4184-bda0-8971246cea79/service_profiles/a26a9c7a-bef1-47b6-bc3a-3389a57ac9c5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:37.714 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:37.737 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_flavor_service_profile, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:37.799 189 INFO tempest.lib.common.rest_client [req-3e245601-c189-4f37-942e-25b1198b193d ] Request (FlavorsServiceProfileExtRbacTest:test_delete_flavor_service_profile): 201 POST http://172.30.13.94:9696/v2.0/flavors/fb53bdb4-5033-4184-bda0-8971246cea79/service_profiles 0.056s 2020-12-14 02:32:37.803 189 DEBUG tempest.lib.common.rest_client [req-3e245601-c189-4f37-942e-25b1198b193d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"service_profile": {"id": "a26a9c7a-bef1-47b6-bc3a-3389a57ac9c5"}} Response - Headers: {'content-type': 'application/json', 'content-length': '67', 'x-openstack-request-id': 'req-3e245601-c189-4f37-942e-25b1198b193d', 'date': 'Mon, 14 Dec 2020 02:32:37 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/fb53bdb4-5033-4184-bda0-8971246cea79/service_profiles'} Body: b'{"service_profile": {"id": "fb53bdb4-5033-4184-bda0-8971246cea79"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:37.808 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:37.882 189 INFO tempest.lib.common.rest_client [req-32514cb9-f8e5-4e01-876a-1677348460df ] Request (FlavorsServiceProfileExtRbacTest:test_delete_flavor_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles 0.064s 2020-12-14 02:32:37.885 189 DEBUG tempest.lib.common.rest_client [req-32514cb9-f8e5-4e01-876a-1677348460df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32514cb9-f8e5-4e01-876a-1677348460df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:37.939 189 INFO tempest.lib.common.rest_client [req-5245c347-7d21-4a04-a635-619b6e53ec48 ] Request (FlavorsServiceProfileExtRbacTest:test_delete_flavor_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:32:37.942 189 DEBUG tempest.lib.common.rest_client [req-5245c347-7d21-4a04-a635-619b6e53ec48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5245c347-7d21-4a04-a635-619b6e53ec48', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3cbec48e4e79492eae920b223c810b69", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379", "password_expires_at": null}, "audit_ids": ["npXO0q4_TDye5iwda43RMQ"], "expires_at": "2020-12-14T03:32:37.000000Z", "issued_at": "2020-12-14T02:32:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b65fb167b8e34107adb8b47f658c8945", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:37.992 189 INFO tempest.lib.common.rest_client [req-a30e155a-9544-4424-9a7f-da8d1dc1700d ] Request (FlavorsServiceProfileExtRbacTest:test_delete_flavor_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:32:37.996 189 DEBUG tempest.lib.common.rest_client [req-a30e155a-9544-4424-9a7f-da8d1dc1700d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a30e155a-9544-4424-9a7f-da8d1dc1700d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3cbec48e4e79492eae920b223c810b69", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379", "password_expires_at": null}, "audit_ids": ["ezydqeGAQGy_4BGuC4GguA"], "expires_at": "2020-12-14T03:32:37.000000Z", "issued_at": "2020-12-14T02:32:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b65fb167b8e34107adb8b47f658c8945", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:38.107 189 INFO tempest.lib.common.rest_client [req-892b5526-d8bd-4125-b67e-8fd0805b0d83 ] Request (FlavorsServiceProfileExtRbacTest:test_delete_flavor_service_profile): 204 DELETE http://172.30.13.94:9696/v2.0/flavors/fb53bdb4-5033-4184-bda0-8971246cea79/service_profiles/a26a9c7a-bef1-47b6-bc3a-3389a57ac9c5 0.104s 2020-12-14 02:32:38.110 189 DEBUG tempest.lib.common.rest_client [req-892b5526-d8bd-4125-b67e-8fd0805b0d83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-892b5526-d8bd-4125-b67e-8fd0805b0d83', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/fb53bdb4-5033-4184-bda0-8971246cea79/service_profiles/a26a9c7a-bef1-47b6-bc3a-3389a57ac9c5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:38.113 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:38.180 189 INFO tempest.lib.common.rest_client [req-6379ef98-4927-4fdb-8866-18ff7667f35c ] Request (FlavorsServiceProfileExtRbacTest:test_delete_flavor_service_profile): 200 GET http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles 0.061s 2020-12-14 02:32:38.182 189 DEBUG tempest.lib.common.rest_client [req-6379ef98-4927-4fdb-8866-18ff7667f35c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6379ef98-4927-4fdb-8866-18ff7667f35c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945/users/3cbec48e4e79492eae920b223c810b69/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:38.237 189 INFO tempest.lib.common.rest_client [req-640b540a-5f77-4b20-9289-ee49ea244679 ] Request (FlavorsServiceProfileExtRbacTest:test_delete_flavor_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:32:38.241 189 DEBUG tempest.lib.common.rest_client [req-640b540a-5f77-4b20-9289-ee49ea244679 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-640b540a-5f77-4b20-9289-ee49ea244679', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3cbec48e4e79492eae920b223c810b69", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379", "password_expires_at": null}, "audit_ids": ["FceLA7PVTOGjgy5PCMp0OA"], "expires_at": "2020-12-14T03:32:38.000000Z", "issued_at": "2020-12-14T02:32:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b65fb167b8e34107adb8b47f658c8945", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:38.293 189 INFO tempest.lib.common.rest_client [req-06e87aa3-b638-4af8-9f40-da0a3208ede1 ] Request (FlavorsServiceProfileExtRbacTest:test_delete_flavor_service_profile): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:38.296 189 DEBUG tempest.lib.common.rest_client [req-06e87aa3-b638-4af8-9f40-da0a3208ede1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6656', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06e87aa3-b638-4af8-9f40-da0a3208ede1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3cbec48e4e79492eae920b223c810b69", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379", "password_expires_at": null}, "audit_ids": ["HiYc7HQ3TuiRPXG5R77hoQ"], "expires_at": "2020-12-14T03:32:38.000000Z", "issued_at": "2020-12-14T02:32:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b65fb167b8e34107adb8b47f658c8945", "name": "tempest-FlavorsServiceProfileExtRbacTest-1853912379"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b65fb167b8e34107adb8b47f658c8945", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:38.405 189 INFO tempest.lib.common.rest_client [req-7475ee18-24c2-4f26-ac3e-6bf56ca4e9cd ] Request (FlavorsServiceProfileExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/flavors/fb53bdb4-5033-4184-bda0-8971246cea79/service_profiles/a26a9c7a-bef1-47b6-bc3a-3389a57ac9c5 0.099s 2020-12-14 02:32:38.408 189 DEBUG tempest.lib.common.rest_client [req-7475ee18-24c2-4f26-ac3e-6bf56ca4e9cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '214', 'x-openstack-request-id': 'req-7475ee18-24c2-4f26-ac3e-6bf56ca4e9cd', 'date': 'Mon, 14 Dec 2020 02:32:38 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/fb53bdb4-5033-4184-bda0-8971246cea79/service_profiles/a26a9c7a-bef1-47b6-bc3a-3389a57ac9c5'} Body: b'{"NeutronError": {"type": "FlavorServiceProfileBindingNotFound", "message": "Service Profile a26a9c7a-bef1-47b6-bc3a-3389a57ac9c5 is not associated with flavor fb53bdb4-5033-4184-bda0-8971246cea79.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:38.489 189 INFO tempest.lib.common.rest_client [req-d5ead136-b4c5-43e6-b39e-503e25773ece ] Request (FlavorsServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/service_profiles/a26a9c7a-bef1-47b6-bc3a-3389a57ac9c5 0.060s 2020-12-14 02:32:38.491 189 DEBUG tempest.lib.common.rest_client [req-d5ead136-b4c5-43e6-b39e-503e25773ece ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-d5ead136-b4c5-43e6-b39e-503e25773ece', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/service_profiles/a26a9c7a-bef1-47b6-bc3a-3389a57ac9c5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:38.562 189 INFO tempest.lib.common.rest_client [req-a46f0ab2-8ace-4bb3-a30e-431b0eb31f6f ] Request (FlavorsServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/flavors/fb53bdb4-5033-4184-bda0-8971246cea79 0.065s 2020-12-14 02:32:38.564 189 DEBUG tempest.lib.common.rest_client [req-a46f0ab2-8ace-4bb3-a30e-431b0eb31f6f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-a46f0ab2-8ace-4bb3-a30e-431b0eb31f6f', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:38 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/flavors/fb53bdb4-5033-4184-bda0-8971246cea79'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:38.718 189 INFO tempest.lib.common.rest_client [req-cfd468a0-229d-4a97-be1a-be46ff0fb028 ] Request (FlavorsServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/3cbec48e4e79492eae920b223c810b69 0.148s 2020-12-14 02:32:38.720 189 DEBUG tempest.lib.common.rest_client [req-cfd468a0-229d-4a97-be1a-be46ff0fb028 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfd468a0-229d-4a97-be1a-be46ff0fb028', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/3cbec48e4e79492eae920b223c810b69'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:38.818 189 INFO tempest.lib.common.rest_client [req-156b0cc4-b2d0-48ad-8384-6daf834b866e ] Request (FlavorsServiceProfileExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:32:38.821 189 DEBUG tempest.lib.common.rest_client [req-156b0cc4-b2d0-48ad-8384-6daf834b866e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-156b0cc4-b2d0-48ad-8384-6daf834b866e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["-xuP4sc_RQeaQx3NUCxswg"], "expires_at": "2020-12-14T03:32:38.000000Z", "issued_at": "2020-12-14T02:32:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:39.164 189 INFO tempest.lib.common.rest_client [req-e8f5b893-1bea-45f1-8217-b535319ed76e ] Request (FlavorsServiceProfileExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=b65fb167b8e34107adb8b47f658c8945&name=default 0.334s 2020-12-14 02:32:39.166 189 DEBUG tempest.lib.common.rest_client [req-e8f5b893-1bea-45f1-8217-b535319ed76e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-e8f5b893-1bea-45f1-8217-b535319ed76e', 'date': 'Mon, 14 Dec 2020 02:32:39 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=b65fb167b8e34107adb8b47f658c8945&name=default'} Body: b'{"security_groups": [{"id": "aed9bcba-859b-4e6b-83dd-137adbea972b", "name": "default", "stateful": true, "tenant_id": "b65fb167b8e34107adb8b47f658c8945", "description": "Default security group", "security_group_rules": [{"id": "0a887665-3f89-46fa-be30-65b25d793621", "tenant_id": "b65fb167b8e34107adb8b47f658c8945", "security_group_id": "aed9bcba-859b-4e6b-83dd-137adbea972b", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "aed9bcba-859b-4e6b-83dd-137adbea972b", "description": null, "tags": [], "created_at": "2020-12-14T02:32:39Z", "updated_at": "2020-12-14T02:32:39Z", "revision_number": 0, "project_id": "b65fb167b8e34107adb8b47f658c8945"}, {"id": "1ce9e07a-bd52-4cd3-aaa8-87cffd6ed2d5", "tenant_id": "b65fb167b8e34107adb8b47f658c8945", "security_group_id": "aed9bcba-859b-4e6b-83dd-137adbea972b", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:32:39Z", "updated_at": "2020-12-14T02:32:39Z", "revision_number": 0, "project_id": "b65fb167b8e34107adb8b47f658c8945"}, {"id": "40dfb2d1-2ba8-4690-820c-839c7056bc0a", "tenant_id": "b65fb167b8e34107adb8b47f658c8945", "security_group_id": "aed9bcba-859b-4e6b-83dd-137adbea972b", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:32:39Z", "updated_at": "2020-12-14T02:32:39Z", "revision_number": 0, "project_id": "b65fb167b8e34107adb8b47f658c8945"}, {"id": "951230fa-e858-4fc9-8b97-bd29149a9223", "tenant_id": "b65fb167b8e34107adb8b47f658c8945", "security_group_id": "aed9bcba-859b-4e6b-83dd-137adbea972b", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "aed9bcba-859b-4e6b-83dd-137adbea972b", "description": null, "tags": [], "created_at": "2020-12-14T02:32:39Z", "updated_at": "2020-12-14T02:32:39Z", "revision_number": 0, "project_id": "b65fb167b8e34107adb8b47f658c8945"}], "tags": [], "created_at": "2020-12-14T02:32:39Z", "updated_at": "2020-12-14T02:32:39Z", "revision_number": 1, "project_id": "b65fb167b8e34107adb8b47f658c8945"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:39.315 189 INFO tempest.lib.common.rest_client [req-3a9347b0-b1ec-4926-a846-d2c25403489c ] Request (FlavorsServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/aed9bcba-859b-4e6b-83dd-137adbea972b 0.142s 2020-12-14 02:32:39.317 189 DEBUG tempest.lib.common.rest_client [req-3a9347b0-b1ec-4926-a846-d2c25403489c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-3a9347b0-b1ec-4926-a846-d2c25403489c', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:39 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/aed9bcba-859b-4e6b-83dd-137adbea972b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:39.455 189 INFO tempest.lib.common.rest_client [req-ba72d6b8-7435-4209-8a73-8ca3b8739ebf ] Request (FlavorsServiceProfileExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945 0.131s 2020-12-14 02:32:39.458 189 DEBUG tempest.lib.common.rest_client [req-ba72d6b8-7435-4209-8a73-8ca3b8739ebf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba72d6b8-7435-4209-8a73-8ca3b8739ebf', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b65fb167b8e34107adb8b47f658c8945'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:39.579 189 INFO tempest.lib.common.rest_client [req-afc7087b-cb85-4327-a296-8432f45ac66e ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:32:39.582 189 DEBUG tempest.lib.common.rest_client [req-afc7087b-cb85-4327-a296-8432f45ac66e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-afc7087b-cb85-4327-a296-8432f45ac66e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["fhfEMlQNTpWkxp2xd7WLOQ"], "expires_at": "2020-12-14T03:32:39.000000Z", "issued_at": "2020-12-14T02:32:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:39.678 189 INFO tempest.lib.common.rest_client [req-e8778363-014b-4647-a383-e78fa3ec471b ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:39.681 189 DEBUG tempest.lib.common.rest_client [req-e8778363-014b-4647-a383-e78fa3ec471b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e8778363-014b-4647-a383-e78fa3ec471b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ufTf9xUKTPSCdHPevBVD8A"], "expires_at": "2020-12-14T03:32:39.000000Z", "issued_at": "2020-12-14T02:32:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:39.753 189 INFO tempest.lib.common.rest_client [req-258f00c9-ba14-48d6-a543-1a49439bd340 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.064s 2020-12-14 02:32:39.756 189 DEBUG tempest.lib.common.rest_client [req-258f00c9-ba14-48d6-a543-1a49439bd340 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-258f00c9-ba14-48d6-a543-1a49439bd340', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:39.835 189 INFO tempest.lib.common.rest_client [req-7d20324d-d1ae-4e16-b7dd-be8778c6632d ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.072s 2020-12-14 02:32:39.838 189 DEBUG tempest.lib.common.rest_client [req-7d20324d-d1ae-4e16-b7dd-be8778c6632d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189-desc", "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '406', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d20324d-d1ae-4e16-b7dd-be8778c6632d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "domain_id": "default", "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:39.964 189 INFO tempest.lib.common.rest_client [req-16cd095e-f695-48ce-91a9-8f740a398c47 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.117s 2020-12-14 02:32:39.967 189 DEBUG tempest.lib.common.rest_client [req-16cd095e-f695-48ce-91a9-8f740a398c47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password": "B4&Jc04rq_pM1Qk", "project_id": "4f4d301c81574e7ebaecafd2f3e47457", "email": "tempest-PolicyBandwidthLimitRuleExtRbacTest-166962023@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '424', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16cd095e-f695-48ce-91a9-8f740a398c47', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "4f4d301c81574e7ebaecafd2f3e47457", "email": "tempest-PolicyBandwidthLimitRuleExtRbacTest-166962023@example.com", "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/7ee77028b7814f22b69b0f6de74322d4"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:40.031 189 INFO tempest.lib.common.rest_client [req-8565b3b8-a57b-44bf-ba43-2b6624df523c ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:32:40.034 189 DEBUG tempest.lib.common.rest_client [req-8565b3b8-a57b-44bf-ba43-2b6624df523c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8565b3b8-a57b-44bf-ba43-2b6624df523c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:40.104 189 INFO tempest.lib.common.rest_client [req-72cd9795-cd76-468f-b8c3-dfe4b8d2dda3 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:32:40.108 189 DEBUG tempest.lib.common.rest_client [req-72cd9795-cd76-468f-b8c3-dfe4b8d2dda3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-72cd9795-cd76-468f-b8c3-dfe4b8d2dda3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:40.188 189 INFO tempest.lib.common.rest_client [req-adc5860c-945b-4045-bab4-668c0ff79d74 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles/72a4576c553448cd941b052c1ca0cf2d 0.072s 2020-12-14 02:32:40.190 189 DEBUG tempest.lib.common.rest_client [req-adc5860c-945b-4045-bab4-668c0ff79d74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-adc5860c-945b-4045-bab4-668c0ff79d74', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:40.194 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4f4d301c81574e7ebaecafd2f3e47457', 'project_name': 'tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189', 'tenant_id': '4f4d301c81574e7ebaecafd2f3e47457', 'tenant_name': 'tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '7ee77028b7814f22b69b0f6de74322d4'}, Network: None, Subnet: None, Router: None 2020-12-14 02:32:40.197 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4f4d301c81574e7ebaecafd2f3e47457', 'project_name': 'tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189', 'tenant_id': '4f4d301c81574e7ebaecafd2f3e47457', 'tenant_name': 'tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '7ee77028b7814f22b69b0f6de74322d4'}, Network: None, Subnet: None, Router: None 2020-12-14 02:32:40.379 189 INFO tempest.lib.common.rest_client [req-60682644-5952-4f76-8207-b5a44523f52a ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.114s 2020-12-14 02:32:40.382 189 DEBUG tempest.lib.common.rest_client [req-60682644-5952-4f76-8207-b5a44523f52a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6599', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60682644-5952-4f76-8207-b5a44523f52a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["ektqsKDIR0SJ7jNDCHHoRw"], "expires_at": "2020-12-14T03:32:40.000000Z", "issued_at": "2020-12-14T02:32:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "Re _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:40.387 189 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-12-14 02:32:40.543 189 INFO tempest.lib.common.rest_client [req-0abc7b3c-43cd-4c4f-86fb-c42348b47d19 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.126s 2020-12-14 02:32:40.546 189 DEBUG tempest.lib.common.rest_client [req-0abc7b3c-43cd-4c4f-86fb-c42348b47d19 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0abc7b3c-43cd-4c4f-86fb-c42348b47d19', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["W--0cPETQMemyfddxF-V5A"], "expires_at": "2020-12-14T03:32:40.000000Z", "issued_at": "2020-12-14T02:32:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:40.653 189 INFO tempest.lib.common.rest_client [req-d3641374-f1ce-471f-a78e-3eeb6be1ccc9 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:40.656 189 DEBUG tempest.lib.common.rest_client [req-d3641374-f1ce-471f-a78e-3eeb6be1ccc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3641374-f1ce-471f-a78e-3eeb6be1ccc9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ELUWkjXhSPyP68xnw-Z69Q"], "expires_at": "2020-12-14T03:32:40.000000Z", "issued_at": "2020-12-14T02:32:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:40.722 189 INFO tempest.lib.common.rest_client [req-b65d224a-4a6e-47ab-90a2-2c324a879d85 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.059s 2020-12-14 02:32:40.724 189 DEBUG tempest.lib.common.rest_client [req-b65d224a-4a6e-47ab-90a2-2c324a879d85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b65d224a-4a6e-47ab-90a2-2c324a879d85', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:40.785 189 INFO tempest.lib.common.rest_client [req-256213ad-c559-4cdd-848e-1c725cd24d55 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.053s 2020-12-14 02:32:40.788 189 DEBUG tempest.lib.common.rest_client [req-256213ad-c559-4cdd-848e-1c725cd24d55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-256213ad-c559-4cdd-848e-1c725cd24d55', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:40.793 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:32:40.795 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:40.862 189 INFO tempest.lib.common.rest_client [req-98aec11c-d1c5-465e-a49c-61be9bf7eaa2 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles 0.062s 2020-12-14 02:32:40.864 189 DEBUG tempest.lib.common.rest_client [req-98aec11c-d1c5-465e-a49c-61be9bf7eaa2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98aec11c-d1c5-465e-a49c-61be9bf7eaa2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:40.935 189 INFO tempest.lib.common.rest_client [req-f33dc2b9-7c9a-437a-b52d-adc14f5d9481 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles/72a4576c553448cd941b052c1ca0cf2d 0.064s 2020-12-14 02:32:40.937 189 DEBUG tempest.lib.common.rest_client [req-f33dc2b9-7c9a-437a-b52d-adc14f5d9481 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f33dc2b9-7c9a-437a-b52d-adc14f5d9481', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:41.044 189 INFO tempest.lib.common.rest_client [req-ec629662-3ee6-4711-b10b-4f93a2bec446 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles/a629c95d64b3416fb80ae90af4f69c05 0.101s 2020-12-14 02:32:41.047 189 DEBUG tempest.lib.common.rest_client [req-ec629662-3ee6-4711-b10b-4f93a2bec446 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec629662-3ee6-4711-b10b-4f93a2bec446', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:42.153 189 INFO tempest.lib.common.rest_client [req-94fd226a-d1dd-4df4-a6ad-cc56303e7a52 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:32:42.156 189 DEBUG tempest.lib.common.rest_client [req-94fd226a-d1dd-4df4-a6ad-cc56303e7a52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94fd226a-d1dd-4df4-a6ad-cc56303e7a52', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["h56Ic4abTl2v0GujhFwjqA"], "expires_at": "2020-12-14T03:32:42.000000Z", "issued_at": "2020-12-14T02:32:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:42.205 189 INFO tempest.lib.common.rest_client [req-d2172703-5360-499a-ba65-f598b5dd849d ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:32:42.207 189 DEBUG tempest.lib.common.rest_client [req-d2172703-5360-499a-ba65-f598b5dd849d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2172703-5360-499a-ba65-f598b5dd849d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["qpbagwlLQxWopXVeXox1YA"], "expires_at": "2020-12-14T03:32:42.000000Z", "issued_at": "2020-12-14T02:32:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:42.423 189 INFO tempest.lib.common.rest_client [req-48ac79df-3a6a-4f67-a826-8f412d0b3133 ] Request (PolicyBandwidthLimitRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/qos/policies 0.204s 2020-12-14 02:32:42.426 189 DEBUG tempest.lib.common.rest_client [req-48ac79df-3a6a-4f67-a826-8f412d0b3133 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-qos-policy-843479466", "shared": false, "is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '413', 'x-openstack-request-id': 'req-48ac79df-3a6a-4f67-a826-8f412d0b3133', 'date': 'Mon, 14 Dec 2020 02:32:42 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies'} Body: b'{"policy": {"id": "8b328c05-9b60-4ac1-b2ba-04f86ce3eb50", "project_id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-qos-policy-843479466", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-12-14T02:32:42Z", "updated_at": "2020-12-14T02:32:42Z", "tenant_id": "4f4d301c81574e7ebaecafd2f3e47457", "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:42.434 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:42.458 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_policy_bandwidth_limit_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:42.460 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:42.558 189 INFO tempest.lib.common.rest_client [req-1df09b0d-fced-476d-a5f9-85969b85ba60 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_create_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles 0.092s 2020-12-14 02:32:42.562 189 DEBUG tempest.lib.common.rest_client [req-1df09b0d-fced-476d-a5f9-85969b85ba60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1df09b0d-fced-476d-a5f9-85969b85ba60', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:42.612 189 INFO tempest.lib.common.rest_client [req-c8889c91-6596-4125-84a8-86f3f8020deb ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_create_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:32:42.615 189 DEBUG tempest.lib.common.rest_client [req-c8889c91-6596-4125-84a8-86f3f8020deb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8889c91-6596-4125-84a8-86f3f8020deb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["pjxA74alRrKZBJD0CGLAvA"], "expires_at": "2020-12-14T03:32:42.000000Z", "issued_at": "2020-12-14T02:32:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:42.665 189 INFO tempest.lib.common.rest_client [req-2dad63c4-859a-4468-bd92-efae1e9e1f2f ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_create_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:32:42.669 189 DEBUG tempest.lib.common.rest_client [req-2dad63c4-859a-4468-bd92-efae1e9e1f2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2dad63c4-859a-4468-bd92-efae1e9e1f2f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["VSizy2rvQAWwfBjirYJjQg"], "expires_at": "2020-12-14T03:32:42.000000Z", "issued_at": "2020-12-14T02:32:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:42.857 189 INFO tempest.lib.common.rest_client [req-713d96d0-2e91-478e-b7c8-726078544835 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_create_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules 0.178s 2020-12-14 02:32:42.861 189 DEBUG tempest.lib.common.rest_client [req-713d96d0-2e91-478e-b7c8-726078544835 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress"}} Response - Headers: {'content-type': 'application/json', 'content-length': '137', 'x-openstack-request-id': 'req-713d96d0-2e91-478e-b7c8-726078544835', 'date': 'Mon, 14 Dec 2020 02:32:42 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules'} Body: b'{"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress", "id": "0e9089f7-544f-459b-997c-9b488e7ab92a"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:42.865 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:42.940 189 INFO tempest.lib.common.rest_client [req-ff2fb0cb-9042-4c55-829a-5a599be9b476 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_create_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles 0.067s 2020-12-14 02:32:42.942 189 DEBUG tempest.lib.common.rest_client [req-ff2fb0cb-9042-4c55-829a-5a599be9b476 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff2fb0cb-9042-4c55-829a-5a599be9b476', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:42.989 189 INFO tempest.lib.common.rest_client [req-07dc6d83-748a-4bfb-9dbe-9269f02c40b2 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_create_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:32:42.992 189 DEBUG tempest.lib.common.rest_client [req-07dc6d83-748a-4bfb-9dbe-9269f02c40b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07dc6d83-748a-4bfb-9dbe-9269f02c40b2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["p2r4jycBS9aqgh2OKIzBuw"], "expires_at": "2020-12-14T03:32:42.000000Z", "issued_at": "2020-12-14T02:32:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:43.042 189 INFO tempest.lib.common.rest_client [req-42c16d7b-8372-4b73-b015-c5d5e12427d7 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_create_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:32:43.046 189 DEBUG tempest.lib.common.rest_client [req-42c16d7b-8372-4b73-b015-c5d5e12427d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42c16d7b-8372-4b73-b015-c5d5e12427d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["ltIFzoHtSWWOw1bL5q8tUg"], "expires_at": "2020-12-14T03:32:43.000000Z", "issued_at": "2020-12-14T02:32:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:43.216 189 INFO tempest.lib.common.rest_client [req-2d6aa8c5-9a9d-4224-aaf3-cf527894d50a ] Request (PolicyBandwidthLimitRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules/0e9089f7-544f-459b-997c-9b488e7ab92a 0.160s 2020-12-14 02:32:43.220 189 DEBUG tempest.lib.common.rest_client [req-2d6aa8c5-9a9d-4224-aaf3-cf527894d50a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2d6aa8c5-9a9d-4224-aaf3-cf527894d50a', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules/0e9089f7-544f-459b-997c-9b488e7ab92a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:43.234 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:43.255 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_bandwidth_limit_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:43.258 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:43.280 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_policy_bandwidth_limit_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:43.409 189 INFO tempest.lib.common.rest_client [req-2540bddd-cba1-4605-8f14-34843aefb29b ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_delete_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules 0.123s 2020-12-14 02:32:43.412 189 DEBUG tempest.lib.common.rest_client [req-2540bddd-cba1-4605-8f14-34843aefb29b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress"}} Response - Headers: {'content-type': 'application/json', 'content-length': '137', 'x-openstack-request-id': 'req-2540bddd-cba1-4605-8f14-34843aefb29b', 'date': 'Mon, 14 Dec 2020 02:32:43 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules'} Body: b'{"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress", "id": "5e7cd34b-2174-409b-820b-2716a7c85f63"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:43.415 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:43.484 189 INFO tempest.lib.common.rest_client [req-0c6721fb-21df-44ea-b27f-81e17f264d64 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_delete_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles 0.063s 2020-12-14 02:32:43.487 189 DEBUG tempest.lib.common.rest_client [req-0c6721fb-21df-44ea-b27f-81e17f264d64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0c6721fb-21df-44ea-b27f-81e17f264d64', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:43.550 189 INFO tempest.lib.common.rest_client [req-23813e93-eba7-40e3-aa63-14f7f72ccacb ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_delete_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.056s 2020-12-14 02:32:43.554 189 DEBUG tempest.lib.common.rest_client [req-23813e93-eba7-40e3-aa63-14f7f72ccacb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-23813e93-eba7-40e3-aa63-14f7f72ccacb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["S8ZywrWjQeOpy1stASoqSQ"], "expires_at": "2020-12-14T03:32:43.000000Z", "issued_at": "2020-12-14T02:32:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:43.610 189 INFO tempest.lib.common.rest_client [req-eb7b296a-5e36-4530-8ff3-e646926a2498 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_delete_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:32:43.614 189 DEBUG tempest.lib.common.rest_client [req-eb7b296a-5e36-4530-8ff3-e646926a2498 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb7b296a-5e36-4530-8ff3-e646926a2498', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["IIi2creOT4uorWhCcuy6HQ"], "expires_at": "2020-12-14T03:32:43.000000Z", "issued_at": "2020-12-14T02:32:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:43.943 189 INFO tempest.lib.common.rest_client [req-b39b1ba7-1dec-4867-97d7-808f4e3ad965 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_delete_policy_bandwidth_limit_rule): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules/5e7cd34b-2174-409b-820b-2716a7c85f63 0.321s 2020-12-14 02:32:43.947 189 DEBUG tempest.lib.common.rest_client [req-b39b1ba7-1dec-4867-97d7-808f4e3ad965 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-b39b1ba7-1dec-4867-97d7-808f4e3ad965', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:43 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules/5e7cd34b-2174-409b-820b-2716a7c85f63'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:43.950 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:44.025 189 INFO tempest.lib.common.rest_client [req-30cb300c-6b42-44fb-86a5-bb88e755e229 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_delete_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles 0.068s 2020-12-14 02:32:44.029 189 DEBUG tempest.lib.common.rest_client [req-30cb300c-6b42-44fb-86a5-bb88e755e229 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30cb300c-6b42-44fb-86a5-bb88e755e229', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:44.081 189 INFO tempest.lib.common.rest_client [req-e2e7d3ee-a330-489b-bd07-22a3e1e6e517 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_delete_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:44.084 189 DEBUG tempest.lib.common.rest_client [req-e2e7d3ee-a330-489b-bd07-22a3e1e6e517 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2e7d3ee-a330-489b-bd07-22a3e1e6e517', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["W5xZx6okTb62m_lAnThIng"], "expires_at": "2020-12-14T03:32:44.000000Z", "issued_at": "2020-12-14T02:32:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:44.140 189 INFO tempest.lib.common.rest_client [req-8f962782-8f4c-46c6-905a-5f1bd542b120 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_delete_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:32:44.144 189 DEBUG tempest.lib.common.rest_client [req-8f962782-8f4c-46c6-905a-5f1bd542b120 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f962782-8f4c-46c6-905a-5f1bd542b120', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["hH3zDMDSRuy0Y1Vghothrw"], "expires_at": "2020-12-14T03:32:44.000000Z", "issued_at": "2020-12-14T02:32:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:44.245 189 INFO tempest.lib.common.rest_client [req-64e05c6c-753f-43e0-a996-a5cfd88165e2 ] Request (PolicyBandwidthLimitRuleExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules/5e7cd34b-2174-409b-820b-2716a7c85f63 0.092s 2020-12-14 02:32:44.248 189 DEBUG tempest.lib.common.rest_client [req-64e05c6c-753f-43e0-a996-a5cfd88165e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '187', 'x-openstack-request-id': 'req-64e05c6c-753f-43e0-a996-a5cfd88165e2', 'date': 'Mon, 14 Dec 2020 02:32:44 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules/5e7cd34b-2174-409b-820b-2716a7c85f63'} Body: b'{"NeutronError": {"type": "QosRuleNotFound", "message": "QoS rule 5e7cd34b-2174-409b-820b-2716a7c85f63 for policy 8b328c05-9b60-4ac1-b2ba-04f86ce3eb50 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:44.263 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:44.286 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_bandwidth_limit_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:44.407 189 INFO tempest.lib.common.rest_client [req-db1e2cb9-4d13-4508-a69e-2579ae1b4e38 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_show_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules 0.115s 2020-12-14 02:32:44.410 189 DEBUG tempest.lib.common.rest_client [req-db1e2cb9-4d13-4508-a69e-2579ae1b4e38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress"}} Response - Headers: {'content-type': 'application/json', 'content-length': '137', 'x-openstack-request-id': 'req-db1e2cb9-4d13-4508-a69e-2579ae1b4e38', 'date': 'Mon, 14 Dec 2020 02:32:44 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules'} Body: b'{"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress", "id": "e55d8f38-a72f-4ed5-a177-c2b56270e292"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:44.413 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:44.480 189 INFO tempest.lib.common.rest_client [req-f6589e6a-7b9a-4584-b86a-4b4942d7efec ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_show_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles 0.061s 2020-12-14 02:32:44.483 189 DEBUG tempest.lib.common.rest_client [req-f6589e6a-7b9a-4584-b86a-4b4942d7efec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6589e6a-7b9a-4584-b86a-4b4942d7efec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:44.541 189 INFO tempest.lib.common.rest_client [req-fe7464b4-9c33-45f6-b4ad-55ba92a3458b ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_show_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:32:44.545 189 DEBUG tempest.lib.common.rest_client [req-fe7464b4-9c33-45f6-b4ad-55ba92a3458b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe7464b4-9c33-45f6-b4ad-55ba92a3458b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["HKP_aPYTSJufLzFdhXrJ3A"], "expires_at": "2020-12-14T03:32:44.000000Z", "issued_at": "2020-12-14T02:32:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:44.593 189 INFO tempest.lib.common.rest_client [req-916dfa6b-ec76-4035-b5df-87eaff3f4cd0 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_show_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:32:44.597 189 DEBUG tempest.lib.common.rest_client [req-916dfa6b-ec76-4035-b5df-87eaff3f4cd0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-916dfa6b-ec76-4035-b5df-87eaff3f4cd0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["iHbuhDBMT5KsfmYVukK9_Q"], "expires_at": "2020-12-14T03:32:44.000000Z", "issued_at": "2020-12-14T02:32:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:44.697 189 INFO tempest.lib.common.rest_client [req-81c61a2e-06ae-41b2-90b8-115611e5c2a3 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_show_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules/e55d8f38-a72f-4ed5-a177-c2b56270e292 0.092s 2020-12-14 02:32:44.700 189 DEBUG tempest.lib.common.rest_client [req-81c61a2e-06ae-41b2-90b8-115611e5c2a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '137', 'x-openstack-request-id': 'req-81c61a2e-06ae-41b2-90b8-115611e5c2a3', 'date': 'Mon, 14 Dec 2020 02:32:44 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules/e55d8f38-a72f-4ed5-a177-c2b56270e292'} Body: b'{"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress", "id": "e55d8f38-a72f-4ed5-a177-c2b56270e292"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:44.703 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:44.770 189 INFO tempest.lib.common.rest_client [req-3a0bfdab-bc4a-4b1f-a3bd-d42499d40769 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_show_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles 0.060s 2020-12-14 02:32:44.774 189 DEBUG tempest.lib.common.rest_client [req-3a0bfdab-bc4a-4b1f-a3bd-d42499d40769 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a0bfdab-bc4a-4b1f-a3bd-d42499d40769', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:44.827 189 INFO tempest.lib.common.rest_client [req-f6c86121-57e6-4321-80d8-fa5744b82171 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_show_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:32:44.829 189 DEBUG tempest.lib.common.rest_client [req-f6c86121-57e6-4321-80d8-fa5744b82171 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6c86121-57e6-4321-80d8-fa5744b82171', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["koj8swb5RAmW9Q30aYf9fQ"], "expires_at": "2020-12-14T03:32:44.000000Z", "issued_at": "2020-12-14T02:32:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:44.881 189 INFO tempest.lib.common.rest_client [req-7485dcba-b47b-470c-b06a-f1834e9a32b1 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_show_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:44.885 189 DEBUG tempest.lib.common.rest_client [req-7485dcba-b47b-470c-b06a-f1834e9a32b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7485dcba-b47b-470c-b06a-f1834e9a32b1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["CGOkNP0TTnWy8LN6kIfQvw"], "expires_at": "2020-12-14T03:32:44.000000Z", "issued_at": "2020-12-14T02:32:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:45.023 189 INFO tempest.lib.common.rest_client [req-4641b6ea-5de6-46ef-9b82-715d2722ca8e ] Request (PolicyBandwidthLimitRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules/e55d8f38-a72f-4ed5-a177-c2b56270e292 0.128s 2020-12-14 02:32:45.027 189 DEBUG tempest.lib.common.rest_client [req-4641b6ea-5de6-46ef-9b82-715d2722ca8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-4641b6ea-5de6-46ef-9b82-715d2722ca8e', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:45 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules/e55d8f38-a72f-4ed5-a177-c2b56270e292'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:45.049 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:45.089 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_bandwidth_limit_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:45.093 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:45.125 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_policy_bandwidth_limit_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:45.235 189 INFO tempest.lib.common.rest_client [req-b0241f55-a905-4ea8-ab1f-83270b90294e ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_update_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules 0.104s 2020-12-14 02:32:45.239 189 DEBUG tempest.lib.common.rest_client [req-b0241f55-a905-4ea8-ab1f-83270b90294e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress"}} Response - Headers: {'content-type': 'application/json', 'content-length': '137', 'x-openstack-request-id': 'req-b0241f55-a905-4ea8-ab1f-83270b90294e', 'date': 'Mon, 14 Dec 2020 02:32:45 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules'} Body: b'{"bandwidth_limit_rule": {"max_kbps": 1000, "max_burst_kbps": 1000, "direction": "egress", "id": "77705a88-8d6d-40ba-a727-ef2a9499f081"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:45.244 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:45.322 189 INFO tempest.lib.common.rest_client [req-bc238d14-b33a-4a16-bec4-7e9cdf1ca113 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_update_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles 0.070s 2020-12-14 02:32:45.326 189 DEBUG tempest.lib.common.rest_client [req-bc238d14-b33a-4a16-bec4-7e9cdf1ca113 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc238d14-b33a-4a16-bec4-7e9cdf1ca113', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:45.384 189 INFO tempest.lib.common.rest_client [req-bf68c5e0-c173-4b0b-b5e9-cfcb446cd600 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_update_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:32:45.387 189 DEBUG tempest.lib.common.rest_client [req-bf68c5e0-c173-4b0b-b5e9-cfcb446cd600 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf68c5e0-c173-4b0b-b5e9-cfcb446cd600', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["5cKPYN4RTfKrpL3Pt--trg"], "expires_at": "2020-12-14T03:32:45.000000Z", "issued_at": "2020-12-14T02:32:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:45.439 189 INFO tempest.lib.common.rest_client [req-3bf93ac0-fe2b-4a1b-b8ae-1c2eb7a6641e ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_update_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:32:45.442 189 DEBUG tempest.lib.common.rest_client [req-3bf93ac0-fe2b-4a1b-b8ae-1c2eb7a6641e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3bf93ac0-fe2b-4a1b-b8ae-1c2eb7a6641e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["Z0B0EDLPT7CPKYPstIst2w"], "expires_at": "2020-12-14T03:32:45.000000Z", "issued_at": "2020-12-14T02:32:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:45.685 189 INFO tempest.lib.common.rest_client [req-b57251f4-964b-4fef-8966-a6acdf60a0ac ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_update_policy_bandwidth_limit_rule): 200 PUT http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules/77705a88-8d6d-40ba-a727-ef2a9499f081 0.235s 2020-12-14 02:32:45.688 189 DEBUG tempest.lib.common.rest_client [req-b57251f4-964b-4fef-8966-a6acdf60a0ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"bandwidth_limit_rule": {"max_kbps": 2000}} Response - Headers: {'content-type': 'application/json', 'content-length': '137', 'x-openstack-request-id': 'req-b57251f4-964b-4fef-8966-a6acdf60a0ac', 'date': 'Mon, 14 Dec 2020 02:32:45 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules/77705a88-8d6d-40ba-a727-ef2a9499f081'} Body: b'{"bandwidth_limit_rule": {"max_kbps": 2000, "max_burst_kbps": 1000, "direction": "egress", "id": "77705a88-8d6d-40ba-a727-ef2a9499f081"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:45.691 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:45.759 189 INFO tempest.lib.common.rest_client [req-c65d504f-642d-4392-805a-8904dc99501d ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_update_policy_bandwidth_limit_rule): 200 GET http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles 0.063s 2020-12-14 02:32:45.762 189 DEBUG tempest.lib.common.rest_client [req-c65d504f-642d-4392-805a-8904dc99501d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c65d504f-642d-4392-805a-8904dc99501d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457/users/7ee77028b7814f22b69b0f6de74322d4/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:45.822 189 INFO tempest.lib.common.rest_client [req-90bd7b1e-065d-4a79-b178-8c1e7372f104 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_update_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:32:45.826 189 DEBUG tempest.lib.common.rest_client [req-90bd7b1e-065d-4a79-b178-8c1e7372f104 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90bd7b1e-065d-4a79-b178-8c1e7372f104', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["ToCx2huHRZqngdVkHGxDFw"], "expires_at": "2020-12-14T03:32:45.000000Z", "issued_at": "2020-12-14T02:32:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:45.878 189 INFO tempest.lib.common.rest_client [req-3e55881f-1172-4ba5-88cd-edb2178c8387 ] Request (PolicyBandwidthLimitRuleExtRbacTest:test_update_policy_bandwidth_limit_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:45.881 189 DEBUG tempest.lib.common.rest_client [req-3e55881f-1172-4ba5-88cd-edb2178c8387 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6660', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3e55881f-1172-4ba5-88cd-edb2178c8387', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ee77028b7814f22b69b0f6de74322d4", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189", "password_expires_at": null}, "audit_ids": ["J_FDqza1QgSqRxrZVRJsdw"], "expires_at": "2020-12-14T03:32:45.000000Z", "issued_at": "2020-12-14T02:32:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4f4d301c81574e7ebaecafd2f3e47457", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-294813189"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4f4d301c81574e7ebaecafd2f3e47457", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b24 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:46.068 189 INFO tempest.lib.common.rest_client [req-e0f01080-27fd-424c-a388-323ec4c233b8 ] Request (PolicyBandwidthLimitRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules/77705a88-8d6d-40ba-a727-ef2a9499f081 0.176s 2020-12-14 02:32:46.071 189 DEBUG tempest.lib.common.rest_client [req-e0f01080-27fd-424c-a388-323ec4c233b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e0f01080-27fd-424c-a388-323ec4c233b8', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:46 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50/bandwidth_limit_rules/77705a88-8d6d-40ba-a727-ef2a9499f081'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:46.174 189 INFO tempest.lib.common.rest_client [req-e85dea7b-799a-4947-8cdc-7a45e27a80c2 ] Request (PolicyBandwidthLimitRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50 0.088s 2020-12-14 02:32:46.177 189 DEBUG tempest.lib.common.rest_client [req-e85dea7b-799a-4947-8cdc-7a45e27a80c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e85dea7b-799a-4947-8cdc-7a45e27a80c2', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:46 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/8b328c05-9b60-4ac1-b2ba-04f86ce3eb50'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:46.327 189 INFO tempest.lib.common.rest_client [req-3eb56d11-fb92-4882-b732-278985f8604a ] Request (PolicyBandwidthLimitRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/7ee77028b7814f22b69b0f6de74322d4 0.143s 2020-12-14 02:32:46.329 189 DEBUG tempest.lib.common.rest_client [req-3eb56d11-fb92-4882-b732-278985f8604a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3eb56d11-fb92-4882-b732-278985f8604a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/7ee77028b7814f22b69b0f6de74322d4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:46.430 189 INFO tempest.lib.common.rest_client [req-920a090c-eaff-48f1-ad97-e18f0d2bae88 ] Request (PolicyBandwidthLimitRuleExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:32:46.434 189 DEBUG tempest.lib.common.rest_client [req-920a090c-eaff-48f1-ad97-e18f0d2bae88 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-920a090c-eaff-48f1-ad97-e18f0d2bae88', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["z0Ge9DmfQYaSf3BvF4fw2Q"], "expires_at": "2020-12-14T03:32:46.000000Z", "issued_at": "2020-12-14T02:32:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:46.735 189 INFO tempest.lib.common.rest_client [req-491a1d31-47c5-48f6-8ecf-c7a5a62f8e3b ] Request (PolicyBandwidthLimitRuleExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4f4d301c81574e7ebaecafd2f3e47457&name=default 0.294s 2020-12-14 02:32:46.738 189 DEBUG tempest.lib.common.rest_client [req-491a1d31-47c5-48f6-8ecf-c7a5a62f8e3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-491a1d31-47c5-48f6-8ecf-c7a5a62f8e3b', 'date': 'Mon, 14 Dec 2020 02:32:46 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4f4d301c81574e7ebaecafd2f3e47457&name=default'} Body: b'{"security_groups": [{"id": "5ad603df-ece6-46ec-8818-8885b23b6b47", "name": "default", "stateful": true, "tenant_id": "4f4d301c81574e7ebaecafd2f3e47457", "description": "Default security group", "security_group_rules": [{"id": "0401be64-0da2-49d7-8cc9-7f3702002a86", "tenant_id": "4f4d301c81574e7ebaecafd2f3e47457", "security_group_id": "5ad603df-ece6-46ec-8818-8885b23b6b47", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5ad603df-ece6-46ec-8818-8885b23b6b47", "description": null, "tags": [], "created_at": "2020-12-14T02:32:46Z", "updated_at": "2020-12-14T02:32:46Z", "revision_number": 0, "project_id": "4f4d301c81574e7ebaecafd2f3e47457"}, {"id": "857c5742-dc7b-48e8-9ef4-ea2f0c4334a7", "tenant_id": "4f4d301c81574e7ebaecafd2f3e47457", "security_group_id": "5ad603df-ece6-46ec-8818-8885b23b6b47", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5ad603df-ece6-46ec-8818-8885b23b6b47", "description": null, "tags": [], "created_at": "2020-12-14T02:32:46Z", "updated_at": "2020-12-14T02:32:46Z", "revision_number": 0, "project_id": "4f4d301c81574e7ebaecafd2f3e47457"}, {"id": "b9907b4c-4c70-4235-ac53-c0a7926f3eff", "tenant_id": "4f4d301c81574e7ebaecafd2f3e47457", "security_group_id": "5ad603df-ece6-46ec-8818-8885b23b6b47", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:32:46Z", "updated_at": "2020-12-14T02:32:46Z", "revision_number": 0, "project_id": "4f4d301c81574e7ebaecafd2f3e47457"}, {"id": "ce48ca12-2f49-400e-b35b-e993ae68f451", "tenant_id": "4f4d301c81574e7ebaecafd2f3e47457", "security_group_id": "5ad603df-ece6-46ec-8818-8885b23b6b47", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:32:46Z", "updated_at": "2020-12-14T02:32:46Z", "revision_number": 0, "project_id": "4f4d301c81574e7ebaecafd2f3e47457"}], "tags": [], "created_at": "2020-12-14T02:32:46Z", "updated_at": "2020-12-14T02:32:46Z", "revision_number": 1, "project_id": "4f4d301c81574e7ebaecafd2f3e47457"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:46.890 189 INFO tempest.lib.common.rest_client [req-1963752a-1482-4bba-86d8-e07fd00a2f1e ] Request (PolicyBandwidthLimitRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/5ad603df-ece6-46ec-8818-8885b23b6b47 0.145s 2020-12-14 02:32:46.892 189 DEBUG tempest.lib.common.rest_client [req-1963752a-1482-4bba-86d8-e07fd00a2f1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-1963752a-1482-4bba-86d8-e07fd00a2f1e', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:46 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5ad603df-ece6-46ec-8818-8885b23b6b47'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:47.047 189 INFO tempest.lib.common.rest_client [req-eb2e0688-62c5-499e-ae74-d5b592845676 ] Request (PolicyBandwidthLimitRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457 0.147s 2020-12-14 02:32:47.050 189 DEBUG tempest.lib.common.rest_client [req-eb2e0688-62c5-499e-ae74-d5b592845676 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb2e0688-62c5-499e-ae74-d5b592845676', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4f4d301c81574e7ebaecafd2f3e47457'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:47.172 189 INFO tempest.lib.common.rest_client [req-22baab6c-0e7e-4175-89db-119fd95e746e ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:32:47.176 189 DEBUG tempest.lib.common.rest_client [req-22baab6c-0e7e-4175-89db-119fd95e746e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-22baab6c-0e7e-4175-89db-119fd95e746e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["ZIv80YjaSrOWh-FRfTxxFQ"], "expires_at": "2020-12-14T03:32:47.000000Z", "issued_at": "2020-12-14T02:32:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:47.287 189 INFO tempest.lib.common.rest_client [req-287c4603-6afc-404f-b8f7-ae2b18b52723 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:32:47.290 189 DEBUG tempest.lib.common.rest_client [req-287c4603-6afc-404f-b8f7-ae2b18b52723 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-287c4603-6afc-404f-b8f7-ae2b18b52723', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["oDstRyeHTFaQ21zQpZEGjw"], "expires_at": "2020-12-14T03:32:47.000000Z", "issued_at": "2020-12-14T02:32:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:47.362 189 INFO tempest.lib.common.rest_client [req-2f19a37d-6b0f-4ecb-8799-fba1758e5f47 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.065s 2020-12-14 02:32:47.365 189 DEBUG tempest.lib.common.rest_client [req-2f19a37d-6b0f-4ecb-8799-fba1758e5f47 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f19a37d-6b0f-4ecb-8799-fba1758e5f47', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:47.526 189 INFO tempest.lib.common.rest_client [req-34826b38-c5c7-4022-ac6c-b71c77eafb3d ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.153s 2020-12-14 02:32:47.528 189 DEBUG tempest.lib.common.rest_client [req-34826b38-c5c7-4022-ac6c-b71c77eafb3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604-desc", "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '410', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34826b38-c5c7-4022-ac6c-b71c77eafb3d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "domain_id": "default", "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:47.651 189 INFO tempest.lib.common.rest_client [req-5ba34844-7434-44af-a6a3-af57a04a63f1 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.114s 2020-12-14 02:32:47.654 189 DEBUG tempest.lib.common.rest_client [req-5ba34844-7434-44af-a6a3-af57a04a63f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password": "C4*8_x3*AKIe*lW", "project_id": "c82bdc2d8293404fbfab9438a26430be", "email": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-583686099@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '428', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ba34844-7434-44af-a6a3-af57a04a63f1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "c82bdc2d8293404fbfab9438a26430be", "email": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-583686099@example.com", "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/4b7979167e1a4f79bd8b54b40f80686d"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:47.734 189 INFO tempest.lib.common.rest_client [req-2de4fde6-2b97-4e06-80c7-89477a524328 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.070s 2020-12-14 02:32:47.737 189 DEBUG tempest.lib.common.rest_client [req-2de4fde6-2b97-4e06-80c7-89477a524328 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2de4fde6-2b97-4e06-80c7-89477a524328', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:47.819 189 INFO tempest.lib.common.rest_client [req-2dc70b63-1834-40d8-badf-3161796d1b41 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.070s 2020-12-14 02:32:47.823 189 DEBUG tempest.lib.common.rest_client [req-2dc70b63-1834-40d8-badf-3161796d1b41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2dc70b63-1834-40d8-badf-3161796d1b41', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:47.924 189 INFO tempest.lib.common.rest_client [req-c6f2c49b-6c3d-4e50-a141-e2dacd1732f5 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles/72a4576c553448cd941b052c1ca0cf2d 0.091s 2020-12-14 02:32:47.927 189 DEBUG tempest.lib.common.rest_client [req-c6f2c49b-6c3d-4e50-a141-e2dacd1732f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6f2c49b-6c3d-4e50-a141-e2dacd1732f5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:47.931 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c82bdc2d8293404fbfab9438a26430be', 'project_name': 'tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604', 'tenant_id': 'c82bdc2d8293404fbfab9438a26430be', 'tenant_name': 'tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '4b7979167e1a4f79bd8b54b40f80686d'}, Network: None, Subnet: None, Router: None 2020-12-14 02:32:47.933 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'c82bdc2d8293404fbfab9438a26430be', 'project_name': 'tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604', 'tenant_id': 'c82bdc2d8293404fbfab9438a26430be', 'tenant_name': 'tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '4b7979167e1a4f79bd8b54b40f80686d'}, Network: None, Subnet: None, Router: None 2020-12-14 02:32:48.141 189 INFO tempest.lib.common.rest_client [req-27b32b21-6983-4042-99af-1817e8aa719a ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.124s 2020-12-14 02:32:48.144 189 DEBUG tempest.lib.common.rest_client [req-27b32b21-6983-4042-99af-1817e8aa719a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6603', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27b32b21-6983-4042-99af-1817e8aa719a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["KZvYeh1zRh6OjFKPXwUD4Q"], "expires_at": "2020-12-14T03:32:48.000000Z", "issued_at": "2020-12-14T02:32:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:48.149 189 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-12-14 02:32:48.284 189 INFO tempest.lib.common.rest_client [req-2ba94401-4306-441e-a3a9-a3e629ba48bc ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.105s 2020-12-14 02:32:48.286 189 DEBUG tempest.lib.common.rest_client [req-2ba94401-4306-441e-a3a9-a3e629ba48bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ba94401-4306-441e-a3a9-a3e629ba48bc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["p0wYrz2-STKC0yh4AKderA"], "expires_at": "2020-12-14T03:32:48.000000Z", "issued_at": "2020-12-14T02:32:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:48.415 189 INFO tempest.lib.common.rest_client [req-3bb378aa-2986-45a8-88ea-280bfb6ffbc5 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.060s 2020-12-14 02:32:48.418 189 DEBUG tempest.lib.common.rest_client [req-3bb378aa-2986-45a8-88ea-280bfb6ffbc5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3bb378aa-2986-45a8-88ea-280bfb6ffbc5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["yjz7r2neQF-W8cIT7qpW0g"], "expires_at": "2020-12-14T03:32:48.000000Z", "issued_at": "2020-12-14T02:32:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:48.497 189 INFO tempest.lib.common.rest_client [req-9c9a8f41-01f2-409d-ac23-f8bc33b1c6db ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.071s 2020-12-14 02:32:48.499 189 DEBUG tempest.lib.common.rest_client [req-9c9a8f41-01f2-409d-ac23-f8bc33b1c6db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c9a8f41-01f2-409d-ac23-f8bc33b1c6db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:48.570 189 INFO tempest.lib.common.rest_client [req-4cfdf16d-cfcb-4323-95f0-5090cd89ed06 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.065s 2020-12-14 02:32:48.572 189 DEBUG tempest.lib.common.rest_client [req-4cfdf16d-cfcb-4323-95f0-5090cd89ed06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4cfdf16d-cfcb-4323-95f0-5090cd89ed06', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:48.575 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:32:48.579 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:48.657 189 INFO tempest.lib.common.rest_client [req-d19af526-ef85-4068-b69b-d1959bbb6693 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles 0.071s 2020-12-14 02:32:48.659 189 DEBUG tempest.lib.common.rest_client [req-d19af526-ef85-4068-b69b-d1959bbb6693 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d19af526-ef85-4068-b69b-d1959bbb6693', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:48.744 189 INFO tempest.lib.common.rest_client [req-918b1a11-7a94-4206-9ac5-82183cb1a045 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles/72a4576c553448cd941b052c1ca0cf2d 0.078s 2020-12-14 02:32:48.748 189 DEBUG tempest.lib.common.rest_client [req-918b1a11-7a94-4206-9ac5-82183cb1a045 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-918b1a11-7a94-4206-9ac5-82183cb1a045', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:48.885 189 INFO tempest.lib.common.rest_client [req-057507da-59f3-40d0-b6c8-ed6777b05279 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles/a629c95d64b3416fb80ae90af4f69c05 0.126s 2020-12-14 02:32:48.888 189 DEBUG tempest.lib.common.rest_client [req-057507da-59f3-40d0-b6c8-ed6777b05279 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-057507da-59f3-40d0-b6c8-ed6777b05279', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:50.014 189 INFO tempest.lib.common.rest_client [req-fd40a124-2a19-46c2-a2b8-9af4faa64d2c ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.116s 2020-12-14 02:32:50.018 189 DEBUG tempest.lib.common.rest_client [req-fd40a124-2a19-46c2-a2b8-9af4faa64d2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd40a124-2a19-46c2-a2b8-9af4faa64d2c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["ahCSxKOuRlyRDUijh-P2Tw"], "expires_at": "2020-12-14T03:32:49.000000Z", "issued_at": "2020-12-14T02:32:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:50.076 189 INFO tempest.lib.common.rest_client [req-5698baf0-efa9-4862-a9d0-513981d02605 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:32:50.078 189 DEBUG tempest.lib.common.rest_client [req-5698baf0-efa9-4862-a9d0-513981d02605 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5698baf0-efa9-4862-a9d0-513981d02605', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["JjNXDvwcQNaU1r5KF2USgQ"], "expires_at": "2020-12-14T03:32:50.000000Z", "issued_at": "2020-12-14T02:32:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:50.208 189 INFO tempest.lib.common.rest_client [req-fbaf15dc-3a64-43be-8077-5213181aea98 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/qos/policies 0.120s 2020-12-14 02:32:50.210 189 DEBUG tempest.lib.common.rest_client [req-fbaf15dc-3a64-43be-8077-5213181aea98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"policy": {"name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-qos-556961198", "shared": false, "is_default": false}} Response - Headers: {'content-type': 'application/json', 'content-length': '408', 'x-openstack-request-id': 'req-fbaf15dc-3a64-43be-8077-5213181aea98', 'date': 'Mon, 14 Dec 2020 02:32:50 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies'} Body: b'{"policy": {"id": "4d883b5c-434f-4335-bb33-6a41b5278ff0", "project_id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-qos-556961198", "shared": false, "rules": [], "is_default": false, "revision_number": 0, "description": "", "created_at": "2020-12-14T02:32:50Z", "updated_at": "2020-12-14T02:32:50Z", "tenant_id": "c82bdc2d8293404fbfab9438a26430be", "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:50.219 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:50.245 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: create_policy_minimum_bandwidth_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:50.247 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:50.364 189 INFO tempest.lib.common.rest_client [req-eb85e20d-7898-4621-ad5c-aeb7b5c9bdef ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_create_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles 0.110s 2020-12-14 02:32:50.368 189 DEBUG tempest.lib.common.rest_client [req-eb85e20d-7898-4621-ad5c-aeb7b5c9bdef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb85e20d-7898-4621-ad5c-aeb7b5c9bdef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:50.420 189 INFO tempest.lib.common.rest_client [req-c28fbcdc-948f-463b-9150-724352fbf10d ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_create_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:50.423 189 DEBUG tempest.lib.common.rest_client [req-c28fbcdc-948f-463b-9150-724352fbf10d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c28fbcdc-948f-463b-9150-724352fbf10d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["zsia4qnLQm-ePj_zDRVtiw"], "expires_at": "2020-12-14T03:32:50.000000Z", "issued_at": "2020-12-14T02:32:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:50.476 189 INFO tempest.lib.common.rest_client [req-bdccd225-a489-43b0-ad42-d6c092c21989 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_create_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:50.479 189 DEBUG tempest.lib.common.rest_client [req-bdccd225-a489-43b0-ad42-d6c092c21989 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bdccd225-a489-43b0-ad42-d6c092c21989', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["o0IDgBmIT_W57XmQgSnQng"], "expires_at": "2020-12-14T03:32:50.000000Z", "issued_at": "2020-12-14T02:32:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:50.733 189 INFO tempest.lib.common.rest_client [req-c7e3cd60-2c39-49fb-b577-81c5d9197d21 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_create_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules 0.246s 2020-12-14 02:32:50.737 189 DEBUG tempest.lib.common.rest_client [req-c7e3cd60-2c39-49fb-b577-81c5d9197d21 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"minimum_bandwidth_rule": {"direction": "egress", "min_kbps": 1000}} Response - Headers: {'content-type': 'application/json', 'content-length': '115', 'x-openstack-request-id': 'req-c7e3cd60-2c39-49fb-b577-81c5d9197d21', 'date': 'Mon, 14 Dec 2020 02:32:50 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules'} Body: b'{"minimum_bandwidth_rule": {"min_kbps": 1000, "direction": "egress", "id": "fcb6d998-5100-4bf7-ba70-db633e44f652"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:50.740 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:50.801 189 INFO tempest.lib.common.rest_client [req-94204981-a974-45c3-9853-3c15006dc5c3 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_create_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles 0.056s 2020-12-14 02:32:50.804 189 DEBUG tempest.lib.common.rest_client [req-94204981-a974-45c3-9853-3c15006dc5c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94204981-a974-45c3-9853-3c15006dc5c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:50.856 189 INFO tempest.lib.common.rest_client [req-0f405986-589e-4688-a317-7c2e7e5c01f5 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_create_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:50.859 189 DEBUG tempest.lib.common.rest_client [req-0f405986-589e-4688-a317-7c2e7e5c01f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f405986-589e-4688-a317-7c2e7e5c01f5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["vvS9Af0GRM2UbH0rT74HYA"], "expires_at": "2020-12-14T03:32:50.000000Z", "issued_at": "2020-12-14T02:32:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:50.911 189 INFO tempest.lib.common.rest_client [req-0bdfaf27-cfdc-4aa7-81e1-ffb017417fde ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_create_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:32:50.914 189 DEBUG tempest.lib.common.rest_client [req-0bdfaf27-cfdc-4aa7-81e1-ffb017417fde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0bdfaf27-cfdc-4aa7-81e1-ffb017417fde', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["hXUXv_WESDu8wmfhknEZ3g"], "expires_at": "2020-12-14T03:32:50.000000Z", "issued_at": "2020-12-14T02:32:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:51.108 189 INFO tempest.lib.common.rest_client [req-0a97c932-232e-4dbf-b84e-5598a828cd17 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules/fcb6d998-5100-4bf7-ba70-db633e44f652 0.184s 2020-12-14 02:32:51.112 189 DEBUG tempest.lib.common.rest_client [req-0a97c932-232e-4dbf-b84e-5598a828cd17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-0a97c932-232e-4dbf-b84e-5598a828cd17', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:51 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules/fcb6d998-5100-4bf7-ba70-db633e44f652'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:51.127 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:51.151 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_minimum_bandwidth_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:51.154 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:51.177 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_policy_minimum_bandwidth_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:51.375 189 INFO tempest.lib.common.rest_client [req-da9a0b40-4ad7-4ff1-8f8b-d55e562adb29 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_delete_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules 0.191s 2020-12-14 02:32:51.378 189 DEBUG tempest.lib.common.rest_client [req-da9a0b40-4ad7-4ff1-8f8b-d55e562adb29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"minimum_bandwidth_rule": {"direction": "egress", "min_kbps": 1000}} Response - Headers: {'content-type': 'application/json', 'content-length': '115', 'x-openstack-request-id': 'req-da9a0b40-4ad7-4ff1-8f8b-d55e562adb29', 'date': 'Mon, 14 Dec 2020 02:32:51 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules'} Body: b'{"minimum_bandwidth_rule": {"min_kbps": 1000, "direction": "egress", "id": "ee8a9ab0-db71-4d78-aef9-b31dfb37de48"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:51.384 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:51.456 189 INFO tempest.lib.common.rest_client [req-540ad23f-761a-4e41-bc7b-d862c52785b3 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_delete_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles 0.064s 2020-12-14 02:32:51.461 189 DEBUG tempest.lib.common.rest_client [req-540ad23f-761a-4e41-bc7b-d862c52785b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-540ad23f-761a-4e41-bc7b-d862c52785b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:51.522 189 INFO tempest.lib.common.rest_client [req-c0148c03-7c21-40f6-8ee2-3111c457b973 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_delete_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:32:51.525 189 DEBUG tempest.lib.common.rest_client [req-c0148c03-7c21-40f6-8ee2-3111c457b973 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c0148c03-7c21-40f6-8ee2-3111c457b973', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["zXdR5q9wQaCDMQO7fGWKNg"], "expires_at": "2020-12-14T03:32:51.000000Z", "issued_at": "2020-12-14T02:32:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:51.573 189 INFO tempest.lib.common.rest_client [req-32a9185f-13f3-402c-bdff-6e4ad2c97fcc ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_delete_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:32:51.577 189 DEBUG tempest.lib.common.rest_client [req-32a9185f-13f3-402c-bdff-6e4ad2c97fcc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32a9185f-13f3-402c-bdff-6e4ad2c97fcc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["7KesDLEiR62kAHBIuTSSsQ"], "expires_at": "2020-12-14T03:32:51.000000Z", "issued_at": "2020-12-14T02:32:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:51.787 189 INFO tempest.lib.common.rest_client [req-64432aef-2082-4824-b2c9-1a1eacf79de8 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_delete_policy_minimum_bandwidth_rule): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules/ee8a9ab0-db71-4d78-aef9-b31dfb37de48 0.202s 2020-12-14 02:32:51.789 189 DEBUG tempest.lib.common.rest_client [req-64432aef-2082-4824-b2c9-1a1eacf79de8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-64432aef-2082-4824-b2c9-1a1eacf79de8', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:51 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules/ee8a9ab0-db71-4d78-aef9-b31dfb37de48'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:51.792 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:51.870 189 INFO tempest.lib.common.rest_client [req-abb268a9-975e-474a-b152-2e9b3b92de7f ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_delete_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles 0.071s 2020-12-14 02:32:51.874 189 DEBUG tempest.lib.common.rest_client [req-abb268a9-975e-474a-b152-2e9b3b92de7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-abb268a9-975e-474a-b152-2e9b3b92de7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:51.933 189 INFO tempest.lib.common.rest_client [req-79f06116-87f0-4d10-bc23-7a31ab3475c5 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_delete_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:32:51.937 189 DEBUG tempest.lib.common.rest_client [req-79f06116-87f0-4d10-bc23-7a31ab3475c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79f06116-87f0-4d10-bc23-7a31ab3475c5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["AOxr65JJQtysgKQ0VhR7QQ"], "expires_at": "2020-12-14T03:32:51.000000Z", "issued_at": "2020-12-14T02:32:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:51.988 189 INFO tempest.lib.common.rest_client [req-629e89f9-ba01-4960-9f95-aac0e7fbd21d ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_delete_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:32:51.992 189 DEBUG tempest.lib.common.rest_client [req-629e89f9-ba01-4960-9f95-aac0e7fbd21d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-629e89f9-ba01-4960-9f95-aac0e7fbd21d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["_jqVUPE5SKi3drMFUGWC1Q"], "expires_at": "2020-12-14T03:32:51.000000Z", "issued_at": "2020-12-14T02:32:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:52.114 189 INFO tempest.lib.common.rest_client [req-c6550e1b-c3dc-451c-8607-a49d88536118 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules/ee8a9ab0-db71-4d78-aef9-b31dfb37de48 0.112s 2020-12-14 02:32:52.117 189 DEBUG tempest.lib.common.rest_client [req-c6550e1b-c3dc-451c-8607-a49d88536118 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '187', 'x-openstack-request-id': 'req-c6550e1b-c3dc-451c-8607-a49d88536118', 'date': 'Mon, 14 Dec 2020 02:32:52 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules/ee8a9ab0-db71-4d78-aef9-b31dfb37de48'} Body: b'{"NeutronError": {"type": "QosRuleNotFound", "message": "QoS rule ee8a9ab0-db71-4d78-aef9-b31dfb37de48 for policy 4d883b5c-434f-4335-bb33-6a41b5278ff0 could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:52.140 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:52.167 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_minimum_bandwidth_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:52.351 189 INFO tempest.lib.common.rest_client [req-ca76079a-91fb-4108-b488-bb6fd2a2adf4 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_show_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules 0.178s 2020-12-14 02:32:52.355 189 DEBUG tempest.lib.common.rest_client [req-ca76079a-91fb-4108-b488-bb6fd2a2adf4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"minimum_bandwidth_rule": {"direction": "egress", "min_kbps": 1000}} Response - Headers: {'content-type': 'application/json', 'content-length': '115', 'x-openstack-request-id': 'req-ca76079a-91fb-4108-b488-bb6fd2a2adf4', 'date': 'Mon, 14 Dec 2020 02:32:52 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules'} Body: b'{"minimum_bandwidth_rule": {"min_kbps": 1000, "direction": "egress", "id": "37340f70-d496-4fab-bd02-222b48daf713"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:52.359 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:52.443 189 INFO tempest.lib.common.rest_client [req-b1e24ad3-d944-494a-958f-2aeacaeeb7a6 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_show_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles 0.078s 2020-12-14 02:32:52.445 189 DEBUG tempest.lib.common.rest_client [req-b1e24ad3-d944-494a-958f-2aeacaeeb7a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1e24ad3-d944-494a-958f-2aeacaeeb7a6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:52.497 189 INFO tempest.lib.common.rest_client [req-394ccb6a-699c-452f-9b8c-4e127356c770 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_show_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:32:52.500 189 DEBUG tempest.lib.common.rest_client [req-394ccb6a-699c-452f-9b8c-4e127356c770 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-394ccb6a-699c-452f-9b8c-4e127356c770', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["zCtlbDwOTNqPc5F4TTCmnQ"], "expires_at": "2020-12-14T03:32:52.000000Z", "issued_at": "2020-12-14T02:32:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:52.553 189 INFO tempest.lib.common.rest_client [req-7d507347-8e46-4515-8605-4b53f10b90bd ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_show_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:32:52.557 189 DEBUG tempest.lib.common.rest_client [req-7d507347-8e46-4515-8605-4b53f10b90bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7d507347-8e46-4515-8605-4b53f10b90bd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["nRUtySuzQgW4wa5f3NrkKQ"], "expires_at": "2020-12-14T03:32:52.000000Z", "issued_at": "2020-12-14T02:32:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:52.686 189 INFO tempest.lib.common.rest_client [req-b97e263e-6600-4419-9cff-7ada730606e0 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_show_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules/37340f70-d496-4fab-bd02-222b48daf713 0.121s 2020-12-14 02:32:52.690 189 DEBUG tempest.lib.common.rest_client [req-b97e263e-6600-4419-9cff-7ada730606e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '115', 'x-openstack-request-id': 'req-b97e263e-6600-4419-9cff-7ada730606e0', 'date': 'Mon, 14 Dec 2020 02:32:52 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules/37340f70-d496-4fab-bd02-222b48daf713'} Body: b'{"minimum_bandwidth_rule": {"min_kbps": 1000, "direction": "egress", "id": "37340f70-d496-4fab-bd02-222b48daf713"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:52.694 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:52.781 189 INFO tempest.lib.common.rest_client [req-c03dfd3f-c77e-4395-a789-6a78b66921ad ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_show_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles 0.078s 2020-12-14 02:32:52.784 189 DEBUG tempest.lib.common.rest_client [req-c03dfd3f-c77e-4395-a789-6a78b66921ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c03dfd3f-c77e-4395-a789-6a78b66921ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:52.841 189 INFO tempest.lib.common.rest_client [req-d2a788a7-cc03-4c38-b6d9-48cf051cefc8 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_show_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:32:52.845 189 DEBUG tempest.lib.common.rest_client [req-d2a788a7-cc03-4c38-b6d9-48cf051cefc8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2a788a7-cc03-4c38-b6d9-48cf051cefc8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["4UPX1H9vRdSB4OxoWcqDBg"], "expires_at": "2020-12-14T03:32:52.000000Z", "issued_at": "2020-12-14T02:32:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:52.899 189 INFO tempest.lib.common.rest_client [req-c875485d-383f-451c-89f6-514398ed06ec ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_show_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:32:52.903 189 DEBUG tempest.lib.common.rest_client [req-c875485d-383f-451c-89f6-514398ed06ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c875485d-383f-451c-89f6-514398ed06ec', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["8M2dkAzaR_eiZzvFpzFWKA"], "expires_at": "2020-12-14T03:32:52.000000Z", "issued_at": "2020-12-14T02:32:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:53.106 189 INFO tempest.lib.common.rest_client [req-d12163b4-d5ca-45a0-b22e-75b9036e8f4a ] Request (PolicyMinimumBandwidthRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules/37340f70-d496-4fab-bd02-222b48daf713 0.194s 2020-12-14 02:32:53.110 189 DEBUG tempest.lib.common.rest_client [req-d12163b4-d5ca-45a0-b22e-75b9036e8f4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-d12163b4-d5ca-45a0-b22e-75b9036e8f4a', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:53 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules/37340f70-d496-4fab-bd02-222b48daf713'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:53.128 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:53.153 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_policy_minimum_bandwidth_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:53.156 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:53.180 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: update_policy_minimum_bandwidth_rule, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:53.339 189 INFO tempest.lib.common.rest_client [req-70e888d1-492a-4ede-91ae-fca547ba715d ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_update_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules 0.152s 2020-12-14 02:32:53.342 189 DEBUG tempest.lib.common.rest_client [req-70e888d1-492a-4ede-91ae-fca547ba715d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"minimum_bandwidth_rule": {"direction": "egress", "min_kbps": 1000}} Response - Headers: {'content-type': 'application/json', 'content-length': '115', 'x-openstack-request-id': 'req-70e888d1-492a-4ede-91ae-fca547ba715d', 'date': 'Mon, 14 Dec 2020 02:32:53 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules'} Body: b'{"minimum_bandwidth_rule": {"min_kbps": 1000, "direction": "egress", "id": "d19b89bd-e18c-4b26-870f-a44d67a02686"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:53.346 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:53.417 189 INFO tempest.lib.common.rest_client [req-0bd6948f-0bba-4aac-96b2-24ff47237f4e ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_update_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles 0.064s 2020-12-14 02:32:53.421 189 DEBUG tempest.lib.common.rest_client [req-0bd6948f-0bba-4aac-96b2-24ff47237f4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0bd6948f-0bba-4aac-96b2-24ff47237f4e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:53.474 189 INFO tempest.lib.common.rest_client [req-53817fff-00fb-4a4b-8999-ba20aa2bcffe ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_update_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:32:53.478 189 DEBUG tempest.lib.common.rest_client [req-53817fff-00fb-4a4b-8999-ba20aa2bcffe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53817fff-00fb-4a4b-8999-ba20aa2bcffe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["6gGUcwsfRMu1u7-TLo1Xqg"], "expires_at": "2020-12-14T03:32:53.000000Z", "issued_at": "2020-12-14T02:32:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:53.529 189 INFO tempest.lib.common.rest_client [req-60b18829-ac7b-45c4-9efa-6b46012a5084 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_update_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:32:53.533 189 DEBUG tempest.lib.common.rest_client [req-60b18829-ac7b-45c4-9efa-6b46012a5084 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60b18829-ac7b-45c4-9efa-6b46012a5084', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["bY3pnwYKS5KRMS_YOGLlfA"], "expires_at": "2020-12-14T03:32:53.000000Z", "issued_at": "2020-12-14T02:32:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:53.803 189 INFO tempest.lib.common.rest_client [req-6663ddba-1613-4c9f-a13b-f00f999db2e3 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_update_policy_minimum_bandwidth_rule): 200 PUT http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules/d19b89bd-e18c-4b26-870f-a44d67a02686 0.262s 2020-12-14 02:32:53.808 189 DEBUG tempest.lib.common.rest_client [req-6663ddba-1613-4c9f-a13b-f00f999db2e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"minimum_bandwidth_rule": {"min_kbps": 2000}} Response - Headers: {'content-type': 'application/json', 'content-length': '115', 'x-openstack-request-id': 'req-6663ddba-1613-4c9f-a13b-f00f999db2e3', 'date': 'Mon, 14 Dec 2020 02:32:53 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules/d19b89bd-e18c-4b26-870f-a44d67a02686'} Body: b'{"minimum_bandwidth_rule": {"min_kbps": 2000, "direction": "egress", "id": "d19b89bd-e18c-4b26-870f-a44d67a02686"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:53.811 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:53.876 189 INFO tempest.lib.common.rest_client [req-0fd7f42e-a631-439a-9026-d86b8ad33228 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_update_policy_minimum_bandwidth_rule): 200 GET http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles 0.059s 2020-12-14 02:32:53.878 189 DEBUG tempest.lib.common.rest_client [req-0fd7f42e-a631-439a-9026-d86b8ad33228 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0fd7f42e-a631-439a-9026-d86b8ad33228', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be/users/4b7979167e1a4f79bd8b54b40f80686d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:53.937 189 INFO tempest.lib.common.rest_client [req-0af6cb94-4d57-4dd0-b594-8813945d097b ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_update_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:32:53.941 189 DEBUG tempest.lib.common.rest_client [req-0af6cb94-4d57-4dd0-b594-8813945d097b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0af6cb94-4d57-4dd0-b594-8813945d097b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["n59UkYY3QE6KOiZzPopQWg"], "expires_at": "2020-12-14T03:32:53.000000Z", "issued_at": "2020-12-14T02:32:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:53.998 189 INFO tempest.lib.common.rest_client [req-9317119b-d158-4a57-be8d-196bc7a5f48d ] Request (PolicyMinimumBandwidthRuleExtRbacTest:test_update_policy_minimum_bandwidth_rule): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:32:54.002 189 DEBUG tempest.lib.common.rest_client [req-9317119b-d158-4a57-be8d-196bc7a5f48d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6664', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9317119b-d158-4a57-be8d-196bc7a5f48d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4b7979167e1a4f79bd8b54b40f80686d", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604", "password_expires_at": null}, "audit_ids": ["42pXpEJVQrWqRtPVrP0AsQ"], "expires_at": "2020-12-14T03:32:53.000000Z", "issued_at": "2020-12-14T02:32:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "c82bdc2d8293404fbfab9438a26430be", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-280332604"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_c82bdc2d8293404fbfab9438a26430be", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:54.221 189 INFO tempest.lib.common.rest_client [req-523a562c-8b06-4d39-93a6-b4e1339c3993 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules/d19b89bd-e18c-4b26-870f-a44d67a02686 0.209s 2020-12-14 02:32:54.224 189 DEBUG tempest.lib.common.rest_client [req-523a562c-8b06-4d39-93a6-b4e1339c3993 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-523a562c-8b06-4d39-93a6-b4e1339c3993', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:54 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0/minimum_bandwidth_rules/d19b89bd-e18c-4b26-870f-a44d67a02686'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:54.388 189 INFO tempest.lib.common.rest_client [req-0bc29958-82ce-44a6-b590-fc5332d225b8 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0 0.136s 2020-12-14 02:32:54.392 189 DEBUG tempest.lib.common.rest_client [req-0bc29958-82ce-44a6-b590-fc5332d225b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-0bc29958-82ce-44a6-b590-fc5332d225b8', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:54 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/qos/policies/4d883b5c-434f-4335-bb33-6a41b5278ff0'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:54.545 189 INFO tempest.lib.common.rest_client [req-86ac8687-9a51-4d64-82f4-114617272392 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/4b7979167e1a4f79bd8b54b40f80686d 0.144s 2020-12-14 02:32:54.548 189 DEBUG tempest.lib.common.rest_client [req-86ac8687-9a51-4d64-82f4-114617272392 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-86ac8687-9a51-4d64-82f4-114617272392', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/4b7979167e1a4f79bd8b54b40f80686d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:54.654 189 INFO tempest.lib.common.rest_client [req-55bc4356-f2d6-46a8-8ab5-b4e66403218c ] Request (PolicyMinimumBandwidthRuleExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:32:54.656 189 DEBUG tempest.lib.common.rest_client [req-55bc4356-f2d6-46a8-8ab5-b4e66403218c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55bc4356-f2d6-46a8-8ab5-b4e66403218c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["3v3n3CbwQEOHxMbV1Ynagg"], "expires_at": "2020-12-14T03:32:54.000000Z", "issued_at": "2020-12-14T02:32:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:54.996 189 INFO tempest.lib.common.rest_client [req-4f7f63ac-3269-4fcd-96e4-91afed652517 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c82bdc2d8293404fbfab9438a26430be&name=default 0.332s 2020-12-14 02:32:55.000 189 DEBUG tempest.lib.common.rest_client [req-4f7f63ac-3269-4fcd-96e4-91afed652517 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-4f7f63ac-3269-4fcd-96e4-91afed652517', 'date': 'Mon, 14 Dec 2020 02:32:54 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=c82bdc2d8293404fbfab9438a26430be&name=default'} Body: b'{"security_groups": [{"id": "dc121aeb-75f0-4f06-88ac-8f91b7bcd947", "name": "default", "stateful": true, "tenant_id": "c82bdc2d8293404fbfab9438a26430be", "description": "Default security group", "security_group_rules": [{"id": "37c61bf0-32db-4d01-8e8d-61d6989cacdc", "tenant_id": "c82bdc2d8293404fbfab9438a26430be", "security_group_id": "dc121aeb-75f0-4f06-88ac-8f91b7bcd947", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "dc121aeb-75f0-4f06-88ac-8f91b7bcd947", "description": null, "tags": [], "created_at": "2020-12-14T02:32:54Z", "updated_at": "2020-12-14T02:32:54Z", "revision_number": 0, "project_id": "c82bdc2d8293404fbfab9438a26430be"}, {"id": "42683df8-840b-4649-8449-4ab2a9c9ec21", "tenant_id": "c82bdc2d8293404fbfab9438a26430be", "security_group_id": "dc121aeb-75f0-4f06-88ac-8f91b7bcd947", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:32:54Z", "updated_at": "2020-12-14T02:32:54Z", "revision_number": 0, "project_id": "c82bdc2d8293404fbfab9438a26430be"}, {"id": "4c2f0b4d-30f8-49fb-b4f7-6fa82809cfe6", "tenant_id": "c82bdc2d8293404fbfab9438a26430be", "security_group_id": "dc121aeb-75f0-4f06-88ac-8f91b7bcd947", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:32:54Z", "updated_at": "2020-12-14T02:32:54Z", "revision_number": 0, "project_id": "c82bdc2d8293404fbfab9438a26430be"}, {"id": "ac5517c7-68db-4497-b40d-8947916bdfd7", "tenant_id": "c82bdc2d8293404fbfab9438a26430be", "security_group_id": "dc121aeb-75f0-4f06-88ac-8f91b7bcd947", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "dc121aeb-75f0-4f06-88ac-8f91b7bcd947", "description": null, "tags": [], "created_at": "2020-12-14T02:32:54Z", "updated_at": "2020-12-14T02:32:54Z", "revision_number": 0, "project_id": "c82bdc2d8293404fbfab9438a26430be"}], "tags": [], "created_at": "2020-12-14T02:32:54Z", "updated_at": "2020-12-14T02:32:54Z", "revision_number": 1, "project_id": "c82bdc2d8293404fbfab9438a26430be"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:55.141 189 INFO tempest.lib.common.rest_client [req-2fecd365-95bc-4296-804c-d8cfe89082b5 ] Request (PolicyMinimumBandwidthRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/dc121aeb-75f0-4f06-88ac-8f91b7bcd947 0.134s 2020-12-14 02:32:55.144 189 DEBUG tempest.lib.common.rest_client [req-2fecd365-95bc-4296-804c-d8cfe89082b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2fecd365-95bc-4296-804c-d8cfe89082b5', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:32:55 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/dc121aeb-75f0-4f06-88ac-8f91b7bcd947'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:55.283 189 INFO tempest.lib.common.rest_client [req-988b656a-4d21-464a-a9e5-1e7e17270a5b ] Request (PolicyMinimumBandwidthRuleExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be 0.132s 2020-12-14 02:32:55.285 189 DEBUG tempest.lib.common.rest_client [req-988b656a-4d21-464a-a9e5-1e7e17270a5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-988b656a-4d21-464a-a9e5-1e7e17270a5b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/c82bdc2d8293404fbfab9438a26430be'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:55.402 189 INFO tempest.lib.common.rest_client [req-89f08375-cf94-482d-89f2-7b17a5708e0d ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:32:55.406 189 DEBUG tempest.lib.common.rest_client [req-89f08375-cf94-482d-89f2-7b17a5708e0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89f08375-cf94-482d-89f2-7b17a5708e0d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["dbv523z3SgGBD6HgehPSoQ"], "expires_at": "2020-12-14T03:32:55.000000Z", "issued_at": "2020-12-14T02:32:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:55.514 189 INFO tempest.lib.common.rest_client [req-0a2a0d5b-608b-4276-8fbf-308a0ad721be ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:32:55.518 189 DEBUG tempest.lib.common.rest_client [req-0a2a0d5b-608b-4276-8fbf-308a0ad721be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0a2a0d5b-608b-4276-8fbf-308a0ad721be', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["qIWZI8hiTxGo4_5EizvGAQ"], "expires_at": "2020-12-14T03:32:55.000000Z", "issued_at": "2020-12-14T02:32:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:55.596 189 INFO tempest.lib.common.rest_client [req-609edb16-bdc9-4c8f-bf9c-16c156f4ae8d ] Request (TrunksSubportsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.068s 2020-12-14 02:32:55.599 189 DEBUG tempest.lib.common.rest_client [req-609edb16-bdc9-4c8f-bf9c-16c156f4ae8d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-609edb16-bdc9-4c8f-bf9c-16c156f4ae8d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:55.688 189 INFO tempest.lib.common.rest_client [req-07cd3adf-2b85-4944-a0b7-482a590ed18d ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.080s 2020-12-14 02:32:55.691 189 DEBUG tempest.lib.common.rest_client [req-07cd3adf-2b85-4944-a0b7-482a590ed18d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-TrunksSubportsExtRbacTest-125442856-desc", "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-125442856"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07cd3adf-2b85-4944-a0b7-482a590ed18d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "domain_id": "default", "description": "tempest-TrunksSubportsExtRbacTest-125442856-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:55.810 189 INFO tempest.lib.common.rest_client [req-d01dcb14-1133-4b7b-80be-f3845333bb43 ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.110s 2020-12-14 02:32:55.812 189 DEBUG tempest.lib.common.rest_client [req-d01dcb14-1133-4b7b-80be-f3845333bb43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-TrunksSubportsExtRbacTest-125442856", "password": "F9%Ho9nG1U2~bL~", "project_id": "0b28fa435cc443bea550ee649cfdd0d5", "email": "tempest-TrunksSubportsExtRbacTest-1921105456@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '405', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d01dcb14-1133-4b7b-80be-f3845333bb43', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "0b28fa435cc443bea550ee649cfdd0d5", "email": "tempest-TrunksSubportsExtRbacTest-1921105456@example.com", "id": "08f401c6555e47eeaa0dd1ad2ae1c048", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/08f401c6555e47eeaa0dd1ad2ae1c048"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:55.883 189 INFO tempest.lib.common.rest_client [req-e8c8cb60-7d25-47e2-bfc4-c1f28d8fee23 ] Request (TrunksSubportsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:32:55.887 189 DEBUG tempest.lib.common.rest_client [req-e8c8cb60-7d25-47e2-bfc4-c1f28d8fee23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e8c8cb60-7d25-47e2-bfc4-c1f28d8fee23', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:55.962 189 INFO tempest.lib.common.rest_client [req-14c4726d-7ec2-4fd7-afab-41b0b1abd588 ] Request (TrunksSubportsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:32:55.963 189 DEBUG tempest.lib.common.rest_client [req-14c4726d-7ec2-4fd7-afab-41b0b1abd588 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14c4726d-7ec2-4fd7-afab-41b0b1abd588', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:56.039 189 INFO tempest.lib.common.rest_client [req-4337c1e3-0b78-44a3-ae30-2f30efa1dc2f ] Request (TrunksSubportsExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles/72a4576c553448cd941b052c1ca0cf2d 0.070s 2020-12-14 02:32:56.041 189 DEBUG tempest.lib.common.rest_client [req-4337c1e3-0b78-44a3-ae30-2f30efa1dc2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4337c1e3-0b78-44a3-ae30-2f30efa1dc2f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:56.043 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-TrunksSubportsExtRbacTest-125442856', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0b28fa435cc443bea550ee649cfdd0d5', 'project_name': 'tempest-TrunksSubportsExtRbacTest-125442856', 'tenant_id': '0b28fa435cc443bea550ee649cfdd0d5', 'tenant_name': 'tempest-TrunksSubportsExtRbacTest-125442856', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '08f401c6555e47eeaa0dd1ad2ae1c048'}, Network: None, Subnet: None, Router: None 2020-12-14 02:32:56.045 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-TrunksSubportsExtRbacTest-125442856', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0b28fa435cc443bea550ee649cfdd0d5', 'project_name': 'tempest-TrunksSubportsExtRbacTest-125442856', 'tenant_id': '0b28fa435cc443bea550ee649cfdd0d5', 'tenant_name': 'tempest-TrunksSubportsExtRbacTest-125442856', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '08f401c6555e47eeaa0dd1ad2ae1c048'}, Network: None, Subnet: None, Router: None 2020-12-14 02:32:56.224 189 INFO tempest.lib.common.rest_client [req-fa56c57a-bbdc-4088-b417-d139e14e380f ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.128s 2020-12-14 02:32:56.227 189 DEBUG tempest.lib.common.rest_client [req-fa56c57a-bbdc-4088-b417-d139e14e380f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa56c57a-bbdc-4088-b417-d139e14e380f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "08f401c6555e47eeaa0dd1ad2ae1c048", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "password_expires_at": null}, "audit_ids": ["9x5L2RoaTgOzCJLODcOJkg"], "expires_at": "2020-12-14T03:32:56.000000Z", "issued_at": "2020-12-14T02:32:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "tempest-TrunksSubportsExtRbacTest-125442856"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:56.231 189 WARNING tempest.manager [-] tempest.manager.Manager is not a stable interface and as such it should not be imported directly. It will be removed as soon as the client manager becomes available in tempest.lib. 2020-12-14 02:32:56.371 189 INFO tempest.lib.common.rest_client [req-d3b0e5ab-07c1-4d50-9f70-5d6a130a7e80 ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.119s 2020-12-14 02:32:56.375 189 DEBUG tempest.lib.common.rest_client [req-d3b0e5ab-07c1-4d50-9f70-5d6a130a7e80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3b0e5ab-07c1-4d50-9f70-5d6a130a7e80', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["1bC--wH3T1WQjsT9FX86ug"], "expires_at": "2020-12-14T03:32:56.000000Z", "issued_at": "2020-12-14T02:32:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:56.474 189 INFO tempest.lib.common.rest_client [req-e3a8caf6-47ac-4681-a310-255de79fec59 ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:32:56.476 189 DEBUG tempest.lib.common.rest_client [req-e3a8caf6-47ac-4681-a310-255de79fec59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3a8caf6-47ac-4681-a310-255de79fec59', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["YpuTC1ocSHaG48T49QEIxg"], "expires_at": "2020-12-14T03:32:56.000000Z", "issued_at": "2020-12-14T02:32:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:56.542 189 INFO tempest.lib.common.rest_client [req-0cadfb6b-2974-4713-adff-7bff9bbb3e75 ] Request (TrunksSubportsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.060s 2020-12-14 02:32:56.544 189 DEBUG tempest.lib.common.rest_client [req-0cadfb6b-2974-4713-adff-7bff9bbb3e75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0cadfb6b-2974-4713-adff-7bff9bbb3e75', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:56.614 189 INFO tempest.lib.common.rest_client [req-1c09a89f-8ec8-4de2-b9f6-9450b2e9bcbf ] Request (TrunksSubportsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:32:56.616 189 DEBUG tempest.lib.common.rest_client [req-1c09a89f-8ec8-4de2-b9f6-9450b2e9bcbf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c09a89f-8ec8-4de2-b9f6-9450b2e9bcbf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:56.619 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:32:56.621 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:32:56.676 189 INFO tempest.lib.common.rest_client [req-50514c43-a54d-498f-9396-157fe07355aa ] Request (TrunksSubportsExtRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles 0.052s 2020-12-14 02:32:56.678 189 DEBUG tempest.lib.common.rest_client [req-50514c43-a54d-498f-9396-157fe07355aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-50514c43-a54d-498f-9396-157fe07355aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:56.728 189 INFO tempest.lib.common.rest_client [req-091f5102-172b-4226-bc18-cd4428855257 ] Request (TrunksSubportsExtRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles/72a4576c553448cd941b052c1ca0cf2d 0.046s 2020-12-14 02:32:56.729 189 DEBUG tempest.lib.common.rest_client [req-091f5102-172b-4226-bc18-cd4428855257 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-091f5102-172b-4226-bc18-cd4428855257', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:56.822 189 INFO tempest.lib.common.rest_client [req-06e21c0c-383f-4275-88a0-25b8eba0c882 ] Request (TrunksSubportsExtRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles/a629c95d64b3416fb80ae90af4f69c05 0.089s 2020-12-14 02:32:56.823 189 DEBUG tempest.lib.common.rest_client [req-06e21c0c-383f-4275-88a0-25b8eba0c882 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06e21c0c-383f-4275-88a0-25b8eba0c882', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:57.932 189 INFO tempest.lib.common.rest_client [req-7525da84-feee-4ed4-9439-04e76265d3ef ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-14 02:32:57.936 189 DEBUG tempest.lib.common.rest_client [req-7525da84-feee-4ed4-9439-04e76265d3ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7525da84-feee-4ed4-9439-04e76265d3ef', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "08f401c6555e47eeaa0dd1ad2ae1c048", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "password_expires_at": null}, "audit_ids": ["NLpZUkRVQka0SyOAqSlTLA"], "expires_at": "2020-12-14T03:32:57.000000Z", "issued_at": "2020-12-14T02:32:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "tempest-TrunksSubportsExtRbacTest-125442856"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:57.992 189 INFO tempest.lib.common.rest_client [req-d464a706-f32e-43d2-8b16-a5e2e38fb549 ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:32:57.994 189 DEBUG tempest.lib.common.rest_client [req-d464a706-f32e-43d2-8b16-a5e2e38fb549 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:32:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d464a706-f32e-43d2-8b16-a5e2e38fb549', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "08f401c6555e47eeaa0dd1ad2ae1c048", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "password_expires_at": null}, "audit_ids": ["9nNYvoGCTuiT1cG1n57hFQ"], "expires_at": "2020-12-14T03:32:57.000000Z", "issued_at": "2020-12-14T02:32:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "tempest-TrunksSubportsExtRbacTest-125442856"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:58.720 189 INFO tempest.lib.common.rest_client [req-151991d4-71fd-4b3f-bb4b-822af931ca07 ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.715s 2020-12-14 02:32:58.722 189 DEBUG tempest.lib.common.rest_client [req-151991d4-71fd-4b3f-bb4b-822af931ca07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-TrunksSubportsExtRbacTest-test-network-2055085545"}} Response - Headers: {'content-type': 'application/json', 'content-length': '746', 'x-openstack-request-id': 'req-151991d4-71fd-4b3f-bb4b-822af931ca07', 'date': 'Mon, 14 Dec 2020 02:32:58 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"25022d06-cba6-4482-9834-2e690208543b","name":"tempest-TrunksSubportsExtRbacTest-test-network-2055085545","tenant_id":"0b28fa435cc443bea550ee649cfdd0d5","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"0b28fa435cc443bea550ee649cfdd0d5","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":59,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:32:58Z","updated_at":"2020-12-14T02:32:58Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:59.315 189 INFO tempest.lib.common.rest_client [req-a1150527-b00e-4d72-b9c7-31389f902781 ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/ports 0.586s 2020-12-14 02:32:59.319 189 DEBUG tempest.lib.common.rest_client [req-a1150527-b00e-4d72-b9c7-31389f902781 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "25022d06-cba6-4482-9834-2e690208543b", "name": "tempest-TrunksSubportsExtRbacTest-1209032868"}} Response - Headers: {'content-type': 'application/json', 'content-length': '907', 'x-openstack-request-id': 'req-a1150527-b00e-4d72-b9c7-31389f902781', 'date': 'Mon, 14 Dec 2020 02:32:59 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"aef0744d-1741-4603-8e4c-95c6555f522b","name":"tempest-TrunksSubportsExtRbacTest-1209032868","network_id":"25022d06-cba6-4482-9834-2e690208543b","tenant_id":"0b28fa435cc443bea550ee649cfdd0d5","mac_address":"fa:16:3e:fb:a7:07","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[],"project_id":"0b28fa435cc443bea550ee649cfdd0d5","port_security_enabled":true,"qos_policy_id":null,"security_groups":["abe525e8-a832-4406-b92e-0ac54cee35fd"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:32:59Z","updated_at":"2020-12-14T02:32:59Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:59.853 189 INFO tempest.lib.common.rest_client [req-d2f69fce-08ca-4568-b2a6-dc93e9c820f7 ] Request (TrunksSubportsExtRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/trunks 0.527s 2020-12-14 02:32:59.855 189 DEBUG tempest.lib.common.rest_client [req-d2f69fce-08ca-4568-b2a6-dc93e9c820f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"trunk": {"port_id": "aef0744d-1741-4603-8e4c-95c6555f522b", "sub_ports": []}} Response - Headers: {'content-type': 'application/json', 'content-length': '407', 'x-openstack-request-id': 'req-d2f69fce-08ca-4568-b2a6-dc93e9c820f7', 'date': 'Mon, 14 Dec 2020 02:32:59 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks'} Body: b'{"trunk": {"admin_state_up": true, "id": "33af7b4c-63f0-453f-83df-2ff462e3f83d", "project_id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "", "port_id": "aef0744d-1741-4603-8e4c-95c6555f522b", "status": "DOWN", "sub_ports": [], "revision_number": 0, "description": "", "created_at": "2020-12-14T02:32:59Z", "updated_at": "2020-12-14T02:32:59Z", "tenant_id": "0b28fa435cc443bea550ee649cfdd0d5", "tags": []}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:32:59.865 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:59.891 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_trunk, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:32:59.894 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:32:59.917 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: add_subports, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:33:00.320 189 INFO tempest.lib.common.rest_client [req-9bcfa638-3fb7-47e3-a358-238d65866615 ] Request (TrunksSubportsExtRbacTest:test_add_subports): 201 POST http://172.30.13.94:9696/v2.0/networks 0.397s 2020-12-14 02:33:00.323 189 DEBUG tempest.lib.common.rest_client [req-9bcfa638-3fb7-47e3-a358-238d65866615 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-TrunksSubportsExtRbacTest-test-network-599072244"}} Response - Headers: {'content-type': 'application/json', 'content-length': '745', 'x-openstack-request-id': 'req-9bcfa638-3fb7-47e3-a358-238d65866615', 'date': 'Mon, 14 Dec 2020 02:33:00 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"04312849-9030-4df0-a541-c7faedb565e1","name":"tempest-TrunksSubportsExtRbacTest-test-network-599072244","tenant_id":"0b28fa435cc443bea550ee649cfdd0d5","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"0b28fa435cc443bea550ee649cfdd0d5","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":61,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:33:00Z","updated_at":"2020-12-14T02:33:00Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:00.984 189 INFO tempest.lib.common.rest_client [req-acc1d383-560a-4cc6-aa62-dbfeeb0c31d0 ] Request (TrunksSubportsExtRbacTest:test_add_subports): 201 POST http://172.30.13.94:9696/v2.0/ports 0.654s 2020-12-14 02:33:00.988 189 DEBUG tempest.lib.common.rest_client [req-acc1d383-560a-4cc6-aa62-dbfeeb0c31d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "04312849-9030-4df0-a541-c7faedb565e1", "name": "tempest-TrunksSubportsExtRbacTest-637160983"}} Response - Headers: {'content-type': 'application/json', 'content-length': '906', 'x-openstack-request-id': 'req-acc1d383-560a-4cc6-aa62-dbfeeb0c31d0', 'date': 'Mon, 14 Dec 2020 02:33:00 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"611e7da6-fc52-4d16-8a25-97a67d306f8c","name":"tempest-TrunksSubportsExtRbacTest-637160983","network_id":"04312849-9030-4df0-a541-c7faedb565e1","tenant_id":"0b28fa435cc443bea550ee649cfdd0d5","mac_address":"fa:16:3e:54:10:ec","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[],"project_id":"0b28fa435cc443bea550ee649cfdd0d5","port_security_enabled":true,"qos_policy_id":null,"security_groups":["abe525e8-a832-4406-b92e-0ac54cee35fd"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:33:00Z","updated_at":"2020-12-14T02:33:00Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:00.991 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:01.099 189 INFO tempest.lib.common.rest_client [req-bcab4324-6456-4448-a187-6852538ef22a ] Request (TrunksSubportsExtRbacTest:test_add_subports): 200 GET http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles 0.100s 2020-12-14 02:33:01.102 189 DEBUG tempest.lib.common.rest_client [req-bcab4324-6456-4448-a187-6852538ef22a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bcab4324-6456-4448-a187-6852538ef22a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:01.156 189 INFO tempest.lib.common.rest_client [req-baed5212-135b-4e7b-9ce5-a56d8e4330e1 ] Request (TrunksSubportsExtRbacTest:test_add_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:33:01.161 189 DEBUG tempest.lib.common.rest_client [req-baed5212-135b-4e7b-9ce5-a56d8e4330e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-baed5212-135b-4e7b-9ce5-a56d8e4330e1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "08f401c6555e47eeaa0dd1ad2ae1c048", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "password_expires_at": null}, "audit_ids": ["cizOFxKqRfSF1j0B9B14QA"], "expires_at": "2020-12-14T03:33:01.000000Z", "issued_at": "2020-12-14T02:33:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "tempest-TrunksSubportsExtRbacTest-125442856"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:01.214 189 INFO tempest.lib.common.rest_client [req-d54ecf87-8a8f-4726-b6d3-5cb50376fee6 ] Request (TrunksSubportsExtRbacTest:test_add_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:33:01.218 189 DEBUG tempest.lib.common.rest_client [req-d54ecf87-8a8f-4726-b6d3-5cb50376fee6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d54ecf87-8a8f-4726-b6d3-5cb50376fee6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "08f401c6555e47eeaa0dd1ad2ae1c048", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "password_expires_at": null}, "audit_ids": ["alJ8dap8R_WNoD8XJhJVmw"], "expires_at": "2020-12-14T03:33:01.000000Z", "issued_at": "2020-12-14T02:33:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "tempest-TrunksSubportsExtRbacTest-125442856"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:01.735 189 INFO tempest.lib.common.rest_client [req-fbe20dd5-0e90-44d8-9d06-b25f67f7c10a ] Request (TrunksSubportsExtRbacTest:test_add_subports): 200 PUT http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d/add_subports 0.507s 2020-12-14 02:33:01.738 189 DEBUG tempest.lib.common.rest_client [req-fbe20dd5-0e90-44d8-9d06-b25f67f7c10a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"sub_ports": [{"port_id": "611e7da6-fc52-4d16-8a25-97a67d306f8c", "segmentation_type": "vlan", "segmentation_id": 4000}]} Response - Headers: {'content-type': 'application/json', 'content-length': '501', 'x-openstack-request-id': 'req-fbe20dd5-0e90-44d8-9d06-b25f67f7c10a', 'date': 'Mon, 14 Dec 2020 02:33:01 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d/add_subports'} Body: b'{"admin_state_up": true, "id": "33af7b4c-63f0-453f-83df-2ff462e3f83d", "project_id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "", "port_id": "aef0744d-1741-4603-8e4c-95c6555f522b", "status": "DOWN", "sub_ports": [{"port_id": "611e7da6-fc52-4d16-8a25-97a67d306f8c", "segmentation_type": "vlan", "segmentation_id": 4000}], "revision_number": 1, "description": "", "created_at": "2020-12-14T02:32:59Z", "updated_at": "2020-12-14T02:33:01Z", "tenant_id": "0b28fa435cc443bea550ee649cfdd0d5", "tags": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:01.741 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:01.815 189 INFO tempest.lib.common.rest_client [req-a9a7cfe5-ec14-4b93-b154-d66485ed01f4 ] Request (TrunksSubportsExtRbacTest:test_add_subports): 200 GET http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles 0.068s 2020-12-14 02:33:01.818 189 DEBUG tempest.lib.common.rest_client [req-a9a7cfe5-ec14-4b93-b154-d66485ed01f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9a7cfe5-ec14-4b93-b154-d66485ed01f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:01.883 189 INFO tempest.lib.common.rest_client [req-d716f2b9-30f8-4b89-ab27-d8c717378d96 ] Request (TrunksSubportsExtRbacTest:test_add_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.058s 2020-12-14 02:33:01.893 189 DEBUG tempest.lib.common.rest_client [req-d716f2b9-30f8-4b89-ab27-d8c717378d96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d716f2b9-30f8-4b89-ab27-d8c717378d96', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "08f401c6555e47eeaa0dd1ad2ae1c048", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "password_expires_at": null}, "audit_ids": ["xFdjddEHR8ecyM9btRCfwg"], "expires_at": "2020-12-14T03:33:01.000000Z", "issued_at": "2020-12-14T02:33:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "tempest-TrunksSubportsExtRbacTest-125442856"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:01.951 189 INFO tempest.lib.common.rest_client [req-17f8f21e-f176-443f-92dd-61ce492decdd ] Request (TrunksSubportsExtRbacTest:test_add_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:33:01.953 189 DEBUG tempest.lib.common.rest_client [req-17f8f21e-f176-443f-92dd-61ce492decdd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17f8f21e-f176-443f-92dd-61ce492decdd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "08f401c6555e47eeaa0dd1ad2ae1c048", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "password_expires_at": null}, "audit_ids": ["WCCgp-qhSZOQkMRtmkVMMA"], "expires_at": "2020-12-14T03:33:01.000000Z", "issued_at": "2020-12-14T02:33:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "tempest-TrunksSubportsExtRbacTest-125442856"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:02.102 189 INFO tempest.lib.common.rest_client [req-4495753a-8a6c-4e3d-a3a7-0517318fc920 ] Request (TrunksSubportsExtRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d/remove_subports 0.140s 2020-12-14 02:33:02.105 189 DEBUG tempest.lib.common.rest_client [req-4495753a-8a6c-4e3d-a3a7-0517318fc920 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"sub_ports": [{"port_id": "611e7da6-fc52-4d16-8a25-97a67d306f8c", "segmentation_type": "vlan", "segmentation_id": 4000}]} Response - Headers: {'content-type': 'application/json', 'content-length': '396', 'x-openstack-request-id': 'req-4495753a-8a6c-4e3d-a3a7-0517318fc920', 'date': 'Mon, 14 Dec 2020 02:33:02 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d/remove_subports'} Body: b'{"admin_state_up": true, "id": "33af7b4c-63f0-453f-83df-2ff462e3f83d", "project_id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "", "port_id": "aef0744d-1741-4603-8e4c-95c6555f522b", "status": "DOWN", "sub_ports": [], "revision_number": 2, "description": "", "created_at": "2020-12-14T02:32:59Z", "updated_at": "2020-12-14T02:33:02Z", "tenant_id": "0b28fa435cc443bea550ee649cfdd0d5", "tags": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:02.122 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:33:02.149 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_trunk, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:33:02.151 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:33:02.174 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_subports, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:33:02.650 189 INFO tempest.lib.common.rest_client [req-99b741e0-b5a1-434c-9760-2480669e979b ] Request (TrunksSubportsExtRbacTest:test_get_subports): 201 POST http://172.30.13.94:9696/v2.0/networks 0.470s 2020-12-14 02:33:02.654 189 DEBUG tempest.lib.common.rest_client [req-99b741e0-b5a1-434c-9760-2480669e979b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-TrunksSubportsExtRbacTest-test-network-734121534"}} Response - Headers: {'content-type': 'application/json', 'content-length': '745', 'x-openstack-request-id': 'req-99b741e0-b5a1-434c-9760-2480669e979b', 'date': 'Mon, 14 Dec 2020 02:33:02 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"ae09f105-8432-490d-8f4c-fb2fcc84adeb","name":"tempest-TrunksSubportsExtRbacTest-test-network-734121534","tenant_id":"0b28fa435cc443bea550ee649cfdd0d5","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"0b28fa435cc443bea550ee649cfdd0d5","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":65,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:33:02Z","updated_at":"2020-12-14T02:33:02Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:03.263 189 INFO tempest.lib.common.rest_client [req-86e335c0-7cc4-48a3-a493-62183e03b284 ] Request (TrunksSubportsExtRbacTest:test_get_subports): 201 POST http://172.30.13.94:9696/v2.0/ports 0.603s 2020-12-14 02:33:03.266 189 DEBUG tempest.lib.common.rest_client [req-86e335c0-7cc4-48a3-a493-62183e03b284 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "ae09f105-8432-490d-8f4c-fb2fcc84adeb", "name": "tempest-TrunksSubportsExtRbacTest-767050739"}} Response - Headers: {'content-type': 'application/json', 'content-length': '906', 'x-openstack-request-id': 'req-86e335c0-7cc4-48a3-a493-62183e03b284', 'date': 'Mon, 14 Dec 2020 02:33:03 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"fc802530-fd7b-4b23-b92d-f29bd8b91f3c","name":"tempest-TrunksSubportsExtRbacTest-767050739","network_id":"ae09f105-8432-490d-8f4c-fb2fcc84adeb","tenant_id":"0b28fa435cc443bea550ee649cfdd0d5","mac_address":"fa:16:3e:ff:04:a6","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[],"project_id":"0b28fa435cc443bea550ee649cfdd0d5","port_security_enabled":true,"qos_policy_id":null,"security_groups":["abe525e8-a832-4406-b92e-0ac54cee35fd"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:33:02Z","updated_at":"2020-12-14T02:33:02Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:03.699 189 INFO tempest.lib.common.rest_client [req-15d0fdfa-fe62-4b63-a883-ec82d40fd428 ] Request (TrunksSubportsExtRbacTest:test_get_subports): 200 PUT http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d/add_subports 0.426s 2020-12-14 02:33:03.704 189 DEBUG tempest.lib.common.rest_client [req-15d0fdfa-fe62-4b63-a883-ec82d40fd428 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"sub_ports": [{"port_id": "fc802530-fd7b-4b23-b92d-f29bd8b91f3c", "segmentation_type": "vlan", "segmentation_id": 4000}]} Response - Headers: {'content-type': 'application/json', 'content-length': '501', 'x-openstack-request-id': 'req-15d0fdfa-fe62-4b63-a883-ec82d40fd428', 'date': 'Mon, 14 Dec 2020 02:33:03 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d/add_subports'} Body: b'{"admin_state_up": true, "id": "33af7b4c-63f0-453f-83df-2ff462e3f83d", "project_id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "", "port_id": "aef0744d-1741-4603-8e4c-95c6555f522b", "status": "DOWN", "sub_ports": [{"port_id": "fc802530-fd7b-4b23-b92d-f29bd8b91f3c", "segmentation_type": "vlan", "segmentation_id": 4000}], "revision_number": 3, "description": "", "created_at": "2020-12-14T02:32:59Z", "updated_at": "2020-12-14T02:33:03Z", "tenant_id": "0b28fa435cc443bea550ee649cfdd0d5", "tags": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:03.707 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:03.778 189 INFO tempest.lib.common.rest_client [req-981dfaf2-ae44-45fc-8102-bf0d3200a9b9 ] Request (TrunksSubportsExtRbacTest:test_get_subports): 200 GET http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles 0.063s 2020-12-14 02:33:03.782 189 DEBUG tempest.lib.common.rest_client [req-981dfaf2-ae44-45fc-8102-bf0d3200a9b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-981dfaf2-ae44-45fc-8102-bf0d3200a9b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:03.839 189 INFO tempest.lib.common.rest_client [req-0cb775b2-c5e4-4f5b-bb30-3e51f373826d ] Request (TrunksSubportsExtRbacTest:test_get_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:33:03.842 189 DEBUG tempest.lib.common.rest_client [req-0cb775b2-c5e4-4f5b-bb30-3e51f373826d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0cb775b2-c5e4-4f5b-bb30-3e51f373826d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "08f401c6555e47eeaa0dd1ad2ae1c048", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "password_expires_at": null}, "audit_ids": ["igH2SpF3SU6xFmy2wLGKMg"], "expires_at": "2020-12-14T03:33:03.000000Z", "issued_at": "2020-12-14T02:33:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "tempest-TrunksSubportsExtRbacTest-125442856"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:03.898 189 INFO tempest.lib.common.rest_client [req-1ac85d98-4b73-4b02-b39c-76bce55852b9 ] Request (TrunksSubportsExtRbacTest:test_get_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:33:03.902 189 DEBUG tempest.lib.common.rest_client [req-1ac85d98-4b73-4b02-b39c-76bce55852b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ac85d98-4b73-4b02-b39c-76bce55852b9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "08f401c6555e47eeaa0dd1ad2ae1c048", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "password_expires_at": null}, "audit_ids": ["CFSSG_aPSmmKtW2Y_VzjKg"], "expires_at": "2020-12-14T03:33:03.000000Z", "issued_at": "2020-12-14T02:33:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "tempest-TrunksSubportsExtRbacTest-125442856"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:04.045 189 INFO tempest.lib.common.rest_client [req-705a7b50-ecdc-43bc-b3de-afdc4d3b2e6f ] Request (TrunksSubportsExtRbacTest:test_get_subports): 200 GET http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d/get_subports 0.134s 2020-12-14 02:33:04.049 189 DEBUG tempest.lib.common.rest_client [req-705a7b50-ecdc-43bc-b3de-afdc4d3b2e6f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '122', 'x-openstack-request-id': 'req-705a7b50-ecdc-43bc-b3de-afdc4d3b2e6f', 'date': 'Mon, 14 Dec 2020 02:33:04 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d/get_subports'} Body: b'{"sub_ports": [{"port_id": "fc802530-fd7b-4b23-b92d-f29bd8b91f3c", "segmentation_type": "vlan", "segmentation_id": 4000}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:04.052 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:04.130 189 INFO tempest.lib.common.rest_client [req-fc9f86a9-dcca-4946-9180-faf5a5faac36 ] Request (TrunksSubportsExtRbacTest:test_get_subports): 200 GET http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles 0.071s 2020-12-14 02:33:04.133 189 DEBUG tempest.lib.common.rest_client [req-fc9f86a9-dcca-4946-9180-faf5a5faac36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc9f86a9-dcca-4946-9180-faf5a5faac36', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:04.190 189 INFO tempest.lib.common.rest_client [req-1d3c810f-3751-46cb-b5e6-a8e93d0c2b51 ] Request (TrunksSubportsExtRbacTest:test_get_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:33:04.194 189 DEBUG tempest.lib.common.rest_client [req-1d3c810f-3751-46cb-b5e6-a8e93d0c2b51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d3c810f-3751-46cb-b5e6-a8e93d0c2b51', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "08f401c6555e47eeaa0dd1ad2ae1c048", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "password_expires_at": null}, "audit_ids": ["iXrso2TiRBykMNDeCT0K8g"], "expires_at": "2020-12-14T03:33:04.000000Z", "issued_at": "2020-12-14T02:33:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "tempest-TrunksSubportsExtRbacTest-125442856"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:04.243 189 INFO tempest.lib.common.rest_client [req-e29754b6-17c7-4097-8199-1b31a3ddcc55 ] Request (TrunksSubportsExtRbacTest:test_get_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:33:04.245 189 DEBUG tempest.lib.common.rest_client [req-e29754b6-17c7-4097-8199-1b31a3ddcc55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e29754b6-17c7-4097-8199-1b31a3ddcc55', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "08f401c6555e47eeaa0dd1ad2ae1c048", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "password_expires_at": null}, "audit_ids": ["n3t7CoDyQQq0QFf9K85L2w"], "expires_at": "2020-12-14T03:33:04.000000Z", "issued_at": "2020-12-14T02:33:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "tempest-TrunksSubportsExtRbacTest-125442856"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:04.389 189 INFO tempest.lib.common.rest_client [req-5e7ec433-6f33-4f68-8b5c-3123273a16fc ] Request (TrunksSubportsExtRbacTest:_run_cleanups): 200 PUT http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d/remove_subports 0.133s 2020-12-14 02:33:04.391 189 DEBUG tempest.lib.common.rest_client [req-5e7ec433-6f33-4f68-8b5c-3123273a16fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"sub_ports": [{"port_id": "fc802530-fd7b-4b23-b92d-f29bd8b91f3c", "segmentation_type": "vlan", "segmentation_id": 4000}]} Response - Headers: {'content-type': 'application/json', 'content-length': '396', 'x-openstack-request-id': 'req-5e7ec433-6f33-4f68-8b5c-3123273a16fc', 'date': 'Mon, 14 Dec 2020 02:33:04 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d/remove_subports'} Body: b'{"admin_state_up": true, "id": "33af7b4c-63f0-453f-83df-2ff462e3f83d", "project_id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "", "port_id": "aef0744d-1741-4603-8e4c-95c6555f522b", "status": "DOWN", "sub_ports": [], "revision_number": 4, "description": "", "created_at": "2020-12-14T02:32:59Z", "updated_at": "2020-12-14T02:33:04Z", "tenant_id": "0b28fa435cc443bea550ee649cfdd0d5", "tags": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:04.409 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:33:04.442 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_trunk, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:33:04.444 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:33:04.469 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: remove_subports, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:33:04.902 189 INFO tempest.lib.common.rest_client [req-25a16417-9cfc-4c02-9347-3a40677ab51e ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 201 POST http://172.30.13.94:9696/v2.0/networks 0.427s 2020-12-14 02:33:04.905 189 DEBUG tempest.lib.common.rest_client [req-25a16417-9cfc-4c02-9347-3a40677ab51e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-TrunksSubportsExtRbacTest-test-network-1205551901"}} Response - Headers: {'content-type': 'application/json', 'content-length': '746', 'x-openstack-request-id': 'req-25a16417-9cfc-4c02-9347-3a40677ab51e', 'date': 'Mon, 14 Dec 2020 02:33:04 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"5ffa6e05-fd3b-4674-bbd6-167a7effce6d","name":"tempest-TrunksSubportsExtRbacTest-test-network-1205551901","tenant_id":"0b28fa435cc443bea550ee649cfdd0d5","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"0b28fa435cc443bea550ee649cfdd0d5","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":68,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-14T02:33:04Z","updated_at":"2020-12-14T02:33:04Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:05.520 189 INFO tempest.lib.common.rest_client [req-97a59092-a1ca-4776-90da-217b22d82df0 ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 201 POST http://172.30.13.94:9696/v2.0/ports 0.608s 2020-12-14 02:33:05.523 189 DEBUG tempest.lib.common.rest_client [req-97a59092-a1ca-4776-90da-217b22d82df0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"port": {"network_id": "5ffa6e05-fd3b-4674-bbd6-167a7effce6d", "name": "tempest-TrunksSubportsExtRbacTest-519949111"}} Response - Headers: {'content-type': 'application/json', 'content-length': '906', 'x-openstack-request-id': 'req-97a59092-a1ca-4776-90da-217b22d82df0', 'date': 'Mon, 14 Dec 2020 02:33:05 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/ports'} Body: b'{"port":{"id":"9aad7304-7014-4563-a8be-0218c5be40ba","name":"tempest-TrunksSubportsExtRbacTest-519949111","network_id":"5ffa6e05-fd3b-4674-bbd6-167a7effce6d","tenant_id":"0b28fa435cc443bea550ee649cfdd0d5","mac_address":"fa:16:3e:19:8d:39","admin_state_up":true,"status":"DOWN","device_id":"","device_owner":"","fixed_ips":[],"project_id":"0b28fa435cc443bea550ee649cfdd0d5","port_security_enabled":true,"qos_policy_id":null,"security_groups":["abe525e8-a832-4406-b92e-0ac54cee35fd"],"binding:vnic_type":"normal","binding:profile":{},"binding:host_id":"","binding:vif_type":"unbound","binding:vif_details":{},"allowed_address_pairs":[],"extra_dhcp_opts":[],"description":"","qos_network_policy_id":null,"dns_name":"","dns_assignment":[],"dns_domain":"","resource_request":null,"ip_allocation":"immediate","tags":[],"created_at":"2020-12-14T02:33:05Z","updated_at":"2020-12-14T02:33:05Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:05.844 189 INFO tempest.lib.common.rest_client [req-d6046c2e-43d7-4f49-b707-645dcd9adadc ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 200 PUT http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d/add_subports 0.313s 2020-12-14 02:33:05.848 189 DEBUG tempest.lib.common.rest_client [req-d6046c2e-43d7-4f49-b707-645dcd9adadc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"sub_ports": [{"port_id": "9aad7304-7014-4563-a8be-0218c5be40ba", "segmentation_type": "vlan", "segmentation_id": 4000}]} Response - Headers: {'content-type': 'application/json', 'content-length': '501', 'x-openstack-request-id': 'req-d6046c2e-43d7-4f49-b707-645dcd9adadc', 'date': 'Mon, 14 Dec 2020 02:33:05 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d/add_subports'} Body: b'{"admin_state_up": true, "id": "33af7b4c-63f0-453f-83df-2ff462e3f83d", "project_id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "", "port_id": "aef0744d-1741-4603-8e4c-95c6555f522b", "status": "DOWN", "sub_ports": [{"port_id": "9aad7304-7014-4563-a8be-0218c5be40ba", "segmentation_type": "vlan", "segmentation_id": 4000}], "revision_number": 5, "description": "", "created_at": "2020-12-14T02:32:59Z", "updated_at": "2020-12-14T02:33:05Z", "tenant_id": "0b28fa435cc443bea550ee649cfdd0d5", "tags": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:05.851 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:05.930 189 INFO tempest.lib.common.rest_client [req-af2486ef-93a7-4511-80f6-2b7b1c608d72 ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 200 GET http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles 0.072s 2020-12-14 02:33:05.934 189 DEBUG tempest.lib.common.rest_client [req-af2486ef-93a7-4511-80f6-2b7b1c608d72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af2486ef-93a7-4511-80f6-2b7b1c608d72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:05.991 189 INFO tempest.lib.common.rest_client [req-d6bb0ffa-70f3-4e8b-b0d9-c8acf5780cf1 ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:33:05.995 189 DEBUG tempest.lib.common.rest_client [req-d6bb0ffa-70f3-4e8b-b0d9-c8acf5780cf1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6bb0ffa-70f3-4e8b-b0d9-c8acf5780cf1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "08f401c6555e47eeaa0dd1ad2ae1c048", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "password_expires_at": null}, "audit_ids": ["wbe_bcrtSia0Llo6Kch-yw"], "expires_at": "2020-12-14T03:33:05.000000Z", "issued_at": "2020-12-14T02:33:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "tempest-TrunksSubportsExtRbacTest-125442856"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:06.047 189 INFO tempest.lib.common.rest_client [req-1309c763-9021-4c82-8a15-1aef2366c14b ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:33:06.050 189 DEBUG tempest.lib.common.rest_client [req-1309c763-9021-4c82-8a15-1aef2366c14b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1309c763-9021-4c82-8a15-1aef2366c14b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "08f401c6555e47eeaa0dd1ad2ae1c048", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "password_expires_at": null}, "audit_ids": ["lKsXEASGSoa5GP4NuO2_6A"], "expires_at": "2020-12-14T03:33:06.000000Z", "issued_at": "2020-12-14T02:33:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "tempest-TrunksSubportsExtRbacTest-125442856"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:06.197 189 INFO tempest.lib.common.rest_client [req-fd1cc39e-a1ed-477b-8cb4-fd9e5b51fd92 ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 200 PUT http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d/remove_subports 0.140s 2020-12-14 02:33:06.201 189 DEBUG tempest.lib.common.rest_client [req-fd1cc39e-a1ed-477b-8cb4-fd9e5b51fd92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"sub_ports": [{"port_id": "9aad7304-7014-4563-a8be-0218c5be40ba", "segmentation_type": "vlan", "segmentation_id": 4000}]} Response - Headers: {'content-type': 'application/json', 'content-length': '396', 'x-openstack-request-id': 'req-fd1cc39e-a1ed-477b-8cb4-fd9e5b51fd92', 'date': 'Mon, 14 Dec 2020 02:33:06 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d/remove_subports'} Body: b'{"admin_state_up": true, "id": "33af7b4c-63f0-453f-83df-2ff462e3f83d", "project_id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "", "port_id": "aef0744d-1741-4603-8e4c-95c6555f522b", "status": "DOWN", "sub_ports": [], "revision_number": 6, "description": "", "created_at": "2020-12-14T02:32:59Z", "updated_at": "2020-12-14T02:33:06Z", "tenant_id": "0b28fa435cc443bea550ee649cfdd0d5", "tags": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:06.204 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:06.261 189 INFO tempest.lib.common.rest_client [req-f77ba543-4af7-4d5b-92b2-71265b5b9d38 ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 200 GET http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles 0.051s 2020-12-14 02:33:06.263 189 DEBUG tempest.lib.common.rest_client [req-f77ba543-4af7-4d5b-92b2-71265b5b9d38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f77ba543-4af7-4d5b-92b2-71265b5b9d38', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5/users/08f401c6555e47eeaa0dd1ad2ae1c048/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:06.317 189 INFO tempest.lib.common.rest_client [req-ac878a49-3626-4a18-97bb-3d5f0d39b532 ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:33:06.320 189 DEBUG tempest.lib.common.rest_client [req-ac878a49-3626-4a18-97bb-3d5f0d39b532 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac878a49-3626-4a18-97bb-3d5f0d39b532', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "08f401c6555e47eeaa0dd1ad2ae1c048", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "password_expires_at": null}, "audit_ids": ["1LEl0HHzRzqPgF30C1tVLw"], "expires_at": "2020-12-14T03:33:06.000000Z", "issued_at": "2020-12-14T02:33:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "tempest-TrunksSubportsExtRbacTest-125442856"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:06.373 189 INFO tempest.lib.common.rest_client [req-cec3550b-8d09-47e7-bc06-bf9c7dfa3900 ] Request (TrunksSubportsExtRbacTest:test_remove_subports): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:33:06.375 189 DEBUG tempest.lib.common.rest_client [req-cec3550b-8d09-47e7-bc06-bf9c7dfa3900 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cec3550b-8d09-47e7-bc06-bf9c7dfa3900', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "08f401c6555e47eeaa0dd1ad2ae1c048", "name": "tempest-TrunksSubportsExtRbacTest-125442856", "password_expires_at": null}, "audit_ids": ["zzrUZK5mQQeXkdLe5FVADg"], "expires_at": "2020-12-14T03:33:06.000000Z", "issued_at": "2020-12-14T02:33:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0b28fa435cc443bea550ee649cfdd0d5", "name": "tempest-TrunksSubportsExtRbacTest-125442856"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0b28fa435cc443bea550ee649cfdd0d5", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:06.512 189 INFO tempest.lib.common.rest_client [req-22582c1c-6923-49a2-b824-d767a04c61e8 ] Request (TrunksSubportsExtRbacTest:_run_cleanups): 404 PUT http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d/remove_subports 0.130s 2020-12-14 02:33:06.515 189 DEBUG tempest.lib.common.rest_client [req-22582c1c-6923-49a2-b824-d767a04c61e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"sub_ports": [{"port_id": "9aad7304-7014-4563-a8be-0218c5be40ba", "segmentation_type": "vlan", "segmentation_id": 4000}]} Response - Headers: {'content-type': 'application/json', 'content-length': '201', 'x-openstack-request-id': 'req-22582c1c-6923-49a2-b824-d767a04c61e8', 'date': 'Mon, 14 Dec 2020 02:33:06 GMT', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d/remove_subports'} Body: b'{"NeutronError": {"type": "SubPortNotFound", "message": "SubPort on trunk 33af7b4c-63f0-453f-83df-2ff462e3f83d with parent port 9aad7304-7014-4563-a8be-0218c5be40ba could not be found.", "detail": ""}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:07.052 189 INFO tempest.lib.common.rest_client [req-1429b331-5438-432f-96f7-f12bd38f1c18 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/9aad7304-7014-4563-a8be-0218c5be40ba 0.518s 2020-12-14 02:33:07.055 189 DEBUG tempest.lib.common.rest_client [req-1429b331-5438-432f-96f7-f12bd38f1c18 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-1429b331-5438-432f-96f7-f12bd38f1c18', 'date': 'Mon, 14 Dec 2020 02:33:07 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/9aad7304-7014-4563-a8be-0218c5be40ba'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:07.772 189 INFO tempest.lib.common.rest_client [req-559f81f1-be16-45f2-b850-f3594718a594 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/5ffa6e05-fd3b-4674-bbd6-167a7effce6d 0.709s 2020-12-14 02:33:07.774 189 DEBUG tempest.lib.common.rest_client [req-559f81f1-be16-45f2-b850-f3594718a594 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-559f81f1-be16-45f2-b850-f3594718a594', 'date': 'Mon, 14 Dec 2020 02:33:07 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/5ffa6e05-fd3b-4674-bbd6-167a7effce6d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:08.235 189 INFO tempest.lib.common.rest_client [req-6e81ea2a-7f96-42eb-bf61-a67bb3a1a4c4 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/fc802530-fd7b-4b23-b92d-f29bd8b91f3c 0.455s 2020-12-14 02:33:08.238 189 DEBUG tempest.lib.common.rest_client [req-6e81ea2a-7f96-42eb-bf61-a67bb3a1a4c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-6e81ea2a-7f96-42eb-bf61-a67bb3a1a4c4', 'date': 'Mon, 14 Dec 2020 02:33:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/fc802530-fd7b-4b23-b92d-f29bd8b91f3c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:08.861 189 INFO tempest.lib.common.rest_client [req-52d8e510-50ec-4d3f-8e24-36b97975d3ea ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/ae09f105-8432-490d-8f4c-fb2fcc84adeb 0.617s 2020-12-14 02:33:08.864 189 DEBUG tempest.lib.common.rest_client [req-52d8e510-50ec-4d3f-8e24-36b97975d3ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-52d8e510-50ec-4d3f-8e24-36b97975d3ea', 'date': 'Mon, 14 Dec 2020 02:33:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/ae09f105-8432-490d-8f4c-fb2fcc84adeb'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:09.368 189 INFO tempest.lib.common.rest_client [req-47c78cbe-fa70-473b-bff8-7b4151460912 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/611e7da6-fc52-4d16-8a25-97a67d306f8c 0.499s 2020-12-14 02:33:09.370 189 DEBUG tempest.lib.common.rest_client [req-47c78cbe-fa70-473b-bff8-7b4151460912 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-47c78cbe-fa70-473b-bff8-7b4151460912', 'date': 'Mon, 14 Dec 2020 02:33:09 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/611e7da6-fc52-4d16-8a25-97a67d306f8c'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:10.026 189 INFO tempest.lib.common.rest_client [req-d5775f75-80ee-49f5-aec2-5ec91f6e6e53 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/04312849-9030-4df0-a541-c7faedb565e1 0.649s 2020-12-14 02:33:10.029 189 DEBUG tempest.lib.common.rest_client [req-d5775f75-80ee-49f5-aec2-5ec91f6e6e53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-d5775f75-80ee-49f5-aec2-5ec91f6e6e53', 'date': 'Mon, 14 Dec 2020 02:33:10 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/04312849-9030-4df0-a541-c7faedb565e1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:10.154 189 INFO tempest.lib.common.rest_client [req-c38da4d2-cbb4-4509-8417-ffe29aa7231b ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d 0.118s 2020-12-14 02:33:10.156 189 DEBUG tempest.lib.common.rest_client [req-c38da4d2-cbb4-4509-8417-ffe29aa7231b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c38da4d2-cbb4-4509-8417-ffe29aa7231b', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:33:10 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/trunks/33af7b4c-63f0-453f-83df-2ff462e3f83d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:10.630 189 INFO tempest.lib.common.rest_client [req-8ebc002f-896a-483c-a213-5b10f1d4e049 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/ports/aef0744d-1741-4603-8e4c-95c6555f522b 0.467s 2020-12-14 02:33:10.633 189 DEBUG tempest.lib.common.rest_client [req-8ebc002f-896a-483c-a213-5b10f1d4e049 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-8ebc002f-896a-483c-a213-5b10f1d4e049', 'date': 'Mon, 14 Dec 2020 02:33:10 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/ports/aef0744d-1741-4603-8e4c-95c6555f522b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:11.328 189 INFO tempest.lib.common.rest_client [req-afcc4b4e-14a9-43fe-8ddc-d38efbfdbbd4 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/networks/25022d06-cba6-4482-9834-2e690208543b 0.688s 2020-12-14 02:33:11.331 189 DEBUG tempest.lib.common.rest_client [req-afcc4b4e-14a9-43fe-8ddc-d38efbfdbbd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-length': '0', 'x-openstack-request-id': 'req-afcc4b4e-14a9-43fe-8ddc-d38efbfdbbd4', 'date': 'Mon, 14 Dec 2020 02:33:11 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/networks/25022d06-cba6-4482-9834-2e690208543b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:11.496 189 INFO tempest.lib.common.rest_client [req-f21df470-1f68-466c-9f29-039d5bb0fb40 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/08f401c6555e47eeaa0dd1ad2ae1c048 0.156s 2020-12-14 02:33:11.499 189 DEBUG tempest.lib.common.rest_client [req-f21df470-1f68-466c-9f29-039d5bb0fb40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f21df470-1f68-466c-9f29-039d5bb0fb40', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/08f401c6555e47eeaa0dd1ad2ae1c048'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:11.708 189 INFO tempest.lib.common.rest_client [req-ad763b7f-65b8-46ce-b022-72b57ef0049b ] Request (TrunksSubportsExtRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.203s 2020-12-14 02:33:11.711 189 DEBUG tempest.lib.common.rest_client [req-ad763b7f-65b8-46ce-b022-72b57ef0049b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad763b7f-65b8-46ce-b022-72b57ef0049b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["xCgPngZRQXOMwreUfsb8lw"], "expires_at": "2020-12-14T03:33:11.000000Z", "issued_at": "2020-12-14T02:33:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:11.945 189 INFO tempest.lib.common.rest_client [req-e00ddd0d-3da8-4e2b-9fcd-e85262c16229 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0b28fa435cc443bea550ee649cfdd0d5&name=default 0.228s 2020-12-14 02:33:11.948 189 DEBUG tempest.lib.common.rest_client [req-e00ddd0d-3da8-4e2b-9fcd-e85262c16229 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-e00ddd0d-3da8-4e2b-9fcd-e85262c16229', 'date': 'Mon, 14 Dec 2020 02:33:11 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0b28fa435cc443bea550ee649cfdd0d5&name=default'} Body: b'{"security_groups": [{"id": "abe525e8-a832-4406-b92e-0ac54cee35fd", "name": "default", "stateful": true, "tenant_id": "0b28fa435cc443bea550ee649cfdd0d5", "description": "Default security group", "security_group_rules": [{"id": "178a3b3f-f0b3-40e0-954d-3db0ed83150f", "tenant_id": "0b28fa435cc443bea550ee649cfdd0d5", "security_group_id": "abe525e8-a832-4406-b92e-0ac54cee35fd", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:32:58Z", "updated_at": "2020-12-14T02:32:58Z", "revision_number": 0, "project_id": "0b28fa435cc443bea550ee649cfdd0d5"}, {"id": "65d2b38a-61da-47f7-95ba-3afba002cbd1", "tenant_id": "0b28fa435cc443bea550ee649cfdd0d5", "security_group_id": "abe525e8-a832-4406-b92e-0ac54cee35fd", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:32:58Z", "updated_at": "2020-12-14T02:32:58Z", "revision_number": 0, "project_id": "0b28fa435cc443bea550ee649cfdd0d5"}, {"id": "c3da1a7a-c0c3-4089-b7ee-b32c0820a266", "tenant_id": "0b28fa435cc443bea550ee649cfdd0d5", "security_group_id": "abe525e8-a832-4406-b92e-0ac54cee35fd", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "abe525e8-a832-4406-b92e-0ac54cee35fd", "description": null, "tags": [], "created_at": "2020-12-14T02:32:58Z", "updated_at": "2020-12-14T02:32:58Z", "revision_number": 0, "project_id": "0b28fa435cc443bea550ee649cfdd0d5"}, {"id": "caae20bb-9edf-4e40-87b7-acdf33b43b6d", "tenant_id": "0b28fa435cc443bea550ee649cfdd0d5", "security_group_id": "abe525e8-a832-4406-b92e-0ac54cee35fd", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "abe525e8-a832-4406-b92e-0ac54cee35fd", "description": null, "tags": [], "created_at": "2020-12-14T02:32:58Z", "updated_at": "2020-12-14T02:32:58Z", "revision_number": 0, "project_id": "0b28fa435cc443bea550ee649cfdd0d5"}], "tags": [], "created_at": "2020-12-14T02:32:58Z", "updated_at": "2020-12-14T02:32:58Z", "revision_number": 1, "project_id": "0b28fa435cc443bea550ee649cfdd0d5"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:12.085 189 INFO tempest.lib.common.rest_client [req-9eea3490-1f29-4d6e-af72-e4b68d890668 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/abe525e8-a832-4406-b92e-0ac54cee35fd 0.127s 2020-12-14 02:33:12.087 189 DEBUG tempest.lib.common.rest_client [req-9eea3490-1f29-4d6e-af72-e4b68d890668 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-9eea3490-1f29-4d6e-af72-e4b68d890668', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:33:12 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/abe525e8-a832-4406-b92e-0ac54cee35fd'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:12.243 189 INFO tempest.lib.common.rest_client [req-cd752421-e0fc-4039-9bcc-02f1441a1232 ] Request (TrunksSubportsExtRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5 0.148s 2020-12-14 02:33:12.246 189 DEBUG tempest.lib.common.rest_client [req-cd752421-e0fc-4039-9bcc-02f1441a1232 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd752421-e0fc-4039-9bcc-02f1441a1232', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0b28fa435cc443bea550ee649cfdd0d5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:12.380 189 INFO tempest.lib.common.rest_client [req-b70f4fe2-f373-4923-ae4a-7b78b032478c ] Request (EncryptionTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.113s 2020-12-14 02:33:12.382 189 DEBUG tempest.lib.common.rest_client [req-b70f4fe2-f373-4923-ae4a-7b78b032478c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b70f4fe2-f373-4923-ae4a-7b78b032478c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["rS2urIiOSCKeQ89U0bBeww"], "expires_at": "2020-12-14T03:33:12.000000Z", "issued_at": "2020-12-14T02:33:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:12.482 189 INFO tempest.lib.common.rest_client [req-0dfc1583-e443-4429-b98f-aaeeba634ae0 ] Request (EncryptionTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:33:12.484 189 DEBUG tempest.lib.common.rest_client [req-0dfc1583-e443-4429-b98f-aaeeba634ae0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0dfc1583-e443-4429-b98f-aaeeba634ae0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["qLgfT9vuToyh9xi7f9HTMg"], "expires_at": "2020-12-14T03:33:12.000000Z", "issued_at": "2020-12-14T02:33:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:12.563 189 INFO tempest.lib.common.rest_client [req-142e1a1a-21ec-4b17-b088-2257229dd7bb ] Request (EncryptionTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.072s 2020-12-14 02:33:12.565 189 DEBUG tempest.lib.common.rest_client [req-142e1a1a-21ec-4b17-b088-2257229dd7bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-142e1a1a-21ec-4b17-b088-2257229dd7bb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:12.653 189 INFO tempest.lib.common.rest_client [req-4b0283f3-1e98-4ca0-8a99-83d6707c3f4f ] Request (EncryptionTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.080s 2020-12-14 02:33:12.655 189 DEBUG tempest.lib.common.rest_client [req-4b0283f3-1e98-4ca0-8a99-83d6707c3f4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-EncryptionTypesV3RbacTest-2013424954-desc", "domain_id": "default", "name": "tempest-EncryptionTypesV3RbacTest-2013424954"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b0283f3-1e98-4ca0-8a99-83d6707c3f4f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "cd43aef3d7374817ae816cc72c5dc961", "name": "tempest-EncryptionTypesV3RbacTest-2013424954", "domain_id": "default", "description": "tempest-EncryptionTypesV3RbacTest-2013424954-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:12.812 189 INFO tempest.lib.common.rest_client [req-f21bd594-b304-422e-83de-a69a5a9ae70e ] Request (EncryptionTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.149s 2020-12-14 02:33:12.815 189 DEBUG tempest.lib.common.rest_client [req-f21bd594-b304-422e-83de-a69a5a9ae70e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-EncryptionTypesV3RbacTest-2013424954", "password": "C2!~N54H_B1w+u7", "project_id": "cd43aef3d7374817ae816cc72c5dc961", "email": "tempest-EncryptionTypesV3RbacTest-753578359@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '405', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f21bd594-b304-422e-83de-a69a5a9ae70e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "cd43aef3d7374817ae816cc72c5dc961", "email": "tempest-EncryptionTypesV3RbacTest-753578359@example.com", "id": "644a8e8d9ff3457f897ead73f37b50a9", "name": "tempest-EncryptionTypesV3RbacTest-2013424954", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/644a8e8d9ff3457f897ead73f37b50a9"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:12.890 189 INFO tempest.lib.common.rest_client [req-68b0ce2d-631e-4c97-be70-b1c8bab24c7a ] Request (EncryptionTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:33:12.892 189 DEBUG tempest.lib.common.rest_client [req-68b0ce2d-631e-4c97-be70-b1c8bab24c7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68b0ce2d-631e-4c97-be70-b1c8bab24c7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:12.971 189 INFO tempest.lib.common.rest_client [req-c655cde1-0f3e-4952-9782-6d8d2e23451a ] Request (EncryptionTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.070s 2020-12-14 02:33:12.974 189 DEBUG tempest.lib.common.rest_client [req-c655cde1-0f3e-4952-9782-6d8d2e23451a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c655cde1-0f3e-4952-9782-6d8d2e23451a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:13.070 189 INFO tempest.lib.common.rest_client [req-2aa0f5b6-b1a2-4b91-8a39-33cca5b94a24 ] Request (EncryptionTypesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles/72a4576c553448cd941b052c1ca0cf2d 0.087s 2020-12-14 02:33:13.072 189 DEBUG tempest.lib.common.rest_client [req-2aa0f5b6-b1a2-4b91-8a39-33cca5b94a24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2aa0f5b6-b1a2-4b91-8a39-33cca5b94a24', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:13.075 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-EncryptionTypesV3RbacTest-2013424954', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'cd43aef3d7374817ae816cc72c5dc961', 'project_name': 'tempest-EncryptionTypesV3RbacTest-2013424954', 'tenant_id': 'cd43aef3d7374817ae816cc72c5dc961', 'tenant_name': 'tempest-EncryptionTypesV3RbacTest-2013424954', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '644a8e8d9ff3457f897ead73f37b50a9'}, Network: None, Subnet: None, Router: None 2020-12-14 02:33:13.077 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-EncryptionTypesV3RbacTest-2013424954', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'cd43aef3d7374817ae816cc72c5dc961', 'project_name': 'tempest-EncryptionTypesV3RbacTest-2013424954', 'tenant_id': 'cd43aef3d7374817ae816cc72c5dc961', 'tenant_name': 'tempest-EncryptionTypesV3RbacTest-2013424954', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '644a8e8d9ff3457f897ead73f37b50a9'}, Network: None, Subnet: None, Router: None 2020-12-14 02:33:13.261 189 INFO tempest.lib.common.rest_client [req-ac21ea84-63f0-4055-99d6-c16949bc055c ] Request (EncryptionTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.116s 2020-12-14 02:33:13.263 189 DEBUG tempest.lib.common.rest_client [req-ac21ea84-63f0-4055-99d6-c16949bc055c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac21ea84-63f0-4055-99d6-c16949bc055c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "644a8e8d9ff3457f897ead73f37b50a9", "name": "tempest-EncryptionTypesV3RbacTest-2013424954", "password_expires_at": null}, "audit_ids": ["rpGPynbgQtSAzr6MnUay1A"], "expires_at": "2020-12-14T03:33:13.000000Z", "issued_at": "2020-12-14T02:33:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cd43aef3d7374817ae816cc72c5dc961", "name": "tempest-EncryptionTypesV3RbacTest-2013424954"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:13.397 189 INFO tempest.lib.common.rest_client [req-80e11404-dc4b-46ec-afac-6d6d7d3ec02e ] Request (EncryptionTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.122s 2020-12-14 02:33:13.401 189 DEBUG tempest.lib.common.rest_client [req-80e11404-dc4b-46ec-afac-6d6d7d3ec02e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-80e11404-dc4b-46ec-afac-6d6d7d3ec02e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["WpnwUfKeQo6G6R-WeWiOZw"], "expires_at": "2020-12-14T03:33:13.000000Z", "issued_at": "2020-12-14T02:33:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:13.534 189 INFO tempest.lib.common.rest_client [req-5dbf887a-2489-4863-8129-12d14a35fd5c ] Request (EncryptionTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:33:13.537 189 DEBUG tempest.lib.common.rest_client [req-5dbf887a-2489-4863-8129-12d14a35fd5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5dbf887a-2489-4863-8129-12d14a35fd5c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["6FJPGArhQXe8JJUXCztlsA"], "expires_at": "2020-12-14T03:33:13.000000Z", "issued_at": "2020-12-14T02:33:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:13.601 189 INFO tempest.lib.common.rest_client [req-7df53cd5-341c-4394-a6f0-e1f0b0e6ac02 ] Request (EncryptionTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.057s 2020-12-14 02:33:13.604 189 DEBUG tempest.lib.common.rest_client [req-7df53cd5-341c-4394-a6f0-e1f0b0e6ac02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7df53cd5-341c-4394-a6f0-e1f0b0e6ac02', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:13.667 189 INFO tempest.lib.common.rest_client [req-55f711d8-f374-4715-a275-f3784847b287 ] Request (EncryptionTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-14 02:33:13.669 189 DEBUG tempest.lib.common.rest_client [req-55f711d8-f374-4715-a275-f3784847b287 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55f711d8-f374-4715-a275-f3784847b287', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:13.673 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:33:13.676 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:13.746 189 INFO tempest.lib.common.rest_client [req-5597b2fd-9770-442c-b431-fc08472e9785 ] Request (EncryptionTypesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles 0.062s 2020-12-14 02:33:13.749 189 DEBUG tempest.lib.common.rest_client [req-5597b2fd-9770-442c-b431-fc08472e9785 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5597b2fd-9770-442c-b431-fc08472e9785', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:13.821 189 INFO tempest.lib.common.rest_client [req-e32311c0-3cb1-4c64-a3d7-89890fe079cb ] Request (EncryptionTypesV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-12-14 02:33:13.823 189 DEBUG tempest.lib.common.rest_client [req-e32311c0-3cb1-4c64-a3d7-89890fe079cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e32311c0-3cb1-4c64-a3d7-89890fe079cb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:13.938 189 INFO tempest.lib.common.rest_client [req-f0e3d85d-55d7-4d65-8ae2-3026ee6e1feb ] Request (EncryptionTypesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-12-14 02:33:13.941 189 DEBUG tempest.lib.common.rest_client [req-f0e3d85d-55d7-4d65-8ae2-3026ee6e1feb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0e3d85d-55d7-4d65-8ae2-3026ee6e1feb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:15.057 189 INFO tempest.lib.common.rest_client [req-d32fded3-2967-4fd5-b7bb-a1d0f06a7e82 ] Request (EncryptionTypesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-14 02:33:15.060 189 DEBUG tempest.lib.common.rest_client [req-d32fded3-2967-4fd5-b7bb-a1d0f06a7e82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d32fded3-2967-4fd5-b7bb-a1d0f06a7e82', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "644a8e8d9ff3457f897ead73f37b50a9", "name": "tempest-EncryptionTypesV3RbacTest-2013424954", "password_expires_at": null}, "audit_ids": ["-snVpX27Svuta2ISlaamOQ"], "expires_at": "2020-12-14T03:33:14.000000Z", "issued_at": "2020-12-14T02:33:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cd43aef3d7374817ae816cc72c5dc961", "name": "tempest-EncryptionTypesV3RbacTest-2013424954"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:15.072 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:33:15.264 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_type_encryption:create, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:33:15.488 189 INFO tempest.lib.common.rest_client [req-bc9e16a8-1ba9-4ad4-99ef-3c6864931753 ] Request (EncryptionTypesV3RbacTest:test_create_volume_type_encryption): 200 POST http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types 0.218s 2020-12-14 02:33:15.491 189 DEBUG tempest.lib.common.rest_client [req-bc9e16a8-1ba9-4ad4-99ef-3c6864931753 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-EncryptionTypesV3RbacTest-volume-type-414186365"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bc9e16a8-1ba9-4ad4-99ef-3c6864931753', 'content-length': '230', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bc9e16a8-1ba9-4ad4-99ef-3c6864931753', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types'} Body: b'{"volume_type": {"id": "d42dd44c-d124-41f4-bb64-06346752710b", "name": "tempest-EncryptionTypesV3RbacTest-volume-type-414186365", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:15.515 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:15.647 189 INFO tempest.lib.common.rest_client [req-3baa55d5-05fd-4398-ba0b-d61d334cddce ] Request (EncryptionTypesV3RbacTest:test_create_volume_type_encryption): 200 GET http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles 0.126s 2020-12-14 02:33:15.650 189 DEBUG tempest.lib.common.rest_client [req-3baa55d5-05fd-4398-ba0b-d61d334cddce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3baa55d5-05fd-4398-ba0b-d61d334cddce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:15.708 189 INFO tempest.lib.common.rest_client [req-3ae6a6a3-f863-4946-b3bf-2de583da9b2c ] Request (EncryptionTypesV3RbacTest:test_create_volume_type_encryption): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:33:15.713 189 DEBUG tempest.lib.common.rest_client [req-3ae6a6a3-f863-4946-b3bf-2de583da9b2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ae6a6a3-f863-4946-b3bf-2de583da9b2c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "644a8e8d9ff3457f897ead73f37b50a9", "name": "tempest-EncryptionTypesV3RbacTest-2013424954", "password_expires_at": null}, "audit_ids": ["JzGftoSNQSGA_EYxs6u6Pw"], "expires_at": "2020-12-14T03:33:15.000000Z", "issued_at": "2020-12-14T02:33:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cd43aef3d7374817ae816cc72c5dc961", "name": "tempest-EncryptionTypesV3RbacTest-2013424954"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:15.847 189 INFO tempest.lib.common.rest_client [req-3116b808-4bce-4e10-9b58-f2e198ac2f3f ] Request (EncryptionTypesV3RbacTest:test_create_volume_type_encryption): 200 POST http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/d42dd44c-d124-41f4-bb64-06346752710b/encryption 0.127s 2020-12-14 02:33:15.850 189 DEBUG tempest.lib.common.rest_client [req-3116b808-4bce-4e10-9b58-f2e198ac2f3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3116b808-4bce-4e10-9b58-f2e198ac2f3f', 'content-length': '221', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3116b808-4bce-4e10-9b58-f2e198ac2f3f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/d42dd44c-d124-41f4-bb64-06346752710b/encryption'} Body: b'{"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end", "volume_type_id": "d42dd44c-d124-41f4-bb64-06346752710b", "encryption_id": "938f0580-d596-4708-8e61-47725ac16fa0"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:15.872 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:15.938 189 INFO tempest.lib.common.rest_client [req-b9250385-bb61-4a93-ba88-a917c4cbc425 ] Request (EncryptionTypesV3RbacTest:test_create_volume_type_encryption): 200 GET http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles 0.060s 2020-12-14 02:33:15.941 189 DEBUG tempest.lib.common.rest_client [req-b9250385-bb61-4a93-ba88-a917c4cbc425 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9250385-bb61-4a93-ba88-a917c4cbc425', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:15.995 189 INFO tempest.lib.common.rest_client [req-bbf14ced-0f33-4510-8cb5-67a384e43da1 ] Request (EncryptionTypesV3RbacTest:test_create_volume_type_encryption): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:33:15.999 189 DEBUG tempest.lib.common.rest_client [req-bbf14ced-0f33-4510-8cb5-67a384e43da1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bbf14ced-0f33-4510-8cb5-67a384e43da1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "644a8e8d9ff3457f897ead73f37b50a9", "name": "tempest-EncryptionTypesV3RbacTest-2013424954", "password_expires_at": null}, "audit_ids": ["WhydOBz6SJqOgPa5MeyQmA"], "expires_at": "2020-12-14T03:33:15.000000Z", "issued_at": "2020-12-14T02:33:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cd43aef3d7374817ae816cc72c5dc961", "name": "tempest-EncryptionTypesV3RbacTest-2013424954"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:16.013 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:33:16.031 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_type_encryption:delete, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:33:16.163 189 INFO tempest.lib.common.rest_client [req-313f798e-2235-4faa-a800-b5a69beb6194 ] Request (EncryptionTypesV3RbacTest:test_delete_volume_type_encryption): 200 POST http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types 0.126s 2020-12-14 02:33:16.166 189 DEBUG tempest.lib.common.rest_client [req-313f798e-2235-4faa-a800-b5a69beb6194 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-EncryptionTypesV3RbacTest-volume-type-1238774002"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-313f798e-2235-4faa-a800-b5a69beb6194', 'content-length': '231', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-313f798e-2235-4faa-a800-b5a69beb6194', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types'} Body: b'{"volume_type": {"id": "8ff7c2d9-c666-4622-b24f-8ccf2c9d988f", "name": "tempest-EncryptionTypesV3RbacTest-volume-type-1238774002", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:16.272 189 INFO tempest.lib.common.rest_client [req-f39f17f9-00f9-4ed7-aa68-b18eefc0999b ] Request (EncryptionTypesV3RbacTest:test_delete_volume_type_encryption): 200 POST http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/8ff7c2d9-c666-4622-b24f-8ccf2c9d988f/encryption 0.077s 2020-12-14 02:33:16.275 189 DEBUG tempest.lib.common.rest_client [req-f39f17f9-00f9-4ed7-aa68-b18eefc0999b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f39f17f9-00f9-4ed7-aa68-b18eefc0999b', 'content-length': '221', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f39f17f9-00f9-4ed7-aa68-b18eefc0999b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/8ff7c2d9-c666-4622-b24f-8ccf2c9d988f/encryption'} Body: b'{"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end", "volume_type_id": "8ff7c2d9-c666-4622-b24f-8ccf2c9d988f", "encryption_id": "dde9fe07-cae5-4140-abab-71a13578a248"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:16.297 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:16.375 189 INFO tempest.lib.common.rest_client [req-139777f8-9efb-47c3-bb90-d2f50d3651d6 ] Request (EncryptionTypesV3RbacTest:test_delete_volume_type_encryption): 200 GET http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles 0.071s 2020-12-14 02:33:16.377 189 DEBUG tempest.lib.common.rest_client [req-139777f8-9efb-47c3-bb90-d2f50d3651d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-139777f8-9efb-47c3-bb90-d2f50d3651d6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:16.429 189 INFO tempest.lib.common.rest_client [req-2d68131a-36c0-43ab-ae16-9aace571d39d ] Request (EncryptionTypesV3RbacTest:test_delete_volume_type_encryption): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:33:16.433 189 DEBUG tempest.lib.common.rest_client [req-2d68131a-36c0-43ab-ae16-9aace571d39d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2d68131a-36c0-43ab-ae16-9aace571d39d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "644a8e8d9ff3457f897ead73f37b50a9", "name": "tempest-EncryptionTypesV3RbacTest-2013424954", "password_expires_at": null}, "audit_ids": ["IpXWJXrMSAGWymDBkMF8jQ"], "expires_at": "2020-12-14T03:33:16.000000Z", "issued_at": "2020-12-14T02:33:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cd43aef3d7374817ae816cc72c5dc961", "name": "tempest-EncryptionTypesV3RbacTest-2013424954"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:16.560 189 INFO tempest.lib.common.rest_client [req-5d88daf2-ca74-4d47-9246-15c41cf20e2b ] Request (EncryptionTypesV3RbacTest:test_delete_volume_type_encryption): 202 DELETE http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/8ff7c2d9-c666-4622-b24f-8ccf2c9d988f/encryption/provider 0.119s 2020-12-14 02:33:16.564 189 DEBUG tempest.lib.common.rest_client [req-5d88daf2-ca74-4d47-9246-15c41cf20e2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5d88daf2-ca74-4d47-9246-15c41cf20e2b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/8ff7c2d9-c666-4622-b24f-8ccf2c9d988f/encryption/provider'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:16.567 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:16.637 189 INFO tempest.lib.common.rest_client [req-1392b53c-449c-4c38-bbf0-b9f29154f1b7 ] Request (EncryptionTypesV3RbacTest:test_delete_volume_type_encryption): 200 GET http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles 0.063s 2020-12-14 02:33:16.640 189 DEBUG tempest.lib.common.rest_client [req-1392b53c-449c-4c38-bbf0-b9f29154f1b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1392b53c-449c-4c38-bbf0-b9f29154f1b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:16.690 189 INFO tempest.lib.common.rest_client [req-4db6b9ff-3203-4ab4-a2a5-2b5e52277674 ] Request (EncryptionTypesV3RbacTest:test_delete_volume_type_encryption): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:33:16.694 189 DEBUG tempest.lib.common.rest_client [req-4db6b9ff-3203-4ab4-a2a5-2b5e52277674 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4db6b9ff-3203-4ab4-a2a5-2b5e52277674', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "644a8e8d9ff3457f897ead73f37b50a9", "name": "tempest-EncryptionTypesV3RbacTest-2013424954", "password_expires_at": null}, "audit_ids": ["6JebMJn3TqClFQL173Qxww"], "expires_at": "2020-12-14T03:33:16.000000Z", "issued_at": "2020-12-14T02:33:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cd43aef3d7374817ae816cc72c5dc961", "name": "tempest-EncryptionTypesV3RbacTest-2013424954"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:16.708 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:33:16.727 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_type_encryption:get, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:33:16.833 189 INFO tempest.lib.common.rest_client [req-ef471226-9f77-48a1-bb98-3b8fb0960a46 ] Request (EncryptionTypesV3RbacTest:test_show_encryption_specs_item): 200 POST http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types 0.101s 2020-12-14 02:33:16.836 189 DEBUG tempest.lib.common.rest_client [req-ef471226-9f77-48a1-bb98-3b8fb0960a46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-EncryptionTypesV3RbacTest-volume-type-923890317"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ef471226-9f77-48a1-bb98-3b8fb0960a46', 'content-length': '230', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ef471226-9f77-48a1-bb98-3b8fb0960a46', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types'} Body: b'{"volume_type": {"id": "746a009a-9041-4082-9408-f2078e63a177", "name": "tempest-EncryptionTypesV3RbacTest-volume-type-923890317", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:16.925 189 INFO tempest.lib.common.rest_client [req-cd4e30d1-5b2b-4c0e-b8aa-4d9a83adbc3f ] Request (EncryptionTypesV3RbacTest:test_show_encryption_specs_item): 200 POST http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/746a009a-9041-4082-9408-f2078e63a177/encryption 0.061s 2020-12-14 02:33:16.928 189 DEBUG tempest.lib.common.rest_client [req-cd4e30d1-5b2b-4c0e-b8aa-4d9a83adbc3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-cd4e30d1-5b2b-4c0e-b8aa-4d9a83adbc3f', 'content-length': '221', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-cd4e30d1-5b2b-4c0e-b8aa-4d9a83adbc3f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/746a009a-9041-4082-9408-f2078e63a177/encryption'} Body: b'{"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end", "volume_type_id": "746a009a-9041-4082-9408-f2078e63a177", "encryption_id": "80d8da67-121c-4a42-8626-0571705559f1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:16.952 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:17.017 189 INFO tempest.lib.common.rest_client [req-4d7cfa79-9030-4093-bd27-c60f8585b748 ] Request (EncryptionTypesV3RbacTest:test_show_encryption_specs_item): 200 GET http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles 0.059s 2020-12-14 02:33:17.020 189 DEBUG tempest.lib.common.rest_client [req-4d7cfa79-9030-4093-bd27-c60f8585b748 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d7cfa79-9030-4093-bd27-c60f8585b748', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:17.073 189 INFO tempest.lib.common.rest_client [req-e36fce17-aac2-4c5a-abff-a58f9b6c3f9d ] Request (EncryptionTypesV3RbacTest:test_show_encryption_specs_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:33:17.077 189 DEBUG tempest.lib.common.rest_client [req-e36fce17-aac2-4c5a-abff-a58f9b6c3f9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e36fce17-aac2-4c5a-abff-a58f9b6c3f9d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "644a8e8d9ff3457f897ead73f37b50a9", "name": "tempest-EncryptionTypesV3RbacTest-2013424954", "password_expires_at": null}, "audit_ids": ["9h-9RqZmTym7xld1m8CfWg"], "expires_at": "2020-12-14T03:33:17.000000Z", "issued_at": "2020-12-14T02:33:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cd43aef3d7374817ae816cc72c5dc961", "name": "tempest-EncryptionTypesV3RbacTest-2013424954"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:17.185 189 INFO tempest.lib.common.rest_client [req-03591f6b-1525-4237-8d4a-208d18c145e5 ] Request (EncryptionTypesV3RbacTest:test_show_encryption_specs_item): 200 GET http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/746a009a-9041-4082-9408-f2078e63a177/encryption/provider 0.101s 2020-12-14 02:33:17.188 189 DEBUG tempest.lib.common.rest_client [req-03591f6b-1525-4237-8d4a-208d18c145e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-03591f6b-1525-4237-8d4a-208d18c145e5', 'content-length': '57', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-03591f6b-1525-4237-8d4a-208d18c145e5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/746a009a-9041-4082-9408-f2078e63a177/encryption/provider'} Body: b'{"provider": "nova.volume.encryptors.luks.LuksEncryptor"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:17.200 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:17.266 189 INFO tempest.lib.common.rest_client [req-5e400683-07ae-4e29-9493-3256c7e03337 ] Request (EncryptionTypesV3RbacTest:test_show_encryption_specs_item): 200 GET http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles 0.059s 2020-12-14 02:33:17.269 189 DEBUG tempest.lib.common.rest_client [req-5e400683-07ae-4e29-9493-3256c7e03337 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e400683-07ae-4e29-9493-3256c7e03337', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:17.322 189 INFO tempest.lib.common.rest_client [req-2ebe8e5b-b1cf-448d-b9ac-ea2d8e0e9084 ] Request (EncryptionTypesV3RbacTest:test_show_encryption_specs_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:33:17.325 189 DEBUG tempest.lib.common.rest_client [req-2ebe8e5b-b1cf-448d-b9ac-ea2d8e0e9084 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ebe8e5b-b1cf-448d-b9ac-ea2d8e0e9084', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "644a8e8d9ff3457f897ead73f37b50a9", "name": "tempest-EncryptionTypesV3RbacTest-2013424954", "password_expires_at": null}, "audit_ids": ["wiNtyKSEQr62JOnkcp9INw"], "expires_at": "2020-12-14T03:33:17.000000Z", "issued_at": "2020-12-14T02:33:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cd43aef3d7374817ae816cc72c5dc961", "name": "tempest-EncryptionTypesV3RbacTest-2013424954"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:17.338 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:33:17.359 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_type_encryption:get, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:33:17.500 189 INFO tempest.lib.common.rest_client [req-e114c1e8-aef7-4cea-ab57-bddebfb93ce3 ] Request (EncryptionTypesV3RbacTest:test_show_volume_type_encryption): 200 POST http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types 0.135s 2020-12-14 02:33:17.505 189 DEBUG tempest.lib.common.rest_client [req-e114c1e8-aef7-4cea-ab57-bddebfb93ce3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-EncryptionTypesV3RbacTest-volume-type-1519296417"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e114c1e8-aef7-4cea-ab57-bddebfb93ce3', 'content-length': '231', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e114c1e8-aef7-4cea-ab57-bddebfb93ce3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types'} Body: b'{"volume_type": {"id": "8ebd8aa9-6109-4fa4-9c0d-5ebc3d8edcc2", "name": "tempest-EncryptionTypesV3RbacTest-volume-type-1519296417", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:17.595 189 INFO tempest.lib.common.rest_client [req-a7bef94b-ccf4-4b66-8ab6-6d4e54ddb0f4 ] Request (EncryptionTypesV3RbacTest:test_show_volume_type_encryption): 200 POST http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/8ebd8aa9-6109-4fa4-9c0d-5ebc3d8edcc2/encryption 0.064s 2020-12-14 02:33:17.598 189 DEBUG tempest.lib.common.rest_client [req-a7bef94b-ccf4-4b66-8ab6-6d4e54ddb0f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a7bef94b-ccf4-4b66-8ab6-6d4e54ddb0f4', 'content-length': '221', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a7bef94b-ccf4-4b66-8ab6-6d4e54ddb0f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/8ebd8aa9-6109-4fa4-9c0d-5ebc3d8edcc2/encryption'} Body: b'{"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end", "volume_type_id": "8ebd8aa9-6109-4fa4-9c0d-5ebc3d8edcc2", "encryption_id": "d2959ba9-3eab-409a-a882-3b4c49a6b603"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:17.620 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:17.688 189 INFO tempest.lib.common.rest_client [req-d6ce94a1-946a-47f2-8c6c-01e771b14a32 ] Request (EncryptionTypesV3RbacTest:test_show_volume_type_encryption): 200 GET http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles 0.061s 2020-12-14 02:33:17.692 189 DEBUG tempest.lib.common.rest_client [req-d6ce94a1-946a-47f2-8c6c-01e771b14a32 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6ce94a1-946a-47f2-8c6c-01e771b14a32', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:17.741 189 INFO tempest.lib.common.rest_client [req-b98b203b-8325-401f-aafc-57d93ab0db11 ] Request (EncryptionTypesV3RbacTest:test_show_volume_type_encryption): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:33:17.745 189 DEBUG tempest.lib.common.rest_client [req-b98b203b-8325-401f-aafc-57d93ab0db11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b98b203b-8325-401f-aafc-57d93ab0db11', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "644a8e8d9ff3457f897ead73f37b50a9", "name": "tempest-EncryptionTypesV3RbacTest-2013424954", "password_expires_at": null}, "audit_ids": ["kDNG8Pe_To6Ccy5fX68_9A"], "expires_at": "2020-12-14T03:33:17.000000Z", "issued_at": "2020-12-14T02:33:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cd43aef3d7374817ae816cc72c5dc961", "name": "tempest-EncryptionTypesV3RbacTest-2013424954"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:17.848 189 INFO tempest.lib.common.rest_client [req-87e16ff5-97d7-4edf-b9f1-b4c8d02b7c9b ] Request (EncryptionTypesV3RbacTest:test_show_volume_type_encryption): 200 GET http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/8ebd8aa9-6109-4fa4-9c0d-5ebc3d8edcc2/encryption 0.095s 2020-12-14 02:33:17.851 189 DEBUG tempest.lib.common.rest_client [req-87e16ff5-97d7-4edf-b9f1-b4c8d02b7c9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-87e16ff5-97d7-4edf-b9f1-b4c8d02b7c9b', 'content-length': '341', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-87e16ff5-97d7-4edf-b9f1-b4c8d02b7c9b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/8ebd8aa9-6109-4fa4-9c0d-5ebc3d8edcc2/encryption'} Body: b'{"created_at": "2020-12-14T02:33:18.000000", "updated_at": null, "deleted_at": null, "deleted": false, "encryption_id": "d2959ba9-3eab-409a-a882-3b4c49a6b603", "cipher": null, "key_size": null, "provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end", "volume_type_id": "8ebd8aa9-6109-4fa4-9c0d-5ebc3d8edcc2"}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:17.877 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:17.942 189 INFO tempest.lib.common.rest_client [req-21d59bf6-98ab-4394-a8f6-cffca01a3667 ] Request (EncryptionTypesV3RbacTest:test_show_volume_type_encryption): 200 GET http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles 0.059s 2020-12-14 02:33:17.945 189 DEBUG tempest.lib.common.rest_client [req-21d59bf6-98ab-4394-a8f6-cffca01a3667 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21d59bf6-98ab-4394-a8f6-cffca01a3667', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:18.055 189 INFO tempest.lib.common.rest_client [req-736a0a73-cf3e-43d5-a9b9-3323d5e2075c ] Request (EncryptionTypesV3RbacTest:test_show_volume_type_encryption): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-14 02:33:18.060 189 DEBUG tempest.lib.common.rest_client [req-736a0a73-cf3e-43d5-a9b9-3323d5e2075c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-736a0a73-cf3e-43d5-a9b9-3323d5e2075c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "644a8e8d9ff3457f897ead73f37b50a9", "name": "tempest-EncryptionTypesV3RbacTest-2013424954", "password_expires_at": null}, "audit_ids": ["OVYtYm9YTWyEo3UPUOxRVA"], "expires_at": "2020-12-14T03:33:18.000000Z", "issued_at": "2020-12-14T02:33:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cd43aef3d7374817ae816cc72c5dc961", "name": "tempest-EncryptionTypesV3RbacTest-2013424954"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:18.074 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:33:18.093 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_type_encryption:update, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:33:18.201 189 INFO tempest.lib.common.rest_client [req-868ebb52-e90e-430b-8c14-135ece1a7db9 ] Request (EncryptionTypesV3RbacTest:test_update_volume_type_encryption): 200 POST http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types 0.102s 2020-12-14 02:33:18.205 189 DEBUG tempest.lib.common.rest_client [req-868ebb52-e90e-430b-8c14-135ece1a7db9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-EncryptionTypesV3RbacTest-volume-type-61553161"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-868ebb52-e90e-430b-8c14-135ece1a7db9', 'content-length': '229', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-868ebb52-e90e-430b-8c14-135ece1a7db9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types'} Body: b'{"volume_type": {"id": "818fa97c-cb53-4718-a04a-ff134bcafb9f", "name": "tempest-EncryptionTypesV3RbacTest-volume-type-61553161", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:18.307 189 INFO tempest.lib.common.rest_client [req-d8b09e4d-9666-4fa5-856d-4df41433b82c ] Request (EncryptionTypesV3RbacTest:test_update_volume_type_encryption): 200 POST http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/818fa97c-cb53-4718-a04a-ff134bcafb9f/encryption 0.074s 2020-12-14 02:33:18.311 189 DEBUG tempest.lib.common.rest_client [req-d8b09e4d-9666-4fa5-856d-4df41433b82c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d8b09e4d-9666-4fa5-856d-4df41433b82c', 'content-length': '221', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d8b09e4d-9666-4fa5-856d-4df41433b82c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/818fa97c-cb53-4718-a04a-ff134bcafb9f/encryption'} Body: b'{"encryption": {"provider": "nova.volume.encryptors.luks.LuksEncryptor", "control_location": "front-end", "volume_type_id": "818fa97c-cb53-4718-a04a-ff134bcafb9f", "encryption_id": "18b4b8e6-d092-4f6e-9486-fa4139aee24e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:18.332 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:18.407 189 INFO tempest.lib.common.rest_client [req-41865b85-c029-4f98-a2cb-7c0d630097d2 ] Request (EncryptionTypesV3RbacTest:test_update_volume_type_encryption): 200 GET http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles 0.068s 2020-12-14 02:33:18.411 189 DEBUG tempest.lib.common.rest_client [req-41865b85-c029-4f98-a2cb-7c0d630097d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41865b85-c029-4f98-a2cb-7c0d630097d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:18.464 189 INFO tempest.lib.common.rest_client [req-f827b0b1-c824-42e4-8168-3eeb3791aa33 ] Request (EncryptionTypesV3RbacTest:test_update_volume_type_encryption): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:33:18.469 189 DEBUG tempest.lib.common.rest_client [req-f827b0b1-c824-42e4-8168-3eeb3791aa33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f827b0b1-c824-42e4-8168-3eeb3791aa33', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "644a8e8d9ff3457f897ead73f37b50a9", "name": "tempest-EncryptionTypesV3RbacTest-2013424954", "password_expires_at": null}, "audit_ids": ["9oXTxYD6RFyzWGKPIAYx6g"], "expires_at": "2020-12-14T03:33:18.000000Z", "issued_at": "2020-12-14T02:33:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cd43aef3d7374817ae816cc72c5dc961", "name": "tempest-EncryptionTypesV3RbacTest-2013424954"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:18.597 189 INFO tempest.lib.common.rest_client [req-8dcd9112-1f42-4705-9e3a-8ca17389805e ] Request (EncryptionTypesV3RbacTest:test_update_volume_type_encryption): 200 PUT http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/818fa97c-cb53-4718-a04a-ff134bcafb9f/encryption/provider 0.120s 2020-12-14 02:33:18.600 189 DEBUG tempest.lib.common.rest_client [req-8dcd9112-1f42-4705-9e3a-8ca17389805e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"encryption": {"control_location": "front-end"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8dcd9112-1f42-4705-9e3a-8ca17389805e', 'content-length': '49', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8dcd9112-1f42-4705-9e3a-8ca17389805e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/818fa97c-cb53-4718-a04a-ff134bcafb9f/encryption/provider'} Body: b'{"encryption": {"control_location": "front-end"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:18.622 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:18.688 189 INFO tempest.lib.common.rest_client [req-d0bf3699-75a3-420b-a786-b3a4dce4b598 ] Request (EncryptionTypesV3RbacTest:test_update_volume_type_encryption): 200 GET http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles 0.060s 2020-12-14 02:33:18.691 189 DEBUG tempest.lib.common.rest_client [req-d0bf3699-75a3-420b-a786-b3a4dce4b598 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0bf3699-75a3-420b-a786-b3a4dce4b598', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961/users/644a8e8d9ff3457f897ead73f37b50a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:18.749 189 INFO tempest.lib.common.rest_client [req-94c1e742-9b2d-4101-a96d-af46c874e6a5 ] Request (EncryptionTypesV3RbacTest:test_update_volume_type_encryption): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:33:18.753 189 DEBUG tempest.lib.common.rest_client [req-94c1e742-9b2d-4101-a96d-af46c874e6a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94c1e742-9b2d-4101-a96d-af46c874e6a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "644a8e8d9ff3457f897ead73f37b50a9", "name": "tempest-EncryptionTypesV3RbacTest-2013424954", "password_expires_at": null}, "audit_ids": ["x9xjvn3mTbm82epJGnojQA"], "expires_at": "2020-12-14T03:33:18.000000Z", "issued_at": "2020-12-14T02:33:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "cd43aef3d7374817ae816cc72c5dc961", "name": "tempest-EncryptionTypesV3RbacTest-2013424954"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_cd43aef3d7374817ae816cc72c5dc961", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:18.905 189 INFO tempest.lib.common.rest_client [req-d88ac7dc-a8f7-4c38-b462-8c6b4a8f0d3b ] Request (EncryptionTypesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/818fa97c-cb53-4718-a04a-ff134bcafb9f 0.137s 2020-12-14 02:33:18.908 189 DEBUG tempest.lib.common.rest_client [req-d88ac7dc-a8f7-4c38-b462-8c6b4a8f0d3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d88ac7dc-a8f7-4c38-b462-8c6b4a8f0d3b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/818fa97c-cb53-4718-a04a-ff134bcafb9f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:18.946 189 INFO tempest.lib.common.rest_client [req-aafe5277-4b03-4c75-9ec8-c7e8f96ed658 ] Request (EncryptionTypesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/818fa97c-cb53-4718-a04a-ff134bcafb9f 0.032s 2020-12-14 02:33:18.947 189 DEBUG tempest.lib.common.rest_client [req-aafe5277-4b03-4c75-9ec8-c7e8f96ed658 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-aafe5277-4b03-4c75-9ec8-c7e8f96ed658', 'x-openstack-request-id': 'req-aafe5277-4b03-4c75-9ec8-c7e8f96ed658', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/818fa97c-cb53-4718-a04a-ff134bcafb9f'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 818fa97c-cb53-4718-a04a-ff134bcafb9f could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:19.036 189 INFO tempest.lib.common.rest_client [req-30609cda-eab9-49ff-b352-871bc756715b ] Request (EncryptionTypesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/8ebd8aa9-6109-4fa4-9c0d-5ebc3d8edcc2 0.082s 2020-12-14 02:33:19.039 189 DEBUG tempest.lib.common.rest_client [req-30609cda-eab9-49ff-b352-871bc756715b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-30609cda-eab9-49ff-b352-871bc756715b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/8ebd8aa9-6109-4fa4-9c0d-5ebc3d8edcc2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:19.075 189 INFO tempest.lib.common.rest_client [req-0f021ce2-e394-4205-98c1-5f2bf9b7e805 ] Request (EncryptionTypesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/8ebd8aa9-6109-4fa4-9c0d-5ebc3d8edcc2 0.031s 2020-12-14 02:33:19.078 189 DEBUG tempest.lib.common.rest_client [req-0f021ce2-e394-4205-98c1-5f2bf9b7e805 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-0f021ce2-e394-4205-98c1-5f2bf9b7e805', 'x-openstack-request-id': 'req-0f021ce2-e394-4205-98c1-5f2bf9b7e805', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/8ebd8aa9-6109-4fa4-9c0d-5ebc3d8edcc2'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 8ebd8aa9-6109-4fa4-9c0d-5ebc3d8edcc2 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:19.162 189 INFO tempest.lib.common.rest_client [req-56a2e33b-4825-4d38-b27b-26ee2dee61d4 ] Request (EncryptionTypesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/746a009a-9041-4082-9408-f2078e63a177 0.078s 2020-12-14 02:33:19.165 189 DEBUG tempest.lib.common.rest_client [req-56a2e33b-4825-4d38-b27b-26ee2dee61d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-56a2e33b-4825-4d38-b27b-26ee2dee61d4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/746a009a-9041-4082-9408-f2078e63a177'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:19.201 189 INFO tempest.lib.common.rest_client [req-840a7a18-aa82-49d8-ac43-63523201a488 ] Request (EncryptionTypesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/746a009a-9041-4082-9408-f2078e63a177 0.031s 2020-12-14 02:33:19.203 189 DEBUG tempest.lib.common.rest_client [req-840a7a18-aa82-49d8-ac43-63523201a488 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-840a7a18-aa82-49d8-ac43-63523201a488', 'x-openstack-request-id': 'req-840a7a18-aa82-49d8-ac43-63523201a488', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/746a009a-9041-4082-9408-f2078e63a177'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 746a009a-9041-4082-9408-f2078e63a177 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:19.297 189 INFO tempest.lib.common.rest_client [req-f2f5faae-ef6b-499d-a838-0ab71cb3986c ] Request (EncryptionTypesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/8ff7c2d9-c666-4622-b24f-8ccf2c9d988f 0.088s 2020-12-14 02:33:19.299 189 DEBUG tempest.lib.common.rest_client [req-f2f5faae-ef6b-499d-a838-0ab71cb3986c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f2f5faae-ef6b-499d-a838-0ab71cb3986c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/8ff7c2d9-c666-4622-b24f-8ccf2c9d988f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:19.339 189 INFO tempest.lib.common.rest_client [req-f05fd29f-dcf4-4648-a630-567908442059 ] Request (EncryptionTypesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/8ff7c2d9-c666-4622-b24f-8ccf2c9d988f 0.034s 2020-12-14 02:33:19.342 189 DEBUG tempest.lib.common.rest_client [req-f05fd29f-dcf4-4648-a630-567908442059 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-f05fd29f-dcf4-4648-a630-567908442059', 'x-openstack-request-id': 'req-f05fd29f-dcf4-4648-a630-567908442059', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/8ff7c2d9-c666-4622-b24f-8ccf2c9d988f'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 8ff7c2d9-c666-4622-b24f-8ccf2c9d988f could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:19.425 189 INFO tempest.lib.common.rest_client [req-335bfd9d-35e3-4b29-a682-8349121dcc7d ] Request (EncryptionTypesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/d42dd44c-d124-41f4-bb64-06346752710b 0.076s 2020-12-14 02:33:19.427 189 DEBUG tempest.lib.common.rest_client [req-335bfd9d-35e3-4b29-a682-8349121dcc7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-335bfd9d-35e3-4b29-a682-8349121dcc7d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/d42dd44c-d124-41f4-bb64-06346752710b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:19.459 189 INFO tempest.lib.common.rest_client [req-bf0ffc9e-940a-46cd-adea-548975f27f04 ] Request (EncryptionTypesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/d42dd44c-d124-41f4-bb64-06346752710b 0.027s 2020-12-14 02:33:19.462 189 DEBUG tempest.lib.common.rest_client [req-bf0ffc9e-940a-46cd-adea-548975f27f04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-bf0ffc9e-940a-46cd-adea-548975f27f04', 'x-openstack-request-id': 'req-bf0ffc9e-940a-46cd-adea-548975f27f04', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/cd43aef3d7374817ae816cc72c5dc961/types/d42dd44c-d124-41f4-bb64-06346752710b'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type d42dd44c-d124-41f4-bb64-06346752710b could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:19.608 189 INFO tempest.lib.common.rest_client [req-7a57ef2e-b46a-4a83-ad9e-ac83a092bd5f ] Request (EncryptionTypesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/644a8e8d9ff3457f897ead73f37b50a9 0.140s 2020-12-14 02:33:19.610 189 DEBUG tempest.lib.common.rest_client [req-7a57ef2e-b46a-4a83-ad9e-ac83a092bd5f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a57ef2e-b46a-4a83-ad9e-ac83a092bd5f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/644a8e8d9ff3457f897ead73f37b50a9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:19.705 189 INFO tempest.lib.common.rest_client [req-6cfde9fa-7aab-4ed1-83cb-c542af51d6dd ] Request (EncryptionTypesV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-14 02:33:19.708 189 DEBUG tempest.lib.common.rest_client [req-6cfde9fa-7aab-4ed1-83cb-c542af51d6dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6cfde9fa-7aab-4ed1-83cb-c542af51d6dd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["30BKSHIMQam60ZmnvXt7Hg"], "expires_at": "2020-12-14T03:33:19.000000Z", "issued_at": "2020-12-14T02:33:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:19.999 189 INFO tempest.lib.common.rest_client [req-aa1fabdf-b63d-4f74-a16a-bba90e3139b1 ] Request (EncryptionTypesV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=cd43aef3d7374817ae816cc72c5dc961&name=default 0.285s 2020-12-14 02:33:20.002 189 DEBUG tempest.lib.common.rest_client [req-aa1fabdf-b63d-4f74-a16a-bba90e3139b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-aa1fabdf-b63d-4f74-a16a-bba90e3139b1', 'date': 'Mon, 14 Dec 2020 02:33:19 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=cd43aef3d7374817ae816cc72c5dc961&name=default'} Body: b'{"security_groups": [{"id": "550e6619-9eae-4e15-9d33-f849b6ef7ad5", "name": "default", "stateful": true, "tenant_id": "cd43aef3d7374817ae816cc72c5dc961", "description": "Default security group", "security_group_rules": [{"id": "163bda64-bc01-49de-b86b-5f0d23f7e522", "tenant_id": "cd43aef3d7374817ae816cc72c5dc961", "security_group_id": "550e6619-9eae-4e15-9d33-f849b6ef7ad5", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "550e6619-9eae-4e15-9d33-f849b6ef7ad5", "description": null, "tags": [], "created_at": "2020-12-14T02:33:19Z", "updated_at": "2020-12-14T02:33:19Z", "revision_number": 0, "project_id": "cd43aef3d7374817ae816cc72c5dc961"}, {"id": "37d1cc6b-a3b7-45c7-bfba-4933236da529", "tenant_id": "cd43aef3d7374817ae816cc72c5dc961", "security_group_id": "550e6619-9eae-4e15-9d33-f849b6ef7ad5", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:33:19Z", "updated_at": "2020-12-14T02:33:19Z", "revision_number": 0, "project_id": "cd43aef3d7374817ae816cc72c5dc961"}, {"id": "ae3b5858-562e-4e4a-87e6-744e9a24febd", "tenant_id": "cd43aef3d7374817ae816cc72c5dc961", "security_group_id": "550e6619-9eae-4e15-9d33-f849b6ef7ad5", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:33:19Z", "updated_at": "2020-12-14T02:33:19Z", "revision_number": 0, "project_id": "cd43aef3d7374817ae816cc72c5dc961"}, {"id": "b9651aee-eaae-417e-967b-ba06f9bcb0d9", "tenant_id": "cd43aef3d7374817ae816cc72c5dc961", "security_group_id": "550e6619-9eae-4e15-9d33-f849b6ef7ad5", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "550e6619-9eae-4e15-9d33-f849b6ef7ad5", "description": null, "tags": [], "created_at": "2020-12-14T02:33:19Z", "updated_at": "2020-12-14T02:33:19Z", "revision_number": 0, "project_id": "cd43aef3d7374817ae816cc72c5dc961"}], "tags": [], "created_at": "2020-12-14T02:33:19Z", "updated_at": "2020-12-14T02:33:19Z", "revision_number": 1, "project_id": "cd43aef3d7374817ae816cc72c5dc961"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:20.143 189 INFO tempest.lib.common.rest_client [req-bc6be611-84d1-4ccb-a073-d457652a17f6 ] Request (EncryptionTypesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/550e6619-9eae-4e15-9d33-f849b6ef7ad5 0.134s 2020-12-14 02:33:20.145 189 DEBUG tempest.lib.common.rest_client [req-bc6be611-84d1-4ccb-a073-d457652a17f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-bc6be611-84d1-4ccb-a073-d457652a17f6', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:33:20 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/550e6619-9eae-4e15-9d33-f849b6ef7ad5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:20.295 189 INFO tempest.lib.common.rest_client [req-473a27c5-2721-44c5-bf19-445084e672a1 ] Request (EncryptionTypesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961 0.142s 2020-12-14 02:33:20.298 189 DEBUG tempest.lib.common.rest_client [req-473a27c5-2721-44c5-bf19-445084e672a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-473a27c5-2721-44c5-bf19-445084e672a1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cd43aef3d7374817ae816cc72c5dc961'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:20.428 189 INFO tempest.lib.common.rest_client [req-0819a504-969d-4ef0-a1b6-27abea85bc8c ] Request (GroupSnaphotsV314RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:33:20.431 189 DEBUG tempest.lib.common.rest_client [req-0819a504-969d-4ef0-a1b6-27abea85bc8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0819a504-969d-4ef0-a1b6-27abea85bc8c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["5x9cOirxSW2IW_8xqcaKtA"], "expires_at": "2020-12-14T03:33:20.000000Z", "issued_at": "2020-12-14T02:33:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:20.532 189 INFO tempest.lib.common.rest_client [req-353aeee8-4c32-4d2b-a16b-50a913a3f03a ] Request (GroupSnaphotsV314RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:33:20.534 189 DEBUG tempest.lib.common.rest_client [req-353aeee8-4c32-4d2b-a16b-50a913a3f03a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-353aeee8-4c32-4d2b-a16b-50a913a3f03a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["wCIcWh-IQduBNb2Fw0cxOA"], "expires_at": "2020-12-14T03:33:20.000000Z", "issued_at": "2020-12-14T02:33:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:20.613 189 INFO tempest.lib.common.rest_client [req-0272f7ac-61b5-4a8b-a47e-7e81ca2b261c ] Request (GroupSnaphotsV314RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.071s 2020-12-14 02:33:20.616 189 DEBUG tempest.lib.common.rest_client [req-0272f7ac-61b5-4a8b-a47e-7e81ca2b261c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0272f7ac-61b5-4a8b-a47e-7e81ca2b261c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:20.705 189 INFO tempest.lib.common.rest_client [req-595ab5cf-e05b-4055-a794-c740b0556958 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.081s 2020-12-14 02:33:20.708 189 DEBUG tempest.lib.common.rest_client [req-595ab5cf-e05b-4055-a794-c740b0556958 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-GroupSnaphotsV314RbacTest-63038770-desc", "domain_id": "default", "name": "tempest-GroupSnaphotsV314RbacTest-63038770"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-595ab5cf-e05b-4055-a794-c740b0556958', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "9a39d52319644308af2a589a7b3c7354", "name": "tempest-GroupSnaphotsV314RbacTest-63038770", "domain_id": "default", "description": "tempest-GroupSnaphotsV314RbacTest-63038770-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:20.837 189 INFO tempest.lib.common.rest_client [req-b360dc6e-2620-4b85-83b9-3339e1d282d7 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.121s 2020-12-14 02:33:20.839 189 DEBUG tempest.lib.common.rest_client [req-b360dc6e-2620-4b85-83b9-3339e1d282d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-GroupSnaphotsV314RbacTest-63038770", "password": "X2@Bec1s4TkTt=m", "project_id": "9a39d52319644308af2a589a7b3c7354", "email": "tempest-GroupSnaphotsV314RbacTest-363890201@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '403', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b360dc6e-2620-4b85-83b9-3339e1d282d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "9a39d52319644308af2a589a7b3c7354", "email": "tempest-GroupSnaphotsV314RbacTest-363890201@example.com", "id": "28ef673031b8426a8c6abb3bab9e02c8", "name": "tempest-GroupSnaphotsV314RbacTest-63038770", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/28ef673031b8426a8c6abb3bab9e02c8"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:20.913 189 INFO tempest.lib.common.rest_client [req-8e71136b-28f5-48b9-8b7c-12b5aa7914b7 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.068s 2020-12-14 02:33:20.915 189 DEBUG tempest.lib.common.rest_client [req-8e71136b-28f5-48b9-8b7c-12b5aa7914b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e71136b-28f5-48b9-8b7c-12b5aa7914b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:20.982 189 INFO tempest.lib.common.rest_client [req-716063ec-fdfe-45ad-b8bc-62671f6c4c39 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:33:20.986 189 DEBUG tempest.lib.common.rest_client [req-716063ec-fdfe-45ad-b8bc-62671f6c4c39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-716063ec-fdfe-45ad-b8bc-62671f6c4c39', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:21.068 189 INFO tempest.lib.common.rest_client [req-402055ad-e8c6-4a58-91fe-e04385982e3b ] Request (GroupSnaphotsV314RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles/72a4576c553448cd941b052c1ca0cf2d 0.073s 2020-12-14 02:33:21.070 189 DEBUG tempest.lib.common.rest_client [req-402055ad-e8c6-4a58-91fe-e04385982e3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-402055ad-e8c6-4a58-91fe-e04385982e3b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:21.074 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupSnaphotsV314RbacTest-63038770', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '9a39d52319644308af2a589a7b3c7354', 'project_name': 'tempest-GroupSnaphotsV314RbacTest-63038770', 'tenant_id': '9a39d52319644308af2a589a7b3c7354', 'tenant_name': 'tempest-GroupSnaphotsV314RbacTest-63038770', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '28ef673031b8426a8c6abb3bab9e02c8'}, Network: None, Subnet: None, Router: None 2020-12-14 02:33:21.076 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupSnaphotsV314RbacTest-63038770', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '9a39d52319644308af2a589a7b3c7354', 'project_name': 'tempest-GroupSnaphotsV314RbacTest-63038770', 'tenant_id': '9a39d52319644308af2a589a7b3c7354', 'tenant_name': 'tempest-GroupSnaphotsV314RbacTest-63038770', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '28ef673031b8426a8c6abb3bab9e02c8'}, Network: None, Subnet: None, Router: None 2020-12-14 02:33:21.260 189 INFO tempest.lib.common.rest_client [req-ce72cade-340c-4a49-96c5-d0c42a171358 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:33:21.263 189 DEBUG tempest.lib.common.rest_client [req-ce72cade-340c-4a49-96c5-d0c42a171358 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ce72cade-340c-4a49-96c5-d0c42a171358', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "28ef673031b8426a8c6abb3bab9e02c8", "name": "tempest-GroupSnaphotsV314RbacTest-63038770", "password_expires_at": null}, "audit_ids": ["oUv69UuHQ_uSO04eAtOK8Q"], "expires_at": "2020-12-14T03:33:21.000000Z", "issued_at": "2020-12-14T02:33:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a39d52319644308af2a589a7b3c7354", "name": "tempest-GroupSnaphotsV314RbacTest-63038770"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:21.368 189 INFO tempest.lib.common.rest_client [req-70a02bed-fc0d-4c0f-b588-a51cce9831a9 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:33:21.372 189 DEBUG tempest.lib.common.rest_client [req-70a02bed-fc0d-4c0f-b588-a51cce9831a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70a02bed-fc0d-4c0f-b588-a51cce9831a9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["4jcqBwk9QRKWGqDWBaADUQ"], "expires_at": "2020-12-14T03:33:21.000000Z", "issued_at": "2020-12-14T02:33:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:21.480 189 INFO tempest.lib.common.rest_client [req-fc991507-c864-4b17-9a92-93df8ccaab05 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:33:21.482 189 DEBUG tempest.lib.common.rest_client [req-fc991507-c864-4b17-9a92-93df8ccaab05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc991507-c864-4b17-9a92-93df8ccaab05', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["1VP0_jPgQfS-4vtZl8Ttpg"], "expires_at": "2020-12-14T03:33:21.000000Z", "issued_at": "2020-12-14T02:33:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:21.545 189 INFO tempest.lib.common.rest_client [req-ad94a570-d970-443f-a81d-e4ddae246c03 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.057s 2020-12-14 02:33:21.547 189 DEBUG tempest.lib.common.rest_client [req-ad94a570-d970-443f-a81d-e4ddae246c03 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad94a570-d970-443f-a81d-e4ddae246c03', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:21.613 189 INFO tempest.lib.common.rest_client [req-18ca623a-4906-43c6-a591-f974d4b06dd7 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:33:21.616 189 DEBUG tempest.lib.common.rest_client [req-18ca623a-4906-43c6-a591-f974d4b06dd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-18ca623a-4906-43c6-a591-f974d4b06dd7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:21.620 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:33:21.623 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:21.686 189 INFO tempest.lib.common.rest_client [req-112007eb-630a-4b25-95be-e92fab771fb1 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles 0.058s 2020-12-14 02:33:21.688 189 DEBUG tempest.lib.common.rest_client [req-112007eb-630a-4b25-95be-e92fab771fb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-112007eb-630a-4b25-95be-e92fab771fb1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:21.760 189 INFO tempest.lib.common.rest_client [req-a3d98d95-df15-4733-9c3f-4780cc7273a1 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-12-14 02:33:21.762 189 DEBUG tempest.lib.common.rest_client [req-a3d98d95-df15-4733-9c3f-4780cc7273a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3d98d95-df15-4733-9c3f-4780cc7273a1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:21.874 189 INFO tempest.lib.common.rest_client [req-57fa3d39-1c6f-4168-a597-115bf2eac116 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles/a629c95d64b3416fb80ae90af4f69c05 0.106s 2020-12-14 02:33:21.876 189 DEBUG tempest.lib.common.rest_client [req-57fa3d39-1c6f-4168-a597-115bf2eac116 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57fa3d39-1c6f-4168-a597-115bf2eac116', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:22.971 189 INFO tempest.lib.common.rest_client [req-42fb4344-792b-496f-bd03-b226fd4a00f0 ] Request (GroupSnaphotsV314RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-14 02:33:22.975 189 DEBUG tempest.lib.common.rest_client [req-42fb4344-792b-496f-bd03-b226fd4a00f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42fb4344-792b-496f-bd03-b226fd4a00f0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "28ef673031b8426a8c6abb3bab9e02c8", "name": "tempest-GroupSnaphotsV314RbacTest-63038770", "password_expires_at": null}, "audit_ids": ["MeqAAUCXTSibCvBA2aZEyA"], "expires_at": "2020-12-14T03:33:22.000000Z", "issued_at": "2020-12-14T02:33:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a39d52319644308af2a589a7b3c7354", "name": "tempest-GroupSnaphotsV314RbacTest-63038770"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:23.211 189 INFO tempest.lib.common.rest_client [req-ebc67fbc-2898-4f52-bc10-751814851cb0 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types 0.217s 2020-12-14 02:33:23.214 189 DEBUG tempest.lib.common.rest_client [req-ebc67fbc-2898-4f52-bc10-751814851cb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupSnaphotsV314RbacTest-volume-type-1188139509"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ebc67fbc-2898-4f52-bc10-751814851cb0', 'content-length': '231', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ebc67fbc-2898-4f52-bc10-751814851cb0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types'} Body: b'{"volume_type": {"id": "225c446a-4aef-4f3b-934e-8a050e5fb876", "name": "tempest-GroupSnaphotsV314RbacTest-volume-type-1188139509", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:23.297 189 INFO tempest.lib.common.rest_client [req-9faef935-4448-4f50-ace1-d2eaf6a08d0b ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_types 0.054s 2020-12-14 02:33:23.300 189 DEBUG tempest.lib.common.rest_client [req-9faef935-4448-4f50-ace1-d2eaf6a08d0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupSnaphotsV314RbacTest-group-type-377219868"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9faef935-4448-4f50-ace1-d2eaf6a08d0b', 'content-length': '187', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9faef935-4448-4f50-ace1-d2eaf6a08d0b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_types'} Body: b'{"group_type": {"id": "432eeffc-98fe-41cf-8afd-b6ecada2846f", "name": "tempest-GroupSnaphotsV314RbacTest-group-type-377219868", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:23.465 189 INFO tempest.lib.common.rest_client [req-4d00a918-b95a-42a1-aceb-3048e3d994c4 ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups 0.141s 2020-12-14 02:33:23.468 189 DEBUG tempest.lib.common.rest_client [req-4d00a918-b95a-42a1-aceb-3048e3d994c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group": {"group_type": "432eeffc-98fe-41cf-8afd-b6ecada2846f", "volume_types": ["225c446a-4aef-4f3b-934e-8a050e5fb876"], "name": "tempest-GroupSnaphotsV314RbacTest-Group-1222948433"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4d00a918-b95a-42a1-aceb-3048e3d994c4', 'content-length': '119', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4d00a918-b95a-42a1-aceb-3048e3d994c4', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups'} Body: b'{"group": {"id": "db0e8245-244e-4f58-bd88-9d6a1dc2a645", "name": "tempest-GroupSnaphotsV314RbacTest-Group-1222948433"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:23.533 189 INFO tempest.lib.common.rest_client [req-6794aea9-79d3-4c7f-acc7-e8d7eb0cb857 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/db0e8245-244e-4f58-bd88-9d6a1dc2a645 0.046s 2020-12-14 02:33:23.536 189 DEBUG tempest.lib.common.rest_client [req-6794aea9-79d3-4c7f-acc7-e8d7eb0cb857 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6794aea9-79d3-4c7f-acc7-e8d7eb0cb857', 'content-length': '399', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6794aea9-79d3-4c7f-acc7-e8d7eb0cb857', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/db0e8245-244e-4f58-bd88-9d6a1dc2a645'} Body: b'{"group": {"id": "db0e8245-244e-4f58-bd88-9d6a1dc2a645", "status": "creating", "availability_zone": "nova", "created_at": "2020-12-14T02:33:23.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group-1222948433", "description": null, "group_type": "432eeffc-98fe-41cf-8afd-b6ecada2846f", "volume_types": ["225c446a-4aef-4f3b-934e-8a050e5fb876"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:24.635 189 INFO tempest.lib.common.rest_client [req-b1d69c2e-2cdf-4246-bc4d-c80f75dad149 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/db0e8245-244e-4f58-bd88-9d6a1dc2a645 0.053s 2020-12-14 02:33:24.638 189 DEBUG tempest.lib.common.rest_client [req-b1d69c2e-2cdf-4246-bc4d-c80f75dad149 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b1d69c2e-2cdf-4246-bc4d-c80f75dad149', 'content-length': '400', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b1d69c2e-2cdf-4246-bc4d-c80f75dad149', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/db0e8245-244e-4f58-bd88-9d6a1dc2a645'} Body: b'{"group": {"id": "db0e8245-244e-4f58-bd88-9d6a1dc2a645", "status": "available", "availability_zone": "nova", "created_at": "2020-12-14T02:33:24.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group-1222948433", "description": null, "group_type": "432eeffc-98fe-41cf-8afd-b6ecada2846f", "volume_types": ["225c446a-4aef-4f3b-934e-8a050e5fb876"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:24.683 189 INFO tempest.common.waiters [-] group db0e8245-244e-4f58-bd88-9d6a1dc2a645 reached available after waiting for 1.683345 seconds 2020-12-14 02:33:25.071 189 INFO tempest.lib.common.rest_client [req-94649875-9820-4086-ac6c-a87789b9f999 ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes 0.382s 2020-12-14 02:33:25.073 189 DEBUG tempest.lib.common.rest_client [req-94649875-9820-4086-ac6c-a87789b9f999 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"volume": {"volume_type": "225c446a-4aef-4f3b-934e-8a050e5fb876", "group_id": "db0e8245-244e-4f58-bd88-9d6a1dc2a645", "size": 1, "name": "tempest-GroupSnaphotsV314RbacTest-Volume-782302243"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-94649875-9820-4086-ac6c-a87789b9f999', 'content-length': '949', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-94649875-9820-4086-ac6c-a87789b9f999', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes'} Body: b'{"volume": {"id": "82b56fd0-1f57-48d5-9725-e6c6a4bc103f", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:25.000000", "updated_at": null, "name": "tempest-GroupSnaphotsV314RbacTest-Volume-782302243", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1188139509", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "db0e8245-244e-4f58-bd88-9d6a1dc2a645"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:25.272 189 INFO tempest.lib.common.rest_client [req-589acac2-40de-4527-a7c0-50b4f5f7c160 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f 0.111s 2020-12-14 02:33:25.274 189 DEBUG tempest.lib.common.rest_client [req-589acac2-40de-4527-a7c0-50b4f5f7c160 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-589acac2-40de-4527-a7c0-50b4f5f7c160', 'content-length': '1171', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-589acac2-40de-4527-a7c0-50b4f5f7c160', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f'} Body: b'{"volume": {"id": "82b56fd0-1f57-48d5-9725-e6c6a4bc103f", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:25.000000", "updated_at": "2020-12-14T02:33:25.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-782302243", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1188139509", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "db0e8245-244e-4f58-bd88-9d6a1dc2a645", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:26.502 189 INFO tempest.lib.common.rest_client [req-8f27698b-8152-4520-a672-26e5a48bd34f ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f 0.114s 2020-12-14 02:33:26.506 189 DEBUG tempest.lib.common.rest_client [req-8f27698b-8152-4520-a672-26e5a48bd34f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8f27698b-8152-4520-a672-26e5a48bd34f', 'content-length': '1172', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8f27698b-8152-4520-a672-26e5a48bd34f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f'} Body: b'{"volume": {"id": "82b56fd0-1f57-48d5-9725-e6c6a4bc103f", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:25.000000", "updated_at": "2020-12-14T02:33:25.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-782302243", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1188139509", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "db0e8245-244e-4f58-bd88-9d6a1dc2a645", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:26.598 189 INFO tempest.common.waiters [-] volume 82b56fd0-1f57-48d5-9725-e6c6a4bc103f reached available after waiting for 1.597938 seconds 2020-12-14 02:33:26.600 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:33:26.619 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:create_group_snapshot, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:33:26.622 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:26.751 189 INFO tempest.lib.common.rest_client [req-24f00b23-cbc9-4178-b755-261cb9d66fb8 ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles 0.121s 2020-12-14 02:33:26.754 189 DEBUG tempest.lib.common.rest_client [req-24f00b23-cbc9-4178-b755-261cb9d66fb8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24f00b23-cbc9-4178-b755-261cb9d66fb8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:26.809 189 INFO tempest.lib.common.rest_client [req-a8fe9234-48a7-4c6b-9429-e0f5638b1218 ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:33:26.814 189 DEBUG tempest.lib.common.rest_client [req-a8fe9234-48a7-4c6b-9429-e0f5638b1218 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8fe9234-48a7-4c6b-9429-e0f5638b1218', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "28ef673031b8426a8c6abb3bab9e02c8", "name": "tempest-GroupSnaphotsV314RbacTest-63038770", "password_expires_at": null}, "audit_ids": ["-ZndaQtNQPK3UU577pz8tg"], "expires_at": "2020-12-14T03:33:26.000000Z", "issued_at": "2020-12-14T02:33:26.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a39d52319644308af2a589a7b3c7354", "name": "tempest-GroupSnaphotsV314RbacTest-63038770"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:27.070 189 INFO tempest.lib.common.rest_client [req-1756b7bc-9951-494c-8efc-a8f40bec0baf ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots 0.247s 2020-12-14 02:33:27.072 189 DEBUG tempest.lib.common.rest_client [req-1756b7bc-9951-494c-8efc-a8f40bec0baf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group_snapshot": {"name": "tempest-GroupSnaphotsV314RbacTest-Group_Snapshot-2111651741", "group_id": "db0e8245-244e-4f58-bd88-9d6a1dc2a645"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:26 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1756b7bc-9951-494c-8efc-a8f40bec0baf', 'content-length': '194', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1756b7bc-9951-494c-8efc-a8f40bec0baf', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots'} Body: b'{"group_snapshot": {"id": "4d997d42-e7b2-4d5a-bc06-7d3b938bcaae", "name": "tempest-GroupSnaphotsV314RbacTest-Group_Snapshot-2111651741", "group_type_id": "432eeffc-98fe-41cf-8afd-b6ecada2846f"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:27.092 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:27.162 189 INFO tempest.lib.common.rest_client [req-23d04134-346f-4d38-8abc-b6fe164da141 ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles 0.063s 2020-12-14 02:33:27.166 189 DEBUG tempest.lib.common.rest_client [req-23d04134-346f-4d38-8abc-b6fe164da141 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-23d04134-346f-4d38-8abc-b6fe164da141', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:27.220 189 INFO tempest.lib.common.rest_client [req-64b74edb-5bbd-4103-a3f6-39ee363568a6 ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:33:27.223 189 DEBUG tempest.lib.common.rest_client [req-64b74edb-5bbd-4103-a3f6-39ee363568a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-64b74edb-5bbd-4103-a3f6-39ee363568a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "28ef673031b8426a8c6abb3bab9e02c8", "name": "tempest-GroupSnaphotsV314RbacTest-63038770", "password_expires_at": null}, "audit_ids": ["22_5YxWxQaWMIUTKyDwrmA"], "expires_at": "2020-12-14T03:33:27.000000Z", "issued_at": "2020-12-14T02:33:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a39d52319644308af2a589a7b3c7354", "name": "tempest-GroupSnaphotsV314RbacTest-63038770"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:27.322 189 INFO tempest.lib.common.rest_client [req-ed97b3bc-fb41-4752-b897-ad1e5a709e57 ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4d997d42-e7b2-4d5a-bc06-7d3b938bcaae 0.092s 2020-12-14 02:33:27.325 189 DEBUG tempest.lib.common.rest_client [req-ed97b3bc-fb41-4752-b897-ad1e5a709e57 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ed97b3bc-fb41-4752-b897-ad1e5a709e57', 'content-length': '333', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ed97b3bc-fb41-4752-b897-ad1e5a709e57', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4d997d42-e7b2-4d5a-bc06-7d3b938bcaae'} Body: b'{"group_snapshot": {"id": "4d997d42-e7b2-4d5a-bc06-7d3b938bcaae", "group_id": "db0e8245-244e-4f58-bd88-9d6a1dc2a645", "group_type_id": "432eeffc-98fe-41cf-8afd-b6ecada2846f", "status": "creating", "created_at": "2020-12-14T02:33:27.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group_Snapshot-2111651741", "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:28.404 189 INFO tempest.lib.common.rest_client [req-d99bc63e-6c0b-41e1-8b23-acd107f3836f ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4d997d42-e7b2-4d5a-bc06-7d3b938bcaae 0.047s 2020-12-14 02:33:28.408 189 DEBUG tempest.lib.common.rest_client [req-d99bc63e-6c0b-41e1-8b23-acd107f3836f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d99bc63e-6c0b-41e1-8b23-acd107f3836f', 'content-length': '334', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d99bc63e-6c0b-41e1-8b23-acd107f3836f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4d997d42-e7b2-4d5a-bc06-7d3b938bcaae'} Body: b'{"group_snapshot": {"id": "4d997d42-e7b2-4d5a-bc06-7d3b938bcaae", "group_id": "db0e8245-244e-4f58-bd88-9d6a1dc2a645", "group_type_id": "432eeffc-98fe-41cf-8afd-b6ecada2846f", "status": "available", "created_at": "2020-12-14T02:33:27.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group_Snapshot-2111651741", "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:28.431 189 INFO tempest.common.waiters [-] group_snapshot 4d997d42-e7b2-4d5a-bc06-7d3b938bcaae reached available after waiting for 1.431385 seconds 2020-12-14 02:33:28.473 189 INFO tempest.lib.common.rest_client [req-98de976e-c203-4408-a5a5-7d5ef51c07c3 ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/detail 0.037s 2020-12-14 02:33:28.476 189 DEBUG tempest.lib.common.rest_client [req-98de976e-c203-4408-a5a5-7d5ef51c07c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-98de976e-c203-4408-a5a5-7d5ef51c07c3', 'content-length': '480', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-98de976e-c203-4408-a5a5-7d5ef51c07c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/detail'} Body: b'{"snapshots": [{"id": "7cdec515-45b6-43bd-870c-9d52ccb254f4", "created_at": "2020-12-14T02:33:27.000000", "updated_at": "2020-12-14T02:33:28.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group_Snapshot-2111651741", "description": null, "volume_id": "82b56fd0-1f57-48d5-9725-e6c6a4bc103f", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "9a39d52319644308af2a589a7b3c7354", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:28.576 189 INFO tempest.lib.common.rest_client [req-b55a8594-986f-4f6d-91f5-20beb94fc2b1 ] Request (GroupSnaphotsV314RbacTest:test_create_group_snapshot): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/7cdec515-45b6-43bd-870c-9d52ccb254f4 0.059s 2020-12-14 02:33:28.579 189 DEBUG tempest.lib.common.rest_client [req-b55a8594-986f-4f6d-91f5-20beb94fc2b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b55a8594-986f-4f6d-91f5-20beb94fc2b1', 'content-length': '477', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b55a8594-986f-4f6d-91f5-20beb94fc2b1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/7cdec515-45b6-43bd-870c-9d52ccb254f4'} Body: b'{"snapshot": {"id": "7cdec515-45b6-43bd-870c-9d52ccb254f4", "created_at": "2020-12-14T02:33:27.000000", "updated_at": "2020-12-14T02:33:28.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group_Snapshot-2111651741", "description": null, "volume_id": "82b56fd0-1f57-48d5-9725-e6c6a4bc103f", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "9a39d52319644308af2a589a7b3c7354", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:28.610 189 INFO tempest.common.waiters [-] snapshot 7cdec515-45b6-43bd-870c-9d52ccb254f4 reached available after waiting for 0.610258 seconds 2020-12-14 02:33:28.686 189 INFO tempest.lib.common.rest_client [req-f07aeaff-be88-4f11-805f-c9a90207e0f1 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4d997d42-e7b2-4d5a-bc06-7d3b938bcaae 0.069s 2020-12-14 02:33:28.688 189 DEBUG tempest.lib.common.rest_client [req-f07aeaff-be88-4f11-805f-c9a90207e0f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f07aeaff-be88-4f11-805f-c9a90207e0f1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4d997d42-e7b2-4d5a-bc06-7d3b938bcaae'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:28.800 189 INFO tempest.lib.common.rest_client [req-86350b34-e507-46de-9c1a-dbd98d750b61 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/detail 0.105s 2020-12-14 02:33:28.803 189 DEBUG tempest.lib.common.rest_client [req-86350b34-e507-46de-9c1a-dbd98d750b61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-86350b34-e507-46de-9c1a-dbd98d750b61', 'content-length': '1175', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-86350b34-e507-46de-9c1a-dbd98d750b61', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/detail'} Body: b'{"volumes": [{"id": "82b56fd0-1f57-48d5-9725-e6c6a4bc103f", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:25.000000", "updated_at": "2020-12-14T02:33:25.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-782302243", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1188139509", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "db0e8245-244e-4f58-bd88-9d6a1dc2a645", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:28.942 189 INFO tempest.lib.common.rest_client [req-ff1ac29c-e760-48e4-afdf-d70d13dc8790 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/detail 0.038s 2020-12-14 02:33:28.945 189 DEBUG tempest.lib.common.rest_client [req-ff1ac29c-e760-48e4-afdf-d70d13dc8790 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ff1ac29c-e760-48e4-afdf-d70d13dc8790', 'content-length': '479', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ff1ac29c-e760-48e4-afdf-d70d13dc8790', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/detail'} Body: b'{"snapshots": [{"id": "7cdec515-45b6-43bd-870c-9d52ccb254f4", "created_at": "2020-12-14T02:33:27.000000", "updated_at": "2020-12-14T02:33:29.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group_Snapshot-2111651741", "description": null, "volume_id": "82b56fd0-1f57-48d5-9725-e6c6a4bc103f", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "9a39d52319644308af2a589a7b3c7354", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:29.014 189 INFO tempest.lib.common.rest_client [req-66724703-c310-431f-8901-5131f2d5128b ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/7cdec515-45b6-43bd-870c-9d52ccb254f4 0.038s 2020-12-14 02:33:29.016 189 DEBUG tempest.lib.common.rest_client [req-66724703-c310-431f-8901-5131f2d5128b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-66724703-c310-431f-8901-5131f2d5128b', 'content-length': '476', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-66724703-c310-431f-8901-5131f2d5128b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/7cdec515-45b6-43bd-870c-9d52ccb254f4'} Body: b'{"snapshot": {"id": "7cdec515-45b6-43bd-870c-9d52ccb254f4", "created_at": "2020-12-14T02:33:27.000000", "updated_at": "2020-12-14T02:33:29.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group_Snapshot-2111651741", "description": null, "volume_id": "82b56fd0-1f57-48d5-9725-e6c6a4bc103f", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "9a39d52319644308af2a589a7b3c7354", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:30.099 189 INFO tempest.lib.common.rest_client [req-55625a39-fbeb-43df-902f-93a689075fdd ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/7cdec515-45b6-43bd-870c-9d52ccb254f4 0.049s 2020-12-14 02:33:30.102 189 DEBUG tempest.lib.common.rest_client [req-55625a39-fbeb-43df-902f-93a689075fdd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-55625a39-fbeb-43df-902f-93a689075fdd', 'x-openstack-request-id': 'req-55625a39-fbeb-43df-902f-93a689075fdd', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/7cdec515-45b6-43bd-870c-9d52ccb254f4'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 7cdec515-45b6-43bd-870c-9d52ccb254f4 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:30.142 189 INFO tempest.lib.common.rest_client [req-4409640e-381c-4b42-b741-ed779797878d ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4d997d42-e7b2-4d5a-bc06-7d3b938bcaae 0.032s 2020-12-14 02:33:30.144 189 DEBUG tempest.lib.common.rest_client [req-4409640e-381c-4b42-b741-ed779797878d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '116', 'content-type': 'application/json', 'x-compute-request-id': 'req-4409640e-381c-4b42-b741-ed779797878d', 'x-openstack-request-id': 'req-4409640e-381c-4b42-b741-ed779797878d', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4d997d42-e7b2-4d5a-bc06-7d3b938bcaae'} Body: b'{"itemNotFound": {"code": 404, "message": "GroupSnapshot 4d997d42-e7b2-4d5a-bc06-7d3b938bcaae could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:30.249 189 INFO tempest.lib.common.rest_client [req-38223400-084a-473e-abf1-2a57f238468f ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/detail 0.097s 2020-12-14 02:33:30.252 189 DEBUG tempest.lib.common.rest_client [req-38223400-084a-473e-abf1-2a57f238468f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-38223400-084a-473e-abf1-2a57f238468f', 'content-length': '1175', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-38223400-084a-473e-abf1-2a57f238468f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/detail'} Body: b'{"volumes": [{"id": "82b56fd0-1f57-48d5-9725-e6c6a4bc103f", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:25.000000", "updated_at": "2020-12-14T02:33:25.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-782302243", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1188139509", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "db0e8245-244e-4f58-bd88-9d6a1dc2a645", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:30.488 189 INFO tempest.lib.common.rest_client [req-eb4b1096-a8de-4e22-9719-9a301681552d ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/db0e8245-244e-4f58-bd88-9d6a1dc2a645/action 0.124s 2020-12-14 02:33:30.491 189 DEBUG tempest.lib.common.rest_client [req-eb4b1096-a8de-4e22-9719-9a301681552d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-eb4b1096-a8de-4e22-9719-9a301681552d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/db0e8245-244e-4f58-bd88-9d6a1dc2a645/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:30.610 189 INFO tempest.lib.common.rest_client [req-78c6e277-2f01-44f6-ba53-5f49d95cf610 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f 0.112s 2020-12-14 02:33:30.614 189 DEBUG tempest.lib.common.rest_client [req-78c6e277-2f01-44f6-ba53-5f49d95cf610 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-78c6e277-2f01-44f6-ba53-5f49d95cf610', 'content-length': '1171', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-78c6e277-2f01-44f6-ba53-5f49d95cf610', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f'} Body: b'{"volume": {"id": "82b56fd0-1f57-48d5-9725-e6c6a4bc103f", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:25.000000", "updated_at": "2020-12-14T02:33:30.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-782302243", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1188139509", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "db0e8245-244e-4f58-bd88-9d6a1dc2a645", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:31.780 189 INFO tempest.lib.common.rest_client [req-0401db38-55c6-4127-acdd-0b834030a975 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f 0.064s 2020-12-14 02:33:31.784 189 DEBUG tempest.lib.common.rest_client [req-0401db38-55c6-4127-acdd-0b834030a975 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-0401db38-55c6-4127-acdd-0b834030a975', 'x-openstack-request-id': 'req-0401db38-55c6-4127-acdd-0b834030a975', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 82b56fd0-1f57-48d5-9725-e6c6a4bc103f could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:31.830 189 INFO tempest.lib.common.rest_client [req-af7c92a1-549f-40da-a21a-114da2aa2034 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/db0e8245-244e-4f58-bd88-9d6a1dc2a645 0.036s 2020-12-14 02:33:31.834 189 DEBUG tempest.lib.common.rest_client [req-af7c92a1-549f-40da-a21a-114da2aa2034 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-af7c92a1-549f-40da-a21a-114da2aa2034', 'x-openstack-request-id': 'req-af7c92a1-549f-40da-a21a-114da2aa2034', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/db0e8245-244e-4f58-bd88-9d6a1dc2a645'} Body: b'{"itemNotFound": {"code": 404, "message": "Group db0e8245-244e-4f58-bd88-9d6a1dc2a645 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:31.888 189 INFO tempest.lib.common.rest_client [req-8b246d63-eb86-4ef0-9ddf-dfca8c8c726b ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_types/432eeffc-98fe-41cf-8afd-b6ecada2846f 0.048s 2020-12-14 02:33:31.890 189 DEBUG tempest.lib.common.rest_client [req-8b246d63-eb86-4ef0-9ddf-dfca8c8c726b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8b246d63-eb86-4ef0-9ddf-dfca8c8c726b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_types/432eeffc-98fe-41cf-8afd-b6ecada2846f'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:31.961 189 INFO tempest.lib.common.rest_client [req-d4c244d2-12fc-42d8-bdf5-7daac0b176ae ] Request (GroupSnaphotsV314RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types 0.051s 2020-12-14 02:33:31.964 189 DEBUG tempest.lib.common.rest_client [req-d4c244d2-12fc-42d8-bdf5-7daac0b176ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupSnaphotsV314RbacTest-volume-type-29769000"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d4c244d2-12fc-42d8-bdf5-7daac0b176ae', 'content-length': '229', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d4c244d2-12fc-42d8-bdf5-7daac0b176ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types'} Body: b'{"volume_type": {"id": "ef681b91-63ef-4329-b7f1-fefb092aef45", "name": "tempest-GroupSnaphotsV314RbacTest-volume-type-29769000", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:32.038 189 INFO tempest.lib.common.rest_client [req-36fdc920-2c4f-4636-bc15-2cb195067d09 ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_types 0.051s 2020-12-14 02:33:32.040 189 DEBUG tempest.lib.common.rest_client [req-36fdc920-2c4f-4636-bc15-2cb195067d09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupSnaphotsV314RbacTest-group-type-861451131"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-36fdc920-2c4f-4636-bc15-2cb195067d09', 'content-length': '187', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-36fdc920-2c4f-4636-bc15-2cb195067d09', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_types'} Body: b'{"group_type": {"id": "037d6e3c-5819-4c29-9b87-d35521f8deb2", "name": "tempest-GroupSnaphotsV314RbacTest-group-type-861451131", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:32.218 189 INFO tempest.lib.common.rest_client [req-59409bc9-9276-4455-8f4e-5d652e929c28 ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups 0.159s 2020-12-14 02:33:32.222 189 DEBUG tempest.lib.common.rest_client [req-59409bc9-9276-4455-8f4e-5d652e929c28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group": {"group_type": "037d6e3c-5819-4c29-9b87-d35521f8deb2", "volume_types": ["ef681b91-63ef-4329-b7f1-fefb092aef45"], "name": "tempest-GroupSnaphotsV314RbacTest-Group-899752459"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-59409bc9-9276-4455-8f4e-5d652e929c28', 'content-length': '118', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-59409bc9-9276-4455-8f4e-5d652e929c28', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups'} Body: b'{"group": {"id": "e66c80d2-b98e-4c9c-a533-ef7d69254036", "name": "tempest-GroupSnaphotsV314RbacTest-Group-899752459"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:32.293 189 INFO tempest.lib.common.rest_client [req-f616b444-5dc2-43af-999e-1f6140f3b0bd ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/e66c80d2-b98e-4c9c-a533-ef7d69254036 0.053s 2020-12-14 02:33:32.296 189 DEBUG tempest.lib.common.rest_client [req-f616b444-5dc2-43af-999e-1f6140f3b0bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f616b444-5dc2-43af-999e-1f6140f3b0bd', 'content-length': '399', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f616b444-5dc2-43af-999e-1f6140f3b0bd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/e66c80d2-b98e-4c9c-a533-ef7d69254036'} Body: b'{"group": {"id": "e66c80d2-b98e-4c9c-a533-ef7d69254036", "status": "available", "availability_zone": "nova", "created_at": "2020-12-14T02:33:32.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group-899752459", "description": null, "group_type": "037d6e3c-5819-4c29-9b87-d35521f8deb2", "volume_types": ["ef681b91-63ef-4329-b7f1-fefb092aef45"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:32.327 189 INFO tempest.common.waiters [-] group e66c80d2-b98e-4c9c-a533-ef7d69254036 reached available after waiting for 0.327178 seconds 2020-12-14 02:33:32.681 189 INFO tempest.lib.common.rest_client [req-6a168979-23e4-4d8e-ad80-96f703b87e9f ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes 0.348s 2020-12-14 02:33:32.685 189 DEBUG tempest.lib.common.rest_client [req-6a168979-23e4-4d8e-ad80-96f703b87e9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"volume": {"volume_type": "ef681b91-63ef-4329-b7f1-fefb092aef45", "group_id": "e66c80d2-b98e-4c9c-a533-ef7d69254036", "size": 1, "name": "tempest-GroupSnaphotsV314RbacTest-Volume-991851048"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6a168979-23e4-4d8e-ad80-96f703b87e9f', 'content-length': '947', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6a168979-23e4-4d8e-ad80-96f703b87e9f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes'} Body: b'{"volume": {"id": "91a11778-6536-4646-afbe-8e3441645702", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:33.000000", "updated_at": null, "name": "tempest-GroupSnaphotsV314RbacTest-Volume-991851048", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-29769000", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "e66c80d2-b98e-4c9c-a533-ef7d69254036"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:32.994 189 INFO tempest.lib.common.rest_client [req-486619c5-a367-4cde-9dab-5ccd6ec1b65a ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702 0.221s 2020-12-14 02:33:32.998 189 DEBUG tempest.lib.common.rest_client [req-486619c5-a367-4cde-9dab-5ccd6ec1b65a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-486619c5-a367-4cde-9dab-5ccd6ec1b65a', 'content-length': '1170', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-486619c5-a367-4cde-9dab-5ccd6ec1b65a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702'} Body: b'{"volume": {"id": "91a11778-6536-4646-afbe-8e3441645702", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:33.000000", "updated_at": "2020-12-14T02:33:33.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-991851048", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-29769000", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "e66c80d2-b98e-4c9c-a533-ef7d69254036", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:33.088 189 INFO tempest.common.waiters [-] volume 91a11778-6536-4646-afbe-8e3441645702 reached available after waiting for 0.088483 seconds 2020-12-14 02:33:33.091 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:33:33.108 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:delete_group_snapshot, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:33:33.302 189 INFO tempest.lib.common.rest_client [req-1c6d8638-1b6f-4d68-9aa6-a5f3f0cb299d ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots 0.187s 2020-12-14 02:33:33.305 189 DEBUG tempest.lib.common.rest_client [req-1c6d8638-1b6f-4d68-9aa6-a5f3f0cb299d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group_snapshot": {"group_id": "e66c80d2-b98e-4c9c-a533-ef7d69254036", "name": "tempest-group_snapshot-123669647"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1c6d8638-1b6f-4d68-9aa6-a5f3f0cb299d', 'content-length': '167', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1c6d8638-1b6f-4d68-9aa6-a5f3f0cb299d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots'} Body: b'{"group_snapshot": {"id": "4259d402-0f35-4626-95dd-51472f5b533b", "name": "tempest-group_snapshot-123669647", "group_type_id": "037d6e3c-5819-4c29-9b87-d35521f8deb2"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:33.391 189 INFO tempest.lib.common.rest_client [req-6181dba8-63f1-444d-9928-d600ce357d5e ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4259d402-0f35-4626-95dd-51472f5b533b 0.061s 2020-12-14 02:33:33.395 189 DEBUG tempest.lib.common.rest_client [req-6181dba8-63f1-444d-9928-d600ce357d5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6181dba8-63f1-444d-9928-d600ce357d5e', 'content-length': '306', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6181dba8-63f1-444d-9928-d600ce357d5e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4259d402-0f35-4626-95dd-51472f5b533b'} Body: b'{"group_snapshot": {"id": "4259d402-0f35-4626-95dd-51472f5b533b", "group_id": "e66c80d2-b98e-4c9c-a533-ef7d69254036", "group_type_id": "037d6e3c-5819-4c29-9b87-d35521f8deb2", "status": "creating", "created_at": "2020-12-14T02:33:33.000000", "name": "tempest-group_snapshot-123669647", "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:34.465 189 INFO tempest.lib.common.rest_client [req-dce261c0-a5e5-4dfc-ad49-d8489917a813 ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4259d402-0f35-4626-95dd-51472f5b533b 0.040s 2020-12-14 02:33:34.470 189 DEBUG tempest.lib.common.rest_client [req-dce261c0-a5e5-4dfc-ad49-d8489917a813 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-dce261c0-a5e5-4dfc-ad49-d8489917a813', 'content-length': '307', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-dce261c0-a5e5-4dfc-ad49-d8489917a813', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4259d402-0f35-4626-95dd-51472f5b533b'} Body: b'{"group_snapshot": {"id": "4259d402-0f35-4626-95dd-51472f5b533b", "group_id": "e66c80d2-b98e-4c9c-a533-ef7d69254036", "group_type_id": "037d6e3c-5819-4c29-9b87-d35521f8deb2", "status": "available", "created_at": "2020-12-14T02:33:33.000000", "name": "tempest-group_snapshot-123669647", "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:34.507 189 INFO tempest.common.waiters [-] group_snapshot 4259d402-0f35-4626-95dd-51472f5b533b reached available after waiting for 1.507248 seconds 2020-12-14 02:33:34.555 189 INFO tempest.lib.common.rest_client [req-61e02aa8-3fd9-41ff-a1b5-a407b6e588b5 ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/detail 0.041s 2020-12-14 02:33:34.558 189 DEBUG tempest.lib.common.rest_client [req-61e02aa8-3fd9-41ff-a1b5-a407b6e588b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-61e02aa8-3fd9-41ff-a1b5-a407b6e588b5', 'content-length': '453', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-61e02aa8-3fd9-41ff-a1b5-a407b6e588b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/detail'} Body: b'{"snapshots": [{"id": "1b844de9-eb7d-41e9-ad25-b31a4544fcc7", "created_at": "2020-12-14T02:33:33.000000", "updated_at": "2020-12-14T02:33:34.000000", "name": "tempest-group_snapshot-123669647", "description": null, "volume_id": "91a11778-6536-4646-afbe-8e3441645702", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "9a39d52319644308af2a589a7b3c7354", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:34.643 189 INFO tempest.lib.common.rest_client [req-5e4cf55c-388e-47a5-9732-a3ee82597a53 ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/1b844de9-eb7d-41e9-ad25-b31a4544fcc7 0.046s 2020-12-14 02:33:34.646 189 DEBUG tempest.lib.common.rest_client [req-5e4cf55c-388e-47a5-9732-a3ee82597a53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5e4cf55c-388e-47a5-9732-a3ee82597a53', 'content-length': '450', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5e4cf55c-388e-47a5-9732-a3ee82597a53', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/1b844de9-eb7d-41e9-ad25-b31a4544fcc7'} Body: b'{"snapshot": {"id": "1b844de9-eb7d-41e9-ad25-b31a4544fcc7", "created_at": "2020-12-14T02:33:33.000000", "updated_at": "2020-12-14T02:33:34.000000", "name": "tempest-group_snapshot-123669647", "description": null, "volume_id": "91a11778-6536-4646-afbe-8e3441645702", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "9a39d52319644308af2a589a7b3c7354", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:34.677 189 INFO tempest.common.waiters [-] snapshot 1b844de9-eb7d-41e9-ad25-b31a4544fcc7 reached available after waiting for 0.676864 seconds 2020-12-14 02:33:34.679 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:34.752 189 INFO tempest.lib.common.rest_client [req-aececa10-57b7-4782-bc6a-45bc58217dc3 ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles 0.067s 2020-12-14 02:33:34.754 189 DEBUG tempest.lib.common.rest_client [req-aececa10-57b7-4782-bc6a-45bc58217dc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aececa10-57b7-4782-bc6a-45bc58217dc3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:34.809 189 INFO tempest.lib.common.rest_client [req-dc9b8925-6386-4172-98ec-d5fdd30b4778 ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:33:34.814 189 DEBUG tempest.lib.common.rest_client [req-dc9b8925-6386-4172-98ec-d5fdd30b4778 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc9b8925-6386-4172-98ec-d5fdd30b4778', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "28ef673031b8426a8c6abb3bab9e02c8", "name": "tempest-GroupSnaphotsV314RbacTest-63038770", "password_expires_at": null}, "audit_ids": ["WSUFKnb-TOKLaViqU6HQOA"], "expires_at": "2020-12-14T03:33:34.000000Z", "issued_at": "2020-12-14T02:33:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a39d52319644308af2a589a7b3c7354", "name": "tempest-GroupSnaphotsV314RbacTest-63038770"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:34.955 189 INFO tempest.lib.common.rest_client [req-c7069ad9-f3cc-41cf-a7e9-92d9415cbc8c ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 202 DELETE http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4259d402-0f35-4626-95dd-51472f5b533b 0.134s 2020-12-14 02:33:34.958 189 DEBUG tempest.lib.common.rest_client [req-c7069ad9-f3cc-41cf-a7e9-92d9415cbc8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c7069ad9-f3cc-41cf-a7e9-92d9415cbc8c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4259d402-0f35-4626-95dd-51472f5b533b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:34.960 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:35.035 189 INFO tempest.lib.common.rest_client [req-34aa998e-d822-4a67-aad7-d35c4f5c582b ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles 0.068s 2020-12-14 02:33:35.039 189 DEBUG tempest.lib.common.rest_client [req-34aa998e-d822-4a67-aad7-d35c4f5c582b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34aa998e-d822-4a67-aad7-d35c4f5c582b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:35.094 189 INFO tempest.lib.common.rest_client [req-c1cdd6a0-ea9a-4185-8968-fca3adce5389 ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:33:35.097 189 DEBUG tempest.lib.common.rest_client [req-c1cdd6a0-ea9a-4185-8968-fca3adce5389 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c1cdd6a0-ea9a-4185-8968-fca3adce5389', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "28ef673031b8426a8c6abb3bab9e02c8", "name": "tempest-GroupSnaphotsV314RbacTest-63038770", "password_expires_at": null}, "audit_ids": ["qthw7HpwR8yH630Jhq-QNQ"], "expires_at": "2020-12-14T03:33:35.000000Z", "issued_at": "2020-12-14T02:33:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a39d52319644308af2a589a7b3c7354", "name": "tempest-GroupSnaphotsV314RbacTest-63038770"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:35.258 189 INFO tempest.lib.common.rest_client [req-7f30d4a7-5d41-4f09-90ea-95a13545fad6 ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/detail 0.156s 2020-12-14 02:33:35.260 189 DEBUG tempest.lib.common.rest_client [req-7f30d4a7-5d41-4f09-90ea-95a13545fad6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7f30d4a7-5d41-4f09-90ea-95a13545fad6', 'content-length': '1173', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7f30d4a7-5d41-4f09-90ea-95a13545fad6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/detail'} Body: b'{"volumes": [{"id": "91a11778-6536-4646-afbe-8e3441645702", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:33.000000", "updated_at": "2020-12-14T02:33:33.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-991851048", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-29769000", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "e66c80d2-b98e-4c9c-a533-ef7d69254036", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:35.378 189 INFO tempest.lib.common.rest_client [req-9388d524-8362-4912-bbbc-c7f6b0dc298d ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/detail 0.041s 2020-12-14 02:33:35.380 189 DEBUG tempest.lib.common.rest_client [req-9388d524-8362-4912-bbbc-c7f6b0dc298d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9388d524-8362-4912-bbbc-c7f6b0dc298d', 'content-length': '452', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9388d524-8362-4912-bbbc-c7f6b0dc298d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/detail'} Body: b'{"snapshots": [{"id": "1b844de9-eb7d-41e9-ad25-b31a4544fcc7", "created_at": "2020-12-14T02:33:33.000000", "updated_at": "2020-12-14T02:33:35.000000", "name": "tempest-group_snapshot-123669647", "description": null, "volume_id": "91a11778-6536-4646-afbe-8e3441645702", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "9a39d52319644308af2a589a7b3c7354", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:35.457 189 INFO tempest.lib.common.rest_client [req-09d90815-1d78-4e46-83fd-83d6c4713da2 ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/1b844de9-eb7d-41e9-ad25-b31a4544fcc7 0.047s 2020-12-14 02:33:35.459 189 DEBUG tempest.lib.common.rest_client [req-09d90815-1d78-4e46-83fd-83d6c4713da2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-09d90815-1d78-4e46-83fd-83d6c4713da2', 'content-length': '449', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-09d90815-1d78-4e46-83fd-83d6c4713da2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/1b844de9-eb7d-41e9-ad25-b31a4544fcc7'} Body: b'{"snapshot": {"id": "1b844de9-eb7d-41e9-ad25-b31a4544fcc7", "created_at": "2020-12-14T02:33:33.000000", "updated_at": "2020-12-14T02:33:35.000000", "name": "tempest-group_snapshot-123669647", "description": null, "volume_id": "91a11778-6536-4646-afbe-8e3441645702", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "9a39d52319644308af2a589a7b3c7354", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:36.537 189 INFO tempest.lib.common.rest_client [req-ff5cf2b5-d90b-4543-ad77-70566309ba04 ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/1b844de9-eb7d-41e9-ad25-b31a4544fcc7 0.048s 2020-12-14 02:33:36.541 189 DEBUG tempest.lib.common.rest_client [req-ff5cf2b5-d90b-4543-ad77-70566309ba04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-ff5cf2b5-d90b-4543-ad77-70566309ba04', 'x-openstack-request-id': 'req-ff5cf2b5-d90b-4543-ad77-70566309ba04', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/1b844de9-eb7d-41e9-ad25-b31a4544fcc7'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 1b844de9-eb7d-41e9-ad25-b31a4544fcc7 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:36.578 189 INFO tempest.lib.common.rest_client [req-2101d9a4-9480-4c4c-a581-4ca264749b1a ] Request (GroupSnaphotsV314RbacTest:test_delete_group_snapshot_rbac): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4259d402-0f35-4626-95dd-51472f5b533b 0.031s 2020-12-14 02:33:36.582 189 DEBUG tempest.lib.common.rest_client [req-2101d9a4-9480-4c4c-a581-4ca264749b1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '116', 'content-type': 'application/json', 'x-compute-request-id': 'req-2101d9a4-9480-4c4c-a581-4ca264749b1a', 'x-openstack-request-id': 'req-2101d9a4-9480-4c4c-a581-4ca264749b1a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4259d402-0f35-4626-95dd-51472f5b533b'} Body: b'{"itemNotFound": {"code": 404, "message": "GroupSnapshot 4259d402-0f35-4626-95dd-51472f5b533b could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:36.623 189 INFO tempest.lib.common.rest_client [req-d08781dd-d771-4672-a1ba-f20ce0e04ddc ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4259d402-0f35-4626-95dd-51472f5b533b 0.032s 2020-12-14 02:33:36.625 189 DEBUG tempest.lib.common.rest_client [req-d08781dd-d771-4672-a1ba-f20ce0e04ddc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '116', 'content-type': 'application/json', 'x-compute-request-id': 'req-d08781dd-d771-4672-a1ba-f20ce0e04ddc', 'x-openstack-request-id': 'req-d08781dd-d771-4672-a1ba-f20ce0e04ddc', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/4259d402-0f35-4626-95dd-51472f5b533b'} Body: b'{"itemNotFound": {"code": 404, "message": "GroupSnapshot 4259d402-0f35-4626-95dd-51472f5b533b could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:36.720 189 INFO tempest.lib.common.rest_client [req-44e24e6c-b245-4c36-9e05-881deddf7639 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/detail 0.087s 2020-12-14 02:33:36.724 189 DEBUG tempest.lib.common.rest_client [req-44e24e6c-b245-4c36-9e05-881deddf7639 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-44e24e6c-b245-4c36-9e05-881deddf7639', 'content-length': '1173', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-44e24e6c-b245-4c36-9e05-881deddf7639', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/detail'} Body: b'{"volumes": [{"id": "91a11778-6536-4646-afbe-8e3441645702", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:33.000000", "updated_at": "2020-12-14T02:33:33.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-991851048", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-29769000", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "e66c80d2-b98e-4c9c-a533-ef7d69254036", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:36.966 189 INFO tempest.lib.common.rest_client [req-921c5972-3167-40b6-bfd2-03a8e3bd45cf ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/e66c80d2-b98e-4c9c-a533-ef7d69254036/action 0.125s 2020-12-14 02:33:36.968 189 DEBUG tempest.lib.common.rest_client [req-921c5972-3167-40b6-bfd2-03a8e3bd45cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-921c5972-3167-40b6-bfd2-03a8e3bd45cf', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/e66c80d2-b98e-4c9c-a533-ef7d69254036/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:37.095 189 INFO tempest.lib.common.rest_client [req-c55223e4-0cef-4680-9ff4-fb5384c160f7 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702 0.118s 2020-12-14 02:33:37.098 189 DEBUG tempest.lib.common.rest_client [req-c55223e4-0cef-4680-9ff4-fb5384c160f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c55223e4-0cef-4680-9ff4-fb5384c160f7', 'content-length': '1169', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c55223e4-0cef-4680-9ff4-fb5384c160f7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702'} Body: b'{"volume": {"id": "91a11778-6536-4646-afbe-8e3441645702", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:33.000000", "updated_at": "2020-12-14T02:33:37.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-991851048", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-29769000", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "e66c80d2-b98e-4c9c-a533-ef7d69254036", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:38.268 189 INFO tempest.lib.common.rest_client [req-23d1a4b9-272a-4b95-bab2-f7eb51b47463 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702 0.065s 2020-12-14 02:33:38.272 189 DEBUG tempest.lib.common.rest_client [req-23d1a4b9-272a-4b95-bab2-f7eb51b47463 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-23d1a4b9-272a-4b95-bab2-f7eb51b47463', 'x-openstack-request-id': 'req-23d1a4b9-272a-4b95-bab2-f7eb51b47463', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 91a11778-6536-4646-afbe-8e3441645702 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:38.313 189 INFO tempest.lib.common.rest_client [req-241e4267-0d24-40f9-bc04-26c5bc0357f5 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/e66c80d2-b98e-4c9c-a533-ef7d69254036 0.033s 2020-12-14 02:33:38.316 189 DEBUG tempest.lib.common.rest_client [req-241e4267-0d24-40f9-bc04-26c5bc0357f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-241e4267-0d24-40f9-bc04-26c5bc0357f5', 'x-openstack-request-id': 'req-241e4267-0d24-40f9-bc04-26c5bc0357f5', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/e66c80d2-b98e-4c9c-a533-ef7d69254036'} Body: b'{"itemNotFound": {"code": 404, "message": "Group e66c80d2-b98e-4c9c-a533-ef7d69254036 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:38.379 189 INFO tempest.lib.common.rest_client [req-bbb20fb3-58eb-43cc-9a7b-c3e28c4f9c9e ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_types/037d6e3c-5819-4c29-9b87-d35521f8deb2 0.054s 2020-12-14 02:33:38.382 189 DEBUG tempest.lib.common.rest_client [req-bbb20fb3-58eb-43cc-9a7b-c3e28c4f9c9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bbb20fb3-58eb-43cc-9a7b-c3e28c4f9c9e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_types/037d6e3c-5819-4c29-9b87-d35521f8deb2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:38.457 189 INFO tempest.lib.common.rest_client [req-0c60a387-c5d1-4c30-b9e0-f834f42eb488 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types 0.054s 2020-12-14 02:33:38.461 189 DEBUG tempest.lib.common.rest_client [req-0c60a387-c5d1-4c30-b9e0-f834f42eb488 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupSnaphotsV314RbacTest-volume-type-2119792576"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0c60a387-c5d1-4c30-b9e0-f834f42eb488', 'content-length': '231', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0c60a387-c5d1-4c30-b9e0-f834f42eb488', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types'} Body: b'{"volume_type": {"id": "f76713fb-a656-40cd-bfa8-5e2f329affdc", "name": "tempest-GroupSnaphotsV314RbacTest-volume-type-2119792576", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:38.541 189 INFO tempest.lib.common.rest_client [req-3d6db368-e055-4185-9d18-f9d20aaf479c ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_types 0.053s 2020-12-14 02:33:38.544 189 DEBUG tempest.lib.common.rest_client [req-3d6db368-e055-4185-9d18-f9d20aaf479c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupSnaphotsV314RbacTest-group-type-1959788291"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3d6db368-e055-4185-9d18-f9d20aaf479c', 'content-length': '188', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3d6db368-e055-4185-9d18-f9d20aaf479c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_types'} Body: b'{"group_type": {"id": "85d2b3cc-915c-4857-881b-10ebe9580475", "name": "tempest-GroupSnaphotsV314RbacTest-group-type-1959788291", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:38.718 189 INFO tempest.lib.common.rest_client [req-ffcc4c1f-be72-4681-88bf-c759dc200a9c ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups 0.148s 2020-12-14 02:33:38.721 189 DEBUG tempest.lib.common.rest_client [req-ffcc4c1f-be72-4681-88bf-c759dc200a9c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group": {"group_type": "85d2b3cc-915c-4857-881b-10ebe9580475", "volume_types": ["f76713fb-a656-40cd-bfa8-5e2f329affdc"], "name": "tempest-GroupSnaphotsV314RbacTest-Group-2008059361"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ffcc4c1f-be72-4681-88bf-c759dc200a9c', 'content-length': '119', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ffcc4c1f-be72-4681-88bf-c759dc200a9c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups'} Body: b'{"group": {"id": "bf6c582b-52ee-42be-a61e-0d72444fb519", "name": "tempest-GroupSnaphotsV314RbacTest-Group-2008059361"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:38.791 189 INFO tempest.lib.common.rest_client [req-010d8eb9-5539-40ea-8d92-707d55c3295f ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/bf6c582b-52ee-42be-a61e-0d72444fb519 0.049s 2020-12-14 02:33:38.794 189 DEBUG tempest.lib.common.rest_client [req-010d8eb9-5539-40ea-8d92-707d55c3295f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-010d8eb9-5539-40ea-8d92-707d55c3295f', 'content-length': '399', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-010d8eb9-5539-40ea-8d92-707d55c3295f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/bf6c582b-52ee-42be-a61e-0d72444fb519'} Body: b'{"group": {"id": "bf6c582b-52ee-42be-a61e-0d72444fb519", "status": "creating", "availability_zone": "nova", "created_at": "2020-12-14T02:33:39.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group-2008059361", "description": null, "group_type": "85d2b3cc-915c-4857-881b-10ebe9580475", "volume_types": ["f76713fb-a656-40cd-bfa8-5e2f329affdc"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:39.884 189 INFO tempest.lib.common.rest_client [req-4cb6f9b4-bffe-44f0-9114-a2898faf3593 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/bf6c582b-52ee-42be-a61e-0d72444fb519 0.048s 2020-12-14 02:33:39.887 189 DEBUG tempest.lib.common.rest_client [req-4cb6f9b4-bffe-44f0-9114-a2898faf3593 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4cb6f9b4-bffe-44f0-9114-a2898faf3593', 'content-length': '400', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4cb6f9b4-bffe-44f0-9114-a2898faf3593', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/bf6c582b-52ee-42be-a61e-0d72444fb519'} Body: b'{"group": {"id": "bf6c582b-52ee-42be-a61e-0d72444fb519", "status": "available", "availability_zone": "nova", "created_at": "2020-12-14T02:33:39.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group-2008059361", "description": null, "group_type": "85d2b3cc-915c-4857-881b-10ebe9580475", "volume_types": ["f76713fb-a656-40cd-bfa8-5e2f329affdc"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:39.922 189 INFO tempest.common.waiters [-] group bf6c582b-52ee-42be-a61e-0d72444fb519 reached available after waiting for 1.921944 seconds 2020-12-14 02:33:40.248 189 INFO tempest.lib.common.rest_client [req-5368d497-a3fd-40f4-b783-7a10c748eced ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes 0.319s 2020-12-14 02:33:40.251 189 DEBUG tempest.lib.common.rest_client [req-5368d497-a3fd-40f4-b783-7a10c748eced ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"volume": {"volume_type": "f76713fb-a656-40cd-bfa8-5e2f329affdc", "group_id": "bf6c582b-52ee-42be-a61e-0d72444fb519", "size": 1, "name": "tempest-GroupSnaphotsV314RbacTest-Volume-976989957"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5368d497-a3fd-40f4-b783-7a10c748eced', 'content-length': '949', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5368d497-a3fd-40f4-b783-7a10c748eced', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes'} Body: b'{"volume": {"id": "a557d81f-3740-48ff-941b-302697380b5f", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:40.000000", "updated_at": null, "name": "tempest-GroupSnaphotsV314RbacTest-Volume-976989957", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-2119792576", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "bf6c582b-52ee-42be-a61e-0d72444fb519"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:40.443 189 INFO tempest.lib.common.rest_client [req-47619d8d-4f89-4125-85e3-690737b315e7 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f 0.101s 2020-12-14 02:33:40.447 189 DEBUG tempest.lib.common.rest_client [req-47619d8d-4f89-4125-85e3-690737b315e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-47619d8d-4f89-4125-85e3-690737b315e7', 'content-length': '1171', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-47619d8d-4f89-4125-85e3-690737b315e7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f'} Body: b'{"volume": {"id": "a557d81f-3740-48ff-941b-302697380b5f", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:40.000000", "updated_at": "2020-12-14T02:33:40.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-976989957", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-2119792576", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "bf6c582b-52ee-42be-a61e-0d72444fb519", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:41.659 189 INFO tempest.lib.common.rest_client [req-3717d766-82b5-4e93-aef3-f5a569ee18f6 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f 0.110s 2020-12-14 02:33:41.663 189 DEBUG tempest.lib.common.rest_client [req-3717d766-82b5-4e93-aef3-f5a569ee18f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3717d766-82b5-4e93-aef3-f5a569ee18f6', 'content-length': '1172', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3717d766-82b5-4e93-aef3-f5a569ee18f6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f'} Body: b'{"volume": {"id": "a557d81f-3740-48ff-941b-302697380b5f", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:40.000000", "updated_at": "2020-12-14T02:33:40.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-976989957", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-2119792576", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "bf6c582b-52ee-42be-a61e-0d72444fb519", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:41.755 189 INFO tempest.common.waiters [-] volume a557d81f-3740-48ff-941b-302697380b5f reached available after waiting for 1.754804 seconds 2020-12-14 02:33:41.757 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:33:41.776 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:get_all_group_snapshots, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:33:41.778 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:41.853 189 INFO tempest.lib.common.rest_client [req-a1ba3667-4485-4143-899b-3d89fd282251 ] Request (GroupSnaphotsV314RbacTest:test_list_group_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles 0.068s 2020-12-14 02:33:41.857 189 DEBUG tempest.lib.common.rest_client [req-a1ba3667-4485-4143-899b-3d89fd282251 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1ba3667-4485-4143-899b-3d89fd282251', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:41.910 189 INFO tempest.lib.common.rest_client [req-e6f706e9-0e61-4cb1-adb8-ce2ce272bb40 ] Request (GroupSnaphotsV314RbacTest:test_list_group_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:33:41.914 189 DEBUG tempest.lib.common.rest_client [req-e6f706e9-0e61-4cb1-adb8-ce2ce272bb40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6f706e9-0e61-4cb1-adb8-ce2ce272bb40', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "28ef673031b8426a8c6abb3bab9e02c8", "name": "tempest-GroupSnaphotsV314RbacTest-63038770", "password_expires_at": null}, "audit_ids": ["7H8wTuGzRFy6Lw9xVr9z2A"], "expires_at": "2020-12-14T03:33:41.000000Z", "issued_at": "2020-12-14T02:33:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a39d52319644308af2a589a7b3c7354", "name": "tempest-GroupSnaphotsV314RbacTest-63038770"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:42.003 189 INFO tempest.lib.common.rest_client [req-ff9dedd6-d21c-42cd-8da8-b0e13659da4e ] Request (GroupSnaphotsV314RbacTest:test_list_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots 0.079s 2020-12-14 02:33:42.005 189 DEBUG tempest.lib.common.rest_client [req-ff9dedd6-d21c-42cd-8da8-b0e13659da4e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ff9dedd6-d21c-42cd-8da8-b0e13659da4e', 'content-length': '23', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ff9dedd6-d21c-42cd-8da8-b0e13659da4e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots'} Body: b'{"group_snapshots": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:42.018 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:42.071 189 INFO tempest.lib.common.rest_client [req-33bd8a3d-7ebb-4fbe-8875-6edf9dc93bcc ] Request (GroupSnaphotsV314RbacTest:test_list_group_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles 0.048s 2020-12-14 02:33:42.074 189 DEBUG tempest.lib.common.rest_client [req-33bd8a3d-7ebb-4fbe-8875-6edf9dc93bcc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33bd8a3d-7ebb-4fbe-8875-6edf9dc93bcc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:42.118 189 INFO tempest.lib.common.rest_client [req-06690692-8d57-4931-8835-57d62ef2df2f ] Request (GroupSnaphotsV314RbacTest:test_list_group_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-14 02:33:42.121 189 DEBUG tempest.lib.common.rest_client [req-06690692-8d57-4931-8835-57d62ef2df2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06690692-8d57-4931-8835-57d62ef2df2f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "28ef673031b8426a8c6abb3bab9e02c8", "name": "tempest-GroupSnaphotsV314RbacTest-63038770", "password_expires_at": null}, "audit_ids": ["LOC_Q4fNRFGMxdVF4Bn_mA"], "expires_at": "2020-12-14T03:33:42.000000Z", "issued_at": "2020-12-14T02:33:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a39d52319644308af2a589a7b3c7354", "name": "tempest-GroupSnaphotsV314RbacTest-63038770"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:42.266 189 INFO tempest.lib.common.rest_client [req-78e12913-65fb-4e41-a0ad-76650a9aff6a ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/detail 0.136s 2020-12-14 02:33:42.269 189 DEBUG tempest.lib.common.rest_client [req-78e12913-65fb-4e41-a0ad-76650a9aff6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-78e12913-65fb-4e41-a0ad-76650a9aff6a', 'content-length': '1175', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-78e12913-65fb-4e41-a0ad-76650a9aff6a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/detail'} Body: b'{"volumes": [{"id": "a557d81f-3740-48ff-941b-302697380b5f", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:40.000000", "updated_at": "2020-12-14T02:33:40.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-976989957", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-2119792576", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "bf6c582b-52ee-42be-a61e-0d72444fb519", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:42.465 189 INFO tempest.lib.common.rest_client [req-3559086b-f585-47eb-b0c0-992620f45b3a ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/bf6c582b-52ee-42be-a61e-0d72444fb519/action 0.120s 2020-12-14 02:33:42.469 189 DEBUG tempest.lib.common.rest_client [req-3559086b-f585-47eb-b0c0-992620f45b3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3559086b-f585-47eb-b0c0-992620f45b3a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/bf6c582b-52ee-42be-a61e-0d72444fb519/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:42.610 189 INFO tempest.lib.common.rest_client [req-0952c433-6370-4955-8070-dd22782875d0 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f 0.133s 2020-12-14 02:33:42.613 189 DEBUG tempest.lib.common.rest_client [req-0952c433-6370-4955-8070-dd22782875d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0952c433-6370-4955-8070-dd22782875d0', 'content-length': '1171', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0952c433-6370-4955-8070-dd22782875d0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f'} Body: b'{"volume": {"id": "a557d81f-3740-48ff-941b-302697380b5f", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:40.000000", "updated_at": "2020-12-14T02:33:42.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-976989957", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-2119792576", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "bf6c582b-52ee-42be-a61e-0d72444fb519", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:43.798 189 INFO tempest.lib.common.rest_client [req-77b08dce-3767-426b-80ba-af3c8cd2aac0 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f 0.064s 2020-12-14 02:33:43.801 189 DEBUG tempest.lib.common.rest_client [req-77b08dce-3767-426b-80ba-af3c8cd2aac0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-77b08dce-3767-426b-80ba-af3c8cd2aac0', 'x-openstack-request-id': 'req-77b08dce-3767-426b-80ba-af3c8cd2aac0', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume a557d81f-3740-48ff-941b-302697380b5f could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:43.840 189 INFO tempest.lib.common.rest_client [req-4b9ee5eb-10bd-4160-ac3a-6df85a0aeb74 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/bf6c582b-52ee-42be-a61e-0d72444fb519 0.031s 2020-12-14 02:33:43.842 189 DEBUG tempest.lib.common.rest_client [req-4b9ee5eb-10bd-4160-ac3a-6df85a0aeb74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-4b9ee5eb-10bd-4160-ac3a-6df85a0aeb74', 'x-openstack-request-id': 'req-4b9ee5eb-10bd-4160-ac3a-6df85a0aeb74', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/bf6c582b-52ee-42be-a61e-0d72444fb519'} Body: b'{"itemNotFound": {"code": 404, "message": "Group bf6c582b-52ee-42be-a61e-0d72444fb519 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:43.902 189 INFO tempest.lib.common.rest_client [req-8f32291a-b569-443a-b86e-90a98c26993d ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_types/85d2b3cc-915c-4857-881b-10ebe9580475 0.052s 2020-12-14 02:33:43.904 189 DEBUG tempest.lib.common.rest_client [req-8f32291a-b569-443a-b86e-90a98c26993d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8f32291a-b569-443a-b86e-90a98c26993d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_types/85d2b3cc-915c-4857-881b-10ebe9580475'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:43.987 189 INFO tempest.lib.common.rest_client [req-25790fb4-3862-43dc-9fbf-bc9bc5d8219b ] Request (GroupSnaphotsV314RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types 0.064s 2020-12-14 02:33:43.990 189 DEBUG tempest.lib.common.rest_client [req-25790fb4-3862-43dc-9fbf-bc9bc5d8219b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupSnaphotsV314RbacTest-volume-type-1154337731"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-25790fb4-3862-43dc-9fbf-bc9bc5d8219b', 'content-length': '231', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-25790fb4-3862-43dc-9fbf-bc9bc5d8219b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types'} Body: b'{"volume_type": {"id": "51e217f0-b127-4fae-babc-b33fc0f4fbec", "name": "tempest-GroupSnaphotsV314RbacTest-volume-type-1154337731", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:44.072 189 INFO tempest.lib.common.rest_client [req-e218b6ce-7807-46cd-8815-17db347c53f7 ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_types 0.054s 2020-12-14 02:33:44.075 189 DEBUG tempest.lib.common.rest_client [req-e218b6ce-7807-46cd-8815-17db347c53f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupSnaphotsV314RbacTest-group-type-1591346443"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e218b6ce-7807-46cd-8815-17db347c53f7', 'content-length': '188', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e218b6ce-7807-46cd-8815-17db347c53f7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_types'} Body: b'{"group_type": {"id": "740f6e39-8582-44b2-8195-6d89449551ab", "name": "tempest-GroupSnaphotsV314RbacTest-group-type-1591346443", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:44.249 189 INFO tempest.lib.common.rest_client [req-e7c4d9c1-63c8-40f9-9322-6b545d115800 ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups 0.147s 2020-12-14 02:33:44.253 189 DEBUG tempest.lib.common.rest_client [req-e7c4d9c1-63c8-40f9-9322-6b545d115800 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group": {"group_type": "740f6e39-8582-44b2-8195-6d89449551ab", "volume_types": ["51e217f0-b127-4fae-babc-b33fc0f4fbec"], "name": "tempest-GroupSnaphotsV314RbacTest-Group-505631784"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e7c4d9c1-63c8-40f9-9322-6b545d115800', 'content-length': '118', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e7c4d9c1-63c8-40f9-9322-6b545d115800', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups'} Body: b'{"group": {"id": "f7de480c-c7f0-4628-8cea-e8a18bf8132d", "name": "tempest-GroupSnaphotsV314RbacTest-Group-505631784"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:44.323 189 INFO tempest.lib.common.rest_client [req-152f181a-1402-43f1-a790-7a6df29702d7 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/f7de480c-c7f0-4628-8cea-e8a18bf8132d 0.051s 2020-12-14 02:33:44.326 189 DEBUG tempest.lib.common.rest_client [req-152f181a-1402-43f1-a790-7a6df29702d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-152f181a-1402-43f1-a790-7a6df29702d7', 'content-length': '398', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-152f181a-1402-43f1-a790-7a6df29702d7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/f7de480c-c7f0-4628-8cea-e8a18bf8132d'} Body: b'{"group": {"id": "f7de480c-c7f0-4628-8cea-e8a18bf8132d", "status": "creating", "availability_zone": "nova", "created_at": "2020-12-14T02:33:44.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group-505631784", "description": null, "group_type": "740f6e39-8582-44b2-8195-6d89449551ab", "volume_types": ["51e217f0-b127-4fae-babc-b33fc0f4fbec"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:45.412 189 INFO tempest.lib.common.rest_client [req-ab911dc2-7c41-4910-a364-50bbafbc21b6 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/f7de480c-c7f0-4628-8cea-e8a18bf8132d 0.053s 2020-12-14 02:33:45.416 189 DEBUG tempest.lib.common.rest_client [req-ab911dc2-7c41-4910-a364-50bbafbc21b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ab911dc2-7c41-4910-a364-50bbafbc21b6', 'content-length': '399', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ab911dc2-7c41-4910-a364-50bbafbc21b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/f7de480c-c7f0-4628-8cea-e8a18bf8132d'} Body: b'{"group": {"id": "f7de480c-c7f0-4628-8cea-e8a18bf8132d", "status": "available", "availability_zone": "nova", "created_at": "2020-12-14T02:33:44.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Group-505631784", "description": null, "group_type": "740f6e39-8582-44b2-8195-6d89449551ab", "volume_types": ["51e217f0-b127-4fae-babc-b33fc0f4fbec"], "group_snapshot_id": null, "source_group_id": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:45.449 189 INFO tempest.common.waiters [-] group f7de480c-c7f0-4628-8cea-e8a18bf8132d reached available after waiting for 1.449600 seconds 2020-12-14 02:33:45.774 189 INFO tempest.lib.common.rest_client [req-3eabf453-8190-4c96-ad9f-82578fb61f76 ] Request (GroupSnaphotsV314RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes 0.319s 2020-12-14 02:33:45.776 189 DEBUG tempest.lib.common.rest_client [req-3eabf453-8190-4c96-ad9f-82578fb61f76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"volume": {"volume_type": "51e217f0-b127-4fae-babc-b33fc0f4fbec", "group_id": "f7de480c-c7f0-4628-8cea-e8a18bf8132d", "size": 1, "name": "tempest-GroupSnaphotsV314RbacTest-Volume-672623366"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3eabf453-8190-4c96-ad9f-82578fb61f76', 'content-length': '949', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3eabf453-8190-4c96-ad9f-82578fb61f76', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes'} Body: b'{"volume": {"id": "384b44c7-c459-4649-80ad-de671c4526a2", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:46.000000", "updated_at": null, "name": "tempest-GroupSnaphotsV314RbacTest-Volume-672623366", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1154337731", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "f7de480c-c7f0-4628-8cea-e8a18bf8132d"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:45.950 189 INFO tempest.lib.common.rest_client [req-011b5ee8-4b73-4545-a778-5672105d2ce9 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2 0.104s 2020-12-14 02:33:45.954 189 DEBUG tempest.lib.common.rest_client [req-011b5ee8-4b73-4545-a778-5672105d2ce9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-011b5ee8-4b73-4545-a778-5672105d2ce9', 'content-length': '1171', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-011b5ee8-4b73-4545-a778-5672105d2ce9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2'} Body: b'{"volume": {"id": "384b44c7-c459-4649-80ad-de671c4526a2", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:46.000000", "updated_at": "2020-12-14T02:33:46.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-672623366", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1154337731", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "f7de480c-c7f0-4628-8cea-e8a18bf8132d", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:47.161 189 INFO tempest.lib.common.rest_client [req-cdc5edbf-2239-4d25-92b5-bddcfe960c29 ] Request (GroupSnaphotsV314RbacTest:setUp): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2 0.109s 2020-12-14 02:33:47.165 189 DEBUG tempest.lib.common.rest_client [req-cdc5edbf-2239-4d25-92b5-bddcfe960c29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-cdc5edbf-2239-4d25-92b5-bddcfe960c29', 'content-length': '1172', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-cdc5edbf-2239-4d25-92b5-bddcfe960c29', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2'} Body: b'{"volume": {"id": "384b44c7-c459-4649-80ad-de671c4526a2", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:46.000000", "updated_at": "2020-12-14T02:33:46.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-672623366", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1154337731", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "f7de480c-c7f0-4628-8cea-e8a18bf8132d", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:47.256 189 INFO tempest.common.waiters [-] volume 384b44c7-c459-4649-80ad-de671c4526a2 reached available after waiting for 1.256259 seconds 2020-12-14 02:33:47.259 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:33:47.277 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:get_group_snapshot, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:33:47.463 189 INFO tempest.lib.common.rest_client [req-5bb11474-2b50-474c-be69-06a936037dac ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots 0.179s 2020-12-14 02:33:47.466 189 DEBUG tempest.lib.common.rest_client [req-5bb11474-2b50-474c-be69-06a936037dac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"group_snapshot": {"group_id": "f7de480c-c7f0-4628-8cea-e8a18bf8132d", "name": "tempest-group_snapshot-807843098"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5bb11474-2b50-474c-be69-06a936037dac', 'content-length': '167', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5bb11474-2b50-474c-be69-06a936037dac', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots'} Body: b'{"group_snapshot": {"id": "7276a1d9-f3b9-467f-863a-4a298c49a7a3", "name": "tempest-group_snapshot-807843098", "group_type_id": "740f6e39-8582-44b2-8195-6d89449551ab"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:47.534 189 INFO tempest.lib.common.rest_client [req-eb6d6ef4-b8ed-449b-a0a7-c16e427cd7b8 ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/7276a1d9-f3b9-467f-863a-4a298c49a7a3 0.044s 2020-12-14 02:33:47.537 189 DEBUG tempest.lib.common.rest_client [req-eb6d6ef4-b8ed-449b-a0a7-c16e427cd7b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-eb6d6ef4-b8ed-449b-a0a7-c16e427cd7b8', 'content-length': '306', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-eb6d6ef4-b8ed-449b-a0a7-c16e427cd7b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/7276a1d9-f3b9-467f-863a-4a298c49a7a3'} Body: b'{"group_snapshot": {"id": "7276a1d9-f3b9-467f-863a-4a298c49a7a3", "group_id": "f7de480c-c7f0-4628-8cea-e8a18bf8132d", "group_type_id": "740f6e39-8582-44b2-8195-6d89449551ab", "status": "creating", "created_at": "2020-12-14T02:33:47.000000", "name": "tempest-group_snapshot-807843098", "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:48.613 189 INFO tempest.lib.common.rest_client [req-2e880a31-ac0c-430a-a43e-b7bee8dedc3d ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/7276a1d9-f3b9-467f-863a-4a298c49a7a3 0.045s 2020-12-14 02:33:48.616 189 DEBUG tempest.lib.common.rest_client [req-2e880a31-ac0c-430a-a43e-b7bee8dedc3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2e880a31-ac0c-430a-a43e-b7bee8dedc3d', 'content-length': '307', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2e880a31-ac0c-430a-a43e-b7bee8dedc3d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/7276a1d9-f3b9-467f-863a-4a298c49a7a3'} Body: b'{"group_snapshot": {"id": "7276a1d9-f3b9-467f-863a-4a298c49a7a3", "group_id": "f7de480c-c7f0-4628-8cea-e8a18bf8132d", "group_type_id": "740f6e39-8582-44b2-8195-6d89449551ab", "status": "available", "created_at": "2020-12-14T02:33:47.000000", "name": "tempest-group_snapshot-807843098", "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:48.641 189 INFO tempest.common.waiters [-] group_snapshot 7276a1d9-f3b9-467f-863a-4a298c49a7a3 reached available after waiting for 1.640899 seconds 2020-12-14 02:33:48.681 189 INFO tempest.lib.common.rest_client [req-4c3a2156-815d-4d31-bf83-fbc2f20291c7 ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/detail 0.035s 2020-12-14 02:33:48.684 189 DEBUG tempest.lib.common.rest_client [req-4c3a2156-815d-4d31-bf83-fbc2f20291c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4c3a2156-815d-4d31-bf83-fbc2f20291c7', 'content-length': '453', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4c3a2156-815d-4d31-bf83-fbc2f20291c7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/detail'} Body: b'{"snapshots": [{"id": "5299653a-198e-4faa-baf4-f9b49d49e2af", "created_at": "2020-12-14T02:33:47.000000", "updated_at": "2020-12-14T02:33:48.000000", "name": "tempest-group_snapshot-807843098", "description": null, "volume_id": "384b44c7-c459-4649-80ad-de671c4526a2", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "9a39d52319644308af2a589a7b3c7354", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:48.774 189 INFO tempest.lib.common.rest_client [req-0ccdb5db-e764-4c8b-9295-000c953cd9c7 ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/5299653a-198e-4faa-baf4-f9b49d49e2af 0.045s 2020-12-14 02:33:48.777 189 DEBUG tempest.lib.common.rest_client [req-0ccdb5db-e764-4c8b-9295-000c953cd9c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0ccdb5db-e764-4c8b-9295-000c953cd9c7', 'content-length': '450', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0ccdb5db-e764-4c8b-9295-000c953cd9c7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/5299653a-198e-4faa-baf4-f9b49d49e2af'} Body: b'{"snapshot": {"id": "5299653a-198e-4faa-baf4-f9b49d49e2af", "created_at": "2020-12-14T02:33:47.000000", "updated_at": "2020-12-14T02:33:48.000000", "name": "tempest-group_snapshot-807843098", "description": null, "volume_id": "384b44c7-c459-4649-80ad-de671c4526a2", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "9a39d52319644308af2a589a7b3c7354", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:48.809 189 INFO tempest.common.waiters [-] snapshot 5299653a-198e-4faa-baf4-f9b49d49e2af reached available after waiting for 0.809286 seconds 2020-12-14 02:33:48.811 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:48.986 189 INFO tempest.lib.common.rest_client [req-c579873f-ecea-47f7-9799-6b7dd2871322 ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles 0.168s 2020-12-14 02:33:48.990 189 DEBUG tempest.lib.common.rest_client [req-c579873f-ecea-47f7-9799-6b7dd2871322 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c579873f-ecea-47f7-9799-6b7dd2871322', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:49.087 189 INFO tempest.lib.common.rest_client [req-55d90a48-f0b9-4a58-ac60-a554ba5140c0 ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-14 02:33:49.092 189 DEBUG tempest.lib.common.rest_client [req-55d90a48-f0b9-4a58-ac60-a554ba5140c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55d90a48-f0b9-4a58-ac60-a554ba5140c0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "28ef673031b8426a8c6abb3bab9e02c8", "name": "tempest-GroupSnaphotsV314RbacTest-63038770", "password_expires_at": null}, "audit_ids": ["EBrXObduQVyY7oNkpkL1Fg"], "expires_at": "2020-12-14T03:33:49.000000Z", "issued_at": "2020-12-14T02:33:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a39d52319644308af2a589a7b3c7354", "name": "tempest-GroupSnaphotsV314RbacTest-63038770"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:49.248 189 INFO tempest.lib.common.rest_client [req-3fa4e573-c769-4cf1-88f1-494420439f1d ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/7276a1d9-f3b9-467f-863a-4a298c49a7a3 0.148s 2020-12-14 02:33:49.252 189 DEBUG tempest.lib.common.rest_client [req-3fa4e573-c769-4cf1-88f1-494420439f1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-3fa4e573-c769-4cf1-88f1-494420439f1d', 'content-length': '307', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3fa4e573-c769-4cf1-88f1-494420439f1d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/7276a1d9-f3b9-467f-863a-4a298c49a7a3'} Body: b'{"group_snapshot": {"id": "7276a1d9-f3b9-467f-863a-4a298c49a7a3", "group_id": "f7de480c-c7f0-4628-8cea-e8a18bf8132d", "group_type_id": "740f6e39-8582-44b2-8195-6d89449551ab", "status": "available", "created_at": "2020-12-14T02:33:47.000000", "name": "tempest-group_snapshot-807843098", "description": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:49.277 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:49.349 189 INFO tempest.lib.common.rest_client [req-5c9a2173-57d2-4ffa-9909-eace37eb326b ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 200 GET http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles 0.065s 2020-12-14 02:33:49.351 189 DEBUG tempest.lib.common.rest_client [req-5c9a2173-57d2-4ffa-9909-eace37eb326b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c9a2173-57d2-4ffa-9909-eace37eb326b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354/users/28ef673031b8426a8c6abb3bab9e02c8/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:49.399 189 INFO tempest.lib.common.rest_client [req-e2e77c98-8ec9-43f4-99c0-8f8299bef3cf ] Request (GroupSnaphotsV314RbacTest:test_show_group_snapshot_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:33:49.401 189 DEBUG tempest.lib.common.rest_client [req-e2e77c98-8ec9-43f4-99c0-8f8299bef3cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e2e77c98-8ec9-43f4-99c0-8f8299bef3cf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "28ef673031b8426a8c6abb3bab9e02c8", "name": "tempest-GroupSnaphotsV314RbacTest-63038770", "password_expires_at": null}, "audit_ids": ["DpIDunydRc-QRYm-pVQf2A"], "expires_at": "2020-12-14T03:33:49.000000Z", "issued_at": "2020-12-14T02:33:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a39d52319644308af2a589a7b3c7354", "name": "tempest-GroupSnaphotsV314RbacTest-63038770"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a39d52319644308af2a589a7b3c7354", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:49.538 189 INFO tempest.lib.common.rest_client [req-7b46854f-c75d-44a1-8134-a8cb7b978536 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/7276a1d9-f3b9-467f-863a-4a298c49a7a3 0.127s 2020-12-14 02:33:49.541 189 DEBUG tempest.lib.common.rest_client [req-7b46854f-c75d-44a1-8134-a8cb7b978536 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7b46854f-c75d-44a1-8134-a8cb7b978536', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/7276a1d9-f3b9-467f-863a-4a298c49a7a3'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:49.637 189 INFO tempest.lib.common.rest_client [req-cca35b05-3eab-4103-94d8-3f57a5f7d387 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/detail 0.087s 2020-12-14 02:33:49.641 189 DEBUG tempest.lib.common.rest_client [req-cca35b05-3eab-4103-94d8-3f57a5f7d387 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-cca35b05-3eab-4103-94d8-3f57a5f7d387', 'content-length': '1175', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-cca35b05-3eab-4103-94d8-3f57a5f7d387', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/detail'} Body: b'{"volumes": [{"id": "384b44c7-c459-4649-80ad-de671c4526a2", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:46.000000", "updated_at": "2020-12-14T02:33:46.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-672623366", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1154337731", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "f7de480c-c7f0-4628-8cea-e8a18bf8132d", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:49.787 189 INFO tempest.lib.common.rest_client [req-7bcbe444-291d-4e1e-bc0f-cfd3cbbbe154 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/detail 0.039s 2020-12-14 02:33:49.791 189 DEBUG tempest.lib.common.rest_client [req-7bcbe444-291d-4e1e-bc0f-cfd3cbbbe154 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-7bcbe444-291d-4e1e-bc0f-cfd3cbbbe154', 'content-length': '451', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-7bcbe444-291d-4e1e-bc0f-cfd3cbbbe154', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/detail'} Body: b'{"snapshots": [{"id": "5299653a-198e-4faa-baf4-f9b49d49e2af", "created_at": "2020-12-14T02:33:47.000000", "updated_at": "2020-12-14T02:33:50.000000", "name": "tempest-group_snapshot-807843098", "description": null, "volume_id": "384b44c7-c459-4649-80ad-de671c4526a2", "status": "deleted", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "9a39d52319644308af2a589a7b3c7354", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:49.879 189 INFO tempest.lib.common.rest_client [req-43d95e01-9bb6-4496-b60e-cce21710efde ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/5299653a-198e-4faa-baf4-f9b49d49e2af 0.043s 2020-12-14 02:33:49.882 189 DEBUG tempest.lib.common.rest_client [req-43d95e01-9bb6-4496-b60e-cce21710efde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-43d95e01-9bb6-4496-b60e-cce21710efde', 'x-openstack-request-id': 'req-43d95e01-9bb6-4496-b60e-cce21710efde', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/snapshots/5299653a-198e-4faa-baf4-f9b49d49e2af'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 5299653a-198e-4faa-baf4-f9b49d49e2af could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:49.918 189 INFO tempest.lib.common.rest_client [req-26e2373b-650f-42f0-95bf-275bd385aba4 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/7276a1d9-f3b9-467f-863a-4a298c49a7a3 0.029s 2020-12-14 02:33:49.920 189 DEBUG tempest.lib.common.rest_client [req-26e2373b-650f-42f0-95bf-275bd385aba4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '116', 'content-type': 'application/json', 'x-compute-request-id': 'req-26e2373b-650f-42f0-95bf-275bd385aba4', 'x-openstack-request-id': 'req-26e2373b-650f-42f0-95bf-275bd385aba4', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_snapshots/7276a1d9-f3b9-467f-863a-4a298c49a7a3'} Body: b'{"itemNotFound": {"code": 404, "message": "GroupSnapshot 7276a1d9-f3b9-467f-863a-4a298c49a7a3 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:50.027 189 INFO tempest.lib.common.rest_client [req-d8d779ec-8cb7-4442-87ca-16eed501d525 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/detail 0.098s 2020-12-14 02:33:50.030 189 DEBUG tempest.lib.common.rest_client [req-d8d779ec-8cb7-4442-87ca-16eed501d525 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d8d779ec-8cb7-4442-87ca-16eed501d525', 'content-length': '1175', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d8d779ec-8cb7-4442-87ca-16eed501d525', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/detail'} Body: b'{"volumes": [{"id": "384b44c7-c459-4649-80ad-de671c4526a2", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:46.000000", "updated_at": "2020-12-14T02:33:46.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-672623366", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1154337731", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "f7de480c-c7f0-4628-8cea-e8a18bf8132d", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:50.262 189 INFO tempest.lib.common.rest_client [req-bac72d53-af41-499c-9361-b44c92c3f461 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/f7de480c-c7f0-4628-8cea-e8a18bf8132d/action 0.124s 2020-12-14 02:33:50.265 189 DEBUG tempest.lib.common.rest_client [req-bac72d53-af41-499c-9361-b44c92c3f461 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bac72d53-af41-499c-9361-b44c92c3f461', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/f7de480c-c7f0-4628-8cea-e8a18bf8132d/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:50.378 189 INFO tempest.lib.common.rest_client [req-0034889c-f4bf-431b-913f-3db27174b170 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2 0.104s 2020-12-14 02:33:50.380 189 DEBUG tempest.lib.common.rest_client [req-0034889c-f4bf-431b-913f-3db27174b170 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0034889c-f4bf-431b-913f-3db27174b170', 'content-length': '1171', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0034889c-f4bf-431b-913f-3db27174b170', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2'} Body: b'{"volume": {"id": "384b44c7-c459-4649-80ad-de671c4526a2", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:33:46.000000", "updated_at": "2020-12-14T02:33:50.000000", "name": "tempest-GroupSnaphotsV314RbacTest-Volume-672623366", "description": null, "volume_type": "tempest-GroupSnaphotsV314RbacTest-volume-type-1154337731", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2"}], "user_id": "28ef673031b8426a8c6abb3bab9e02c8", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "group_id": "f7de480c-c7f0-4628-8cea-e8a18bf8132d", "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9a39d52319644308af2a589a7b3c7354"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:51.548 189 INFO tempest.lib.common.rest_client [req-77f782fa-3a94-40de-8a1b-5a3559eb59fe ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2 0.064s 2020-12-14 02:33:51.551 189 DEBUG tempest.lib.common.rest_client [req-77f782fa-3a94-40de-8a1b-5a3559eb59fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-77f782fa-3a94-40de-8a1b-5a3559eb59fe', 'x-openstack-request-id': 'req-77f782fa-3a94-40de-8a1b-5a3559eb59fe', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 384b44c7-c459-4649-80ad-de671c4526a2 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:51.590 189 INFO tempest.lib.common.rest_client [req-c7e7228f-537f-4421-9ba8-06c05d574cbc ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/f7de480c-c7f0-4628-8cea-e8a18bf8132d 0.031s 2020-12-14 02:33:51.592 189 DEBUG tempest.lib.common.rest_client [req-c7e7228f-537f-4421-9ba8-06c05d574cbc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-c7e7228f-537f-4421-9ba8-06c05d574cbc', 'x-openstack-request-id': 'req-c7e7228f-537f-4421-9ba8-06c05d574cbc', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/groups/f7de480c-c7f0-4628-8cea-e8a18bf8132d'} Body: b'{"itemNotFound": {"code": 404, "message": "Group f7de480c-c7f0-4628-8cea-e8a18bf8132d could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:51.650 189 INFO tempest.lib.common.rest_client [req-26a9c38b-0b0a-4ffb-a0a5-993948374a40 ] Request (GroupSnaphotsV314RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_types/740f6e39-8582-44b2-8195-6d89449551ab 0.050s 2020-12-14 02:33:51.652 189 DEBUG tempest.lib.common.rest_client [req-26a9c38b-0b0a-4ffb-a0a5-993948374a40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.14', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.14', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-26a9c38b-0b0a-4ffb-a0a5-993948374a40', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/group_types/740f6e39-8582-44b2-8195-6d89449551ab'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:51.730 189 INFO tempest.lib.common.rest_client [req-13e0a012-70fd-425c-ab65-cd317e206002 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2 0.057s 2020-12-14 02:33:51.732 189 DEBUG tempest.lib.common.rest_client [req-13e0a012-70fd-425c-ab65-cd317e206002 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-13e0a012-70fd-425c-ab65-cd317e206002', 'x-openstack-request-id': 'req-13e0a012-70fd-425c-ab65-cd317e206002', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/384b44c7-c459-4649-80ad-de671c4526a2'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 384b44c7-c459-4649-80ad-de671c4526a2 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:51.833 189 INFO tempest.lib.common.rest_client [req-6c5f42de-7e02-4be1-9d7c-39805d72bbc8 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types/51e217f0-b127-4fae-babc-b33fc0f4fbec 0.094s 2020-12-14 02:33:51.836 189 DEBUG tempest.lib.common.rest_client [req-6c5f42de-7e02-4be1-9d7c-39805d72bbc8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6c5f42de-7e02-4be1-9d7c-39805d72bbc8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types/51e217f0-b127-4fae-babc-b33fc0f4fbec'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:51.874 189 INFO tempest.lib.common.rest_client [req-a1d6d8f1-fda5-44c2-9918-c312cada7890 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types/51e217f0-b127-4fae-babc-b33fc0f4fbec 0.032s 2020-12-14 02:33:51.876 189 DEBUG tempest.lib.common.rest_client [req-a1d6d8f1-fda5-44c2-9918-c312cada7890 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-a1d6d8f1-fda5-44c2-9918-c312cada7890', 'x-openstack-request-id': 'req-a1d6d8f1-fda5-44c2-9918-c312cada7890', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types/51e217f0-b127-4fae-babc-b33fc0f4fbec'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 51e217f0-b127-4fae-babc-b33fc0f4fbec could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:51.939 189 INFO tempest.lib.common.rest_client [req-ea6d1c64-366e-4438-9979-75f1f8115247 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f 0.057s 2020-12-14 02:33:51.942 189 DEBUG tempest.lib.common.rest_client [req-ea6d1c64-366e-4438-9979-75f1f8115247 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-ea6d1c64-366e-4438-9979-75f1f8115247', 'x-openstack-request-id': 'req-ea6d1c64-366e-4438-9979-75f1f8115247', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/a557d81f-3740-48ff-941b-302697380b5f'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume a557d81f-3740-48ff-941b-302697380b5f could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:52.031 189 INFO tempest.lib.common.rest_client [req-0e147cb7-7c65-4d00-9752-30b3a64c8d23 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types/f76713fb-a656-40cd-bfa8-5e2f329affdc 0.082s 2020-12-14 02:33:52.034 189 DEBUG tempest.lib.common.rest_client [req-0e147cb7-7c65-4d00-9752-30b3a64c8d23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0e147cb7-7c65-4d00-9752-30b3a64c8d23', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types/f76713fb-a656-40cd-bfa8-5e2f329affdc'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:52.073 189 INFO tempest.lib.common.rest_client [req-19807173-7ccd-4103-9150-b278381bfaad ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types/f76713fb-a656-40cd-bfa8-5e2f329affdc 0.033s 2020-12-14 02:33:52.075 189 DEBUG tempest.lib.common.rest_client [req-19807173-7ccd-4103-9150-b278381bfaad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-19807173-7ccd-4103-9150-b278381bfaad', 'x-openstack-request-id': 'req-19807173-7ccd-4103-9150-b278381bfaad', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types/f76713fb-a656-40cd-bfa8-5e2f329affdc'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type f76713fb-a656-40cd-bfa8-5e2f329affdc could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:52.140 189 INFO tempest.lib.common.rest_client [req-b4b38b5a-6de1-4355-ad46-1f650d8cdeba ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702 0.060s 2020-12-14 02:33:52.142 189 DEBUG tempest.lib.common.rest_client [req-b4b38b5a-6de1-4355-ad46-1f650d8cdeba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-b4b38b5a-6de1-4355-ad46-1f650d8cdeba', 'x-openstack-request-id': 'req-b4b38b5a-6de1-4355-ad46-1f650d8cdeba', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/91a11778-6536-4646-afbe-8e3441645702'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 91a11778-6536-4646-afbe-8e3441645702 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:52.212 189 INFO tempest.lib.common.rest_client [req-3403e610-78ec-4824-9852-8b2373e281b9 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types/ef681b91-63ef-4329-b7f1-fefb092aef45 0.064s 2020-12-14 02:33:52.214 189 DEBUG tempest.lib.common.rest_client [req-3403e610-78ec-4824-9852-8b2373e281b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3403e610-78ec-4824-9852-8b2373e281b9', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types/ef681b91-63ef-4329-b7f1-fefb092aef45'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:52.254 189 INFO tempest.lib.common.rest_client [req-8e49d61b-3116-4a28-814f-372cd66b9801 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types/ef681b91-63ef-4329-b7f1-fefb092aef45 0.033s 2020-12-14 02:33:52.256 189 DEBUG tempest.lib.common.rest_client [req-8e49d61b-3116-4a28-814f-372cd66b9801 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-8e49d61b-3116-4a28-814f-372cd66b9801', 'x-openstack-request-id': 'req-8e49d61b-3116-4a28-814f-372cd66b9801', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types/ef681b91-63ef-4329-b7f1-fefb092aef45'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type ef681b91-63ef-4329-b7f1-fefb092aef45 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:52.324 189 INFO tempest.lib.common.rest_client [req-9a8eaeeb-bd4a-4913-9c23-380f0302d67c ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f 0.061s 2020-12-14 02:33:52.327 189 DEBUG tempest.lib.common.rest_client [req-9a8eaeeb-bd4a-4913-9c23-380f0302d67c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-9a8eaeeb-bd4a-4913-9c23-380f0302d67c', 'x-openstack-request-id': 'req-9a8eaeeb-bd4a-4913-9c23-380f0302d67c', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/volumes/82b56fd0-1f57-48d5-9725-e6c6a4bc103f'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 82b56fd0-1f57-48d5-9725-e6c6a4bc103f could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:52.403 189 INFO tempest.lib.common.rest_client [req-0e4c1f8d-5665-4b0a-bbfc-ceeb7d7a0209 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types/225c446a-4aef-4f3b-934e-8a050e5fb876 0.071s 2020-12-14 02:33:52.405 189 DEBUG tempest.lib.common.rest_client [req-0e4c1f8d-5665-4b0a-bbfc-ceeb7d7a0209 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0e4c1f8d-5665-4b0a-bbfc-ceeb7d7a0209', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types/225c446a-4aef-4f3b-934e-8a050e5fb876'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:52.443 189 INFO tempest.lib.common.rest_client [req-1465128d-a6d0-4827-93a3-2a4ec4649a6f ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types/225c446a-4aef-4f3b-934e-8a050e5fb876 0.032s 2020-12-14 02:33:52.446 189 DEBUG tempest.lib.common.rest_client [req-1465128d-a6d0-4827-93a3-2a4ec4649a6f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-1465128d-a6d0-4827-93a3-2a4ec4649a6f', 'x-openstack-request-id': 'req-1465128d-a6d0-4827-93a3-2a4ec4649a6f', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/9a39d52319644308af2a589a7b3c7354/types/225c446a-4aef-4f3b-934e-8a050e5fb876'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 225c446a-4aef-4f3b-934e-8a050e5fb876 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:52.594 189 INFO tempest.lib.common.rest_client [req-8a8b79df-20e9-4ddc-87a4-5f920dd105db ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/28ef673031b8426a8c6abb3bab9e02c8 0.141s 2020-12-14 02:33:52.596 189 DEBUG tempest.lib.common.rest_client [req-8a8b79df-20e9-4ddc-87a4-5f920dd105db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a8b79df-20e9-4ddc-87a4-5f920dd105db', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/28ef673031b8426a8c6abb3bab9e02c8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:52.711 189 INFO tempest.lib.common.rest_client [req-691a4b87-106c-44c0-af2d-147b44e652ab ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-12-14 02:33:52.714 189 DEBUG tempest.lib.common.rest_client [req-691a4b87-106c-44c0-af2d-147b44e652ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-691a4b87-106c-44c0-af2d-147b44e652ab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Bc77KJY9SyyXLkyV-3-6SA"], "expires_at": "2020-12-14T03:33:52.000000Z", "issued_at": "2020-12-14T02:33:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:53.035 189 INFO tempest.lib.common.rest_client [req-168497dd-eac9-411f-80c8-07700e241b56 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=9a39d52319644308af2a589a7b3c7354&name=default 0.315s 2020-12-14 02:33:53.037 189 DEBUG tempest.lib.common.rest_client [req-168497dd-eac9-411f-80c8-07700e241b56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-168497dd-eac9-411f-80c8-07700e241b56', 'date': 'Mon, 14 Dec 2020 02:33:53 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=9a39d52319644308af2a589a7b3c7354&name=default'} Body: b'{"security_groups": [{"id": "a8b41f27-5adf-422f-b3d4-e605fb5c4c90", "name": "default", "stateful": true, "tenant_id": "9a39d52319644308af2a589a7b3c7354", "description": "Default security group", "security_group_rules": [{"id": "3b156484-b1b0-45ad-ad66-c89ca6868d50", "tenant_id": "9a39d52319644308af2a589a7b3c7354", "security_group_id": "a8b41f27-5adf-422f-b3d4-e605fb5c4c90", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:33:52Z", "updated_at": "2020-12-14T02:33:52Z", "revision_number": 0, "project_id": "9a39d52319644308af2a589a7b3c7354"}, {"id": "5714876d-b1df-46ed-acbe-77396d5481d6", "tenant_id": "9a39d52319644308af2a589a7b3c7354", "security_group_id": "a8b41f27-5adf-422f-b3d4-e605fb5c4c90", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:33:52Z", "updated_at": "2020-12-14T02:33:52Z", "revision_number": 0, "project_id": "9a39d52319644308af2a589a7b3c7354"}, {"id": "8a291977-9fc0-471a-a8fa-07bbfaf6c15f", "tenant_id": "9a39d52319644308af2a589a7b3c7354", "security_group_id": "a8b41f27-5adf-422f-b3d4-e605fb5c4c90", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a8b41f27-5adf-422f-b3d4-e605fb5c4c90", "description": null, "tags": [], "created_at": "2020-12-14T02:33:52Z", "updated_at": "2020-12-14T02:33:52Z", "revision_number": 0, "project_id": "9a39d52319644308af2a589a7b3c7354"}, {"id": "eb2de05f-b5ac-4e94-aefd-3f435e91611b", "tenant_id": "9a39d52319644308af2a589a7b3c7354", "security_group_id": "a8b41f27-5adf-422f-b3d4-e605fb5c4c90", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "a8b41f27-5adf-422f-b3d4-e605fb5c4c90", "description": null, "tags": [], "created_at": "2020-12-14T02:33:52Z", "updated_at": "2020-12-14T02:33:52Z", "revision_number": 0, "project_id": "9a39d52319644308af2a589a7b3c7354"}], "tags": [], "created_at": "2020-12-14T02:33:52Z", "updated_at": "2020-12-14T02:33:52Z", "revision_number": 1, "project_id": "9a39d52319644308af2a589a7b3c7354"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:53.189 189 INFO tempest.lib.common.rest_client [req-a2a6d29d-2171-430c-947b-4ee38c795902 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/a8b41f27-5adf-422f-b3d4-e605fb5c4c90 0.146s 2020-12-14 02:33:53.192 189 DEBUG tempest.lib.common.rest_client [req-a2a6d29d-2171-430c-947b-4ee38c795902 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-a2a6d29d-2171-430c-947b-4ee38c795902', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:33:53 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/a8b41f27-5adf-422f-b3d4-e605fb5c4c90'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:53.324 189 INFO tempest.lib.common.rest_client [req-64d16b84-d97f-48a2-bc12-8c2ed1492e43 ] Request (GroupSnaphotsV314RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354 0.125s 2020-12-14 02:33:53.327 189 DEBUG tempest.lib.common.rest_client [req-64d16b84-d97f-48a2-bc12-8c2ed1492e43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-64d16b84-d97f-48a2-bc12-8c2ed1492e43', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a39d52319644308af2a589a7b3c7354'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:53.446 189 INFO tempest.lib.common.rest_client [req-6ae85410-88b0-4171-b84f-11b0566ced30 ] Request (GroupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:33:53.449 189 DEBUG tempest.lib.common.rest_client [req-6ae85410-88b0-4171-b84f-11b0566ced30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6ae85410-88b0-4171-b84f-11b0566ced30', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["3gHdWy9LQfizXWQVn-sBhw"], "expires_at": "2020-12-14T03:33:53.000000Z", "issued_at": "2020-12-14T02:33:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:53.550 189 INFO tempest.lib.common.rest_client [req-80591a4e-dfe3-45a8-ae00-1434de4af553 ] Request (GroupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:33:53.553 189 DEBUG tempest.lib.common.rest_client [req-80591a4e-dfe3-45a8-ae00-1434de4af553 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-80591a4e-dfe3-45a8-ae00-1434de4af553', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["0neDjWDcREiN0931l3zuIQ"], "expires_at": "2020-12-14T03:33:53.000000Z", "issued_at": "2020-12-14T02:33:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:53.627 189 INFO tempest.lib.common.rest_client [req-81e492da-087d-419b-b13f-e6cd3ce7398d ] Request (GroupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.066s 2020-12-14 02:33:53.630 189 DEBUG tempest.lib.common.rest_client [req-81e492da-087d-419b-b13f-e6cd3ce7398d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81e492da-087d-419b-b13f-e6cd3ce7398d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:53.713 189 INFO tempest.lib.common.rest_client [req-a0c40cb7-f238-4246-a240-e0a2533d93b5 ] Request (GroupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.074s 2020-12-14 02:33:53.716 189 DEBUG tempest.lib.common.rest_client [req-a0c40cb7-f238-4246-a240-e0a2533d93b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-GroupsV3RbacTest-1166666825-desc", "domain_id": "default", "name": "tempest-GroupsV3RbacTest-1166666825"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '370', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0c40cb7-f238-4246-a240-e0a2533d93b5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "3e80f342b027448f8c027a1a9123b47a", "name": "tempest-GroupsV3RbacTest-1166666825", "domain_id": "default", "description": "tempest-GroupsV3RbacTest-1166666825-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:53.841 189 INFO tempest.lib.common.rest_client [req-ad1970f7-aed5-4474-9fe7-e8b730c490f1 ] Request (GroupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.117s 2020-12-14 02:33:53.844 189 DEBUG tempest.lib.common.rest_client [req-ad1970f7-aed5-4474-9fe7-e8b730c490f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-GroupsV3RbacTest-1166666825", "password": "F9^K!h+n%6Ib&4w", "project_id": "3e80f342b027448f8c027a1a9123b47a", "email": "tempest-GroupsV3RbacTest-535807828@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '387', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad1970f7-aed5-4474-9fe7-e8b730c490f1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "3e80f342b027448f8c027a1a9123b47a", "email": "tempest-GroupsV3RbacTest-535807828@example.com", "id": "15c23763405a465ab33a0ffe85847a1e", "name": "tempest-GroupsV3RbacTest-1166666825", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/15c23763405a465ab33a0ffe85847a1e"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:53.909 189 INFO tempest.lib.common.rest_client [req-60064a36-d625-4855-af7b-2cbd2e4e498a ] Request (GroupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:33:53.912 189 DEBUG tempest.lib.common.rest_client [req-60064a36-d625-4855-af7b-2cbd2e4e498a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60064a36-d625-4855-af7b-2cbd2e4e498a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:53.976 189 INFO tempest.lib.common.rest_client [req-28e5d9f3-4f1d-4c96-8b42-1ee264bb581b ] Request (GroupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-14 02:33:53.978 189 DEBUG tempest.lib.common.rest_client [req-28e5d9f3-4f1d-4c96-8b42-1ee264bb581b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28e5d9f3-4f1d-4c96-8b42-1ee264bb581b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:54.071 189 INFO tempest.lib.common.rest_client [req-8a3f3dbe-2414-4cf9-9099-78e94ca7943f ] Request (GroupsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles/72a4576c553448cd941b052c1ca0cf2d 0.085s 2020-12-14 02:33:54.074 189 DEBUG tempest.lib.common.rest_client [req-8a3f3dbe-2414-4cf9-9099-78e94ca7943f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a3f3dbe-2414-4cf9-9099-78e94ca7943f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:54.078 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupsV3RbacTest-1166666825', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3e80f342b027448f8c027a1a9123b47a', 'project_name': 'tempest-GroupsV3RbacTest-1166666825', 'tenant_id': '3e80f342b027448f8c027a1a9123b47a', 'tenant_name': 'tempest-GroupsV3RbacTest-1166666825', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '15c23763405a465ab33a0ffe85847a1e'}, Network: None, Subnet: None, Router: None 2020-12-14 02:33:54.081 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-GroupsV3RbacTest-1166666825', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3e80f342b027448f8c027a1a9123b47a', 'project_name': 'tempest-GroupsV3RbacTest-1166666825', 'tenant_id': '3e80f342b027448f8c027a1a9123b47a', 'tenant_name': 'tempest-GroupsV3RbacTest-1166666825', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '15c23763405a465ab33a0ffe85847a1e'}, Network: None, Subnet: None, Router: None 2020-12-14 02:33:54.259 189 INFO tempest.lib.common.rest_client [req-4017466c-6e53-468e-833e-a6ff76f86695 ] Request (GroupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.113s 2020-12-14 02:33:54.263 189 DEBUG tempest.lib.common.rest_client [req-4017466c-6e53-468e-833e-a6ff76f86695 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6563', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4017466c-6e53-468e-833e-a6ff76f86695', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15c23763405a465ab33a0ffe85847a1e", "name": "tempest-GroupsV3RbacTest-1166666825", "password_expires_at": null}, "audit_ids": ["ZBaIzUNzTWyIVkmM5m-nvw"], "expires_at": "2020-12-14T03:33:54.000000Z", "issued_at": "2020-12-14T02:33:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e80f342b027448f8c027a1a9123b47a", "name": "tempest-GroupsV3RbacTest-1166666825"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:54.366 189 INFO tempest.lib.common.rest_client [req-1b4175b0-cf69-49c6-81ed-97d3f61d7d3d ] Request (GroupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:33:54.369 189 DEBUG tempest.lib.common.rest_client [req-1b4175b0-cf69-49c6-81ed-97d3f61d7d3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b4175b0-cf69-49c6-81ed-97d3f61d7d3d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["EiEQ-HfaQtmy6exvh1b4Fg"], "expires_at": "2020-12-14T03:33:54.000000Z", "issued_at": "2020-12-14T02:33:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:54.487 189 INFO tempest.lib.common.rest_client [req-5a34c218-26cb-4a6a-abe1-f7529bdd4533 ] Request (GroupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:33:54.490 189 DEBUG tempest.lib.common.rest_client [req-5a34c218-26cb-4a6a-abe1-f7529bdd4533 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a34c218-26cb-4a6a-abe1-f7529bdd4533', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["QNjYOV0gStqWy-Vq-R3L-g"], "expires_at": "2020-12-14T03:33:54.000000Z", "issued_at": "2020-12-14T02:33:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:54.556 189 INFO tempest.lib.common.rest_client [req-db6785e5-e11b-469c-9942-624282858407 ] Request (GroupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.058s 2020-12-14 02:33:54.559 189 DEBUG tempest.lib.common.rest_client [req-db6785e5-e11b-469c-9942-624282858407 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db6785e5-e11b-469c-9942-624282858407', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:54.623 189 INFO tempest.lib.common.rest_client [req-1f1bcbb4-c024-45f2-87bc-e870e682c5b9 ] Request (GroupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:33:54.625 189 DEBUG tempest.lib.common.rest_client [req-1f1bcbb4-c024-45f2-87bc-e870e682c5b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f1bcbb4-c024-45f2-87bc-e870e682c5b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:54.628 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:33:54.630 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:54.695 189 INFO tempest.lib.common.rest_client [req-d547dcd1-ebdb-4a56-984f-16665ea3078e ] Request (GroupsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles 0.060s 2020-12-14 02:33:54.697 189 DEBUG tempest.lib.common.rest_client [req-d547dcd1-ebdb-4a56-984f-16665ea3078e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d547dcd1-ebdb-4a56-984f-16665ea3078e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:54.770 189 INFO tempest.lib.common.rest_client [req-10bfa30a-fddc-43d4-8088-3409063c7345 ] Request (GroupsV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-12-14 02:33:54.773 189 DEBUG tempest.lib.common.rest_client [req-10bfa30a-fddc-43d4-8088-3409063c7345 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10bfa30a-fddc-43d4-8088-3409063c7345', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:54.890 189 INFO tempest.lib.common.rest_client [req-4256d213-622e-4cb2-ac6a-302dcea6cf8b ] Request (GroupsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles/a629c95d64b3416fb80ae90af4f69c05 0.110s 2020-12-14 02:33:54.893 189 DEBUG tempest.lib.common.rest_client [req-4256d213-622e-4cb2-ac6a-302dcea6cf8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4256d213-622e-4cb2-ac6a-302dcea6cf8b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:56.003 189 INFO tempest.lib.common.rest_client [req-b6736367-6117-4460-8cc6-59e8b2be25fb ] Request (GroupsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-14 02:33:56.006 189 DEBUG tempest.lib.common.rest_client [req-b6736367-6117-4460-8cc6-59e8b2be25fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6736367-6117-4460-8cc6-59e8b2be25fb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15c23763405a465ab33a0ffe85847a1e", "name": "tempest-GroupsV3RbacTest-1166666825", "password_expires_at": null}, "audit_ids": ["sJ_KTnLeQuazJMH6Lhnnlw"], "expires_at": "2020-12-14T03:33:55.000000Z", "issued_at": "2020-12-14T02:33:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e80f342b027448f8c027a1a9123b47a", "name": "tempest-GroupsV3RbacTest-1166666825"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:56.231 189 INFO tempest.lib.common.rest_client [req-97d9803c-76d5-445e-93c0-677ae1ceeae2 ] Request (GroupsV3RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types 0.208s 2020-12-14 02:33:56.234 189 DEBUG tempest.lib.common.rest_client [req-97d9803c-76d5-445e-93c0-677ae1ceeae2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupsV3RbacTest-volume-type-1342598388"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-97d9803c-76d5-445e-93c0-677ae1ceeae2', 'content-length': '222', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-97d9803c-76d5-445e-93c0-677ae1ceeae2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types'} Body: b'{"volume_type": {"id": "7b1fc670-e9aa-4154-a28d-74d20db1ead8", "name": "tempest-GroupsV3RbacTest-volume-type-1342598388", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:56.319 189 INFO tempest.lib.common.rest_client [req-ca00c69b-1533-4e18-9ab4-1751359ec534 ] Request (GroupsV3RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types 0.055s 2020-12-14 02:33:56.321 189 DEBUG tempest.lib.common.rest_client [req-ca00c69b-1533-4e18-9ab4-1751359ec534 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupsV3RbacTest-group-type-983975822"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ca00c69b-1533-4e18-9ab4-1751359ec534', 'content-length': '178', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ca00c69b-1533-4e18-9ab4-1751359ec534', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types'} Body: b'{"group_type": {"id": "caf5bd02-f328-4f65-aafd-4e8e86c14d1a", "name": "tempest-GroupsV3RbacTest-group-type-983975822", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:56.344 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:33:56.360 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:create, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:33:56.362 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:56.481 189 INFO tempest.lib.common.rest_client [req-dcd8e34b-eea5-4c8a-910d-b5376dcfcdf3 ] Request (GroupsV3RbacTest:test_create_group): 200 GET http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles 0.112s 2020-12-14 02:33:56.485 189 DEBUG tempest.lib.common.rest_client [req-dcd8e34b-eea5-4c8a-910d-b5376dcfcdf3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dcd8e34b-eea5-4c8a-910d-b5376dcfcdf3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:56.536 189 INFO tempest.lib.common.rest_client [req-32fab415-2084-4614-8748-522067a4b6a6 ] Request (GroupsV3RbacTest:test_create_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:33:56.540 189 DEBUG tempest.lib.common.rest_client [req-32fab415-2084-4614-8748-522067a4b6a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32fab415-2084-4614-8748-522067a4b6a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15c23763405a465ab33a0ffe85847a1e", "name": "tempest-GroupsV3RbacTest-1166666825", "password_expires_at": null}, "audit_ids": ["S-yS9MaeRs6ZyGVl_eqiHQ"], "expires_at": "2020-12-14T03:33:56.000000Z", "issued_at": "2020-12-14T02:33:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e80f342b027448f8c027a1a9123b47a", "name": "tempest-GroupsV3RbacTest-1166666825"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:56.784 189 INFO tempest.lib.common.rest_client [req-a2e88531-57f6-4cb7-8cba-9d7d962bd701 ] Request (GroupsV3RbacTest:test_create_group): 202 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups 0.235s 2020-12-14 02:33:56.788 189 DEBUG tempest.lib.common.rest_client [req-a2e88531-57f6-4cb7-8cba-9d7d962bd701 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group": {"name": "tempest-GroupsV3RbacTest-Group-967756483", "group_type": "caf5bd02-f328-4f65-aafd-4e8e86c14d1a", "volume_types": ["7b1fc670-e9aa-4154-a28d-74d20db1ead8"]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a2e88531-57f6-4cb7-8cba-9d7d962bd701', 'content-length': '109', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a2e88531-57f6-4cb7-8cba-9d7d962bd701', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups'} Body: b'{"group": {"id": "3ef5f892-50c5-44be-adf0-a9747c69de19", "name": "tempest-GroupsV3RbacTest-Group-967756483"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:56.806 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:33:56.871 189 INFO tempest.lib.common.rest_client [req-3b7ccc25-d7b6-4914-92f9-0747074c8062 ] Request (GroupsV3RbacTest:test_create_group): 200 GET http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles 0.059s 2020-12-14 02:33:56.874 189 DEBUG tempest.lib.common.rest_client [req-3b7ccc25-d7b6-4914-92f9-0747074c8062 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b7ccc25-d7b6-4914-92f9-0747074c8062', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:56.924 189 INFO tempest.lib.common.rest_client [req-59c50565-fda5-4707-b142-933749bd146a ] Request (GroupsV3RbacTest:test_create_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:33:56.927 189 DEBUG tempest.lib.common.rest_client [req-59c50565-fda5-4707-b142-933749bd146a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59c50565-fda5-4707-b142-933749bd146a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15c23763405a465ab33a0ffe85847a1e", "name": "tempest-GroupsV3RbacTest-1166666825", "password_expires_at": null}, "audit_ids": ["WKX_Zcu0SVuoS57hDBlaFw"], "expires_at": "2020-12-14T03:33:56.000000Z", "issued_at": "2020-12-14T02:33:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e80f342b027448f8c027a1a9123b47a", "name": "tempest-GroupsV3RbacTest-1166666825"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:57.032 189 INFO tempest.lib.common.rest_client [req-1e9c681c-2dc6-4acf-94c1-3096cda0cb71 ] Request (GroupsV3RbacTest:test_create_group): 200 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/3ef5f892-50c5-44be-adf0-a9747c69de19 0.096s 2020-12-14 02:33:57.035 189 DEBUG tempest.lib.common.rest_client [req-1e9c681c-2dc6-4acf-94c1-3096cda0cb71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1e9c681c-2dc6-4acf-94c1-3096cda0cb71', 'content-length': '338', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1e9c681c-2dc6-4acf-94c1-3096cda0cb71', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/3ef5f892-50c5-44be-adf0-a9747c69de19'} Body: b'{"group": {"id": "3ef5f892-50c5-44be-adf0-a9747c69de19", "status": "available", "availability_zone": "nova", "created_at": "2020-12-14T02:33:57.000000", "name": "tempest-GroupsV3RbacTest-Group-967756483", "description": null, "group_type": "caf5bd02-f328-4f65-aafd-4e8e86c14d1a", "volume_types": ["7b1fc670-e9aa-4154-a28d-74d20db1ead8"]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:57.071 189 INFO tempest.common.waiters [-] group 3ef5f892-50c5-44be-adf0-a9747c69de19 reached available after waiting for 0.071286 seconds 2020-12-14 02:33:57.155 189 INFO tempest.lib.common.rest_client [req-c1417c0d-afb4-480f-be2f-7ba3c7431244 ] Request (GroupsV3RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/3ef5f892-50c5-44be-adf0-a9747c69de19/action 0.075s 2020-12-14 02:33:57.158 189 DEBUG tempest.lib.common.rest_client [req-c1417c0d-afb4-480f-be2f-7ba3c7431244 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c1417c0d-afb4-480f-be2f-7ba3c7431244', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/3ef5f892-50c5-44be-adf0-a9747c69de19/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:57.221 189 INFO tempest.lib.common.rest_client [req-5164cf0a-afbe-401d-b52b-7f655c9b72e5 ] Request (GroupsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/3ef5f892-50c5-44be-adf0-a9747c69de19 0.055s 2020-12-14 02:33:57.225 189 DEBUG tempest.lib.common.rest_client [req-5164cf0a-afbe-401d-b52b-7f655c9b72e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-5164cf0a-afbe-401d-b52b-7f655c9b72e5', 'content-length': '337', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-5164cf0a-afbe-401d-b52b-7f655c9b72e5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/3ef5f892-50c5-44be-adf0-a9747c69de19'} Body: b'{"group": {"id": "3ef5f892-50c5-44be-adf0-a9747c69de19", "status": "deleting", "availability_zone": "nova", "created_at": "2020-12-14T02:33:57.000000", "name": "tempest-GroupsV3RbacTest-Group-967756483", "description": null, "group_type": "caf5bd02-f328-4f65-aafd-4e8e86c14d1a", "volume_types": ["7b1fc670-e9aa-4154-a28d-74d20db1ead8"]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:58.301 189 INFO tempest.lib.common.rest_client [req-9123142d-908f-4c50-9aa5-99bc684c1902 ] Request (GroupsV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/3ef5f892-50c5-44be-adf0-a9747c69de19 0.035s 2020-12-14 02:33:58.304 189 DEBUG tempest.lib.common.rest_client [req-9123142d-908f-4c50-9aa5-99bc684c1902 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-9123142d-908f-4c50-9aa5-99bc684c1902', 'x-openstack-request-id': 'req-9123142d-908f-4c50-9aa5-99bc684c1902', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/3ef5f892-50c5-44be-adf0-a9747c69de19'} Body: b'{"itemNotFound": {"code": 404, "message": "Group 3ef5f892-50c5-44be-adf0-a9747c69de19 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:58.394 189 INFO tempest.lib.common.rest_client [req-56c23c67-fcbf-4958-8a51-68850b1818a5 ] Request (GroupsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/volumes/detail?all_tenants=True 0.082s 2020-12-14 02:33:58.397 189 DEBUG tempest.lib.common.rest_client [req-56c23c67-fcbf-4958-8a51-68850b1818a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-56c23c67-fcbf-4958-8a51-68850b1818a5', 'content-length': '3395', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-56c23c67-fcbf-4958-8a51-68850b1818a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/volumes/detail?all_tenants=True'} Body: b'{"volumes": [{"id": "00c3240f-df25-41e3-907c-c6a5f178757c", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:32:45.000000", "updated_at": "2020-12-14T02:33:17.000000", "name": "tempest-TestVolumeBootPattern-volume-origin-2086857782", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/volumes/00c3240f-df25-41e3-907c-c6a5f178757c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3e80f342b027448f8c027a1a9123b47a/volumes/00c3240f-df25-41e3-907c-c6a5f178757c"}], "user_id": "1cf48a9703854e9eb5d6aaa0c64a3898", "bootable": "true", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "00c3240f-df25-41e3-907c-c6a5f178757c", "attachment_id": "95ff2945-0900-41b2-89f7-0b4ca0bbaff0", "volume_id": "00c3240f-df25-41e3-907c-c6a5f178757c", "server_id": "83882363-1239-47ee-9192-96a42a5165c0", "host_name": "lf-virtual9", "device": "/dev/sda", "attached_at": "2020-12-14T02:33:16.000000"}], "migration_status": null, "group_id": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/tempest_slow-img_85214e35-2aab-4294-9a48-45b27036dd9f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "image_id": "376dbc58-0ba1-441a-afe9-cf0b703c7011", "image_name": "tempest_slow-img_85214e35-2aab-4294-9a48-45b27036dd9f", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "container_format": "bare", "disk_format": "qcow2", "min_disk": "0", "min_ram": "0", "size": "12716032"}, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9c64c26df63b423d88bfaa0318325ab8"}, {"id": "7783fce6-d6ea-46b4-a63a-381988b121fd", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-11T20:01:12.000000", "updated_at": "2020-12-11T20:03:10.000000", "name": "s_rally_95f231c4_xV6eepIv", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/volumes/7783fce6-d6ea-46b4-a63a-381988b121fd"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3e80f342b027448f8c027a1a9123b47a/volumes/7783fce6-d6ea-46b4-a63a-381988b121fd"}], "user_id": "de792f245fc743ada005283bdec0af09", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "7783fce6-d6ea-46b4-a63a-381988b121fd", "attachment_id": "61120a25-3311-41de-98b1-e901f1470da3", "volume_id": "7783fce6-d6ea-46b4-a63a-381988b121fd", "server_id": "f0c6bbc5-f27e-4246-a35c-bb6ec8d89a03", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-12-11T20:01:16.000000"}], "migration_status": null, "group_id": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "13e02f91606843a4a42f6e60ca962591"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:58.571 189 INFO tempest.lib.common.rest_client [req-6cc4e306-b63f-4e3f-b7a3-055cd6932536 ] Request (GroupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types/caf5bd02-f328-4f65-aafd-4e8e86c14d1a 0.052s 2020-12-14 02:33:58.574 189 DEBUG tempest.lib.common.rest_client [req-6cc4e306-b63f-4e3f-b7a3-055cd6932536 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6cc4e306-b63f-4e3f-b7a3-055cd6932536', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types/caf5bd02-f328-4f65-aafd-4e8e86c14d1a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:58.640 189 INFO tempest.lib.common.rest_client [req-82297a1e-1c5b-494d-a736-6450bddb9fc7 ] Request (GroupsV3RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types 0.049s 2020-12-14 02:33:58.643 189 DEBUG tempest.lib.common.rest_client [req-82297a1e-1c5b-494d-a736-6450bddb9fc7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupsV3RbacTest-volume-type-1740314883"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-82297a1e-1c5b-494d-a736-6450bddb9fc7', 'content-length': '222', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-82297a1e-1c5b-494d-a736-6450bddb9fc7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types'} Body: b'{"volume_type": {"id": "280424e7-2b1f-45a3-9eb9-238f755a7a59", "name": "tempest-GroupsV3RbacTest-volume-type-1740314883", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:58.721 189 INFO tempest.lib.common.rest_client [req-c694400b-de69-48b0-83dc-912592fc8eec ] Request (GroupsV3RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types 0.050s 2020-12-14 02:33:58.724 189 DEBUG tempest.lib.common.rest_client [req-c694400b-de69-48b0-83dc-912592fc8eec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupsV3RbacTest-group-type-659819513"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c694400b-de69-48b0-83dc-912592fc8eec', 'content-length': '178', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c694400b-de69-48b0-83dc-912592fc8eec', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types'} Body: b'{"group_type": {"id": "cfae7a20-61ba-4d09-8fa9-15364ad54e08", "name": "tempest-GroupsV3RbacTest-group-type-659819513", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:58.747 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:33:58.766 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:delete, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:33:58.903 189 INFO tempest.lib.common.rest_client [req-0134412e-4320-4e5c-a24d-95e876bdd8a8 ] Request (GroupsV3RbacTest:test_delete_group): 202 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups 0.131s 2020-12-14 02:33:58.906 189 DEBUG tempest.lib.common.rest_client [req-0134412e-4320-4e5c-a24d-95e876bdd8a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group": {"name": "tempest-GroupsV3RbacTest-Group-1940642176", "group_type": "cfae7a20-61ba-4d09-8fa9-15364ad54e08", "volume_types": ["280424e7-2b1f-45a3-9eb9-238f755a7a59"]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0134412e-4320-4e5c-a24d-95e876bdd8a8', 'content-length': '110', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0134412e-4320-4e5c-a24d-95e876bdd8a8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups'} Body: b'{"group": {"id": "c65a2116-dc74-4e64-b2a0-929a4e684332", "name": "tempest-GroupsV3RbacTest-Group-1940642176"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:33:58.977 189 INFO tempest.lib.common.rest_client [req-6edcef21-83e5-45f3-bf3f-646ad5f00bd2 ] Request (GroupsV3RbacTest:test_delete_group): 200 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/c65a2116-dc74-4e64-b2a0-929a4e684332 0.051s 2020-12-14 02:33:58.980 189 DEBUG tempest.lib.common.rest_client [req-6edcef21-83e5-45f3-bf3f-646ad5f00bd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:33:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6edcef21-83e5-45f3-bf3f-646ad5f00bd2', 'content-length': '338', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6edcef21-83e5-45f3-bf3f-646ad5f00bd2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/c65a2116-dc74-4e64-b2a0-929a4e684332'} Body: b'{"group": {"id": "c65a2116-dc74-4e64-b2a0-929a4e684332", "status": "creating", "availability_zone": "nova", "created_at": "2020-12-14T02:33:59.000000", "name": "tempest-GroupsV3RbacTest-Group-1940642176", "description": null, "group_type": "cfae7a20-61ba-4d09-8fa9-15364ad54e08", "volume_types": ["280424e7-2b1f-45a3-9eb9-238f755a7a59"]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:00.069 189 INFO tempest.lib.common.rest_client [req-00c1a8a8-2825-4071-8222-3f93a8b1e4c2 ] Request (GroupsV3RbacTest:test_delete_group): 200 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/c65a2116-dc74-4e64-b2a0-929a4e684332 0.051s 2020-12-14 02:34:00.072 189 DEBUG tempest.lib.common.rest_client [req-00c1a8a8-2825-4071-8222-3f93a8b1e4c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-00c1a8a8-2825-4071-8222-3f93a8b1e4c2', 'content-length': '339', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-00c1a8a8-2825-4071-8222-3f93a8b1e4c2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/c65a2116-dc74-4e64-b2a0-929a4e684332'} Body: b'{"group": {"id": "c65a2116-dc74-4e64-b2a0-929a4e684332", "status": "available", "availability_zone": "nova", "created_at": "2020-12-14T02:33:59.000000", "name": "tempest-GroupsV3RbacTest-Group-1940642176", "description": null, "group_type": "cfae7a20-61ba-4d09-8fa9-15364ad54e08", "volume_types": ["280424e7-2b1f-45a3-9eb9-238f755a7a59"]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:00.121 189 INFO tempest.common.waiters [-] group c65a2116-dc74-4e64-b2a0-929a4e684332 reached available after waiting for 1.120993 seconds 2020-12-14 02:34:00.124 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:00.188 189 INFO tempest.lib.common.rest_client [req-157896da-5e48-465e-86a4-b4ab6a7b8d75 ] Request (GroupsV3RbacTest:test_delete_group): 200 GET http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles 0.057s 2020-12-14 02:34:00.190 189 DEBUG tempest.lib.common.rest_client [req-157896da-5e48-465e-86a4-b4ab6a7b8d75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-157896da-5e48-465e-86a4-b4ab6a7b8d75', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:00.237 189 INFO tempest.lib.common.rest_client [req-f93a8cbe-7b86-4132-8e25-f5fecb6df568 ] Request (GroupsV3RbacTest:test_delete_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:34:00.240 189 DEBUG tempest.lib.common.rest_client [req-f93a8cbe-7b86-4132-8e25-f5fecb6df568 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f93a8cbe-7b86-4132-8e25-f5fecb6df568', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15c23763405a465ab33a0ffe85847a1e", "name": "tempest-GroupsV3RbacTest-1166666825", "password_expires_at": null}, "audit_ids": ["OcERY15ZTrGAeOTGidcceQ"], "expires_at": "2020-12-14T03:34:00.000000Z", "issued_at": "2020-12-14T02:34:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e80f342b027448f8c027a1a9123b47a", "name": "tempest-GroupsV3RbacTest-1166666825"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:00.395 189 INFO tempest.lib.common.rest_client [req-510ad531-be69-4625-abcf-ea4f91d8b41e ] Request (GroupsV3RbacTest:test_delete_group): 202 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/c65a2116-dc74-4e64-b2a0-929a4e684332/action 0.147s 2020-12-14 02:34:00.398 189 DEBUG tempest.lib.common.rest_client [req-510ad531-be69-4625-abcf-ea4f91d8b41e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-510ad531-be69-4625-abcf-ea4f91d8b41e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/c65a2116-dc74-4e64-b2a0-929a4e684332/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:00.401 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:00.461 189 INFO tempest.lib.common.rest_client [req-e08274c2-782a-4168-8e49-9b3d08d18801 ] Request (GroupsV3RbacTest:test_delete_group): 200 GET http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles 0.056s 2020-12-14 02:34:00.463 189 DEBUG tempest.lib.common.rest_client [req-e08274c2-782a-4168-8e49-9b3d08d18801 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e08274c2-782a-4168-8e49-9b3d08d18801', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:00.509 189 INFO tempest.lib.common.rest_client [req-bb7a5228-058a-435a-9c9c-714ff5df30d1 ] Request (GroupsV3RbacTest:test_delete_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:34:00.512 189 DEBUG tempest.lib.common.rest_client [req-bb7a5228-058a-435a-9c9c-714ff5df30d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb7a5228-058a-435a-9c9c-714ff5df30d1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15c23763405a465ab33a0ffe85847a1e", "name": "tempest-GroupsV3RbacTest-1166666825", "password_expires_at": null}, "audit_ids": ["EYcX8B29ScSlOo8p6j99NA"], "expires_at": "2020-12-14T03:34:00.000000Z", "issued_at": "2020-12-14T02:34:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e80f342b027448f8c027a1a9123b47a", "name": "tempest-GroupsV3RbacTest-1166666825"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:00.602 189 INFO tempest.lib.common.rest_client [req-c4f42222-2a32-468b-ad54-ca52b883ace6 ] Request (GroupsV3RbacTest:test_delete_group): 404 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/c65a2116-dc74-4e64-b2a0-929a4e684332 0.081s 2020-12-14 02:34:00.605 189 DEBUG tempest.lib.common.rest_client [req-c4f42222-2a32-468b-ad54-ca52b883ace6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-c4f42222-2a32-468b-ad54-ca52b883ace6', 'x-openstack-request-id': 'req-c4f42222-2a32-468b-ad54-ca52b883ace6', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/c65a2116-dc74-4e64-b2a0-929a4e684332'} Body: b'{"itemNotFound": {"code": 404, "message": "Group c65a2116-dc74-4e64-b2a0-929a4e684332 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:00.686 189 INFO tempest.lib.common.rest_client [req-0a72171f-7672-4f0d-bc60-4fae02043c2f ] Request (GroupsV3RbacTest:test_delete_group): 200 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/volumes/detail?all_tenants=True 0.075s 2020-12-14 02:34:00.688 189 DEBUG tempest.lib.common.rest_client [req-0a72171f-7672-4f0d-bc60-4fae02043c2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0a72171f-7672-4f0d-bc60-4fae02043c2f', 'content-length': '3395', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0a72171f-7672-4f0d-bc60-4fae02043c2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/volumes/detail?all_tenants=True'} Body: b'{"volumes": [{"id": "00c3240f-df25-41e3-907c-c6a5f178757c", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:32:45.000000", "updated_at": "2020-12-14T02:33:17.000000", "name": "tempest-TestVolumeBootPattern-volume-origin-2086857782", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/volumes/00c3240f-df25-41e3-907c-c6a5f178757c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3e80f342b027448f8c027a1a9123b47a/volumes/00c3240f-df25-41e3-907c-c6a5f178757c"}], "user_id": "1cf48a9703854e9eb5d6aaa0c64a3898", "bootable": "true", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "00c3240f-df25-41e3-907c-c6a5f178757c", "attachment_id": "95ff2945-0900-41b2-89f7-0b4ca0bbaff0", "volume_id": "00c3240f-df25-41e3-907c-c6a5f178757c", "server_id": "83882363-1239-47ee-9192-96a42a5165c0", "host_name": "lf-virtual9", "device": "/dev/sda", "attached_at": "2020-12-14T02:33:16.000000"}], "migration_status": null, "group_id": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/tempest_slow-img_85214e35-2aab-4294-9a48-45b27036dd9f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "image_id": "376dbc58-0ba1-441a-afe9-cf0b703c7011", "image_name": "tempest_slow-img_85214e35-2aab-4294-9a48-45b27036dd9f", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "container_format": "bare", "disk_format": "qcow2", "min_disk": "0", "min_ram": "0", "size": "12716032"}, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9c64c26df63b423d88bfaa0318325ab8"}, {"id": "7783fce6-d6ea-46b4-a63a-381988b121fd", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-11T20:01:12.000000", "updated_at": "2020-12-11T20:03:10.000000", "name": "s_rally_95f231c4_xV6eepIv", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/volumes/7783fce6-d6ea-46b4-a63a-381988b121fd"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3e80f342b027448f8c027a1a9123b47a/volumes/7783fce6-d6ea-46b4-a63a-381988b121fd"}], "user_id": "de792f245fc743ada005283bdec0af09", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "7783fce6-d6ea-46b4-a63a-381988b121fd", "attachment_id": "61120a25-3311-41de-98b1-e901f1470da3", "volume_id": "7783fce6-d6ea-46b4-a63a-381988b121fd", "server_id": "f0c6bbc5-f27e-4246-a35c-bb6ec8d89a03", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-12-11T20:01:16.000000"}], "migration_status": null, "group_id": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "13e02f91606843a4a42f6e60ca962591"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:00.803 189 INFO tempest.lib.common.rest_client [req-671bb55a-10aa-4f73-9563-9fb21bf21379 ] Request (GroupsV3RbacTest:_run_cleanups): 404 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/c65a2116-dc74-4e64-b2a0-929a4e684332/action 0.026s 2020-12-14 02:34:00.805 189 DEBUG tempest.lib.common.rest_client [req-671bb55a-10aa-4f73-9563-9fb21bf21379 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-671bb55a-10aa-4f73-9563-9fb21bf21379', 'x-openstack-request-id': 'req-671bb55a-10aa-4f73-9563-9fb21bf21379', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/c65a2116-dc74-4e64-b2a0-929a4e684332/action'} Body: b'{"itemNotFound": {"code": 404, "message": "Group c65a2116-dc74-4e64-b2a0-929a4e684332 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:00.854 189 INFO tempest.lib.common.rest_client [req-b22717f8-b691-4640-9a85-41dd6f85eb40 ] Request (GroupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types/cfae7a20-61ba-4d09-8fa9-15364ad54e08 0.043s 2020-12-14 02:34:00.857 189 DEBUG tempest.lib.common.rest_client [req-b22717f8-b691-4640-9a85-41dd6f85eb40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b22717f8-b691-4640-9a85-41dd6f85eb40', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types/cfae7a20-61ba-4d09-8fa9-15364ad54e08'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:00.918 189 INFO tempest.lib.common.rest_client [req-e8aae5fb-0d45-450e-9a2a-44e95d21c208 ] Request (GroupsV3RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types 0.046s 2020-12-14 02:34:00.921 189 DEBUG tempest.lib.common.rest_client [req-e8aae5fb-0d45-450e-9a2a-44e95d21c208 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupsV3RbacTest-volume-type-1000932272"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e8aae5fb-0d45-450e-9a2a-44e95d21c208', 'content-length': '222', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e8aae5fb-0d45-450e-9a2a-44e95d21c208', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types'} Body: b'{"volume_type": {"id": "4665cdbf-3475-468c-b3dd-a1191becd2e7", "name": "tempest-GroupsV3RbacTest-volume-type-1000932272", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:00.987 189 INFO tempest.lib.common.rest_client [req-9d14192a-e590-487c-9599-54d357d53a5a ] Request (GroupsV3RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types 0.044s 2020-12-14 02:34:00.991 189 DEBUG tempest.lib.common.rest_client [req-9d14192a-e590-487c-9599-54d357d53a5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupsV3RbacTest-group-type-540867075"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9d14192a-e590-487c-9599-54d357d53a5a', 'content-length': '178', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9d14192a-e590-487c-9599-54d357d53a5a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types'} Body: b'{"group_type": {"id": "3407d018-8b32-4621-8073-6d1aef0b72b2", "name": "tempest-GroupsV3RbacTest-group-type-540867075", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:01.012 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:01.030 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:get_all, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:01.032 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:01.099 189 INFO tempest.lib.common.rest_client [req-b06b3718-e18b-4847-8490-800650a4e4db ] Request (GroupsV3RbacTest:test_list_groups): 200 GET http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles 0.061s 2020-12-14 02:34:01.103 189 DEBUG tempest.lib.common.rest_client [req-b06b3718-e18b-4847-8490-800650a4e4db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b06b3718-e18b-4847-8490-800650a4e4db', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:01.152 189 INFO tempest.lib.common.rest_client [req-51643185-325b-445c-bc94-f148b9f52dd6 ] Request (GroupsV3RbacTest:test_list_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:34:01.156 189 DEBUG tempest.lib.common.rest_client [req-51643185-325b-445c-bc94-f148b9f52dd6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51643185-325b-445c-bc94-f148b9f52dd6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15c23763405a465ab33a0ffe85847a1e", "name": "tempest-GroupsV3RbacTest-1166666825", "password_expires_at": null}, "audit_ids": ["rkWEbN_0Qj2eJg4kJ5zivw"], "expires_at": "2020-12-14T03:34:01.000000Z", "issued_at": "2020-12-14T02:34:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e80f342b027448f8c027a1a9123b47a", "name": "tempest-GroupsV3RbacTest-1166666825"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:01.246 189 INFO tempest.lib.common.rest_client [req-8e2b4b43-aa3c-4e53-835b-58d740114cf5 ] Request (GroupsV3RbacTest:test_list_groups): 200 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups 0.081s 2020-12-14 02:34:01.249 189 DEBUG tempest.lib.common.rest_client [req-8e2b4b43-aa3c-4e53-835b-58d740114cf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8e2b4b43-aa3c-4e53-835b-58d740114cf5', 'content-length': '14', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8e2b4b43-aa3c-4e53-835b-58d740114cf5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups'} Body: b'{"groups": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:01.266 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:01.333 189 INFO tempest.lib.common.rest_client [req-a244493a-5581-4425-b054-5067c3599896 ] Request (GroupsV3RbacTest:test_list_groups): 200 GET http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles 0.060s 2020-12-14 02:34:01.335 189 DEBUG tempest.lib.common.rest_client [req-a244493a-5581-4425-b054-5067c3599896 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a244493a-5581-4425-b054-5067c3599896', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:01.382 189 INFO tempest.lib.common.rest_client [req-dd3dcef0-5e5f-4fff-9b85-f9bd33305726 ] Request (GroupsV3RbacTest:test_list_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:34:01.385 189 DEBUG tempest.lib.common.rest_client [req-dd3dcef0-5e5f-4fff-9b85-f9bd33305726 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dd3dcef0-5e5f-4fff-9b85-f9bd33305726', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15c23763405a465ab33a0ffe85847a1e", "name": "tempest-GroupsV3RbacTest-1166666825", "password_expires_at": null}, "audit_ids": ["HGsjVxiPR72CFC7UCDynMA"], "expires_at": "2020-12-14T03:34:01.000000Z", "issued_at": "2020-12-14T02:34:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e80f342b027448f8c027a1a9123b47a", "name": "tempest-GroupsV3RbacTest-1166666825"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:01.490 189 INFO tempest.lib.common.rest_client [req-fc218b98-5f30-43b6-a88e-cad4e5c1c9a1 ] Request (GroupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types/3407d018-8b32-4621-8073-6d1aef0b72b2 0.097s 2020-12-14 02:34:01.493 189 DEBUG tempest.lib.common.rest_client [req-fc218b98-5f30-43b6-a88e-cad4e5c1c9a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fc218b98-5f30-43b6-a88e-cad4e5c1c9a1', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types/3407d018-8b32-4621-8073-6d1aef0b72b2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:01.576 189 INFO tempest.lib.common.rest_client [req-064f1a7c-06b2-4d5c-82b9-41fd0b0b279b ] Request (GroupsV3RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types 0.059s 2020-12-14 02:34:01.578 189 DEBUG tempest.lib.common.rest_client [req-064f1a7c-06b2-4d5c-82b9-41fd0b0b279b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupsV3RbacTest-volume-type-856970323"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-064f1a7c-06b2-4d5c-82b9-41fd0b0b279b', 'content-length': '221', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-064f1a7c-06b2-4d5c-82b9-41fd0b0b279b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types'} Body: b'{"volume_type": {"id": "7fb2c4a8-67a6-4faa-8531-4fe48aa1884e", "name": "tempest-GroupsV3RbacTest-volume-type-856970323", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:01.654 189 INFO tempest.lib.common.rest_client [req-6a731dac-d652-48ce-a958-8717d091b651 ] Request (GroupsV3RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types 0.048s 2020-12-14 02:34:01.656 189 DEBUG tempest.lib.common.rest_client [req-6a731dac-d652-48ce-a958-8717d091b651 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupsV3RbacTest-group-type-1042829010"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6a731dac-d652-48ce-a958-8717d091b651', 'content-length': '179', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6a731dac-d652-48ce-a958-8717d091b651', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types'} Body: b'{"group_type": {"id": "53a411ad-014e-406e-959a-7bdced075031", "name": "tempest-GroupsV3RbacTest-group-type-1042829010", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:01.677 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:01.695 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:get_all, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:01.697 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:01.762 189 INFO tempest.lib.common.rest_client [req-d9f3ab0d-6a23-4d16-9073-a972d0ed3986 ] Request (GroupsV3RbacTest:test_list_groups_with_details): 200 GET http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles 0.059s 2020-12-14 02:34:01.766 189 DEBUG tempest.lib.common.rest_client [req-d9f3ab0d-6a23-4d16-9073-a972d0ed3986 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9f3ab0d-6a23-4d16-9073-a972d0ed3986', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:01.815 189 INFO tempest.lib.common.rest_client [req-3d7faf2f-b3c2-49e8-9409-2ed4c89e751d ] Request (GroupsV3RbacTest:test_list_groups_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:34:01.819 189 DEBUG tempest.lib.common.rest_client [req-3d7faf2f-b3c2-49e8-9409-2ed4c89e751d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d7faf2f-b3c2-49e8-9409-2ed4c89e751d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15c23763405a465ab33a0ffe85847a1e", "name": "tempest-GroupsV3RbacTest-1166666825", "password_expires_at": null}, "audit_ids": ["YXMSbiKSRIeql8_QCOBzGg"], "expires_at": "2020-12-14T03:34:01.000000Z", "issued_at": "2020-12-14T02:34:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e80f342b027448f8c027a1a9123b47a", "name": "tempest-GroupsV3RbacTest-1166666825"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:01.912 189 INFO tempest.lib.common.rest_client [req-c10e9099-e1e0-47d6-89e9-35c21f13df39 ] Request (GroupsV3RbacTest:test_list_groups_with_details): 200 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/detail 0.085s 2020-12-14 02:34:01.915 189 DEBUG tempest.lib.common.rest_client [req-c10e9099-e1e0-47d6-89e9-35c21f13df39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c10e9099-e1e0-47d6-89e9-35c21f13df39', 'content-length': '14', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c10e9099-e1e0-47d6-89e9-35c21f13df39', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/detail'} Body: b'{"groups": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:01.947 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:02.013 189 INFO tempest.lib.common.rest_client [req-a4048134-6faa-4e04-b3e4-c87790f39c95 ] Request (GroupsV3RbacTest:test_list_groups_with_details): 200 GET http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles 0.059s 2020-12-14 02:34:02.016 189 DEBUG tempest.lib.common.rest_client [req-a4048134-6faa-4e04-b3e4-c87790f39c95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a4048134-6faa-4e04-b3e4-c87790f39c95', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:02.063 189 INFO tempest.lib.common.rest_client [req-10bceb11-8641-4eb3-b6e7-accbd9a60c07 ] Request (GroupsV3RbacTest:test_list_groups_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:34:02.067 189 DEBUG tempest.lib.common.rest_client [req-10bceb11-8641-4eb3-b6e7-accbd9a60c07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10bceb11-8641-4eb3-b6e7-accbd9a60c07', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15c23763405a465ab33a0ffe85847a1e", "name": "tempest-GroupsV3RbacTest-1166666825", "password_expires_at": null}, "audit_ids": ["9JQCy16FQta_P3btUXfwfw"], "expires_at": "2020-12-14T03:34:02.000000Z", "issued_at": "2020-12-14T02:34:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e80f342b027448f8c027a1a9123b47a", "name": "tempest-GroupsV3RbacTest-1166666825"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:02.182 189 INFO tempest.lib.common.rest_client [req-c9eab612-1da5-4812-87f4-ee786b620133 ] Request (GroupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types/53a411ad-014e-406e-959a-7bdced075031 0.105s 2020-12-14 02:34:02.185 189 DEBUG tempest.lib.common.rest_client [req-c9eab612-1da5-4812-87f4-ee786b620133 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c9eab612-1da5-4812-87f4-ee786b620133', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types/53a411ad-014e-406e-959a-7bdced075031'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:02.269 189 INFO tempest.lib.common.rest_client [req-b850e399-06ae-4b77-b6d1-58248158d3a7 ] Request (GroupsV3RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types 0.068s 2020-12-14 02:34:02.272 189 DEBUG tempest.lib.common.rest_client [req-b850e399-06ae-4b77-b6d1-58248158d3a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupsV3RbacTest-volume-type-1507835875"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-b850e399-06ae-4b77-b6d1-58248158d3a7', 'content-length': '222', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b850e399-06ae-4b77-b6d1-58248158d3a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types'} Body: b'{"volume_type": {"id": "a2eeb712-2be8-4b0c-a62c-d84a40f586c8", "name": "tempest-GroupsV3RbacTest-volume-type-1507835875", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:02.351 189 INFO tempest.lib.common.rest_client [req-91d16787-c8f1-43ca-9814-74146c344473 ] Request (GroupsV3RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types 0.051s 2020-12-14 02:34:02.354 189 DEBUG tempest.lib.common.rest_client [req-91d16787-c8f1-43ca-9814-74146c344473 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupsV3RbacTest-group-type-917708012"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-91d16787-c8f1-43ca-9814-74146c344473', 'content-length': '178', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-91d16787-c8f1-43ca-9814-74146c344473', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types'} Body: b'{"group_type": {"id": "ca2ffbaf-db5b-4c90-93a7-fc688168cfd5", "name": "tempest-GroupsV3RbacTest-group-type-917708012", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:02.375 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:02.392 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:get, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:02.571 189 INFO tempest.lib.common.rest_client [req-98405066-397a-4eaa-a185-37d596d53eb7 ] Request (GroupsV3RbacTest:test_show_group): 202 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups 0.172s 2020-12-14 02:34:02.575 189 DEBUG tempest.lib.common.rest_client [req-98405066-397a-4eaa-a185-37d596d53eb7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group": {"name": "tempest-GroupsV3RbacTest-Group-873544019", "group_type": "ca2ffbaf-db5b-4c90-93a7-fc688168cfd5", "volume_types": ["a2eeb712-2be8-4b0c-a62c-d84a40f586c8"]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-98405066-397a-4eaa-a185-37d596d53eb7', 'content-length': '109', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-98405066-397a-4eaa-a185-37d596d53eb7', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups'} Body: b'{"group": {"id": "987466e2-33aa-4dee-abf2-9b7fcf4f92df", "name": "tempest-GroupsV3RbacTest-Group-873544019"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:02.646 189 INFO tempest.lib.common.rest_client [req-6afed015-78dd-4ce5-aa7d-439624b4883b ] Request (GroupsV3RbacTest:test_show_group): 200 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/987466e2-33aa-4dee-abf2-9b7fcf4f92df 0.050s 2020-12-14 02:34:02.649 189 DEBUG tempest.lib.common.rest_client [req-6afed015-78dd-4ce5-aa7d-439624b4883b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-6afed015-78dd-4ce5-aa7d-439624b4883b', 'content-length': '338', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6afed015-78dd-4ce5-aa7d-439624b4883b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/987466e2-33aa-4dee-abf2-9b7fcf4f92df'} Body: b'{"group": {"id": "987466e2-33aa-4dee-abf2-9b7fcf4f92df", "status": "available", "availability_zone": "nova", "created_at": "2020-12-14T02:34:03.000000", "name": "tempest-GroupsV3RbacTest-Group-873544019", "description": null, "group_type": "ca2ffbaf-db5b-4c90-93a7-fc688168cfd5", "volume_types": ["a2eeb712-2be8-4b0c-a62c-d84a40f586c8"]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:02.682 189 INFO tempest.common.waiters [-] group 987466e2-33aa-4dee-abf2-9b7fcf4f92df reached available after waiting for 0.682571 seconds 2020-12-14 02:34:02.684 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:02.747 189 INFO tempest.lib.common.rest_client [req-9f4bb584-7340-4aed-bc4f-4c88a8302f83 ] Request (GroupsV3RbacTest:test_show_group): 200 GET http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles 0.057s 2020-12-14 02:34:02.750 189 DEBUG tempest.lib.common.rest_client [req-9f4bb584-7340-4aed-bc4f-4c88a8302f83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f4bb584-7340-4aed-bc4f-4c88a8302f83', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:02.798 189 INFO tempest.lib.common.rest_client [req-5f87671d-5f04-470f-b08e-49236aa3b836 ] Request (GroupsV3RbacTest:test_show_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:34:02.802 189 DEBUG tempest.lib.common.rest_client [req-5f87671d-5f04-470f-b08e-49236aa3b836 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f87671d-5f04-470f-b08e-49236aa3b836', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15c23763405a465ab33a0ffe85847a1e", "name": "tempest-GroupsV3RbacTest-1166666825", "password_expires_at": null}, "audit_ids": ["yLp-5kz1SKKEDHSTWdLSaw"], "expires_at": "2020-12-14T03:34:02.000000Z", "issued_at": "2020-12-14T02:34:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e80f342b027448f8c027a1a9123b47a", "name": "tempest-GroupsV3RbacTest-1166666825"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:02.910 189 INFO tempest.lib.common.rest_client [req-a3664a12-b5c1-4870-a55c-a5962db8acc0 ] Request (GroupsV3RbacTest:test_show_group): 200 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/987466e2-33aa-4dee-abf2-9b7fcf4f92df 0.099s 2020-12-14 02:34:02.913 189 DEBUG tempest.lib.common.rest_client [req-a3664a12-b5c1-4870-a55c-a5962db8acc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a3664a12-b5c1-4870-a55c-a5962db8acc0', 'content-length': '338', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a3664a12-b5c1-4870-a55c-a5962db8acc0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/987466e2-33aa-4dee-abf2-9b7fcf4f92df'} Body: b'{"group": {"id": "987466e2-33aa-4dee-abf2-9b7fcf4f92df", "status": "available", "availability_zone": "nova", "created_at": "2020-12-14T02:34:03.000000", "name": "tempest-GroupsV3RbacTest-Group-873544019", "description": null, "group_type": "ca2ffbaf-db5b-4c90-93a7-fc688168cfd5", "volume_types": ["a2eeb712-2be8-4b0c-a62c-d84a40f586c8"]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:02.948 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:03.011 189 INFO tempest.lib.common.rest_client [req-368d61ca-bfaf-4285-b150-8f0e31b7aba5 ] Request (GroupsV3RbacTest:test_show_group): 200 GET http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles 0.058s 2020-12-14 02:34:03.014 189 DEBUG tempest.lib.common.rest_client [req-368d61ca-bfaf-4285-b150-8f0e31b7aba5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-368d61ca-bfaf-4285-b150-8f0e31b7aba5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:03.063 189 INFO tempest.lib.common.rest_client [req-f565b80f-9c6c-46ad-8c2f-314eed317716 ] Request (GroupsV3RbacTest:test_show_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:34:03.067 189 DEBUG tempest.lib.common.rest_client [req-f565b80f-9c6c-46ad-8c2f-314eed317716 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f565b80f-9c6c-46ad-8c2f-314eed317716', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15c23763405a465ab33a0ffe85847a1e", "name": "tempest-GroupsV3RbacTest-1166666825", "password_expires_at": null}, "audit_ids": ["s2DOeAD5TDqjR4XGg6tVsA"], "expires_at": "2020-12-14T03:34:03.000000Z", "issued_at": "2020-12-14T02:34:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e80f342b027448f8c027a1a9123b47a", "name": "tempest-GroupsV3RbacTest-1166666825"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:03.206 189 INFO tempest.lib.common.rest_client [req-4fc64d68-5600-4713-b9ac-f6ab444fbb0e ] Request (GroupsV3RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/987466e2-33aa-4dee-abf2-9b7fcf4f92df/action 0.129s 2020-12-14 02:34:03.210 189 DEBUG tempest.lib.common.rest_client [req-4fc64d68-5600-4713-b9ac-f6ab444fbb0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4fc64d68-5600-4713-b9ac-f6ab444fbb0e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/987466e2-33aa-4dee-abf2-9b7fcf4f92df/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:03.280 189 INFO tempest.lib.common.rest_client [req-0fe39fb3-70d2-4e26-9a81-6414f31d2e9f ] Request (GroupsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/987466e2-33aa-4dee-abf2-9b7fcf4f92df 0.061s 2020-12-14 02:34:03.283 189 DEBUG tempest.lib.common.rest_client [req-0fe39fb3-70d2-4e26-9a81-6414f31d2e9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0fe39fb3-70d2-4e26-9a81-6414f31d2e9f', 'content-length': '337', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0fe39fb3-70d2-4e26-9a81-6414f31d2e9f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/987466e2-33aa-4dee-abf2-9b7fcf4f92df'} Body: b'{"group": {"id": "987466e2-33aa-4dee-abf2-9b7fcf4f92df", "status": "deleting", "availability_zone": "nova", "created_at": "2020-12-14T02:34:03.000000", "name": "tempest-GroupsV3RbacTest-Group-873544019", "description": null, "group_type": "ca2ffbaf-db5b-4c90-93a7-fc688168cfd5", "volume_types": ["a2eeb712-2be8-4b0c-a62c-d84a40f586c8"]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:04.358 189 INFO tempest.lib.common.rest_client [req-dc7c49df-eaef-4d76-8f86-689690b63d38 ] Request (GroupsV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/987466e2-33aa-4dee-abf2-9b7fcf4f92df 0.035s 2020-12-14 02:34:04.361 189 DEBUG tempest.lib.common.rest_client [req-dc7c49df-eaef-4d76-8f86-689690b63d38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-dc7c49df-eaef-4d76-8f86-689690b63d38', 'x-openstack-request-id': 'req-dc7c49df-eaef-4d76-8f86-689690b63d38', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/987466e2-33aa-4dee-abf2-9b7fcf4f92df'} Body: b'{"itemNotFound": {"code": 404, "message": "Group 987466e2-33aa-4dee-abf2-9b7fcf4f92df could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:04.445 189 INFO tempest.lib.common.rest_client [req-20018ceb-8c0c-4b72-8e93-d905b84691a5 ] Request (GroupsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/volumes/detail?all_tenants=True 0.076s 2020-12-14 02:34:04.447 189 DEBUG tempest.lib.common.rest_client [req-20018ceb-8c0c-4b72-8e93-d905b84691a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-20018ceb-8c0c-4b72-8e93-d905b84691a5', 'content-length': '3395', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-20018ceb-8c0c-4b72-8e93-d905b84691a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/volumes/detail?all_tenants=True'} Body: b'{"volumes": [{"id": "00c3240f-df25-41e3-907c-c6a5f178757c", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:32:45.000000", "updated_at": "2020-12-14T02:33:17.000000", "name": "tempest-TestVolumeBootPattern-volume-origin-2086857782", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/volumes/00c3240f-df25-41e3-907c-c6a5f178757c"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3e80f342b027448f8c027a1a9123b47a/volumes/00c3240f-df25-41e3-907c-c6a5f178757c"}], "user_id": "1cf48a9703854e9eb5d6aaa0c64a3898", "bootable": "true", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "00c3240f-df25-41e3-907c-c6a5f178757c", "attachment_id": "95ff2945-0900-41b2-89f7-0b4ca0bbaff0", "volume_id": "00c3240f-df25-41e3-907c-c6a5f178757c", "server_id": "83882363-1239-47ee-9192-96a42a5165c0", "host_name": "lf-virtual9", "device": "/dev/sda", "attached_at": "2020-12-14T02:33:16.000000"}], "migration_status": null, "group_id": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"signature_verified": "False", "hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/tempest_slow-img_85214e35-2aab-4294-9a48-45b27036dd9f", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "image_id": "376dbc58-0ba1-441a-afe9-cf0b703c7011", "image_name": "tempest_slow-img_85214e35-2aab-4294-9a48-45b27036dd9f", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "container_format": "bare", "disk_format": "qcow2", "min_disk": "0", "min_ram": "0", "size": "12716032"}, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "9c64c26df63b423d88bfaa0318325ab8"}, {"id": "7783fce6-d6ea-46b4-a63a-381988b121fd", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-11T20:01:12.000000", "updated_at": "2020-12-11T20:03:10.000000", "name": "s_rally_95f231c4_xV6eepIv", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/volumes/7783fce6-d6ea-46b4-a63a-381988b121fd"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3e80f342b027448f8c027a1a9123b47a/volumes/7783fce6-d6ea-46b4-a63a-381988b121fd"}], "user_id": "de792f245fc743ada005283bdec0af09", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "7783fce6-d6ea-46b4-a63a-381988b121fd", "attachment_id": "61120a25-3311-41de-98b1-e901f1470da3", "volume_id": "7783fce6-d6ea-46b4-a63a-381988b121fd", "server_id": "f0c6bbc5-f27e-4246-a35c-bb6ec8d89a03", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-12-11T20:01:16.000000"}], "migration_status": null, "group_id": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "13e02f91606843a4a42f6e60ca962591"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:04.619 189 INFO tempest.lib.common.rest_client [req-3ae2cd2e-b2f8-427f-a4a3-dbbb9d35ed92 ] Request (GroupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types/ca2ffbaf-db5b-4c90-93a7-fc688168cfd5 0.053s 2020-12-14 02:34:04.622 189 DEBUG tempest.lib.common.rest_client [req-3ae2cd2e-b2f8-427f-a4a3-dbbb9d35ed92 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-3ae2cd2e-b2f8-427f-a4a3-dbbb9d35ed92', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types/ca2ffbaf-db5b-4c90-93a7-fc688168cfd5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:04.694 189 INFO tempest.lib.common.rest_client [req-e26663e0-f86c-4b71-9f7a-56a377260286 ] Request (GroupsV3RbacTest:setUp): 200 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types 0.054s 2020-12-14 02:34:04.697 189 DEBUG tempest.lib.common.rest_client [req-e26663e0-f86c-4b71-9f7a-56a377260286 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-GroupsV3RbacTest-volume-type-466443469"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e26663e0-f86c-4b71-9f7a-56a377260286', 'content-length': '221', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e26663e0-f86c-4b71-9f7a-56a377260286', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types'} Body: b'{"volume_type": {"id": "0619f4be-725e-4a19-8b44-9c12fd333c75", "name": "tempest-GroupsV3RbacTest-volume-type-466443469", "is_public": true, "extra_specs": {}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:04.773 189 INFO tempest.lib.common.rest_client [req-143611f1-a75c-4b47-876a-8f3c9a13cda8 ] Request (GroupsV3RbacTest:setUp): 202 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types 0.049s 2020-12-14 02:34:04.776 189 DEBUG tempest.lib.common.rest_client [req-143611f1-a75c-4b47-876a-8f3c9a13cda8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group_type": {"name": "tempest-GroupsV3RbacTest-group-type-1199904696"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-143611f1-a75c-4b47-876a-8f3c9a13cda8', 'content-length': '179', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-143611f1-a75c-4b47-876a-8f3c9a13cda8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types'} Body: b'{"group_type": {"id": "07cb97bb-2ee9-4d7b-842b-6528a44830d7", "name": "tempest-GroupsV3RbacTest-group-type-1199904696", "description": null, "is_public": true, "group_specs": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:04.800 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:04.826 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: group:update, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:04.975 189 INFO tempest.lib.common.rest_client [req-cecd696e-49e1-4f5b-be98-0db1298c2c4d ] Request (GroupsV3RbacTest:test_update_group): 202 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups 0.140s 2020-12-14 02:34:04.978 189 DEBUG tempest.lib.common.rest_client [req-cecd696e-49e1-4f5b-be98-0db1298c2c4d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group": {"name": "tempest-GroupsV3RbacTest-Group-1797980213", "group_type": "07cb97bb-2ee9-4d7b-842b-6528a44830d7", "volume_types": ["0619f4be-725e-4a19-8b44-9c12fd333c75"]}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-cecd696e-49e1-4f5b-be98-0db1298c2c4d', 'content-length': '110', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-cecd696e-49e1-4f5b-be98-0db1298c2c4d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups'} Body: b'{"group": {"id": "47193bc5-3a6f-4be2-92fd-4ff85c72552d", "name": "tempest-GroupsV3RbacTest-Group-1797980213"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:05.065 189 INFO tempest.lib.common.rest_client [req-75612f82-5e46-4ff6-9bf7-2c1be68ca1aa ] Request (GroupsV3RbacTest:test_update_group): 200 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/47193bc5-3a6f-4be2-92fd-4ff85c72552d 0.067s 2020-12-14 02:34:05.067 189 DEBUG tempest.lib.common.rest_client [req-75612f82-5e46-4ff6-9bf7-2c1be68ca1aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-75612f82-5e46-4ff6-9bf7-2c1be68ca1aa', 'content-length': '338', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-75612f82-5e46-4ff6-9bf7-2c1be68ca1aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/47193bc5-3a6f-4be2-92fd-4ff85c72552d'} Body: b'{"group": {"id": "47193bc5-3a6f-4be2-92fd-4ff85c72552d", "status": "creating", "availability_zone": "nova", "created_at": "2020-12-14T02:34:05.000000", "name": "tempest-GroupsV3RbacTest-Group-1797980213", "description": null, "group_type": "07cb97bb-2ee9-4d7b-842b-6528a44830d7", "volume_types": ["0619f4be-725e-4a19-8b44-9c12fd333c75"]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:06.160 189 INFO tempest.lib.common.rest_client [req-20df5093-06a6-4642-b781-fdefed2549a8 ] Request (GroupsV3RbacTest:test_update_group): 200 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/47193bc5-3a6f-4be2-92fd-4ff85c72552d 0.054s 2020-12-14 02:34:06.164 189 DEBUG tempest.lib.common.rest_client [req-20df5093-06a6-4642-b781-fdefed2549a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-20df5093-06a6-4642-b781-fdefed2549a8', 'content-length': '339', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-20df5093-06a6-4642-b781-fdefed2549a8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/47193bc5-3a6f-4be2-92fd-4ff85c72552d'} Body: b'{"group": {"id": "47193bc5-3a6f-4be2-92fd-4ff85c72552d", "status": "available", "availability_zone": "nova", "created_at": "2020-12-14T02:34:05.000000", "name": "tempest-GroupsV3RbacTest-Group-1797980213", "description": null, "group_type": "07cb97bb-2ee9-4d7b-842b-6528a44830d7", "volume_types": ["0619f4be-725e-4a19-8b44-9c12fd333c75"]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:06.196 189 INFO tempest.common.waiters [-] group 47193bc5-3a6f-4be2-92fd-4ff85c72552d reached available after waiting for 1.196669 seconds 2020-12-14 02:34:06.199 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:06.266 189 INFO tempest.lib.common.rest_client [req-6b3fe885-114c-49eb-8a2b-cf2e34232a27 ] Request (GroupsV3RbacTest:test_update_group): 200 GET http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles 0.061s 2020-12-14 02:34:06.270 189 DEBUG tempest.lib.common.rest_client [req-6b3fe885-114c-49eb-8a2b-cf2e34232a27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b3fe885-114c-49eb-8a2b-cf2e34232a27', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:06.319 189 INFO tempest.lib.common.rest_client [req-99789947-b056-4502-950b-2d9490fc1d37 ] Request (GroupsV3RbacTest:test_update_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:34:06.321 189 DEBUG tempest.lib.common.rest_client [req-99789947-b056-4502-950b-2d9490fc1d37 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-99789947-b056-4502-950b-2d9490fc1d37', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15c23763405a465ab33a0ffe85847a1e", "name": "tempest-GroupsV3RbacTest-1166666825", "password_expires_at": null}, "audit_ids": ["oM3sZYgzSliORJ6as-KcvQ"], "expires_at": "2020-12-14T03:34:06.000000Z", "issued_at": "2020-12-14T02:34:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e80f342b027448f8c027a1a9123b47a", "name": "tempest-GroupsV3RbacTest-1166666825"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:06.457 189 INFO tempest.lib.common.rest_client [req-6474fe06-e350-4cbc-94ca-174566dba155 ] Request (GroupsV3RbacTest:test_update_group): 202 PUT http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/47193bc5-3a6f-4be2-92fd-4ff85c72552d 0.128s 2020-12-14 02:34:06.461 189 DEBUG tempest.lib.common.rest_client [req-6474fe06-e350-4cbc-94ca-174566dba155 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"group": {"name": "tempest-GroupsV3RbacTest-Group-599509854"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-6474fe06-e350-4cbc-94ca-174566dba155', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/47193bc5-3a6f-4be2-92fd-4ff85c72552d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:06.463 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:06.530 189 INFO tempest.lib.common.rest_client [req-9c7f97b4-3209-4717-bd95-68f6694e4c3a ] Request (GroupsV3RbacTest:test_update_group): 200 GET http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles 0.061s 2020-12-14 02:34:06.534 189 DEBUG tempest.lib.common.rest_client [req-9c7f97b4-3209-4717-bd95-68f6694e4c3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9c7f97b4-3209-4717-bd95-68f6694e4c3a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a/users/15c23763405a465ab33a0ffe85847a1e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:06.585 189 INFO tempest.lib.common.rest_client [req-ba7aad79-a65c-4f4e-ad98-9aab9c92412c ] Request (GroupsV3RbacTest:test_update_group): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:34:06.589 189 DEBUG tempest.lib.common.rest_client [req-ba7aad79-a65c-4f4e-ad98-9aab9c92412c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba7aad79-a65c-4f4e-ad98-9aab9c92412c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "15c23763405a465ab33a0ffe85847a1e", "name": "tempest-GroupsV3RbacTest-1166666825", "password_expires_at": null}, "audit_ids": ["MTH-T1AvTOOcPsx-4mx6Gg"], "expires_at": "2020-12-14T03:34:06.000000Z", "issued_at": "2020-12-14T02:34:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e80f342b027448f8c027a1a9123b47a", "name": "tempest-GroupsV3RbacTest-1166666825"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e80f342b027448f8c027a1a9123b47a", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:06.743 189 INFO tempest.lib.common.rest_client [req-62fe778e-1709-449c-9133-2bd20453aa4a ] Request (GroupsV3RbacTest:_run_cleanups): 202 POST http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/47193bc5-3a6f-4be2-92fd-4ff85c72552d/action 0.144s 2020-12-14 02:34:06.745 189 DEBUG tempest.lib.common.rest_client [req-62fe778e-1709-449c-9133-2bd20453aa4a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: {"delete": {"delete-volumes": true}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-62fe778e-1709-449c-9133-2bd20453aa4a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/47193bc5-3a6f-4be2-92fd-4ff85c72552d/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:06.805 189 INFO tempest.lib.common.rest_client [req-104e991b-2e04-43bc-8fa2-254080a59bbc ] Request (GroupsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/47193bc5-3a6f-4be2-92fd-4ff85c72552d 0.051s 2020-12-14 02:34:06.809 189 DEBUG tempest.lib.common.rest_client [req-104e991b-2e04-43bc-8fa2-254080a59bbc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-104e991b-2e04-43bc-8fa2-254080a59bbc', 'content-length': '337', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-104e991b-2e04-43bc-8fa2-254080a59bbc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/47193bc5-3a6f-4be2-92fd-4ff85c72552d'} Body: b'{"group": {"id": "47193bc5-3a6f-4be2-92fd-4ff85c72552d", "status": "deleting", "availability_zone": "nova", "created_at": "2020-12-14T02:34:05.000000", "name": "tempest-GroupsV3RbacTest-Group-599509854", "description": null, "group_type": "07cb97bb-2ee9-4d7b-842b-6528a44830d7", "volume_types": ["0619f4be-725e-4a19-8b44-9c12fd333c75"]}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:07.884 189 INFO tempest.lib.common.rest_client [req-8172dfd4-cc5f-44d9-af56-19a27a830148 ] Request (GroupsV3RbacTest:_run_cleanups): 404 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/47193bc5-3a6f-4be2-92fd-4ff85c72552d 0.033s 2020-12-14 02:34:07.887 189 DEBUG tempest.lib.common.rest_client [req-8172dfd4-cc5f-44d9-af56-19a27a830148 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'content-length': '108', 'content-type': 'application/json', 'x-compute-request-id': 'req-8172dfd4-cc5f-44d9-af56-19a27a830148', 'x-openstack-request-id': 'req-8172dfd4-cc5f-44d9-af56-19a27a830148', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/groups/47193bc5-3a6f-4be2-92fd-4ff85c72552d'} Body: b'{"itemNotFound": {"code": 404, "message": "Group 47193bc5-3a6f-4be2-92fd-4ff85c72552d could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:07.965 189 INFO tempest.lib.common.rest_client [req-051844b3-ae39-4da7-8731-9474375ee2b7 ] Request (GroupsV3RbacTest:_run_cleanups): 200 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/volumes/detail?all_tenants=True 0.070s 2020-12-14 02:34:07.969 189 DEBUG tempest.lib.common.rest_client [req-051844b3-ae39-4da7-8731-9474375ee2b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-051844b3-ae39-4da7-8731-9474375ee2b7', 'content-length': '1365', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-051844b3-ae39-4da7-8731-9474375ee2b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/volumes/detail?all_tenants=True'} Body: b'{"volumes": [{"id": "7783fce6-d6ea-46b4-a63a-381988b121fd", "status": "in-use", "size": 1, "availability_zone": "nova", "created_at": "2020-12-11T20:01:12.000000", "updated_at": "2020-12-11T20:03:10.000000", "name": "s_rally_95f231c4_xV6eepIv", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/volumes/7783fce6-d6ea-46b4-a63a-381988b121fd"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/3e80f342b027448f8c027a1a9123b47a/volumes/7783fce6-d6ea-46b4-a63a-381988b121fd"}], "user_id": "de792f245fc743ada005283bdec0af09", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [{"id": "7783fce6-d6ea-46b4-a63a-381988b121fd", "attachment_id": "61120a25-3311-41de-98b1-e901f1470da3", "volume_id": "7783fce6-d6ea-46b4-a63a-381988b121fd", "server_id": "f0c6bbc5-f27e-4246-a35c-bb6ec8d89a03", "host_name": "lf-virtual8", "device": "/dev/sdb", "attached_at": "2020-12-11T20:01:16.000000"}], "migration_status": null, "group_id": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual8@ceph#ceph", "os-vol-tenant-attr:tenant_id": "13e02f91606843a4a42f6e60ca962591"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:08.121 189 INFO tempest.lib.common.rest_client [req-f98e5e2a-7115-47f7-b19d-bb49e0296b54 ] Request (GroupsV3RbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types/07cb97bb-2ee9-4d7b-842b-6528a44830d7 0.047s 2020-12-14 02:34:08.126 189 DEBUG tempest.lib.common.rest_client [req-f98e5e2a-7115-47f7-b19d-bb49e0296b54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.13', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.13', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f98e5e2a-7115-47f7-b19d-bb49e0296b54', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/group_types/07cb97bb-2ee9-4d7b-842b-6528a44830d7'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:08.224 189 INFO tempest.lib.common.rest_client [req-dcb1f7ff-8208-49c7-bf22-50eb77c4f2f6 ] Request (GroupsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/0619f4be-725e-4a19-8b44-9c12fd333c75 0.081s 2020-12-14 02:34:08.227 189 DEBUG tempest.lib.common.rest_client [req-dcb1f7ff-8208-49c7-bf22-50eb77c4f2f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-dcb1f7ff-8208-49c7-bf22-50eb77c4f2f6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/0619f4be-725e-4a19-8b44-9c12fd333c75'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:08.264 189 INFO tempest.lib.common.rest_client [req-8964e475-d5ea-4bda-81c1-97164eb61535 ] Request (GroupsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/0619f4be-725e-4a19-8b44-9c12fd333c75 0.032s 2020-12-14 02:34:08.266 189 DEBUG tempest.lib.common.rest_client [req-8964e475-d5ea-4bda-81c1-97164eb61535 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-8964e475-d5ea-4bda-81c1-97164eb61535', 'x-openstack-request-id': 'req-8964e475-d5ea-4bda-81c1-97164eb61535', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/0619f4be-725e-4a19-8b44-9c12fd333c75'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 0619f4be-725e-4a19-8b44-9c12fd333c75 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:08.352 189 INFO tempest.lib.common.rest_client [req-db371371-edeb-491b-9aca-6e53400ebcb8 ] Request (GroupsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/a2eeb712-2be8-4b0c-a62c-d84a40f586c8 0.081s 2020-12-14 02:34:08.354 189 DEBUG tempest.lib.common.rest_client [req-db371371-edeb-491b-9aca-6e53400ebcb8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-db371371-edeb-491b-9aca-6e53400ebcb8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/a2eeb712-2be8-4b0c-a62c-d84a40f586c8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:08.392 189 INFO tempest.lib.common.rest_client [req-340521a9-77b1-484f-961a-01793349181b ] Request (GroupsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/a2eeb712-2be8-4b0c-a62c-d84a40f586c8 0.033s 2020-12-14 02:34:08.395 189 DEBUG tempest.lib.common.rest_client [req-340521a9-77b1-484f-961a-01793349181b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-340521a9-77b1-484f-961a-01793349181b', 'x-openstack-request-id': 'req-340521a9-77b1-484f-961a-01793349181b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/a2eeb712-2be8-4b0c-a62c-d84a40f586c8'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type a2eeb712-2be8-4b0c-a62c-d84a40f586c8 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:08.482 189 INFO tempest.lib.common.rest_client [req-25426b2b-8fd4-422a-b86d-d7fbb8cce013 ] Request (GroupsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/7fb2c4a8-67a6-4faa-8531-4fe48aa1884e 0.082s 2020-12-14 02:34:08.484 189 DEBUG tempest.lib.common.rest_client [req-25426b2b-8fd4-422a-b86d-d7fbb8cce013 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-25426b2b-8fd4-422a-b86d-d7fbb8cce013', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/7fb2c4a8-67a6-4faa-8531-4fe48aa1884e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:08.520 189 INFO tempest.lib.common.rest_client [req-72bbb92f-61d4-4b08-9e12-636263c35e97 ] Request (GroupsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/7fb2c4a8-67a6-4faa-8531-4fe48aa1884e 0.030s 2020-12-14 02:34:08.522 189 DEBUG tempest.lib.common.rest_client [req-72bbb92f-61d4-4b08-9e12-636263c35e97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-72bbb92f-61d4-4b08-9e12-636263c35e97', 'x-openstack-request-id': 'req-72bbb92f-61d4-4b08-9e12-636263c35e97', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/7fb2c4a8-67a6-4faa-8531-4fe48aa1884e'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 7fb2c4a8-67a6-4faa-8531-4fe48aa1884e could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:08.608 189 INFO tempest.lib.common.rest_client [req-e34e3d71-584e-4f04-93d2-f44905c02d6c ] Request (GroupsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/4665cdbf-3475-468c-b3dd-a1191becd2e7 0.079s 2020-12-14 02:34:08.610 189 DEBUG tempest.lib.common.rest_client [req-e34e3d71-584e-4f04-93d2-f44905c02d6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e34e3d71-584e-4f04-93d2-f44905c02d6c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/4665cdbf-3475-468c-b3dd-a1191becd2e7'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:08.648 189 INFO tempest.lib.common.rest_client [req-44937fd3-e7c6-4e87-b7a3-c142b4d0861d ] Request (GroupsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/4665cdbf-3475-468c-b3dd-a1191becd2e7 0.032s 2020-12-14 02:34:08.651 189 DEBUG tempest.lib.common.rest_client [req-44937fd3-e7c6-4e87-b7a3-c142b4d0861d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-44937fd3-e7c6-4e87-b7a3-c142b4d0861d', 'x-openstack-request-id': 'req-44937fd3-e7c6-4e87-b7a3-c142b4d0861d', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/4665cdbf-3475-468c-b3dd-a1191becd2e7'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 4665cdbf-3475-468c-b3dd-a1191becd2e7 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:08.734 189 INFO tempest.lib.common.rest_client [req-76280b7e-fdfc-43bc-8492-a1736ec55f38 ] Request (GroupsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/280424e7-2b1f-45a3-9eb9-238f755a7a59 0.077s 2020-12-14 02:34:08.737 189 DEBUG tempest.lib.common.rest_client [req-76280b7e-fdfc-43bc-8492-a1736ec55f38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-76280b7e-fdfc-43bc-8492-a1736ec55f38', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/280424e7-2b1f-45a3-9eb9-238f755a7a59'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:08.774 189 INFO tempest.lib.common.rest_client [req-3128837d-dbc2-43c2-88a2-cbdf79809421 ] Request (GroupsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/280424e7-2b1f-45a3-9eb9-238f755a7a59 0.031s 2020-12-14 02:34:08.776 189 DEBUG tempest.lib.common.rest_client [req-3128837d-dbc2-43c2-88a2-cbdf79809421 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-3128837d-dbc2-43c2-88a2-cbdf79809421', 'x-openstack-request-id': 'req-3128837d-dbc2-43c2-88a2-cbdf79809421', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/280424e7-2b1f-45a3-9eb9-238f755a7a59'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 280424e7-2b1f-45a3-9eb9-238f755a7a59 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:08.863 189 INFO tempest.lib.common.rest_client [req-39d5030e-aa66-43b5-a6ae-e8a966c94e1d ] Request (GroupsV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/7b1fc670-e9aa-4154-a28d-74d20db1ead8 0.080s 2020-12-14 02:34:08.866 189 DEBUG tempest.lib.common.rest_client [req-39d5030e-aa66-43b5-a6ae-e8a966c94e1d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-39d5030e-aa66-43b5-a6ae-e8a966c94e1d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/7b1fc670-e9aa-4154-a28d-74d20db1ead8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:08.905 189 INFO tempest.lib.common.rest_client [req-6f515a85-981e-43a1-bbe3-57d1287a776a ] Request (GroupsV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/7b1fc670-e9aa-4154-a28d-74d20db1ead8 0.033s 2020-12-14 02:34:08.907 189 DEBUG tempest.lib.common.rest_client [req-6f515a85-981e-43a1-bbe3-57d1287a776a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-6f515a85-981e-43a1-bbe3-57d1287a776a', 'x-openstack-request-id': 'req-6f515a85-981e-43a1-bbe3-57d1287a776a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/3e80f342b027448f8c027a1a9123b47a/types/7b1fc670-e9aa-4154-a28d-74d20db1ead8'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 7b1fc670-e9aa-4154-a28d-74d20db1ead8 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:09.046 189 INFO tempest.lib.common.rest_client [req-d6ee726d-76e6-4bf1-9cd9-6c2eac7614ed ] Request (GroupsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/15c23763405a465ab33a0ffe85847a1e 0.133s 2020-12-14 02:34:09.049 189 DEBUG tempest.lib.common.rest_client [req-d6ee726d-76e6-4bf1-9cd9-6c2eac7614ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6ee726d-76e6-4bf1-9cd9-6c2eac7614ed', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/15c23763405a465ab33a0ffe85847a1e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:09.168 189 INFO tempest.lib.common.rest_client [req-b334b360-c726-4ea6-8e08-362ab27bf73d ] Request (GroupsV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:34:09.171 189 DEBUG tempest.lib.common.rest_client [req-b334b360-c726-4ea6-8e08-362ab27bf73d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b334b360-c726-4ea6-8e08-362ab27bf73d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["LB197BdSQ76-bNOMOIfu9g"], "expires_at": "2020-12-14T03:34:09.000000Z", "issued_at": "2020-12-14T02:34:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:09.608 189 INFO tempest.lib.common.rest_client [req-6a828267-9a2d-485f-9240-2f5f08388eed ] Request (GroupsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3e80f342b027448f8c027a1a9123b47a&name=default 0.430s 2020-12-14 02:34:09.611 189 DEBUG tempest.lib.common.rest_client [req-6a828267-9a2d-485f-9240-2f5f08388eed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-6a828267-9a2d-485f-9240-2f5f08388eed', 'date': 'Mon, 14 Dec 2020 02:34:09 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3e80f342b027448f8c027a1a9123b47a&name=default'} Body: b'{"security_groups": [{"id": "2d06e767-9cd4-4279-92a4-fe487a7340dc", "name": "default", "stateful": true, "tenant_id": "3e80f342b027448f8c027a1a9123b47a", "description": "Default security group", "security_group_rules": [{"id": "1e28415f-7427-462d-8477-aff977a6459d", "tenant_id": "3e80f342b027448f8c027a1a9123b47a", "security_group_id": "2d06e767-9cd4-4279-92a4-fe487a7340dc", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:34:09Z", "updated_at": "2020-12-14T02:34:09Z", "revision_number": 0, "project_id": "3e80f342b027448f8c027a1a9123b47a"}, {"id": "4700be87-1edb-4e85-b3df-84eac52bc3f0", "tenant_id": "3e80f342b027448f8c027a1a9123b47a", "security_group_id": "2d06e767-9cd4-4279-92a4-fe487a7340dc", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:34:09Z", "updated_at": "2020-12-14T02:34:09Z", "revision_number": 0, "project_id": "3e80f342b027448f8c027a1a9123b47a"}, {"id": "c69e5e1a-8dea-4e0d-a052-14d70e609b08", "tenant_id": "3e80f342b027448f8c027a1a9123b47a", "security_group_id": "2d06e767-9cd4-4279-92a4-fe487a7340dc", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2d06e767-9cd4-4279-92a4-fe487a7340dc", "description": null, "tags": [], "created_at": "2020-12-14T02:34:09Z", "updated_at": "2020-12-14T02:34:09Z", "revision_number": 0, "project_id": "3e80f342b027448f8c027a1a9123b47a"}, {"id": "d7bfbe60-3a03-4dd6-a5ef-1f1fb2f6b810", "tenant_id": "3e80f342b027448f8c027a1a9123b47a", "security_group_id": "2d06e767-9cd4-4279-92a4-fe487a7340dc", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2d06e767-9cd4-4279-92a4-fe487a7340dc", "description": null, "tags": [], "created_at": "2020-12-14T02:34:09Z", "updated_at": "2020-12-14T02:34:09Z", "revision_number": 0, "project_id": "3e80f342b027448f8c027a1a9123b47a"}], "tags": [], "created_at": "2020-12-14T02:34:09Z", "updated_at": "2020-12-14T02:34:09Z", "revision_number": 1, "project_id": "3e80f342b027448f8c027a1a9123b47a"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:09.769 189 INFO tempest.lib.common.rest_client [req-6625f2dd-e6f9-40aa-82ce-53b5627cbd4f ] Request (GroupsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/2d06e767-9cd4-4279-92a4-fe487a7340dc 0.151s 2020-12-14 02:34:09.771 189 DEBUG tempest.lib.common.rest_client [req-6625f2dd-e6f9-40aa-82ce-53b5627cbd4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-6625f2dd-e6f9-40aa-82ce-53b5627cbd4f', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:34:09 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/2d06e767-9cd4-4279-92a4-fe487a7340dc'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:09.925 189 INFO tempest.lib.common.rest_client [req-1f271362-dd10-41d6-a33c-4641a7e88b56 ] Request (GroupsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a 0.147s 2020-12-14 02:34:09.927 189 DEBUG tempest.lib.common.rest_client [req-1f271362-dd10-41d6-a33c-4641a7e88b56 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f271362-dd10-41d6-a33c-4641a7e88b56', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3e80f342b027448f8c027a1a9123b47a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:10.038 189 INFO tempest.lib.common.rest_client [req-d3e9fa70-af0e-4e51-88ce-197cb81e176c ] Request (SchedulerStatsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:34:10.041 189 DEBUG tempest.lib.common.rest_client [req-d3e9fa70-af0e-4e51-88ce-197cb81e176c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3e9fa70-af0e-4e51-88ce-197cb81e176c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["tSgB278hRomlOzIaFTLBsg"], "expires_at": "2020-12-14T03:34:09.000000Z", "issued_at": "2020-12-14T02:34:09.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:10.140 189 INFO tempest.lib.common.rest_client [req-523b9fed-49db-4e2a-868f-18770245b7dd ] Request (SchedulerStatsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:34:10.143 189 DEBUG tempest.lib.common.rest_client [req-523b9fed-49db-4e2a-868f-18770245b7dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-523b9fed-49db-4e2a-868f-18770245b7dd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["c8Z7OPIHSsG2_d-Qfg168g"], "expires_at": "2020-12-14T03:34:10.000000Z", "issued_at": "2020-12-14T02:34:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:10.217 189 INFO tempest.lib.common.rest_client [req-5134365b-d0bd-42d9-a017-ab5b1e2132c4 ] Request (SchedulerStatsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.067s 2020-12-14 02:34:10.220 189 DEBUG tempest.lib.common.rest_client [req-5134365b-d0bd-42d9-a017-ab5b1e2132c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5134365b-d0bd-42d9-a017-ab5b1e2132c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:10.302 189 INFO tempest.lib.common.rest_client [req-47511147-7fef-4549-bdc7-3e0ec56d203b ] Request (SchedulerStatsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.074s 2020-12-14 02:34:10.304 189 DEBUG tempest.lib.common.rest_client [req-47511147-7fef-4549-bdc7-3e0ec56d203b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SchedulerStatsV3RbacTest-2036011140-desc", "domain_id": "default", "name": "tempest-SchedulerStatsV3RbacTest-2036011140"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47511147-7fef-4549-bdc7-3e0ec56d203b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "f8c7ad5aadf0475b95de32bc7fbf0891", "name": "tempest-SchedulerStatsV3RbacTest-2036011140", "domain_id": "default", "description": "tempest-SchedulerStatsV3RbacTest-2036011140-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:10.438 189 INFO tempest.lib.common.rest_client [req-26311478-5cca-425b-9352-3b9c71d5af5c ] Request (SchedulerStatsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.126s 2020-12-14 02:34:10.440 189 DEBUG tempest.lib.common.rest_client [req-26311478-5cca-425b-9352-3b9c71d5af5c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SchedulerStatsV3RbacTest-2036011140", "password": "W7~ZeA2pZ~=btzA", "project_id": "f8c7ad5aadf0475b95de32bc7fbf0891", "email": "tempest-SchedulerStatsV3RbacTest-1969999534@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '404', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26311478-5cca-425b-9352-3b9c71d5af5c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "f8c7ad5aadf0475b95de32bc7fbf0891", "email": "tempest-SchedulerStatsV3RbacTest-1969999534@example.com", "id": "c744d5b15bcc49f9aaace9cc337d54a9", "name": "tempest-SchedulerStatsV3RbacTest-2036011140", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/c744d5b15bcc49f9aaace9cc337d54a9"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:10.515 189 INFO tempest.lib.common.rest_client [req-c8c2952c-21fd-423a-85e0-6d5ad80bea75 ] Request (SchedulerStatsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.066s 2020-12-14 02:34:10.518 189 DEBUG tempest.lib.common.rest_client [req-c8c2952c-21fd-423a-85e0-6d5ad80bea75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c8c2952c-21fd-423a-85e0-6d5ad80bea75', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:10.582 189 INFO tempest.lib.common.rest_client [req-41c8fd88-79db-4df8-b456-3caae78efe3d ] Request (SchedulerStatsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:34:10.585 189 DEBUG tempest.lib.common.rest_client [req-41c8fd88-79db-4df8-b456-3caae78efe3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41c8fd88-79db-4df8-b456-3caae78efe3d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:10.669 189 INFO tempest.lib.common.rest_client [req-ae71222c-94a4-4833-886f-a7fe3bb4bbe4 ] Request (SchedulerStatsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891/users/c744d5b15bcc49f9aaace9cc337d54a9/roles/72a4576c553448cd941b052c1ca0cf2d 0.075s 2020-12-14 02:34:10.672 189 DEBUG tempest.lib.common.rest_client [req-ae71222c-94a4-4833-886f-a7fe3bb4bbe4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae71222c-94a4-4833-886f-a7fe3bb4bbe4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891/users/c744d5b15bcc49f9aaace9cc337d54a9/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:10.676 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SchedulerStatsV3RbacTest-2036011140', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'f8c7ad5aadf0475b95de32bc7fbf0891', 'project_name': 'tempest-SchedulerStatsV3RbacTest-2036011140', 'tenant_id': 'f8c7ad5aadf0475b95de32bc7fbf0891', 'tenant_name': 'tempest-SchedulerStatsV3RbacTest-2036011140', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c744d5b15bcc49f9aaace9cc337d54a9'}, Network: None, Subnet: None, Router: None 2020-12-14 02:34:10.678 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SchedulerStatsV3RbacTest-2036011140', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'f8c7ad5aadf0475b95de32bc7fbf0891', 'project_name': 'tempest-SchedulerStatsV3RbacTest-2036011140', 'tenant_id': 'f8c7ad5aadf0475b95de32bc7fbf0891', 'tenant_name': 'tempest-SchedulerStatsV3RbacTest-2036011140', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c744d5b15bcc49f9aaace9cc337d54a9'}, Network: None, Subnet: None, Router: None 2020-12-14 02:34:10.842 189 INFO tempest.lib.common.rest_client [req-de25aeae-1f1e-4830-b491-7eddb4992f31 ] Request (SchedulerStatsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:34:10.845 189 DEBUG tempest.lib.common.rest_client [req-de25aeae-1f1e-4830-b491-7eddb4992f31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de25aeae-1f1e-4830-b491-7eddb4992f31', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c744d5b15bcc49f9aaace9cc337d54a9", "name": "tempest-SchedulerStatsV3RbacTest-2036011140", "password_expires_at": null}, "audit_ids": ["1YX5iFJ0SkWHKTN5AQ0t4A"], "expires_at": "2020-12-14T03:34:10.000000Z", "issued_at": "2020-12-14T02:34:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f8c7ad5aadf0475b95de32bc7fbf0891", "name": "tempest-SchedulerStatsV3RbacTest-2036011140"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:10.965 189 INFO tempest.lib.common.rest_client [req-6fbf25d1-d4fa-4dd4-84f4-10819f0ce5df ] Request (SchedulerStatsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-14 02:34:10.968 189 DEBUG tempest.lib.common.rest_client [req-6fbf25d1-d4fa-4dd4-84f4-10819f0ce5df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:10 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6fbf25d1-d4fa-4dd4-84f4-10819f0ce5df', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["O2-OqedMTL2yxtmeB_9OWA"], "expires_at": "2020-12-14T03:34:10.000000Z", "issued_at": "2020-12-14T02:34:10.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:11.085 189 INFO tempest.lib.common.rest_client [req-35073416-e405-4cab-baf1-7b3f909734ee ] Request (SchedulerStatsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:34:11.088 189 DEBUG tempest.lib.common.rest_client [req-35073416-e405-4cab-baf1-7b3f909734ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-35073416-e405-4cab-baf1-7b3f909734ee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Kc9_iKGgRIaQltsOaFzfmQ"], "expires_at": "2020-12-14T03:34:11.000000Z", "issued_at": "2020-12-14T02:34:11.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:11.154 189 INFO tempest.lib.common.rest_client [req-34d1516c-f49c-410f-8b79-bc4d372be42e ] Request (SchedulerStatsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.059s 2020-12-14 02:34:11.157 189 DEBUG tempest.lib.common.rest_client [req-34d1516c-f49c-410f-8b79-bc4d372be42e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34d1516c-f49c-410f-8b79-bc4d372be42e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:11.229 189 INFO tempest.lib.common.rest_client [req-c2a4ecc8-f64c-4b0a-a346-a809338b3f53 ] Request (SchedulerStatsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.064s 2020-12-14 02:34:11.232 189 DEBUG tempest.lib.common.rest_client [req-c2a4ecc8-f64c-4b0a-a346-a809338b3f53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2a4ecc8-f64c-4b0a-a346-a809338b3f53', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:11.235 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:34:11.238 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:11.314 189 INFO tempest.lib.common.rest_client [req-9d513918-132d-4331-bcd6-ef9a59343a5f ] Request (SchedulerStatsV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891/users/c744d5b15bcc49f9aaace9cc337d54a9/roles 0.070s 2020-12-14 02:34:11.317 189 DEBUG tempest.lib.common.rest_client [req-9d513918-132d-4331-bcd6-ef9a59343a5f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9d513918-132d-4331-bcd6-ef9a59343a5f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891/users/c744d5b15bcc49f9aaace9cc337d54a9/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891/users/c744d5b15bcc49f9aaace9cc337d54a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:11.389 189 INFO tempest.lib.common.rest_client [req-4ddab16d-7b50-433a-9070-0a67e9818df6 ] Request (SchedulerStatsV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891/users/c744d5b15bcc49f9aaace9cc337d54a9/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-12-14 02:34:11.391 189 DEBUG tempest.lib.common.rest_client [req-4ddab16d-7b50-433a-9070-0a67e9818df6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ddab16d-7b50-433a-9070-0a67e9818df6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891/users/c744d5b15bcc49f9aaace9cc337d54a9/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:11.509 189 INFO tempest.lib.common.rest_client [req-9d68a0c5-1e0f-4da1-808d-77bcd919b15f ] Request (SchedulerStatsV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891/users/c744d5b15bcc49f9aaace9cc337d54a9/roles/a629c95d64b3416fb80ae90af4f69c05 0.111s 2020-12-14 02:34:11.513 189 DEBUG tempest.lib.common.rest_client [req-9d68a0c5-1e0f-4da1-808d-77bcd919b15f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:11 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9d68a0c5-1e0f-4da1-808d-77bcd919b15f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891/users/c744d5b15bcc49f9aaace9cc337d54a9/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:12.631 189 INFO tempest.lib.common.rest_client [req-1a008eef-f201-47ee-ad4e-7fa7d5353eb0 ] Request (SchedulerStatsV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-12-14 02:34:12.634 189 DEBUG tempest.lib.common.rest_client [req-1a008eef-f201-47ee-ad4e-7fa7d5353eb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a008eef-f201-47ee-ad4e-7fa7d5353eb0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c744d5b15bcc49f9aaace9cc337d54a9", "name": "tempest-SchedulerStatsV3RbacTest-2036011140", "password_expires_at": null}, "audit_ids": ["X6lOtwo5QUmtfrXXu4rY2Q"], "expires_at": "2020-12-14T03:34:12.000000Z", "issued_at": "2020-12-14T02:34:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f8c7ad5aadf0475b95de32bc7fbf0891", "name": "tempest-SchedulerStatsV3RbacTest-2036011140"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:12.646 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:12.664 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: scheduler_extension:scheduler_stats:get_pools, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:12.666 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:12.790 189 INFO tempest.lib.common.rest_client [req-57640427-91d5-44fa-a8ca-3b428e2220af ] Request (SchedulerStatsV3RbacTest:test_list_back_end_storage_pools): 200 GET http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891/users/c744d5b15bcc49f9aaace9cc337d54a9/roles 0.119s 2020-12-14 02:34:12.793 189 DEBUG tempest.lib.common.rest_client [req-57640427-91d5-44fa-a8ca-3b428e2220af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57640427-91d5-44fa-a8ca-3b428e2220af', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891/users/c744d5b15bcc49f9aaace9cc337d54a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891/users/c744d5b15bcc49f9aaace9cc337d54a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:12.848 189 INFO tempest.lib.common.rest_client [req-741ca089-3a02-4054-bbdd-88a4fc3da758 ] Request (SchedulerStatsV3RbacTest:test_list_back_end_storage_pools): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:34:12.852 189 DEBUG tempest.lib.common.rest_client [req-741ca089-3a02-4054-bbdd-88a4fc3da758 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-741ca089-3a02-4054-bbdd-88a4fc3da758', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c744d5b15bcc49f9aaace9cc337d54a9", "name": "tempest-SchedulerStatsV3RbacTest-2036011140", "password_expires_at": null}, "audit_ids": ["yqqAj3DBQxizN_RVcNYNQA"], "expires_at": "2020-12-14T03:34:12.000000Z", "issued_at": "2020-12-14T02:34:12.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f8c7ad5aadf0475b95de32bc7fbf0891", "name": "tempest-SchedulerStatsV3RbacTest-2036011140"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:13.060 189 INFO tempest.lib.common.rest_client [req-20715127-8821-435e-916f-b61ce78fbfa8 ] Request (SchedulerStatsV3RbacTest:test_list_back_end_storage_pools): 200 GET http://172.30.13.94/volume/v3/f8c7ad5aadf0475b95de32bc7fbf0891/scheduler-stats/get_pools 0.201s 2020-12-14 02:34:13.064 189 DEBUG tempest.lib.common.rest_client [req-20715127-8821-435e-916f-b61ce78fbfa8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:12 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-20715127-8821-435e-916f-b61ce78fbfa8', 'content-length': '81', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-20715127-8821-435e-916f-b61ce78fbfa8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/f8c7ad5aadf0475b95de32bc7fbf0891/scheduler-stats/get_pools'} Body: b'{"pools": [{"name": "lf-virtual9@ceph#ceph"}, {"name": "lf-virtual8@ceph#ceph"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:13.082 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:13.157 189 INFO tempest.lib.common.rest_client [req-ea8c154d-3cb3-4cd0-82b8-62e68cd34577 ] Request (SchedulerStatsV3RbacTest:test_list_back_end_storage_pools): 200 GET http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891/users/c744d5b15bcc49f9aaace9cc337d54a9/roles 0.068s 2020-12-14 02:34:13.160 189 DEBUG tempest.lib.common.rest_client [req-ea8c154d-3cb3-4cd0-82b8-62e68cd34577 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea8c154d-3cb3-4cd0-82b8-62e68cd34577', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891/users/c744d5b15bcc49f9aaace9cc337d54a9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891/users/c744d5b15bcc49f9aaace9cc337d54a9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:13.209 189 INFO tempest.lib.common.rest_client [req-46517e11-8723-4cee-b8f9-2af86c92c383 ] Request (SchedulerStatsV3RbacTest:test_list_back_end_storage_pools): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:34:13.212 189 DEBUG tempest.lib.common.rest_client [req-46517e11-8723-4cee-b8f9-2af86c92c383 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46517e11-8723-4cee-b8f9-2af86c92c383', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c744d5b15bcc49f9aaace9cc337d54a9", "name": "tempest-SchedulerStatsV3RbacTest-2036011140", "password_expires_at": null}, "audit_ids": ["7Dxj_7hXRU299Y_wBvzPCg"], "expires_at": "2020-12-14T03:34:13.000000Z", "issued_at": "2020-12-14T02:34:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "f8c7ad5aadf0475b95de32bc7fbf0891", "name": "tempest-SchedulerStatsV3RbacTest-2036011140"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_f8c7ad5aadf0475b95de32bc7fbf0891", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:13.398 189 INFO tempest.lib.common.rest_client [req-2071c0c4-2866-4749-9ce2-9712e1e2a0fb ] Request (SchedulerStatsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/c744d5b15bcc49f9aaace9cc337d54a9 0.170s 2020-12-14 02:34:13.401 189 DEBUG tempest.lib.common.rest_client [req-2071c0c4-2866-4749-9ce2-9712e1e2a0fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2071c0c4-2866-4749-9ce2-9712e1e2a0fb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/c744d5b15bcc49f9aaace9cc337d54a9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:13.501 189 INFO tempest.lib.common.rest_client [req-ccc178ac-9f0f-4996-be9c-baa4d92e654c ] Request (SchedulerStatsV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:34:13.505 189 DEBUG tempest.lib.common.rest_client [req-ccc178ac-9f0f-4996-be9c-baa4d92e654c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:13 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ccc178ac-9f0f-4996-be9c-baa4d92e654c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["0UeYQ6G1QBaVQSSTXesweA"], "expires_at": "2020-12-14T03:34:13.000000Z", "issued_at": "2020-12-14T02:34:13.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:13.836 189 INFO tempest.lib.common.rest_client [req-c4ba2998-fd2a-456c-af16-abf75505da2c ] Request (SchedulerStatsV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=f8c7ad5aadf0475b95de32bc7fbf0891&name=default 0.324s 2020-12-14 02:34:13.840 189 DEBUG tempest.lib.common.rest_client [req-c4ba2998-fd2a-456c-af16-abf75505da2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-c4ba2998-fd2a-456c-af16-abf75505da2c', 'date': 'Mon, 14 Dec 2020 02:34:13 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=f8c7ad5aadf0475b95de32bc7fbf0891&name=default'} Body: b'{"security_groups": [{"id": "447b7068-c995-4aed-a60c-163d7f5dc9e4", "name": "default", "stateful": true, "tenant_id": "f8c7ad5aadf0475b95de32bc7fbf0891", "description": "Default security group", "security_group_rules": [{"id": "99c8492a-ad80-4ea1-a2f6-ffa695567277", "tenant_id": "f8c7ad5aadf0475b95de32bc7fbf0891", "security_group_id": "447b7068-c995-4aed-a60c-163d7f5dc9e4", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "447b7068-c995-4aed-a60c-163d7f5dc9e4", "description": null, "tags": [], "created_at": "2020-12-14T02:34:13Z", "updated_at": "2020-12-14T02:34:13Z", "revision_number": 0, "project_id": "f8c7ad5aadf0475b95de32bc7fbf0891"}, {"id": "bd2684e0-c236-4583-9fe1-03eeb0d2ae74", "tenant_id": "f8c7ad5aadf0475b95de32bc7fbf0891", "security_group_id": "447b7068-c995-4aed-a60c-163d7f5dc9e4", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:34:13Z", "updated_at": "2020-12-14T02:34:13Z", "revision_number": 0, "project_id": "f8c7ad5aadf0475b95de32bc7fbf0891"}, {"id": "ee671a41-9898-489c-9572-c2c1bce641a1", "tenant_id": "f8c7ad5aadf0475b95de32bc7fbf0891", "security_group_id": "447b7068-c995-4aed-a60c-163d7f5dc9e4", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:34:13Z", "updated_at": "2020-12-14T02:34:13Z", "revision_number": 0, "project_id": "f8c7ad5aadf0475b95de32bc7fbf0891"}, {"id": "f557ed37-816a-4927-9d87-791b79e6400e", "tenant_id": "f8c7ad5aadf0475b95de32bc7fbf0891", "security_group_id": "447b7068-c995-4aed-a60c-163d7f5dc9e4", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "447b7068-c995-4aed-a60c-163d7f5dc9e4", "description": null, "tags": [], "created_at": "2020-12-14T02:34:13Z", "updated_at": "2020-12-14T02:34:13Z", "revision_number": 0, "project_id": "f8c7ad5aadf0475b95de32bc7fbf0891"}], "tags": [], "created_at": "2020-12-14T02:34:13Z", "updated_at": "2020-12-14T02:34:13Z", "revision_number": 1, "project_id": "f8c7ad5aadf0475b95de32bc7fbf0891"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:14.005 189 INFO tempest.lib.common.rest_client [req-9b49a61c-8c60-49a3-999f-7e91c1614bbf ] Request (SchedulerStatsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/447b7068-c995-4aed-a60c-163d7f5dc9e4 0.159s 2020-12-14 02:34:14.007 189 DEBUG tempest.lib.common.rest_client [req-9b49a61c-8c60-49a3-999f-7e91c1614bbf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-9b49a61c-8c60-49a3-999f-7e91c1614bbf', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:34:13 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/447b7068-c995-4aed-a60c-163d7f5dc9e4'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:14.157 189 INFO tempest.lib.common.rest_client [req-9474fe0b-49fb-43f2-9142-8828a0e499c9 ] Request (SchedulerStatsV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891 0.144s 2020-12-14 02:34:14.160 189 DEBUG tempest.lib.common.rest_client [req-9474fe0b-49fb-43f2-9142-8828a0e499c9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9474fe0b-49fb-43f2-9142-8828a0e499c9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/f8c7ad5aadf0475b95de32bc7fbf0891'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:14.271 189 INFO tempest.lib.common.rest_client [req-a3562700-b256-4cae-b480-caf82f8acece ] Request (MessagesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-14 02:34:14.274 189 DEBUG tempest.lib.common.rest_client [req-a3562700-b256-4cae-b480-caf82f8acece ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3562700-b256-4cae-b480-caf82f8acece', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["iq7Mzeo5SP2mL1bQ_xh9hQ"], "expires_at": "2020-12-14T03:34:14.000000Z", "issued_at": "2020-12-14T02:34:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:14.369 189 INFO tempest.lib.common.rest_client [req-aeaaaf7a-72c2-4df4-856b-98749b34d537 ] Request (MessagesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:34:14.371 189 DEBUG tempest.lib.common.rest_client [req-aeaaaf7a-72c2-4df4-856b-98749b34d537 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aeaaaf7a-72c2-4df4-856b-98749b34d537', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["gKvzwV7cQsacMuUabzu4IA"], "expires_at": "2020-12-14T03:34:14.000000Z", "issued_at": "2020-12-14T02:34:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:14.451 189 INFO tempest.lib.common.rest_client [req-bf1b9c23-a981-4574-9969-0ed7a12a623c ] Request (MessagesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.073s 2020-12-14 02:34:14.453 189 DEBUG tempest.lib.common.rest_client [req-bf1b9c23-a981-4574-9969-0ed7a12a623c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf1b9c23-a981-4574-9969-0ed7a12a623c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:14.527 189 INFO tempest.lib.common.rest_client [req-c7c9f007-b746-402f-967a-f1e20dc1d7b3 ] Request (MessagesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.066s 2020-12-14 02:34:14.530 189 DEBUG tempest.lib.common.rest_client [req-c7c9f007-b746-402f-967a-f1e20dc1d7b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-MessagesV3RbacTest-185938494-desc", "domain_id": "default", "name": "tempest-MessagesV3RbacTest-185938494"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7c9f007-b746-402f-967a-f1e20dc1d7b3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "35e4c39c5737408782d6587ad336ff47", "name": "tempest-MessagesV3RbacTest-185938494", "domain_id": "default", "description": "tempest-MessagesV3RbacTest-185938494-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:14.648 189 INFO tempest.lib.common.rest_client [req-3b32d68e-d60b-4673-89d7-d9b26c79863f ] Request (MessagesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.111s 2020-12-14 02:34:14.650 189 DEBUG tempest.lib.common.rest_client [req-3b32d68e-d60b-4673-89d7-d9b26c79863f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-MessagesV3RbacTest-185938494", "password": "M0*#Wb*4+tQW@Tw", "project_id": "35e4c39c5737408782d6587ad336ff47", "email": "tempest-MessagesV3RbacTest-796195956@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b32d68e-d60b-4673-89d7-d9b26c79863f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "35e4c39c5737408782d6587ad336ff47", "email": "tempest-MessagesV3RbacTest-796195956@example.com", "id": "4a1aa3ffd2c6467682748b8ea1c19412", "name": "tempest-MessagesV3RbacTest-185938494", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/4a1aa3ffd2c6467682748b8ea1c19412"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:14.712 189 INFO tempest.lib.common.rest_client [req-7cc2e40a-6454-4357-99f9-1323e5473f33 ] Request (MessagesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-14 02:34:14.714 189 DEBUG tempest.lib.common.rest_client [req-7cc2e40a-6454-4357-99f9-1323e5473f33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7cc2e40a-6454-4357-99f9-1323e5473f33', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:14.784 189 INFO tempest.lib.common.rest_client [req-acb06c37-3b35-4111-b5e4-f0b6db569851 ] Request (MessagesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:34:14.786 189 DEBUG tempest.lib.common.rest_client [req-acb06c37-3b35-4111-b5e4-f0b6db569851 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-acb06c37-3b35-4111-b5e4-f0b6db569851', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:14.871 189 INFO tempest.lib.common.rest_client [req-155972ac-db32-402d-9f7f-6b36720c1f7a ] Request (MessagesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles/72a4576c553448cd941b052c1ca0cf2d 0.077s 2020-12-14 02:34:14.874 189 DEBUG tempest.lib.common.rest_client [req-155972ac-db32-402d-9f7f-6b36720c1f7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-155972ac-db32-402d-9f7f-6b36720c1f7a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:14.876 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MessagesV3RbacTest-185938494', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '35e4c39c5737408782d6587ad336ff47', 'project_name': 'tempest-MessagesV3RbacTest-185938494', 'tenant_id': '35e4c39c5737408782d6587ad336ff47', 'tenant_name': 'tempest-MessagesV3RbacTest-185938494', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '4a1aa3ffd2c6467682748b8ea1c19412'}, Network: None, Subnet: None, Router: None 2020-12-14 02:34:14.879 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MessagesV3RbacTest-185938494', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '35e4c39c5737408782d6587ad336ff47', 'project_name': 'tempest-MessagesV3RbacTest-185938494', 'tenant_id': '35e4c39c5737408782d6587ad336ff47', 'tenant_name': 'tempest-MessagesV3RbacTest-185938494', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '4a1aa3ffd2c6467682748b8ea1c19412'}, Network: None, Subnet: None, Router: None 2020-12-14 02:34:15.052 189 INFO tempest.lib.common.rest_client [req-6c625848-fa5d-4828-aa4e-09660b993f35 ] Request (MessagesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.112s 2020-12-14 02:34:15.055 189 DEBUG tempest.lib.common.rest_client [req-6c625848-fa5d-4828-aa4e-09660b993f35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:14 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6565', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6c625848-fa5d-4828-aa4e-09660b993f35', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4a1aa3ffd2c6467682748b8ea1c19412", "name": "tempest-MessagesV3RbacTest-185938494", "password_expires_at": null}, "audit_ids": ["nIlSg3OuQ2yry6JY4YX-Bg"], "expires_at": "2020-12-14T03:34:14.000000Z", "issued_at": "2020-12-14T02:34:14.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "35e4c39c5737408782d6587ad336ff47", "name": "tempest-MessagesV3RbacTest-185938494"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:15.159 189 INFO tempest.lib.common.rest_client [req-7fb8d004-6f06-4ec5-9ad8-dd68219a4fd7 ] Request (MessagesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:34:15.162 189 DEBUG tempest.lib.common.rest_client [req-7fb8d004-6f06-4ec5-9ad8-dd68219a4fd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7fb8d004-6f06-4ec5-9ad8-dd68219a4fd7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["fj-3PBAXQ5qVM2mUcONapg"], "expires_at": "2020-12-14T03:34:15.000000Z", "issued_at": "2020-12-14T02:34:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:15.275 189 INFO tempest.lib.common.rest_client [req-ea95f989-7589-4c81-b87c-528f14c2aca3 ] Request (MessagesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:34:15.278 189 DEBUG tempest.lib.common.rest_client [req-ea95f989-7589-4c81-b87c-528f14c2aca3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ea95f989-7589-4c81-b87c-528f14c2aca3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["6XmZsRxTQE63dmLSGRFisg"], "expires_at": "2020-12-14T03:34:15.000000Z", "issued_at": "2020-12-14T02:34:15.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:15.343 189 INFO tempest.lib.common.rest_client [req-0eba7286-2028-4578-889d-03745db9c9b6 ] Request (MessagesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.058s 2020-12-14 02:34:15.345 189 DEBUG tempest.lib.common.rest_client [req-0eba7286-2028-4578-889d-03745db9c9b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0eba7286-2028-4578-889d-03745db9c9b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:15.406 189 INFO tempest.lib.common.rest_client [req-56531bbf-e4db-4fe7-b54a-33b5e036fe94 ] Request (MessagesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-12-14 02:34:15.409 189 DEBUG tempest.lib.common.rest_client [req-56531bbf-e4db-4fe7-b54a-33b5e036fe94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56531bbf-e4db-4fe7-b54a-33b5e036fe94', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:15.413 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:34:15.415 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:15.478 189 INFO tempest.lib.common.rest_client [req-1231e11b-3339-4ba8-9dfa-45b99cbd7807 ] Request (MessagesV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles 0.058s 2020-12-14 02:34:15.479 189 DEBUG tempest.lib.common.rest_client [req-1231e11b-3339-4ba8-9dfa-45b99cbd7807 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1231e11b-3339-4ba8-9dfa-45b99cbd7807', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:15.554 189 INFO tempest.lib.common.rest_client [req-97216b70-e3d2-4083-b3fd-41882fa152e5 ] Request (MessagesV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-12-14 02:34:15.557 189 DEBUG tempest.lib.common.rest_client [req-97216b70-e3d2-4083-b3fd-41882fa152e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97216b70-e3d2-4083-b3fd-41882fa152e5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:15.688 189 INFO tempest.lib.common.rest_client [req-487eae32-3617-4774-a32b-1f37d0ea91ee ] Request (MessagesV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles/a629c95d64b3416fb80ae90af4f69c05 0.124s 2020-12-14 02:34:15.691 189 DEBUG tempest.lib.common.rest_client [req-487eae32-3617-4774-a32b-1f37d0ea91ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:15 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-487eae32-3617-4774-a32b-1f37d0ea91ee', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:16.804 189 INFO tempest.lib.common.rest_client [req-a1d6b907-12a6-4f7e-971d-4804b7d9e86a ] Request (MessagesV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-14 02:34:16.808 189 DEBUG tempest.lib.common.rest_client [req-a1d6b907-12a6-4f7e-971d-4804b7d9e86a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1d6b907-12a6-4f7e-971d-4804b7d9e86a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4a1aa3ffd2c6467682748b8ea1c19412", "name": "tempest-MessagesV3RbacTest-185938494", "password_expires_at": null}, "audit_ids": ["aMZh1uc2SB-o5nBHdi3_Yg"], "expires_at": "2020-12-14T03:34:16.000000Z", "issued_at": "2020-12-14T02:34:16.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "35e4c39c5737408782d6587ad336ff47", "name": "tempest-MessagesV3RbacTest-185938494"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:16.819 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:16.838 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: message:delete, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:17.054 189 INFO tempest.lib.common.rest_client [req-bb24ff60-90cb-45c1-ba1f-43c0fab04030 ] Request (MessagesV3RbacTest:test_delete_message): 200 POST http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/types 0.209s 2020-12-14 02:34:17.056 189 DEBUG tempest.lib.common.rest_client [req-bb24ff60-90cb-45c1-ba1f-43c0fab04030 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-MessagesV3RbacTest-volume-type-1740376269", "extra_specs": {"storage_protocol": "tempest-MessagesV3RbacTest-storage_protocol-103187958", "vendor_name": "tempest-MessagesV3RbacTest-vendor_name-690533171"}}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:16 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bb24ff60-90cb-45c1-ba1f-43c0fab04030', 'content-length': '366', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bb24ff60-90cb-45c1-ba1f-43c0fab04030', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/types'} Body: b'{"volume_type": {"id": "c2c54f88-0b07-4457-a49e-c48075877367", "name": "tempest-MessagesV3RbacTest-volume-type-1740376269", "is_public": true, "extra_specs": {"storage_protocol": "tempest-MessagesV3RbacTest-storage_protocol-103187958", "vendor_name": "tempest-MessagesV3RbacTest-vendor_name-690533171"}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:17.390 189 INFO tempest.lib.common.rest_client [req-48b2daf3-8d9e-4ab3-9576-eba4b40dcbe3 ] Request (MessagesV3RbacTest:test_delete_message): 202 POST http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes 0.305s 2020-12-14 02:34:17.393 189 DEBUG tempest.lib.common.rest_client [req-48b2daf3-8d9e-4ab3-9576-eba4b40dcbe3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: {"volume": {"volume_type": "c2c54f88-0b07-4457-a49e-c48075877367", "size": 1, "name": "tempest-MessagesV3RbacTest-Volume-2117799521"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-48b2daf3-8d9e-4ab3-9576-eba4b40dcbe3', 'content-length': '884', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-48b2daf3-8d9e-4ab3-9576-eba4b40dcbe3', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes'} Body: b'{"volume": {"id": "5271a291-01d5-439f-9680-a35a647d9541", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:17.000000", "updated_at": null, "name": "tempest-MessagesV3RbacTest-Volume-2117799521", "description": null, "volume_type": "tempest-MessagesV3RbacTest-volume-type-1740376269", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes/5271a291-01d5-439f-9680-a35a647d9541"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/35e4c39c5737408782d6587ad336ff47/volumes/5271a291-01d5-439f-9680-a35a647d9541"}], "user_id": "4a1aa3ffd2c6467682748b8ea1c19412", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:17.569 189 INFO tempest.lib.common.rest_client [req-d8650447-e883-4972-a433-5e273b139b49 ] Request (MessagesV3RbacTest:test_delete_message): 200 GET http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes/5271a291-01d5-439f-9680-a35a647d9541 0.092s 2020-12-14 02:34:17.572 189 DEBUG tempest.lib.common.rest_client [req-d8650447-e883-4972-a433-5e273b139b49 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d8650447-e883-4972-a433-5e273b139b49', 'content-length': '1084', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d8650447-e883-4972-a433-5e273b139b49', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes/5271a291-01d5-439f-9680-a35a647d9541'} Body: b'{"volume": {"id": "5271a291-01d5-439f-9680-a35a647d9541", "status": "error", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:17.000000", "updated_at": "2020-12-14T02:34:17.000000", "name": "tempest-MessagesV3RbacTest-Volume-2117799521", "description": null, "volume_type": "tempest-MessagesV3RbacTest-volume-type-1740376269", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes/5271a291-01d5-439f-9680-a35a647d9541"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/35e4c39c5737408782d6587ad336ff47/volumes/5271a291-01d5-439f-9680-a35a647d9541"}], "user_id": "4a1aa3ffd2c6467682748b8ea1c19412", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": null, "os-vol-tenant-attr:tenant_id": "35e4c39c5737408782d6587ad336ff47"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:17.665 189 INFO tempest.common.waiters [-] volume 5271a291-01d5-439f-9680-a35a647d9541 reached error after waiting for 0.664912 seconds 2020-12-14 02:34:17.698 189 INFO tempest.lib.common.rest_client [req-34591ca7-7c0b-4b2f-9f62-10326889a46c ] Request (MessagesV3RbacTest:test_delete_message): 200 GET http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages 0.028s 2020-12-14 02:34:17.700 189 DEBUG tempest.lib.common.rest_client [req-34591ca7-7c0b-4b2f-9f62-10326889a46c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-34591ca7-7c0b-4b2f-9f62-10326889a46c', 'content-length': '738', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-34591ca7-7c0b-4b2f-9f62-10326889a46c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages'} Body: b'{"messages": [{"id": "76cda2bd-dd50-4614-a146-f9e77490feed", "event_id": "VOLUME_VOLUME_001_003", "user_message": "schedule allocate volume:Could not find any available weighted backend.", "message_level": "ERROR", "created_at": "2020-12-14T02:34:17.000000", "guaranteed_until": "2021-01-13T02:34:17.000000", "request_id": "req-48b2daf3-8d9e-4ab3-9576-eba4b40dcbe3", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages/76cda2bd-dd50-4614-a146-f9e77490feed"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/35e4c39c5737408782d6587ad336ff47/messages/76cda2bd-dd50-4614-a146-f9e77490feed"}], "resource_type": "VOLUME", "resource_uuid": "5271a291-01d5-439f-9680-a35a647d9541"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:17.737 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:17.859 189 INFO tempest.lib.common.rest_client [req-51707f86-d3a5-4229-b7bd-edd8e7fc5340 ] Request (MessagesV3RbacTest:test_delete_message): 200 GET http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles 0.114s 2020-12-14 02:34:17.863 189 DEBUG tempest.lib.common.rest_client [req-51707f86-d3a5-4229-b7bd-edd8e7fc5340 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-51707f86-d3a5-4229-b7bd-edd8e7fc5340', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:17.918 189 INFO tempest.lib.common.rest_client [req-81d8d2da-605f-45d2-ae34-2e8dc3e37adc ] Request (MessagesV3RbacTest:test_delete_message): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:34:17.922 189 DEBUG tempest.lib.common.rest_client [req-81d8d2da-605f-45d2-ae34-2e8dc3e37adc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81d8d2da-605f-45d2-ae34-2e8dc3e37adc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4a1aa3ffd2c6467682748b8ea1c19412", "name": "tempest-MessagesV3RbacTest-185938494", "password_expires_at": null}, "audit_ids": ["4fTG3XMmTDGwXv7YopeCUw"], "expires_at": "2020-12-14T03:34:17.000000Z", "issued_at": "2020-12-14T02:34:17.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "35e4c39c5737408782d6587ad336ff47", "name": "tempest-MessagesV3RbacTest-185938494"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:18.023 189 INFO tempest.lib.common.rest_client [req-93b3c509-fd36-4b88-94d5-d7499f741e4f ] Request (MessagesV3RbacTest:test_delete_message): 204 DELETE http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages/76cda2bd-dd50-4614-a146-f9e77490feed 0.093s 2020-12-14 02:34:18.027 189 DEBUG tempest.lib.common.rest_client [req-93b3c509-fd36-4b88-94d5-d7499f741e4f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:17 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-93b3c509-fd36-4b88-94d5-d7499f741e4f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages/76cda2bd-dd50-4614-a146-f9e77490feed'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:18.030 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:18.100 189 INFO tempest.lib.common.rest_client [req-1aa43be3-da13-4a05-8189-584cdb3db3ce ] Request (MessagesV3RbacTest:test_delete_message): 200 GET http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles 0.063s 2020-12-14 02:34:18.104 189 DEBUG tempest.lib.common.rest_client [req-1aa43be3-da13-4a05-8189-584cdb3db3ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1aa43be3-da13-4a05-8189-584cdb3db3ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:18.203 189 INFO tempest.lib.common.rest_client [req-ab96b778-0a6d-4214-add2-9fe13d5c75f3 ] Request (MessagesV3RbacTest:test_delete_message): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:34:18.207 189 DEBUG tempest.lib.common.rest_client [req-ab96b778-0a6d-4214-add2-9fe13d5c75f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ab96b778-0a6d-4214-add2-9fe13d5c75f3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4a1aa3ffd2c6467682748b8ea1c19412", "name": "tempest-MessagesV3RbacTest-185938494", "password_expires_at": null}, "audit_ids": ["8dIxLnehSj-MF834rMoTZg"], "expires_at": "2020-12-14T03:34:18.000000Z", "issued_at": "2020-12-14T02:34:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "35e4c39c5737408782d6587ad336ff47", "name": "tempest-MessagesV3RbacTest-185938494"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:18.346 189 INFO tempest.lib.common.rest_client [req-ef262497-0e9d-4212-be42-aaa7114e0ce3 ] Request (MessagesV3RbacTest:test_delete_message): 404 GET http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages/76cda2bd-dd50-4614-a146-f9e77490feed 0.130s 2020-12-14 02:34:18.349 189 DEBUG tempest.lib.common.rest_client [req-ef262497-0e9d-4212-be42-aaa7114e0ce3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'content-length': '110', 'content-type': 'application/json', 'x-compute-request-id': 'req-ef262497-0e9d-4212-be42-aaa7114e0ce3', 'x-openstack-request-id': 'req-ef262497-0e9d-4212-be42-aaa7114e0ce3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages/76cda2bd-dd50-4614-a146-f9e77490feed'} Body: b'{"itemNotFound": {"code": 404, "message": "Message 76cda2bd-dd50-4614-a146-f9e77490feed could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:18.393 189 INFO tempest.lib.common.rest_client [req-03e67879-e567-442f-8a4a-66960e73cd51 ] Request (MessagesV3RbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages/76cda2bd-dd50-4614-a146-f9e77490feed 0.032s 2020-12-14 02:34:18.397 189 DEBUG tempest.lib.common.rest_client [req-03e67879-e567-442f-8a4a-66960e73cd51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'content-length': '110', 'content-type': 'application/json', 'x-compute-request-id': 'req-03e67879-e567-442f-8a4a-66960e73cd51', 'x-openstack-request-id': 'req-03e67879-e567-442f-8a4a-66960e73cd51', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages/76cda2bd-dd50-4614-a146-f9e77490feed'} Body: b'{"itemNotFound": {"code": 404, "message": "Message 76cda2bd-dd50-4614-a146-f9e77490feed could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:18.411 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:18.430 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: message:get_all, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:18.432 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:18.599 189 INFO tempest.lib.common.rest_client [req-95fba5d8-e331-4fb8-92ba-4b743b865e89 ] Request (MessagesV3RbacTest:test_list_messages): 200 GET http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles 0.162s 2020-12-14 02:34:18.602 189 DEBUG tempest.lib.common.rest_client [req-95fba5d8-e331-4fb8-92ba-4b743b865e89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95fba5d8-e331-4fb8-92ba-4b743b865e89', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:18.699 189 INFO tempest.lib.common.rest_client [req-d8713e22-3793-43df-b548-58fc7e96c047 ] Request (MessagesV3RbacTest:test_list_messages): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:34:18.703 189 DEBUG tempest.lib.common.rest_client [req-d8713e22-3793-43df-b548-58fc7e96c047 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d8713e22-3793-43df-b548-58fc7e96c047', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4a1aa3ffd2c6467682748b8ea1c19412", "name": "tempest-MessagesV3RbacTest-185938494", "password_expires_at": null}, "audit_ids": ["3y5pV0qDRriNMEa0pZcpzg"], "expires_at": "2020-12-14T03:34:18.000000Z", "issued_at": "2020-12-14T02:34:18.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "35e4c39c5737408782d6587ad336ff47", "name": "tempest-MessagesV3RbacTest-185938494"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:18.931 189 INFO tempest.lib.common.rest_client [req-aaae886b-c6d0-45b6-bd65-1af4e686ad91 ] Request (MessagesV3RbacTest:test_list_messages): 200 GET http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages 0.216s 2020-12-14 02:34:18.934 189 DEBUG tempest.lib.common.rest_client [req-aaae886b-c6d0-45b6-bd65-1af4e686ad91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-aaae886b-c6d0-45b6-bd65-1af4e686ad91', 'content-length': '16', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-aaae886b-c6d0-45b6-bd65-1af4e686ad91', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages'} Body: b'{"messages": []}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:18.966 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:19.082 189 INFO tempest.lib.common.rest_client [req-965bd270-2ee1-496e-a7ab-99f256a1a18c ] Request (MessagesV3RbacTest:test_list_messages): 200 GET http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles 0.110s 2020-12-14 02:34:19.086 189 DEBUG tempest.lib.common.rest_client [req-965bd270-2ee1-496e-a7ab-99f256a1a18c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:18 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-965bd270-2ee1-496e-a7ab-99f256a1a18c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:19.140 189 INFO tempest.lib.common.rest_client [req-bb72699a-5d88-4051-9690-ba2aa930a9eb ] Request (MessagesV3RbacTest:test_list_messages): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:34:19.143 189 DEBUG tempest.lib.common.rest_client [req-bb72699a-5d88-4051-9690-ba2aa930a9eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bb72699a-5d88-4051-9690-ba2aa930a9eb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4a1aa3ffd2c6467682748b8ea1c19412", "name": "tempest-MessagesV3RbacTest-185938494", "password_expires_at": null}, "audit_ids": ["VAt1SL-SQ6-tMpIOLr3GbQ"], "expires_at": "2020-12-14T03:34:19.000000Z", "issued_at": "2020-12-14T02:34:19.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "35e4c39c5737408782d6587ad336ff47", "name": "tempest-MessagesV3RbacTest-185938494"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:19.157 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:19.174 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: message:get, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:19.381 189 INFO tempest.lib.common.rest_client [req-77ee718e-a510-46cd-bf83-e95ae07dbab3 ] Request (MessagesV3RbacTest:test_show_message): 200 POST http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/types 0.201s 2020-12-14 02:34:19.385 189 DEBUG tempest.lib.common.rest_client [req-77ee718e-a510-46cd-bf83-e95ae07dbab3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume_type": {"name": "tempest-MessagesV3RbacTest-volume-type-583680623", "extra_specs": {"storage_protocol": "tempest-MessagesV3RbacTest-storage_protocol-373887693", "vendor_name": "tempest-MessagesV3RbacTest-vendor_name-143076904"}}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-77ee718e-a510-46cd-bf83-e95ae07dbab3', 'content-length': '365', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-77ee718e-a510-46cd-bf83-e95ae07dbab3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/types'} Body: b'{"volume_type": {"id": "7fe038ed-6a69-4828-b180-aebff1156b4a", "name": "tempest-MessagesV3RbacTest-volume-type-583680623", "is_public": true, "extra_specs": {"storage_protocol": "tempest-MessagesV3RbacTest-storage_protocol-373887693", "vendor_name": "tempest-MessagesV3RbacTest-vendor_name-143076904"}, "description": null, "os-volume-type-access:is_public": true}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:19.725 189 INFO tempest.lib.common.rest_client [req-342efbcd-06c6-4d40-9158-6a1c6e7fe5bb ] Request (MessagesV3RbacTest:test_show_message): 202 POST http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes 0.310s 2020-12-14 02:34:19.728 189 DEBUG tempest.lib.common.rest_client [req-342efbcd-06c6-4d40-9158-6a1c6e7fe5bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: {"volume": {"volume_type": "7fe038ed-6a69-4828-b180-aebff1156b4a", "size": 1, "name": "tempest-MessagesV3RbacTest-Volume-1655537952"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-342efbcd-06c6-4d40-9158-6a1c6e7fe5bb', 'content-length': '883', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-342efbcd-06c6-4d40-9158-6a1c6e7fe5bb', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes'} Body: b'{"volume": {"id": "0588c573-0f07-43d6-8172-6bc0dc65faa9", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:20.000000", "updated_at": null, "name": "tempest-MessagesV3RbacTest-Volume-1655537952", "description": null, "volume_type": "tempest-MessagesV3RbacTest-volume-type-583680623", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes/0588c573-0f07-43d6-8172-6bc0dc65faa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/35e4c39c5737408782d6587ad336ff47/volumes/0588c573-0f07-43d6-8172-6bc0dc65faa9"}], "user_id": "4a1aa3ffd2c6467682748b8ea1c19412", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:19.916 189 INFO tempest.lib.common.rest_client [req-e39bf9dd-5acc-4dc0-ba12-aac33b2e707d ] Request (MessagesV3RbacTest:test_show_message): 200 GET http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes/0588c573-0f07-43d6-8172-6bc0dc65faa9 0.100s 2020-12-14 02:34:19.919 189 DEBUG tempest.lib.common.rest_client [req-e39bf9dd-5acc-4dc0-ba12-aac33b2e707d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:19 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e39bf9dd-5acc-4dc0-ba12-aac33b2e707d', 'content-length': '1083', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e39bf9dd-5acc-4dc0-ba12-aac33b2e707d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes/0588c573-0f07-43d6-8172-6bc0dc65faa9'} Body: b'{"volume": {"id": "0588c573-0f07-43d6-8172-6bc0dc65faa9", "status": "error", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:20.000000", "updated_at": "2020-12-14T02:34:20.000000", "name": "tempest-MessagesV3RbacTest-Volume-1655537952", "description": null, "volume_type": "tempest-MessagesV3RbacTest-volume-type-583680623", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes/0588c573-0f07-43d6-8172-6bc0dc65faa9"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/35e4c39c5737408782d6587ad336ff47/volumes/0588c573-0f07-43d6-8172-6bc0dc65faa9"}], "user_id": "4a1aa3ffd2c6467682748b8ea1c19412", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": null, "os-vol-tenant-attr:tenant_id": "35e4c39c5737408782d6587ad336ff47"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:20.014 189 INFO tempest.common.waiters [-] volume 0588c573-0f07-43d6-8172-6bc0dc65faa9 reached error after waiting for 0.013997 seconds 2020-12-14 02:34:20.049 189 INFO tempest.lib.common.rest_client [req-01b340d4-9454-4584-a485-db4b0727af22 ] Request (MessagesV3RbacTest:test_show_message): 200 GET http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages 0.030s 2020-12-14 02:34:20.052 189 DEBUG tempest.lib.common.rest_client [req-01b340d4-9454-4584-a485-db4b0727af22 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-01b340d4-9454-4584-a485-db4b0727af22', 'content-length': '738', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-01b340d4-9454-4584-a485-db4b0727af22', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages'} Body: b'{"messages": [{"id": "8d6d0952-9ffb-4f5d-bb43-74efe802868a", "event_id": "VOLUME_VOLUME_001_003", "user_message": "schedule allocate volume:Could not find any available weighted backend.", "message_level": "ERROR", "created_at": "2020-12-14T02:34:20.000000", "guaranteed_until": "2021-01-13T02:34:20.000000", "request_id": "req-342efbcd-06c6-4d40-9158-6a1c6e7fe5bb", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages/8d6d0952-9ffb-4f5d-bb43-74efe802868a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/35e4c39c5737408782d6587ad336ff47/messages/8d6d0952-9ffb-4f5d-bb43-74efe802868a"}], "resource_type": "VOLUME", "resource_uuid": "0588c573-0f07-43d6-8172-6bc0dc65faa9"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:20.089 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:20.219 189 INFO tempest.lib.common.rest_client [req-e8a25400-a362-4b25-b0e6-da9ecdf3263a ] Request (MessagesV3RbacTest:test_show_message): 200 GET http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles 0.124s 2020-12-14 02:34:20.223 189 DEBUG tempest.lib.common.rest_client [req-e8a25400-a362-4b25-b0e6-da9ecdf3263a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e8a25400-a362-4b25-b0e6-da9ecdf3263a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:20.283 189 INFO tempest.lib.common.rest_client [req-435c2ad2-8a86-42e0-a0bd-540a7270c795 ] Request (MessagesV3RbacTest:test_show_message): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.052s 2020-12-14 02:34:20.287 189 DEBUG tempest.lib.common.rest_client [req-435c2ad2-8a86-42e0-a0bd-540a7270c795 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-435c2ad2-8a86-42e0-a0bd-540a7270c795', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4a1aa3ffd2c6467682748b8ea1c19412", "name": "tempest-MessagesV3RbacTest-185938494", "password_expires_at": null}, "audit_ids": ["iJZbYLBnTs-01OWK8_Y13Q"], "expires_at": "2020-12-14T03:34:20.000000Z", "issued_at": "2020-12-14T02:34:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "35e4c39c5737408782d6587ad336ff47", "name": "tempest-MessagesV3RbacTest-185938494"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:20.394 189 INFO tempest.lib.common.rest_client [req-464685d8-ab23-4bee-8804-92f811a50048 ] Request (MessagesV3RbacTest:test_show_message): 200 GET http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages/8d6d0952-9ffb-4f5d-bb43-74efe802868a 0.096s 2020-12-14 02:34:20.398 189 DEBUG tempest.lib.common.rest_client [req-464685d8-ab23-4bee-8804-92f811a50048 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-464685d8-ab23-4bee-8804-92f811a50048', 'content-length': '735', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-464685d8-ab23-4bee-8804-92f811a50048', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages/8d6d0952-9ffb-4f5d-bb43-74efe802868a'} Body: b'{"message": {"id": "8d6d0952-9ffb-4f5d-bb43-74efe802868a", "event_id": "VOLUME_VOLUME_001_003", "user_message": "schedule allocate volume:Could not find any available weighted backend.", "message_level": "ERROR", "created_at": "2020-12-14T02:34:20.000000", "guaranteed_until": "2021-01-13T02:34:20.000000", "request_id": "req-342efbcd-06c6-4d40-9158-6a1c6e7fe5bb", "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages/8d6d0952-9ffb-4f5d-bb43-74efe802868a"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/35e4c39c5737408782d6587ad336ff47/messages/8d6d0952-9ffb-4f5d-bb43-74efe802868a"}], "resource_type": "VOLUME", "resource_uuid": "0588c573-0f07-43d6-8172-6bc0dc65faa9"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:20.429 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:20.553 189 INFO tempest.lib.common.rest_client [req-3c85eac9-84d4-4ca8-bc0b-70225f9fa7a2 ] Request (MessagesV3RbacTest:test_show_message): 200 GET http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles 0.118s 2020-12-14 02:34:20.557 189 DEBUG tempest.lib.common.rest_client [req-3c85eac9-84d4-4ca8-bc0b-70225f9fa7a2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c85eac9-84d4-4ca8-bc0b-70225f9fa7a2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47/users/4a1aa3ffd2c6467682748b8ea1c19412/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:20.663 189 INFO tempest.lib.common.rest_client [req-7cedecb4-637a-4ed0-a78d-7660e484abf9 ] Request (MessagesV3RbacTest:test_show_message): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:34:20.668 189 DEBUG tempest.lib.common.rest_client [req-7cedecb4-637a-4ed0-a78d-7660e484abf9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7cedecb4-637a-4ed0-a78d-7660e484abf9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4a1aa3ffd2c6467682748b8ea1c19412", "name": "tempest-MessagesV3RbacTest-185938494", "password_expires_at": null}, "audit_ids": ["aikzhHQ9Sl-oAeTmG7OPHw"], "expires_at": "2020-12-14T03:34:20.000000Z", "issued_at": "2020-12-14T02:34:20.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "35e4c39c5737408782d6587ad336ff47", "name": "tempest-MessagesV3RbacTest-185938494"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_35e4c39c5737408782d6587ad336ff47", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:20.818 189 INFO tempest.lib.common.rest_client [req-93c87de6-2716-47f9-841d-99c8b79dfa2b ] Request (MessagesV3RbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages/8d6d0952-9ffb-4f5d-bb43-74efe802868a 0.140s 2020-12-14 02:34:20.822 189 DEBUG tempest.lib.common.rest_client [req-93c87de6-2716-47f9-841d-99c8b79dfa2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'Openstack-Api-Version': 'volume 3.3', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.3', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-93c87de6-2716-47f9-841d-99c8b79dfa2b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/messages/8d6d0952-9ffb-4f5d-bb43-74efe802868a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:21.028 189 INFO tempest.lib.common.rest_client [req-e2e8a08b-030a-4d4f-8b1e-1c3a619bd078 ] Request (MessagesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes/0588c573-0f07-43d6-8172-6bc0dc65faa9 0.187s 2020-12-14 02:34:21.031 189 DEBUG tempest.lib.common.rest_client [req-e2e8a08b-030a-4d4f-8b1e-1c3a619bd078 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:20 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e2e8a08b-030a-4d4f-8b1e-1c3a619bd078', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes/0588c573-0f07-43d6-8172-6bc0dc65faa9'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:21.100 189 INFO tempest.lib.common.rest_client [req-b51a6f96-6928-4af1-ab7a-6feeb85989d3 ] Request (MessagesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes/0588c573-0f07-43d6-8172-6bc0dc65faa9 0.062s 2020-12-14 02:34:21.103 189 DEBUG tempest.lib.common.rest_client [req-b51a6f96-6928-4af1-ab7a-6feeb85989d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-b51a6f96-6928-4af1-ab7a-6feeb85989d3', 'x-openstack-request-id': 'req-b51a6f96-6928-4af1-ab7a-6feeb85989d3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes/0588c573-0f07-43d6-8172-6bc0dc65faa9'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 0588c573-0f07-43d6-8172-6bc0dc65faa9 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:21.187 189 INFO tempest.lib.common.rest_client [req-b553796a-0712-4669-b5a7-d9431c51b843 ] Request (MessagesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/types/7fe038ed-6a69-4828-b180-aebff1156b4a 0.078s 2020-12-14 02:34:21.189 189 DEBUG tempest.lib.common.rest_client [req-b553796a-0712-4669-b5a7-d9431c51b843 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-b553796a-0712-4669-b5a7-d9431c51b843', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/types/7fe038ed-6a69-4828-b180-aebff1156b4a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:21.228 189 INFO tempest.lib.common.rest_client [req-597cb2be-5cfc-4fba-aecc-797e4b8a26d2 ] Request (MessagesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/types/7fe038ed-6a69-4828-b180-aebff1156b4a 0.033s 2020-12-14 02:34:21.230 189 DEBUG tempest.lib.common.rest_client [req-597cb2be-5cfc-4fba-aecc-797e4b8a26d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-597cb2be-5cfc-4fba-aecc-797e4b8a26d2', 'x-openstack-request-id': 'req-597cb2be-5cfc-4fba-aecc-797e4b8a26d2', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/types/7fe038ed-6a69-4828-b180-aebff1156b4a'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type 7fe038ed-6a69-4828-b180-aebff1156b4a could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:21.398 189 INFO tempest.lib.common.rest_client [req-ab0437a7-1651-4d9b-935b-63c409757160 ] Request (MessagesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes/5271a291-01d5-439f-9680-a35a647d9541 0.160s 2020-12-14 02:34:21.401 189 DEBUG tempest.lib.common.rest_client [req-ab0437a7-1651-4d9b-935b-63c409757160 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ab0437a7-1651-4d9b-935b-63c409757160', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes/5271a291-01d5-439f-9680-a35a647d9541'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:21.462 189 INFO tempest.lib.common.rest_client [req-464bafae-02b6-4961-b291-dad720a9f7e3 ] Request (MessagesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes/5271a291-01d5-439f-9680-a35a647d9541 0.056s 2020-12-14 02:34:21.465 189 DEBUG tempest.lib.common.rest_client [req-464bafae-02b6-4961-b291-dad720a9f7e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-464bafae-02b6-4961-b291-dad720a9f7e3', 'x-openstack-request-id': 'req-464bafae-02b6-4961-b291-dad720a9f7e3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/volumes/5271a291-01d5-439f-9680-a35a647d9541'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 5271a291-01d5-439f-9680-a35a647d9541 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:21.545 189 INFO tempest.lib.common.rest_client [req-d254e57c-b862-41d6-9e2c-e48d5ddd5608 ] Request (MessagesV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/types/c2c54f88-0b07-4457-a49e-c48075877367 0.075s 2020-12-14 02:34:21.548 189 DEBUG tempest.lib.common.rest_client [req-d254e57c-b862-41d6-9e2c-e48d5ddd5608 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d254e57c-b862-41d6-9e2c-e48d5ddd5608', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/types/c2c54f88-0b07-4457-a49e-c48075877367'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:21.598 189 INFO tempest.lib.common.rest_client [req-e27a91f9-ee10-4a23-a94d-fd83bb8b2079 ] Request (MessagesV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/types/c2c54f88-0b07-4457-a49e-c48075877367 0.041s 2020-12-14 02:34:21.600 189 DEBUG tempest.lib.common.rest_client [req-e27a91f9-ee10-4a23-a94d-fd83bb8b2079 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '114', 'content-type': 'application/json', 'x-compute-request-id': 'req-e27a91f9-ee10-4a23-a94d-fd83bb8b2079', 'x-openstack-request-id': 'req-e27a91f9-ee10-4a23-a94d-fd83bb8b2079', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/35e4c39c5737408782d6587ad336ff47/types/c2c54f88-0b07-4457-a49e-c48075877367'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume type c2c54f88-0b07-4457-a49e-c48075877367 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:21.765 189 INFO tempest.lib.common.rest_client [req-fdec8aa5-a40c-4520-a84b-5f9380869b2f ] Request (MessagesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/4a1aa3ffd2c6467682748b8ea1c19412 0.158s 2020-12-14 02:34:21.768 189 DEBUG tempest.lib.common.rest_client [req-fdec8aa5-a40c-4520-a84b-5f9380869b2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fdec8aa5-a40c-4520-a84b-5f9380869b2f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/4a1aa3ffd2c6467682748b8ea1c19412'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:21.874 189 INFO tempest.lib.common.rest_client [req-68dd9485-10d4-476c-a7ef-a22910154f16 ] Request (MessagesV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:34:21.877 189 DEBUG tempest.lib.common.rest_client [req-68dd9485-10d4-476c-a7ef-a22910154f16 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:21 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-68dd9485-10d4-476c-a7ef-a22910154f16', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["nnnAs_tvQj-mOb8vRE3feg"], "expires_at": "2020-12-14T03:34:21.000000Z", "issued_at": "2020-12-14T02:34:21.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:22.216 189 INFO tempest.lib.common.rest_client [req-93ee29c4-f882-427d-8f58-35a66d3e3ff3 ] Request (MessagesV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=35e4c39c5737408782d6587ad336ff47&name=default 0.331s 2020-12-14 02:34:22.220 189 DEBUG tempest.lib.common.rest_client [req-93ee29c4-f882-427d-8f58-35a66d3e3ff3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-93ee29c4-f882-427d-8f58-35a66d3e3ff3', 'date': 'Mon, 14 Dec 2020 02:34:22 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=35e4c39c5737408782d6587ad336ff47&name=default'} Body: b'{"security_groups": [{"id": "9af5475e-e698-4b85-be12-691a22cbb8b3", "name": "default", "stateful": true, "tenant_id": "35e4c39c5737408782d6587ad336ff47", "description": "Default security group", "security_group_rules": [{"id": "1961385b-1e0b-48aa-bb7f-5f5d33941119", "tenant_id": "35e4c39c5737408782d6587ad336ff47", "security_group_id": "9af5475e-e698-4b85-be12-691a22cbb8b3", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:34:22Z", "updated_at": "2020-12-14T02:34:22Z", "revision_number": 0, "project_id": "35e4c39c5737408782d6587ad336ff47"}, {"id": "669b351e-3758-44ee-9b96-dc157bb278fe", "tenant_id": "35e4c39c5737408782d6587ad336ff47", "security_group_id": "9af5475e-e698-4b85-be12-691a22cbb8b3", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "9af5475e-e698-4b85-be12-691a22cbb8b3", "description": null, "tags": [], "created_at": "2020-12-14T02:34:22Z", "updated_at": "2020-12-14T02:34:22Z", "revision_number": 0, "project_id": "35e4c39c5737408782d6587ad336ff47"}, {"id": "66b81045-030c-419a-87dd-2f6bf7ccf60e", "tenant_id": "35e4c39c5737408782d6587ad336ff47", "security_group_id": "9af5475e-e698-4b85-be12-691a22cbb8b3", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:34:22Z", "updated_at": "2020-12-14T02:34:22Z", "revision_number": 0, "project_id": "35e4c39c5737408782d6587ad336ff47"}, {"id": "b7bc7187-ae26-4758-9983-8a1d5f1ff86c", "tenant_id": "35e4c39c5737408782d6587ad336ff47", "security_group_id": "9af5475e-e698-4b85-be12-691a22cbb8b3", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "9af5475e-e698-4b85-be12-691a22cbb8b3", "description": null, "tags": [], "created_at": "2020-12-14T02:34:22Z", "updated_at": "2020-12-14T02:34:22Z", "revision_number": 0, "project_id": "35e4c39c5737408782d6587ad336ff47"}], "tags": [], "created_at": "2020-12-14T02:34:22Z", "updated_at": "2020-12-14T02:34:22Z", "revision_number": 1, "project_id": "35e4c39c5737408782d6587ad336ff47"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:22.367 189 INFO tempest.lib.common.rest_client [req-56d2f8c1-a6f9-40c9-af62-92e2af8c71e6 ] Request (MessagesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/9af5475e-e698-4b85-be12-691a22cbb8b3 0.139s 2020-12-14 02:34:22.370 189 DEBUG tempest.lib.common.rest_client [req-56d2f8c1-a6f9-40c9-af62-92e2af8c71e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-56d2f8c1-a6f9-40c9-af62-92e2af8c71e6', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:34:22 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/9af5475e-e698-4b85-be12-691a22cbb8b3'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:22.517 189 INFO tempest.lib.common.rest_client [req-bf083422-e751-458d-834f-6f0e3a19af51 ] Request (MessagesV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47 0.139s 2020-12-14 02:34:22.520 189 DEBUG tempest.lib.common.rest_client [req-bf083422-e751-458d-834f-6f0e3a19af51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf083422-e751-458d-834f-6f0e3a19af51', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/35e4c39c5737408782d6587ad336ff47'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:22.637 189 INFO tempest.lib.common.rest_client [req-5399b849-8aaa-4ebf-a7e1-c3e0e1b6e816 ] Request (VolumeMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:34:22.640 189 DEBUG tempest.lib.common.rest_client [req-5399b849-8aaa-4ebf-a7e1-c3e0e1b6e816 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5399b849-8aaa-4ebf-a7e1-c3e0e1b6e816', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["xwiBPXvPQymno2ezdwH5_g"], "expires_at": "2020-12-14T03:34:22.000000Z", "issued_at": "2020-12-14T02:34:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:22.782 189 INFO tempest.lib.common.rest_client [req-846e583a-1dfe-4ee8-8a96-20f3376cb44e ] Request (VolumeMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-14 02:34:22.785 189 DEBUG tempest.lib.common.rest_client [req-846e583a-1dfe-4ee8-8a96-20f3376cb44e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-846e583a-1dfe-4ee8-8a96-20f3376cb44e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["zrfw25rDTkCr3hs1gEredg"], "expires_at": "2020-12-14T03:34:22.000000Z", "issued_at": "2020-12-14T02:34:22.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:22.849 189 INFO tempest.lib.common.rest_client [req-1138879c-2653-4b47-b762-a7e48053cd76 ] Request (VolumeMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.057s 2020-12-14 02:34:22.852 189 DEBUG tempest.lib.common.rest_client [req-1138879c-2653-4b47-b762-a7e48053cd76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1138879c-2653-4b47-b762-a7e48053cd76', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:22.945 189 INFO tempest.lib.common.rest_client [req-8348d3b5-1b1a-4730-bc79-18c1024807b7 ] Request (VolumeMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.084s 2020-12-14 02:34:22.948 189 DEBUG tempest.lib.common.rest_client [req-8348d3b5-1b1a-4730-bc79-18c1024807b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumeMetadataV3RbacTest-473731792-desc", "domain_id": "default", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8348d3b5-1b1a-4730-bc79-18c1024807b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "domain_id": "default", "description": "tempest-VolumeMetadataV3RbacTest-473731792-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:23.081 189 INFO tempest.lib.common.rest_client [req-949a7649-7a40-4857-988b-0be4de1ec1c0 ] Request (VolumeMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.124s 2020-12-14 02:34:23.084 189 DEBUG tempest.lib.common.rest_client [req-949a7649-7a40-4857-988b-0be4de1ec1c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumeMetadataV3RbacTest-473731792", "password": "S1*VSW0H%Tha4fi", "project_id": "0cf31af471f241f898351768a97bb670", "email": "tempest-VolumeMetadataV3RbacTest-1949677874@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:22 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '403', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-949a7649-7a40-4857-988b-0be4de1ec1c0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "0cf31af471f241f898351768a97bb670", "email": "tempest-VolumeMetadataV3RbacTest-1949677874@example.com", "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/2fb68b77dc8f40b4b557d3ca8b79cd4a"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:23.158 189 INFO tempest.lib.common.rest_client [req-18486ae5-50db-439d-8cf6-c2c29759530f ] Request (VolumeMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.067s 2020-12-14 02:34:23.161 189 DEBUG tempest.lib.common.rest_client [req-18486ae5-50db-439d-8cf6-c2c29759530f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-18486ae5-50db-439d-8cf6-c2c29759530f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:23.232 189 INFO tempest.lib.common.rest_client [req-e03707ec-e75a-46d8-b09c-d971a34bafc0 ] Request (VolumeMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.064s 2020-12-14 02:34:23.235 189 DEBUG tempest.lib.common.rest_client [req-e03707ec-e75a-46d8-b09c-d971a34bafc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e03707ec-e75a-46d8-b09c-d971a34bafc0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:23.329 189 INFO tempest.lib.common.rest_client [req-20210534-8a9c-4247-8e90-ba7015e59ca3 ] Request (VolumeMetadataV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles/72a4576c553448cd941b052c1ca0cf2d 0.087s 2020-12-14 02:34:23.331 189 DEBUG tempest.lib.common.rest_client [req-20210534-8a9c-4247-8e90-ba7015e59ca3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20210534-8a9c-4247-8e90-ba7015e59ca3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:23.334 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeMetadataV3RbacTest-473731792', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0cf31af471f241f898351768a97bb670', 'project_name': 'tempest-VolumeMetadataV3RbacTest-473731792', 'tenant_id': '0cf31af471f241f898351768a97bb670', 'tenant_name': 'tempest-VolumeMetadataV3RbacTest-473731792', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '2fb68b77dc8f40b4b557d3ca8b79cd4a'}, Network: None, Subnet: None, Router: None 2020-12-14 02:34:23.337 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumeMetadataV3RbacTest-473731792', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '0cf31af471f241f898351768a97bb670', 'project_name': 'tempest-VolumeMetadataV3RbacTest-473731792', 'tenant_id': '0cf31af471f241f898351768a97bb670', 'tenant_name': 'tempest-VolumeMetadataV3RbacTest-473731792', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '2fb68b77dc8f40b4b557d3ca8b79cd4a'}, Network: None, Subnet: None, Router: None 2020-12-14 02:34:23.535 189 INFO tempest.lib.common.rest_client [req-749939f6-87b7-4d13-b84a-3c7ac39e4189 ] Request (VolumeMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.131s 2020-12-14 02:34:23.538 189 DEBUG tempest.lib.common.rest_client [req-749939f6-87b7-4d13-b84a-3c7ac39e4189 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-749939f6-87b7-4d13-b84a-3c7ac39e4189', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["Pyney2NsQ7mcOfEO1UOOSQ"], "expires_at": "2020-12-14T03:34:23.000000Z", "issued_at": "2020-12-14T02:34:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:23.647 189 INFO tempest.lib.common.rest_client [req-e116086d-69bf-48c5-b00f-4992aba9a4fa ] Request (VolumeMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-14 02:34:23.651 189 DEBUG tempest.lib.common.rest_client [req-e116086d-69bf-48c5-b00f-4992aba9a4fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e116086d-69bf-48c5-b00f-4992aba9a4fa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Y0MRJ-jRR_Ky_-BOYCCUaw"], "expires_at": "2020-12-14T03:34:23.000000Z", "issued_at": "2020-12-14T02:34:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:23.758 189 INFO tempest.lib.common.rest_client [req-fecd478c-4f72-4da4-beca-cf333f05fc5d ] Request (VolumeMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-14 02:34:23.761 189 DEBUG tempest.lib.common.rest_client [req-fecd478c-4f72-4da4-beca-cf333f05fc5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fecd478c-4f72-4da4-beca-cf333f05fc5d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["O5JBl6QhQGGFCbYsta_bjQ"], "expires_at": "2020-12-14T03:34:23.000000Z", "issued_at": "2020-12-14T02:34:23.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:23.827 189 INFO tempest.lib.common.rest_client [req-904cfddf-41ff-4ec5-9dd8-b0b2696ec70d ] Request (VolumeMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.059s 2020-12-14 02:34:23.829 189 DEBUG tempest.lib.common.rest_client [req-904cfddf-41ff-4ec5-9dd8-b0b2696ec70d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-904cfddf-41ff-4ec5-9dd8-b0b2696ec70d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:23.899 189 INFO tempest.lib.common.rest_client [req-a740825a-cc29-44ae-be2e-94e62b6d33a0 ] Request (VolumeMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.063s 2020-12-14 02:34:23.902 189 DEBUG tempest.lib.common.rest_client [req-a740825a-cc29-44ae-be2e-94e62b6d33a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a740825a-cc29-44ae-be2e-94e62b6d33a0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:23.906 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:34:23.908 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:23.976 189 INFO tempest.lib.common.rest_client [req-3c793b75-d65a-4b0c-b396-1582e7b5e923 ] Request (VolumeMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.062s 2020-12-14 02:34:23.980 189 DEBUG tempest.lib.common.rest_client [req-3c793b75-d65a-4b0c-b396-1582e7b5e923 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c793b75-d65a-4b0c-b396-1582e7b5e923', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:24.059 189 INFO tempest.lib.common.rest_client [req-095139a8-d161-4cd4-a697-75281a586d25 ] Request (VolumeMetadataV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles/72a4576c553448cd941b052c1ca0cf2d 0.072s 2020-12-14 02:34:24.062 189 DEBUG tempest.lib.common.rest_client [req-095139a8-d161-4cd4-a697-75281a586d25 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:23 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-095139a8-d161-4cd4-a697-75281a586d25', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:24.184 189 INFO tempest.lib.common.rest_client [req-a02ef4e8-c299-4246-974d-7e6ab97592b8 ] Request (VolumeMetadataV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles/a629c95d64b3416fb80ae90af4f69c05 0.116s 2020-12-14 02:34:24.187 189 DEBUG tempest.lib.common.rest_client [req-a02ef4e8-c299-4246-974d-7e6ab97592b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:24 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a02ef4e8-c299-4246-974d-7e6ab97592b8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:25.289 189 INFO tempest.lib.common.rest_client [req-f2f254f9-e99e-48d9-aa7d-994838adccdf ] Request (VolumeMetadataV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:34:25.293 189 DEBUG tempest.lib.common.rest_client [req-f2f254f9-e99e-48d9-aa7d-994838adccdf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f2f254f9-e99e-48d9-aa7d-994838adccdf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["N8JF2kPzQvmWx2lbyy3XXw"], "expires_at": "2020-12-14T03:34:25.000000Z", "issued_at": "2020-12-14T02:34:25.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:25.819 189 INFO tempest.lib.common.rest_client [req-bdcfb309-d1cd-4681-ac04-22cf5085b841 ] Request (VolumeMetadataV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes 0.515s 2020-12-14 02:34:25.822 189 DEBUG tempest.lib.common.rest_client [req-bdcfb309-d1cd-4681-ac04-22cf5085b841 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumeMetadataV3RbacTest-Volume-137037759"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-bdcfb309-d1cd-4681-ac04-22cf5085b841', 'content-length': '844', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-bdcfb309-d1cd-4681-ac04-22cf5085b841', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes'} Body: b'{"volume": {"id": "ff839233-9225-48ac-aec1-61323243366b", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:26.000000", "updated_at": null, "name": "tempest-VolumeMetadataV3RbacTest-Volume-137037759", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b"}], "user_id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:26.000 189 INFO tempest.lib.common.rest_client [req-e819a138-9c32-47a1-a8c0-b58c6fb58a6c ] Request (VolumeMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b 0.088s 2020-12-14 02:34:26.003 189 DEBUG tempest.lib.common.rest_client [req-e819a138-9c32-47a1-a8c0-b58c6fb58a6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:25 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-e819a138-9c32-47a1-a8c0-b58c6fb58a6c', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-e819a138-9c32-47a1-a8c0-b58c6fb58a6c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b'} Body: b'{"volume": {"id": "ff839233-9225-48ac-aec1-61323243366b", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:26.000000", "updated_at": "2020-12-14T02:34:26.000000", "name": "tempest-VolumeMetadataV3RbacTest-Volume-137037759", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b"}], "user_id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "0cf31af471f241f898351768a97bb670"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:27.191 189 INFO tempest.lib.common.rest_client [req-d7b54c82-6cbd-4fe0-afdc-e815de0dcd7a ] Request (VolumeMetadataV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b 0.089s 2020-12-14 02:34:27.194 189 DEBUG tempest.lib.common.rest_client [req-d7b54c82-6cbd-4fe0-afdc-e815de0dcd7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-d7b54c82-6cbd-4fe0-afdc-e815de0dcd7a', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-d7b54c82-6cbd-4fe0-afdc-e815de0dcd7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b'} Body: b'{"volume": {"id": "ff839233-9225-48ac-aec1-61323243366b", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:26.000000", "updated_at": "2020-12-14T02:34:26.000000", "name": "tempest-VolumeMetadataV3RbacTest-Volume-137037759", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b"}], "user_id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "0cf31af471f241f898351768a97bb670"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:27.266 189 INFO tempest.common.waiters [-] volume ff839233-9225-48ac-aec1-61323243366b reached available after waiting for 1.266223 seconds 2020-12-14 02:34:27.272 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:27.287 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:create_volume_metadata, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:27.288 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:27.397 189 INFO tempest.lib.common.rest_client [req-0fc30789-3694-448f-aafc-3d4925934bd5 ] Request (VolumeMetadataV3RbacTest:test_create_volume_metadata): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.104s 2020-12-14 02:34:27.400 189 DEBUG tempest.lib.common.rest_client [req-0fc30789-3694-448f-aafc-3d4925934bd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0fc30789-3694-448f-aafc-3d4925934bd5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:27.445 189 INFO tempest.lib.common.rest_client [req-3ada897b-6579-4fc5-8a72-415756928b85 ] Request (VolumeMetadataV3RbacTest:test_create_volume_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:34:27.448 189 DEBUG tempest.lib.common.rest_client [req-3ada897b-6579-4fc5-8a72-415756928b85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ada897b-6579-4fc5-8a72-415756928b85', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["ym3d5DcoRiyjDqYuyFkFeQ"], "expires_at": "2020-12-14T03:34:27.000000Z", "issued_at": "2020-12-14T02:34:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:27.621 189 INFO tempest.lib.common.rest_client [req-454df376-e927-4a5a-82ae-494818130bb2 ] Request (VolumeMetadataV3RbacTest:test_create_volume_metadata): 200 POST http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata 0.166s 2020-12-14 02:34:27.624 189 DEBUG tempest.lib.common.rest_client [req-454df376-e927-4a5a-82ae-494818130bb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-454df376-e927-4a5a-82ae-494818130bb2', 'content-length': '32', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-454df376-e927-4a5a-82ae-494818130bb2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata'} Body: b'{"metadata": {"key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:27.635 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:27.698 189 INFO tempest.lib.common.rest_client [req-9694e34b-017e-4d29-8773-b6d360ce2f35 ] Request (VolumeMetadataV3RbacTest:test_create_volume_metadata): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.059s 2020-12-14 02:34:27.700 189 DEBUG tempest.lib.common.rest_client [req-9694e34b-017e-4d29-8773-b6d360ce2f35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9694e34b-017e-4d29-8773-b6d360ce2f35', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:27.748 189 INFO tempest.lib.common.rest_client [req-74df80c8-f484-4052-8c7a-0978be13d1a9 ] Request (VolumeMetadataV3RbacTest:test_create_volume_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:34:27.752 189 DEBUG tempest.lib.common.rest_client [req-74df80c8-f484-4052-8c7a-0978be13d1a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74df80c8-f484-4052-8c7a-0978be13d1a9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["5xHeifPMRuGXwQqlTEMnFg"], "expires_at": "2020-12-14T03:34:27.000000Z", "issued_at": "2020-12-14T02:34:27.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:27.892 189 INFO tempest.lib.common.rest_client [req-06bf652e-e053-4390-a7e3-174ecee82be8 ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata/key1 0.131s 2020-12-14 02:34:27.896 189 DEBUG tempest.lib.common.rest_client [req-06bf652e-e053-4390-a7e3-174ecee82be8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-06bf652e-e053-4390-a7e3-174ecee82be8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata/key1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:27.905 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:27.919 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_image_metadata, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:28.182 189 INFO tempest.lib.common.rest_client [req-4c16a4f3-eb85-487b-a0b2-f0688ad95014 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_image_metadata): 200 POST http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action 0.258s 2020-12-14 02:34:28.184 189 DEBUG tempest.lib.common.rest_client [req-4c16a4f3-eb85-487b-a0b2-f0688ad95014 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-set_image_metadata": {"metadata": {"image_id": "cd332004-33aa-4c81-9e50-54766a6df097"}}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:27 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4c16a4f3-eb85-487b-a0b2-f0688ad95014', 'content-length': '66', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4c16a4f3-eb85-487b-a0b2-f0688ad95014', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action'} Body: b'{"metadata": {"image_id": "cd332004-33aa-4c81-9e50-54766a6df097"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:28.198 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:28.273 189 INFO tempest.lib.common.rest_client [req-a5cf26d7-15c6-4114-83a0-d85d960664b0 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.069s 2020-12-14 02:34:28.276 189 DEBUG tempest.lib.common.rest_client [req-a5cf26d7-15c6-4114-83a0-d85d960664b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5cf26d7-15c6-4114-83a0-d85d960664b0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:28.330 189 INFO tempest.lib.common.rest_client [req-0dc4eaf3-f21d-4dc2-90de-b20e6965d8f5 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.048s 2020-12-14 02:34:28.332 189 DEBUG tempest.lib.common.rest_client [req-0dc4eaf3-f21d-4dc2-90de-b20e6965d8f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0dc4eaf3-f21d-4dc2-90de-b20e6965d8f5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["PprOCf0wQRCr3mfxxKyj3Q"], "expires_at": "2020-12-14T03:34:28.000000Z", "issued_at": "2020-12-14T02:34:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:28.527 189 INFO tempest.lib.common.rest_client [req-cbad3f1f-db9d-44fa-9729-0f1bf14b8d96 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_image_metadata): 200 POST http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action 0.188s 2020-12-14 02:34:28.530 189 DEBUG tempest.lib.common.rest_client [req-cbad3f1f-db9d-44fa-9729-0f1bf14b8d96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-unset_image_metadata": {"key": "image_id"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-cbad3f1f-db9d-44fa-9729-0f1bf14b8d96', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:28.532 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:28.604 189 INFO tempest.lib.common.rest_client [req-feef99df-81d1-4846-8d61-4ef37fbdca2c ] Request (VolumeMetadataV3RbacTest:test_delete_volume_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.067s 2020-12-14 02:34:28.608 189 DEBUG tempest.lib.common.rest_client [req-feef99df-81d1-4846-8d61-4ef37fbdca2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-feef99df-81d1-4846-8d61-4ef37fbdca2c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:28.658 189 INFO tempest.lib.common.rest_client [req-f1b0d381-3418-46e0-974d-d4320e94b98b ] Request (VolumeMetadataV3RbacTest:test_delete_volume_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:34:28.660 189 DEBUG tempest.lib.common.rest_client [req-f1b0d381-3418-46e0-974d-d4320e94b98b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f1b0d381-3418-46e0-974d-d4320e94b98b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["lp3idp25Rfa6a0H1znsOnQ"], "expires_at": "2020-12-14T03:34:28.000000Z", "issued_at": "2020-12-14T02:34:28.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:28.803 189 INFO tempest.lib.common.rest_client [req-7b773e67-9aff-431c-81f7-331a81220a94 ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 404 POST http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action 0.137s 2020-12-14 02:34:28.805 189 DEBUG tempest.lib.common.rest_client [req-7b773e67-9aff-431c-81f7-331a81220a94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-unset_image_metadata": {"key": "image_id"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '135', 'content-type': 'application/json', 'x-compute-request-id': 'req-7b773e67-9aff-431c-81f7-331a81220a94', 'x-openstack-request-id': 'req-7b773e67-9aff-431c-81f7-331a81220a94', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action'} Body: b'{"itemNotFound": {"code": 404, "message": "Glance metadata for volume/snapshot ff839233-9225-48ac-aec1-61323243366b cannot be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:28.814 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:28.827 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:delete_volume_metadata, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:28.906 189 INFO tempest.lib.common.rest_client [req-14331410-592f-48c4-b06e-85ee7677e009 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_metadata_item): 200 POST http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata 0.075s 2020-12-14 02:34:28.908 189 DEBUG tempest.lib.common.rest_client [req-14331410-592f-48c4-b06e-85ee7677e009 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-14331410-592f-48c4-b06e-85ee7677e009', 'content-length': '32', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-14331410-592f-48c4-b06e-85ee7677e009', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata'} Body: b'{"metadata": {"key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:28.920 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:28.987 189 INFO tempest.lib.common.rest_client [req-9ec52d0e-746f-4910-9d48-d308ff28232d ] Request (VolumeMetadataV3RbacTest:test_delete_volume_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.062s 2020-12-14 02:34:28.990 189 DEBUG tempest.lib.common.rest_client [req-9ec52d0e-746f-4910-9d48-d308ff28232d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:28 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ec52d0e-746f-4910-9d48-d308ff28232d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:29.045 189 INFO tempest.lib.common.rest_client [req-ff8f1eb4-6d85-45fb-ac42-503d4ec3dcc9 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:34:29.049 189 DEBUG tempest.lib.common.rest_client [req-ff8f1eb4-6d85-45fb-ac42-503d4ec3dcc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff8f1eb4-6d85-45fb-ac42-503d4ec3dcc9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["DS7GQc5IQpu2XuCuh_55Gw"], "expires_at": "2020-12-14T03:34:29.000000Z", "issued_at": "2020-12-14T02:34:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:29.185 189 INFO tempest.lib.common.rest_client [req-d4b00f16-b312-4907-ae95-a0035a6a4c4d ] Request (VolumeMetadataV3RbacTest:test_delete_volume_metadata_item): 200 DELETE http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata/key1 0.130s 2020-12-14 02:34:29.188 189 DEBUG tempest.lib.common.rest_client [req-d4b00f16-b312-4907-ae95-a0035a6a4c4d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-d4b00f16-b312-4907-ae95-a0035a6a4c4d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata/key1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:29.190 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:29.257 189 INFO tempest.lib.common.rest_client [req-2a811c4a-1b33-4ee0-962f-9ec99cbddf54 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.061s 2020-12-14 02:34:29.260 189 DEBUG tempest.lib.common.rest_client [req-2a811c4a-1b33-4ee0-962f-9ec99cbddf54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a811c4a-1b33-4ee0-962f-9ec99cbddf54', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:29.311 189 INFO tempest.lib.common.rest_client [req-20e63f7c-c423-47f3-be36-ba4072902189 ] Request (VolumeMetadataV3RbacTest:test_delete_volume_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:34:29.314 189 DEBUG tempest.lib.common.rest_client [req-20e63f7c-c423-47f3-be36-ba4072902189 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20e63f7c-c423-47f3-be36-ba4072902189', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["CqJs3mZ5RR2l6FHUnA0ZBw"], "expires_at": "2020-12-14T03:34:29.000000Z", "issued_at": "2020-12-14T02:34:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:29.445 189 INFO tempest.lib.common.rest_client [req-f5b03373-e496-4920-aaa5-d4cfcb2cbeb4 ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata/key1 0.121s 2020-12-14 02:34:29.449 189 DEBUG tempest.lib.common.rest_client [req-f5b03373-e496-4920-aaa5-d4cfcb2cbeb4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '120', 'content-type': 'application/json', 'x-compute-request-id': 'req-f5b03373-e496-4920-aaa5-d4cfcb2cbeb4', 'x-openstack-request-id': 'req-f5b03373-e496-4920-aaa5-d4cfcb2cbeb4', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata/key1'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume ff839233-9225-48ac-aec1-61323243366b has no metadata with key key1."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:29.460 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:29.478 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_image_metadata, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:29.591 189 INFO tempest.lib.common.rest_client [req-56eecf72-ec12-4185-b721-879d96a77a68 ] Request (VolumeMetadataV3RbacTest:test_list_volumes_details_image_metadata): 200 POST http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action 0.107s 2020-12-14 02:34:29.595 189 DEBUG tempest.lib.common.rest_client [req-56eecf72-ec12-4185-b721-879d96a77a68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-set_image_metadata": {"metadata": {"image_id": "cd332004-33aa-4c81-9e50-54766a6df097"}}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-56eecf72-ec12-4185-b721-879d96a77a68', 'content-length': '66', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-56eecf72-ec12-4185-b721-879d96a77a68', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action'} Body: b'{"metadata": {"image_id": "cd332004-33aa-4c81-9e50-54766a6df097"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:29.609 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:29.680 189 INFO tempest.lib.common.rest_client [req-064851e6-7c19-41a5-a7d1-1cd88b10183b ] Request (VolumeMetadataV3RbacTest:test_list_volumes_details_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.064s 2020-12-14 02:34:29.684 189 DEBUG tempest.lib.common.rest_client [req-064851e6-7c19-41a5-a7d1-1cd88b10183b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-064851e6-7c19-41a5-a7d1-1cd88b10183b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:29.737 189 INFO tempest.lib.common.rest_client [req-d84a70d1-91a4-42e6-8d05-f702030f8d14 ] Request (VolumeMetadataV3RbacTest:test_list_volumes_details_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:34:29.740 189 DEBUG tempest.lib.common.rest_client [req-d84a70d1-91a4-42e6-8d05-f702030f8d14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d84a70d1-91a4-42e6-8d05-f702030f8d14', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["1oFHf58FRGOsPB0fgkWMjA"], "expires_at": "2020-12-14T03:34:29.000000Z", "issued_at": "2020-12-14T02:34:29.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:29.875 189 INFO tempest.lib.common.rest_client [req-2af87979-d9a7-4c1a-825b-82d73d47953c ] Request (VolumeMetadataV3RbacTest:test_list_volumes_details_image_metadata): 200 GET http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/detail 0.128s 2020-12-14 02:34:29.879 189 DEBUG tempest.lib.common.rest_client [req-2af87979-d9a7-4c1a-825b-82d73d47953c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2af87979-d9a7-4c1a-825b-82d73d47953c', 'content-length': '1149', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2af87979-d9a7-4c1a-825b-82d73d47953c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/detail'} Body: b'{"volumes": [{"id": "ff839233-9225-48ac-aec1-61323243366b", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:26.000000", "updated_at": "2020-12-14T02:34:26.000000", "name": "tempest-VolumeMetadataV3RbacTest-Volume-137037759", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b"}], "user_id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"image_id": "cd332004-33aa-4c81-9e50-54766a6df097"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "0cf31af471f241f898351768a97bb670"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:29.978 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:30.047 189 INFO tempest.lib.common.rest_client [req-31148388-8423-4005-8ef2-2ef09b58f3cb ] Request (VolumeMetadataV3RbacTest:test_list_volumes_details_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.063s 2020-12-14 02:34:30.050 189 DEBUG tempest.lib.common.rest_client [req-31148388-8423-4005-8ef2-2ef09b58f3cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:29 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31148388-8423-4005-8ef2-2ef09b58f3cb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:30.102 189 INFO tempest.lib.common.rest_client [req-795d125d-397a-4527-aa55-45d7852994f2 ] Request (VolumeMetadataV3RbacTest:test_list_volumes_details_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:34:30.106 189 DEBUG tempest.lib.common.rest_client [req-795d125d-397a-4527-aa55-45d7852994f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-795d125d-397a-4527-aa55-45d7852994f2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["ADCpHtMSSqG5De9GU3A3Eg"], "expires_at": "2020-12-14T03:34:30.000000Z", "issued_at": "2020-12-14T02:34:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:30.306 189 INFO tempest.lib.common.rest_client [req-7fb3a9c2-f831-4668-bd81-13eb2b7906df ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 200 POST http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action 0.190s 2020-12-14 02:34:30.309 189 DEBUG tempest.lib.common.rest_client [req-7fb3a9c2-f831-4668-bd81-13eb2b7906df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-unset_image_metadata": {"key": "image_id"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-7fb3a9c2-f831-4668-bd81-13eb2b7906df', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:30.322 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:30.341 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_image_metadata, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:30.452 189 INFO tempest.lib.common.rest_client [req-a30075af-bb42-428d-be4f-316e6de2baeb ] Request (VolumeMetadataV3RbacTest:test_show_volume_details_image_metadata): 200 POST http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action 0.105s 2020-12-14 02:34:30.456 189 DEBUG tempest.lib.common.rest_client [req-a30075af-bb42-428d-be4f-316e6de2baeb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-set_image_metadata": {"metadata": {"image_id": "cd332004-33aa-4c81-9e50-54766a6df097"}}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a30075af-bb42-428d-be4f-316e6de2baeb', 'content-length': '66', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a30075af-bb42-428d-be4f-316e6de2baeb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action'} Body: b'{"metadata": {"image_id": "cd332004-33aa-4c81-9e50-54766a6df097"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:30.469 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:30.539 189 INFO tempest.lib.common.rest_client [req-1a2fb6e7-2541-4c69-b0b3-1fe4bb59dc95 ] Request (VolumeMetadataV3RbacTest:test_show_volume_details_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.064s 2020-12-14 02:34:30.542 189 DEBUG tempest.lib.common.rest_client [req-1a2fb6e7-2541-4c69-b0b3-1fe4bb59dc95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1a2fb6e7-2541-4c69-b0b3-1fe4bb59dc95', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:30.586 189 INFO tempest.lib.common.rest_client [req-a1c4c426-b5dd-4130-91c2-2de46235818c ] Request (VolumeMetadataV3RbacTest:test_show_volume_details_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:34:30.590 189 DEBUG tempest.lib.common.rest_client [req-a1c4c426-b5dd-4130-91c2-2de46235818c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1c4c426-b5dd-4130-91c2-2de46235818c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["WGkNKSThTYiaB_DiQKpkDA"], "expires_at": "2020-12-14T03:34:30.000000Z", "issued_at": "2020-12-14T02:34:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:30.737 189 INFO tempest.lib.common.rest_client [req-736bcc95-402a-4d0c-8ecd-d468146b30e0 ] Request (VolumeMetadataV3RbacTest:test_show_volume_details_image_metadata): 200 GET http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b 0.139s 2020-12-14 02:34:30.740 189 DEBUG tempest.lib.common.rest_client [req-736bcc95-402a-4d0c-8ecd-d468146b30e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-736bcc95-402a-4d0c-8ecd-d468146b30e0', 'content-length': '1146', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-736bcc95-402a-4d0c-8ecd-d468146b30e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b'} Body: b'{"volume": {"id": "ff839233-9225-48ac-aec1-61323243366b", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:26.000000", "updated_at": "2020-12-14T02:34:26.000000", "name": "tempest-VolumeMetadataV3RbacTest-Volume-137037759", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b"}], "user_id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "volume_image_metadata": {"image_id": "cd332004-33aa-4c81-9e50-54766a6df097"}, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "0cf31af471f241f898351768a97bb670"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:30.851 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:30.921 189 INFO tempest.lib.common.rest_client [req-0dbcce3d-b1ab-4e9e-a25f-03bd98c2d5b9 ] Request (VolumeMetadataV3RbacTest:test_show_volume_details_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.064s 2020-12-14 02:34:30.924 189 DEBUG tempest.lib.common.rest_client [req-0dbcce3d-b1ab-4e9e-a25f-03bd98c2d5b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0dbcce3d-b1ab-4e9e-a25f-03bd98c2d5b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:30.973 189 INFO tempest.lib.common.rest_client [req-60c50f39-f811-4de3-a3a3-e5ae83406ed7 ] Request (VolumeMetadataV3RbacTest:test_show_volume_details_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:34:30.977 189 DEBUG tempest.lib.common.rest_client [req-60c50f39-f811-4de3-a3a3-e5ae83406ed7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-60c50f39-f811-4de3-a3a3-e5ae83406ed7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["mtNzctlgRH-tnW8nLDjXkw"], "expires_at": "2020-12-14T03:34:30.000000Z", "issued_at": "2020-12-14T02:34:30.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:31.177 189 INFO tempest.lib.common.rest_client [req-bca288f8-667d-4733-915e-edc07efbae2c ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 200 POST http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action 0.191s 2020-12-14 02:34:31.180 189 DEBUG tempest.lib.common.rest_client [req-bca288f8-667d-4733-915e-edc07efbae2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-unset_image_metadata": {"key": "image_id"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:30 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-bca288f8-667d-4733-915e-edc07efbae2c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:31.193 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:31.213 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_volume_metadata, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:31.216 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:31.281 189 INFO tempest.lib.common.rest_client [req-dac35538-308d-4fd5-bb6d-1fee51a3c951 ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.059s 2020-12-14 02:34:31.284 189 DEBUG tempest.lib.common.rest_client [req-dac35538-308d-4fd5-bb6d-1fee51a3c951 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dac35538-308d-4fd5-bb6d-1fee51a3c951', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:31.331 189 INFO tempest.lib.common.rest_client [req-a3f8ab67-1105-4e27-9465-856c46667566 ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:34:31.333 189 DEBUG tempest.lib.common.rest_client [req-a3f8ab67-1105-4e27-9465-856c46667566 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3f8ab67-1105-4e27-9465-856c46667566', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["Yh49ANLDRfq_jXQ2ZvgXoQ"], "expires_at": "2020-12-14T03:34:31.000000Z", "issued_at": "2020-12-14T02:34:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:31.464 189 INFO tempest.lib.common.rest_client [req-891626c6-250d-404c-9702-b55cc99eece4 ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata): 200 GET http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata 0.123s 2020-12-14 02:34:31.467 189 DEBUG tempest.lib.common.rest_client [req-891626c6-250d-404c-9702-b55cc99eece4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-891626c6-250d-404c-9702-b55cc99eece4', 'content-length': '16', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-891626c6-250d-404c-9702-b55cc99eece4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata'} Body: b'{"metadata": {}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:31.480 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:31.547 189 INFO tempest.lib.common.rest_client [req-8be70b34-4bf1-44d8-96f9-4224db5114ae ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.060s 2020-12-14 02:34:31.551 189 DEBUG tempest.lib.common.rest_client [req-8be70b34-4bf1-44d8-96f9-4224db5114ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8be70b34-4bf1-44d8-96f9-4224db5114ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:31.601 189 INFO tempest.lib.common.rest_client [req-c27c7499-d731-44e2-823d-ef8690fac4ec ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:34:31.603 189 DEBUG tempest.lib.common.rest_client [req-c27c7499-d731-44e2-823d-ef8690fac4ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c27c7499-d731-44e2-823d-ef8690fac4ec', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["wi_08jtRQNqllSzIvP_Cnw"], "expires_at": "2020-12-14T03:34:31.000000Z", "issued_at": "2020-12-14T02:34:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:31.617 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:31.634 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_volume_metadata, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:31.762 189 INFO tempest.lib.common.rest_client [req-f4f3591e-7c5a-4d60-acbd-2d885a3f0e13 ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata_item): 200 POST http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata 0.122s 2020-12-14 02:34:31.765 189 DEBUG tempest.lib.common.rest_client [req-f4f3591e-7c5a-4d60-acbd-2d885a3f0e13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-f4f3591e-7c5a-4d60-acbd-2d885a3f0e13', 'content-length': '32', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-f4f3591e-7c5a-4d60-acbd-2d885a3f0e13', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata'} Body: b'{"metadata": {"key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:31.779 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:31.842 189 INFO tempest.lib.common.rest_client [req-26f9cfdd-bfdd-49da-b399-caf61bae063c ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.058s 2020-12-14 02:34:31.845 189 DEBUG tempest.lib.common.rest_client [req-26f9cfdd-bfdd-49da-b399-caf61bae063c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26f9cfdd-bfdd-49da-b399-caf61bae063c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:31.896 189 INFO tempest.lib.common.rest_client [req-c6ef56c9-8acd-4b8a-99e0-8822afd29aca ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:34:31.899 189 DEBUG tempest.lib.common.rest_client [req-c6ef56c9-8acd-4b8a-99e0-8822afd29aca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6ef56c9-8acd-4b8a-99e0-8822afd29aca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["tNDXHjbQTamaieFdcFzgaA"], "expires_at": "2020-12-14T03:34:31.000000Z", "issued_at": "2020-12-14T02:34:31.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:32.028 189 INFO tempest.lib.common.rest_client [req-9a330493-b119-4c38-987f-ca1163c93e0e ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata_item): 200 GET http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata/key1 0.121s 2020-12-14 02:34:32.032 189 DEBUG tempest.lib.common.rest_client [req-9a330493-b119-4c38-987f-ca1163c93e0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:31 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-9a330493-b119-4c38-987f-ca1163c93e0e', 'content-length': '28', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9a330493-b119-4c38-987f-ca1163c93e0e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata/key1'} Body: b'{"meta": {"key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:32.045 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:32.107 189 INFO tempest.lib.common.rest_client [req-36fc3d76-cb93-4957-b1d2-00f50fbf98e0 ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.057s 2020-12-14 02:34:32.110 189 DEBUG tempest.lib.common.rest_client [req-36fc3d76-cb93-4957-b1d2-00f50fbf98e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-36fc3d76-cb93-4957-b1d2-00f50fbf98e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:32.159 189 INFO tempest.lib.common.rest_client [req-2e3e1f3b-763a-45e6-b0ad-0b9b81d2a5d1 ] Request (VolumeMetadataV3RbacTest:test_show_volume_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:34:32.162 189 DEBUG tempest.lib.common.rest_client [req-2e3e1f3b-763a-45e6-b0ad-0b9b81d2a5d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e3e1f3b-763a-45e6-b0ad-0b9b81d2a5d1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["ZuvBS6l3QLGQ0t_Nn1cXpw"], "expires_at": "2020-12-14T03:34:32.000000Z", "issued_at": "2020-12-14T02:34:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:32.299 189 INFO tempest.lib.common.rest_client [req-1a05eb91-e188-4458-a319-dc84bb7f147e ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata/key1 0.128s 2020-12-14 02:34:32.303 189 DEBUG tempest.lib.common.rest_client [req-1a05eb91-e188-4458-a319-dc84bb7f147e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-1a05eb91-e188-4458-a319-dc84bb7f147e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata/key1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:32.314 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:32.332 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:volume_image_metadata, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:32.334 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:32.402 189 INFO tempest.lib.common.rest_client [req-30abca9d-f2da-4d6b-b112-98764624c8c3 ] Request (VolumeMetadataV3RbacTest:test_update_volume_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.062s 2020-12-14 02:34:32.405 189 DEBUG tempest.lib.common.rest_client [req-30abca9d-f2da-4d6b-b112-98764624c8c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30abca9d-f2da-4d6b-b112-98764624c8c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:32.452 189 INFO tempest.lib.common.rest_client [req-dfc3b1f4-c06f-4b48-8125-030b99db5ef5 ] Request (VolumeMetadataV3RbacTest:test_update_volume_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:34:32.455 189 DEBUG tempest.lib.common.rest_client [req-dfc3b1f4-c06f-4b48-8125-030b99db5ef5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dfc3b1f4-c06f-4b48-8125-030b99db5ef5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["GbTVOfYuTj2mG3KQ6yq0Yw"], "expires_at": "2020-12-14T03:34:32.000000Z", "issued_at": "2020-12-14T02:34:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:32.616 189 INFO tempest.lib.common.rest_client [req-4744356d-25d0-4697-b5aa-ccf07c695647 ] Request (VolumeMetadataV3RbacTest:test_update_volume_image_metadata): 200 POST http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action 0.152s 2020-12-14 02:34:32.619 189 DEBUG tempest.lib.common.rest_client [req-4744356d-25d0-4697-b5aa-ccf07c695647 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-set_image_metadata": {"metadata": {"image_id": "cd332004-33aa-4c81-9e50-54766a6df097"}}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4744356d-25d0-4697-b5aa-ccf07c695647', 'content-length': '66', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4744356d-25d0-4697-b5aa-ccf07c695647', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action'} Body: b'{"metadata": {"image_id": "cd332004-33aa-4c81-9e50-54766a6df097"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:32.633 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:32.694 189 INFO tempest.lib.common.rest_client [req-1d0f1025-d023-42bd-a9d8-1039e254b932 ] Request (VolumeMetadataV3RbacTest:test_update_volume_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.055s 2020-12-14 02:34:32.696 189 DEBUG tempest.lib.common.rest_client [req-1d0f1025-d023-42bd-a9d8-1039e254b932 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d0f1025-d023-42bd-a9d8-1039e254b932', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:32.743 189 INFO tempest.lib.common.rest_client [req-cec24a3c-1479-4496-beb4-362c5e9b3ad5 ] Request (VolumeMetadataV3RbacTest:test_update_volume_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:34:32.746 189 DEBUG tempest.lib.common.rest_client [req-cec24a3c-1479-4496-beb4-362c5e9b3ad5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cec24a3c-1479-4496-beb4-362c5e9b3ad5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["eS7yDZ4SRa-qB28Z4qJD7A"], "expires_at": "2020-12-14T03:34:32.000000Z", "issued_at": "2020-12-14T02:34:32.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:32.923 189 INFO tempest.lib.common.rest_client [req-9d0213fe-6db6-46f4-a42c-f8cf4284c7a5 ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 200 POST http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action 0.167s 2020-12-14 02:34:32.927 189 DEBUG tempest.lib.common.rest_client [req-9d0213fe-6db6-46f4-a42c-f8cf4284c7a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-unset_image_metadata": {"key": "image_id"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-9d0213fe-6db6-46f4-a42c-f8cf4284c7a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:32.940 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:32.958 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:update_volume_metadata, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:33.036 189 INFO tempest.lib.common.rest_client [req-56353238-fff9-47af-af5f-eacb08e2bc52 ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata): 200 POST http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata 0.073s 2020-12-14 02:34:33.039 189 DEBUG tempest.lib.common.rest_client [req-56353238-fff9-47af-af5f-eacb08e2bc52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:32 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-56353238-fff9-47af-af5f-eacb08e2bc52', 'content-length': '32', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-56353238-fff9-47af-af5f-eacb08e2bc52', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata'} Body: b'{"metadata": {"key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:33.052 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:33.120 189 INFO tempest.lib.common.rest_client [req-d5727968-4e13-4ed3-8cb3-ad6100659b11 ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.061s 2020-12-14 02:34:33.125 189 DEBUG tempest.lib.common.rest_client [req-d5727968-4e13-4ed3-8cb3-ad6100659b11 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5727968-4e13-4ed3-8cb3-ad6100659b11', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:33.173 189 INFO tempest.lib.common.rest_client [req-400209fb-09ac-4acb-b8a2-29384b2529f9 ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:34:33.177 189 DEBUG tempest.lib.common.rest_client [req-400209fb-09ac-4acb-b8a2-29384b2529f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-400209fb-09ac-4acb-b8a2-29384b2529f9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["bAmgJemDS5-121LfdWIzlg"], "expires_at": "2020-12-14T03:34:33.000000Z", "issued_at": "2020-12-14T02:34:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:33.307 189 INFO tempest.lib.common.rest_client [req-c6dc9fe2-844c-40fe-8f6f-95acd0fb8b6d ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata): 200 PUT http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata 0.122s 2020-12-14 02:34:33.310 189 DEBUG tempest.lib.common.rest_client [req-c6dc9fe2-844c-40fe-8f6f-95acd0fb8b6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c6dc9fe2-844c-40fe-8f6f-95acd0fb8b6d', 'content-length': '32', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c6dc9fe2-844c-40fe-8f6f-95acd0fb8b6d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata'} Body: b'{"metadata": {"key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:33.321 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:33.385 189 INFO tempest.lib.common.rest_client [req-02f1b9e2-5eb0-4240-ba31-ed9a3c44ed5a ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.058s 2020-12-14 02:34:33.388 189 DEBUG tempest.lib.common.rest_client [req-02f1b9e2-5eb0-4240-ba31-ed9a3c44ed5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02f1b9e2-5eb0-4240-ba31-ed9a3c44ed5a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:33.435 189 INFO tempest.lib.common.rest_client [req-50ffcc6e-9306-45b1-9458-bd531a9a169f ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-14 02:34:33.438 189 DEBUG tempest.lib.common.rest_client [req-50ffcc6e-9306-45b1-9458-bd531a9a169f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-50ffcc6e-9306-45b1-9458-bd531a9a169f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["gvKsOYqnRmOchX7CsqSUgA"], "expires_at": "2020-12-14T03:34:33.000000Z", "issued_at": "2020-12-14T02:34:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:33.580 189 INFO tempest.lib.common.rest_client [req-30028152-f629-4dfb-a7f3-70b5d47ae344 ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata/key1 0.132s 2020-12-14 02:34:33.583 189 DEBUG tempest.lib.common.rest_client [req-30028152-f629-4dfb-a7f3-70b5d47ae344 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-30028152-f629-4dfb-a7f3-70b5d47ae344', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata/key1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:33.594 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:33.611 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:update_volume_metadata, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:33.698 189 INFO tempest.lib.common.rest_client [req-373182f7-89d3-4f6c-beb3-f7c007a9a4f0 ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata_item): 200 POST http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata 0.080s 2020-12-14 02:34:33.701 189 DEBUG tempest.lib.common.rest_client [req-373182f7-89d3-4f6c-beb3-f7c007a9a4f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"key1": "value1"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-373182f7-89d3-4f6c-beb3-f7c007a9a4f0', 'content-length': '32', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-373182f7-89d3-4f6c-beb3-f7c007a9a4f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata'} Body: b'{"metadata": {"key1": "value1"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:33.717 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:33.794 189 INFO tempest.lib.common.rest_client [req-98bba4f3-f363-4d5d-875a-30e72d1208f1 ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.071s 2020-12-14 02:34:33.796 189 DEBUG tempest.lib.common.rest_client [req-98bba4f3-f363-4d5d-875a-30e72d1208f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98bba4f3-f363-4d5d-875a-30e72d1208f1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:33.847 189 INFO tempest.lib.common.rest_client [req-a5d1cfbf-b0b4-41f8-8db3-346f1f7df9a4 ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:34:33.851 189 DEBUG tempest.lib.common.rest_client [req-a5d1cfbf-b0b4-41f8-8db3-346f1f7df9a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5d1cfbf-b0b4-41f8-8db3-346f1f7df9a4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["0q7mw63xSAqNyAzk2I21QQ"], "expires_at": "2020-12-14T03:34:33.000000Z", "issued_at": "2020-12-14T02:34:33.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:33.993 189 INFO tempest.lib.common.rest_client [req-c0c695b8-60f2-4826-a83b-e5bdec1391e3 ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata_item): 200 PUT http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata/key1 0.134s 2020-12-14 02:34:33.997 189 DEBUG tempest.lib.common.rest_client [req-c0c695b8-60f2-4826-a83b-e5bdec1391e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"meta": {"key1": "value1_update"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:33 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-c0c695b8-60f2-4826-a83b-e5bdec1391e3', 'content-length': '35', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-c0c695b8-60f2-4826-a83b-e5bdec1391e3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata/key1'} Body: b'{"meta": {"key1": "value1_update"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:34.010 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:34.075 189 INFO tempest.lib.common.rest_client [req-dcc5458c-dc73-49c1-b43f-1a1e23a668e8 ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles 0.059s 2020-12-14 02:34:34.078 189 DEBUG tempest.lib.common.rest_client [req-dcc5458c-dc73-49c1-b43f-1a1e23a668e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dcc5458c-dc73-49c1-b43f-1a1e23a668e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670/users/2fb68b77dc8f40b4b557d3ca8b79cd4a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:34.127 189 INFO tempest.lib.common.rest_client [req-ecd8680e-eafd-4eb6-b2a1-9788278eff05 ] Request (VolumeMetadataV3RbacTest:test_update_volume_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.043s 2020-12-14 02:34:34.131 189 DEBUG tempest.lib.common.rest_client [req-ecd8680e-eafd-4eb6-b2a1-9788278eff05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ecd8680e-eafd-4eb6-b2a1-9788278eff05', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "name": "tempest-VolumeMetadataV3RbacTest-473731792", "password_expires_at": null}, "audit_ids": ["dxmDM-oWQdKfi8oVN5PUXg"], "expires_at": "2020-12-14T03:34:34.000000Z", "issued_at": "2020-12-14T02:34:34.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "0cf31af471f241f898351768a97bb670", "name": "tempest-VolumeMetadataV3RbacTest-473731792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_0cf31af471f241f898351768a97bb670", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:34.267 189 INFO tempest.lib.common.rest_client [req-967162e4-2d7b-4e0a-a684-462dfac27b7c ] Request (VolumeMetadataV3RbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata/key1 0.126s 2020-12-14 02:34:34.270 189 DEBUG tempest.lib.common.rest_client [req-967162e4-2d7b-4e0a-a684-462dfac27b7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version,Accept-Encoding', 'x-openstack-request-id': 'req-967162e4-2d7b-4e0a-a684-462dfac27b7c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b/metadata/key1'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:34.371 189 INFO tempest.lib.common.rest_client [req-32ec1ebf-20c9-4ec5-a43d-5e8dc98cf87f ] Request (VolumeMetadataV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b 0.083s 2020-12-14 02:34:34.373 189 DEBUG tempest.lib.common.rest_client [req-32ec1ebf-20c9-4ec5-a43d-5e8dc98cf87f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-32ec1ebf-20c9-4ec5-a43d-5e8dc98cf87f', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:34.460 189 INFO tempest.lib.common.rest_client [req-df8f97f8-b989-48c5-a2fb-c87346976099 ] Request (VolumeMetadataV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b 0.080s 2020-12-14 02:34:34.463 189 DEBUG tempest.lib.common.rest_client [req-df8f97f8-b989-48c5-a2fb-c87346976099 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:34 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-df8f97f8-b989-48c5-a2fb-c87346976099', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-df8f97f8-b989-48c5-a2fb-c87346976099', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b'} Body: b'{"volume": {"id": "ff839233-9225-48ac-aec1-61323243366b", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:26.000000", "updated_at": "2020-12-14T02:34:34.000000", "name": "tempest-VolumeMetadataV3RbacTest-Volume-137037759", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b"}], "user_id": "2fb68b77dc8f40b4b557d3ca8b79cd4a", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "0cf31af471f241f898351768a97bb670"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:35.626 189 INFO tempest.lib.common.rest_client [req-bb81786b-a97d-4647-9d95-71139dbd4c61 ] Request (VolumeMetadataV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b 0.062s 2020-12-14 02:34:35.629 189 DEBUG tempest.lib.common.rest_client [req-bb81786b-a97d-4647-9d95-71139dbd4c61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-bb81786b-a97d-4647-9d95-71139dbd4c61', 'x-openstack-request-id': 'req-bb81786b-a97d-4647-9d95-71139dbd4c61', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/0cf31af471f241f898351768a97bb670/volumes/ff839233-9225-48ac-aec1-61323243366b'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume ff839233-9225-48ac-aec1-61323243366b could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:35.772 189 INFO tempest.lib.common.rest_client [req-417f3d56-fbdc-4be0-9248-b60cb2f66ad0 ] Request (VolumeMetadataV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/2fb68b77dc8f40b4b557d3ca8b79cd4a 0.135s 2020-12-14 02:34:35.775 189 DEBUG tempest.lib.common.rest_client [req-417f3d56-fbdc-4be0-9248-b60cb2f66ad0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-417f3d56-fbdc-4be0-9248-b60cb2f66ad0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/2fb68b77dc8f40b4b557d3ca8b79cd4a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:35.875 189 INFO tempest.lib.common.rest_client [req-ab0f2b76-7c0b-4acd-9c88-abf7f547f40f ] Request (VolumeMetadataV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-14 02:34:35.878 189 DEBUG tempest.lib.common.rest_client [req-ab0f2b76-7c0b-4acd-9c88-abf7f547f40f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ab0f2b76-7c0b-4acd-9c88-abf7f547f40f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["Hsr-jjwCR3ykDcIRPURB-Q"], "expires_at": "2020-12-14T03:34:35.000000Z", "issued_at": "2020-12-14T02:34:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:36.231 189 INFO tempest.lib.common.rest_client [req-50061602-a0bc-4548-8616-db1f20127e83 ] Request (VolumeMetadataV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0cf31af471f241f898351768a97bb670&name=default 0.345s 2020-12-14 02:34:36.235 189 DEBUG tempest.lib.common.rest_client [req-50061602-a0bc-4548-8616-db1f20127e83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-50061602-a0bc-4548-8616-db1f20127e83', 'date': 'Mon, 14 Dec 2020 02:34:36 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=0cf31af471f241f898351768a97bb670&name=default'} Body: b'{"security_groups": [{"id": "ab1fdece-86a3-43eb-a054-48d1a66ea97e", "name": "default", "stateful": true, "tenant_id": "0cf31af471f241f898351768a97bb670", "description": "Default security group", "security_group_rules": [{"id": "6c2bd607-b54f-441f-bf56-ad4d3f8d67ca", "tenant_id": "0cf31af471f241f898351768a97bb670", "security_group_id": "ab1fdece-86a3-43eb-a054-48d1a66ea97e", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:34:36Z", "updated_at": "2020-12-14T02:34:36Z", "revision_number": 0, "project_id": "0cf31af471f241f898351768a97bb670"}, {"id": "74f2fecc-d8e2-47fe-9ca9-f2e49af76683", "tenant_id": "0cf31af471f241f898351768a97bb670", "security_group_id": "ab1fdece-86a3-43eb-a054-48d1a66ea97e", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "ab1fdece-86a3-43eb-a054-48d1a66ea97e", "description": null, "tags": [], "created_at": "2020-12-14T02:34:36Z", "updated_at": "2020-12-14T02:34:36Z", "revision_number": 0, "project_id": "0cf31af471f241f898351768a97bb670"}, {"id": "87c2d328-1b9b-41de-8ab1-5e331bcafb1d", "tenant_id": "0cf31af471f241f898351768a97bb670", "security_group_id": "ab1fdece-86a3-43eb-a054-48d1a66ea97e", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:34:36Z", "updated_at": "2020-12-14T02:34:36Z", "revision_number": 0, "project_id": "0cf31af471f241f898351768a97bb670"}, {"id": "8d332c0c-1db8-4b1f-b5f1-5253e3c6a6a1", "tenant_id": "0cf31af471f241f898351768a97bb670", "security_group_id": "ab1fdece-86a3-43eb-a054-48d1a66ea97e", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "ab1fdece-86a3-43eb-a054-48d1a66ea97e", "description": null, "tags": [], "created_at": "2020-12-14T02:34:36Z", "updated_at": "2020-12-14T02:34:36Z", "revision_number": 0, "project_id": "0cf31af471f241f898351768a97bb670"}], "tags": [], "created_at": "2020-12-14T02:34:36Z", "updated_at": "2020-12-14T02:34:36Z", "revision_number": 1, "project_id": "0cf31af471f241f898351768a97bb670"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:36.394 189 INFO tempest.lib.common.rest_client [req-70f4f5c3-1918-4d2d-922f-d91b9e390276 ] Request (VolumeMetadataV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/ab1fdece-86a3-43eb-a054-48d1a66ea97e 0.150s 2020-12-14 02:34:36.396 189 DEBUG tempest.lib.common.rest_client [req-70f4f5c3-1918-4d2d-922f-d91b9e390276 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-70f4f5c3-1918-4d2d-922f-d91b9e390276', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:34:36 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/ab1fdece-86a3-43eb-a054-48d1a66ea97e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:36.535 189 INFO tempest.lib.common.rest_client [req-588ee459-5d8a-476a-b1df-92ea41347795 ] Request (VolumeMetadataV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670 0.133s 2020-12-14 02:34:36.539 189 DEBUG tempest.lib.common.rest_client [req-588ee459-5d8a-476a-b1df-92ea41347795 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-588ee459-5d8a-476a-b1df-92ea41347795', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/0cf31af471f241f898351768a97bb670'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:36.655 189 INFO tempest.lib.common.rest_client [req-0ddd6c3e-54fb-4e47-b398-fc1665090613 ] Request (VolumesExtendV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:34:36.658 189 DEBUG tempest.lib.common.rest_client [req-0ddd6c3e-54fb-4e47-b398-fc1665090613 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0ddd6c3e-54fb-4e47-b398-fc1665090613', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["x1P5OtwER8ipm4IbYWo1Zg"], "expires_at": "2020-12-14T03:34:36.000000Z", "issued_at": "2020-12-14T02:34:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:36.753 189 INFO tempest.lib.common.rest_client [req-ff681612-8b41-45d8-8ee6-4be4d2cfe320 ] Request (VolumesExtendV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:34:36.756 189 DEBUG tempest.lib.common.rest_client [req-ff681612-8b41-45d8-8ee6-4be4d2cfe320 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff681612-8b41-45d8-8ee6-4be4d2cfe320', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["-1TmKcDDQLuXv_33Cis-Lg"], "expires_at": "2020-12-14T03:34:36.000000Z", "issued_at": "2020-12-14T02:34:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:36.834 189 INFO tempest.lib.common.rest_client [req-57c9f74a-ace2-4379-b3eb-96770ac94eee ] Request (VolumesExtendV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.070s 2020-12-14 02:34:36.836 189 DEBUG tempest.lib.common.rest_client [req-57c9f74a-ace2-4379-b3eb-96770ac94eee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57c9f74a-ace2-4379-b3eb-96770ac94eee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:36.913 189 INFO tempest.lib.common.rest_client [req-cb2b9766-fe0a-4dfd-9626-32a07e33a8d0 ] Request (VolumesExtendV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.069s 2020-12-14 02:34:36.915 189 DEBUG tempest.lib.common.rest_client [req-cb2b9766-fe0a-4dfd-9626-32a07e33a8d0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesExtendV3RbacTest-1096901105-desc", "domain_id": "default", "name": "tempest-VolumesExtendV3RbacTest-1096901105"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cb2b9766-fe0a-4dfd-9626-32a07e33a8d0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "5f713f0b68184349976cb5e1c39d2951", "name": "tempest-VolumesExtendV3RbacTest-1096901105", "domain_id": "default", "description": "tempest-VolumesExtendV3RbacTest-1096901105-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:37.044 189 INFO tempest.lib.common.rest_client [req-c05ae663-ac54-4582-a134-251fd55f789d ] Request (VolumesExtendV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.119s 2020-12-14 02:34:37.047 189 DEBUG tempest.lib.common.rest_client [req-c05ae663-ac54-4582-a134-251fd55f789d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesExtendV3RbacTest-1096901105", "password": "E4+NCaXyztQS!m9", "project_id": "5f713f0b68184349976cb5e1c39d2951", "email": "tempest-VolumesExtendV3RbacTest-1229603050@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '402', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c05ae663-ac54-4582-a134-251fd55f789d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "5f713f0b68184349976cb5e1c39d2951", "email": "tempest-VolumesExtendV3RbacTest-1229603050@example.com", "id": "95a1f786b91a454ba27f8af19b1f9ed5", "name": "tempest-VolumesExtendV3RbacTest-1096901105", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/95a1f786b91a454ba27f8af19b1f9ed5"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:37.128 189 INFO tempest.lib.common.rest_client [req-171340b9-326c-45ee-96c0-5ccb1b1d0ece ] Request (VolumesExtendV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.072s 2020-12-14 02:34:37.131 189 DEBUG tempest.lib.common.rest_client [req-171340b9-326c-45ee-96c0-5ccb1b1d0ece ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-171340b9-326c-45ee-96c0-5ccb1b1d0ece', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:37.197 189 INFO tempest.lib.common.rest_client [req-f185d3ac-5dab-4361-95b1-e00b7767e498 ] Request (VolumesExtendV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.058s 2020-12-14 02:34:37.200 189 DEBUG tempest.lib.common.rest_client [req-f185d3ac-5dab-4361-95b1-e00b7767e498 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f185d3ac-5dab-4361-95b1-e00b7767e498', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:37.290 189 INFO tempest.lib.common.rest_client [req-6867180d-9bed-43f3-a7a2-4225dcf7d578 ] Request (VolumesExtendV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951/users/95a1f786b91a454ba27f8af19b1f9ed5/roles/72a4576c553448cd941b052c1ca0cf2d 0.082s 2020-12-14 02:34:37.292 189 DEBUG tempest.lib.common.rest_client [req-6867180d-9bed-43f3-a7a2-4225dcf7d578 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6867180d-9bed-43f3-a7a2-4225dcf7d578', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951/users/95a1f786b91a454ba27f8af19b1f9ed5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:37.296 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesExtendV3RbacTest-1096901105', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5f713f0b68184349976cb5e1c39d2951', 'project_name': 'tempest-VolumesExtendV3RbacTest-1096901105', 'tenant_id': '5f713f0b68184349976cb5e1c39d2951', 'tenant_name': 'tempest-VolumesExtendV3RbacTest-1096901105', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '95a1f786b91a454ba27f8af19b1f9ed5'}, Network: None, Subnet: None, Router: None 2020-12-14 02:34:37.300 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesExtendV3RbacTest-1096901105', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5f713f0b68184349976cb5e1c39d2951', 'project_name': 'tempest-VolumesExtendV3RbacTest-1096901105', 'tenant_id': '5f713f0b68184349976cb5e1c39d2951', 'tenant_name': 'tempest-VolumesExtendV3RbacTest-1096901105', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '95a1f786b91a454ba27f8af19b1f9ed5'}, Network: None, Subnet: None, Router: None 2020-12-14 02:34:37.491 189 INFO tempest.lib.common.rest_client [req-45d0d616-3e55-4f24-85e0-b9976cbdc258 ] Request (VolumesExtendV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.127s 2020-12-14 02:34:37.494 189 DEBUG tempest.lib.common.rest_client [req-45d0d616-3e55-4f24-85e0-b9976cbdc258 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45d0d616-3e55-4f24-85e0-b9976cbdc258', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "95a1f786b91a454ba27f8af19b1f9ed5", "name": "tempest-VolumesExtendV3RbacTest-1096901105", "password_expires_at": null}, "audit_ids": ["0faaa255Tf-X3hqZB8r7kg"], "expires_at": "2020-12-14T03:34:37.000000Z", "issued_at": "2020-12-14T02:34:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5f713f0b68184349976cb5e1c39d2951", "name": "tempest-VolumesExtendV3RbacTest-1096901105"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:37.615 189 INFO tempest.lib.common.rest_client [req-e904ad8c-ee7f-4d5d-ba95-0d75e3da5acd ] Request (VolumesExtendV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.107s 2020-12-14 02:34:37.618 189 DEBUG tempest.lib.common.rest_client [req-e904ad8c-ee7f-4d5d-ba95-0d75e3da5acd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e904ad8c-ee7f-4d5d-ba95-0d75e3da5acd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["q9UmIyaoSiqwWhXIAkQfeg"], "expires_at": "2020-12-14T03:34:37.000000Z", "issued_at": "2020-12-14T02:34:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:37.729 189 INFO tempest.lib.common.rest_client [req-4afb40b7-2c03-4ccc-85ae-a902da37c1c6 ] Request (VolumesExtendV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.046s 2020-12-14 02:34:37.733 189 DEBUG tempest.lib.common.rest_client [req-4afb40b7-2c03-4ccc-85ae-a902da37c1c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4afb40b7-2c03-4ccc-85ae-a902da37c1c6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["wMfBTQwuTZKKaqF4ENqpng"], "expires_at": "2020-12-14T03:34:37.000000Z", "issued_at": "2020-12-14T02:34:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:37.799 189 INFO tempest.lib.common.rest_client [req-a1d53a59-48a8-420b-abb6-9e2191f52b43 ] Request (VolumesExtendV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.057s 2020-12-14 02:34:37.802 189 DEBUG tempest.lib.common.rest_client [req-a1d53a59-48a8-420b-abb6-9e2191f52b43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1d53a59-48a8-420b-abb6-9e2191f52b43', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:37.869 189 INFO tempest.lib.common.rest_client [req-25429c98-2662-4cd5-a1f2-588f9cfd8d3d ] Request (VolumesExtendV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.060s 2020-12-14 02:34:37.871 189 DEBUG tempest.lib.common.rest_client [req-25429c98-2662-4cd5-a1f2-588f9cfd8d3d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25429c98-2662-4cd5-a1f2-588f9cfd8d3d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:37.875 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:34:37.877 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:37.948 189 INFO tempest.lib.common.rest_client [req-d07ff009-f33c-40d5-b531-73e4b36df242 ] Request (VolumesExtendV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951/users/95a1f786b91a454ba27f8af19b1f9ed5/roles 0.066s 2020-12-14 02:34:37.951 189 DEBUG tempest.lib.common.rest_client [req-d07ff009-f33c-40d5-b531-73e4b36df242 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d07ff009-f33c-40d5-b531-73e4b36df242', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951/users/95a1f786b91a454ba27f8af19b1f9ed5/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951/users/95a1f786b91a454ba27f8af19b1f9ed5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:38.038 189 INFO tempest.lib.common.rest_client [req-4d8e13e8-aa54-4c40-aae4-1f0cdd5c80aa ] Request (VolumesExtendV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951/users/95a1f786b91a454ba27f8af19b1f9ed5/roles/72a4576c553448cd941b052c1ca0cf2d 0.080s 2020-12-14 02:34:38.040 189 DEBUG tempest.lib.common.rest_client [req-4d8e13e8-aa54-4c40-aae4-1f0cdd5c80aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d8e13e8-aa54-4c40-aae4-1f0cdd5c80aa', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951/users/95a1f786b91a454ba27f8af19b1f9ed5/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:38.165 189 INFO tempest.lib.common.rest_client [req-d3f759b9-28cb-440b-9dc4-2dfedfe48185 ] Request (VolumesExtendV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951/users/95a1f786b91a454ba27f8af19b1f9ed5/roles/a629c95d64b3416fb80ae90af4f69c05 0.119s 2020-12-14 02:34:38.168 189 DEBUG tempest.lib.common.rest_client [req-d3f759b9-28cb-440b-9dc4-2dfedfe48185 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d3f759b9-28cb-440b-9dc4-2dfedfe48185', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951/users/95a1f786b91a454ba27f8af19b1f9ed5/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:39.275 189 INFO tempest.lib.common.rest_client [req-1e15b783-7a89-4028-9fb9-ff90c9fc3255 ] Request (VolumesExtendV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.100s 2020-12-14 02:34:39.279 189 DEBUG tempest.lib.common.rest_client [req-1e15b783-7a89-4028-9fb9-ff90c9fc3255 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e15b783-7a89-4028-9fb9-ff90c9fc3255', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "95a1f786b91a454ba27f8af19b1f9ed5", "name": "tempest-VolumesExtendV3RbacTest-1096901105", "password_expires_at": null}, "audit_ids": ["6s5EQc1uSN2Tqp1FR4iwOQ"], "expires_at": "2020-12-14T03:34:39.000000Z", "issued_at": "2020-12-14T02:34:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5f713f0b68184349976cb5e1c39d2951", "name": "tempest-VolumesExtendV3RbacTest-1096901105"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:39.722 189 INFO tempest.lib.common.rest_client [req-2060021f-fb61-470c-91e9-09129ea7452e ] Request (VolumesExtendV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes 0.432s 2020-12-14 02:34:39.723 189 DEBUG tempest.lib.common.rest_client [req-2060021f-fb61-470c-91e9-09129ea7452e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesExtendV3RbacTest-Volume-2060851267"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2060021f-fb61-470c-91e9-09129ea7452e', 'content-length': '844', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2060021f-fb61-470c-91e9-09129ea7452e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes'} Body: b'{"volume": {"id": "78ca8ffd-693a-40b0-88e5-82e88c441cd8", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:40.000000", "updated_at": null, "name": "tempest-VolumesExtendV3RbacTest-Volume-2060851267", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8"}], "user_id": "95a1f786b91a454ba27f8af19b1f9ed5", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:39.866 189 INFO tempest.lib.common.rest_client [req-a6f58f90-1fc2-4447-8a30-658d628942aa ] Request (VolumesExtendV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8 0.075s 2020-12-14 02:34:39.868 189 DEBUG tempest.lib.common.rest_client [req-a6f58f90-1fc2-4447-8a30-658d628942aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a6f58f90-1fc2-4447-8a30-658d628942aa', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a6f58f90-1fc2-4447-8a30-658d628942aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8'} Body: b'{"volume": {"id": "78ca8ffd-693a-40b0-88e5-82e88c441cd8", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:40.000000", "updated_at": "2020-12-14T02:34:40.000000", "name": "tempest-VolumesExtendV3RbacTest-Volume-2060851267", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8"}], "user_id": "95a1f786b91a454ba27f8af19b1f9ed5", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "5f713f0b68184349976cb5e1c39d2951"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:41.026 189 INFO tempest.lib.common.rest_client [req-077a465f-b9bb-44fc-ade9-9b4ba53d99ed ] Request (VolumesExtendV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8 0.081s 2020-12-14 02:34:41.028 189 DEBUG tempest.lib.common.rest_client [req-077a465f-b9bb-44fc-ade9-9b4ba53d99ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-077a465f-b9bb-44fc-ade9-9b4ba53d99ed', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-077a465f-b9bb-44fc-ade9-9b4ba53d99ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8'} Body: b'{"volume": {"id": "78ca8ffd-693a-40b0-88e5-82e88c441cd8", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:40.000000", "updated_at": "2020-12-14T02:34:40.000000", "name": "tempest-VolumesExtendV3RbacTest-Volume-2060851267", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8"}], "user_id": "95a1f786b91a454ba27f8af19b1f9ed5", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "5f713f0b68184349976cb5e1c39d2951"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:41.092 189 INFO tempest.common.waiters [-] volume 78ca8ffd-693a-40b0-88e5-82e88c441cd8 reached available after waiting for 2.092376 seconds 2020-12-14 02:34:41.096 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:41.109 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:extend, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:41.111 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:41.246 189 INFO tempest.lib.common.rest_client [req-95f3978a-ab10-406f-b1ec-98b5b827dcff ] Request (VolumesExtendV3RbacTest:test_volume_extend): 200 GET http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951/users/95a1f786b91a454ba27f8af19b1f9ed5/roles 0.130s 2020-12-14 02:34:41.248 189 DEBUG tempest.lib.common.rest_client [req-95f3978a-ab10-406f-b1ec-98b5b827dcff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95f3978a-ab10-406f-b1ec-98b5b827dcff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951/users/95a1f786b91a454ba27f8af19b1f9ed5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951/users/95a1f786b91a454ba27f8af19b1f9ed5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:41.303 189 INFO tempest.lib.common.rest_client [req-7499b9cb-0c3b-4783-977d-54dcd1a5f19a ] Request (VolumesExtendV3RbacTest:test_volume_extend): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:34:41.306 189 DEBUG tempest.lib.common.rest_client [req-7499b9cb-0c3b-4783-977d-54dcd1a5f19a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7499b9cb-0c3b-4783-977d-54dcd1a5f19a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "95a1f786b91a454ba27f8af19b1f9ed5", "name": "tempest-VolumesExtendV3RbacTest-1096901105", "password_expires_at": null}, "audit_ids": ["c6b1V8DBR2-OJwMJ2TR4Qw"], "expires_at": "2020-12-14T03:34:41.000000Z", "issued_at": "2020-12-14T02:34:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5f713f0b68184349976cb5e1c39d2951", "name": "tempest-VolumesExtendV3RbacTest-1096901105"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:41.594 189 INFO tempest.lib.common.rest_client [req-9bf50ade-5bbd-4d41-ac36-a43c21842690 ] Request (VolumesExtendV3RbacTest:test_volume_extend): 202 POST http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8/action 0.279s 2020-12-14 02:34:41.598 189 DEBUG tempest.lib.common.rest_client [req-9bf50ade-5bbd-4d41-ac36-a43c21842690 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"os-extend": {"new_size": 2}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'x-compute-request-id': 'req-9bf50ade-5bbd-4d41-ac36-a43c21842690', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-9bf50ade-5bbd-4d41-ac36-a43c21842690', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8/action'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:41.600 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:41.662 189 INFO tempest.lib.common.rest_client [req-47ee2904-5c89-458f-9bb6-d05c58dc0043 ] Request (VolumesExtendV3RbacTest:test_volume_extend): 200 GET http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951/users/95a1f786b91a454ba27f8af19b1f9ed5/roles 0.056s 2020-12-14 02:34:41.669 189 DEBUG tempest.lib.common.rest_client [req-47ee2904-5c89-458f-9bb6-d05c58dc0043 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-47ee2904-5c89-458f-9bb6-d05c58dc0043', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951/users/95a1f786b91a454ba27f8af19b1f9ed5/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951/users/95a1f786b91a454ba27f8af19b1f9ed5/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:41.806 189 INFO tempest.lib.common.rest_client [req-af2d3822-348e-4c72-acef-bd9664104c38 ] Request (VolumesExtendV3RbacTest:test_volume_extend): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.129s 2020-12-14 02:34:41.810 189 DEBUG tempest.lib.common.rest_client [req-af2d3822-348e-4c72-acef-bd9664104c38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af2d3822-348e-4c72-acef-bd9664104c38', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "95a1f786b91a454ba27f8af19b1f9ed5", "name": "tempest-VolumesExtendV3RbacTest-1096901105", "password_expires_at": null}, "audit_ids": ["MmXQItf9RfGBGbniEFNKgQ"], "expires_at": "2020-12-14T03:34:41.000000Z", "issued_at": "2020-12-14T02:34:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5f713f0b68184349976cb5e1c39d2951", "name": "tempest-VolumesExtendV3RbacTest-1096901105"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5f713f0b68184349976cb5e1c39d2951", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:41.951 189 INFO tempest.lib.common.rest_client [req-79779d8b-9ef2-42fe-9273-7cde5cbc4c98 ] Request (VolumesExtendV3RbacTest:test_volume_extend): 200 GET http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8 0.133s 2020-12-14 02:34:41.954 189 DEBUG tempest.lib.common.rest_client [req-79779d8b-9ef2-42fe-9273-7cde5cbc4c98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-79779d8b-9ef2-42fe-9273-7cde5cbc4c98', 'content-length': '1067', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-79779d8b-9ef2-42fe-9273-7cde5cbc4c98', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8'} Body: b'{"volume": {"id": "78ca8ffd-693a-40b0-88e5-82e88c441cd8", "status": "available", "size": 2, "availability_zone": "nova", "created_at": "2020-12-14T02:34:40.000000", "updated_at": "2020-12-14T02:34:42.000000", "name": "tempest-VolumesExtendV3RbacTest-Volume-2060851267", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8"}], "user_id": "95a1f786b91a454ba27f8af19b1f9ed5", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "5f713f0b68184349976cb5e1c39d2951"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:42.050 189 INFO tempest.common.waiters [-] volume 78ca8ffd-693a-40b0-88e5-82e88c441cd8 reached available after waiting for 0.050725 seconds 2020-12-14 02:34:42.135 189 INFO tempest.lib.common.rest_client [req-29f23c48-9459-4776-861a-df7babe78425 ] Request (VolumesExtendV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8 0.071s 2020-12-14 02:34:42.137 189 DEBUG tempest.lib.common.rest_client [req-29f23c48-9459-4776-861a-df7babe78425 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-29f23c48-9459-4776-861a-df7babe78425', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:42.230 189 INFO tempest.lib.common.rest_client [req-4f6b83f8-883b-4c37-833b-47b21304b129 ] Request (VolumesExtendV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8 0.086s 2020-12-14 02:34:42.233 189 DEBUG tempest.lib.common.rest_client [req-4f6b83f8-883b-4c37-833b-47b21304b129 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4f6b83f8-883b-4c37-833b-47b21304b129', 'content-length': '1066', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4f6b83f8-883b-4c37-833b-47b21304b129', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8'} Body: b'{"volume": {"id": "78ca8ffd-693a-40b0-88e5-82e88c441cd8", "status": "deleting", "size": 2, "availability_zone": "nova", "created_at": "2020-12-14T02:34:40.000000", "updated_at": "2020-12-14T02:34:42.000000", "name": "tempest-VolumesExtendV3RbacTest-Volume-2060851267", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8"}], "user_id": "95a1f786b91a454ba27f8af19b1f9ed5", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "5f713f0b68184349976cb5e1c39d2951"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:43.403 189 INFO tempest.lib.common.rest_client [req-95b17691-c993-425e-8a56-143a54aab46e ] Request (VolumesExtendV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8 0.070s 2020-12-14 02:34:43.405 189 DEBUG tempest.lib.common.rest_client [req-95b17691-c993-425e-8a56-143a54aab46e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-95b17691-c993-425e-8a56-143a54aab46e', 'x-openstack-request-id': 'req-95b17691-c993-425e-8a56-143a54aab46e', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/5f713f0b68184349976cb5e1c39d2951/volumes/78ca8ffd-693a-40b0-88e5-82e88c441cd8'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 78ca8ffd-693a-40b0-88e5-82e88c441cd8 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:43.570 189 INFO tempest.lib.common.rest_client [req-cbd56e76-dce2-4726-965d-dea345838de9 ] Request (VolumesExtendV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/95a1f786b91a454ba27f8af19b1f9ed5 0.157s 2020-12-14 02:34:43.573 189 DEBUG tempest.lib.common.rest_client [req-cbd56e76-dce2-4726-965d-dea345838de9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cbd56e76-dce2-4726-965d-dea345838de9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/95a1f786b91a454ba27f8af19b1f9ed5'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:43.678 189 INFO tempest.lib.common.rest_client [req-c253d727-da0d-4ff5-82bc-1249e0b1134d ] Request (VolumesExtendV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-14 02:34:43.681 189 DEBUG tempest.lib.common.rest_client [req-c253d727-da0d-4ff5-82bc-1249e0b1134d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c253d727-da0d-4ff5-82bc-1249e0b1134d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["3x_L5dEyS9G9rPyCKYXvyw"], "expires_at": "2020-12-14T03:34:43.000000Z", "issued_at": "2020-12-14T02:34:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:44.019 189 INFO tempest.lib.common.rest_client [req-6cbb5f55-c311-47ab-a383-7c9cbaa65e7f ] Request (VolumesExtendV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5f713f0b68184349976cb5e1c39d2951&name=default 0.330s 2020-12-14 02:34:44.022 189 DEBUG tempest.lib.common.rest_client [req-6cbb5f55-c311-47ab-a383-7c9cbaa65e7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-6cbb5f55-c311-47ab-a383-7c9cbaa65e7f', 'date': 'Mon, 14 Dec 2020 02:34:44 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5f713f0b68184349976cb5e1c39d2951&name=default'} Body: b'{"security_groups": [{"id": "2d4d0258-6cfa-4823-894b-c7f251474343", "name": "default", "stateful": true, "tenant_id": "5f713f0b68184349976cb5e1c39d2951", "description": "Default security group", "security_group_rules": [{"id": "357d7c63-a8e3-4243-871e-13a6498887b4", "tenant_id": "5f713f0b68184349976cb5e1c39d2951", "security_group_id": "2d4d0258-6cfa-4823-894b-c7f251474343", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:34:43Z", "updated_at": "2020-12-14T02:34:43Z", "revision_number": 0, "project_id": "5f713f0b68184349976cb5e1c39d2951"}, {"id": "40d8ac9e-e32e-4423-9c11-b8550ce62c60", "tenant_id": "5f713f0b68184349976cb5e1c39d2951", "security_group_id": "2d4d0258-6cfa-4823-894b-c7f251474343", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2d4d0258-6cfa-4823-894b-c7f251474343", "description": null, "tags": [], "created_at": "2020-12-14T02:34:43Z", "updated_at": "2020-12-14T02:34:43Z", "revision_number": 0, "project_id": "5f713f0b68184349976cb5e1c39d2951"}, {"id": "70bd816b-035d-49f1-a910-e593a816ab7f", "tenant_id": "5f713f0b68184349976cb5e1c39d2951", "security_group_id": "2d4d0258-6cfa-4823-894b-c7f251474343", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:34:43Z", "updated_at": "2020-12-14T02:34:43Z", "revision_number": 0, "project_id": "5f713f0b68184349976cb5e1c39d2951"}, {"id": "d9a6a2a0-c79f-4eee-942a-0f8197b86953", "tenant_id": "5f713f0b68184349976cb5e1c39d2951", "security_group_id": "2d4d0258-6cfa-4823-894b-c7f251474343", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "2d4d0258-6cfa-4823-894b-c7f251474343", "description": null, "tags": [], "created_at": "2020-12-14T02:34:43Z", "updated_at": "2020-12-14T02:34:43Z", "revision_number": 0, "project_id": "5f713f0b68184349976cb5e1c39d2951"}], "tags": [], "created_at": "2020-12-14T02:34:43Z", "updated_at": "2020-12-14T02:34:43Z", "revision_number": 1, "project_id": "5f713f0b68184349976cb5e1c39d2951"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:44.173 189 INFO tempest.lib.common.rest_client [req-5db97722-36a4-431e-b4e4-466a33c0ddc9 ] Request (VolumesExtendV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/2d4d0258-6cfa-4823-894b-c7f251474343 0.144s 2020-12-14 02:34:44.175 189 DEBUG tempest.lib.common.rest_client [req-5db97722-36a4-431e-b4e4-466a33c0ddc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-5db97722-36a4-431e-b4e4-466a33c0ddc9', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:34:44 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/2d4d0258-6cfa-4823-894b-c7f251474343'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:44.322 189 INFO tempest.lib.common.rest_client [req-2289b9cc-d6fc-440f-86ab-c8d4f4d38d0d ] Request (VolumesExtendV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951 0.139s 2020-12-14 02:34:44.325 189 DEBUG tempest.lib.common.rest_client [req-2289b9cc-d6fc-440f-86ab-c8d4f4d38d0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2289b9cc-d6fc-440f-86ab-c8d4f4d38d0d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5f713f0b68184349976cb5e1c39d2951'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:44.443 189 INFO tempest.lib.common.rest_client [req-49ed4645-776e-4ecd-8002-7d8c26410ee5 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:34:44.446 189 DEBUG tempest.lib.common.rest_client [req-49ed4645-776e-4ecd-8002-7d8c26410ee5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-49ed4645-776e-4ecd-8002-7d8c26410ee5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["fMk_tblXRRuFIMOxRIZ9Xg"], "expires_at": "2020-12-14T03:34:44.000000Z", "issued_at": "2020-12-14T02:34:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:44.556 189 INFO tempest.lib.common.rest_client [req-dd0ced4d-60ba-4439-9a82-fafd0b45db63 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:34:44.560 189 DEBUG tempest.lib.common.rest_client [req-dd0ced4d-60ba-4439-9a82-fafd0b45db63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dd0ced4d-60ba-4439-9a82-fafd0b45db63', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["pneLwnYlRQuT6Ye0pHa8GQ"], "expires_at": "2020-12-14T03:34:44.000000Z", "issued_at": "2020-12-14T02:34:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:44.632 189 INFO tempest.lib.common.rest_client [req-634298d9-a908-400c-af30-d34243144860 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.064s 2020-12-14 02:34:44.634 189 DEBUG tempest.lib.common.rest_client [req-634298d9-a908-400c-af30-d34243144860 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-634298d9-a908-400c-af30-d34243144860', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:44.707 189 INFO tempest.lib.common.rest_client [req-c4590e8b-3702-47fc-9507-3f79fb74114b ] Request (VolumesSnapshotV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.067s 2020-12-14 02:34:44.709 189 DEBUG tempest.lib.common.rest_client [req-c4590e8b-3702-47fc-9507-3f79fb74114b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-VolumesSnapshotV3RbacTest-2082377552-desc", "domain_id": "default", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c4590e8b-3702-47fc-9507-3f79fb74114b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "domain_id": "default", "description": "tempest-VolumesSnapshotV3RbacTest-2082377552-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:44.825 189 INFO tempest.lib.common.rest_client [req-75879ed3-06fe-4272-856b-98d8fb711a13 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.109s 2020-12-14 02:34:44.827 189 DEBUG tempest.lib.common.rest_client [req-75879ed3-06fe-4272-856b-98d8fb711a13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password": "O9!eSOUx!ISCQCF", "project_id": "a55e2cd27846479ebfa15881871a395e", "email": "tempest-VolumesSnapshotV3RbacTest-1844530897@example.com"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '406', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-75879ed3-06fe-4272-856b-98d8fb711a13', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "a55e2cd27846479ebfa15881871a395e", "email": "tempest-VolumesSnapshotV3RbacTest-1844530897@example.com", "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/4ef5b6bf76ae472c8af656600d4f3acb"}}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:44.894 189 INFO tempest.lib.common.rest_client [req-512d8eeb-35c9-4eeb-804b-f2d1a47a7dc9 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.059s 2020-12-14 02:34:44.897 189 DEBUG tempest.lib.common.rest_client [req-512d8eeb-35c9-4eeb-804b-f2d1a47a7dc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-512d8eeb-35c9-4eeb-804b-f2d1a47a7dc9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:44.960 189 INFO tempest.lib.common.rest_client [req-eb46b28d-127e-4b91-a460-939daaa6ffd2 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.057s 2020-12-14 02:34:44.962 189 DEBUG tempest.lib.common.rest_client [req-eb46b28d-127e-4b91-a460-939daaa6ffd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb46b28d-127e-4b91-a460-939daaa6ffd2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:45.041 189 INFO tempest.lib.common.rest_client [req-3e87ee66-9aef-48db-9974-c570eff42394 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles/72a4576c553448cd941b052c1ca0cf2d 0.071s 2020-12-14 02:34:45.043 189 DEBUG tempest.lib.common.rest_client [req-3e87ee66-9aef-48db-9974-c570eff42394 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3e87ee66-9aef-48db-9974-c570eff42394', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:45.046 189 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesSnapshotV3RbacTest-2082377552', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a55e2cd27846479ebfa15881871a395e', 'project_name': 'tempest-VolumesSnapshotV3RbacTest-2082377552', 'tenant_id': 'a55e2cd27846479ebfa15881871a395e', 'tenant_name': 'tempest-VolumesSnapshotV3RbacTest-2082377552', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '4ef5b6bf76ae472c8af656600d4f3acb'}, Network: None, Subnet: None, Router: None 2020-12-14 02:34:45.048 189 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-VolumesSnapshotV3RbacTest-2082377552', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a55e2cd27846479ebfa15881871a395e', 'project_name': 'tempest-VolumesSnapshotV3RbacTest-2082377552', 'tenant_id': 'a55e2cd27846479ebfa15881871a395e', 'tenant_name': 'tempest-VolumesSnapshotV3RbacTest-2082377552', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '4ef5b6bf76ae472c8af656600d4f3acb'}, Network: None, Subnet: None, Router: None 2020-12-14 02:34:45.220 189 INFO tempest.lib.common.rest_client [req-09fcf32e-6bee-4154-983e-32b6102b2287 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.111s 2020-12-14 02:34:45.222 189 DEBUG tempest.lib.common.rest_client [req-09fcf32e-6bee-4154-983e-32b6102b2287 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-09fcf32e-6bee-4154-983e-32b6102b2287', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["tord6bhFSQaUskMMgNjjmw"], "expires_at": "2020-12-14T03:34:45.000000Z", "issued_at": "2020-12-14T02:34:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:45.327 189 INFO tempest.lib.common.rest_client [req-2bd9c89c-f496-464f-bb1b-0997dbd829ab ] Request (VolumesSnapshotV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-14 02:34:45.329 189 DEBUG tempest.lib.common.rest_client [req-2bd9c89c-f496-464f-bb1b-0997dbd829ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2bd9c89c-f496-464f-bb1b-0997dbd829ab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["sCP_yQB4TXGuDd3EqroajA"], "expires_at": "2020-12-14T03:34:45.000000Z", "issued_at": "2020-12-14T02:34:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:45.445 189 INFO tempest.lib.common.rest_client [req-19f45b33-f7f2-4d26-b561-d49965d877a0 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.051s 2020-12-14 02:34:45.447 189 DEBUG tempest.lib.common.rest_client [req-19f45b33-f7f2-4d26-b561-d49965d877a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-19f45b33-f7f2-4d26-b561-d49965d877a0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["KiggfBLmTyi7mBw3eOP5QA"], "expires_at": "2020-12-14T03:34:45.000000Z", "issued_at": "2020-12-14T02:34:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:45.505 189 INFO tempest.lib.common.rest_client [req-204064a8-2170-479d-8270-232d36e0caf6 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.050s 2020-12-14 02:34:45.507 189 DEBUG tempest.lib.common.rest_client [req-204064a8-2170-479d-8270-232d36e0caf6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-204064a8-2170-479d-8270-232d36e0caf6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:45.562 189 INFO tempest.lib.common.rest_client [req-bfd48095-4bfe-4785-98ed-9a7717335495 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-12-14 02:34:45.565 189 DEBUG tempest.lib.common.rest_client [req-bfd48095-4bfe-4785-98ed-9a7717335495 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2939', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bfd48095-4bfe-4785-98ed-9a7717335495', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "5f03b9aafad94aceb90c8de344fe708d", "name": "_member_", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/5f03b9aafad94aceb90c8de344fe708d"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:45.568 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', '_member_', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-14 02:34:45.572 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:45.640 189 INFO tempest.lib.common.rest_client [req-31af92c3-4ddb-4571-a2e0-178915b5558c ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.062s 2020-12-14 02:34:45.642 189 DEBUG tempest.lib.common.rest_client [req-31af92c3-4ddb-4571-a2e0-178915b5558c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31af92c3-4ddb-4571-a2e0-178915b5558c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:45.718 189 INFO tempest.lib.common.rest_client [req-206e40fd-a8f7-4992-bb1e-e0b315dfd9a8 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-12-14 02:34:45.721 189 DEBUG tempest.lib.common.rest_client [req-206e40fd-a8f7-4992-bb1e-e0b315dfd9a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-206e40fd-a8f7-4992-bb1e-e0b315dfd9a8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:45.837 189 INFO tempest.lib.common.rest_client [req-0deab5b4-00ee-494e-8db6-05b168b7d352 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles/a629c95d64b3416fb80ae90af4f69c05 0.109s 2020-12-14 02:34:45.840 189 DEBUG tempest.lib.common.rest_client [req-0deab5b4-00ee-494e-8db6-05b168b7d352 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0deab5b4-00ee-494e-8db6-05b168b7d352', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:46.943 189 INFO tempest.lib.common.rest_client [req-8ae8c5f1-e234-4eb3-8a2b-12660bb206d9 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-14 02:34:46.946 189 DEBUG tempest.lib.common.rest_client [req-8ae8c5f1-e234-4eb3-8a2b-12660bb206d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ae8c5f1-e234-4eb3-8a2b-12660bb206d9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["BCKrUO9qSNygC6Ij_ThU2w"], "expires_at": "2020-12-14T03:34:46.000000Z", "issued_at": "2020-12-14T02:34:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:47.409 189 INFO tempest.lib.common.rest_client [req-510942ca-8bc2-4b99-87a9-cc924a2cdeec ] Request (VolumesSnapshotV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/volumes 0.451s 2020-12-14 02:34:47.411 189 DEBUG tempest.lib.common.rest_client [req-510942ca-8bc2-4b99-87a9-cc924a2cdeec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"volume": {"size": 1, "name": "tempest-VolumesSnapshotV3RbacTest-Volume-2087197523"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-510942ca-8bc2-4b99-87a9-cc924a2cdeec', 'content-length': '846', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-510942ca-8bc2-4b99-87a9-cc924a2cdeec', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/volumes'} Body: b'{"volume": {"id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:47.000000", "updated_at": null, "name": "tempest-VolumesSnapshotV3RbacTest-Volume-2087197523", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2"}], "user_id": "4ef5b6bf76ae472c8af656600d4f3acb", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:47.614 189 INFO tempest.lib.common.rest_client [req-2f8a1cbf-cf8b-4b3e-baa9-01b6f36a0d08 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2 0.113s 2020-12-14 02:34:47.616 189 DEBUG tempest.lib.common.rest_client [req-2f8a1cbf-cf8b-4b3e-baa9-01b6f36a0d08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2f8a1cbf-cf8b-4b3e-baa9-01b6f36a0d08', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2f8a1cbf-cf8b-4b3e-baa9-01b6f36a0d08', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2'} Body: b'{"volume": {"id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "creating", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:47.000000", "updated_at": "2020-12-14T02:34:47.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Volume-2087197523", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2"}], "user_id": "4ef5b6bf76ae472c8af656600d4f3acb", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "a55e2cd27846479ebfa15881871a395e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:48.796 189 INFO tempest.lib.common.rest_client [req-4c4ea31c-c48f-4d3d-b8e4-6421f82b0c50 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2 0.082s 2020-12-14 02:34:48.799 189 DEBUG tempest.lib.common.rest_client [req-4c4ea31c-c48f-4d3d-b8e4-6421f82b0c50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4c4ea31c-c48f-4d3d-b8e4-6421f82b0c50', 'content-length': '1069', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4c4ea31c-c48f-4d3d-b8e4-6421f82b0c50', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2'} Body: b'{"volume": {"id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "available", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:47.000000", "updated_at": "2020-12-14T02:34:48.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Volume-2087197523", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2"}], "user_id": "4ef5b6bf76ae472c8af656600d4f3acb", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "a55e2cd27846479ebfa15881871a395e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:48.892 189 INFO tempest.common.waiters [-] volume 4167088a-1150-4430-93f5-89b15a5304c2 reached available after waiting for 1.891732 seconds 2020-12-14 02:34:49.123 189 INFO tempest.lib.common.rest_client [req-a373c844-72c4-4bee-8a5e-4c7a5b435198 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 202 POST http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots 0.225s 2020-12-14 02:34:49.126 189 DEBUG tempest.lib.common.rest_client [req-a373c844-72c4-4bee-8a5e-4c7a5b435198 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a373c844-72c4-4bee-8a5e-4c7a5b435198', 'content-length': '310', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a373c844-72c4-4bee-8a5e-4c7a5b435198', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots'} Body: b'{"snapshot": {"id": "43f0b5e6-67e7-4f2e-b7e2-dcdbad146260", "created_at": "2020-12-14T02:34:49.048351", "updated_at": null, "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "creating", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:49.208 189 INFO tempest.lib.common.rest_client [req-0a6890b8-3246-4025-aa42-cdaa3ccee5d1 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260 0.046s 2020-12-14 02:34:49.211 189 DEBUG tempest.lib.common.rest_client [req-0a6890b8-3246-4025-aa42-cdaa3ccee5d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0a6890b8-3246-4025-aa42-cdaa3ccee5d1', 'content-length': '442', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0a6890b8-3246-4025-aa42-cdaa3ccee5d1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260'} Body: b'{"snapshot": {"id": "43f0b5e6-67e7-4f2e-b7e2-dcdbad146260", "created_at": "2020-12-14T02:34:49.000000", "updated_at": null, "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a55e2cd27846479ebfa15881871a395e", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:50.298 189 INFO tempest.lib.common.rest_client [req-dca29402-9b7e-451b-8f33-17fa72262a80 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260 0.049s 2020-12-14 02:34:50.301 189 DEBUG tempest.lib.common.rest_client [req-dca29402-9b7e-451b-8f33-17fa72262a80 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-dca29402-9b7e-451b-8f33-17fa72262a80', 'content-length': '442', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-dca29402-9b7e-451b-8f33-17fa72262a80', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260'} Body: b'{"snapshot": {"id": "43f0b5e6-67e7-4f2e-b7e2-dcdbad146260", "created_at": "2020-12-14T02:34:49.000000", "updated_at": null, "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a55e2cd27846479ebfa15881871a395e", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:51.398 189 INFO tempest.lib.common.rest_client [req-ac040ea7-f8b0-4cf2-9240-ff0a56946785 ] Request (VolumesSnapshotV3RbacTest:setUpClass): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260 0.059s 2020-12-14 02:34:51.401 189 DEBUG tempest.lib.common.rest_client [req-ac040ea7-f8b0-4cf2-9240-ff0a56946785 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-ac040ea7-f8b0-4cf2-9240-ff0a56946785', 'content-length': '469', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-ac040ea7-f8b0-4cf2-9240-ff0a56946785', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260'} Body: b'{"snapshot": {"id": "43f0b5e6-67e7-4f2e-b7e2-dcdbad146260", "created_at": "2020-12-14T02:34:49.000000", "updated_at": "2020-12-14T02:34:50.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a55e2cd27846479ebfa15881871a395e", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:51.433 189 INFO tempest.common.waiters [-] snapshot 43f0b5e6-67e7-4f2e-b7e2-dcdbad146260 reached available after waiting for 2.433640 seconds 2020-12-14 02:34:51.440 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:51.459 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:create_snapshot, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:51.461 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:51.578 189 INFO tempest.lib.common.rest_client [req-44994412-0759-4fed-8e73-c592ac02aab6 ] Request (VolumesSnapshotV3RbacTest:test_create_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.110s 2020-12-14 02:34:51.581 189 DEBUG tempest.lib.common.rest_client [req-44994412-0759-4fed-8e73-c592ac02aab6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-44994412-0759-4fed-8e73-c592ac02aab6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:51.627 189 INFO tempest.lib.common.rest_client [req-4769da5d-54c3-4869-b353-a772c2b712e0 ] Request (VolumesSnapshotV3RbacTest:test_create_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-14 02:34:51.631 189 DEBUG tempest.lib.common.rest_client [req-4769da5d-54c3-4869-b353-a772c2b712e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4769da5d-54c3-4869-b353-a772c2b712e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["9ivPIOdtSxCDNSCWqEaw9w"], "expires_at": "2020-12-14T03:34:51.000000Z", "issued_at": "2020-12-14T02:34:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:51.913 189 INFO tempest.lib.common.rest_client [req-0ebcea4d-ac5d-41d5-8e4e-5dbd866aa08a ] Request (VolumesSnapshotV3RbacTest:test_create_snapshot): 202 POST http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots 0.273s 2020-12-14 02:34:51.916 189 DEBUG tempest.lib.common.rest_client [req-0ebcea4d-ac5d-41d5-8e4e-5dbd866aa08a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1167912604"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-0ebcea4d-ac5d-41d5-8e4e-5dbd866aa08a', 'content-length': '312', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-0ebcea4d-ac5d-41d5-8e4e-5dbd866aa08a', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots'} Body: b'{"snapshot": {"id": "f6f855ea-3c04-4c08-a69a-327e7da84b7a", "created_at": "2020-12-14T02:34:51.834437", "updated_at": null, "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1167912604", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "creating", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:51.995 189 INFO tempest.lib.common.rest_client [req-23f3867d-06df-442d-882d-84a5ebbcce74 ] Request (VolumesSnapshotV3RbacTest:test_create_snapshot): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/f6f855ea-3c04-4c08-a69a-327e7da84b7a 0.044s 2020-12-14 02:34:51.998 189 DEBUG tempest.lib.common.rest_client [req-23f3867d-06df-442d-882d-84a5ebbcce74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-23f3867d-06df-442d-882d-84a5ebbcce74', 'content-length': '444', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-23f3867d-06df-442d-882d-84a5ebbcce74', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/f6f855ea-3c04-4c08-a69a-327e7da84b7a'} Body: b'{"snapshot": {"id": "f6f855ea-3c04-4c08-a69a-327e7da84b7a", "created_at": "2020-12-14T02:34:52.000000", "updated_at": null, "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1167912604", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a55e2cd27846479ebfa15881871a395e", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:53.082 189 INFO tempest.lib.common.rest_client [req-4354b123-edec-43b1-b4d4-3283b86ad2a5 ] Request (VolumesSnapshotV3RbacTest:test_create_snapshot): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/f6f855ea-3c04-4c08-a69a-327e7da84b7a 0.048s 2020-12-14 02:34:53.086 189 DEBUG tempest.lib.common.rest_client [req-4354b123-edec-43b1-b4d4-3283b86ad2a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4354b123-edec-43b1-b4d4-3283b86ad2a5', 'content-length': '471', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4354b123-edec-43b1-b4d4-3283b86ad2a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/f6f855ea-3c04-4c08-a69a-327e7da84b7a'} Body: b'{"snapshot": {"id": "f6f855ea-3c04-4c08-a69a-327e7da84b7a", "created_at": "2020-12-14T02:34:52.000000", "updated_at": "2020-12-14T02:34:52.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1167912604", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a55e2cd27846479ebfa15881871a395e", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:53.118 189 INFO tempest.common.waiters [-] snapshot f6f855ea-3c04-4c08-a69a-327e7da84b7a reached available after waiting for 1.117777 seconds 2020-12-14 02:34:53.120 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:53.234 189 INFO tempest.lib.common.rest_client [req-9455dce0-8202-405f-80fe-c22d1e170ad0 ] Request (VolumesSnapshotV3RbacTest:test_create_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.107s 2020-12-14 02:34:53.237 189 DEBUG tempest.lib.common.rest_client [req-9455dce0-8202-405f-80fe-c22d1e170ad0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9455dce0-8202-405f-80fe-c22d1e170ad0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:53.333 189 INFO tempest.lib.common.rest_client [req-4e554b4d-ad50-479b-b3ac-c10658c849b2 ] Request (VolumesSnapshotV3RbacTest:test_create_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-14 02:34:53.337 189 DEBUG tempest.lib.common.rest_client [req-4e554b4d-ad50-479b-b3ac-c10658c849b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e554b4d-ad50-479b-b3ac-c10658c849b2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["WQb__6q6R9ebVAAqEI3KMQ"], "expires_at": "2020-12-14T03:34:53.000000Z", "issued_at": "2020-12-14T02:34:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:53.351 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:53.369 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:delete_snapshot, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:53.720 189 INFO tempest.lib.common.rest_client [req-1a619b95-d30b-44ec-b024-c2e394e3e7b5 ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 202 POST http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots 0.345s 2020-12-14 02:34:53.723 189 DEBUG tempest.lib.common.rest_client [req-1a619b95-d30b-44ec-b024-c2e394e3e7b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-319686315"}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1a619b95-d30b-44ec-b024-c2e394e3e7b5', 'content-length': '311', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1a619b95-d30b-44ec-b024-c2e394e3e7b5', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots'} Body: b'{"snapshot": {"id": "593c2879-44d1-4954-91e5-3d6b19b5fe25", "created_at": "2020-12-14T02:34:53.652625", "updated_at": null, "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-319686315", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "creating", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:53.800 189 INFO tempest.lib.common.rest_client [req-2ab72d30-5d98-4aea-bac6-aa3c0483723b ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/593c2879-44d1-4954-91e5-3d6b19b5fe25 0.043s 2020-12-14 02:34:53.803 189 DEBUG tempest.lib.common.rest_client [req-2ab72d30-5d98-4aea-bac6-aa3c0483723b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-2ab72d30-5d98-4aea-bac6-aa3c0483723b', 'content-length': '443', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-2ab72d30-5d98-4aea-bac6-aa3c0483723b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/593c2879-44d1-4954-91e5-3d6b19b5fe25'} Body: b'{"snapshot": {"id": "593c2879-44d1-4954-91e5-3d6b19b5fe25", "created_at": "2020-12-14T02:34:54.000000", "updated_at": null, "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-319686315", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "creating", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a55e2cd27846479ebfa15881871a395e", "os-extended-snapshot-attributes:progress": "0%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:54.900 189 INFO tempest.lib.common.rest_client [req-1e3b7d1a-e3d8-43c8-9452-8ea9dbc313c4 ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/593c2879-44d1-4954-91e5-3d6b19b5fe25 0.049s 2020-12-14 02:34:54.903 189 DEBUG tempest.lib.common.rest_client [req-1e3b7d1a-e3d8-43c8-9452-8ea9dbc313c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1e3b7d1a-e3d8-43c8-9452-8ea9dbc313c4', 'content-length': '470', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1e3b7d1a-e3d8-43c8-9452-8ea9dbc313c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/593c2879-44d1-4954-91e5-3d6b19b5fe25'} Body: b'{"snapshot": {"id": "593c2879-44d1-4954-91e5-3d6b19b5fe25", "created_at": "2020-12-14T02:34:54.000000", "updated_at": "2020-12-14T02:34:54.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-319686315", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a55e2cd27846479ebfa15881871a395e", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:54.935 189 INFO tempest.common.waiters [-] snapshot 593c2879-44d1-4954-91e5-3d6b19b5fe25 reached available after waiting for 1.935140 seconds 2020-12-14 02:34:54.937 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:55.065 189 INFO tempest.lib.common.rest_client [req-0e1bfab5-214c-4488-8a04-641102b4183f ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.122s 2020-12-14 02:34:55.067 189 DEBUG tempest.lib.common.rest_client [req-0e1bfab5-214c-4488-8a04-641102b4183f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e1bfab5-214c-4488-8a04-641102b4183f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:55.170 189 INFO tempest.lib.common.rest_client [req-d5558781-9920-42ea-b52c-0b521dc4cea5 ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-14 02:34:55.174 189 DEBUG tempest.lib.common.rest_client [req-d5558781-9920-42ea-b52c-0b521dc4cea5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5558781-9920-42ea-b52c-0b521dc4cea5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["fmZZCLS5TJiHHE5_6UUMIA"], "expires_at": "2020-12-14T03:34:55.000000Z", "issued_at": "2020-12-14T02:34:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:55.360 189 INFO tempest.lib.common.rest_client [req-fbcbd849-de1e-4511-99b8-485de607b878 ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 202 DELETE http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/593c2879-44d1-4954-91e5-3d6b19b5fe25 0.179s 2020-12-14 02:34:55.362 189 DEBUG tempest.lib.common.rest_client [req-fbcbd849-de1e-4511-99b8-485de607b878 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-fbcbd849-de1e-4511-99b8-485de607b878', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/593c2879-44d1-4954-91e5-3d6b19b5fe25'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:55.365 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:55.441 189 INFO tempest.lib.common.rest_client [req-b415898b-d1d9-46e2-a060-e151b064e0ac ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.070s 2020-12-14 02:34:55.445 189 DEBUG tempest.lib.common.rest_client [req-b415898b-d1d9-46e2-a060-e151b064e0ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b415898b-d1d9-46e2-a060-e151b064e0ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:55.496 189 INFO tempest.lib.common.rest_client [req-871bcd8e-faf7-4e0b-a3fb-26d6d23df09b ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:34:55.499 189 DEBUG tempest.lib.common.rest_client [req-871bcd8e-faf7-4e0b-a3fb-26d6d23df09b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-871bcd8e-faf7-4e0b-a3fb-26d6d23df09b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["lleW7jykTsyJY2weoe72-w"], "expires_at": "2020-12-14T03:34:55.000000Z", "issued_at": "2020-12-14T02:34:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:55.614 189 INFO tempest.lib.common.rest_client [req-a8aebb4c-c6b3-4f0f-bb9e-4a222058dd8e ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/593c2879-44d1-4954-91e5-3d6b19b5fe25 0.106s 2020-12-14 02:34:55.617 189 DEBUG tempest.lib.common.rest_client [req-a8aebb4c-c6b3-4f0f-bb9e-4a222058dd8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a8aebb4c-c6b3-4f0f-bb9e-4a222058dd8e', 'content-length': '469', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a8aebb4c-c6b3-4f0f-bb9e-4a222058dd8e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/593c2879-44d1-4954-91e5-3d6b19b5fe25'} Body: b'{"snapshot": {"id": "593c2879-44d1-4954-91e5-3d6b19b5fe25", "created_at": "2020-12-14T02:34:54.000000", "updated_at": "2020-12-14T02:34:55.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-319686315", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a55e2cd27846479ebfa15881871a395e", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:56.701 189 INFO tempest.lib.common.rest_client [req-cda5b3b2-677c-4b04-a469-3de478d4bb9a ] Request (VolumesSnapshotV3RbacTest:test_delete_snapshot): 404 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/593c2879-44d1-4954-91e5-3d6b19b5fe25 0.043s 2020-12-14 02:34:56.704 189 DEBUG tempest.lib.common.rest_client [req-cda5b3b2-677c-4b04-a469-3de478d4bb9a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-cda5b3b2-677c-4b04-a469-3de478d4bb9a', 'x-openstack-request-id': 'req-cda5b3b2-677c-4b04-a469-3de478d4bb9a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/593c2879-44d1-4954-91e5-3d6b19b5fe25'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 593c2879-44d1-4954-91e5-3d6b19b5fe25 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:56.719 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:56.738 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_all_snapshots, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:56.741 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:56.898 189 INFO tempest.lib.common.rest_client [req-de3c37e6-c2e7-40b9-9dca-3694758587f5 ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.151s 2020-12-14 02:34:56.900 189 DEBUG tempest.lib.common.rest_client [req-de3c37e6-c2e7-40b9-9dca-3694758587f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de3c37e6-c2e7-40b9-9dca-3694758587f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:56.993 189 INFO tempest.lib.common.rest_client [req-1e827de2-abc4-457e-bd23-e120e6b08dd4 ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-14 02:34:56.997 189 DEBUG tempest.lib.common.rest_client [req-1e827de2-abc4-457e-bd23-e120e6b08dd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e827de2-abc4-457e-bd23-e120e6b08dd4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["f0EBol4uSOWhO3Rk7QqvMQ"], "expires_at": "2020-12-14T03:34:56.000000Z", "issued_at": "2020-12-14T02:34:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:57.143 189 INFO tempest.lib.common.rest_client [req-960a19e1-e9bb-4f7e-9570-68f6a812b0c2 ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots?name=tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060 0.139s 2020-12-14 02:34:57.145 189 DEBUG tempest.lib.common.rest_client [req-960a19e1-e9bb-4f7e-9570-68f6a812b0c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-960a19e1-e9bb-4f7e-9570-68f6a812b0c2', 'content-length': '338', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-960a19e1-e9bb-4f7e-9570-68f6a812b0c2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots?name=tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060'} Body: b'{"snapshots": [{"id": "43f0b5e6-67e7-4f2e-b7e2-dcdbad146260", "created_at": "2020-12-14T02:34:49.000000", "updated_at": "2020-12-14T02:34:50.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "available", "size": 1, "metadata": {}}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:57.181 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:57.248 189 INFO tempest.lib.common.rest_client [req-f43c3667-f3b6-4e1a-9910-1ca543d0978d ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.060s 2020-12-14 02:34:57.252 189 DEBUG tempest.lib.common.rest_client [req-f43c3667-f3b6-4e1a-9910-1ca543d0978d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f43c3667-f3b6-4e1a-9910-1ca543d0978d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:57.309 189 INFO tempest.lib.common.rest_client [req-c78c6ba6-6cb8-4520-a57a-e4f906aec0df ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.050s 2020-12-14 02:34:57.313 189 DEBUG tempest.lib.common.rest_client [req-c78c6ba6-6cb8-4520-a57a-e4f906aec0df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c78c6ba6-6cb8-4520-a57a-e4f906aec0df', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["kZU4NhrRSIKDzphR8mUMjQ"], "expires_at": "2020-12-14T03:34:57.000000Z", "issued_at": "2020-12-14T02:34:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:57.327 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:57.344 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_all_snapshots, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:57.348 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:57.416 189 INFO tempest.lib.common.rest_client [req-0195f9ca-8cf0-432b-bfe9-48ba2803cfac ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.062s 2020-12-14 02:34:57.419 189 DEBUG tempest.lib.common.rest_client [req-0195f9ca-8cf0-432b-bfe9-48ba2803cfac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0195f9ca-8cf0-432b-bfe9-48ba2803cfac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:57.471 189 INFO tempest.lib.common.rest_client [req-74d2003c-9ed0-4a32-a7ad-d28fc53e8abc ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:34:57.474 189 DEBUG tempest.lib.common.rest_client [req-74d2003c-9ed0-4a32-a7ad-d28fc53e8abc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74d2003c-9ed0-4a32-a7ad-d28fc53e8abc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["MXsinyJVSYWWOSrM-46_zw"], "expires_at": "2020-12-14T03:34:57.000000Z", "issued_at": "2020-12-14T02:34:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:57.585 189 INFO tempest.lib.common.rest_client [req-1a9de2e0-0943-4aa9-9e61-0eec930e6e0e ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/detail?name=tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060 0.103s 2020-12-14 02:34:57.589 189 DEBUG tempest.lib.common.rest_client [req-1a9de2e0-0943-4aa9-9e61-0eec930e6e0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-1a9de2e0-0943-4aa9-9e61-0eec930e6e0e', 'content-length': '472', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-1a9de2e0-0943-4aa9-9e61-0eec930e6e0e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/detail?name=tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060'} Body: b'{"snapshots": [{"id": "43f0b5e6-67e7-4f2e-b7e2-dcdbad146260", "created_at": "2020-12-14T02:34:49.000000", "updated_at": "2020-12-14T02:34:50.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a55e2cd27846479ebfa15881871a395e", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:57.628 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:57.692 189 INFO tempest.lib.common.rest_client [req-873d63f9-5127-49f1-b374-9a5b19788d3a ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.058s 2020-12-14 02:34:57.695 189 DEBUG tempest.lib.common.rest_client [req-873d63f9-5127-49f1-b374-9a5b19788d3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-873d63f9-5127-49f1-b374-9a5b19788d3a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:57.756 189 INFO tempest.lib.common.rest_client [req-867dc3c2-2283-4b8d-9afd-e3031a305077 ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.054s 2020-12-14 02:34:57.760 189 DEBUG tempest.lib.common.rest_client [req-867dc3c2-2283-4b8d-9afd-e3031a305077 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-867dc3c2-2283-4b8d-9afd-e3031a305077', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["0b_jq5JBSV2-mNPviSKk1A"], "expires_at": "2020-12-14T03:34:57.000000Z", "issued_at": "2020-12-14T02:34:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:57.775 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:57.793 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:extended_snapshot_attributes, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:57.795 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:57.878 189 INFO tempest.lib.common.rest_client [req-3467ea76-3ef7-43f4-a9a8-431558072746 ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details_with_extended_attributes): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.076s 2020-12-14 02:34:57.881 189 DEBUG tempest.lib.common.rest_client [req-3467ea76-3ef7-43f4-a9a8-431558072746 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3467ea76-3ef7-43f4-a9a8-431558072746', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:57.932 189 INFO tempest.lib.common.rest_client [req-e7ddbdc9-f72b-43a5-96e0-903a325629ca ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details_with_extended_attributes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-14 02:34:57.936 189 DEBUG tempest.lib.common.rest_client [req-e7ddbdc9-f72b-43a5-96e0-903a325629ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7ddbdc9-f72b-43a5-96e0-903a325629ca', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["I4vqSopVSmC9Q_Zi4U_sTA"], "expires_at": "2020-12-14T03:34:57.000000Z", "issued_at": "2020-12-14T02:34:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:58.167 189 INFO tempest.lib.common.rest_client [req-4150c5a9-7df2-4f82-9932-96eb6c2c9d3f ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details_with_extended_attributes): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/detail?name=tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060 0.224s 2020-12-14 02:34:58.170 189 DEBUG tempest.lib.common.rest_client [req-4150c5a9-7df2-4f82-9932-96eb6c2c9d3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4150c5a9-7df2-4f82-9932-96eb6c2c9d3f', 'content-length': '472', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4150c5a9-7df2-4f82-9932-96eb6c2c9d3f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/detail?name=tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060'} Body: b'{"snapshots": [{"id": "43f0b5e6-67e7-4f2e-b7e2-dcdbad146260", "created_at": "2020-12-14T02:34:49.000000", "updated_at": "2020-12-14T02:34:50.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a55e2cd27846479ebfa15881871a395e", "os-extended-snapshot-attributes:progress": "100%"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:58.207 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:58.329 189 INFO tempest.lib.common.rest_client [req-db1579f3-9e3e-4aef-8816-ad651dd2253a ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details_with_extended_attributes): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.116s 2020-12-14 02:34:58.333 189 DEBUG tempest.lib.common.rest_client [req-db1579f3-9e3e-4aef-8816-ad651dd2253a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-db1579f3-9e3e-4aef-8816-ad651dd2253a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:58.385 189 INFO tempest.lib.common.rest_client [req-4de235a0-e85b-47b0-83e3-affbfa271858 ] Request (VolumesSnapshotV3RbacTest:test_list_snapshots_details_with_extended_attributes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.047s 2020-12-14 02:34:58.388 189 DEBUG tempest.lib.common.rest_client [req-4de235a0-e85b-47b0-83e3-affbfa271858 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4de235a0-e85b-47b0-83e3-affbfa271858', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["l3_AckXjQ7iYWzk8G8FG0w"], "expires_at": "2020-12-14T03:34:58.000000Z", "issued_at": "2020-12-14T02:34:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:58.401 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:58.418 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:get_snapshot, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:58.420 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:58.532 189 INFO tempest.lib.common.rest_client [req-dafabb98-44c9-4551-8e11-1b60b535033c ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.105s 2020-12-14 02:34:58.536 189 DEBUG tempest.lib.common.rest_client [req-dafabb98-44c9-4551-8e11-1b60b535033c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dafabb98-44c9-4551-8e11-1b60b535033c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:58.663 189 INFO tempest.lib.common.rest_client [req-c5aba358-d405-4d5e-9df1-6a3ee1e17082 ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.120s 2020-12-14 02:34:58.666 189 DEBUG tempest.lib.common.rest_client [req-c5aba358-d405-4d5e-9df1-6a3ee1e17082 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c5aba358-d405-4d5e-9df1-6a3ee1e17082', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["dYiOCpchSgOWDa1hfuh1Nw"], "expires_at": "2020-12-14T03:34:58.000000Z", "issued_at": "2020-12-14T02:34:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:58.817 189 INFO tempest.lib.common.rest_client [req-48308ec4-6f6d-4f47-9b10-4ff3d8b0044f ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260 0.143s 2020-12-14 02:34:58.821 189 DEBUG tempest.lib.common.rest_client [req-48308ec4-6f6d-4f47-9b10-4ff3d8b0044f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-48308ec4-6f6d-4f47-9b10-4ff3d8b0044f', 'content-length': '469', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-48308ec4-6f6d-4f47-9b10-4ff3d8b0044f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260'} Body: b'{"snapshot": {"id": "43f0b5e6-67e7-4f2e-b7e2-dcdbad146260", "created_at": "2020-12-14T02:34:49.000000", "updated_at": "2020-12-14T02:34:50.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a55e2cd27846479ebfa15881871a395e", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:58.853 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:58.920 189 INFO tempest.lib.common.rest_client [req-8014c653-7e50-4575-8a67-4ffb5ddb6c12 ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.061s 2020-12-14 02:34:58.923 189 DEBUG tempest.lib.common.rest_client [req-8014c653-7e50-4575-8a67-4ffb5ddb6c12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8014c653-7e50-4575-8a67-4ffb5ddb6c12', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:58.971 189 INFO tempest.lib.common.rest_client [req-f81d534e-66c0-4a01-90f8-26810aad8a76 ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-14 02:34:58.974 189 DEBUG tempest.lib.common.rest_client [req-f81d534e-66c0-4a01-90f8-26810aad8a76 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f81d534e-66c0-4a01-90f8-26810aad8a76', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["pjxManbFRbedz97DcCf0mg"], "expires_at": "2020-12-14T03:34:58.000000Z", "issued_at": "2020-12-14T02:34:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:58.988 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:59.005 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume_extension:extended_snapshot_attributes, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:59.007 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:59.066 189 INFO tempest.lib.common.rest_client [req-a23ce58e-e6f1-4d04-9d0b-32961db389f8 ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot_with_extended_attributes): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.052s 2020-12-14 02:34:59.069 189 DEBUG tempest.lib.common.rest_client [req-a23ce58e-e6f1-4d04-9d0b-32961db389f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a23ce58e-e6f1-4d04-9d0b-32961db389f8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:59.116 189 INFO tempest.lib.common.rest_client [req-449334b3-8a60-4a59-83e2-f2fcac8955df ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot_with_extended_attributes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:34:59.120 189 DEBUG tempest.lib.common.rest_client [req-449334b3-8a60-4a59-83e2-f2fcac8955df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-449334b3-8a60-4a59-83e2-f2fcac8955df', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["yZxNo3sxQC26sobNJ4UfUw"], "expires_at": "2020-12-14T03:34:59.000000Z", "issued_at": "2020-12-14T02:34:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:59.228 189 INFO tempest.lib.common.rest_client [req-696cdf55-1b50-4ef8-93c3-e40d9bd2f660 ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot_with_extended_attributes): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260 0.100s 2020-12-14 02:34:59.231 189 DEBUG tempest.lib.common.rest_client [req-696cdf55-1b50-4ef8-93c3-e40d9bd2f660 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-696cdf55-1b50-4ef8-93c3-e40d9bd2f660', 'content-length': '469', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-696cdf55-1b50-4ef8-93c3-e40d9bd2f660', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260'} Body: b'{"snapshot": {"id": "43f0b5e6-67e7-4f2e-b7e2-dcdbad146260", "created_at": "2020-12-14T02:34:49.000000", "updated_at": "2020-12-14T02:34:50.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a55e2cd27846479ebfa15881871a395e", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:59.262 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:59.326 189 INFO tempest.lib.common.rest_client [req-b3a81e26-ef70-48d6-a7ff-62caf0f3ceb2 ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot_with_extended_attributes): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.058s 2020-12-14 02:34:59.329 189 DEBUG tempest.lib.common.rest_client [req-b3a81e26-ef70-48d6-a7ff-62caf0f3ceb2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3a81e26-ef70-48d6-a7ff-62caf0f3ceb2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:59.368 189 INFO tempest.lib.common.rest_client [req-6abc78dc-405f-4909-9537-4e68cd363182 ] Request (VolumesSnapshotV3RbacTest:test_show_snapshot_with_extended_attributes): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-14 02:34:59.371 189 DEBUG tempest.lib.common.rest_client [req-6abc78dc-405f-4909-9537-4e68cd363182 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6abc78dc-405f-4909-9537-4e68cd363182', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["UCHkeEcYT2Ku2Z1W66lI9g"], "expires_at": "2020-12-14T03:34:59.000000Z", "issued_at": "2020-12-14T02:34:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:59.385 189 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'reader', 'admin'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-14 02:34:59.402 189 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: volume:update_snapshot, [Role]: ['member', 'reader', 'admin'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-14 02:34:59.404 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:59.467 189 INFO tempest.lib.common.rest_client [req-4eb9bfcc-8d35-402a-adc7-b746d3a36e10 ] Request (VolumesSnapshotV3RbacTest:test_update_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.057s 2020-12-14 02:34:59.469 189 DEBUG tempest.lib.common.rest_client [req-4eb9bfcc-8d35-402a-adc7-b746d3a36e10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4eb9bfcc-8d35-402a-adc7-b746d3a36e10', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:59.517 189 INFO tempest.lib.common.rest_client [req-7850b43b-4754-4760-80cb-085c1a0b8cac ] Request (VolumesSnapshotV3RbacTest:test_update_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-14 02:34:59.520 189 DEBUG tempest.lib.common.rest_client [req-7850b43b-4754-4760-80cb-085c1a0b8cac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7850b43b-4754-4760-80cb-085c1a0b8cac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["wfUf0ltGQUCarzMqXZDFaw"], "expires_at": "2020-12-14T03:34:59.000000Z", "issued_at": "2020-12-14T02:34:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:59.702 189 INFO tempest.lib.common.rest_client [req-4ed8c79a-a8ea-4960-a8ee-56659c0b9d55 ] Request (VolumesSnapshotV3RbacTest:test_update_snapshot): 200 PUT http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260 0.175s 2020-12-14 02:34:59.705 189 DEBUG tempest.lib.common.rest_client [req-4ed8c79a-a8ea-4960-a8ee-56659c0b9d55 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"snapshot": {"description": "This is the new description of snapshot."}} Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-4ed8c79a-a8ea-4960-a8ee-56659c0b9d55', 'content-length': '373', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-4ed8c79a-a8ea-4960-a8ee-56659c0b9d55', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260'} Body: b'{"snapshot": {"id": "43f0b5e6-67e7-4f2e-b7e2-dcdbad146260", "created_at": "2020-12-14T02:34:49.000000", "updated_at": "2020-12-14T02:34:50.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060", "description": "This is the new description of snapshot.", "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "available", "size": 1, "metadata": {}}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:59.734 189 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-14 02:34:59.807 189 INFO tempest.lib.common.rest_client [req-222aa4a2-4d04-489e-a546-c6036ec09661 ] Request (VolumesSnapshotV3RbacTest:test_update_snapshot): 200 GET http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles 0.067s 2020-12-14 02:34:59.810 189 DEBUG tempest.lib.common.rest_client [req-222aa4a2-4d04-489e-a546-c6036ec09661 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-222aa4a2-4d04-489e-a546-c6036ec09661', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e/users/4ef5b6bf76ae472c8af656600d4f3acb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:34:59.867 189 INFO tempest.lib.common.rest_client [req-12108b04-fe7c-4463-ab33-e689e105bd88 ] Request (VolumesSnapshotV3RbacTest:test_update_snapshot): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.049s 2020-12-14 02:34:59.871 189 DEBUG tempest.lib.common.rest_client [req-12108b04-fe7c-4463-ab33-e689e105bd88 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-12108b04-fe7c-4463-ab33-e689e105bd88', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4ef5b6bf76ae472c8af656600d4f3acb", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552", "password_expires_at": null}, "audit_ids": ["-mHfHxg5QPWtzYWpAvSBaA"], "expires_at": "2020-12-14T03:34:59.000000Z", "issued_at": "2020-12-14T02:34:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a55e2cd27846479ebfa15881871a395e", "name": "tempest-VolumesSnapshotV3RbacTest-2082377552"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a55e2cd27846479ebfa15881871a395e", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:35:00.000 189 INFO tempest.lib.common.rest_client [req-8d3a3aaf-4a41-4394-a5d6-df270ca70be9 ] Request (VolumesSnapshotV3RbacTest:test_update_snapshot): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260 0.121s 2020-12-14 02:35:00.004 189 DEBUG tempest.lib.common.rest_client [req-8d3a3aaf-4a41-4394-a5d6-df270ca70be9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:34:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8d3a3aaf-4a41-4394-a5d6-df270ca70be9', 'content-length': '507', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8d3a3aaf-4a41-4394-a5d6-df270ca70be9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260'} Body: b'{"snapshot": {"id": "43f0b5e6-67e7-4f2e-b7e2-dcdbad146260", "created_at": "2020-12-14T02:34:49.000000", "updated_at": "2020-12-14T02:35:00.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060", "description": "This is the new description of snapshot.", "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "available", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a55e2cd27846479ebfa15881871a395e", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:35:00.036 189 INFO tempest.common.waiters [-] snapshot 43f0b5e6-67e7-4f2e-b7e2-dcdbad146260 reached available after waiting for 0.036651 seconds 2020-12-14 02:35:00.281 189 INFO tempest.lib.common.rest_client [req-07bc8e95-4996-4bde-a38e-13b12c97b144 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 404 DELETE http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/593c2879-44d1-4954-91e5-3d6b19b5fe25 0.043s 2020-12-14 02:35:00.283 189 DEBUG tempest.lib.common.rest_client [req-07bc8e95-4996-4bde-a38e-13b12c97b144 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:35:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-07bc8e95-4996-4bde-a38e-13b12c97b144', 'x-openstack-request-id': 'req-07bc8e95-4996-4bde-a38e-13b12c97b144', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/593c2879-44d1-4954-91e5-3d6b19b5fe25'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 593c2879-44d1-4954-91e5-3d6b19b5fe25 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:35:00.383 189 INFO tempest.lib.common.rest_client [req-75c3e2ba-caaa-4883-acbe-35366271b37d ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/f6f855ea-3c04-4c08-a69a-327e7da84b7a 0.095s 2020-12-14 02:35:00.385 189 DEBUG tempest.lib.common.rest_client [req-75c3e2ba-caaa-4883-acbe-35366271b37d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:35:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-75c3e2ba-caaa-4883-acbe-35366271b37d', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/f6f855ea-3c04-4c08-a69a-327e7da84b7a'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:35:00.430 189 INFO tempest.lib.common.rest_client [req-a5419bea-ec85-4399-8fb6-f6160d6ce172 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/f6f855ea-3c04-4c08-a69a-327e7da84b7a 0.041s 2020-12-14 02:35:00.432 189 DEBUG tempest.lib.common.rest_client [req-a5419bea-ec85-4399-8fb6-f6160d6ce172 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:35:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-a5419bea-ec85-4399-8fb6-f6160d6ce172', 'content-length': '470', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-a5419bea-ec85-4399-8fb6-f6160d6ce172', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/f6f855ea-3c04-4c08-a69a-327e7da84b7a'} Body: b'{"snapshot": {"id": "f6f855ea-3c04-4c08-a69a-327e7da84b7a", "created_at": "2020-12-14T02:34:52.000000", "updated_at": "2020-12-14T02:35:00.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-1167912604", "description": null, "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a55e2cd27846479ebfa15881871a395e", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:35:01.514 189 INFO tempest.lib.common.rest_client [req-d95a9f25-7686-4919-91bb-1ab32db05aa7 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/f6f855ea-3c04-4c08-a69a-327e7da84b7a 0.048s 2020-12-14 02:35:01.518 189 DEBUG tempest.lib.common.rest_client [req-d95a9f25-7686-4919-91bb-1ab32db05aa7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:35:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-d95a9f25-7686-4919-91bb-1ab32db05aa7', 'x-openstack-request-id': 'req-d95a9f25-7686-4919-91bb-1ab32db05aa7', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/f6f855ea-3c04-4c08-a69a-327e7da84b7a'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot f6f855ea-3c04-4c08-a69a-327e7da84b7a could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:35:01.616 189 INFO tempest.lib.common.rest_client [req-77174fe6-7ea7-4d8c-b61e-c3db136d735b ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260 0.089s 2020-12-14 02:35:01.620 189 DEBUG tempest.lib.common.rest_client [req-77174fe6-7ea7-4d8c-b61e-c3db136d735b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:35:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-77174fe6-7ea7-4d8c-b61e-c3db136d735b', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:35:01.669 189 INFO tempest.lib.common.rest_client [req-82a556ff-3260-49a5-8db8-970395455b48 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260 0.043s 2020-12-14 02:35:01.672 189 DEBUG tempest.lib.common.rest_client [req-82a556ff-3260-49a5-8db8-970395455b48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:35:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-82a556ff-3260-49a5-8db8-970395455b48', 'content-length': '506', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-82a556ff-3260-49a5-8db8-970395455b48', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260'} Body: b'{"snapshot": {"id": "43f0b5e6-67e7-4f2e-b7e2-dcdbad146260", "created_at": "2020-12-14T02:34:49.000000", "updated_at": "2020-12-14T02:35:02.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Snapshot-36517060", "description": "This is the new description of snapshot.", "volume_id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "deleting", "size": 1, "metadata": {}, "os-extended-snapshot-attributes:project_id": "a55e2cd27846479ebfa15881871a395e", "os-extended-snapshot-attributes:progress": "100%"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:35:02.761 189 INFO tempest.lib.common.rest_client [req-37b5a282-0a4d-434f-a47b-cbb91b3a4839 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260 0.051s 2020-12-14 02:35:02.763 189 DEBUG tempest.lib.common.rest_client [req-37b5a282-0a4d-434f-a47b-cbb91b3a4839 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:35:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '111', 'content-type': 'application/json', 'x-compute-request-id': 'req-37b5a282-0a4d-434f-a47b-cbb91b3a4839', 'x-openstack-request-id': 'req-37b5a282-0a4d-434f-a47b-cbb91b3a4839', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/snapshots/43f0b5e6-67e7-4f2e-b7e2-dcdbad146260'} Body: b'{"itemNotFound": {"code": 404, "message": "Snapshot 43f0b5e6-67e7-4f2e-b7e2-dcdbad146260 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:35:02.855 189 INFO tempest.lib.common.rest_client [req-afc1830f-4dc1-4be3-b451-9cef6e5fd1bd ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 202 DELETE http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2 0.085s 2020-12-14 02:35:02.858 189 DEBUG tempest.lib.common.rest_client [req-afc1830f-4dc1-4be3-b451-9cef6e5fd1bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:35:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'text/html; charset=UTF-8', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-afc1830f-4dc1-4be3-b451-9cef6e5fd1bd', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:35:02.948 189 INFO tempest.lib.common.rest_client [req-8296c8ed-0536-40e8-8e28-4ed066d88c7a ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 200 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2 0.083s 2020-12-14 02:35:02.951 189 DEBUG tempest.lib.common.rest_client [req-8296c8ed-0536-40e8-8e28-4ed066d88c7a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:35:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'x-compute-request-id': 'req-8296c8ed-0536-40e8-8e28-4ed066d88c7a', 'content-length': '1068', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-8296c8ed-0536-40e8-8e28-4ed066d88c7a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2'} Body: b'{"volume": {"id": "4167088a-1150-4430-93f5-89b15a5304c2", "status": "deleting", "size": 1, "availability_zone": "nova", "created_at": "2020-12-14T02:34:47.000000", "updated_at": "2020-12-14T02:35:03.000000", "name": "tempest-VolumesSnapshotV3RbacTest-Volume-2087197523", "description": null, "volume_type": "ceph", "snapshot_id": null, "source_volid": null, "metadata": {}, "links": [{"rel": "self", "href": "http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2"}, {"rel": "bookmark", "href": "http://172.30.13.94/volume/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2"}], "user_id": "4ef5b6bf76ae472c8af656600d4f3acb", "bootable": "false", "encrypted": false, "replication_status": null, "consistencygroup_id": null, "multiattach": false, "attachments": [], "migration_status": null, "os-vol-mig-status-attr:migstat": null, "os-vol-mig-status-attr:name_id": null, "os-vol-host-attr:host": "lf-virtual9@ceph#ceph", "os-vol-tenant-attr:tenant_id": "a55e2cd27846479ebfa15881871a395e"}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:35:04.113 189 INFO tempest.lib.common.rest_client [req-3a878966-ff47-445f-ba00-af4ba9bf0293 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 404 GET http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2 0.066s 2020-12-14 02:35:04.115 189 DEBUG tempest.lib.common.rest_client [req-3a878966-ff47-445f-ba00-af4ba9bf0293 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:35:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'volume 3.0', 'vary': 'OpenStack-API-Version', 'content-length': '109', 'content-type': 'application/json', 'x-compute-request-id': 'req-3a878966-ff47-445f-ba00-af4ba9bf0293', 'x-openstack-request-id': 'req-3a878966-ff47-445f-ba00-af4ba9bf0293', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/volume/v3/a55e2cd27846479ebfa15881871a395e/volumes/4167088a-1150-4430-93f5-89b15a5304c2'} Body: b'{"itemNotFound": {"code": 404, "message": "Volume 4167088a-1150-4430-93f5-89b15a5304c2 could not be found."}}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:35:04.271 189 INFO tempest.lib.common.rest_client [req-f996a730-89d9-4650-93e2-759bb10bb7fc ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/4ef5b6bf76ae472c8af656600d4f3acb 0.148s 2020-12-14 02:35:04.274 189 DEBUG tempest.lib.common.rest_client [req-f996a730-89d9-4650-93e2-759bb10bb7fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:35:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f996a730-89d9-4650-93e2-759bb10bb7fc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/4ef5b6bf76ae472c8af656600d4f3acb'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:35:04.376 189 INFO tempest.lib.common.rest_client [req-b138a74a-e636-487f-82b2-6272b6125778 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-14 02:35:04.379 189 DEBUG tempest.lib.common.rest_client [req-b138a74a-e636-487f-82b2-6272b6125778 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Mon, 14 Dec 2020 02:35:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b138a74a-e636-487f-82b2-6272b6125778', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45b457c2040b4e3db7f9b69756b30820", "name": "patrole_reader-user_be22ae32-c2f8-4fdd-be50-08a02b33c33f", "password_expires_at": null}, "audit_ids": ["fYjKflTxQ4Ksw8nwL9ZlHQ"], "expires_at": "2020-12-14T03:35:04.000000Z", "issued_at": "2020-12-14T02:35:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3cc32870ea9c4124a18f8824ceee8b29", "name": "patrole_reader-project_be22ae32-c2f8-4fdd-be50-08a02b33c33f"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3cc32870ea9c4124a18f8824ceee8b29", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:35:04.713 189 INFO tempest.lib.common.rest_client [req-e3aee7f7-04c2-4d3d-a1ec-b17bba411b59 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a55e2cd27846479ebfa15881871a395e&name=default 0.327s 2020-12-14 02:35:04.716 189 DEBUG tempest.lib.common.rest_client [req-e3aee7f7-04c2-4d3d-a1ec-b17bba411b59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-e3aee7f7-04c2-4d3d-a1ec-b17bba411b59', 'date': 'Mon, 14 Dec 2020 02:35:04 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a55e2cd27846479ebfa15881871a395e&name=default'} Body: b'{"security_groups": [{"id": "6104ec35-4648-404f-bfbf-459812519c54", "name": "default", "stateful": true, "tenant_id": "a55e2cd27846479ebfa15881871a395e", "description": "Default security group", "security_group_rules": [{"id": "673c9e6b-fc95-4724-831c-ce1af6666d9b", "tenant_id": "a55e2cd27846479ebfa15881871a395e", "security_group_id": "6104ec35-4648-404f-bfbf-459812519c54", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:35:04Z", "updated_at": "2020-12-14T02:35:04Z", "revision_number": 0, "project_id": "a55e2cd27846479ebfa15881871a395e"}, {"id": "68a3dd32-c418-444a-9e5d-1994e2ec9bd1", "tenant_id": "a55e2cd27846479ebfa15881871a395e", "security_group_id": "6104ec35-4648-404f-bfbf-459812519c54", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "6104ec35-4648-404f-bfbf-459812519c54", "description": null, "tags": [], "created_at": "2020-12-14T02:35:04Z", "updated_at": "2020-12-14T02:35:04Z", "revision_number": 0, "project_id": "a55e2cd27846479ebfa15881871a395e"}, {"id": "9de2ce61-4c5a-48f2-9f8b-8ac615a0bc10", "tenant_id": "a55e2cd27846479ebfa15881871a395e", "security_group_id": "6104ec35-4648-404f-bfbf-459812519c54", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "6104ec35-4648-404f-bfbf-459812519c54", "description": null, "tags": [], "created_at": "2020-12-14T02:35:04Z", "updated_at": "2020-12-14T02:35:04Z", "revision_number": 0, "project_id": "a55e2cd27846479ebfa15881871a395e"}, {"id": "e23ffc28-b751-4873-a7ac-f4299a929158", "tenant_id": "a55e2cd27846479ebfa15881871a395e", "security_group_id": "6104ec35-4648-404f-bfbf-459812519c54", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-14T02:35:04Z", "updated_at": "2020-12-14T02:35:04Z", "revision_number": 0, "project_id": "a55e2cd27846479ebfa15881871a395e"}], "tags": [], "created_at": "2020-12-14T02:35:04Z", "updated_at": "2020-12-14T02:35:04Z", "revision_number": 1, "project_id": "a55e2cd27846479ebfa15881871a395e"}]}' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:35:04.881 189 INFO tempest.lib.common.rest_client [req-570555bc-31f7-4f90-b436-969b4be1d33a ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/6104ec35-4648-404f-bfbf-459812519c54 0.158s 2020-12-14 02:35:04.885 189 DEBUG tempest.lib.common.rest_client [req-570555bc-31f7-4f90-b436-969b4be1d33a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-570555bc-31f7-4f90-b436-969b4be1d33a', 'content-length': '0', 'date': 'Mon, 14 Dec 2020 02:35:04 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/6104ec35-4648-404f-bfbf-459812519c54'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449 2020-12-14 02:35:05.025 189 INFO tempest.lib.common.rest_client [req-e80e8835-f739-4194-9dbc-49fca2a404c4 ] Request (VolumesSnapshotV3RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e 0.132s 2020-12-14 02:35:05.028 189 DEBUG tempest.lib.common.rest_client [req-e80e8835-f739-4194-9dbc-49fca2a404c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Mon, 14 Dec 2020 02:35:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e80e8835-f739-4194-9dbc-49fca2a404c4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a55e2cd27846479ebfa15881871a395e'} Body: b'' _log_request_full /root/.rally/verification/verifier-f124102f-ba0a-47d6-9807-a4a10e16494b/repo/tempest/lib/common/rest_client.py:449